jackkuo commited on
Commit
cc8e806
·
verified ·
1 Parent(s): 06e4617

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -9AzT4oBgHgl3EQfS_sw/content/tmp_files/2301.01240v1.pdf.txt +1300 -0
  2. -9AzT4oBgHgl3EQfS_sw/content/tmp_files/load_file.txt +0 -0
  3. -NFRT4oBgHgl3EQfrTfI/content/2301.13620v1.pdf +3 -0
  4. -NFRT4oBgHgl3EQfrTfI/vector_store/index.faiss +3 -0
  5. -NFRT4oBgHgl3EQfrTfI/vector_store/index.pkl +3 -0
  6. .gitattributes +72 -0
  7. 0NFST4oBgHgl3EQfVTgy/content/tmp_files/2301.13776v1.pdf.txt +1515 -0
  8. 0NFST4oBgHgl3EQfVTgy/content/tmp_files/load_file.txt +0 -0
  9. 19AzT4oBgHgl3EQf8_5O/content/2301.01912v1.pdf +3 -0
  10. 19FKT4oBgHgl3EQfPS1l/content/tmp_files/2301.11762v1.pdf.txt +788 -0
  11. 19FKT4oBgHgl3EQfPS1l/content/tmp_files/load_file.txt +0 -0
  12. 1NFPT4oBgHgl3EQfUTQQ/content/2301.13056v1.pdf +3 -0
  13. 1NFPT4oBgHgl3EQfUTQQ/vector_store/index.faiss +3 -0
  14. 1NFPT4oBgHgl3EQfUTQQ/vector_store/index.pkl +3 -0
  15. 3NE2T4oBgHgl3EQf5wjH/content/tmp_files/2301.04194v1.pdf.txt +2870 -0
  16. 3NE2T4oBgHgl3EQf5wjH/content/tmp_files/load_file.txt +0 -0
  17. 3dE1T4oBgHgl3EQf5wXA/vector_store/index.faiss +3 -0
  18. 59E1T4oBgHgl3EQfTAPi/content/2301.03074v1.pdf +3 -0
  19. 59E1T4oBgHgl3EQfTAPi/vector_store/index.pkl +3 -0
  20. 8dE1T4oBgHgl3EQfCAI3/content/tmp_files/2301.02858v1.pdf.txt +2437 -0
  21. 8dE1T4oBgHgl3EQfCAI3/content/tmp_files/load_file.txt +0 -0
  22. 8dE4T4oBgHgl3EQf2w3D/vector_store/index.faiss +3 -0
  23. 9tE0T4oBgHgl3EQffwDm/vector_store/index.faiss +3 -0
  24. 9tE0T4oBgHgl3EQffwDm/vector_store/index.pkl +3 -0
  25. C9E2T4oBgHgl3EQfoAjs/content/tmp_files/2301.04015v1.pdf.txt +1048 -0
  26. C9E2T4oBgHgl3EQfoAjs/content/tmp_files/load_file.txt +0 -0
  27. CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf +3 -0
  28. CdE0T4oBgHgl3EQfyQI7/vector_store/index.pkl +3 -0
  29. CtAzT4oBgHgl3EQfiP1R/vector_store/index.faiss +3 -0
  30. EdAzT4oBgHgl3EQfiv0h/content/tmp_files/2301.01503v1.pdf.txt +1378 -0
  31. EdAzT4oBgHgl3EQfiv0h/content/tmp_files/load_file.txt +0 -0
  32. GdAzT4oBgHgl3EQfHfsT/content/2301.01044v1.pdf +3 -0
  33. GdAzT4oBgHgl3EQfHfsT/vector_store/index.pkl +3 -0
  34. GtFLT4oBgHgl3EQfHC_F/content/tmp_files/2301.11995v1.pdf.txt +1568 -0
  35. GtFLT4oBgHgl3EQfHC_F/content/tmp_files/load_file.txt +0 -0
  36. H9E1T4oBgHgl3EQfrgXE/content/tmp_files/2301.03356v1.pdf.txt +531 -0
  37. H9E1T4oBgHgl3EQfrgXE/content/tmp_files/load_file.txt +531 -0
  38. I9E1T4oBgHgl3EQfGAMz/content/2301.02908v1.pdf +3 -0
  39. I9E1T4oBgHgl3EQfGAMz/vector_store/index.faiss +3 -0
  40. I9E1T4oBgHgl3EQfGAMz/vector_store/index.pkl +3 -0
  41. I9FIT4oBgHgl3EQfYyvF/content/tmp_files/2301.11250v1.pdf.txt +1870 -0
  42. I9FIT4oBgHgl3EQfYyvF/content/tmp_files/load_file.txt +0 -0
  43. INE3T4oBgHgl3EQfugsS/content/2301.04684v1.pdf +3 -0
  44. ItAyT4oBgHgl3EQf5vr6/content/tmp_files/2301.00812v1.pdf.txt +1909 -0
  45. ItAyT4oBgHgl3EQf5vr6/content/tmp_files/load_file.txt +0 -0
  46. JdE0T4oBgHgl3EQfSACX/content/2301.02216v1.pdf +3 -0
  47. JdE0T4oBgHgl3EQfSACX/vector_store/index.pkl +3 -0
  48. JtAyT4oBgHgl3EQfsPmi/content/tmp_files/2301.00574v1.pdf.txt +1006 -0
  49. K9E0T4oBgHgl3EQfigH5/content/2301.02448v1.pdf +3 -0
  50. K9E0T4oBgHgl3EQfigH5/vector_store/index.faiss +3 -0
-9AzT4oBgHgl3EQfS_sw/content/tmp_files/2301.01240v1.pdf.txt ADDED
@@ -0,0 +1,1300 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ Modeling Effective Lifespan of Payment
3
+ Channels
4
+ Soheil Zibakhsh Shabgahi, Seyed Mahdi Hosseini, Seyed Pooya Shariatpanahi, Behnam Bahrak
5
+ Abstract—While being decentralized, secure, and reliable, Bitcoin and many other blockchain-based cryptocurrencies suffer from
6
+ scalability issues. One of the promising proposals to address this problem is off-chain payment channels. Since, not all nodes are
7
+ connected directly to each other, they can use a payment network to route their payments. Each node allocates a balance that is frozen
8
+ during the channel’s lifespan. Spending and receiving transactions will shift the balance to one side of the channel. A channel becomes
9
+ unbalanced when there is not sufficient balance in one direction. In this case, we say the effective lifespan of the channel has ended.
10
+ In this paper, we develop a mathematical model to predict the expected effective lifespan of a channel based on the network’s topology.
11
+ We investigate the impact of channel unbalancing on the payment network and individual channels. We also discuss the effect of
12
+ certain characteristics of payment channels on their lifespan. Our case study on a snapshot of the Lightning Network shows how the
13
+ effective lifespan is distributed, and how it is correlated with other network characteristics. Our results show that central unbalanced
14
+ channels have a drastic effect on the network performance.
15
+ Index Terms—Bitcoin, Lightning Network, Payment Channel, Lifespan, Random Walk.
16
+ !
17
+ 1
18
+ INTRODUCTION
19
+ B
20
+ ITCOIN is the first decentralized cryptocurrency, in-
21
+ troduced in 2008 which provides security, anonymity,
22
+ transparency, and democracy without any trusted third
23
+ party [1]. Most of these properties are achieved by using
24
+ a blockchain as a distributed ledger. An inherent problem
25
+ with using a blockchain over a network is that it sacrifices
26
+ scalability [2], [3]. The reason is that all nodes, potentially
27
+ tens of thousands, must exchange, store, and verify each
28
+ and every transaction in the system [4]. Furthermore, each
29
+ block has a limited size and blocks get generated at regular
30
+ intervals (approximately every 10 minutes). This means that
31
+ with the current blocksize of 1 MB the throughput of Bitcoin
32
+ is about 4.6 transactions per second, which is much slower
33
+ than centralized systems like Visa, WeChatPay, and PayPal
34
+ [5]; making the use of Bitcoin in everyday transactions
35
+ impractical.
36
+ Another trade-off the Bitcoin consensus makes is that it
37
+ ensures security by waiting for other miners to confirm a
38
+ transaction by extending the block holding that transaction,
39
+ which reduces the throughput. This way it makes sure that
40
+ the double spending attack is highly improbable. Currently,
41
+ the standard waiting time for a block to be confirmed is 6
42
+ blocks, which is almost one hour [6].
43
+ Bitcoin’s capacity limitations are being felt by users in
44
+ the form of increased transaction fees and latency. With
45
+ an increasing demand for making transactions, users need
46
+ to pay more transaction fees in order to make sure that
47
+ their transaction is more profitable for the miners; hence
48
+ have a higher chance of making it into a block. Queuing of
49
+ transactions and network bandwidth will lead to a longer
50
+ delay time for a transaction to appear in the blockchain.
51
+ There are many different proposals to solve the scala-
52
+ bility problem. Most of the proposals fall into three cate-
53
+ gories: Layer0, Layer1, and Layer2 solutions [7]. Layer0
54
+ solutions try to enhance the infrastructure, like the network
55
+ that connects the nodes. Layer1 solutions try to enhance
56
+ the blockchain’s shortcomings by changing the consensus
57
+ mechanism and protocols [8], [9]. Layer2 solutions propose
58
+ ways to move away from the blockchain, and for this reason,
59
+ they are also called off-chain solutions [10].
60
+ In 2016 the idea of Lightning Network (LN) was pro-
61
+ posed to move the transactions to the second layer (off-
62
+ chain) [4]. The Lightning Network consists of payment
63
+ channels in a P2P fashion. Payment channels allow two
64
+ parties to exchange payments with negligible time and cost,
65
+ but both parties must freeze an initial fund in the channel
66
+ so no one can spend more money than they own and no
67
+ double spending occurs. It is important to note that the sum
68
+ of funds in each channel remains constant throughout the
69
+ channel’s lifespan and only the channel’s balance changes.
70
+ When two parties that do not have a direct channel want to
71
+ exchange payments they can use other parties to route their
72
+ payments. So a network of nodes is constructed and all the
73
+ connected nodes can send each other payments.
74
+ This system moves the cost of submitting a transaction
75
+ off the blockchain. Only the final states between two nodes
76
+ will eventually make it into the blockchain, which signifi-
77
+ cantly increases throughput. Furthermore, no time is needed
78
+ for the transaction to be confirmed and all transactions in a
79
+ channel happen almost instantly.
80
+ After several transactions through a channel, the channel
81
+ starts to get unbalanced; meaning all of its funds have gone
82
+ to one of the parties and the other node cannot route any
83
+ more payments through the channel. In this case, it is best
84
+ to close the unbalanced channel or open a new one.
85
+ In this paper, we investigate the expected effective lifes-
86
+ pan of a channel in a payment network. Our contributions
87
+ can be summarized as follows:
88
+
89
+ We provide simulation evidence of how channel
90
+ unbalancing impacts its throughput. Moreover, we
91
+ show how the performance of the payment network
92
+ arXiv:2301.01240v1 [cs.DC] 11 Sep 2022
93
+
94
+ 2
95
+ can be affected if a number of channels become
96
+ unbalanced.
97
+
98
+ We present a mathematical model of payment chan-
99
+ nels to predict the expected time for a channel to get
100
+ unbalanced considering the channel’s position in the
101
+ network and its initial balance. We call this time the
102
+ Effective Lifespan of the channel.
103
+
104
+ We evaluate our model through simulation, and
105
+ observe how the Effective Lifespan of a channel is
106
+ affected if we change any of its characteristics.
107
+
108
+ By analyzing a recent snapshot of the Lightning Net-
109
+ work, we find the distribution of real-world chan-
110
+ nel lifespans and its correlation with the network’s
111
+ topological parameters. We also investigate the rela-
112
+ tionship between the centrality of a channel in the
113
+ network and its effective lifespan.
114
+ 2
115
+ RELATED WORK
116
+ While the LN white paper [4] does not discuss channel re-
117
+ balancing, there exists some research on channel balances
118
+ and their significance.
119
+ The importance of channel balances is mainly discussed
120
+ in four major areas; re-balancing, security, performance, and
121
+ financial.
122
+ Re-balancing: [11] proposes a method for re-balancing
123
+ payment channels. This work allows arbitrary sets of users
124
+ to securely re-balance their channels. However, this paper
125
+ does not discuss the application of re-balancing, and how
126
+ frequently it should be performed. [12] also proposes meth-
127
+ ods for rebalancing LN channels, but does not discuss the
128
+ frequency of rebalancing.
129
+ Performance: In [13] the authors discuss why it is in
130
+ the best interest of the network to have balanced channels.
131
+ They propose a method to re-balance some channels to
132
+ improve the network’s performance. [14] presents a method
133
+ in which a node can make its channels balanced through
134
+ circular subgraphs. It also develops a method for measuring
135
+ imbalance in a payment network.
136
+ Security: There has been some research on the security
137
+ aspects of channel unbalancing. In [14], [15], and [16] the
138
+ authors describe a method in which it is possible for an
139
+ adversary to uncover channel balances. Having unbalanced
140
+ channels poses the threat of griefing attacks. The incentive
141
+ for honest behavior in the LN channels is the penalty for
142
+ misbehavior. If a node cheats by publishing an old contract,
143
+ it will be penalized and all of the channel funds can be
144
+ claimed by the victim. When channels are unbalanced the
145
+ penalty is less so there is less incentive for honest behav-
146
+ ior. In [17] the authors discuss some countermeasures like
147
+ watchtowers to keep the misbehaving nodes from closing
148
+ the channel.
149
+ Financial: Routing payments through a channel can
150
+ make revenue for the owner. So payment channels can be
151
+ looked at as investments. In [18] the authors do an in-depth
152
+ financial analysis on how much should payment channels
153
+ charge for routing payments. One of the key factors in this
154
+ analysis is the lifespan of payment channels. In order to
155
+ analyze investing in a payment channel, nodes should be
156
+ able to have an estimate on how long the investment stays
157
+ profitable and what is the impact of channel unbalancing on
158
+ the profits of a channel. Branzei et al. [18] assume an equal
159
+ probability of having a payment from each side in a channel
160
+ and use the lifetime of channels for financial analyses. We
161
+ will show how the lifespan of a channel could be affected
162
+ by this probability.
163
+ In this paper we focus on the details of estimating chan-
164
+ nel lifespans; considering parameters such as the placement
165
+ of the channel in the topology and payment rates between
166
+ each pair and explain the importance of estimating channel
167
+ lifespans. This gives us a better and more realistic estimation
168
+ of the channel’s lifespan compared to existing work. More-
169
+ over, we measure the impact of imbalanced channels on the
170
+ network.
171
+ Despite the importance of payment channel’s lifespan, to
172
+ the best of our knowledge, the expected lifespan of channels
173
+ in the payment network has not been discussed in detail.
174
+ 3
175
+ TECHNICAL BACKGROUND
176
+ In this section, we provide a technical background to under-
177
+ stand the remainder of this paper thoroughly.
178
+ Payment Channels
179
+ Payment channel is a financial contract between two parties
180
+ in a cryptocurrency like Bitcoin. The contract allocates a
181
+ balance of funds from both parties. The contract is estab-
182
+ lished by a 2-of-2 multisignature address which requires the
183
+ cooperation of both parties to spend the funds.
184
+ Payments are made off the blockchain by passing on
185
+ a new version of the contract with a different balance of
186
+ allocated funds on the spending transaction; which both
187
+ parties have to sign. The channel is closed when one of
188
+ the parties publishes the latest version of the contract to
189
+ the blockchain. We define the payment direction to be the
190
+ direction in which funds are moving during a transaction.
191
+ In this paper, we call the sum of locked funds in a
192
+ channel the channel’s capacity. When all of the funds of
193
+ a channel are allocated to one of the parties, the channel
194
+ becomes unbalanced. In this case payments can only be made
195
+ from one side of the channel. A channel’s effective lifespan is
196
+ the time from creation of a channel until the first imbalance
197
+ occurs. A channel’s success probability is defined as the
198
+ number of successful payments made through the channel
199
+ divided by the total number of payment attempts.
200
+ Several connected payment channels can form a pay-
201
+ ment network, in the case of Bitcoin, this network is called
202
+ the Lightning Network [4]. This network is used to route
203
+ payments through intermediate channels between nodes
204
+ who do not have a direct channel between them. We de-
205
+ fine a network’s success probability as the total number of
206
+ successful payments made on the network divided by the
207
+ total attempts to route payments through the network [19].
208
+ Random Walk
209
+ The random walk model has been used in a wide variety
210
+ of contexts to model the movement of objects in different
211
+ spaces. This paper uses one-dimensional random walk to
212
+ model the liquidity balance in a payment channel. Two
213
+ endpoints on the left and right sides of the random walk
214
+ are assumed to represent the channel imbalance condition.
215
+
216
+ 3
217
+ Fig. 1. Relation of network success rate with percentage of unbalanced
218
+ channels in the network.
219
+ In our model, each payment corresponds to one step of
220
+ the random walk model, and the direction of the payment
221
+ determines the direction of that step. Suppose we take prob-
222
+ abilities p and 1 − p as the probability of payment direction
223
+ (i.e., step direction). We can find the expected number of
224
+ payments (steps) needed for the channel (the random walk
225
+ model)to get unbalanced (to reach one of the endpoints).
226
+ Betweenness Centrality
227
+ Betweenness centrality is a measure based on shortest paths
228
+ for the importance of the location of a node or an edge
229
+ in a graph. Betweenness centrality for an edge(a, b) in the
230
+ network is defined as follows: �
231
+ s,t∈V
232
+ s̸=t
233
+ σ(s,t|edge(a,b))
234
+ σ(s,t)
235
+ , where
236
+ σ(s, t) is the total number of shortest paths between nodes
237
+ s and t and σ(s, t|edge(a, b)) is the total number of shortest
238
+ paths between s and t that pass through edge(a, b).
239
+ 4
240
+ MOTIVATION
241
+ One of the important characteristics of a payment network
242
+ is reliability. Reliability can be defined as the probability of
243
+ payment success [19].
244
+ In this section, we analyze the payment routing failure
245
+ probability of a singular channel after unbalancing, and the
246
+ network’s success probability of routing a payment when
247
+ some channels are unbalanced.
248
+ 4.1
249
+ Singular Channel
250
+ We ran a simulator of a single payment channel to see how
251
+ much the failure rate increases after the first time that the
252
+ channel becomes unbalanced. Fig. 2 shows the failure rate
253
+ after the first time a channel becomes unbalanced. During
254
+ the simulation, 5000 payments were being routed through
255
+ an initially balanced channel. Then the simulator calculates
256
+ the failure rate after the first time the channel becomes un-
257
+ balanced. As Fig. 2 suggests, the probability of the direction
258
+ of payments (p) is a key factor in determining how much
259
+ the probability of payment success degrades after the first
260
+ imbalance occurs. Channels capacity has little to no impact
261
+ on how well it performs after unbalancing.
262
+ These results show that the probability of payment di-
263
+ rection (p), which depends on the network topology and
264
+ Fig. 2. Failure rate after unbalancing.
265
+ the network’s transaction flow, is one of the most impor-
266
+ tant parameters in determining the channel’s lifespan; more
267
+ importantly, shows the impact of unbalancing on channel
268
+ success probability after the channel becomes unbalanced.
269
+ 4.2
270
+ Network Performance
271
+ Using the CLoTH simulator [19] we simulate and measure
272
+ the performance of Lightning Network. In each iteration we
273
+ take channels from the given LN snapshot and make them
274
+ unbalanced, we then measure the success probability after
275
+ attempting 5000 payments. Choosing more central channels
276
+ as unbalanced channels is more reasonable, because they
277
+ route more payments and thus have a higher probability
278
+ of becoming unbalanced in the real world. We considered
279
+ two scenarios for selecting channels to unbalance: choos-
280
+ ing channels randomly and choosing channels that have
281
+ a higher betweenness centrality. As illustrated in Fig. 1,
282
+ as the percentage of unbalanced channels increases, the
283
+ routing success rate decreases dramatically for both channel
284
+ selection scenarios. In the random selection scenario, it is
285
+ noticeable that the first 10 percent of unbalanced channels
286
+ have less effect on the network performance than the last
287
+ 10 percent of unbalanced channels. We see that unbalancing
288
+ channels with a higher betweenness centrality has a higher
289
+ impact on the network performance in contrast with the
290
+ random selection scenarios. Therefore, per any percentage of
291
+ unbalanced channels, selection with betweenness centrality
292
+ is more effective.
293
+ Seres et al. [20] suggest that in the Lightning Network,
294
+ the top 14% central channels will have the most significant
295
+ impact on the network. In a different experiment we made
296
+ 15% of the network’s channels unbalanced, we first sort the
297
+ channels by betweenness centrality and take a window of
298
+ 15% of the channels per experiment. We start with the 15%
299
+ most central channels and move all the way up to 15%
300
+ least central channels. It can be inferred from the results
301
+ in Fig. 3 that more central channels have more impact on
302
+ the network success rate when they become unbalanced. As
303
+ we can see in Fig. 3, the top 15% central channels have the
304
+ most significant effect on the success rate when they become
305
+ unbalanced. This confirms the result from Fig. 1.
306
+
307
+ 100
308
+ Random
309
+ 90
310
+ Most central
311
+ 80
312
+ rate
313
+ 70
314
+ Success
315
+ 60
316
+ 50
317
+ 40
318
+ 30
319
+ 20
320
+ 20
321
+ 40
322
+ 60
323
+ 80
324
+ 100
325
+ Percentage of initialy unbalanced channels0.40
326
+ Capacity: 1.2 Msat
327
+ Capacity: 1.8 Msat.
328
+ 0.35
329
+ Capacity: 2.4 Msat.
330
+ Capacity: 3.0 Msat.
331
+ 0.30
332
+ Capacity: 3.6 Msat.
333
+ 0.20
334
+ Fal
335
+ 0.15
336
+ 0.10
337
+ 0.05
338
+ 0.300
339
+ 0.325
340
+ 0.3500.3750.400
341
+ 0.425
342
+ 0.450
343
+ 0.475
344
+ 0.500
345
+ probability of payment direction4
346
+ Fig. 3. Per each data point the i-th to (i+4500)-th most central channels
347
+ are unbalanced and the success rate of the network is measured. The
348
+ total number of channels is 30457.
349
+ 5
350
+ THE MODEL
351
+ As we discussed in Section 4 channel balances have a sig-
352
+ nificant effect on both channel, and network performance.
353
+ In this section, we introduce a mathematical model to deter-
354
+ mine the expected time for a channel to get unbalanced;
355
+ we call this the channel’s expected lifespan. We model
356
+ the dynamics of a payment channel with a random walk
357
+ problem. Each payment passing through the channel will
358
+ represent a step the random walker takes. We will first
359
+ discuss our assumptions and describe the model in detail.
360
+ We then discuss how to find the model parameters. We
361
+ proceed by doing an analysis on how the expected lifespan
362
+ is affected by changing channel’s characteristics.
363
+ 5.1
364
+ Random Walk Model
365
+ Take a payment channel between two nodes A and B, and
366
+ take their initial balance allocated for the channel to be FA
367
+ and FB, respectively. The goal is to determine the expected
368
+ time it will take for this payment channel to become unbal-
369
+ anced for the first time. We make the following assumptions:
370
+
371
+ All the payments have the same amount denoted
372
+ with ω (PaymentSize).
373
+
374
+ The payments from each node come with a Poisson
375
+ distribution.
376
+ Since the number of nodes is large and the probability
377
+ of sending a transaction for a given time is small, we can
378
+ assume that transaction arrival for each channel is a Poisson
379
+ process for moderate time windows [21]. Although the
380
+ dynamics of the network will change over time, we make
381
+ the assumption of having a fixed topology.
382
+ We model the dynamics of a payment channel with a
383
+ random walk problem. Each payment is simulated by a step
384
+ the random walk takes. To simulate a payment channel, take
385
+ the liquidity of node A as the distance of the random walk
386
+ from the endpoint on the right hand side and the liquidity
387
+ of node B as the distance from the endpoint on the left hand
388
+ side.
389
+ The payment direction determines the direction of that
390
+ step. So the payment direction probability is the probability
391
+ of going to the right or left for the random walk in each step.
392
+ Fig. 4. Distribution of expected lifespan with 10000 random walk simula-
393
+ tions with p = 1
394
+ 2 and a = b = 1.2 Msat.
395
+ Let the random walk start at the origin of the number
396
+ line. The two endpoints a and −b are ⌊ FA
397
+ ω ⌋ and ⌊ FB
398
+ ω ⌋,
399
+ respectively.
400
+ Since we assume that the payments from each side are
401
+ made independently with a Poisson process, and the sum
402
+ of two independent Poisson processes is itself a Poisson
403
+ process, we can say that payments come to the channel with
404
+ a Poisson distribution having:
405
+ λpayment = λA,B + λB,A,
406
+ (1)
407
+ thus the relation between expected time and expected num-
408
+ ber of random walk steps is:
409
+ Etime =
410
+ Esteps
411
+ λpayment
412
+ ,
413
+ (2)
414
+ where Etime is the expected time until unbalancing and
415
+ Esteps is the expected number of steps until unbalancing
416
+ occurs.
417
+ The expected number of payments until unbalancing
418
+ occurs, can be a better metric depending on the application;
419
+ when multiplied by average fee per payment, it gives the
420
+ expected routing income, and when divided by λ it gives
421
+ the expected lifespan.
422
+ The objective is to determine the time it takes for a
423
+ channel to become unbalanced. We first try to find the
424
+ expected number of steps needed for the random walker
425
+ to reach +a or −b for the first time.
426
+ Lemma 1. The expected number of steps to reach +a or −b
427
+ for the first time starting from zero considering the probability p
428
+ for the positive direction and q = 1 − p for the negative direction
429
+ is:
430
+ Esteps =
431
+ � apa(pb−qb)+bqb(qa−pa)
432
+ (p−q)(pa+b−qa+b)
433
+ p ̸= 1/2
434
+ ab
435
+ p = 1/2
436
+ (3)
437
+ .
438
+ We provide the proof of Lemma 1 in Appendix A.
439
+ We simulated a Random Walk which starts from point
440
+ zero with the same probability of going to each side (p = 1
441
+ 2).
442
+ The simulation ran 10000 times to find the distribution of the
443
+ number of steps needed to reach +a or −b. Fig. 4 illustrates
444
+ the result of the simulation. We can observe that most of
445
+ the times the random walk reaches one of the bounds in
446
+ less than 400 steps, but there are not many situations where
447
+
448
+ 98
449
+ 96
450
+ Success rate
451
+ 94
452
+ 92
453
+ 90
454
+ 88
455
+ 86
456
+ 0
457
+ 5000
458
+ 10000
459
+ 15000
460
+ 20000
461
+ 25000350
462
+ 300
463
+ 250
464
+ count
465
+ 200
466
+ 150
467
+ 100
468
+ 50
469
+ 0
470
+ 0
471
+ 500
472
+ 1000
473
+ 1500
474
+ 2000
475
+ 2500
476
+ 3000
477
+ number of steps5
478
+ it takes a huge number of steps to reach these bounds.
479
+ However, the average number of steps needed to reach these
480
+ bounds is 400.5 confirming 11.
481
+ 5.2
482
+ Finding p
483
+ In Section 5.1 we modeled the payment channel dynamics
484
+ with a random walk and a parametric formula was con-
485
+ structed according to Lemma 1.
486
+ A payment network can be formally expressed by an
487
+ unweighted directed graph. V
488
+ represents the set of all
489
+ nodes, and the set of edges is denoted by E. Each channel
490
+ is represented using two edges from E each for one of the
491
+ directions.
492
+ We define MRates to be the matrix of payment rates
493
+ between each two nodes. The rate of payments (i.e., number
494
+ of payments per day) from node i to node j is denoted by
495
+ MRatesij.
496
+ λa,b represents the rate of payments transmitted over
497
+ the edge(a, b). λa,b consists of the sum of portions of the
498
+ payment rate between each pair of nodes that pass through
499
+ edge(a, b). So we have:
500
+ λa,b =
501
+
502
+ s,t∈V
503
+ s̸=t
504
+ σ(s, t|edge(a, b))
505
+ σ(s, t)
506
+ MRatesst,
507
+ (4)
508
+ where σ(s, t) is the number of shortest paths from node s
509
+ to node t and σ(s, t|edge(a, b)) is the number of shortest
510
+ paths from node s to node t passing through edge(a, b) in
511
+ the directed graph G.
512
+ Lemma 2. p
513
+ q = λ(a,b)
514
+ λ(b,a).
515
+ According to Lemma 2:
516
+ p =
517
+ λ(a, b)
518
+ λ(a, b) + λ(b, a)
519
+ (5)
520
+ Therefore we can find p based on the network topology.
521
+ Lemma 3. If ∀s, t ∈ V
522
+ : MRatesst = MRatests then
523
+ p = 0.5.
524
+ We provide the proofs of Lemmas 2 and 3 in Appendix A. If
525
+ we assume that MRates is a symmetric matrix, according
526
+ to Lemma 3, p is independent of MRates matrix and the
527
+ network topology.
528
+ 5.3
529
+ Model Analysis
530
+ In this section we analyze the effect of channel parameters
531
+ on the channel’s expected lifespan and perform a financial
532
+ analysis for channel lifespan.
533
+ For more realistic parameter values we used a recent
534
+ snapshot of the Lightning Network taken on Feb2019 as
535
+ a reference point. The average payment size is considered
536
+ to be 60000 sat1 [22] and the average channel capacity is
537
+ considered 2.4 Msat2 according to the snapshot.
538
+ For simplicity we use ”lifespan” and ”expected number
539
+ of payments until channel is unbalanced”, interchangeably.
540
+ 1. satoshi
541
+ 2. million satoshi
542
+ Fig. 5. Effect of payment direction probability on balanced channels,
543
+ according to different channel capacities.
544
+ Fig. 6. The effect of payment direction probability on expected number
545
+ of payments, according to different initial balance ratios. The channel
546
+ capacity is considered 2.4 Msat.
547
+ We first answer the question of how sensitive is a
548
+ channel’s lifespan to the changes in p. As demonstrated in
549
+ Fig.
550
+ 5; if the channel is initially balanced, the maximum
551
+ lifespan happens on p = 1
552
+ 2. Also, lifespan is more sensitive
553
+ to changes in p when the capacity is higher. From this
554
+ result we can infer that it is an important consideration
555
+ for a node to make sure the channel is placed in a way
556
+ that p is close to
557
+ 1
558
+ 2, otherwise the channel’s lifespan is
559
+ affected dramatically. A reasonable proposal for nodes who
560
+ want to keep their channels active as long as possible is to
561
+ charge routing fees in a way that encourages other nodes to
562
+ route their payments through the node in order to achieve
563
+ p = 0.5. Fig. 6 shows that if a channel is initially unbalanced,
564
+ its maximum possible lifespan takes a hit. Although the
565
+ maximum lifespan does not occur at exact p = 1
566
+ 2, it occurs at
567
+ a point close to this value. So even if a channel is somewhat
568
+ unbalanced, the nodes must try to keep p as close as possible
569
+ to 50%.
570
+ We now answer the question of how the lifespan is
571
+ affected by the channel capacity. As Fig. 7 suggests, the
572
+ channel lifespan increases with increasing its capacity. It is
573
+ noteworthy that the slope of this graph is increasing. So if
574
+ a node doubles its channel capacity, the channel’s lifespan
575
+ will be more than doubled. Moreover, Fig. 7 shows the effect
576
+ of a channel’s initial imbalance on its lifespan.
577
+ Usually when a node wants to create a new channel
578
+
579
+ Capacity: 1.80 Msat.
580
+ 600
581
+ Capacity: 2.40 Msat.
582
+ Capacity: 3.00 Msat.
583
+ 500
584
+ 400
585
+ 300
586
+ 200
587
+ 100
588
+ 0
589
+ 0.0
590
+ 0.2
591
+ 0.4
592
+ 0.6
593
+ 0.8
594
+ 1.0
595
+ Probability (p)400
596
+ a/b: 1
597
+ a/b: 5
598
+ 350
599
+ a/b: 50
600
+ 300
601
+ 250
602
+ 200
603
+ 150
604
+ 100
605
+ 50
606
+ 0
607
+ 0.0
608
+ 0.2
609
+ 0.4
610
+ 0.6
611
+ 0.8
612
+ 1.0
613
+ Probability (p)6
614
+ Fig. 7. Effect of channel capacity on the expected number of payments,
615
+ according to initial balance ratios
616
+ Fig. 8. For a fixed a = 1.2 Msat, the effect of channel b’s capacity on the
617
+ maximum possible lifespan in any p.
618
+ with another node in the network, the only parameter it has
619
+ control over is the amount of funds it wants to put in the
620
+ channel, not the funds its partner puts in the channel. This
621
+ brings up the question: how will the channel’s lifespan be
622
+ affected with the amount the other node wants to put in the
623
+ channel if our fund stays at a fixed value. Figures (8) and (9)
624
+ illustrate this effect. Fig. 8 shows the maximum achievable
625
+ lifespan considering any p value and how it is affected by
626
+ the fund that the other node commits to the channel. The
627
+ maximum lifespan grows with the initial fund of the other
628
+ edge in a linear fashion. Fig. 9 illustrates the effect of our
629
+ edge capacity if the peer node’s capacity is fixed. Figure
630
+ (9) shows that if p is in favor of payments in the direction
631
+ of our edge (p ≥ 1
632
+ 2), the lifespan increases almost linearly;
633
+ otherwise (p < 1
634
+ 2), the other edge becomes the bottleneck
635
+ and the fund we put towards the channel will have little
636
+ to no effect on the expected lifespan of the channel. If the
637
+ funds we put towards the channel do not have an effect on
638
+ the channel’s lifespan, we have wasted cost opportunities.
639
+ 6
640
+ IMPLEMENTATION AND EVALUATION
641
+ We provided a simulation proof of concept on a constructed
642
+ Lightning Network to show the accuracy of the model
643
+ discussed in Section 5. In this section we describe our
644
+ methodology for creating data and calculating accuracy of
645
+ Fig. 9. Having a fixed initial balance from peer node (b) analyzing the
646
+ effect of our initial balance fund (a), according to different payment
647
+ direction probabilities (p).
648
+ our model. We later analyze the results to see under which
649
+ conditions the model performs better.
650
+ 6.1
651
+ Methodology
652
+ The testing pipeline shown in Fig. 10 uses the following
653
+ modules:
654
+ 6.1.1
655
+ Network Generator
656
+ For each test, a random network was generated using Net-
657
+ workX’s [23] gnp random graph with the number of nodes
658
+ being 50 and the channel existence probability being 20%
659
+ (245 edges on average).
660
+ 6.1.2
661
+ Mrates Generator
662
+ As discussed in previous sections the Mrates matrix holds
663
+ the rates in which each two nodes send payments to one
664
+ another. The Mrates generator takes two main parameters:
665
+ SC and SK. SC determines the sparseness of the Mrates
666
+ matrix and SK determines the matrix skewness in relation to
667
+ its main diagonal. Per each test, a new matrix is generated.
668
+ In table (1) the sparse coefficient and the skew were changed
669
+ to test how the model will perform in each scenario.
670
+ 6.1.3
671
+ Lifespan Predictor
672
+ The lifespan predictor takes the network and the Mrates
673
+ matrix and using the model discussed in 5 gives the ex-
674
+ pected time for each channel to become unbalanced.
675
+ 6.1.4
676
+ Payment Generator
677
+ Payment generator creates random payments in CLoTH
678
+ simulator’s input format [19]. These payments follow the
679
+ Mrates generator values on average.
680
+ 6.1.5
681
+ Simulator
682
+ We used a modified version of the CLoTH simulator [19].
683
+ We modified CLoTH such that the simulator logs the un-
684
+ balancing of channels and chooses paths randomly in cases
685
+ where more than one shortest path exists.
686
+ The payment generator and simulator run 100 iterations
687
+ per test.
688
+
689
+ 10000
690
+ a/b: 1
691
+ f Payments
692
+ a/b: 5
693
+ a/b: 50
694
+ 8000
695
+ 6000
696
+ 4000
697
+ 2000
698
+ 0
699
+ 0.0
700
+ 0.2
701
+ 0.4
702
+ 0.6
703
+ 0.8
704
+ 1.0
705
+ 1.2
706
+ Capacity (sat.)
707
+ 1e7Maximum Expected Number of Payments
708
+ 5000
709
+ 4000
710
+ 3000
711
+ 2000
712
+ 1000
713
+ 0
714
+ 0.0
715
+ 0.2
716
+ 0.4
717
+ 0.6
718
+ 0.8
719
+ 1.0
720
+ 1.2
721
+ Other Edge Capacity (sat.)
722
+ 1e7800
723
+ p: 0.40
724
+ p: 0.45
725
+ 700
726
+ p: 0.50
727
+ 600
728
+ p: 0.55
729
+ p: 0.60
730
+ 500
731
+ 400
732
+ 300
733
+ 200
734
+ 100
735
+ 0
736
+ 0.5
737
+ 1.0
738
+ 1.5
739
+ 2.0
740
+ 2.5
741
+ Edge Capacity (sat.)
742
+ 1e67
743
+ Fig. 10. Model evaluation pipeline.
744
+ TABLE 1
745
+ error of prediction and real lifetime
746
+ SK
747
+ 1
748
+ 4
749
+ 6
750
+ 10
751
+ 0.9
752
+ 0.15
753
+ 0.10
754
+ 0.09
755
+ 0.10
756
+ SC
757
+ 0.5
758
+ 0.11
759
+ 0.10
760
+ 0.08
761
+ 0.07
762
+ 0.3
763
+ 0.09
764
+ 0.07
765
+ 0.05
766
+ 0.06
767
+ 0
768
+ 0.11
769
+ 0.07
770
+ 0.07
771
+ 0.07
772
+ 6.1.6
773
+ Lifespan Calculator
774
+ This module aggregates the results of 100 iterations of the
775
+ previous step and calculates the average lifespan and its
776
+ error. This data will be used to determine the accuracy of
777
+ the model.
778
+ 6.1.7
779
+ Model Evaluation
780
+ The error of each channel is calculated as |real−prediction|
781
+ real
782
+ .
783
+ Because some channels are positioned in a way that almost
784
+ no payments pass through them, only after a long while that
785
+ most channels are unbalanced, some payments pass through
786
+ them, we count these channels as abnormalities and do not
787
+ consider them in the error calculations. These are usually
788
+ the channels that are estimated to have a very long lifespan.
789
+ The means of calculated errors are given in Table (1)
790
+ considering different SC and SK values.
791
+ As we see, better results are obtained with smaller SCs
792
+ (meaning a busier Lightning Network). It is also notable that
793
+ SK value has little to no effect on the model performance.
794
+ This means that the model performs well in either case that
795
+ p is close to 0.5 and p is far from 0.5.
796
+ 7
797
+ LIGHTNING NETWORK ANALYSIS
798
+ In this section we will provide an analysis on channel
799
+ lifespans of a recent snapshot of the Lightning Network.
800
+ The simulation is constituted by nodes and channels taken
801
+ from a snapshot of the Lightning Network Mainnet [24] on
802
+ Feb 2019.
803
+ In Section 5, we proposed a model for a payment channel
804
+ using a random walk and we derived a formula to predict
805
+ expected channel lifespans. Moreover, the expected lifespan
806
+ of a payment channel can be found if the rate of payments
807
+ are known by using 2. Lemma 3 shows that if we have the
808
+ same rate for every pair of nodes, the probability of going
809
+ to each side is equal to 0.5.
810
+ Because payment rates and channel balances usually are
811
+ not public in the Lightning Network, we have to make
812
+ assumptions on the distribution, the amount of payments,
813
+ and channel balances. We assume that all payment rates
814
+ have the same value r, which means that the rates matrix
815
+ (MRates) is symmetric. Thus according to Lemma 3, p = 1
816
+ 2
817
+ for every channel in the network. According to 11 the
818
+ expected number of payments is equal to a × b, where
819
+ a = ⌊ FA
820
+ ω ⌋ and b = ⌊ FB
821
+ ω ⌋ for a bidirectional channel between
822
+ A and B. We assume that all channels are initially balanced,
823
+ meaning a = b = C
824
+ 2ω , where C is the channel’s capacity.
825
+ According to previous results in Section 5 (equations (1)
826
+ and (4)) we have:
827
+ λpayment = (
828
+
829
+ s,t∈V
830
+ s̸=t
831
+ σ(s, t|edge(a, b))
832
+ σ(s, t)
833
+ + σ(s, t|edge(b, a))
834
+ σ(s, t)
835
+ )r
836
+ (6)
837
+ We also know that �
838
+ s,t∈V
839
+ s̸=t
840
+ σ(s,t|edge(a,b))
841
+ σ(s,t)
842
+ is equal to the
843
+ edge betweenness centrality of edge(a, b) (EBC(a, b)) in
844
+ directed graph G [25].
845
+ Because all channels are bidirectional: ∀edge(j, i) −→
846
+ ∃edge(i, j), thus ∀s, t ∈ V :
847
+ σ(s, t|edge(a, b))
848
+ σ(s, t)
849
+ = σ(t, s|edge(b, a))
850
+ σ(t, s)
851
+ .
852
+ (7)
853
+ Assuming G
854
+ ′ as an undirected graph that is derived
855
+ from G we have:
856
+ EBCG(a, b) = EBCG′ (a, b),
857
+ (8)
858
+ thus
859
+ λpayment = 2 × EBCG′ (a, b) × r.
860
+ (9)
861
+ If we put all results in (2), we have:
862
+ Etime =
863
+ ( C
864
+ ω )2
865
+ 4 × 2 × EBCG′ (a, b) × r
866
+ (10)
867
+ In what follows, we first calculate all payment channels’
868
+ lifespans in the LN snapshot using equation (10). Then we
869
+ focus on the relation between edge betweenness centrality
870
+ and lifespan of the channels.
871
+ 7.1
872
+ Distribution of Channels Effective Lifespan
873
+ Equation (10) shows that the lifespan of a channel can be
874
+ calculated based on its edge betweenness centrality and
875
+ initial fund. We assume that r = 0.0022 transactions per day
876
+ [26] and ω = 60000 sat [22]. The distribution of channels
877
+ lifespans in our snapshot is shown in Fig. 11. Much like the
878
+ distribution of channel capacities that resemble the Power
879
+ Law distribution, Fig. 11 shows that there are a lot of
880
+ channels with a low lifespan and very few channels with
881
+ a very high lifespan.
882
+ According to Seres et.al. [20] the most effective channels
883
+ are the channels with the highest betweenness centrality.
884
+ This paper suggests that the top 14% of the channels have
885
+ the most significant effect on the network’s performance.
886
+ Table (2) gives average, standard deviation, and median,
887
+ for all channels in the network and the top 14% central
888
+ channels.
889
+
890
+ network generation
891
+ MRates generation
892
+ payment generation
893
+ loop for 100 run
894
+ lifespan prediction
895
+ simulation
896
+ lifespan calculation
897
+ model evaluation8
898
+ Fig. 11. Histogram of expected lifespan for the LN snapshot in Feb 2019.
899
+ TABLE 2
900
+ Lifespan statistics of the LN snapshot (day).
901
+ All Channels
902
+ Central Channels
903
+ average
904
+ 1833.2
905
+ 172.3
906
+ STD
907
+ 7086.9
908
+ 587.2
909
+ median
910
+ 27.0
911
+ 1.6
912
+ 7.2
913
+ Betweenness-Lifespan Correlation
914
+ As Seres et.al. [20] suggests, the most central channels have
915
+ the most impact on the network. As Fig. 12 shows, more
916
+ central channels have a shorter lifespan because they route
917
+ more payments per unit of time. In Fig. 12 we took batches
918
+ of the most central edges and calculated the average cen-
919
+ trality and the average lifespan per batch. The result shows
920
+ that in general the more central a channel is, the sooner it
921
+ will get unbalanced. We see an exception to this statement
922
+ in the middle of the plot, where betweenness has a positive
923
+ correlation with the average lifespan. This is due to the fact
924
+ that some very central edges have a large capacity so they
925
+ can route more payment considering that lifespan increases
926
+ with capacity quadratically.
927
+ In Section 7 A we showed that channels with larger
928
+ edge betweenness centrality values have a higher impact
929
+ on the performance of the network. In this section, we have
930
+ shown these central channels will have shorter lifespans.
931
+ Therefore, the network success rate will decrease quickly
932
+ Fig. 12. The relation between expected lifespan and betweenness cen-
933
+ trality of channels in the LN snapshot.
934
+ due to unbalancing.
935
+ 8
936
+ CONCLUSION
937
+ In this paper we modeled payment channel liquidity with
938
+ a random walk to estimate how long it takes for a channel
939
+ to become unbalanced and the effect of being unbalanced
940
+ on a channel’s probability of successful routing. We also
941
+ analyzed how unbalanced channels degrade the network’s
942
+ performance, and the relation between a channel’s centrality
943
+ and its lifespan. We showed that the network’s success
944
+ probability is sensitive to the channels’ unbalancing.
945
+ We also introduced a method to estimate the lifespan
946
+ of a channel in a payment network which can be used for
947
+ determining a good placement in the network. We provided
948
+ a proof of concept for our model and showed the results are
949
+ 95% accurate.
950
+ This work shows that just allocating more funds towards
951
+ a channel does not lead to having a more successful channel.
952
+ The results show the channel’s success in the network
953
+ depends greatly on the network topology, transaction flow,
954
+ and the amount of funds the peer node puts in the channel.
955
+ We suggested the amount a node should invest in a
956
+ channel to get the longest channel lifespan and maximize its
957
+ return on investment. These results show that a misplaced
958
+ channel can have a very short lifespan and lose up to 40%
959
+ of its efficiency, so nodes could potentially create a market
960
+ based on these criteria to sell each other good connections
961
+ in the network.
962
+ APPENDIX A
963
+ PROOFS
964
+ A.1
965
+ Lemma 1. The expected number of steps to reach
966
+ +a or −b for the first time starting from zero is
967
+ Esteps =
968
+ � apa(pb−qb)+bqb(qa−pa)
969
+ (p−q)(pa+b−qa+b)
970
+ p ̸= 1/2
971
+ ab
972
+ p = 1/2
973
+ (11)
974
+ Consider Sx as the expected number of steps to reach +a or
975
+ −b for the first time starting from x. Let p be the probability
976
+ of going to the positive direction and q the probability of
977
+ going in the negative direction (p + q = 1). Then we can say
978
+ that if the Random Walk starts from x, he will go to x + 1
979
+ with probability of p and x − 1 with probability of q. so we
980
+ can infer this recurrence equation: sx = 1 + qsx−1 + psx+1
981
+ where sx is the expected number of steps until reaching the
982
+ end point starting from point x. For the boundary conditions
983
+ we have: sa = s−b = 0 implying that the expected number
984
+ of steps needed to reach +a or −b starting from +a or −b is
985
+ zero.
986
+ so:
987
+ sx = 1
988
+ psx−1 − q
989
+ psx−2 − 1
990
+ p
991
+ (12)
992
+ The characteristic equation of (12) is:
993
+ (z2 − 1
994
+ pz + q
995
+ p)(z − 1) = 0
996
+ (13)
997
+
998
+ 104
999
+ 103
1000
+ Count
1001
+ 102
1002
+ 101
1003
+ 100
1004
+ 0
1005
+ 25000
1006
+ 50000
1007
+ 75000100000125000150000175000
1008
+ Lifespan (day)1750
1009
+ 1500
1010
+ 1250
1011
+ 1000
1012
+ 750
1013
+ 500
1014
+ 250
1015
+ 0
1016
+ 5000
1017
+ 10000
1018
+ 15000
1019
+ 20000
1020
+ Average Edge Betweenness Centrality of Batch9
1021
+ if p = q = 1/2 we have ∆ = 0 therefore z1 = z2 = z3 =
1022
+ 1 so the expected number of steps needed to reach +a or −b
1023
+ starting from x is:
1024
+ sx = (a − x)(b − x)
1025
+ (14)
1026
+ if p ̸= 1/2 we have
1027
+
1028
+ ∆ = | 1−2p
1029
+ p
1030
+ | therefore z1 = z2 =
1031
+ 1, z3 = q
1032
+ p and for the number of steps we have:
1033
+ sx =
1034
+ apa+b + bqa+b
1035
+ (2p − 1)(pa+b − qa+b) +
1036
+ 1
1037
+ 1 − 2p x+
1038
+ (a + b)paqb
1039
+ (2p − 1)(qa+b − pa+b) ( q
1040
+ p )x
1041
+ (15)
1042
+ we take x = 0 as this gives the expected number of steps to
1043
+ reach +a or −b starting from zero. so we have:
1044
+ S0 =
1045
+ � apa(pb−qb)+bqb(qa−pa)
1046
+ (p−q)(pa+b−qa+b)
1047
+ p ̸= 1/2
1048
+ ab
1049
+ p = 1/2
1050
+ (16)
1051
+ A.2
1052
+ Lemma 2. p
1053
+ q = λ(A,B)
1054
+ λ(B,A)
1055
+ In assumptions of Section 5 it is assumed that each node
1056
+ sends its payments to other nodes with a Poisson distri-
1057
+ bution. The parameter of the distribution for edge(a, b) is
1058
+ λ(a, b), which is the payment rate between nodes a and b.
1059
+ Assume the random variable of payments from a to b as X
1060
+ and the random variable of payments from b to a as Y .Thus
1061
+ we have:
1062
+ P(X = n) = e−λ(A,B)(λ(A, B))n
1063
+ n!
1064
+ (17)
1065
+ The total payment rate in each channel is the sum of rates of
1066
+ its two edges. It is known that the distribution of a random
1067
+ variable which is the sum of two random variables with a
1068
+ Poisson process is a Poisson process; the rate of this process
1069
+ equals the sum of rates.
1070
+ When we have a payment from two Poisson distribu-
1071
+ tions sending payments to the same channel; The probabil-
1072
+ ity for the payment to be a payment from node a to node b
1073
+ (p) is:
1074
+ p = P(X = 1|X + Y = 1) =
1075
+ e−λx(λx)1
1076
+ 1!
1077
+ × e−λy (λy)0
1078
+ 0!
1079
+ e−(λx+λy)(λx+λy)1
1080
+ 1!
1081
+ (18)
1082
+ Thus:
1083
+ p =
1084
+ λx
1085
+ λx + λy
1086
+ =
1087
+ λ(a, b)
1088
+ λ(a, b) + λ(b, a)
1089
+ (19)
1090
+ A.3
1091
+ Lemma 3. If ∀s, t ∈ V : MRatesst = MRatests then
1092
+ p = 0.5.
1093
+ We know from lemma 2 that: p
1094
+ q = λ(a,b)
1095
+ λ(b,a) so we have:
1096
+ p
1097
+ q =
1098
+ � σ(s,t|edge(a,b))
1099
+ σ(s,t)
1100
+ MRatesst
1101
+ � σ(t,s|edge(b,a))
1102
+ σ(t,s)
1103
+ MRatests
1104
+ (20)
1105
+ Because
1106
+ all
1107
+ channels
1108
+ are
1109
+ bidirectional(∀edge(a, b)
1110
+ :
1111
+ ∃edge(b, a)) we have ∀s, t ∈ V :
1112
+ σ(s, t|edge(a, b))
1113
+ σ(s, t)
1114
+ = σ(t, s|edge(b, a))
1115
+ σ(t, s)
1116
+ (21)
1117
+ In the other hand if we have ∀s, t ∈ V : MRatesst =
1118
+ MRatests, we can say:
1119
+ σ(s, t|edge(a, b))
1120
+ σ(s, t)
1121
+ ×MRatesst = σ(T, S|edge(b, a))
1122
+ σ(t, s)
1123
+ ×MRatests (22)
1124
+ then finally we have:
1125
+ λ(a, b) = λ(b, a)
1126
+ (23)
1127
+ so
1128
+ p = 1
1129
+ 2
1130
+ (24)
1131
+ REFERENCES
1132
+ [1]
1133
+ S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,”
1134
+ Decentralized Business Review, p. 21260, 2008.
1135
+ [2]
1136
+ A. Chauhan, O. P. Malviya, M. Verma, and T. S. Mor, “Blockchain
1137
+ and scalability,” in 2018 IEEE International Conference on Software
1138
+ Quality, Reliability and Security Companion (QRS-C).
1139
+ IEEE, 2018,
1140
+ pp. 122–128.
1141
+ [3]
1142
+ G.
1143
+ Karame,
1144
+ “On
1145
+ the
1146
+ security
1147
+ and
1148
+ scalability
1149
+ of
1150
+ bitcoin’s
1151
+ blockchain,” in Proceedings of the 2016 ACM SIGSAC conference on
1152
+ computer and communications security, 2016, pp. 1861–1862.
1153
+ [4]
1154
+ J. Poon and T. Dryja, “The bitcoin lightning network: Scalable off-
1155
+ chain instant payments,” 2016.
1156
+ [5]
1157
+ Z. Avarikioti, L. Heimbach, Y. Wang, and R. Wattenhofer, “Ride the
1158
+ lightning: The game theory of payment channels,” in International
1159
+ Conference on Financial Cryptography and Data Security.
1160
+ Springer,
1161
+ 2020, pp. 264–283.
1162
+ [6]
1163
+ G. O. Karame, E. Androulaki, and S. Capkun, “Double-spending
1164
+ fast payments in bitcoin,” in Proceedings of the 2012 ACM conference
1165
+ on Computer and communications security, 2012, pp. 906–917.
1166
+ [7]
1167
+ Q. Zhou, H. Huang, Z. Zheng, and J. Bian, “Solutions to scalability
1168
+ of blockchain: A survey,” Ieee Access, vol. 8, pp. 16 440–16 455, 2020.
1169
+ [8]
1170
+ B. David, P. Gaˇzi, A. Kiayias, and A. Russell, “Ouroboros
1171
+ praos: An adaptively-secure, semi-synchronous proof-of-stake
1172
+ blockchain,” in Annual International Conference on the Theory and
1173
+ Applications of Cryptographic Techniques.
1174
+ Springer, 2018, pp. 66–98.
1175
+ [9]
1176
+ I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, “{Bitcoin-
1177
+ NG}: A scalable blockchain protocol,” in 13th USENIX symposium
1178
+ on networked systems design and implementation (NSDI 16), 2016, pp.
1179
+ 45–59.
1180
+ [10] J. Poon and T. Dryja, “The bitcoin lightning network: scal-
1181
+ able off-chain instant payments (2016),” URl: https://lightning.
1182
+ network/lightningnetwork-paper. pdf (visited on 2016-04-19), 2016.
1183
+ [11] R. Khalil and A. Gervais, “Revive: Rebalancing off-blockchain pay-
1184
+ ment networks,” in Proceedings of the 2017 ACM SIGSAC Conference
1185
+ on Computer and Communications Security, 2017, pp. 439–453.
1186
+ [12] M. Conoscenti, A. Vetro, and J. C. De Martin, “Hubs, rebalancing
1187
+ and service providers in the lightning network,” Ieee Access, vol. 7,
1188
+ pp. 132 828–132 840, 2019.
1189
+ [13] R. Pickhardt and M. Nowostawski, “Imbalance measure and
1190
+ proactive channel rebalancing algorithm for the lightning net-
1191
+ work,” in 2020 IEEE International Conference on Blockchain and
1192
+ Cryptocurrency (ICBC).
1193
+ IEEE, 2020, pp. 1–5.
1194
+ [14] S. Tikhomirov, R. Pickhardt, A. Biryukov, and M. Nowostawski,
1195
+ “Probing channel balances in the lightning network,” arXiv
1196
+ preprint arXiv:2004.00333, 2020.
1197
+ [15] J. Herrera-Joancomart´ı, G. Navarro-Arribas, A. Ranchal-Pedrosa,
1198
+ C. P´erez-Sol`a, and J. Garcia-Alfaro, “On the difficulty of hiding the
1199
+ balance of lightning network channels,” in Proceedings of the 2019
1200
+ ACM Asia Conference on Computer and Communications Security,
1201
+ 2019, pp. 602–612.
1202
+ [16] G. Kappos, H. Yousaf, A. Piotrowska, S. Kanjalkar, S. Delgado-
1203
+ Segura, A. Miller, and S. Meiklejohn, “An empirical analysis of
1204
+ privacy in the lightning network,” in International Conference on
1205
+ Financial Cryptography and Data Security.
1206
+ Springer, 2021, pp. 167–
1207
+ 186.
1208
+ [17] S. Rahimpour and M. Khabbazian, “Hashcashed reputation with
1209
+ application in designing watchtowers,” in 2021 IEEE International
1210
+ Conference on Blockchain and Cryptocurrency (ICBC).
1211
+ IEEE, 2021,
1212
+ pp. 1–9.
1213
+ [18] S. Brˆanzei, E. Segal-Halevi, and A. Zohar, “How to charge light-
1214
+ ning,” arXiv preprint arXiv:1712.10222, 2017.
1215
+ [19] M. Conoscenti, A. Vetr`o, J. C. De Martin, and F. Spini, “The cloth
1216
+ simulator for htlc payment networks with introductory lightning
1217
+ network performance results,” Information, vol. 9, no. 9, p. 223,
1218
+ 2018.
1219
+
1220
+ 10
1221
+ [20] I. A. Seres, L. Guly´as, D. A. Nagy, and P. Burcsi, “Topological
1222
+ analysis of bitcoin’s lightning network,” in Mathematical Research
1223
+ for Blockchain Economy.
1224
+ Springer, 2020, pp. 1–12.
1225
+ [21] J. L. Hodges and L. Le Cam, “The poisson approximation to
1226
+ the poisson binomial distribution,” The Annals of Mathematical
1227
+ Statistics, vol. 31, no. 3, pp. 737–740, 1960.
1228
+ [22] F. B´eres, I. A. Seres, and A. A. Bencz´ur, “A cryptoeconomic
1229
+ traffic analysis of bitcoin’s lightning network,” arXiv preprint
1230
+ arXiv:1911.09432, 2019.
1231
+ [23] A. A. Hagberg, D. A. Schult, and P. J. Swart, “Exploring network
1232
+ structure, dynamics, and function using networkx,” in Proceedings
1233
+ of the 7th Python in Science Conference, G. Varoquaux, T. Vaught,
1234
+ and J. Millman, Eds., Pasadena, CA USA, 2008, pp. 11 – 15.
1235
+ [24] E. Rohrer, J. Malliaris, and F. Tschorsch, “Discharged pay-
1236
+ ment channels: Quantifying the lightning network’s resilience to
1237
+ topology-based attacks,” in SandB ’19: Proceedings of IEEE Security
1238
+ & Privacy on the Blockchain, jun 2019.
1239
+ [25] U. Brandes, “On variants of shortest-path betweenness centrality
1240
+ and their generic computation,” Social Networks, vol. 30, no. 2, pp.
1241
+ 136–145, 2008.
1242
+ [26] A.
1243
+ Research,
1244
+ “The
1245
+ growth
1246
+ of
1247
+ the
1248
+ Lightning
1249
+ Network,”
1250
+ https://www.research.arcane.no/blog/
1251
+ the-growth-of-the-lightning-network,
1252
+ 2021,
1253
+ [Online;
1254
+ accessed
1255
+ 11-Nov-2021].
1256
+ Soheil Zibakhsh Shabgahi received his bach-
1257
+ elor’s degree in Computer Engineering from
1258
+ the Department of Electrical and Computer En-
1259
+ gineering, University of Tehran, Tehran, Iran.
1260
+ He is currently a research assistant at the
1261
+ Data lab under the supervision of professor
1262
+ Behnam Bahrak. His research interest are in
1263
+ blockchain systems, Theoretical Computer Sci-
1264
+ ence,distributed systems, and Machine Learn-
1265
+ ing.
1266
+ Seyed Mahdi Hosseini is currently an under-
1267
+ graduate student majoring in computer engi-
1268
+ neering at the School of Electrical and Computer
1269
+ Engineering at the College of Engineering of
1270
+ the University of Tehran. His research interest
1271
+ consists of blockchain, system networks, and
1272
+ distributed systems.
1273
+ Seyed
1274
+ Pooya
1275
+ Shariatpanahi
1276
+ received
1277
+ the
1278
+ B.Sc., M.Sc., and Ph.D. degrees from the De-
1279
+ partment of Electrical Engineering, Sharif Uni-
1280
+ versity of Technology, Tehran, Iran, in 2006,
1281
+ 2008, and 2013, respectively. He is currently an
1282
+ Assistant Professor with the School of Electri-
1283
+ cal and Computer Engineering, College of En-
1284
+ gineering, University of Tehran. Before joining
1285
+ the University of Tehran, he was a Researcher
1286
+ with the Institute for Research in Fundamental
1287
+ Sciences (IPM), Tehran. His research interests
1288
+ include information theory, network science, wireless communications,
1289
+ and complex systems. He was a recipient of the Gold Medal at the
1290
+ National Physics Olympiad in 2001.
1291
+ Behnam Bahrak received his bachelor’s and
1292
+ master’s degrees, both in electrical engineering,
1293
+ from Sharif University of Technology, Tehran,
1294
+ Iran, in 2006 and 2008, respectively. He received
1295
+ the Ph.D. degree from the Bradley Department
1296
+ of Electrical and Computer Engineering at Vir-
1297
+ ginia Tech in 2013. He is currently an Assistant
1298
+ Professor of Electrical and Computer Engineer-
1299
+ ing at University of Tehran.
1300
+
-9AzT4oBgHgl3EQfS_sw/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-NFRT4oBgHgl3EQfrTfI/content/2301.13620v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f1eb788ed1d4a94b94ad0e52b7de3a40ec3f66db7c5a2e6513bccde277a71ecc
3
+ size 499623
-NFRT4oBgHgl3EQfrTfI/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:86e6314c6a7645435b9a78be1c2c4313e9504687509edf988d0410800532bf15
3
+ size 2949165
-NFRT4oBgHgl3EQfrTfI/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1dcee74ca34fbcadac43c0bfddd73109bda7f467c1a69a69ca5e95ec0ae38ba0
3
+ size 112180
.gitattributes CHANGED
@@ -8130,3 +8130,75 @@ jNAzT4oBgHgl3EQf4_5S/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
8130
  d9E0T4oBgHgl3EQfoQG6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8131
  ftFKT4oBgHgl3EQfsy6o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8132
  0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
8130
  d9E0T4oBgHgl3EQfoQG6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8131
  ftFKT4oBgHgl3EQfsy6o/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8132
  0dAzT4oBgHgl3EQftv1g/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8133
+ 3dE1T4oBgHgl3EQf5wXA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8134
+ VNFLT4oBgHgl3EQfRy9S/content/2301.12038v1.pdf filter=lfs diff=lfs merge=lfs -text
8135
+ ZtE3T4oBgHgl3EQfcwpV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8136
+ itE5T4oBgHgl3EQfFw7r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8137
+ itE5T4oBgHgl3EQfFw7r/content/2301.05426v1.pdf filter=lfs diff=lfs merge=lfs -text
8138
+ _tE1T4oBgHgl3EQf8wWT/content/2301.03549v1.pdf filter=lfs diff=lfs merge=lfs -text
8139
+ jdFQT4oBgHgl3EQfljZQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8140
+ e9AzT4oBgHgl3EQf3v7A/content/2301.01835v1.pdf filter=lfs diff=lfs merge=lfs -text
8141
+ 19AzT4oBgHgl3EQf8_5O/content/2301.01912v1.pdf filter=lfs diff=lfs merge=lfs -text
8142
+ ONE1T4oBgHgl3EQfZwTX/content/2301.03155v1.pdf filter=lfs diff=lfs merge=lfs -text
8143
+ d9E3T4oBgHgl3EQfHAlE/content/2301.04319v1.pdf filter=lfs diff=lfs merge=lfs -text
8144
+ MNFAT4oBgHgl3EQfxB7a/content/2301.08685v1.pdf filter=lfs diff=lfs merge=lfs -text
8145
+ INE3T4oBgHgl3EQfugsS/content/2301.04684v1.pdf filter=lfs diff=lfs merge=lfs -text
8146
+ ftFKT4oBgHgl3EQfsy6o/content/2301.11884v1.pdf filter=lfs diff=lfs merge=lfs -text
8147
+ itAyT4oBgHgl3EQfxvny/content/2301.00674v1.pdf filter=lfs diff=lfs merge=lfs -text
8148
+ 1NFPT4oBgHgl3EQfUTQQ/content/2301.13056v1.pdf filter=lfs diff=lfs merge=lfs -text
8149
+ jtE1T4oBgHgl3EQfNQOV/content/2301.03000v1.pdf filter=lfs diff=lfs merge=lfs -text
8150
+ Q9AzT4oBgHgl3EQfW_zX/content/2301.01312v1.pdf filter=lfs diff=lfs merge=lfs -text
8151
+ zNAzT4oBgHgl3EQfePy_/content/2301.01434v1.pdf filter=lfs diff=lfs merge=lfs -text
8152
+ QtAyT4oBgHgl3EQf7vqM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8153
+ tdE_T4oBgHgl3EQf9Ryh/content/2301.08380v1.pdf filter=lfs diff=lfs merge=lfs -text
8154
+ WtE1T4oBgHgl3EQfJAP_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8155
+ pdAzT4oBgHgl3EQfAfrM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8156
+ jdFQT4oBgHgl3EQfljZQ/content/2301.13362v1.pdf filter=lfs diff=lfs merge=lfs -text
8157
+ d9E3T4oBgHgl3EQfHAlE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8158
+ VtE2T4oBgHgl3EQfXwe7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8159
+ xNE3T4oBgHgl3EQflgpH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8160
+ 1NFPT4oBgHgl3EQfUTQQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8161
+ lNFAT4oBgHgl3EQfbh0y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8162
+ l9E0T4oBgHgl3EQfZACI/content/2301.02315v1.pdf filter=lfs diff=lfs merge=lfs -text
8163
+ jdFJT4oBgHgl3EQfXixy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8164
+ I9E1T4oBgHgl3EQfGAMz/content/2301.02908v1.pdf filter=lfs diff=lfs merge=lfs -text
8165
+ jdFJT4oBgHgl3EQfXixy/content/2301.11522v1.pdf filter=lfs diff=lfs merge=lfs -text
8166
+ -NFRT4oBgHgl3EQfrTfI/content/2301.13620v1.pdf filter=lfs diff=lfs merge=lfs -text
8167
+ KtE3T4oBgHgl3EQfvgte/content/2301.04694v1.pdf filter=lfs diff=lfs merge=lfs -text
8168
+ 9tE0T4oBgHgl3EQffwDm/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8169
+ xNE3T4oBgHgl3EQflgpH/content/2301.04607v1.pdf filter=lfs diff=lfs merge=lfs -text
8170
+ kdAzT4oBgHgl3EQfpv0l/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8171
+ ZtA0T4oBgHgl3EQfF_9p/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8172
+ 59E1T4oBgHgl3EQfTAPi/content/2301.03074v1.pdf filter=lfs diff=lfs merge=lfs -text
8173
+ GdAzT4oBgHgl3EQfHfsT/content/2301.01044v1.pdf filter=lfs diff=lfs merge=lfs -text
8174
+ ZtE3T4oBgHgl3EQfcwpV/content/2301.04528v1.pdf filter=lfs diff=lfs merge=lfs -text
8175
+ MNFAT4oBgHgl3EQfxB7a/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8176
+ JdE0T4oBgHgl3EQfSACX/content/2301.02216v1.pdf filter=lfs diff=lfs merge=lfs -text
8177
+ oNFKT4oBgHgl3EQfFy2H/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8178
+ vtE3T4oBgHgl3EQf-guw/content/2301.04827v1.pdf filter=lfs diff=lfs merge=lfs -text
8179
+ etE1T4oBgHgl3EQfegQF/content/2301.03206v1.pdf filter=lfs diff=lfs merge=lfs -text
8180
+ ddE3T4oBgHgl3EQfGwlg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8181
+ ltFQT4oBgHgl3EQfoDYc/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8182
+ I9E1T4oBgHgl3EQfGAMz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8183
+ YdE5T4oBgHgl3EQfdg8f/content/2301.05611v1.pdf filter=lfs diff=lfs merge=lfs -text
8184
+ l9E0T4oBgHgl3EQfZACI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8185
+ jtE1T4oBgHgl3EQfNQOV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8186
+ tdE_T4oBgHgl3EQf9Ryh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8187
+ KNFOT4oBgHgl3EQfyzQ_/content/2301.12929v1.pdf filter=lfs diff=lfs merge=lfs -text
8188
+ K9E0T4oBgHgl3EQfigH5/content/2301.02448v1.pdf filter=lfs diff=lfs merge=lfs -text
8189
+ K9E0T4oBgHgl3EQfigH5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8190
+ wdE4T4oBgHgl3EQfXgwy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8191
+ LtE0T4oBgHgl3EQfSgD7/content/2301.02225v1.pdf filter=lfs diff=lfs merge=lfs -text
8192
+ -NFRT4oBgHgl3EQfrTfI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8193
+ Q9E3T4oBgHgl3EQfDAmJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8194
+ 8dE4T4oBgHgl3EQf2w3D/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8195
+ Q9AzT4oBgHgl3EQfW_zX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8196
+ idE1T4oBgHgl3EQfNAMs/content/2301.02995v1.pdf filter=lfs diff=lfs merge=lfs -text
8197
+ idE1T4oBgHgl3EQfNAMs/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8198
+ _NFLT4oBgHgl3EQfvy-O/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8199
+ u9FJT4oBgHgl3EQfeiys/content/2301.11553v1.pdf filter=lfs diff=lfs merge=lfs -text
8200
+ vtE3T4oBgHgl3EQf-guw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8201
+ CtAzT4oBgHgl3EQfiP1R/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
8202
+ _NFLT4oBgHgl3EQfvy-O/content/2301.12161v1.pdf filter=lfs diff=lfs merge=lfs -text
8203
+ adE2T4oBgHgl3EQfFAZQ/content/2301.03641v1.pdf filter=lfs diff=lfs merge=lfs -text
8204
+ CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf filter=lfs diff=lfs merge=lfs -text
0NFST4oBgHgl3EQfVTgy/content/tmp_files/2301.13776v1.pdf.txt ADDED
@@ -0,0 +1,1515 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.13776v1 [math.OC] 31 Jan 2023
2
+ REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
3
+ SARAH GIFT AND HUGO J. WOERDEMAN
4
+ Abstract. A real symmetric positive semidefinite matrix polynomial Q(x) with square determinant that
5
+ is not identically zero can be factored as
6
+ Q(x) = G(x)T G(x)
7
+ where G(x) is itself a real square matrix polynomial with degree half that of Q(x). We provide a constructive
8
+ proof of this fact, rooted in finding a skew-symmetric solution to a modified algebraic Riccati equation
9
+ XSX − XR + RT X + P = 0,
10
+ where P, R, S are real n × n matrices with P and S real symmetric.
11
+ Keywords Positive semidefinite matrix polynomial, Algebraic Riccati equation, Matrix factorization
12
+ MSCcodes 47A68 (Primary), 46C20, 15A48, 93B05
13
+ 1. Introduction
14
+ The Fej´er-Riesz factorization was first shown for matrix polynomials by Rosenblatt [19] and Helson [14]. In
15
+ particular, given a matrix polynomial Q(x) = �2m
16
+ i=0 Qixi with Qi Hermitian and Q(x) positive semidefinite
17
+ for all x ∈ R, we can factorize it as
18
+ Q(x) = G(x)∗G(x)
19
+ where G(x) = �m
20
+ i=0 Gixi. In 1964, Gohberg generalized this factorization to certain operator-valued poly-
21
+ nomials [8].
22
+ Later it was further generalized to operator-valued polynomials in general form [20].
23
+ The
24
+ multivariable case has also been studied, e.g. in [17]. For an overview of the work done with the operator-
25
+ valued Fej´er-Riesz theorem, see [5].
26
+ In this paper, we provide a constructive proof of the real analog of the Fej´er-Riesz factorization of matrix-
27
+ valued polynomials.
28
+ In particular, we show that a matrix polynomial Q(x) = �2m
29
+ i=0 Qixi with Qi real
30
+ symmetric, Q(x) positive semidefinite for all x ∈ R, and det(Q(x)) equal to a nonzero square, admits the
31
+ factorization
32
+ Q(x) = G(x)T G(x)
33
+ where G(x) is itself a real square matrix polynomial with degree half that of Q(x). This result was first
34
+ shown by Hanselka and Sinn [13] using methods from projective algebraic geometry and number theory. We
35
+ provide an alternative, linear algebraic proof, inspired by the proof of the Fej´er-Riesz factorization presented
36
+ in Section 2.7 of [1]. That proof in turn, was taken from [6, 12]. For earlier work on factorizations of real
37
+ symmetric matrix polynomials (not necessarily positive semidefinite) see e.g. [18].
38
+ A key part of the Fej´er-Riesz factorization proof we follow requires finding a Hermitian solution to an
39
+ algebraic Riccati equation
40
+ (∗)
41
+ XDX + XA + A∗X − C = 0,
42
+ where D and C are Hermitian. Reducing a factorization problem to solving a Riccati equation is a technique
43
+ that has been used in many other papers as well (see, e.g., [2], [7], [15, Chapter 19] and references therein).
44
+ This technique is useful because Riccati equations have been studied extensively. Early work was done by
45
+ Willems [21] and Coppel [3] in analyzing properties of solutions of continuous algebraic Riccati equations.
46
+ Another key paper was [4] where Riccati equations were used to solve H∞-control problems. For an in depth
47
+ analysis of algebraic Riccati equations, please see the book by Lancaster and Rodman [15].
48
+ Both authors were supported by National Science Foundation grant DMS 2000037 .
49
+ 1
50
+
51
+ 2
52
+ SARAH GIFT AND HUGO J. WOERDEMAN
53
+ For the current real factorization problem, we end up needing to find a real skew-symmetric solution to
54
+ an equation of the form
55
+ (∗∗)
56
+ XSX − XR + RT X + P = 0,
57
+ where P and S are real symmetric. This is not quite an algebraic Riccati equation of the form eq. (∗) and
58
+ thus we call it a modified algebraic Riccati equation. In general, to find a skew-Hermitian solution X, one
59
+ often considers instead iX, which is Hermitian; however, we want real solutions and thus this method is
60
+ not applicable here. Thus we instead follow the same steps presented in [15] for finding a real symmetric
61
+ solution to the real algebraic Riccati equation and amend them to our current situation. This is the topic
62
+ of Section 2, which culminates in giving sufficient conditions for a skew-symmetric solution of our modified
63
+ Riccati equation eq. (∗∗). In Section 3 we provide additional background on matrix polynomials necessary
64
+ for our main result, the real factorization of a symmetric positive semidefinite matrix polynomial, presented
65
+ in Section 4. The major advantage of our proof compared to that by Hanselka and Sinn [13] is that ours is
66
+ constructive. We end this paper with a couple examples illustrating the construction.
67
+ 2. A Modified Algebraic Riccati Equation
68
+ The goal of this section is to provide necessary and sufficient conditions for which there is a real skew-
69
+ symmetric solution X to the modified algebraic Riccati equation
70
+ (1)
71
+ XSX − XR + RT X + P = 0,
72
+ where P, R, S are real n × n matrices with P and S real symmetric. In the book Algebraic Riccati Equations
73
+ [15], Lancaster and Rodman show conditions for which there is a real symmetric solution X to the CARE
74
+ equation
75
+ XDX + XA + AT X − C = 0,
76
+ where A, C, D are real n × n matrices with C and D real symmetric. We amend these results to the present
77
+ situation. Define the 2n × 2n real matrices
78
+ (2)
79
+ Mr =
80
+ �R
81
+ −S
82
+ P
83
+ RT
84
+
85
+ ,
86
+ ˆHr =
87
+ �0
88
+ I
89
+ I
90
+ 0
91
+
92
+ ,
93
+ Hr =
94
+
95
+ P
96
+ RT
97
+ R
98
+ −S
99
+
100
+ .
101
+ Then both ˆHr and Hr are real symmetric. Also
102
+ ˆHrMr = M T
103
+ r ˆHr
104
+ and
105
+ HrMr = M T
106
+ r Hr.
107
+ Using terminology from [15], we say Mr is both Hr-symmetric and ˆHr-symmetric.
108
+ We can now give a
109
+ condition for a real solution of eq. (1) to exist.
110
+ Proposition 2.1. X is a real solution of eq. (1) if and only if
111
+ G(X) := Im
112
+
113
+ I
114
+ X
115
+
116
+ is Mr-invariant.
117
+ Proof. If G(X) is Mr-invariant, then
118
+ (3)
119
+ �R
120
+ −S
121
+ P
122
+ RT
123
+ � � I
124
+ X
125
+
126
+ =
127
+ � I
128
+ X
129
+
130
+ Z
131
+ for some n × n matrix Z. The first block row gives Z = R − SX and the second gives P + RT X = XZ.
132
+ Combining the two gives
133
+ P + RT X = X(R − SX).
134
+ Thus X solves eq. (1). Conversely, if X solves eq. (1), then eq. (3) holds for Z = R − SX and ths G(X) is
135
+ Mr-invariant.
136
+
137
+ More than just a real solution, though, we want a skew-symmetric solution. Thus we next strive to give a
138
+ condition for such a solution. For this we first need a definition (see [15]).
139
+ Definition 2.1. Let H be a real invertible n × n matrix. A subspace M is called
140
+ (1) H-nonnegative if ⟨Hx, x⟩ ≥ 0 for all x ∈ M
141
+ (2) H-nonpositive if ⟨Hx, x⟩ ≤ 0 for all x ∈ M
142
+
143
+ REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
144
+ 3
145
+ (3) H-neutral if ⟨Hx, x⟩ = 0 for all x ∈ M
146
+ Proposition 2.2. Let X be a real solution of eq. (1). Then,
147
+ (1) X is skew-symmetric if and only if G(X) is ˆHr-neutral.
148
+ (2) G(X) is Hr-nonpositive if and only if (XT + X)(R − SX) ≤ 0.
149
+ Proof.
150
+ (1) Assume X is skew-symmetric. Let y ∈ G(X), so y =
151
+ � I
152
+ X
153
+
154
+ z for some z ∈ Rn. Then
155
+ ⟨Hry, y⟩ = zT �I
156
+ XT � ˆHr
157
+ � I
158
+ X
159
+
160
+ z = zT (X + XT )z = 0.
161
+ Thus G(X) is ˆHr-neutral. On the other hand, suppose G(X) is ˆHr-neutral. Then for all z ∈ Rn,
162
+ zT(X + XT )z = 0, so X + XT = 0. Thus X is skew-symmetric.
163
+ (2) G(X) is Hr-nonpositive if and only if for all z ∈ Rn,
164
+
165
+ Hr
166
+
167
+ I
168
+ X
169
+
170
+ z,
171
+
172
+ I
173
+ X
174
+
175
+ z
176
+
177
+ ≤ 0
178
+ zT �I
179
+ XT � �P
180
+ RT
181
+ R
182
+ −S
183
+ � � I
184
+ X
185
+
186
+ z ≤ 0
187
+ zT[P + RT X + XT R − XT SX]z ≤ 0
188
+ zT [XR − XSX + XT R − XT SX]z ≤ 0
189
+ by eq. (1)
190
+ zT (XT + X)(R − SX)z ≤ 0
191
+ Thus G(X) is Hr-nonpositive if and only if (XT + X)(R − SX) ≤ 0.
192
+
193
+ proposition 2.2 shows that in order to get a real skew-symmetric solution X to the equation eq. (1), we need
194
+ an ˆHr-neutral subspace G(X) of dimension n. We consider now conditions for such a subspace to exist. For
195
+ this we first state a few known results (see [15]).
196
+ Definition 2.2. Let A be a square matrix and λi be an eigenvalue of A. We call the sizes of the Jordan
197
+ blocks of λi the partial multiplicities of λi.
198
+ Theorem 2.1. [15, Part of Theorem 2.6.3]
199
+ Let A be a real n × n H-symmetric matrix and the partial
200
+ multiplicities of A corresponding to the real eigenvalues are all even. Then there exists an A-invariant H-
201
+ neutral subspace of dimension k − p where k is the number of positive eigenvalues of H (counting algebraic
202
+ multiplicities) and p is the number of distinct pairs of non-real complex conjugate eigenvalues of A with odd
203
+ algebraic multiplicity.
204
+ Lemma 2.1. [15, p. 56] Let H be a real symmetric matrix. A real subspace M is H-neutral if and only if
205
+ ⟨Hx, y⟩ = 0 for all x, y ∈ M.
206
+ Proof. This follows from the relation
207
+ ⟨Hx, y⟩ = 1
208
+ 2 (⟨H(x + y), x + y⟩ − ⟨Hx, x⟩ − ⟨Hy, y⟩) .
209
+
210
+ Now we are ready for the new result.
211
+ Lemma 2.2. Let eq. (2) hold with P and S real symmetric. Among the following statements, (iii) =⇒
212
+ (ii) =⇒ (i)
213
+ (i) There exists an n-dimensional Mr-invariant Hr-neutral subspace
214
+ (ii) There exists an n-dimensional Mr-invariant ˆHr-neutral subspace
215
+ (iii) All real eigenvalues of Mr have even partial multiplicities and all imaginary eigenvalues of Mr have
216
+ even algebraic multiplicity.
217
+ If in addition Mr is invertible, then we also have (i) =⇒ (ii).
218
+
219
+ 4
220
+ SARAH GIFT AND HUGO J. WOERDEMAN
221
+ Proof. By theorem 2.1, if every imaginary eigenvalue of Mr has even algebraic multiplicity (i.e. p = 0),
222
+ then an n-dimensional Mr-invariant ˆHr-neutral subspace exists (since ˆHr has n positive and n negative
223
+ eigenvalues so k = n here). Thus (iii) =⇒ (ii). Next, since Hr = ˆ
224
+ HrMr, it follows by lemma 2.1 that (ii)
225
+ implies (i). Finally, if Mr is invertible, ˆ
226
+ Hr = HrM −1
227
+ r
228
+ and thus (i) implies (ii).
229
+
230
+ We need one more result before the main theorem of this section. For this result, we first recall a definition
231
+ (see, e.g., [15]).
232
+ Definition 2.3. Let A ∈ Rn×n and B ∈ Rn×m. The pair (A, B) is said to be controllable if
233
+ rank
234
+ �B
235
+ AB
236
+ A2B
237
+ · · ·
238
+ An−1B�
239
+ = n.
240
+ Lemma 2.3. Assume that S ≥ 0 (positive semidefinite) and the pair (R, S) is controllable. Let L be an
241
+ n-dimensional Mr-invariant Hr-nonnegative subspace of R2n. Then L is a graph subspace, i.e.
242
+ L = Im
243
+ � I
244
+ X
245
+
246
+ for some real n × n matrix X.
247
+ Proof. For L as defined in the statement, write
248
+ L = Im
249
+
250
+ X1
251
+ X2
252
+
253
+ for some real n × n matrices X1 and X2. We shall show that X1 is invertible. First, since L is Mr-invariant,
254
+
255
+ R
256
+ −S
257
+ P
258
+ RT
259
+ � �
260
+ X1
261
+ X2
262
+
263
+ =
264
+
265
+ X1
266
+ X2
267
+
268
+ T
269
+ for some n × n matrix T . Thus,
270
+ RX1 − SX2 = X1T
271
+ (4)
272
+ PX1 + RT X2 = X2T
273
+ (5)
274
+ Next, since L is Hr-nonnegative, we know
275
+ (6)
276
+ �XT
277
+ 1
278
+ XT
279
+ 2
280
+ � �
281
+ P
282
+ RT
283
+ R
284
+ −S
285
+ � �
286
+ X1
287
+ X2
288
+
289
+ = XT
290
+ 1 PX1 + XT
291
+ 1 RT X2 + XT
292
+ 2 RX1 − XT
293
+ 2 SX2
294
+ is positive semidefinite. Let K = ker X1. Since eq. (6) is positive semidefinite, for every x ∈ K,
295
+ 0 ≤ xT XT
296
+ 1 PX1x + xT XT
297
+ 1 RT X2x + xT XT
298
+ 2 RX1x − xT XT
299
+ 2 SX2x = −xT XT
300
+ 2 SX2x.
301
+ Since S ≥ 0, X2x ∈ ker S, so
302
+ X2K ⊂ ker S.
303
+ Then, equation eq. (4) implies
304
+ T K ⊂ K.
305
+ Consequently, equation eq. (5) gives
306
+ RT X2K ⊂ X2K.
307
+ All together, we have
308
+ RT X2K ⊂ ker S.
309
+ By induction, we get
310
+ (RT )rX2K ⊂ ker S,
311
+ r = 0, 1, 2, . . .
312
+ Now for every x ∈ K,
313
+
314
+ 
315
+ S
316
+ SRT
317
+ ...
318
+ S(RT )n−1
319
+
320
+  (X2x) = 0
321
+
322
+ REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
323
+ 5
324
+ Since (R, S) is controllable, we must have X2x = 0. The only n-dimensional vector x for which X1x =
325
+ X2x = 0 is the zero vector (otherwise dim L < n). Thus K = {0} and X1 is invertible. Hence
326
+ L = Im
327
+
328
+ I
329
+ X
330
+
331
+ ,
332
+ where X = X2X−1
333
+ 1
334
+ and so L is a graph subspace.
335
+
336
+ Now we put everything together to get sufficient conditions for a real skew-symmetric solution of eq. (1):
337
+ Theorem 2.2. Let eq. (2) hold with P and S real symmetric. Assume that S ≥ 0 and the pair (R, S) is
338
+ controllable. Then the conditions (i) - (ii) are equivalent and (iii) implies (ii)
339
+ (i) The equation eq. (1) has a real skew-symmetric solution.
340
+ (ii) There exists an n-dimensional Mr-invariant ˆ
341
+ Hr-neutral subspace.
342
+ (iii) All real eigenvalues of Mr have even partial multiplicities and all imaginary eigenvalues of Mr have
343
+ even algebraic multiplicity.
344
+ Proof. The (iii) =⇒ (ii) was part of lemma 2.2. By proposition 2.1 and proposition 2.2, we know that
345
+ if X is a real skew-symmetric solution to eq. (1), then G(X) is an n-dimensional Mr-invariant ˆHr-neutral
346
+ subspace.
347
+ Thus (i)
348
+ =⇒
349
+ (ii).
350
+ Finally, assume there exists an n-dimensional Mr-invariant ˆHr-neutral
351
+ subspace, say L. Since Hr = ˆHrMr, L is also an n-dimensional Mr-invariant Hr-neutral subspace. Clearly
352
+ L is an Hr-nonnegative subspace, so by lemma 2.3, L is a graph subspace. Since L = G(X) is Mr-invariant,
353
+ X is a real solution of eq. (1) by proposition 2.1. Since L = G(X) is also ˆHr-neutral, by proposition 2.2 X
354
+ is skew-symmetric. Thus (ii) =⇒ (i).
355
+
356
+ 3. Matrix Polynomials
357
+ Building toward our goal of factorizing a real symmetric positive semidefinite matrix polynomial, we next
358
+ state a few relevant results on matrix polynomials (see [11]).
359
+ Definition 3.1. For n × n matrices Pi, we define an n × n matrix polynomial P(x) of degree m by
360
+ P(x) =
361
+ m
362
+
363
+ i=0
364
+ Pixi.
365
+ • The matrix polynomial is called real if all Pi are real matrices.
366
+ • The matrix polynomial is called monic if Pm = In.
367
+ • The matrix polynomial is called self-adjoint if Pi = P ∗
368
+ i , its conjugate transpose, for all i.
369
+ • The matrix polynomial is called symmetric if Pi = P T
370
+ i
371
+ for all i.
372
+ • The matrix polynomial is called positive semidefinite (also nonnegative) if for all x ∈ R, P(x) is
373
+ positive semidefinite.
374
+ • The matrix polynomial is called regular if det(P(x)) is not identically zero.
375
+ As in [16], we define the spectrum and Jordan canonical form of a matrix polynomial in the following
376
+ ways.1
377
+ Definition 3.2. Let P(x) be a regular matrix polynomial. Then the set of eigenvalues of P, i.e. the spectrum,
378
+ is
379
+ σ(P) := {λ ∈ C : det(P(λ)) = 0}.
380
+ Definition 3.3. Let P(x) be a monic matrix polynomial, i.e.
381
+ P(x) = Inxm +
382
+ m−1
383
+
384
+ i=0
385
+ Pixi.
386
+ 1Note that the partial multiplicities of an eigenvalue of a matrix polynomial are often defined as powers of the elementary
387
+ divisors; however, these partial multiplicities are the same as the sizes of the Jordan blocks of our companion matrix. See the
388
+ Appendix of [10] for a more in depth understanding of matrix polynomial equivalences, linearizations, partial multiplicities and
389
+ elementary divisors.
390
+
391
+ 6
392
+ SARAH GIFT AND HUGO J. WOERDEMAN
393
+ The Jordan canonical form for P(x) is defined to be that of the companion matrix
394
+ Cp :=
395
+
396
+ 
397
+ 0
398
+ In
399
+ 0
400
+ · · ·
401
+ 0
402
+ 0
403
+ 0
404
+ In
405
+ · · ·
406
+ 0
407
+ ...
408
+ ...
409
+ ...
410
+ ...
411
+ ...
412
+ 0
413
+ 0
414
+ · · ·
415
+ 0
416
+ In
417
+ −P0
418
+ −P1
419
+ · · ·
420
+ −Pm−2
421
+ −Pm−1
422
+
423
+ 
424
+ Theorem 3.1. [11, part of Theorem 12.8] For a monic self-adjoint matrix polynomial P(x), the following
425
+ statements are equivalent:
426
+ (i) P(x) is nonnegative.
427
+ (ii) The partial multiplicities of P(x) for real points of the spectrum are all even.
428
+ In the previous section, we found that if all real eigenvalues of Mr have even partial multiplicities and all
429
+ imaginary eigenvalues of Mr have even algebraic multiplicity, then our equation eq. (1) has the desired real
430
+ skew-symmetric solution. Thus we now want to connect the eigenvalues of Mr and their partial multiplicities
431
+ with the eigenvalues of a monic nonnegative matrix polynomial P(x). For this, we begin with a few definitions
432
+ from [11].
433
+ Definition 3.4. Two matrix polynomials M1(x) and M2(x) of size n × n are called equivalent if
434
+ M1(x) = E(x)M2(x)F(x)
435
+ for some n × n matrix polynomials E(x) and F(x) with constant nonzero determinants.
436
+ Definition 3.5. Let P(x) be an n × n monic matrix polynomial of degree m. A linear matrix polynomial
437
+ λI − A is called a linearization of P(x) if
438
+ (7)
439
+ λI − A ∼
440
+
441
+ P(x)
442
+ 0
443
+ 0
444
+ In(m−1)
445
+
446
+ where ∼ means equivalence of matrix polynomials.
447
+ Note that Cp, the companion matrix, is a linearization of P(x). For any linearization λI − A, the partial
448
+ multiplicities in every eigenvalue of A and P(x) are the same. Thus to gain results about the multiplicities
449
+ of the eigenvalues of Mr, it suffices to show λI − Mr is a linearization of a matrix polynomial P(x).
450
+ Lemma 3.1. Let Q(x) = �2m
451
+ j=0 Qjxj be an n × n real symmetric matrix polynomial of degree 2m with
452
+ Q0 = In. Then for
453
+ Mr =
454
+
455
+ 
456
+ − 1
457
+ 2Q1
458
+ −In
459
+ In
460
+ 0
461
+ 0
462
+ ...
463
+ ...
464
+ ...
465
+ In
466
+ 0
467
+ 0
468
+ Q2 − 1
469
+ 4Q2
470
+ 1
471
+ 1
472
+ 2Q3
473
+ − 1
474
+ 2Q1
475
+ In
476
+ 1
477
+ 2Q3
478
+ Q4
479
+ ...
480
+ 0
481
+ ...
482
+ ...
483
+ ...
484
+ 1
485
+ 2Q2m−1
486
+ ...
487
+ In
488
+ 1
489
+ 2Q2m−1
490
+ Q2m
491
+ 0
492
+
493
+ 
494
+ ,
495
+ we have
496
+ λI − Mr ∼
497
+
498
+ rev Q(λ)
499
+ 0
500
+ 0
501
+ I
502
+
503
+ where
504
+ rev Q(x) :=
505
+ 2m
506
+
507
+ i=0
508
+ Q2m−ixi = x2mIn +
509
+ 2m−1
510
+
511
+ i=1
512
+ Q2m−ixi.
513
+
514
+ REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
515
+ 7
516
+ Proof. First permute the rows and columns as follows:
517
+ M1:=
518
+
519
+ 
520
+ 0
521
+ 0
522
+ · · ·
523
+ 0
524
+ In
525
+ 0
526
+ In
527
+ ...
528
+ 0
529
+ 0
530
+ ...
531
+ ...
532
+ ...
533
+ ...
534
+ 0
535
+ In
536
+ 0
537
+ · · ·
538
+ 0
539
+ In
540
+ 0
541
+ · · ·
542
+ 0
543
+ 0
544
+ 0
545
+ 0
546
+ ...
547
+ In
548
+ 0
549
+ ...
550
+ ...
551
+ 0
552
+ ...
553
+ ...
554
+ 0
555
+ · · ·
556
+ 0
557
+ In
558
+ 0
559
+
560
+ 
561
+ (λI − Mr)
562
+
563
+ 
564
+ In
565
+ ...
566
+ In
567
+ 0
568
+ 0
569
+ In
570
+ ...
571
+ In
572
+
573
+ 
574
+ ,
575
+ =
576
+
577
+ 
578
+ −Q2m
579
+ − 1
580
+ 2Q2m−1
581
+ 0
582
+ λIn
583
+ λIn
584
+ −In
585
+ 0
586
+ ...
587
+ ...
588
+ ...
589
+ ...
590
+ ...
591
+ λIn
592
+ −In
593
+ 0
594
+ λIn + 1
595
+ 2Q1
596
+ In
597
+ − 1
598
+ 2Q3
599
+ 1
600
+ 4Q2
601
+ 1 − Q2
602
+ λIn + 1
603
+ 2Q1
604
+ −In
605
+ ...
606
+ −Q4
607
+ − 1
608
+ 2Q3
609
+ λIn
610
+ ...
611
+ ...
612
+ ...
613
+ ...
614
+ ...
615
+ ...
616
+ − 1
617
+ 2Q2m−1
618
+ −Q2m−2
619
+ − 1
620
+ 2Q2m−3
621
+ λIn
622
+ −In
623
+
624
+ 
625
+ Define V1, . . . , Vm by
626
+ V1 = −Q2m − 1
627
+ 2λQ2m−1
628
+ V2 = −1
629
+ 2Q2m−1 − λQ2m−2 − 1
630
+ 2λ2Q2m−3
631
+ V3 = −1
632
+ 2λQ2m−3 − λ2Q2m−4 − 1
633
+ 2λ3Q2m−5
634
+ ...
635
+ Vm−1 = −1
636
+ 2λm−3Q5 − λm−2Q4 − 1
637
+ 2λm−1Q3
638
+ Vm = −1
639
+ 2λm−2Q3 − λm−1Q2 − λmQ1 − λm+1In
640
+ Then, multiply M1 on the left by
641
+
642
+ 
643
+ In
644
+ �m
645
+ i=2 λi−2Vi
646
+ �m
647
+ i=3 λi−3Vi
648
+ · · ·
649
+ Vm−1 + λVm
650
+ Vm
651
+ −λm−1(λIn + 1
652
+ 2Q1)
653
+ λm−1In
654
+ · · ·
655
+ λ2In
656
+ λIn
657
+ 0
658
+ In(m−1)
659
+ 0
660
+ 0
661
+ 0
662
+ Inm
663
+
664
+ .
665
+ Noting that
666
+ −Q2m − 1
667
+ 2λQ2m−1 + λ
668
+ m
669
+
670
+ i=2
671
+ λi−2Vi = − rev Q(λ),
672
+
673
+ 8
674
+ SARAH GIFT AND HUGO J. WOERDEMAN
675
+ we get
676
+ λI − Mr ∼
677
+
678
+ 
679
+ − rev Q(λ)
680
+ −In
681
+ 0
682
+
683
+ ...
684
+ −In
685
+ 0
686
+
687
+ In
688
+ −In
689
+ 0
690
+
691
+ ...
692
+ −In
693
+
694
+ 
695
+ Thus it is evident now that
696
+ λI − Mr ∼
697
+
698
+ rev Q(λ)
699
+ 0
700
+ 0
701
+ I
702
+
703
+ .
704
+
705
+ 4. Real Factorization of Non-negative Matrix Polynomial
706
+ We are now ready for the main result. While the following theorem was previously proven by Hanselka
707
+ and Sinn [13], we provide a new constructive proof following that of the complex analogue presented in the
708
+ monograph by Bakonyi and Woerdeman [1].
709
+ Theorem 4.1. Let Q(x) = �2m
710
+ j=0 Qjxj be an n × n real symmetric matrix polynomial of degree 2m with
711
+ Q(x) ≥ 0 for all x ∈ R and Q0 > 0. Then det(Q(x)) is a square if and only if there exists an n × n real
712
+ matrix polynomial G(x) = �m
713
+ j=0 Gjxj of degree m such that
714
+ Q(x) = G(x)T G(x).
715
+ Proof. First, assume Q(x) = G(x)T G(x). Then det(Q(x)) = det(G(x))2.
716
+ On the other hand, assume
717
+ det(Q(x)) is a square. Without loss of generality, assume Q0 = In (otherwise, take ˜Q(x) := Q−1/2
718
+ 0
719
+ Q(x)Q−1/2
720
+ 0
721
+ ).
722
+ Consider the (m + 1)n × (m + 1)n real symmetric matrix
723
+ F0 =
724
+
725
+ 
726
+ In
727
+ 1
728
+ 2Q1
729
+ 1
730
+ 2Q1
731
+ Q2
732
+ ...
733
+ ...
734
+ ...
735
+ 1
736
+ 2Q2m−1
737
+ 1
738
+ 2Q2m−1
739
+ Q2m
740
+
741
+ 
742
+ .
743
+ Given an nm × nm real skew-symmetric matrix
744
+ X =
745
+
746
+ 
747
+ X1,1
748
+ · · ·
749
+ X1,m
750
+ ...
751
+ ...
752
+ Xm,1
753
+ · · ·
754
+ Xm,m
755
+
756
+  ,
757
+ let
758
+ FX = F0 +
759
+ � 0
760
+ X
761
+ 0n
762
+ 0
763
+
764
+
765
+ � 0
766
+ 0n
767
+ X
768
+ 0
769
+
770
+ .
771
+ It should be noted that in the above line, the matrix decompositions are different; e.g. the X block and the
772
+ −X block overlap in general. We want to solve
773
+ Xopt = arg min
774
+ rank(FX)
775
+ such that FX ≥ 0.
776
+ Let
777
+ A =
778
+
779
+ 
780
+ 0
781
+ In
782
+ 0
783
+ ...
784
+ ...
785
+ In
786
+ 0
787
+
788
+  ∈ Rnm×nm
789
+ and
790
+ B =
791
+
792
+ 
793
+ In
794
+ 0
795
+ ...
796
+ 0
797
+
798
+  ∈ Rnm×n.
799
+
800
+ REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
801
+ 9
802
+ Then (A, B) is controllable,
803
+
804
+ 0
805
+ 0
806
+ X
807
+ 0
808
+
809
+ =
810
+
811
+ 0
812
+ 0
813
+ XB
814
+ XA
815
+
816
+ ,
817
+ and
818
+
819
+ 0
820
+ X
821
+ 0
822
+ 0
823
+
824
+ =
825
+ ��
826
+ 0
827
+ BT X
828
+ 0
829
+ AT X
830
+
831
+ .
832
+ Split F0 into four blocks as follows,
833
+ F0 =
834
+ � In
835
+ Γ12
836
+ Γ21
837
+ Γ22
838
+
839
+ .
840
+ Noting ΓT
841
+ 12 = Γ21 and Γ22 is real symmetric, we can recast the condition FX ≥ 0 as
842
+
843
+ In
844
+ Γ12 + BT X
845
+ ΓT
846
+ 12 − XB
847
+ Γ22 + AT X − XA
848
+
849
+ ≥ 0
850
+ Consider the Schur complement with respect to In,
851
+ Γ22 + AT X − XA − (ΓT
852
+ 12 − XB)I−1
853
+ n (Γ12 + BT X).
854
+ Setting this equal to zero, we get the modified algebraic Riccati equation
855
+ (8)
856
+ P + RT X − XR + XSX = 0
857
+ where
858
+ P = Γ22 − ΓT
859
+ 12Γ12
860
+ R = A − BΓ12
861
+ S = BBT .
862
+ Note P = P T and S = ST with S ≥ 0. In this case, the associated Mr matrix is as follows:
863
+ Mr =
864
+ � A − BΓ12
865
+ −BBT
866
+ Γ22 − ΓT
867
+ 12Γ12
868
+ AT − ΓT
869
+ 12BT
870
+
871
+ =
872
+
873
+ 
874
+ − 1
875
+ 2Q1
876
+ −In
877
+ In
878
+ 0
879
+ 0
880
+ ...
881
+ ...
882
+ ...
883
+ In
884
+ 0
885
+ 0
886
+ Q2 − 1
887
+ 4Q2
888
+ 1
889
+ 1
890
+ 2Q3
891
+ − 1
892
+ 2Q1
893
+ In
894
+ 1
895
+ 2Q3
896
+ Q4
897
+ ...
898
+ 0
899
+ ...
900
+ ...
901
+ ...
902
+ 1
903
+ 2Q2m−1
904
+ ...
905
+ In
906
+ 1
907
+ 2Q2m−1
908
+ Q2m
909
+ 0
910
+
911
+ 
912
+ By lemma 3.1, Mr is a linearization of rev Q(x). Since Q(x) ≥ 0 for all x ∈ R, rev Q(x) = x2mQ
913
+ � 1
914
+ x
915
+
916
+ ≥ 0
917
+ for all nonzero x ∈ R. By continuity, then rev Q(x) ≥ 0 for all x ∈ R. Then by theorem 3.1, the partial
918
+ multiplicities of every real eigenvalue of rev Q(λ) are all even. Since Mr is a linearization of rev Q(x), all
919
+ the partial multiplicities of every eigenvalue of Mr and rev Q(λ) are the same, so the partial multiplicities
920
+ of every real eigenvalue of Mr are all even. Further, by the non-negativity of rev Q(x),
921
+ det(λI − Mr) = det(rev Q(x))
922
+ has all roots of even algebraic multiplicity. In particular, all non-real eigenvalues of Mr have even algebraic
923
+ multiplicity. Hence by theorem 2.2, there is a skew-symmetric solution, ˜X of eq. (8). Then since the Schur
924
+ complement with respect to In is zero, we know
925
+ F ˜
926
+ X =
927
+
928
+ In
929
+ Γ12 + BT ˜X
930
+ ΓT
931
+ 12 − ˜XB
932
+ Γ22 + AT ˜X − ˜XA
933
+
934
+ ≥ 0
935
+
936
+ 10
937
+ SARAH GIFT AND HUGO J. WOERDEMAN
938
+ and
939
+ rank(F ˜
940
+ X) = rank
941
+ ��
942
+ In
943
+ Γ12 + BT ˜X
944
+ ΓT
945
+ 12 − ˜XB
946
+ Γ22 + AT ˜X − ˜XA
947
+ ��
948
+ = rank In = n.
949
+ If we factorize
950
+ F ˜
951
+ X =
952
+
953
+ In
954
+ Γ12 + BT ˜X
955
+ ΓT
956
+ 12 − ˜XB
957
+ Γ22 + AT ˜X − ˜XA
958
+
959
+ =
960
+
961
+ 
962
+ GT
963
+ 0
964
+ ...
965
+ GT
966
+ m
967
+
968
+ 
969
+
970
+ G0
971
+ · · ·
972
+ Gm
973
+
974
+ with G0 = In and Gi, i = 1, 2, . . . , m, real n × n matrices, we have
975
+ Q(x) =
976
+ �In
977
+ xIn
978
+ · · ·
979
+ xmIn
980
+
981
+ F ˜
982
+ X
983
+
984
+ 
985
+ In
986
+ xIn
987
+ ...
988
+ xmIn
989
+
990
+ 
991
+ =
992
+ �In
993
+ xIn
994
+ · · ·
995
+ xmIn
996
+
997
+
998
+ 
999
+ GT
1000
+ 0
1001
+ ...
1002
+ GT
1003
+ m
1004
+
1005
+ 
1006
+ �G0
1007
+ · · ·
1008
+ Gm
1009
+
1010
+
1011
+ 
1012
+ In
1013
+ xIn
1014
+ ...
1015
+ xmIn
1016
+
1017
+  .
1018
+ Thus for G(x) = �m
1019
+ j=0 Gjxj, Q(x) = G(x)T G(x).
1020
+
1021
+ theorem 4.1 required Q0 > 0. We can relax this condition as follows.
1022
+ Corollary 4.1. Let Q(x) = �2m
1023
+ j=0 Qjxj be an n × n real symmetric matrix polynomial of degree 2m with
1024
+ Q(x) ≥ 0 for all x ∈ R and Q(x0) > 0 for some x0 ∈ R. Then det(Q(x)) is a square if and only if there
1025
+ exists an n × n real matrix polynomial G(x) = �m
1026
+ j=0 Gjxj of degree m such that
1027
+ Q(x) = G(x)T G(x).
1028
+ Proof. First, assume Q(x) = G(x)T G(x). Then det(Q(x)) = det(G(x))2.
1029
+ On the other hand, assume
1030
+ det(Q(x)) = f(x)2 for some polynomial f of degree m. Consider
1031
+ P(x) := Q(x0 − x).
1032
+ Then P(x) is an n × n real symmetric matrix polynomial of degree 2m such that
1033
+ P(0) = Q(x0) > 0
1034
+ and
1035
+ det(P(x)) = det(Q(x0 − x)) = f(x0 − x)2.
1036
+ Thus by theorem 4.1, there is an n × n real matrix polynomial H(x) = �m
1037
+ j=0 Hjxj of degree m such that
1038
+ P(x) = H(x)T H(x).
1039
+ Define
1040
+ G(x) := H(x0 − x).
1041
+ Then G(x) = �m
1042
+ j=0 Gjxj is an n × n real matrix polynomial such that
1043
+ Q(x) = P(x0 − x) = H(x0 − x)T H(x0 − x) = G(x)T G(x).
1044
+
1045
+ The proof of theorem 4.1 is constructive. It hinges on finding the real skew-symmetric solution X to the
1046
+ modified algebraic Riccati equation. Back in Section 2, we found such a solution by constructing an mn-
1047
+ dimensional Mr-invariant Hr-neutral subspace. Following the proof of Theorem 2.6.2, found in [15], also to
1048
+ be found in Gohberg, Lancaster, and Rodman’s later book Indefinite Linear Algebra and Applications [9],
1049
+ we first convert Mr to its real Jordan form
1050
+ Mr = SJS−1,
1051
+ where
1052
+ J = Jr1(λ1) ⊕ · · · ⊕ Jrk(λk) ⊕ J2rk+1(λk+1 ± iµk+1) ⊕ · · · ⊕ J2rk+ℓ(λk+ℓ ± iµk+ℓ).
1053
+
1054
+ REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
1055
+ 11
1056
+ For real eigenvalues λj, where 1 ≤ j ≤ α, we take the first rj/2 columns of S corresponding to the block
1057
+ Jrj (note we know each rj is even). For any imaginary eigenvalues λj ± iµj with rj even, we do the same.
1058
+ Finally, we must consider the imaginary eigenvalues λj ± iµj with rj odd. For such an eigenvalues, there
1059
+ must be an even number of Jordan blocks of odd size (since we know every imaginary eigenvalue has even
1060
+ algebraic multiplicity). Collect the Jordan blocks together in pairs
1061
+ Kj = J2rj(λj ± iµj) ⊕ J2rj+1(λj+1 ± iµj+1).
1062
+ Then take the first rj − 1 columns of S corresponding to J2rj(λj ± iµj), the first rj+1 − 1 columns of S
1063
+ corresponding to J2rj+1(λj+1 ± iµj+1), along with the following two vectors
1064
+ (1) The rjth column of S corresponding to J2rj(λj ± iµj) plus the rj+1 + 1st column of S corresponding
1065
+ to J2rj+1(λj+1 ± iµj+1).
1066
+ (2) The rj +1st column of S corresponding to J2rj(λj ±iµj) minus the rj+1st column of S corresponding
1067
+ to J2rj+1(λj+1 ± iµj+1).
1068
+ Let us illustrate the above ideas in a few examples. The first example is the real eigenvalue case. The second
1069
+ example is the imaginary eigenvalue case with odd rj.
1070
+ Example 4.1. Take
1071
+ Q(x) =
1072
+ �2x2 + 2x + 1
1073
+ −4x2 − 3x
1074
+ −4x2 − 3x
1075
+ 8x2 + 4x + 1
1076
+
1077
+ =
1078
+ �1
1079
+ 0
1080
+ 0
1081
+ 1
1082
+
1083
+ + x
1084
+ � 2
1085
+ −3
1086
+ −3
1087
+ 4
1088
+
1089
+ + x2
1090
+ � 2
1091
+ −4
1092
+ −4
1093
+ 8
1094
+
1095
+ .
1096
+ Then Mr(x) = SJS−1 for
1097
+ J =
1098
+
1099
+ 
1100
+ −3
1101
+ 1
1102
+ 0
1103
+ 0
1104
+ 0
1105
+ −3
1106
+ 0
1107
+ 0
1108
+ 0
1109
+ 0
1110
+ 0
1111
+ 1
1112
+ 0
1113
+ 0
1114
+ 0
1115
+ 0
1116
+
1117
+  , S ≈
1118
+
1119
+ 
1120
+ −0.2778
1121
+ 0.3148
1122
+ 0.2222
1123
+ 0.6852
1124
+ 0.2778
1125
+ −0.3704
1126
+ 0.1111
1127
+ 0.3704
1128
+ −0.1389
1129
+ 0.3519
1130
+ −0.0556
1131
+ −0.3519
1132
+ −0.1389
1133
+ −0.1759
1134
+ 0.1111
1135
+ 0.1759
1136
+
1137
+  .
1138
+ We have J = J2 (−3) ⊕ J2 (0), so r1 = r2 = 2. Thus we take the 1st column corresponding to the first block
1139
+ as well as the 1st column corresponding to the second block.
1140
+
1141
+ 
1142
+ −0.2778
1143
+ 0.2222
1144
+ 0.2778
1145
+ 0.1111
1146
+ −0.1389
1147
+ −0.0556
1148
+ 0.1389
1149
+ 0.1111
1150
+
1151
+  =:
1152
+
1153
+ X1
1154
+ X2
1155
+
1156
+ Our invariant subspace is thus
1157
+ Im
1158
+
1159
+ X1
1160
+ X2
1161
+
1162
+ = Im
1163
+
1164
+ I
1165
+ X2X−1
1166
+ 1
1167
+
1168
+ .
1169
+ Here we have then
1170
+ X = X2X−1
1171
+ 1
1172
+ =
1173
+
1174
+ 0
1175
+ −0.5
1176
+ 0.5
1177
+ 0
1178
+
1179
+ .
1180
+ Thus
1181
+ Fopt = F0 +
1182
+
1183
+ 0
1184
+ X
1185
+ 0
1186
+ 0
1187
+
1188
+
1189
+
1190
+ 0
1191
+ 0
1192
+ X
1193
+ 0
1194
+
1195
+ =
1196
+
1197
+ 
1198
+ 1
1199
+ 0
1200
+ 1
1201
+ −2
1202
+ 0
1203
+ 1
1204
+ −1
1205
+ 2
1206
+ 1
1207
+ −1
1208
+ 2
1209
+ −4
1210
+ −2
1211
+ 2
1212
+ −4
1213
+ 8
1214
+
1215
+  .
1216
+ We factorize as
1217
+ F =
1218
+
1219
+ 
1220
+ 1
1221
+ 0
1222
+ 0
1223
+ 1
1224
+ 1
1225
+ −1
1226
+ −2
1227
+ 2
1228
+
1229
+ 
1230
+ �1
1231
+ 0
1232
+ 1
1233
+ −2
1234
+ 0
1235
+ 1
1236
+ −1
1237
+ 2
1238
+
1239
+ .
1240
+ Thus
1241
+ G0 =
1242
+ �1
1243
+ 0
1244
+ 0
1245
+ 1
1246
+
1247
+ ,
1248
+ G1 =
1249
+ � 1
1250
+ −2
1251
+ −1
1252
+ 2
1253
+
1254
+ ,
1255
+ G(x) = G0 + xG1.
1256
+ We can verify Q(x) = G(x)T G(x).
1257
+
1258
+ 12
1259
+ SARAH GIFT AND HUGO J. WOERDEMAN
1260
+ Example 4.2. Take now
1261
+ Q(x) =
1262
+ �2x2 + 2x + 1
1263
+ x2 + 2x
1264
+ x2 + 2x
1265
+ 13x2 + 4x + 1
1266
+
1267
+ =
1268
+ �1
1269
+ 0
1270
+ 0
1271
+ 1
1272
+
1273
+ + x
1274
+ �2
1275
+ 2
1276
+ 2
1277
+ 4
1278
+
1279
+ + x2
1280
+ �2
1281
+ 1
1282
+ 1
1283
+ 13
1284
+
1285
+ .
1286
+ Then Mr(x) = SJS−1 for
1287
+ J = 1
1288
+ 2
1289
+
1290
+ 
1291
+ −3
1292
+
1293
+ 11
1294
+ 0
1295
+ 0
1296
+
1297
+
1298
+ 11
1299
+ −3
1300
+ 0
1301
+ 0
1302
+ 0
1303
+ 0
1304
+ −3
1305
+
1306
+ 11
1307
+ 0
1308
+ 0
1309
+
1310
+
1311
+ 11
1312
+ −3
1313
+
1314
+  , S ≈
1315
+
1316
+ 
1317
+ 0.5477
1318
+ 0
1319
+ −0.5477
1320
+ 0
1321
+ 0.0913
1322
+ −0.3028
1323
+ −0.0913
1324
+ 0.3028
1325
+ 0.1826
1326
+ −0.6055
1327
+ −0.1826
1328
+ 0.6055
1329
+ −1.0954
1330
+ 0
1331
+ 1.0954
1332
+ 0
1333
+
1334
+  .
1335
+ We have J = J2
1336
+
1337
+ 3±i
1338
+
1339
+ 11
1340
+ 2
1341
+
1342
+ ⊕ J2
1343
+
1344
+ 3±i
1345
+
1346
+ 11
1347
+ 2
1348
+
1349
+ , so r1 = r2 = 1. Thus we take the 1st column corresponding to the
1350
+ first block plus the 2nd column corresponding to the second block as well as the 2nd column corresponding
1351
+ to the first block minus the first column corresponding to the second block.
1352
+
1353
+ 
1354
+ 0.5477 + 0
1355
+ 0 − (−0.5477)
1356
+ 0.0913 + 0.3028
1357
+ −0.3028 − (−0.0913)
1358
+ 0.1826 + 0.6055
1359
+ −0.6055 − (−0.1826)
1360
+ −1.0954 + 0
1361
+ 0 − 1.0954
1362
+
1363
+  =:
1364
+ �X1
1365
+ X2
1366
+
1367
+ Our invariant subspace is thus
1368
+ Im
1369
+
1370
+ X1
1371
+ X2
1372
+
1373
+ = Im
1374
+
1375
+ I
1376
+ X2X−1
1377
+ 1
1378
+
1379
+ .
1380
+ Here we have then
1381
+ X = X2X−1
1382
+ 1
1383
+ =
1384
+ � 0
1385
+ 2
1386
+ −2
1387
+ 0
1388
+
1389
+ .
1390
+ Thus
1391
+ Fopt = F0 +
1392
+ �0
1393
+ X
1394
+ 0
1395
+ 0
1396
+
1397
+
1398
+ � 0
1399
+ 0
1400
+ X
1401
+ 0
1402
+
1403
+ =
1404
+
1405
+ 
1406
+ 1
1407
+ 0
1408
+ 1
1409
+ 3
1410
+ 0
1411
+ 1
1412
+ −1
1413
+ 2
1414
+ 1
1415
+ −1
1416
+ 2
1417
+ 1
1418
+ 3
1419
+ 2
1420
+ 1
1421
+ 13
1422
+
1423
+  .
1424
+ We factorize as
1425
+ F =
1426
+
1427
+ 
1428
+ 1
1429
+ 0
1430
+ 0
1431
+ 1
1432
+ 1
1433
+ −1
1434
+ 3
1435
+ 2
1436
+
1437
+ 
1438
+ �1
1439
+ 0
1440
+ 1
1441
+ 3
1442
+ 0
1443
+ 1
1444
+ −1
1445
+ 2
1446
+
1447
+ .
1448
+ Thus
1449
+ G0 =
1450
+ �1
1451
+ 0
1452
+ 0
1453
+ 1
1454
+
1455
+ ,
1456
+ G1 =
1457
+ � 1
1458
+ 3
1459
+ −1
1460
+ 2
1461
+
1462
+ ,
1463
+ G(x) = G0 + xG1.
1464
+ We can verify Q(x) = G(x)T G(x).
1465
+ References
1466
+ [1] M. Bakonyi and H. J. Woerdeman, Matrix Completions, Moments, and Sums of Hermitian Squares, Princeton Series
1467
+ in Applied Mathematics, Princeton University Press, 2011, http://www.jstor.org/stable/j.ctt7rp1d.
1468
+ [2] T. Chen and B. A. Francis, Spectral and inner-outer factorizations of rational matrices, SIAM Journal on Matrix
1469
+ Analysis and Applications, 10 (1989), pp. 1–17, https://doi.org/10.1137/0610001.
1470
+ [3] W. A. Coppel, Matrix quadratic equations, Bulletin of the Australian Mathematical Society, 10 (1974), pp. 377 – 401,
1471
+ https://doi.org/10.1017/S0004972700041071.
1472
+ [4] J. Doyle, K. Glover, P. Khargonekar, and B. Francis, State space solution to standard H2 and H∞ control problem,
1473
+ IEEE Transactions on Automatic Control, 34 (1989), pp. 831 – 847, https://doi.org/10.1109/9.29425.
1474
+ [5] M. A. Dritschel and J. Rovnyak, The operator fej´er-riesz theorem, in A Glimpse at Hilbert Space Operators: Paul
1475
+ R. Halmos in Memoriam, S. Axler, P. Rosenthal, and D. Sarason, eds., Springer Basel, Basel, 2010, pp. 223–254, https:
1476
+ //doi.org/10.1007/978-3-0346-0347-8_14.
1477
+ [6] M. A. Dritschel and H. J. Woerdeman, Outer factorizations in one and several variables, Transactions of the American
1478
+ Mathematical Society, 357 (2005), pp. 4661–4679, http://www.jstor.org/stable/3845206.
1479
+ [7] B. A. Francis, A course in H∞ control theory, vol. 88 of Lecture Notes in Control and Information Sciences, Springer-
1480
+ Verlag, Berlin, 1987, https://doi.org/10.1007/BFb0007371.
1481
+ [8] I. Gohberg, The factorization problem for operator functions, Izvestiya Akademii Nauk SSSR Seriya Matematicheskaya,
1482
+ 28 (1964), pp. 1055–1082.
1483
+
1484
+ REAL FACTORIZATION OF POSITIVE SEMIDEFINITE MATRIX POLYNOMIALS
1485
+ 13
1486
+ [9] I. Gohberg, P. Lancaster, and L. Rodman, Indefinite Linear Algebra and Applications, Birkh¨auser, 2005, https:
1487
+ //doi.org/10.1007/b137517.
1488
+ [10] I. Gohberg, P. Lancaster, and L. Rodman, Invariant Subspaces of Matrices with Applications, SIAM, 2006, https:
1489
+ //doi.org/10.1137/1.9780898719093.
1490
+ [11] I. Gohberg,
1491
+ P. Lancaster,
1492
+ and L. Rodman,
1493
+ Matrix Polynomials,
1494
+ SIAM, 2009,
1495
+ https://doi.org/10.1137/1.
1496
+ 9780898719024.
1497
+ [12] Y. Hachez and H. J. Woerdeman, The fischer-frobenius transformation and outer factorization, in Operator theory,
1498
+ structured matrices, and dilations, vol. 10 of Theta Series in Advanced Mathematics, Theta, Bucharest, 2007, pp. 181–203.
1499
+ [13] C. Hanselka and R. Sinn, Positive semidefinite univariate matrix polynomials, Mathematische Zeitschrift, 292 (2019),
1500
+ pp. 83–101, https://doi.org/10.1007/s00209-018-2137-7.
1501
+ [14] H. Helson, Lectures on invariant subspaces, Academic Press, 1964, https://doi.org/10.1016/C2013-0-12454-3.
1502
+ [15] P. Lancaster and L. Rodman, Algebraic Riccati Equations, Oxford University Press, 1995.
1503
+ [16] P. Lancaster and I. Zaballa, Spectral theory for self-adjoint auadratic eigenvalue problems - a review, ILAS, 37 (2021),
1504
+ pp. 211–246, https://doi.org/10.13001/ela.2021.5361.
1505
+ [17] J. W. McLean and H. J. Woerdeman, Spectral factorizations and sums of squares representations via semidefinite
1506
+ programming, SIAM J. Matrix Anal. Appl., 23 (2001/02), pp. 646–655, https://doi.org/10.1137/S0895479800371177.
1507
+ [18] A. C. M. Ran and L. Rodman, Factorization of matrix polynomials with symmetries, SIAM Journal on Matrix Analysis
1508
+ and Applications, 15 (1994), pp. 845–864, https://doi.org/10.1137/S0895479892235502.
1509
+ [19] M. Rosenblatt, A multi-dimensional prediction problem, Arkiv f¨or Matematik, 3 (1958), pp. 407–424, https://doi.org/
1510
+ 10.1007/BF02589495.
1511
+ [20] M. Rosenblum, Vectorial teoplitz operators and the fej´er-riesz theorem, Journal of Mathematical Analysis and Applica-
1512
+ tions, 23 (1968), pp. 139–147.
1513
+ [21] J. Willems, Least squares stationary optimal control and the algebraic riccati equation, IEEE Transactions on Automatic
1514
+ Control, 16 (1971), pp. 621–634, https://doi.org/10.1109/TAC.1971.1099831.
1515
+
0NFST4oBgHgl3EQfVTgy/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
19AzT4oBgHgl3EQf8_5O/content/2301.01912v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:362209212377b5af7edb7376dfe38aea87b3e2ad2c512bcc0c67576a4c11a63d
3
+ size 24475847
19FKT4oBgHgl3EQfPS1l/content/tmp_files/2301.11762v1.pdf.txt ADDED
@@ -0,0 +1,788 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Electron spin secluded inside a bottom-up assembled standing metal-molecule
2
+ nanostructure
3
+ Taner Esat,1, 2, ∗ Markus Ternes,1, 2, 3 Ruslan Temirov,1, 2, 4 and F. Stefan Tautz1, 2, 5
4
+ 1Peter Gr¨unberg Institute (PGI-3), Forschungszentrum J¨ulich, 52425 J¨ulich, Germany
5
+ 2J¨ulich Aachen Research Alliance (JARA), Fundamentals of Future Information Technology, 52425 J¨ulich, Germany
6
+ 3Institute of Physics II B, RWTH Aachen University, 52074 Aachen, Germany
7
+ 4Institute of Physics II, University of Cologne, 50937 Cologne, Germany
8
+ 5Experimental Physics IV A, RWTH Aachen University, 52074 Aachen, Germany
9
+ (Dated: January 30, 2023)
10
+ Artificial nanostructures, fabricated by placing building blocks such as atoms or molecules in well-
11
+ defined positions, are a powerful platform in which quantum effects can be studied and exploited on
12
+ the atomic scale. Here, we report a strategy to significantly reduce the electron-electron coupling
13
+ between a large planar aromatic molecule and the underlying metallic substrate. To this end, we
14
+ use the manipulation capabilities of a scanning tunneling microscope (STM) and lift the molecule
15
+ into a metastable upright geometry on a pedestal of two metal atoms. Measurements at millikelvin
16
+ temperatures and magnetic fields reveal that the bottom-up assembled standing metal-molecule
17
+ nanostructure has an S = 1/2 spin which is screened by the substrate electrons, resulting in a Kondo
18
+ temperature of only 291 ± 13 mK. We extract the Land´e g-factor of the molecule and the exchange
19
+ coupling Jρ to the substrate by modeling the differential conductance spectra using a third-order
20
+ perturbation theory in the weak coupling and high-field regimes. Furthermore, we show that the
21
+ interaction between the STM tip and the molecule can tune the exchange coupling to the substrate,
22
+ which suggests that the bond between the standing metal-molecule nanostructure and the surface
23
+ is mechanically soft.
24
+ On the way to spin qubits based on single atoms or
25
+ molecules, it is essential to minimize the interaction with
26
+ the environment, since the latter leads to decoherence
27
+ [1]. The scanning tunneling microscope (STM) is an ideal
28
+ tool to study quantum properties of nanoscale structures,
29
+ because it not only allows the magnetic states of individ-
30
+ ual atoms and molecules to be read out [2] and coher-
31
+ ently controlled [3–5], but also enables the environment
32
+ to be changed directly.
33
+ The ability to arrange atoms
34
+ and molecules on surfaces with atomic precision allows
35
+ for the fabrication and study of unprecedented artificial
36
+ nanostructures [6, 7]. Moreover, the STM can be used
37
+ to fabricate multiple absolutely identical qubits [8] from
38
+ individual atoms and molecules, which can also be ar-
39
+ ranged and coupled with each other as desired. Com-
40
+ pared to mesoscopic qubits, the structural control down
41
+ to the atomic level may offer advantages.
42
+ Magnetic atoms and molecules with degenerate ground
43
+ states on metallic surfaces typically show the Kondo ef-
44
+ fect: the spin degree of freedom is quenched at temper-
45
+ atures below a characteristic Kondo temperature TK by
46
+ the formation of a many-electron singlet state with the
47
+ electrons of the bath [9, 10]. Because TK depends di-
48
+ rectly on the coupling with the metal, the Kondo effect
49
+ itself can be used as a gauge of the interaction with the
50
+ environment. The strong hybridization of the d-orbitals
51
+ of magnetic atoms with states of the metal substrate
52
+ leads to TK of typically 40 - 300 K [11]. For magnetic
53
+ molecules, on the other hand, Kondo temperatures of
54
+ only a few Kelvin have been observed on metal surfaces
55
+ [12–14], which can be explained by the weaker hybridiza-
56
+ tion of the molecular orbitals with the substrate, or the
57
+ shielding of the magnetic atoms by the surrounding lig-
58
+ ands of the molecule. However, long relaxation times T1
59
+ of several hundred nanoseconds up to days [15, 16] and
60
+ dephasing times T2 in the nanosecond range [3–5] were so
61
+ far only achieved for atoms and molecules that were de-
62
+ coupled from the metallic surface by an atomically thin
63
+ insulating layer.
64
+ The presence of the decoupling layer
65
+ has also resulted in a significant reduction of TK to a few
66
+ Kelvin for magnetic atoms [17, 18].
67
+ In this work, we show that exploiting the third
68
+ dimension for the bottom-up assembly of standing
69
+ metal-molecule nanostructures offers an alternative ap-
70
+ proach to tune the coupling with the metallic sub-
71
+ strate. Specifically, we show that for a single 3,4,9,10-
72
+ perylenetetracarboxylic dianhydride (PTCDA) in the
73
+ standing configuration on a pedestal of two Ag adatoms
74
+ (Fig. 1a), both the interaction with the Ag(111) sub-
75
+ strate is drastically reduced compared to the flat-lying
76
+ PTCDA and the coupling with the metal substrate can
77
+ be tuned by stretching the bond between the molecule
78
+ and surface, utilizing the attraction between the STM
79
+ tip and the molecule. We report the fabrication of an
80
+ S = 1/2 spin nanostructure based on this strategy, with a
81
+ very weak coupling to the underlying substrate, resulting
82
+ in a TK of only 291 ± 13 mK — to our knowledge, the
83
+ smallest TK ever measured on a metallic substrate using
84
+ STM. Comparably low TK have so far only been found
85
+ in mesoscopic quantum dots [19, 20].
86
+ The Ag(111) surface was prepared in ultra-high vac-
87
+ uum (UHV) by repeated Ar+ sputtering and heating at
88
+ 800 K. A small coverage of PTCDA molecules was evap-
89
+ orated onto the clean Ag(111) surface at room temper-
90
+ arXiv:2301.11762v1 [cond-mat.mes-hall] 27 Jan 2023
91
+
92
+ 2
93
+ (a)
94
+ (b)
95
+ (c)
96
+ 10 Å
97
+ Ag(111)
98
+ ~17.5 Å
99
+ STM tip
100
+ −6
101
+ −4
102
+ −2
103
+ 0
104
+ Current (pA)
105
+ +
106
+ −0.6
107
+ −0.4
108
+ −0.2
109
+ 0.0
110
+ 0.2
111
+ 0.4
112
+ 0.6
113
+ Bias voltage (mV)
114
+ 5.5
115
+ 6.0
116
+ 6.5
117
+ 7.0
118
+ 7.5
119
+ dI/dV (10-4 G0)
120
+ FIG. 1.
121
+ (a) Schematic view of a standing PTCDA + 2Ag
122
+ nanostructure on the Ag(111) surface, including the STM
123
+ tip above the molecule.
124
+ The bar shows the tunneling cur-
125
+ rent IT measured above the standing nanostructure at con-
126
+ stant height. The white, grey and red spheres indicate hy-
127
+ drogen, carbon and oxygen atoms, respectively, of PTCDA.
128
+ (b) Constant-height STM image above a standing nanostruc-
129
+ ture recorded at a tip height of z ≃ 17.5 ˚A above the surface.
130
+ The bias voltage was V = −50 mV. The white cross marks
131
+ the location where the dI/dV conductance spectra were mea-
132
+ sured. The molecular plane is indicated by the dashed orange
133
+ line. (c) dI/dV conductance spectrum (blue) on a standing
134
+ metal-molecule nanostructure measured at T = 30 mK and
135
+ B = 0 T (Vmod = 50 µV). The tip was stabilized at IT = 45 pA
136
+ and V = −1 mV. The red curve shows the fit based on the
137
+ Frota function (see text for details). The spectrum is shown
138
+ in units of the conductance quantum G0 = 2e
139
+ h .
140
+ ature from a custom-built Knudsen cell. After evapora-
141
+ tion, the sample was flashed at 480 K for 2 min and then
142
+ cooled down to 100 K and transferred to the STM. All ex-
143
+ periments were performed in the J¨ulich Quantum Micro-
144
+ scope [21], a millikelvin scanning tunneling microscope
145
+ which uses the adiabatic demagnetization of electronic
146
+ magnetic moments in a magnetocaloric material to reach
147
+ temperatures in the range between 30 mK and 1 K. In
148
+ this instrument, B fields of up to 8 T perpendicular to the
149
+ sample surface can also be applied. Differential conduc-
150
+ tance (dI/dV ) spectra were measured using conventional
151
+ lock-in techniques with the STM feedback loop switched
152
+ off and an AC modulation amplitude Vmod = 20−100 µV
153
+ and frequency fmod = 187 Hz. The PtIr tip was treated
154
+ in-situ by applying controlled voltage pulses and indenta-
155
+ tions into the clean silver surface until the spectroscopic
156
+ signature of the Ag(111) surface state appeared.
157
+ The standing PTCDA + 2Ag nanostructure was fabri-
158
+ cated on the Ag(111) surface in three steps by controlled
159
+ manipulation with the tip of the STM as described in
160
+ Ref. [22]. First, two single Ag atoms were attached to
161
+ the two carboxylic oxygens on one side of the flat-lying
162
+ molecule by lateral manipulation with the tip.
163
+ Then,
164
+ one of the carboxylic oxygens on the opposite side was
165
+ contacted and the PTCDA molecule was pulled up on a
166
+ curved trajectory until it stood upright. The tip was then
167
+ moved straight up until the bond between the molecule
168
+ and the tip broke, leaving the molecule in the standing
169
+ position on the two Ag adatoms [22]. The stability of
170
+ the standing metal-molecule nanostructure arises from
171
+ the balance between local covalent interactions and non-
172
+ local long-range van der Waals forces [23, 24].
173
+ In constant-height STM images, the standing metal-
174
+ molecule nanostructure can be recognized by two fea-
175
+ tures that are distributed symmetrically around the plane
176
+ of the molecule (dashed orange line in Fig. 1b) and
177
+ separated by a nodal plane perpendicular to the latter
178
+ (Fig. 1b). It is interesting to note that the node of the π-
179
+ orbital in the plane of the molecule could not be resolved.
180
+ The two features coincide with the positions where the
181
+ interaction with the tip is most pronounced [22]. In the
182
+ standing configuration, there is only a weak overlap be-
183
+ tween the wave functions of the metallic surface and the
184
+ lowest unoccupied molecular orbital (LUMO) of PTCDA,
185
+ because the lobes of the molecular π-orbital are oriented
186
+ perpendicular to the plane of the molecule. This allows
187
+ the standing nanostructure to function as a quantum dot
188
+ and coherent field emitter [22].
189
+ At mK temperatures, a peak at zero bias is evident
190
+ in the dI/dV spectrum measured on a standing metal-
191
+ molecule nanostructure (Fig. 1c). In fact, at these low
192
+ temperatures we additionally observe a dip at zero bias
193
+ due to the dynamical Coulomb blockade (DCB) [25]. We
194
+ have thus corrected all dI/dV spectra on the standing
195
+ nanostructure for the DCB dip (see Supplementary Ma-
196
+ terial). Previous studies have hinted that the LUMO of
197
+ the standing metal-molecule nanostructure must contain
198
+ a single unpaired electron [22, 26]. Therefore, it is plausi-
199
+ ble to assume that the zero-bias peak originates from the
200
+ Kondo effect, in which the spin of this localized electron is
201
+ screened by itinerant substrate electrons. To verify this,
202
+ we measured dI/dV spectra at different B fields. Already
203
+ at B ≈ 100 − 120 mT a Zeeman splitting of the zero-bias
204
+ peak is discernable (Fig. 2a).
205
+ At higher B fields, the
206
+ Kondo effect is completely quenched and the spectrum is
207
+ dominated by the symmetric steps arising from inelastic
208
+ spin-flip excitations (Fig. 2b).
209
+ To extract the precise energy of the Zeeman splitting
210
+ ∆, we calculated the numerical derivative of the dI/dV
211
+ spectra and fitted the peak positions with a Gaussian (see
212
+ Supplementary Material). As shown in Figs. 2c and d,
213
+ the energies of the spin-flip excitations scale linearly with
214
+ the external B field. Only close to the critical field BC,
215
+ which is required to initially split the Kondo resonance,
216
+
217
+ 3
218
+ −1
219
+ 0
220
+ 1
221
+ Bias voltage (mV)
222
+ 1
223
+ 2
224
+ 3
225
+ 4
226
+ dI/dV (10-4 G0)
227
+ 0
228
+ 0.1
229
+ 0.2
230
+ B field (T)
231
+ 0.00
232
+ 0.01
233
+ 0.02
234
+ 0.03
235
+ Δ (mV)
236
+ (a)
237
+ (b)
238
+ (c)
239
+ (d)
240
+ 1 T
241
+ 3 T
242
+ 5 T
243
+ 7 T
244
+
245
+ −0.25
246
+ 0
247
+ 0.25
248
+ Bias voltage (mV)
249
+ 15
250
+ 20
251
+ 25
252
+ 30
253
+ 35
254
+ dI/dV (10-4 G0)
255
+ 0.08 T
256
+ 0.20 T
257
+ 0
258
+ 2.5
259
+ 5.0
260
+ B field (T)
261
+ 0.0
262
+ 0.2
263
+ 0.4
264
+ 0.6
265
+ 0.8
266
+ Δ (mV)
267
+ g = 2.006 ± 0.007
268
+ FIG. 2. (a)-(b) dI/dV spectra (blue) on a standing metal-
269
+ molecule nanostructure, measured at different B fields at
270
+ T
271
+ ≃ 50 mK (setpoints in panel (a) were IT
272
+ = 100 pA,
273
+ V = −10 mV, Vmod = 100 µV and IT = 100 pA, V = −1 mV,
274
+ Vmod = 20 µV in panel(b)).
275
+ In panel (a), the B field was
276
+ changed in steps of 20 mT. The orange curves in panel (b)
277
+ show the fits based on perturbation theory (see text for de-
278
+ tails). The spectra are vertically displaced for clarity. (c)-(d)
279
+ The Zeeman splitting ∆ extracted from the dI/dV spectra as
280
+ a function of B. The gray dashed line in panel (c) serves as a
281
+ guide for the eye. The red curve in panel (d) shows the linear
282
+ fit for the Zeeman splitting.
283
+ the Zeeman energy rises noticeably faster with increas-
284
+ ing B field. To extract the Land´e factor g, we consider
285
+ only the data points at B fields ≥ 1 T (Fig. 2b) since
286
+ the Kondo effect in the strong coupling regime leads to
287
+ renormalization of the g-factor. A linear fit of the form
288
+ ∆ = gµBB for the Zeeman effect, where µB is the Bohr
289
+ magneton, yields a Land´e factor g = 2.006 ± 0.007. By
290
+ interpolating the data points at low B fields, we obtain
291
+ BC = 108±5 mT for the critical field. Using the relation
292
+ [27]
293
+ BC = 1
294
+ 2
295
+ kBTK
296
+ gµB
297
+ ,
298
+ (1)
299
+ valid for temperatures T < 0.25 TK, this gives an esti-
300
+ mate of 291 ± 13 mK for the Kondo temperature TK.
301
+ An independent estimate of the Kondo temperature
302
+ TK can be obtained from the width of the Kondo reso-
303
+ nance (Fig. 1c). However, it should be noted that this is
304
+ only a rough estimate, since the width of the Kondo reso-
305
+ nance is related to TK by a non-universal scaling constant
306
+ [28]. To extract its width, we fitted the Kondo resonance
307
+ with a Frota line shape [29]
308
+ ρ(E)Frota = ℜ
309
+
310
+ iΓK
311
+ E − E0 + iΓK
312
+ .
313
+ (2)
314
+ Additional broadening effects due to the Fermi distri-
315
+ bution and the modulation amplitude were taken into
316
+ account.
317
+ The best fit then yields a width of ΓK ≃
318
+ 43 µV and thus a TK = ΓK(2π × 0.103)/kB ≃ 320 mK
319
+ [29], in good agreement with the above estimate from
320
+ the B field dependence.
321
+ We attribute the features in
322
+ the dI/dV spectrum at approximately ±0.25 mV and
323
+ ±0.55 mV (Fig. 1c and Supplementary Material) to ei-
324
+ ther molecular vibrations or frustrated translations of the
325
+ standing metal-molecule nanostructure [23]. Note that a
326
+ strong electron-vibrational coupling can also lead to a
327
+ further decrease of TK [30].
328
+ The low Kondo temperature of the standing nanostruc-
329
+ ture in conjunction with the low base temperature and
330
+ high energy resolution of our mK STM enable us to quan-
331
+ titatively describe the interaction of the localized spin
332
+ with its environment, also as a function of temperature.
333
+ For this purpose, we employ the Anderson-Appelbaum
334
+ model [31–33] and calculate the tunneling conductance
335
+ from the Kondo Hamiltonian in a perturbative approach
336
+ that includes processes up to third order in the exchange
337
+ interaction J [34]. The model allows tunneling electrons
338
+ to interact with the localized spin via spin-spin (tT S ˆσt·ˆS)
339
+ or potential scattering (tT S U). Here tT S is the matrix
340
+ element for a transition from the tip to the molecule or
341
+ vice versa, and ˆσt and ˆS are the spin operators of the
342
+ tunneling and localized electrons, respectively. In addi-
343
+ tion, the model takes into account the spin-spin exchange
344
+ scattering between the electrons of the substrate and the
345
+ localized spin (Jρ ˆσs · ˆS), where ρ denotes the substrate’s
346
+ electron density at the Fermi energy and ˆσs the spin oper-
347
+ ator of itinerant electrons in the substrate. This approach
348
+ provides the correct description under the following con-
349
+ ditions: the magnetic impurity is predominantly coupled
350
+ to one of the electrodes (here the substrate), the system
351
+ is in equilibrium (limit of small bias voltages), and the
352
+ system is in the weak coupling limit (T >∼ TK) or high-
353
+ field regime (B >∼ kBTK).
354
+ We performed least-square
355
+ fits and extracted the dimensionless coupling strength
356
+ Jρ between the substrate and the localized electron and
357
+ its Land´e factor g.
358
+ Before we focus on the temperature dependence, we
359
+ first examine the influence of the B field on Jρ at 50 mK
360
+ (Fig. 2b).
361
+ As the B field increases, we see a decrease
362
+ in the height of the peak structure on top of the steps
363
+ originating from spin-flip excitations. Since those peak
364
+ heights are proportional to Jρ [34], this indicates that
365
+ |Jρ| decreases with increasing B field.
366
+ This is clearly
367
+ seen in Fig. 3a, where the fitted Jρ is plotted versus B
368
+ field. It may at first sight seem surprising that we still
369
+ observe a coupling between the localized and itinerant
370
+ spins at high B fields.
371
+ This behaviour is, however, in
372
+
373
+ 4
374
+ −1
375
+ 0
376
+ 1
377
+ Bias voltage (mV)
378
+ 1
379
+ 2
380
+ 3
381
+ 4
382
+ 5
383
+ dI/dV (10-4 G0)
384
+ (a)
385
+ (b)
386
+ (c)
387
+ (d)
388
+ 1009 mK
389
+ 751 mK
390
+ 275 mK
391
+ 70 mK
392
+ 41 mK
393
+ 0
394
+ 2.5
395
+ 5.0
396
+ B field (T)
397
+ −0.10
398
+ −0.09
399
+ −0.08
400
+ −0.07
401
+ −0.06
402
+
403
+ 0
404
+ 500
405
+ 1000
406
+ Temperature (mK)
407
+ −0.06
408
+ −0.05
409
+ −0.04
410
+
411
+ ~TK
412
+ 0
413
+ 500
414
+ 1000
415
+ Temperature (mK)
416
+ 1.90
417
+ 1.95
418
+ 2.00
419
+ 2.05
420
+ g-factor
421
+ FIG. 3. (a) Coupling strength Jρ as extracted from the fits in
422
+ Fig. 2b as a function of B field. (b) dI/dV spectra (blue) on
423
+ a standing metal-molecule nanostructure, measured at differ-
424
+ ent temperatures in an external field B = 7 T (IT = 100 pA,
425
+ V
426
+ = −10 mV, Vmod = 100 µV). The orange curves show
427
+ the fits based on perturbation theory (see text for details).
428
+ The spectra are vertically displaced for clarity. (c) Coupling
429
+ strength Jρ as extracted from the fits as a function of tem-
430
+ perature. The dashed blue line indicates the Kondo energy
431
+ scale TK as determined from the B-field data of Fig. 2. (d)
432
+ Land´e g-factor estimated from the fits in panel (b) (black)
433
+ and the effective g-factor geff after taking into account renor-
434
+ malization effects due to the exchange interaction (red). The
435
+ red line illustrates a linear fit and the red shaded area the
436
+ corresponding confidence interval.
437
+ good agreement with numerical renormalization group
438
+ (NRG) calculations for an S = 1/2 Kondo impurity at
439
+ finite temperatures and B fields [27], in which it was
440
+ shown that the intensity of the split Kondo resonance
441
+ varies even if µBB/kBTK ≫ 1, which corresponds to the
442
+ present situation. In other words, we have even at high
443
+ B fields access to bias driven Kondo correlations whose
444
+ gradual emergence at decreasing temperatures drives |Jρ|
445
+ up. This behavior can be readily observed by looking at
446
+ the temperature-dependent data for constant B = 7 T
447
+ (Fig. 3b). The fits reveal that |Jρ| increases with decreas-
448
+ ing temperature (Fig. 3c). For B = 0, such an increase
449
+ of |Jρ| would signal the progressive breakdown of the
450
+ perturbation approach, yielding a divergence of Jρ and
451
+ the crossover into the Kondo singlet as a new ground
452
+ state [9, 10].
453
+ However, here we are in the high-field
454
+ regime and therefore will not reach the Kondo ground
455
+ state even in the limit T → 0. We note that the tem-
456
+ perature range in which the perturbation theory starts to
457
+ 0.5
458
+ 1.0
459
+ 1.5
460
+ 2.0
461
+ Setpoint conductance (10-4 G0)
462
+ −0.075
463
+ −0.070
464
+ −0.065
465
+ −0.060
466
+
467
+ zB,eq
468
+ zB,st
469
+ FIG. 4. Coupling strength Jρ as extracted from the fits of
470
+ dI/dV spectra on a standing metal-molecule nanostructure
471
+ that were measured for different setpoint conductances at T ≃
472
+ 45 mK and an external field of B = 7 T. The tip was initially
473
+ stabilized at IT = 100 pA and V = −6 mV and then moved
474
+ up by 1 ˚A in steps of 0.1 ˚A. The gray dashed line serves as a
475
+ guide for the eye. Insets show schematically how the PTCDA
476
+ molecule is pulled up by the tip.
477
+ collapse (Fig. 3b) agrees very well with the Kondo energy
478
+ scale of 291 ± 13 mK which was derived from the B-field
479
+ behaviour at low temperatures T < TK.
480
+ For the fitted Land´e factor g in Fig. 3d we also see a
481
+ strong decrease with increasing temperature. This can
482
+ be attributed to the energy renormalization [34]. Taking
483
+ this into account, we obtain an effective gyromagnetic
484
+ factor of geff = g(T)×(1+Jρ(T)) ≈ 1.91±0.01, which has
485
+ no temperature dependence. Note that the deviation of
486
+ the obtained g-factors from the B-field-dependent mea-
487
+ surements and from the perturbative approach is <∼ 6%.
488
+ Having demonstrated the sensitivity to changes of Jρ,
489
+ we now explore the possibility to tune the exchange cou-
490
+ pling mechanically. It was shown before that the standing
491
+ metal-molecule nanostructure is susceptible to attractive
492
+ forces from the tip, enabling controlled tilts, translations
493
+ and rotations [22]. If it was possible to tune the verti-
494
+ cal distance of the standing nanostructure from the sub-
495
+ strate with attractive forces from the STM tip, it might
496
+ also be possible to tune the exchange coupling Jρ. To
497
+ explore this possibility, we measured dI/dV spectra on
498
+ the standing metal-molecule nanostructure at B = 7 T
499
+ and T ≃ 45 mK for different setpoint conductances, cor-
500
+ responding to different distances between the tip and the
501
+ molecule. In Fig. 4 the fitted Jρ are plotted as a function
502
+ of setpoint conductances G. For G ≤ 0.6 · 10−4G0, the
503
+ coupling is constant at (Jρ)eq ≃ −0.075. With increasing
504
+ G, corresponding to decreasing tip-molecule distances,
505
+ |Jρ| decreases and reaches (Jρ)st ≃ −0.060 for the high-
506
+ est G. Measurements at even smaller distances (higher
507
+ setpoints) are not feasible, because the resulting larger
508
+ tunnel currents frequently induce sudden 30◦ rotations
509
+ of the standing nanostructure around its vertical axis.
510
+ Since we know that there are attractive forces acting be-
511
+
512
+ 5
513
+ tween the molecule and the tip [22, 23], we interpret the
514
+ decreasing |Jρ| as the result of an increased distance of
515
+ the standing metal-molecule nanostructure from the sur-
516
+ face. Under the assumption that the exchange interac-
517
+ tion scales exponentially with the bond distance zB [35],
518
+ J(zB) ∝ exp(−zB/dex), the vertical relaxation ∆zB of
519
+ the bond between the standing molecule and substrate
520
+ surface can be estimated. For a typical decay length of
521
+ the exchange interaction, dex ≃ 0.4 ˚A [35], we obtain
522
+ ∆zB = dex ln(Jeq/Jst) ≃ 0.09 ˚A between the smallest
523
+ and the largest G in Fig. 4.
524
+ In conclusion, we have shown that in the standing
525
+ configuration the exchange coupling between PTCDA
526
+ within the assembled nanostructure and the Ag(111) sub-
527
+ strate is strongly reduced, if compared to the flat-lying
528
+ molecule.
529
+ At B = 0 we observed a Kondo resonance
530
+ with a width of only ΓK ≃ 43 µV at an experimental
531
+ temperature of T = 30 mK. B-field-dependent measure-
532
+ ments showed that the standing metal-molecule nanos-
533
+ tructure is an S =
534
+ 1/2 system with a critical field of
535
+ BC = 108 ± 5 mT. This corresponds to a Kondo tem-
536
+ perature of only TK = 291 ± 13 mK. Furthermore, we
537
+ demonstrated that, using attractive forces exerted by the
538
+ STM tip, it is possible to tune the exchange coupling be-
539
+ tween the localized spin in the nanostructure and the
540
+ substrate. The combination of the small exchange cou-
541
+ pling and the softness of the surface bond against verti-
542
+ cal distortions makes the standing metal-molecule nanos-
543
+ tructure an interesting candidate for STM-based electron
544
+ spin resonance (STM-ESR) experiments. For STM-ESR
545
+ experiments on individual atoms and molecules [1, 3–
546
+ 5, 7, 16, 18, 35–40], two important requirements have to
547
+ be met [37, 41]: first, a sufficiently small coupling be-
548
+ tween the object to be investigated and the substrate,
549
+ in order to reach long relaxation and dephasing times,
550
+ and second, the possibility to drive with a high-frequency
551
+ electric field applied to the STM tip mechanical oscilla-
552
+ tions of the object in the inhomogeneous B field of the
553
+ tip, the latter being produced by a magnetic atom at
554
+ the tip apex.
555
+ Although a significant reduction of the
556
+ interaction between the atomic or molecular object of
557
+ interest with the metal substrate has been achieved on
558
+ different atomically thin insulating layers [15, 42], ESR
559
+ signals in the STM have been observed, somewhat sur-
560
+ prisingly, mainly on a bilayer of magnesium oxide (MgO)
561
+ film on Ag(001) surfaces [1, 3–5, 7, 16, 18, 35–40] and
562
+ recently for the first time on two-monolayer NaCl films
563
+ on Cu(100) [43]. In this situation, the standing metal-
564
+ molecule nanostructure may be a promising specimen: its
565
+ spin is more weakly coupled to the substrate than that
566
+ of Cu atoms on MgO/Ag(001), which are ESR active
567
+ [18], and the tip-induced displacement is about an order
568
+ of magnitude larger than the displacements required for
569
+ ESR-STM [37, 41]. It should be noted, however, that for
570
+ ESR-STM a dynamic displacement driven by the high-
571
+ frequency electric field is required, whereas in the present
572
+ experiment we so far only tested the response to static
573
+ forces between the molecule and the tip. But due to the
574
+ strong molecular polarizability of PTCDA [26], we an-
575
+ ticipate that the high-frequency electric field may have
576
+ a similar effect. In upcoming experiments we will there-
577
+ fore determine whether the dynamic displacement is suf-
578
+ ficiently large, and whether relaxation times are suffi-
579
+ ciently long for STM-ESR experiments. Finally, we note
580
+ that standing metal-molecule nanostructure can also be
581
+ prepared on the tip [26, 44, 45]. If it was indeed STM-
582
+ ESR capable, the standing nanostructure could therefore
583
+ be employed as a magnetic field sensor on the atomic
584
+ scale [13, 46], in addition to being a sensor of electric sur-
585
+ face potentials, as which it has already been used [44, 45].
586
+ We thank Frithjof B. Anders (TU Dortmund) for
587
+ fruitful discussions. The authors acknowledge financial
588
+ support from the German Federal Ministry of Educa-
589
+ tion and Research through the funding program ’quan-
590
+ tum technologies - from basic research to market’, un-
591
+ der Q-NL (project number 13N16032). M.T. acknowl-
592
+ edges funding by the Heisenberg Program (TE 833/2-
593
+ 1) of the Deutsche Forschungsgemeinschaft (DFG).
594
+ F.S.T. acknowledges funding by the DFG through SFB
595
+ 1083 ”Structure and Dynamics of Internal Interfaces”
596
+ (223848855-SFB 1083).
597
+ ∗ Corresponding author: [email protected]
598
+ [1] P. Willke, W. Paul, F. D. Natterer, K. Yang, Y. Bae,
599
+ T. Choi, J. Fern´andez-Rossier, A. J. Heinrich, , and C. P.
600
+ Lutz, Probing quantum coherence in single-atom electron
601
+ spin resonance, Science Advances 4, eaaq1543 (2022).
602
+ [2] A. J. Heinrich, J. A. Gupta, C. P. Lutz, and D. M. Ei-
603
+ gler, Single-atom spin-flip spectroscopy, Science 306, 466
604
+ (2004).
605
+ [3] K. Yang, W. Paul, S.-H. Phark, P. Willke, Y. Bae,
606
+ T. Choi, T. Esat, A. Ardavan, A. J. Heinrich, and C. P.
607
+ Lutz, Coherent spin manipulation of individual atoms on
608
+ a surface, Science 366, 509 (2019).
609
+ [4] P. Willke, T. Bilgeri, X. Zhang, Y. Wang, C. Wolf,
610
+ H. Aubin, A. Heinrich, and T. Choi, Coherent spin con-
611
+ trol of single molecules on a surface, ACS Nano 15, 17959
612
+ (2021).
613
+ [5] L. M. Veldman, L. Farinacci, R. Rejali, R. Broekhoven,
614
+ J. Gobeil, D. Coffey, M. Ternes, and A. F. Otte, Free
615
+ coherent evolution of a coupled atomic spin system ini-
616
+ tialized by electron scattering, Science 372, 964 (2021).
617
+ [6] A. A. Khajetoorians, D. Wegner, A. F. Otte, and
618
+ I. Swart, Creating designer quantum states of matter
619
+ atom-by-atom, Nature Reviews Physics 1, 703 (2019).
620
+ [7] K. Yang, S.-H. Phark, Y. Bae, T. Esat, P. Willke, A. Ar-
621
+ davan, A. J. Heinrich, and C. P. Lutz, Probing resonat-
622
+ ing valence bond states in artificial quantum magnets,
623
+ Nature Communications 12, 993 (2021).
624
+ [8] Y. He, S. K. Gorman, D. Keith, L. Kranz, J. G. Keizer,
625
+ and M. Y. Simmons, A two-qubit gate between phospho-
626
+ rus donor electrons in silicon, Nature 571, 371 (2019).
627
+ [9] J. Kondo, Resistance minimum in dilute magnetic alloys,
628
+
629
+ 6
630
+ Prog Theor Phys 32, 37 (1964).
631
+ [10] K. G. Wilson, The renormalization group: Critical phe-
632
+ nomena and the kondo problem, RMP 47, 773 (1975).
633
+ [11] M. Ternes, A. J. Heinrich, and W.-D. Schneider, Spec-
634
+ troscopic manifestations of the Kondo effect on single
635
+ adatoms, Journal of Physics:
636
+ Condensed Matter 21,
637
+ 053001 (2008).
638
+ [12] Y.-H. Zhang, S. Kahle, T. Herden, C. Stroh, M. Mayor,
639
+ U. Schlickum, M. Ternes, P. Wahl, and K. Kern, Temper-
640
+ ature and magnetic field dependence of a Kondo system
641
+ in the weak coupling regime, Nature Communications 4,
642
+ 2110 (2013).
643
+ [13] L. Garnier, B. Verlhac, P. Abufager, N. Lorente, M. Or-
644
+ maza, and L. Limot, The Kondo effect of a molecular tip
645
+ as a magnetic sensor, Nano Lett. 20, 8193 (2020).
646
+ [14] T. Frauhammer, H. Chen, T. Balashov, G. Deren-
647
+ bach, S. Klyatskaya, E. Moreno-Pineda, M. Ruben,
648
+ and W. Wulfhekel, Indirect spin-readout of rare-earth-
649
+ based single-molecule magnet with scanning tunneling
650
+ microscopy, PRL 127, 123201 (2021).
651
+ [15] W. Paul, K. Yang, S. Baumann, N. Romming, T. Choi,
652
+ C. Lutz, and A. Heinrich, Control of the millisecond spin
653
+ lifetime of an electrically probed atom, Nature Physics
654
+ 13, 403 (2017).
655
+ [16] F. D. Natterer, K. Yang, W. Paul, P. Willke, T. Choi,
656
+ T. Greber, A. J. Heinrich, and C. P. Lutz, Reading and
657
+ writing single-atom magnets, Nature 543, 226 (2017).
658
+ [17] A. F. Otte, M. Ternes, K. von Bergmann, S. Loth,
659
+ H. Brune, C. P. Lutz, C. F. Hirjibehedin, and A. J. Hein-
660
+ rich, The role of magnetic anisotropy in the Kondo effect,
661
+ Nature Physics 4, 847 (2008).
662
+ [18] K. Yang, P. Willke, Y. Bae, A. Ferr´on, J. L. Lado, A. Ar-
663
+ davan, J. Fern´andez-Rossier, A. J. Heinrich, and C. P.
664
+ Lutz, Electrically controlled nuclear polarization of indi-
665
+ vidual atoms, Nature Nanotechnology 13, 1120 (2018).
666
+ [19] S. M. Cronenwett, T. H. Oosterkamp, and L. P. Kouwen-
667
+ hoven, A tunable Kondo effect in quantum dots, Science
668
+ 281, 540 (1998).
669
+ [20] W. G. van der Wiel, S. D. Franceschi, T. Fujisawa,
670
+ J. M. Elzerman, S. Tarucha, and L. P. Kouwenhoven,
671
+ The Kondo effect in the unitary limit, Science 289, 2105
672
+ (2000).
673
+ [21] T. Esat, P. Borgens, X. Yang, P. Coenen, V. Cherepanov,
674
+ A. Raccanelli, F. S. Tautz, and R. Temirov, A millikelvin
675
+ scanning tunneling microscope in ultra-high vacuum with
676
+ adiabatic demagnetization refrigeration, Review of Scien-
677
+ tific Instruments 92, 063701 (2021).
678
+ [22] T. Esat, N. Friedrich, F. S. Tautz, and R. Temirov, A
679
+ standing molecule as a single-electron field emitter, Na-
680
+ ture 558, 573 (2018).
681
+ [23] M. Knol, H. H. Arefi, D. Corken, J. Gardner, F. S. Tautz,
682
+ R. J. Maurer, and C. Wagner, The stabilization poten-
683
+ tial of a standing molecule, Science Advances 7, eabj9751
684
+ (2022).
685
+ [24] H. H. Arefi, D. Corken, F. S. Tautz, R. J. Maurer, and
686
+ C. Wagner, Design principles for metastable standing
687
+ molecules, J. Phys. Chem. C 126, 6880 (2022).
688
+ [25] C. R. Ast, B. J¨ack, J. Senkpiel, M. Eltschka, M. Etzkorn,
689
+ J. Ankerhold, and K. Kern, Sensing the quantum limit
690
+ in scanning tunnelling spectroscopy, Nature Communica-
691
+ tions 7, 13009 (2016).
692
+ [26] R. Temirov, M. F. B. Green, N. Friedrich, P. Leinen,
693
+ T.
694
+ Esat,
695
+ P.
696
+ Chmielniak,
697
+ S.
698
+ Sarwar,
699
+ J.
700
+ Rawson,
701
+ P. K¨ogerler, C. Wagner, M. Rohlfing, and F. S. Tautz,
702
+ Molecular model of a quantum dot beyond the constant
703
+ interaction approximation, PRL 120, 206801 (2018).
704
+ [27] T. A. Costi, Kondo effect in a magnetic field and the
705
+ magnetoresistivity of Kondo alloys, PRL 85, 1504 (2000).
706
+ [28] T. Esat, T. Deilmann, B. Lechtenberg, C. Wagner,
707
+ P. Kr¨uger, R. Temirov, F. B. Anders, M. Rohlfing, and
708
+ F. S. Tautz, Transfering spin into an extended π orbital
709
+ of a large molecule, PRB 91, 144415 (2015).
710
+ [29] H. O. Frota, Shape of the Kondo resonance, PRB 45,
711
+ 1096 (1992).
712
+ [30] F. Eickhoff, E. Kolodzeiski, T. Esat, N. Fournier, C. Wag-
713
+ ner, T. Deilmann, R. Temirov, M. Rohlfing, F. S.
714
+ Tautz, and F. B. Anders, Inelastic electron tunneling
715
+ spectroscopy for probing strongly correlated many-body
716
+ systems by scanning tunneling microscopy, PRB 101,
717
+ 125405 (2020).
718
+ [31] J. Appelbaum, ”s − d” exchange model of zero-bias tun-
719
+ neling anomalies, PRL 17, 91 (1966).
720
+ [32] P. W. Anderson, Localized magnetic states and fermi-
721
+ surface anomalies in tunneling, PRL 17, 95 (1966).
722
+ [33] J. A. Appelbaum, Exchange model of zero-bias tunneling
723
+ anomalies, PR 154, 633 (1967).
724
+ [34] M. Ternes, Spin excitations and correlations in scan-
725
+ ning tunneling spectroscopy, New Journal of Physics 17,
726
+ 063016 (2015).
727
+ [35] K. Yang, W. Paul, F. D. Natterer, J. L. Lado, Y. Bae,
728
+ P. Willke, T. Choi, A. Ferr´on, J. Fern´andez-Rossier, A. J.
729
+ Heinrich, and C. P. Lutz, Tuning the exchange bias on a
730
+ single atom from 1 mT to 10 T, PRL 122, 227203 (2019).
731
+ [36] S. Baumann, W. Paul, T. Choi, C. P. Lutz, A. Ardavan,
732
+ and H. Andreas, J., Electron paramagnetic resonance of
733
+ individual atoms on a surface, Science 350, 417 (2015).
734
+ [37] T. S. Seifert, S. Kovarik, D. M. Juraschek, N. A. Spaldin,
735
+ P. Gambardella, and S. Stepanow, Longitudinal and
736
+ transverse electron paramagnetic resonance in a scan-
737
+ ning tunneling microscope, Science Advances 6, eabc5511
738
+ (2020).
739
+ [38] P. Willke, A. Singha, X. Zhang, T. Esat, C. P. Lutz, A. J.
740
+ Heinrich, and T. Choi, Tuning single-atom electron spin
741
+ resonance in a vector magnetic field, Nano Lett. 19, 8201
742
+ (2019).
743
+ [39] W. M. J. van Weerdenburg, M. Steinbrecher, N. P. E.
744
+ van Mullekom, J. W. Gerritsen, H. von Allw¨orden, F. D.
745
+ Natterer, and A. A. Khajetoorians, A scanning tunnel-
746
+ ing microscope capable of electron spin resonance and
747
+ pump-probe spectroscopy at mk temperature and in vec-
748
+ tor magnetic field, Review of Scientific Instruments 92,
749
+ 033906 (2021).
750
+ [40] T. S. Seifert, S. Kovarik, C. Nistor, L. Persichetti,
751
+ S. Stepanow, and P. Gambardella, Single-atom electron
752
+ paramagnetic resonance in a scanning tunneling micro-
753
+ scope driven by a radio-frequency antenna at 4 k, Phys.
754
+ Rev. Research 2, 013032 (2020).
755
+ [41] J. L. Lado, A. Ferr´on, and J. Fern´andez-Rossier, Ex-
756
+ change mechanism for electron paramagnetic resonance
757
+ of individual adatoms, PRB 96, 205420 (2017).
758
+ [42] S. Loth, M. Etzkorn, C. P. Lutz, D. M. Eigler, and A. J.
759
+ Heinrich, Measurement of fast electron spin relaxation
760
+ times with atomic resolution, Science 329, 1628 (2010).
761
+ [43] R. Kawaguchi, K. Hashimoto, T. Kakudate, K. Katoh,
762
+ M. Yamashita, and T. Komeda, Spatially resolving elec-
763
+ tron spin resonance of π-radical in single-molecule mag-
764
+ net, Nano Lett. 10.1021/acs.nanolett.2c04049 (2022).
765
+ [44] C. Wagner, M. F. B. Green, P. Leinen, T. Deilmann,
766
+
767
+ 7
768
+ P. Kr¨uger, M. Rohlfing, R. Temirov, and F. S. Tautz,
769
+ Scanning quantum dot microscopy, PRL 115, 026101
770
+ (2015).
771
+ [45] C. Wagner, M. F. B. Green, M. Maiworm, P. Leinen,
772
+ T.
773
+ Esat,
774
+ N.
775
+ Ferri,
776
+ N.
777
+ Friedrich,
778
+ R.
779
+ Findeisen,
780
+ A. Tkatchenko, R. Temirov, and F. S. Tautz, Quanti-
781
+ tative imaging of electric surface potentials with single-
782
+ atom sensitivity, Nature Materials 18, 853 (2019).
783
+ [46] B. Verlhac, N. Bachellier, L. Garnier, M. Ormaza, P. Ab-
784
+ ufager, R. Robles, B. M.-L., M. Ternes, N. Lorente,
785
+ and L. Limot, Atomic-scale spin sensing with a single
786
+ molecule at the apex of a scanning tunneling microscope,
787
+ Science 366, 623 (2019).
788
+
19FKT4oBgHgl3EQfPS1l/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1NFPT4oBgHgl3EQfUTQQ/content/2301.13056v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6edc928228b07646e11ec518d33995b24ba8a05a22e3802f9df4d2d8ba8767d5
3
+ size 260066
1NFPT4oBgHgl3EQfUTQQ/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:311ab387d046180d490103b86b55132937f1daf3c1ac99edc6c401888247423d
3
+ size 2949165
1NFPT4oBgHgl3EQfUTQQ/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:77d448ebc19d885e4ef029312a83621a8ff96ec9cc3b7c25bf54a5bca7691c60
3
+ size 111914
3NE2T4oBgHgl3EQf5wjH/content/tmp_files/2301.04194v1.pdf.txt ADDED
@@ -0,0 +1,2870 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04194v1 [math.OC] 10 Jan 2023
2
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH
3
+ MULTIPLICATIVE REWARD
4
+ DAMIAN JELITO∗,† AND �LUKASZ STETTNER∗
5
+ Abstract. We consider a long-run impulse control problem for a generic
6
+ Markov process with a multiplicative reward functional. We construct a solu-
7
+ tion to the associated Bellman equation and provide a verification result. The
8
+ argument is based on the probabilistic properties of the underlying process
9
+ combined with the Krein-Rutman theorem applied to the specific non-linear
10
+ operator. Also, it utilises the approximation of the problem in the bounded
11
+ domain and with the help of the dyadic time-grid.
12
+ Keywords: impulse control, Bellman equation, risk-sensitive criterion, Markov
13
+ process
14
+ MSC2020 subject classifications: 93E20, 49J21, 49K21, 60J25
15
+ 1. Introduction
16
+ Impulse control constitutes a versatile framework for controlling real-life stochas-
17
+ tic systems. In this type of control, a decision-maker determines intervention times
18
+ and instantaneous after-intervention states of the controlled process. By doing so,
19
+ one can affect a continuous time phenomenon in a discrete time manner. Conse-
20
+ quently, impulse control attracted considerable attention in the mathematical liter-
21
+ ature; see e.g. [4, 9, 26] for classic contributions and [3, 10, 19, 21] for more recent
22
+ results. In addition to generic mathematical properties, impulse control problems
23
+ were studied with reference to specific applications including i.a. controlling ex-
24
+ change rates, epidemics, and portfolios with transaction costs; see e.g. [18, 25, 27]
25
+ and references therein.
26
+ When looking for an optimal impulse control strategy, one must decide on the
27
+ optimality criterion.
28
+ Recently, considerable attention was paid to the so-called
29
+ risk-sensitive functional given, for any γ ∈ R, by
30
+ µγ(Z) :=
31
+
32
+ 1
33
+ γ ln E[exp(γZ)],
34
+ γ ̸= 0,
35
+ E[Z],
36
+ γ = 0,
37
+ (1.1)
38
+ where Z is a (random) payoff corresponding to a chosen control strategy; see [14] for
39
+ a seminal contribution. This functional with γ = 0 corresponds to the usual linear
40
+ criterion and the case γ < 0 is associated with risk-averse preferences; see [5] for
41
+ a comprehensive overview. Also, the functional with γ > 0 could be linked to the
42
+ asymptotics of the power utility function; see [31] for details. Recent comprehensive
43
+ discussion on the long-run version with µγ could be found in [6]. We refer also
44
+ ∗Institute of Mathematics, Polish Academy of Sciences, Warsaw, Poland
45
+ E-mail addresses: [email protected], [email protected].
46
+ †Corresponding author.
47
+ 1
48
+
49
+ 2
50
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
51
+ to [23] and references therein for a discussion on the connection between (1.1) and
52
+ the duality of the large deviations-based criteria.
53
+ In this paper we focus on the use of the functional µγ with γ > 0. More specif-
54
+ ically, we consider the impulse control problem for some continuous time Markov
55
+ process and construct a solution to the associated Bellman equation which char-
56
+ acterises an optimal impulse control strategy. To do this, we study the family of
57
+ impulse control problems in bounded domains and then extend the analysis to the
58
+ generic locally compact state space. This idea was used in [1], where PDEs tech-
59
+ niques were applied to obtain the characterisation of the controlled diffusions in the
60
+ risks-sensitive setting. A similar approximation for the the average cost per unit
61
+ time problem was considered in [32].
62
+ The main contribution of this paper is a construction of a solution to the Bell-
63
+ man equation associated with the problem, see Theorem 5.1 for details. It should
64
+ be noted that we get a bounded solution even though the state space could be
65
+ unbounded and we assume virtually no ergodicity conditions for the uncontrolled
66
+ process. Also, note that present results for γ > 0 complement our recent findings
67
+ on the impulse control with the risk-averse preferences; see [24] for the dyadic case
68
+ and [15] for the continuous time framework. Nevertheless, it should be noted that
69
+ the techniques for γ < 0 and γ > 0 are substantially different and it is not possible
70
+ to directly transform the results in one framework to the other; see e.g. [16, 20] for
71
+ further discussion.
72
+ The structure of this paper is as follows. In Section 2 we formally introduce
73
+ the problem, discuss the assumptions and, in Theorem 2.3, provide a verification
74
+ argument. Next, in Section 3 we consider an auxiliary dyadic problem in a bounded
75
+ domain and in Theorem 3.1 we construct a solution to the corresponding Bellman
76
+ equation. This is used in Section 4 where we extend our analysis to the unbounded
77
+ domain with the dyadic time-grid; see Theorem 4.2. Next, in Section 5 we finally
78
+ construct a solution to the Bellman equation for the original problem; see Theo-
79
+ rem 5.1. Finally, in Appendix A we discuss some properties of the optimal stopping
80
+ problems that are used in this paper.
81
+ 2. Preliminaries
82
+ Let X = (Xt)t≥0 be a continuous time standard Feller–Markov process on a
83
+ filtered probability space (Ω, F, (Ft), P). The process X takes values in a locally
84
+ compact separable metric space E endowed with a metric ρ and the Borel σ-field
85
+ E. With any x ∈ E we associate a probability measure Px describing the evolution
86
+ of the process X starting in x; see Section 1.4 in [28] for details. Also, we use Ex,
87
+ x ∈ E, and Pt(x, A) := Px[Xt ∈ A], t ≥ 0, x ∈ E, A ∈ E, for the corresponding
88
+ expectation operator and the transition probability, respectively.
89
+ By Cb(E) we
90
+ denote the family of continuous bounded real-valued functions on E.
91
+ Also, to
92
+ ease the notation, by T , Tx, and Tx,b we denote the families of stopping times,
93
+ Px a.s. finite stopping times, and Px a.s. bounded stopping times, respectively.
94
+ Also, for any δ > 0, by T δ ⊂ T , T δ
95
+ x ⊂ Tx, and T δ
96
+ x,b ⊂ Tx,b, we denote the
97
+ respective subfamilies of dyadic stopping times, i.e.
98
+ those taking values in the
99
+ set {0, δ, 2δ, . . .} ∪ {∞}.
100
+ Throughout this paper we fix some compact U ⊆ E and we assume that a
101
+ decision-maker is allowed to shift the controlled process to U. This is done with
102
+ the help of an impulse control strategy, i.e. a sequence V := (τi, ξi)∞
103
+ i=1, where (τi)
104
+
105
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
106
+ 3
107
+ is an increasing sequence of stopping times and (ξi) is a sequence of Fτi-measurable
108
+ after-impulse states with values in U. With any starting point x ∈ E and a strategy
109
+ V we associate a probability measure P(x,V ) for the controlled process Y . Under this
110
+ measure, the process starts at x and follows its usual (uncontrolled) dynamics up
111
+ to the time τ1. Then, it is immediately shifted to ξ1 and starts its evolution again,
112
+ etc. More formally, we consider a countable product of filtered spaces (Ω, F, (Ft))
113
+ and a coordinate process (X1
114
+ t , X2
115
+ t , . . .). Then, we define the controlled process Y
116
+ as Yt := Xi
117
+ t, t ∈ [τi−1, τi) with the convention τ0 ≡ 0. Under the measure P(x,V )
118
+ we get Yτi = ξi; we refer to Chapter V in [26] for the construction details; see
119
+ also Appendix in [8] and Section 2 in [29]. A strategy V = (τi, ξi)∞
120
+ i=1 is called
121
+ admissible if for any x ∈ E we get P(x,V )[limn→∞ τn = ∞] = 1. The family of
122
+ admissible impulse control strategies is denoted by V. Also, note that, to simplify
123
+ the notation, by Yτ −
124
+ i := Xi
125
+ τi, i ∈ N∗, we denote the state of the process right before
126
+ the ith impulse (yet, possibly, after the jump).
127
+ In this paper we study the asymptotics of the impulse control problem given by
128
+ sup
129
+ V ∈V
130
+ J(x, V ),
131
+ x ∈ E,
132
+ (2.1)
133
+ where, for any x ∈ E and V ∈ V, we set
134
+ J(x, V ) := lim inf
135
+ T →∞
136
+ 1
137
+ T ln E(x,V )
138
+
139
+ e
140
+ � T
141
+ 0 f(Ys)ds+�∞
142
+ i=1 1{τi≤T }c(Yτ−
143
+ i
144
+ ,ξi)�
145
+ ,
146
+ (2.2)
147
+ with f denoting the running cost function and c being the shift-cost function,
148
+ respectively. Note that this could be seen as a long-run standardised version of
149
+ the functional (1.1) with γ > 0 applied to the impulse control framework. Here,
150
+ the standardisation refers to the fact that we do not use directly the parameter γ
151
+ (apart from its sign). Also, the problem is of the long-run type, i.e. the utility is
152
+ averaged over time which improves the stability of the results.
153
+ The analysis in this paper is based on the approximation of the problem in a
154
+ bounded domain.
155
+ Thus, we fix a sequence (Bm)m∈N of compact sets satisfying
156
+ Bm ⊂ Bm+1 and E = �∞
157
+ m=0 Bm. Also, we assume that U ⊂ B0. Next, we assume
158
+ the following conditions.
159
+ (A1) (Cost functions). The map f : E �→ R− is a continuous and bounded. Also,
160
+ the map c : E × U �→ R− is continuous, bounded, and strictly non-positive,
161
+ and satisfies the triangle inequality, i.e. for some c0 < 0, we have
162
+ 0 > c0 ≥ c(x, ξ) ≥ c(x, η) + c(η, ξ),
163
+ x ∈ E, ξ, η ∈ U.
164
+ Also, we assume that c satisfies the uniform limit at infinity condition
165
+ lim
166
+ ∥x∥,∥y∥→∞ sup
167
+ ξ∈U
168
+ |c(x, ξ) − c(y, ξ)| = 0.
169
+ (2.3)
170
+ (A2) (Transition probability continuity). For any t, the transition probability Pt
171
+ is continuous with respect to the total variation norm, i.e. for any sequence
172
+ (xn) ⊂ E converging to x ∈ E, we get
173
+ lim
174
+ n→∞ sup
175
+ A∈E
176
+ |Pt(xn, A) − Pt(x, A)| = 0.
177
+ (A3) (Distance control). For any compact set Γ ⊂ E, t0 > 0, and r0 > 0, we
178
+ have
179
+ lim
180
+ r→∞ MΓ(t0, r) = 0,
181
+ lim
182
+ t→0 MΓ(t, r0) = 0,
183
+ (2.4)
184
+
185
+ 4
186
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
187
+ where MΓ(t, r) := supx∈Γ Px[sups∈[0,t] ρ(Xs, x) ≥ r], t, r > 0.
188
+ (A4) (Process irreducibility). For any m ∈ N, x ∈ Bm, δ > 0, and any open set
189
+ O ⊂ Bm, we have
190
+ Px [∪∞
191
+ i=1{Xiδ ∈ O}] = 1.
192
+ Also, we assume that for any x ∈ E, δ > 0, and m ∈ N, we have
193
+ Px[τBm < ∞] = 1
194
+ (2.5)
195
+ where τBm := δ inf{k ∈ N: Xkδ /∈ Bm}.
196
+ Before we proceed, let us comment on these assumptions. First, note that (A1)
197
+ states typical cost-functions conditions. In particular, the non-positivity assump-
198
+ tion for f is merely a technical normalisation. Indeed, for a generic ˜f ∈ Cb(E) we
199
+ may set f(·) := ˜f(·) − ∥ ˜f∥ ≤ 0 to get
200
+ Jf(x, V ) = J
201
+ ˜f(x, V ) − ∥ ˜f∥,
202
+ x ∈ E, V ∈ V,
203
+ where Jf denotes the version of the functional J from (2.2) corresponding to the
204
+ running cost function f.
205
+ Second, Assumption (A2) states that the transition probabilities Pt(x, ·) are
206
+ continuous with respect to the total variation norm. Note that this directly implies
207
+ that the transition semigroup associated to X is strong Feller, i.e. for any t > 0
208
+ and a bounded measurable map h: E �→ R, the map x �→ Ex[h(Xt)] is continuous
209
+ and bounded.
210
+ Third, Assumption (A3) quantifies distance control properties of the underlying
211
+ process. It states that, for a fixed time horizon, the process with a high probability
212
+ stays close to its starting point and, with a fixed radius, with a high probability it
213
+ does not leave the corresponding ball with a sufficiently short time horizon. Note
214
+ that these properties are automatically satisfied if the transition semigroup is C0-
215
+ Feller; see Proposition 2.1 in [21] and Proposition 6.4 in [2] for details.
216
+ Finally, Assumption (A4) states a form of the irreducibility of the process X. It
217
+ requires that the process visits a sufficiently rich family of sets with unit probability.
218
+ To solve (2.1), we show the existence of a solution to the impulse control Bellman
219
+ equation, i.e. a function w ∈ Cb(E) and a constant λ ∈ R satisfying
220
+ w(x) = sup
221
+ τ∈Tx,b
222
+ ln Ex
223
+
224
+ exp
225
+ �� τ
226
+ 0
227
+ (f(Xs) − λ)ds + Mw(Xτ)
228
+ ��
229
+ ,
230
+ x ∈ E,
231
+ (2.6)
232
+ where the operator M is given by
233
+ Mh(x) := sup
234
+ ξ∈U
235
+ (c(x, ξ) + h(ξ)),
236
+ h ∈ Cb(E), x ∈ E.
237
+ We start with a simple observation giving a lower bound for the constant λ
238
+ from (2.6). To do this, we define the semi-group type by
239
+ r(f) := lim
240
+ t→∞
241
+ 1
242
+ t ln sup
243
+ x∈E
244
+ Ex
245
+
246
+ e
247
+ � t
248
+ 0 f(Xs)ds�
249
+ ;
250
+ (2.7)
251
+ see e.g. Proposition 1 in [30] for a discussion on the properties of r(f).
252
+ Lemma 2.1. Let (w, λ) be a solution to (2.6). Then, we get λ ≥ r(f).
253
+ Proof. From (2.6), for any T ≥ 0, we get
254
+ w(x) ≥ ln Ex
255
+
256
+ e
257
+ � T
258
+ 0 (f(Xs)−λ)ds+Mw(XT )�
259
+ .
260
+
261
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
262
+ 5
263
+ Thus, using the boundedness of w and Mw, we get
264
+ ∥w∥ ≥ sup
265
+ x∈E
266
+ ln Ex
267
+
268
+ e
269
+ � T
270
+ 0 (f(Xs)−λ)ds�
271
+ − ∥Mw∥.
272
+ Consequently, dividing both hand-sides by T and letting T → ∞, we get 0 ≥
273
+ r(f − λ), which concludes the proof.
274
+
275
+ Let us now link a solution to (2.6) with the optimal value and an optimal strategy
276
+ for (2.1). To ease the notation, we recursively define the strategy ˆV := (ˆτi, ˆξi)∞
277
+ i=1
278
+ for i ∈ N \ {0} by
279
+
280
+ ˆτi
281
+ := inf{t ≥ ˆτi−1 : w(Xi
282
+ t) = Mw(Xi
283
+ t)},
284
+ ˆξi
285
+ := arg maxξ∈U
286
+
287
+ c(Xi
288
+ ˆτi, ξ) + w(ξ)
289
+
290
+ 1{ˆτi<∞} + ξ01{ˆτi=∞},
291
+ (2.8)
292
+ where ˆτ0 := 0 and ξ0 ∈ U is some fixed point. First, we show that ˆV is a proper
293
+ strategy.
294
+ Proposition 2.2. The strategy ˆV given by (2.8) is admissible.
295
+ Proof. To ease the notation, we define N(0, T ) := �∞
296
+ i=1 1{ˆτi≤T }, T ≥ 0. We fix
297
+ some T > 0 and x ∈ E, and show that we get
298
+ P(x, ˆV )[N(0, T ) = ∞] = 0.
299
+ (2.9)
300
+ Recalling (2.8), on the event A := {limi→∞ ˆτi < +∞}, for any n ∈ N, n ≥ 1,
301
+ we get w(Xn
302
+ ˆτn) = Mw(Xn
303
+ ˆτn) = c(Xn
304
+ ˆτn, Xn+1
305
+ ˆτn
306
+ ) + w(Xn+1
307
+ ˆτn
308
+ ).
309
+ Also, recalling that
310
+ c(x, ξ) ≤ c0 < 0, x ∈ E, ξ ∈ U, for any n ∈ N, n ≥ 1, we have w(Xn+1
311
+ ˆτn
312
+ )−w(Xn
313
+ ˆτn) =
314
+ −c(Xn
315
+ ˆτn, Xn+1
316
+ ˆτn
317
+ ) ≥ −c0 > 0. Using this observation and Assumption (A3), we esti-
318
+ mate the distance between consecutive impulses which will be used to prove (2.9).
319
+ More specifically, for any k, m ∈ N, k, m ≥ 1, we get
320
+ k+m−2
321
+
322
+ n=k
323
+ (w(Xn+1
324
+ ˆτn
325
+ ) − w(Xn+1
326
+ ˆτn+1)) + (w(Xk+m
327
+ ˆτk+m−1) − w(Xk+1
328
+ ˆτk
329
+ ))
330
+ = w(Xk+1
331
+ ˆτk
332
+ ) +
333
+ k+m−1
334
+
335
+ n=k+1
336
+ (w(Xn+1
337
+ ˆτn
338
+ ) − w(Xn
339
+ ˆτn)) − w(Xk+1
340
+ ˆτk
341
+ )
342
+ =
343
+ k+m−1
344
+
345
+ n=k+1
346
+ (w(Xn+1
347
+ ˆτn
348
+ ) − w(Xn
349
+ ˆτn)) ≥ −(m − 1)c0;
350
+ (2.10)
351
+ it should be noted that the specific values for k and m will be determined later.
352
+ Using the continuity of w we may find K > 0 such that supx,y∈U(w(x) − w(y)) ≤
353
+ K.
354
+ Let m ∈ N be big enough to get −(m − 1) c0
355
+ 2
356
+ > K.
357
+ Thus, noting that
358
+ Xk+m
359
+ ˆτk+m−1, Xk+1
360
+ ˆτk
361
+ ∈ U, we have (w(Xk+m
362
+ ˆτk+m−1) − w(Xk+1
363
+ ˆτk
364
+ )) ≤ K < −(m − 1) c0
365
+ 2 . Con-
366
+ sequently, recalling (2.10), on A, we get
367
+ k+m−2
368
+
369
+ n=k
370
+ (w(Xn+1
371
+ ˆτn
372
+ ) − w(Xn+1
373
+ ˆτn+1)) ≥ −(m − 1)c0
374
+ 2 .
375
+ (2.11)
376
+ Recalling the compactness of U and the continuity of w we may find r > 0 such
377
+ that for any x ∈ U and y ∈ E satisfying ρ(x, y) < r we get |w(x) − w(y)| < − c0
378
+ 2 .
379
+
380
+ 6
381
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
382
+ Let us now consider the family of events
383
+ Bk :=
384
+ k+m−2
385
+
386
+ n=k
387
+ {ρ(Xn+1
388
+ ˆτn
389
+ , Xn+1
390
+ ˆτn+1) < r},
391
+ k ∈ N, k ≥ 1,
392
+ (2.12)
393
+ and note that, for any k ∈ N, k ≥ 1, on Bk ∩ A we have �k+m−2
394
+ n=k
395
+ (w(Xn+1
396
+ ˆτn
397
+ ) −
398
+ w(Xn+1
399
+ ˆτn+1)) < −(m − 1) c0
400
+ 2 . Thus, recalling (2.11), for any k ∈ N, k ≥ 1, we get
401
+ P(x0, ˆV )[Bk ∩ A] = 0 and, in particular, we have
402
+ P(x0, ˆV )[Bk ∩ {N(0, T ) = ∞}] = 0.
403
+ (2.13)
404
+ Let us now show that lim supk→∞ P(x0, ˆV )[Bc
405
+ k ∩{N(0, T ) = ∞}] = 0. Noting that
406
+ {N(0, T ) = ∞} = {limi→∞ ˆτi ≤ T }, for any t0 > 0 and k ∈ N, k ≥ 1, we get
407
+ P(x0, ˆV ) [Bc
408
+ k ∩ {N(0, T ) = ∞}]
409
+ ≤ P(x0, ˆV )
410
+ ��k+m−2
411
+
412
+ n=k
413
+ {ρ(Xn+1
414
+ ˆτn
415
+ , Xn+1
416
+ ˆτn+1) ≥ r} ∩ {ˆτn+1 − ˆτn ≤ t0}
417
+
418
+ ∩ { lim
419
+ i→∞ ˆτi ≤ T }
420
+
421
+ + P(x0, ˆV )
422
+ ��k+m−2
423
+
424
+ n=k
425
+ {ρ(Xn+1
426
+ ˆτn
427
+ , Xn+1
428
+ ˆτn+1) ≥ r} ∩ {ˆτn+1 − ˆτn > t0}
429
+
430
+ ∩ { lim
431
+ i→∞ ˆτi ≤ T }
432
+
433
+ ≤ P(x0, ˆV )
434
+ �k+m−2
435
+
436
+ n=k
437
+ { sup
438
+ t∈[0,t0]
439
+ ρ(Xn+1
440
+ ˆτn
441
+ , Xn+1
442
+ ˆτn+t) ≥ r} ∩ { lim
443
+ i→∞ ˆτi ≤ T }
444
+
445
+ + P(x0, ˆV )
446
+ �k+m−2
447
+
448
+ n=k
449
+ {ˆτn+1 − ˆτn > t0} ∩ { lim
450
+ i→∞ ˆτi ≤ T }
451
+
452
+ .
453
+ (2.14)
454
+ Using Assumption (A3), for any ε > 0, we may find t0 > 0, such that
455
+ sup
456
+ x∈U
457
+ Px
458
+
459
+ sup
460
+ t∈[0,t0]
461
+ ρ(X0, Xt) ≥ r
462
+
463
+
464
+ ε
465
+ m − 1.
466
+ (2.15)
467
+ Thus, using the strong Markov property and noting that Xn+1
468
+ ˆτn
469
+ ∈ U, for any k ∈ N,
470
+ k ≥ 1, we get
471
+ P(x0, ˆV )
472
+ �k+m−2
473
+
474
+ n=k
475
+ { sup
476
+ t∈[0,t0]
477
+ ρ(Xn+1
478
+ ˆτn
479
+ , Xn+1
480
+ ˆτn+t) ≥ r} ∩ { lim
481
+ i→∞ ˆτi ≤ T }
482
+
483
+
484
+ k+m−2
485
+
486
+ n=k
487
+ P(x0, ˆV )
488
+
489
+ { sup
490
+ t∈[0,t0]
491
+ ρ(Xn+1
492
+ ˆτn
493
+ , Xn+1
494
+ ˆτn+t) ≥ r} ∩ {ˆτn ≤ T }
495
+
496
+ =
497
+ k+m−2
498
+
499
+ n=k
500
+ P(x0, ˆV )
501
+
502
+ {ˆτn ≤ T }PXn+1
503
+ ˆτn
504
+
505
+ sup
506
+ t∈[0,t0]
507
+ ρ(X0, Xt) ≥ r
508
+ ��
509
+ ≤ ε.
510
+ (2.16)
511
+ Recalling that ε > 0 was arbitrary, for any k ∈ N, k ≥ 1, we get
512
+ P(x0, ˆV )
513
+ �k+m−2
514
+
515
+ n=k
516
+ { sup
517
+ t∈[0,t0]
518
+ ρ(Xn+1
519
+ ˆτn
520
+ , Xn+1
521
+ ˆτn+t) ≥ r} ∩ { lim
522
+ i→∞ ˆτi ≤ T }
523
+
524
+ = 0.
525
+ (2.17)
526
+
527
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
528
+ 7
529
+ Now, to ease the notation, let Ck := �∞
530
+ n=k{ˆτn+1 − ˆτn > t0} ∩ {limi→∞ ˆτi ≤ T },
531
+ k ∈ N, k ≥ 1, and note that Ck+1 ⊂ Ck, k ∈ N, k ≥ 1. We show that
532
+ lim
533
+ k→∞ P(x0, ˆV ) [Ck] = 0.
534
+ For the contradiction, assume that limk→∞ P(x0, ˆV ) [Ck] > 0. Consequently, we get
535
+ P(x0, ˆV ) [�∞
536
+ k=1 Ck] > 0. Note that for any ω ∈ �∞
537
+ k=1 Ck we have limi→∞ ˆτi(ω) ≤ T .
538
+ In particular, we may find i0 ∈ N such that for any n ≥ i0 we get ˆτn+1(ω)− ˆτn(ω) ≤
539
+ t0
540
+ 2 . This leads to the contradiction as from the fact that ω ∈ �∞
541
+ k=1 Ck we also get
542
+ ω ∈
543
+
544
+
545
+ k=1
546
+
547
+
548
+ n=k
549
+ {ˆτn+1 − ˆτn > t0} ⊂
550
+
551
+
552
+ n=i0
553
+ {ˆτn+1 − ˆτn > t0}.
554
+ Consequently, we get limk→∞ P(x0, ˆV ) [Ck] = 0 and, in particular, we get
555
+ lim sup
556
+ k→∞
557
+ P(x0, ˆV )
558
+ �k+m−2
559
+
560
+ n=k
561
+ {ˆτn+1 − ˆτn > t0} ∩ { lim
562
+ i→∞ ˆτi ≤ T }
563
+
564
+ ≤ lim
565
+ k→∞ P(x0, ˆV ) [Ck] = 0.
566
+ Hence, recalling (2.14) and (2.17), we get
567
+ lim sup
568
+ k→∞
569
+ P(x0, ˆV ) [Bc
570
+ k ∩ {N(0, T ) = ∞}] = 0.
571
+ Thus, recalling (2.13), for any k ∈ N, k ≥ 1, we obtain
572
+ P(x0, ˆV ) [N(0, T ) = ∞] = P(x0, ˆV ) [Bc
573
+ k ∩ {N(0, T ) = ∞}] ,
574
+ and letting k → ∞, we conclude the proof of (2.9).
575
+
576
+ Now, we show the verification result linking (2.6) with the optimal value and an
577
+ optimal strategy for (2.1).
578
+ Theorem 2.3. Let (w, λ) be a solution to (2.6) with λ > r(f). Then, we get
579
+ λ = sup
580
+ V ∈V
581
+ J(x, V ) = J(x, ˆV ),
582
+ x ∈ E,
583
+ where the strategy ˆV is given by (2.8).
584
+ Proof. The proof is based on the argument from Theorem 4.4 in [15] thus we show
585
+ only an outline. First, we show that λ = J(x, ˆV ), x ∈ E, where the strategy ˆV is
586
+ given by (2.8). Let us fix x ∈ E. Then, combining the argument used in Lemma
587
+ 7.1 in [2] and Proposition A.3, we get that the process
588
+ e
589
+ � ˆτ1∧T
590
+ 0
591
+ (f(X1
592
+ s )−λ)ds+w(X1
593
+ ˆτ1∧T ),
594
+ T ≥ 0,
595
+ is a P(x, ˆV )-martingale. Noting that on the event {ˆτk+1 < T } we get w(Xk+1
596
+ ˆτk+1) =
597
+ Mw(Xk+1
598
+ ˆτk+1) = c(Xk+1
599
+ ˆτk+1, ˆξk+1) + w(ˆξk+1), k ∈ N, for any n ∈ N we recursively get
600
+ ew(x) = E(x, ˆV )
601
+
602
+ e
603
+ � ˆτ1∧T
604
+ 0
605
+ (f(Ys)−λ)ds+w(X1
606
+ ˆτ1∧T )�
607
+ = E(x, ˆV )
608
+
609
+ e
610
+ � ˆτ1∧T
611
+ 0
612
+ (f(Ys)−λ)ds+1{ˆτ1<T }c(X1
613
+ ˆτ1 ,X2
614
+ ˆτ1 )+1{ˆτ1<T }w(X2
615
+ ˆτ1 )+1{ˆτ1≥T }w(X1
616
+ T )�
617
+ = E(x, ˆV )
618
+
619
+ e
620
+ � ˆτn∧T
621
+ 0
622
+ (f(Ys)−λ)ds+�n
623
+ i=1 1{ˆτi<T }c(Xi
624
+ ˆτi ,Xi+1
625
+ ˆτi
626
+
627
+ ×e
628
+ �n
629
+ i=1 1{ˆτi−1<T ≤ˆτi}w(Xi
630
+ T )+1{ˆτn<T }w(Xn+1
631
+ ˆτn
632
+ )�
633
+ .
634
+ (2.18)
635
+
636
+ 8
637
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
638
+ Recalling Proposition 2.2 we get ˆτn → ∞ as n → ∞. Thus, letting n → ∞ in (2.18)
639
+ and using Lebesgue’s dominated convergence theorem we get
640
+ ew(x) = E(x, ˆV )
641
+
642
+ e
643
+ � T
644
+ 0 (f(Ys)−λ)ds+�∞
645
+ i=1 1{ˆτi<T }c(Xi
646
+ ˆτi ,Xi+1
647
+ ˆτi
648
+ )+�∞
649
+ i=1 1{ˆτi−1<T ≤ˆτi}w(Xi
650
+ T )�
651
+ .
652
+ Thus, recalling the boundedness of w, taking the logarithm of both sides, dividing
653
+ by T , and letting T → ∞ we obtain
654
+ λ = lim inf
655
+ T →∞ E(x, ˆV )
656
+
657
+ e
658
+ � T
659
+ 0 f(Ys)ds+�∞
660
+ i=1 1{ˆτi<T }c(Xi
661
+ ˆτi ,Xi+1
662
+ ˆτi
663
+ )�
664
+ .
665
+ Second, let us fix some x ∈ E and an admissible strategy V = (ξi, τi)∞
666
+ i=1 ∈
667
+ V. We show that λ ≥ J(x, V ). Using the argument from Lemma 7.1 in [2] and
668
+ Proposition A.3, we get that the process
669
+ e
670
+ � τ1∧T
671
+ 0
672
+ (f(X1
673
+ s )−λ)ds+w(X1
674
+ τ1∧T ),
675
+ T ≥ 0,
676
+ is a P(x,V )-supermartingale. Noting that on the event {τk+1 < T } we have
677
+ w(Xk+1
678
+ τk+1) ≥ Mw(Xk+1
679
+ τk+1) ≥ c(Xk+1
680
+ τk+1, ξk+1) + w(ξk+1),
681
+ k ∈ N,
682
+ for any n ∈ N we recursively get
683
+ ew(x) ≥ E(x,V )
684
+
685
+ e
686
+ � τ1∧T
687
+ 0
688
+ (f(Ys)−λ)ds+w(X1
689
+ τ1∧T )�
690
+ ≥ E(x,V )
691
+
692
+ e
693
+ � τ1∧T
694
+ 0
695
+ (f(Ys)−λ)ds+1{τ1<T }c(X1
696
+ τ1 ,X2
697
+ τ1 )+1{τ1<T }w(X2
698
+ τ1 )+1{τ1≥T }w(X1
699
+ T )�
700
+ ≥ E(x,V )
701
+
702
+ e
703
+ � τn∧T
704
+ 0
705
+ (f(Ys)−λ)ds+�n
706
+ i=1 1{τi<T }c(Xi
707
+ τi ,Xi+1
708
+ τi
709
+
710
+ ×e
711
+ �n
712
+ i=1 1{τi−1<T ≤τi}w(Xi
713
+ T )+1{τn<T }w(Xn+1
714
+ τn
715
+ )�
716
+ .
717
+ (2.19)
718
+ Recalling the admissibility of V , we get τn → ∞ as n → ∞. Thus, letting n → ∞
719
+ in (2.19) and using Fatou’s lemma, we get
720
+ ew(x) ≥ E(x,V )
721
+
722
+ e
723
+ � T
724
+ 0 (f(Ys)−λ)ds+�∞
725
+ i=1 1{τi<T }c(Xi
726
+ τi ,Xi+1
727
+ τi
728
+ )+�n
729
+ i=1 1{τi−1<T ≤τi}w(Xi
730
+ T )�
731
+ .
732
+ Thus, taking the logarithm of both sides, dividing by T , and letting T → ∞, we
733
+ get
734
+ λ ≥ lim inf
735
+ T →∞ E(x,V )
736
+
737
+ e
738
+ � T
739
+ 0 f(Ys)ds+�∞
740
+ i=1 1{τi<T }c(Xi
741
+ τi ,Xi+1
742
+ τi
743
+ )�
744
+ ,
745
+ which concludes the proof.
746
+
747
+ In the following sections we construct a solution to (2.6). In the construction we
748
+ approximate the underlying problem using the dyadic time-grid. Also, we consider
749
+ a version of the problem in the bounded domain.
750
+ 3. Dyadic impulse control in a bounded set
751
+ In this section we consider a version of (2.1) with a dyadic-time-grid and obliga-
752
+ tory impulses when the process leaves some compact set. In this way, we construct
753
+ a solution to the bounded-domain dyadic counterpart of (2.6). More specifically,
754
+ let us fix some δ > 0 and m ∈ N. We show the existence of a map wm
755
+ δ ∈ Cb(Bm)
756
+ and a constant λm
757
+ δ ∈ R satisfying
758
+ wm
759
+ δ (x) = sup
760
+ τ∈T δ
761
+ x,b
762
+ ln Ex
763
+
764
+ e
765
+ � τ∧τBm
766
+ 0
767
+ (f(Xs)−λm
768
+ δ )ds+Mwm
769
+ δ (Xτ∧τBm )
770
+
771
+ ,
772
+ x ∈ Bm.
773
+ (3.1)
774
+
775
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
776
+ 9
777
+ In fact, we start with the analysis of an associated one-step equation. More specif-
778
+ ically, we show the existence of a constant λm
779
+ δ
780
+ ∈ R and a map wm
781
+ δ
782
+ ∈ Cb(Bm)
783
+ satisfying
784
+ wm
785
+ δ (x) = max
786
+
787
+ ln Ex
788
+
789
+ e
790
+ � δ
791
+ 0 (f(Xs)−λm
792
+ δ )ds+1{Xδ∈Bm}wm
793
+ δ (Xδ)+1{Xδ /
794
+ ∈Bm}Mwm
795
+ δ (Xδ)�
796
+ ,
797
+ Mwm
798
+ δ (x)
799
+
800
+ ,
801
+ x ∈ Bm,
802
+ wm
803
+ δ (x) = Mwm
804
+ δ (x),
805
+ x /∈ Bm;
806
+ (3.2)
807
+ see Theorem 3.1 for details. Also, note that we link (3.2) with (3.1) in Theorem 3.4.
808
+ Theorem 3.1. There exists a constant λm
809
+ δ
810
+ > 0 and a map wm
811
+ δ
812
+ ∈ Cb(Bm) such
813
+ that (3.2) is satisfied and we get supξ∈U wm
814
+ δ (ξ) = 0.
815
+ Proof. The idea of the proof is to use the Krein-Rutman theorem to get a pos-
816
+ itive eigenvalue with a non-negative eigenvector of the suitable operator.
817
+ More
818
+ specifically, we consider a cone of non-negative continuous and bounded functions
819
+ C+
820
+ b (Bm) ⊂ Cb(Bm) and, for any h ∈ C+
821
+ b (Bm), we define the operators
822
+ ˜
823
+ Mh(x) := sup
824
+ ξ∈U
825
+ ec(x,ξ)h(ξ),
826
+ x ∈ E,
827
+ ˜P m
828
+ δ h(x) := Ex
829
+
830
+ e
831
+ � δ
832
+ 0 f(Xs)ds �
833
+ 1{Xδ∈Bm}h(Xδ) + 1{Xδ /∈Bm} ˜
834
+ Mh(Xδ)
835
+ ��
836
+ ,
837
+ x ∈ Bm,
838
+ ˜T m
839
+ δ h(x) := max
840
+
841
+ ˜P m
842
+ δ h(x), ˜
843
+ M ˜P m
844
+ δ h(x)
845
+
846
+ ,
847
+ x ∈ Bm.
848
+ Now, we use the Krein-Rutman theorem to show that ˜T m
849
+ δ
850
+ admits a positive eigen-
851
+ value and a non-negative eigenfunction; see Theorem 4.3 in [7] for details. We start
852
+ with verifying the assumptions. First, note that ˜T m
853
+ δ
854
+ is positively homogeneous,
855
+ monotonic increasing, and we have
856
+ ˜T m
857
+ δ
858
+ 1(x) ≥ e−δ∥f∥−∥c∥
859
+ 1(x),
860
+ x ∈ Bm,
861
+ where
862
+ 1 denotes the function identically equal to 1 on Bm. Also, using Assump-
863
+ tion (A2), we get that ˜T m
864
+ δ
865
+ transforms C+
866
+ b (Bm) into itself and it is continuous with
867
+ respect to the supremum norm. Let us now show that ˜T m
868
+ δ
869
+ is in fact completely
870
+ continuous. To see this, let (hn)n∈N ⊂ C+
871
+ b (Bm) be a bounded (by some constant
872
+ K > 0) sequence; using Arzel`a-Ascoli Theorem we show that it is possible to find
873
+ a convergent subsequence of ( ˜T m
874
+ δ hn)n∈N. Note that, for any n ∈ N, we get
875
+ ∥ ˜T m
876
+ δ hn∥ ≤ eδ∥f∥K,
877
+ hence ( ˜T m
878
+ δ hn) is uniformly bounded. Next, let us fix some ε > 0, x ∈ Bm, and
879
+ (xk) ⊂ Bm such that xk → x as k → ∞. Also, to ease the notation, for any n ∈ N,
880
+ we set Hn(x) := 1{x∈Bm}hn(x) + 1{x/∈Bm} ˜
881
+ Mhn(x), x ∈ E and note that Hn are
882
+ measurable functions bounded by 2K uniformly in n ∈ N. Then, for any n, k ∈ N,
883
+ we get
884
+ | ˜T m
885
+ δ hn(x) − ˜T m
886
+ δ hn(xk)| ≤
887
+ ���Ex
888
+
889
+ e
890
+ � δ
891
+ 0 f(Xs)dsHn(Xδ)
892
+
893
+ − Exk
894
+
895
+ e
896
+ � δ
897
+ 0 f(Xs)dsHn(Xδ)
898
+ ����
899
+ + | ˜
900
+ M ˜P m
901
+ δ hn(x) − ˜
902
+ M ˜P m
903
+ δ hn(xk)|.
904
+ (3.3)
905
+ Also, using Assumption (A1), we may find k ∈ N big enough such that, for any
906
+ n ∈ N, we obtain
907
+ | ˜
908
+ M ˜P m
909
+ δ hn(x) − ˜
910
+ M ˜P m
911
+ δ hn(xk)| ≤ eδ∥f∥K sup
912
+ ξ∈U
913
+ |ec(x,ξ) − ec(xk,ξ)| ≤ ε
914
+ 2.
915
+ (3.4)
916
+
917
+ 10 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
918
+ Next, note that for any u ∈ (0, δ) and n, k ∈ N, we get
919
+ ����Ex
920
+
921
+ e
922
+ � δ
923
+ 0 f(Xs)dsHn(Xδ)
924
+
925
+ − Exk
926
+
927
+ e
928
+ � δ
929
+ 0 f(Xs)dsHn(Xδ)
930
+ ����
931
+
932
+ ���Ex
933
+ ��
934
+ e
935
+ � δ
936
+ 0 f(Xs)ds − e
937
+ � δ
938
+ u f(Xs)ds�
939
+ Hn(Xδ)
940
+ ����
941
+ +
942
+ ���Exk
943
+ ��
944
+ e
945
+ � δ
946
+ 0 f(Xs)ds − e
947
+ � δ
948
+ u f(Xs)ds�
949
+ Hn(Xδ)
950
+ ����
951
+ +
952
+ ���Exk
953
+
954
+ e
955
+ � δ
956
+ u f(Xs)dsHn(Xδ)
957
+
958
+ − Ex
959
+
960
+ e
961
+ � δ
962
+ u f(Xs)dsHn(Xδ)
963
+ ���� .
964
+ (3.5)
965
+ Also, using the inequality |ey − ez| ≤ emax(y,z)|y − z|, y, z ∈ R, we may find u > 0
966
+ small enough such that, for any n, k ∈ N, we get
967
+ ���Exk
968
+ ��
969
+ e
970
+ � δ
971
+ 0 f(Xs)ds − e
972
+ � δ
973
+ u f(Xs)ds�
974
+ Hn(Xδ)
975
+ ���� ≤ 2Keδ∥f∥u∥f∥ ≤ ε
976
+ 6.
977
+ (3.6)
978
+ Next, setting F u
979
+ n (x) := Ex
980
+
981
+ e
982
+ � δ−u
983
+ 0
984
+ f(Xs)dsHn(Xδ−u)
985
+
986
+ , n ∈ N, x ∈ E, and using the
987
+ Markov property combined with Assumption (A2), we may find k ∈ N big enough
988
+ such that for any n ∈ N, we get
989
+ ���Exk
990
+
991
+ e
992
+ � δ
993
+ u f(Xs)dsHn(Xδ)
994
+
995
+ − Ex
996
+
997
+ e
998
+ � δ
999
+ u f(Xs)dsHn(Xδ)
1000
+ ����
1001
+ = |Exk[F u
1002
+ n (Xu)] − Ex[F u
1003
+ n (Xu)]|
1004
+ ≤ 2Keδ∥f∥ sup
1005
+ A∈E
1006
+ |Pu(xk, A) − Pu(x, A)| ≤ ε
1007
+ 6.
1008
+ Thus, recalling (3.5)–(3.6), we get that for k ∈ N big enough and any n ∈ N,
1009
+ we get
1010
+ ���Ex
1011
+
1012
+ e
1013
+ � δ
1014
+ 0 f(Xs)dsHn(Xδ)
1015
+
1016
+ − Exk
1017
+
1018
+ e
1019
+ � δ
1020
+ 0 f(Xs)dsHn(Xδ)
1021
+ ���� ≤
1022
+ ε
1023
+ 2. This combined
1024
+ with (3.3)–(3.4) shows | ˜T m
1025
+ δ hn(x) − ˜T m
1026
+ δ hn(xk)| ≤ ε for k ∈ N big enough and any
1027
+ n ∈ N, which proves the equicontinuity of the family ( ˜T m
1028
+ δ hn)n∈N. Consequently,
1029
+ using Arzel`a-Ascoli, we may find a uniformly (in x ∈ Bm) convergent subsequence
1030
+ of ( ˜T m
1031
+ δ hn)n∈N and the operator ˜T m
1032
+ δ
1033
+ is completely continuous.
1034
+ Thus, using the
1035
+ Krein-Rutman theorem we conclude that there exists a constant ˜λm
1036
+ δ
1037
+ > 0 and a
1038
+ non-zero map hm
1039
+ δ ∈ C+
1040
+ b (Bm) such that
1041
+ ˜T m
1042
+ δ hm
1043
+ δ (x) = ˜λm
1044
+ δ hm
1045
+ δ (x),
1046
+ x ∈ Bm.
1047
+ (3.7)
1048
+ After a possible normalisation, we assume that supξ∈U hm
1049
+ δ (ξ) = 1.
1050
+ Let us now show that hm
1051
+ δ (x) > 0, x ∈ Bm. To see this, let us define D :=
1052
+ e−δ∥f∥ 1
1053
+ ˜λm
1054
+ δ
1055
+ and let Oh ⊂ Bm be an open set such that
1056
+ inf
1057
+ x∈Oh hm
1058
+ δ (x) > 0;
1059
+ (3.8)
1060
+ note that this set exists thanks to the continuity of hm
1061
+ δ
1062
+ and the fact that hm
1063
+ δ
1064
+ is
1065
+ non-zero. Next, using (3.7), we have
1066
+ hm
1067
+ δ (x) ≥ DEx
1068
+
1069
+ 1{Xδ∈Oh}hm
1070
+ δ (Xδ) + 1{Xδ∈Bm\Oh}hm
1071
+ δ (Xδ)
1072
+
1073
+ ,
1074
+ x ∈ Bm.
1075
+
1076
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 11
1077
+ Then, for any n ∈ N, we inductively get
1078
+ hm
1079
+ δ (x) ≥ DEx[1{Xδ∈Oh}hm
1080
+ δ (Xδ)]
1081
+ +
1082
+ n
1083
+
1084
+ i=2
1085
+ DiEx
1086
+
1087
+ 1{Xδ∈Bm\Oh,X2δ∈Bm\Oh,...,X(i−1)δ∈Bm\Oh,Xiδ∈Oh}hm
1088
+ δ (Xiδ)
1089
+
1090
+ + DnEx
1091
+
1092
+ 1{Xδ∈Bm\Oh,X2δ∈Bm\Oh,...,Xiδ∈Bm\Oh}hm
1093
+ δ (Xnδ)
1094
+
1095
+ , x ∈ Bm.
1096
+ Thus, letting n → ∞ and using Assumption (A4) combined with (3.8), we show
1097
+ hm
1098
+ δ (x) > 0 for any x ∈ Bm.
1099
+ Next, we define wm
1100
+ δ (x) := ln hm
1101
+ δ (x), x ∈ Bm, and λm
1102
+ δ
1103
+ :=
1104
+ 1
1105
+ δ ln ˜λm
1106
+ δ .
1107
+ Thus,
1108
+ from (3.7), we get that the pair (wm
1109
+ δ , λm
1110
+ δ ) satisfies
1111
+ ˜T m
1112
+ δ ewm
1113
+ δ (x) = eδλm
1114
+ δ ewm
1115
+ δ (x),
1116
+ x ∈ Bm,
1117
+ and
1118
+ sup
1119
+ ξ∈U
1120
+ wm
1121
+ δ (ξ) = 0.
1122
+ In fact, using Assumption (A1) and the argument from Theorem 3.1 in [15], we
1123
+ have
1124
+ wm
1125
+ δ (x) = max
1126
+
1127
+ ln Ex
1128
+
1129
+ e
1130
+ � δ
1131
+ 0 (f(Xs)−λm
1132
+ δ )ds+1{Xδ∈Bm}wm
1133
+ δ (Xδ)+1{Xδ /
1134
+ ∈Bm}Mwm
1135
+ δ (Xδ)�
1136
+ ,
1137
+ Mwm
1138
+ δ (x)
1139
+
1140
+ ,
1141
+ x ∈ Bm.
1142
+ Finally, we extend the definition of wm
1143
+ δ to the full space E by setting
1144
+ wm
1145
+ δ (x) := Mwm
1146
+ δ (x),
1147
+ x /∈ Bm;
1148
+ note that the definition is correct since, at the right-hand side, we need to evaluate
1149
+ wm
1150
+ δ only at the points from U ⊂ B0 ⊂ Bm and this map is already defined there.
1151
+
1152
+ As we show now, Equation (3.2) may be linked to a specific martingale charac-
1153
+ terisation.
1154
+ Proposition 3.2. Let (wm
1155
+ δ , λm
1156
+ δ ) be a solution to (3.2). Then, for any x ∈ Bm, we
1157
+ get that the process
1158
+ zm
1159
+ δ (n) := e
1160
+ � (nδ)∧τBm
1161
+ 0
1162
+ (f(Xs)−λm
1163
+ δ )ds+wm
1164
+ δ (X(nδ)∧τBm ),
1165
+ n ≥ 0,
1166
+ is a Px-supermartingale. Also, the process
1167
+ zm
1168
+ δ (n ∧ (ˆτ m
1169
+ δ /δ)),
1170
+ n ∈ N,
1171
+ is a Px-martingale, where ˆτ m
1172
+ δ := δ inf{k ∈ N: wm
1173
+ δ (Xkδ) = Mwm
1174
+ δ (Xkδ)}.
1175
+ Proof. To ease the notation, we show the proof only for δ = 1; the general case
1176
+ follows the same logic. Let us fix m, n ∈ N and x ∈ Bm. Then, using the fact
1177
+ wm
1178
+ 1 (y) = Mwm
1179
+ 1 (y), x /∈ Bm, and the inequality
1180
+ ewm
1181
+ 1 (y) ≥ Ey
1182
+
1183
+ e
1184
+ � 1
1185
+ 0 (f(Xs)−λm
1186
+ 1 )ds+1{X1∈Bm}wm
1187
+ 1 (X1)+1{X1 /
1188
+ ∈Bm}Mwm
1189
+ 1 (X1)�
1190
+ ,
1191
+ y ∈ Bm,
1192
+
1193
+ 12 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
1194
+ we have
1195
+ Ex[zm
1196
+ 1 (n + 1)|Fn]
1197
+ = 1{τBm≤n}e
1198
+ � τBm
1199
+ 0
1200
+ (f(Xs)−λm
1201
+ 1 )ds+wm
1202
+ 1 (XτBm )
1203
+ + 1{τBm>n}e
1204
+ � n
1205
+ 0 (f(Xs)−λm
1206
+ 1 )ds×
1207
+ × EXn[e
1208
+ � n+1
1209
+ n
1210
+ (f(Xs)−λm
1211
+ 1 )ds+1{X1∈Bm}wm
1212
+ 1 (X1)+1{X1 /
1213
+ ∈Bm}wm
1214
+ 1 (X1)|Fn]
1215
+ = 1{τBm≤n}e
1216
+ � n∧τBm
1217
+ 0
1218
+ (f(Xs)−λm
1219
+ 1 )ds+wm
1220
+ 1 (Xn∧τBm )
1221
+ + 1{τBm>n}e
1222
+ � n∧τBm
1223
+ 0
1224
+ (f(Xs)−λm
1225
+ 1 )ds×
1226
+ × EXn[e
1227
+ � n+1
1228
+ n
1229
+ (f(Xs)−λm
1230
+ 1 )ds+1{X1∈Bm}wm
1231
+ 1 (X1)+1{X1 /
1232
+ ∈Bm}Mwm
1233
+ 1 (X1)|Fn]
1234
+ ≤ e
1235
+ � n∧τBm
1236
+ 0
1237
+ (f(Xs)−λm
1238
+ 1 )ds+wm
1239
+ 1 (Xn∧τBm ) = zm
1240
+ 1 (n),
1241
+ which shows the supermartingale property of (zm
1242
+ 1 (n)). Next, note that on the set
1243
+ {τBm ∧ ˆτ m
1244
+ 1 > n} we get
1245
+ ewm
1246
+ 1 (Xn) = EXn
1247
+
1248
+ e
1249
+ � 1
1250
+ 0 (f(Xs)−λm
1251
+ 1 )ds+1{X1∈Bm}wm
1252
+ 1 (X1)+1{X1 /
1253
+ ∈Bm}Mwm
1254
+ 1 (X1)�
1255
+ .
1256
+ Thus, we have
1257
+ Ex[zm
1258
+ 1 ((n + 1) ∧ ˆτ m
1259
+ 1 )|Fn]
1260
+ = 1{τBm∧ˆτ m
1261
+ 1 ≤n}e
1262
+ � τBm ∧ˆτm
1263
+ 1
1264
+ 0
1265
+ (f(Xs)−λm
1266
+ 1 )ds+wm
1267
+ 1 (XτBm ∧ˆτm
1268
+ 1 )
1269
+ + 1{τBm∧ˆτ m
1270
+ 1 >n}e
1271
+ � n
1272
+ 0 (f(Xs)−λm
1273
+ 1 )ds×
1274
+ × EXn[e
1275
+ � n+1
1276
+ n
1277
+ (f(Xs)−λm
1278
+ 1 )ds+1{X1∈Bm}wm
1279
+ 1 (X1)+1{X1 /
1280
+ ∈Bm}Mwm
1281
+ 1 (X1)|Fn]
1282
+ = e
1283
+ � n∧τBm ∧ˆτm
1284
+ 1
1285
+ 0
1286
+ (f(Xs)−λm
1287
+ 1 )ds+wm
1288
+ 1 (Xn∧τBm ∧ˆτm
1289
+ 1 ) = zm
1290
+ 1 (n ∧ ˆτ m
1291
+ 1 ),
1292
+ which concludes the proof.
1293
+
1294
+ Let us denote by Vδ,m the family of impulse control strategies with impulse times
1295
+ in the time-grid {0, δ, 2δ, . . .} and obligatory impulses when the controlled process
1296
+ exits the set Bm at some multiple of δ. Using a martingale characterisation of (3.2),
1297
+ we get that λm
1298
+ δ is the optimal value of the impulse control problem with impulse
1299
+ strategies from Vδ,m. To show this result, we introduce a strategy ˆV := (ˆτi, ˆξi)∞
1300
+ i=1 ∈
1301
+ Vδ,m defined recursively, for i = 1, 2, . . ., by
1302
+ ˆτi := ˆσi ∧ τ i
1303
+ Bm,
1304
+ ˆσi := δ inf{n ≥ ˆτi−1/δ: n ∈ N, wm
1305
+ δ (Xi
1306
+ nδ) = Mwm
1307
+ δ (Xi
1308
+ nδ)},
1309
+ τ i
1310
+ Bm := δ inf{n ≥ ˆτi−1/δ: n ∈ N, Xi
1311
+ nδ /∈ Bm},
1312
+ ˆξi := arg max
1313
+ ξ∈U
1314
+ (c(Xi
1315
+ ˆτi, ξ) + wm
1316
+ δ (ξ))1{ˆτi<∞} + ξ01{ˆτi=∞},
1317
+ (3.9)
1318
+ where ˆτ0 := 0 and ξ0 ∈ U is some fixed point.
1319
+ Theorem 3.3. Let (wm
1320
+ δ , λm
1321
+ δ ) be a solution to (3.2). Then, for any x ∈ Bm, we get
1322
+ λm
1323
+ δ =
1324
+ sup
1325
+ V ∈Vδ,m
1326
+ lim inf
1327
+ n→∞
1328
+ 1
1329
+ nδ ln E(x,V )
1330
+
1331
+ e
1332
+ � nδ
1333
+ 0
1334
+ f(Ys)ds+�∞
1335
+ i=1 1{τi≤nδ}c(Yτ−
1336
+ i
1337
+ ,ξi)�
1338
+ .
1339
+ Also, the strategy ˆV defined in (3.9) is optimal.
1340
+
1341
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 13
1342
+ Proof. The proof follows the lines of the proof of Theorem 2.3 and is omitted for
1343
+ brevity.
1344
+
1345
+ Next, we link (3.2) with an infinite horizon optimal stopping problem under the
1346
+ non-degeneracy assumption.
1347
+ Theorem 3.4. Let (wm
1348
+ δ , λm
1349
+ δ ) be a solution to (3.2) with λm
1350
+ δ > r(f). Then, we get
1351
+ that (wm
1352
+ δ , λm
1353
+ δ ) satisfies (3.1).
1354
+ Proof. As in the proof of Proposition 3.2, we consider only δ = 1; the general case
1355
+ follows the same logic.
1356
+ First, note that for any x ∈ Bm, n ∈ N, and τ ∈ T δ
1357
+ x , using Proposition 3.2 and
1358
+ Doob’s optional stopping theorem, we have
1359
+ ewm
1360
+ 1 (x) ≥ Ex
1361
+
1362
+ e
1363
+ � n∧τ∧τBm
1364
+ 0
1365
+ (f(Xs)−λm
1366
+ 1 )ds+wm
1367
+ 1 (Xn∧τ∧τBm )
1368
+
1369
+ .
1370
+ Also, recalling the boundedness of wm
1371
+ 1 and Proposition A.2, and letting n → ∞,
1372
+ we get
1373
+ ewm
1374
+ 1 (x) ≥ Ex
1375
+
1376
+ e
1377
+ � τ∧τBm
1378
+ 0
1379
+ (f(Xs)−λm
1380
+ 1 )ds+wm
1381
+ 1 (Xτ∧τBm )
1382
+
1383
+ .
1384
+ Next, noting that wm
1385
+ 1 (Xτ∧τBm) ≥ Mwm
1386
+ 1 (Xτ∧τBm), and taking the supremum over
1387
+ τ ∈ T δ
1388
+ x , we get
1389
+ ewm
1390
+ 1 (x) ≥ sup
1391
+ τ∈T δ
1392
+ x
1393
+ Ex
1394
+
1395
+ e
1396
+ � τ∧τBm
1397
+ 0
1398
+ (f(Xs)−λm
1399
+ 1 )ds+Mwm
1400
+ 1 (Xτ∧τBm )
1401
+
1402
+ .
1403
+ Second, using again Proposition 3.2, for any x ∈ Bm and n ∈ N, we get
1404
+ wm
1405
+ 1 (x) = ln Ex
1406
+
1407
+ e
1408
+ � n∧ˆτm
1409
+ δ ∧τBm
1410
+ 0
1411
+ (f(Xs)−λm
1412
+ 1 )ds+wm
1413
+ 1 (Xn∧ˆτm
1414
+ δ
1415
+ ∧τBm )
1416
+
1417
+ .
1418
+ Using again the boundedness of wm
1419
+ 1 and Proposition A.2, and letting n → ∞, we
1420
+ get
1421
+ wm
1422
+ 1 (x) = ln Ex
1423
+
1424
+ e
1425
+ � ˆτm
1426
+ δ ∧τBm
1427
+ 0
1428
+ (f(Xs)−λm
1429
+ 1 )ds+wm
1430
+ 1 (Xˆτm
1431
+ δ
1432
+ ∧τBm )
1433
+
1434
+ .
1435
+ In fact, noting that wm
1436
+ 1 (Xˆτ m
1437
+ δ ∧τBm) = Mwm
1438
+ 1 (Xˆτ m
1439
+ δ ∧τBm), we obtain
1440
+ wm
1441
+ 1 (x) = ln Ex
1442
+
1443
+ e
1444
+ � ˆτm
1445
+ δ ∧τBm
1446
+ 0
1447
+ (f(Xs)−λm
1448
+ 1 )ds+Mwm
1449
+ 1 (Xˆτm
1450
+ δ
1451
+ ∧τBm )
1452
+
1453
+ ,
1454
+ thus we get
1455
+ ewm
1456
+ 1 (x) = sup
1457
+ τ∈T δ
1458
+ x
1459
+ Ex
1460
+
1461
+ e
1462
+ � τ∧τBm
1463
+ 0
1464
+ (f(Xs)−λm
1465
+ 1 )ds+Mwm
1466
+ 1 (Xτ∧τBm )
1467
+
1468
+ .
1469
+ Finally, using Proposition A.4, we have
1470
+ ewm
1471
+ 1 (x) = sup
1472
+ τ∈T δ
1473
+ x,b
1474
+ Ex
1475
+
1476
+ e
1477
+ � τ∧τBm
1478
+ 0
1479
+ (f(Xs)−λm
1480
+ 1 )ds+Mwm
1481
+ 1 (Xτ∧τBm )
1482
+
1483
+ ,
1484
+ which concludes the proof.
1485
+
1486
+ Remark 3.5. In Theorem 3.4 we showed that, if λm
1487
+ δ
1488
+ > r(f), a solution to the
1489
+ one-step equation (3.2) is uniquely characterised by the optimal stopping value
1490
+ function (3.1).
1491
+ If λm
1492
+ δ
1493
+ ≤ r(f), the problem is degenerate and, in particular, we
1494
+ cannot use the uniform integrability result from Proposition A.2. In fact, in this
1495
+
1496
+ 14 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
1497
+ case it is even possible that the one-step Bellman equation admits multiple solutions
1498
+ and the optimal stopping characterisation does not hold; see e.g. Theorem 1.13
1499
+ in [22] for details.
1500
+ 4. Dyadic impulse control
1501
+ In this section we consider a dyadic full-domain version of (2.1). We construct
1502
+ a solution to the associated Bellman equation which will be later used to find
1503
+ a solution to (2.6).
1504
+ The argument uses a bounded domain approximation from
1505
+ Section 3. More specifically, throughout this section we fix some δ > 0 and show
1506
+ the existence of a function wδ ∈ Cb(E) and a constant λδ ∈ R, which are a solution
1507
+ to the dyadic Bellman equation of the form
1508
+ wδ(x) = sup
1509
+ τ∈T δ
1510
+ x,b
1511
+ ln Ex
1512
+
1513
+ e
1514
+ � τ
1515
+ 0 (f(Xs)−λδ)ds+Mwδ(Xτ )�
1516
+ ,
1517
+ x ��� E.
1518
+ (4.1)
1519
+ In fact, we set
1520
+ λδ := lim
1521
+ m→∞ λm
1522
+ δ ;
1523
+ (4.2)
1524
+ note that this constant is well-defined as, from Theorem 3.3, recalling that Bm ⊂
1525
+ Bm+1, we get λm
1526
+ δ ≤ λm+1
1527
+ δ
1528
+ , m ∈ N.
1529
+ First, we state the lower bound for λδ.
1530
+ Lemma 4.1. Let (wδ, λδ) be a solution to (4.1). Then, we get λδ ≥ r(f).
1531
+ Proof. The proof follows the lines of the proof of Lemma 2.1 and is omitted for
1532
+ brevity.
1533
+
1534
+ Next, we show the existence of a solution to (4.1) under the non-degeneracy
1535
+ assumption λδ > r(f).
1536
+ Theorem 4.2. Let λδ be given by (4.2) and assume that λδ > r(f). Then, there
1537
+ exists wδ ∈ Cb(E) such that (4.1) is satisfied and we get supξ∈U wδ(ξ) = 0.
1538
+ Proof. We start with some general comments and an outline of the argument. First,
1539
+ note that from Theorem 3.1, for any m ∈ N, we get a solution (wm
1540
+ δ , λm
1541
+ δ ) to (3.2)
1542
+ satisfying supξ∈U wm
1543
+ δ (ξ) = 0. Also, from the assumption λδ > r(f) we get λm
1544
+ δ >
1545
+ r(f) for m ∈ N sufficiently big (for simplicity, we assume that λ0
1546
+ δ > r(f)). Thus,
1547
+ using Theorem 3.4, we get that, for any m ∈ N, the pair (wm
1548
+ δ , λm
1549
+ δ ) satisfies (3.1).
1550
+ Second, to construct a function wδ, we use Arzel`a-Ascoli Theorem. More specif-
1551
+ ically, recalling that supξ∈U wm
1552
+ δ (ξ) = 0 and using the fact that −∥c∥ ≤ c(x, ξ) ≤ 0,
1553
+ x ∈ E, ξ ∈ U, for any m ∈ N and x ∈ E, we get
1554
+ −∥c∥ ≤ Mwm
1555
+ δ (x) ≤ 0.
1556
+ Also, note that, for any m ∈ N and x, y ∈ E, we have
1557
+ |Mwm
1558
+ δ (x) − Mwm
1559
+ δ (y)| ≤ sup
1560
+ ξ∈U
1561
+ |c(x, ξ) − c(y, ξ)|.
1562
+ Consequently, the sequence (Mwm
1563
+ δ )m∈N is uniformly bounded and equicontinuous.
1564
+ Thus, using Arzel`a-Ascoli Theorem combined with a diagonal argument, we may
1565
+ find a subsequence (for brevity still denoted by (Mwm
1566
+ δ )m∈N) and a map φδ ∈ Cb(E)
1567
+ such that Mwm
1568
+ δ (x) converges to φδ(x) as m → ∞ uniformly in x from any compact
1569
+ set. In fact, using Assumption (A1) and the argument from the first step of the
1570
+
1571
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 15
1572
+ proof of Theorem 4.1 in [15], we get that the convergence is uniform in x ∈ E.
1573
+ Then, we define
1574
+ wδ(x) := sup
1575
+ τ∈T δ
1576
+ x,b
1577
+ ln Ex
1578
+
1579
+ e
1580
+ � τ
1581
+ 0 (f(Xs)−λδ)ds+φδ(Xτ )�
1582
+ ,
1583
+ x ∈ E.
1584
+ (4.3)
1585
+ To complete the construction, we show that wm
1586
+ δ
1587
+ converges to wδ uniformly on
1588
+ compact sets. Indeed, in this case we have
1589
+ |Mwm
1590
+ δ (x) − Mwδ(x)| ≤ sup
1591
+ ξ∈U
1592
+ |wm
1593
+ δ (ξ) − wδ(ξ)| → 0,
1594
+ m → ∞,
1595
+ thus φδ ≡ Mwδ and from (4.3) we get that (4.1) is satisfied. Also, recalling that
1596
+ from Theorem 3.1 we get supξ∈U wm
1597
+ δ (ξ) = 0, m ∈ N, we also get supξ∈U wδ(ξ) = 0.
1598
+ Finally, to show the convergence, we define the auxiliary functions
1599
+ wm,1
1600
+ δ
1601
+ (x) := sup
1602
+ τ∈T δ
1603
+ x,b
1604
+ ln Ex
1605
+
1606
+ e
1607
+ � τ∧τBm
1608
+ 0
1609
+ (f(Xs)−λm
1610
+ δ )ds+φδ(Xτ∧τBm )
1611
+
1612
+ ,
1613
+ x ∈ E,
1614
+ (4.4)
1615
+ wm,2
1616
+ δ
1617
+ (x) := sup
1618
+ τ∈T δ
1619
+ x,b
1620
+ ln Ex
1621
+
1622
+ e
1623
+ � τ∧τBm
1624
+ 0
1625
+ (f(Xs)−λδ)ds+φδ(Xτ∧τBm )
1626
+
1627
+ ,
1628
+ x ∈ E.
1629
+ (4.5)
1630
+ We split the rest of the proof into three steps: (1) proof that |wm
1631
+ δ (x)−wm,1
1632
+ δ
1633
+ (x)| → 0
1634
+ as m → ∞ uniformly in x ∈ E; (2) proof that |wm,1
1635
+ δ
1636
+ (x) − wm,2
1637
+ δ
1638
+ (x)| → 0 as m → ∞
1639
+ uniformly in x ∈ E; (3) proof that |wm,2
1640
+ δ
1641
+ (x) − wδ(x)| → 0 as m → ∞ uniformly in
1642
+ x from compact sets.
1643
+ Step 1. We show |wm
1644
+ δ (x) − wm,1
1645
+ δ
1646
+ (x)| → 0 as m → ∞ uniformly in x ∈ E. Note
1647
+ that, for any x ∈ E and m ∈ N, we have
1648
+ wm,1
1649
+ δ
1650
+ (x) ≤ sup
1651
+ τ∈T δ
1652
+ x,b
1653
+ ln
1654
+
1655
+ Ex
1656
+
1657
+ e
1658
+ � τ∧τBm
1659
+ 0
1660
+ (f(Xs)−λm
1661
+ δ )ds+Mwm
1662
+ δ (Xτ∧τBm )
1663
+
1664
+ e∥φδ−Mwm
1665
+ δ ∥
1666
+
1667
+ = wm
1668
+ δ (x) + ∥φδ − Mwm
1669
+ δ ∥.
1670
+ Similarly, we get wm
1671
+ δ (x) ≤ wm,1
1672
+ δ
1673
+ (x) + ∥φδ − Mwm
1674
+ δ ∥, thus
1675
+ sup
1676
+ x∈E
1677
+ |wm
1678
+ δ (x) − wm,1
1679
+ δ
1680
+ (x)| ≤ ∥φδ − Mwm
1681
+ δ ∥.
1682
+ Recalling the fact that φδ is a uniform limit of Mwm
1683
+ δ as m → ∞, we conclude the
1684
+ proof of this step.
1685
+ Step 2. We show that |wm,1
1686
+ δ
1687
+ (x) − wm,2
1688
+ δ
1689
+ (x)| → 0 as m → ∞ uniformly in x ∈ E.
1690
+ Recalling that λm
1691
+ δ ↑ λδ, we get wm,1
1692
+ δ
1693
+ (x) ≥ wm,2
1694
+ δ
1695
+ (x) ≥ −∥φδ∥, x ∈ E. Thus, using
1696
+ the inequality | ln y − ln z| ≤
1697
+ 1
1698
+ min(y,z)|y − z|, y, z > 0, we get
1699
+ 0 ≤ wm,1
1700
+ δ
1701
+ (x) − wm,2
1702
+ δ
1703
+ (x) ≤ e∥φδ∥(ewm,1
1704
+ δ
1705
+ (x) − ewm,2
1706
+ δ
1707
+ (x)),
1708
+ x ∈ E.
1709
+ (4.6)
1710
+ Then, noting that φδ(·) ≤ 0, for any m ∈ N and x ∈ E, we obtain
1711
+ 0 ≤ ewm,1
1712
+ δ
1713
+ (x) − ewm,2
1714
+ δ
1715
+ (x) ≤ sup
1716
+ τ∈T δ
1717
+ x,b
1718
+
1719
+ Ex
1720
+
1721
+ e
1722
+ � τ∧τBm
1723
+ 0
1724
+ (f(Xs)−λm
1725
+ δ )ds+φδ(Xτ∧τBm )
1726
+
1727
+ − Ex
1728
+
1729
+ e
1730
+ � τ∧τBm
1731
+ 0
1732
+ (f(Xs)−λδ)ds+φδ(Xτ∧τBm )
1733
+ ��
1734
+ ≤ sup
1735
+ τ∈T δ
1736
+ x,b
1737
+ Ex
1738
+
1739
+ e
1740
+ � τ
1741
+ 0 f(Xs)ds �
1742
+ e−λm
1743
+ δ τ − e−λδτ��
1744
+ .
1745
+ (4.7)
1746
+
1747
+ 16 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
1748
+ Also, recalling that λ0
1749
+ δ ≤ λm
1750
+ δ ≤ λδ, m ∈ N, for any x ∈ E and T ≥ 0, we get
1751
+ 0 ≤ sup
1752
+ τ∈Tx,b
1753
+ Ex
1754
+
1755
+ e
1756
+ � τ
1757
+ 0 f(Xs)ds �
1758
+ e−λm
1759
+ δ τ − eλδτ��
1760
+ ≤ sup
1761
+ τ∈Tx,b
1762
+ Ex
1763
+ ��
1764
+ 1{τ≤T } + 1{τ>T }
1765
+
1766
+ e
1767
+ � τ
1768
+ 0 f(Xs)ds �
1769
+ e−λm
1770
+ δ τ − e−λδτ��
1771
+ ≤ sup
1772
+ τ<T
1773
+ τ∈Tx,b
1774
+ eT ∥f∥Ex
1775
+ ��
1776
+ e−λm
1777
+ δ τ − e−λδτ��
1778
+ + sup
1779
+ τ≥T
1780
+ τ∈Tx,b
1781
+ Ex
1782
+
1783
+ e
1784
+ � τ
1785
+ 0 (f(Xs)−λ0
1786
+ δ)ds�
1787
+ .
1788
+ (4.8)
1789
+ Recalling λ0
1790
+ δ > r(f) and using Lemma A.1, for any ε > 0, we may find T ≥ 0, such
1791
+ that
1792
+ 0 ≤ sup
1793
+ x∈E
1794
+ sup
1795
+ τ≥T
1796
+ τ∈Tx,b
1797
+ Ex
1798
+
1799
+ e
1800
+ � τ
1801
+ 0 (f(Xs)−λ0
1802
+ δ)ds�
1803
+ ≤ ε.
1804
+ Also, using the inequality |ex − ey| ≤ emax(x,y)|x − y|, x, y ≥ 0, we obtain
1805
+ sup
1806
+ τ<T
1807
+ Ex
1808
+ ��
1809
+ e−λm
1810
+ δ τ − e−λδτ��
1811
+ ≤ sup
1812
+ τ<T
1813
+ Ex
1814
+
1815
+ emax(−λm
1816
+ δ τ,−λδτ)τ(λδ − λm
1817
+ δ )
1818
+
1819
+ ≤ e|λm
1820
+ δ |T T (λδ − λm
1821
+ δ ).
1822
+ (4.9)
1823
+ Thus, for fixed T ≥ 0, we find m ≥ 0, such that e|λm
1824
+ δ |T T (λδ − λm
1825
+ δ ) ≤ ε. Hence,
1826
+ recalling (4.6)–(4.8), for any x ∈ E and T, m big enough, we get
1827
+ 0 ≤ wm,1
1828
+ δ
1829
+ (x) − wm,2
1830
+ δ
1831
+ (x) ≤ e∥φδ∥2ε.
1832
+ Recalling that ε > 0 was arbitrary, we conclude the proof of this step.
1833
+ Step 3. We show that |wm,2
1834
+ δ
1835
+ (x) − wδ(x)| → 0 as m → ∞ uniformly in x from
1836
+ compact sets. First, we show that wm,2
1837
+ δ
1838
+ (x) ≤ wδ(x) for any m ∈ N and x ∈ E. Let
1839
+ ε > 0 and τ ε
1840
+ m ∈ T δ
1841
+ x,b be an ε-optimal stopping time for wm,2
1842
+ δ
1843
+ (x). Then, we get
1844
+ wδ(x) ≥ ln Ex
1845
+
1846
+ e
1847
+ � τεm∧τBm
1848
+ 0
1849
+ (f(Xs)−λδ)ds+φδ(Xτεm∧τBm )
1850
+
1851
+ ≥ wm,2
1852
+ δ
1853
+ (x) − ε.
1854
+ As ε > 0 was arbitrary, we get wm,2
1855
+ δ
1856
+ (x) ≤ wδ(x), m ∈ N, x ∈ E. In fact, using
1857
+ a similar argument, for any x ∈ E, we may show that the map m �→ wm,2
1858
+ δ
1859
+ (x) is
1860
+ non-decreasing.
1861
+ Second, let ε > 0 and τε ∈ T δ
1862
+ x,b be an ε-optimal stopping time for wδ(x). Then,
1863
+ we obtain
1864
+ 0 ≤ wδ(x) − wm,2
1865
+ δ
1866
+ (x) ≤ ln Ex
1867
+
1868
+ e
1869
+ � τε
1870
+ 0
1871
+ (f(Xs)−λδ)ds+φδ(Xτε )�
1872
+ + ε
1873
+ − ln Ex
1874
+
1875
+ e
1876
+ � τε∧τBm
1877
+ 0
1878
+ (f(Xs)−λδ)ds+φδ(Xτε∧τBm )
1879
+
1880
+ .
1881
+ (4.10)
1882
+ Noting that τBm ↑ +∞ as m → ∞ and using the quasi left-continuity of X combined
1883
+ with Lemma A.2 and the boundedness of φδ, we get
1884
+ lim
1885
+ m→∞ Ex
1886
+
1887
+ e
1888
+ � τε∧τBm
1889
+ 0
1890
+ (f(Xs)−λδ)ds+φδ(Xτε∧τBm )
1891
+
1892
+ = Ex
1893
+
1894
+ e
1895
+ � τε
1896
+ 0
1897
+ (f(Xs)−λδ)ds+φδ(Xτε )�
1898
+ .
1899
+ Thus, using (4.10) and recalling that ε > 0 was arbitrary, we get limm→∞ wm,2
1900
+ δ
1901
+ (x) =
1902
+ wδ(x). Also, noting that by Proposition A.3 and Proposition A.4, the maps x �→
1903
+
1904
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 17
1905
+ wδ(x) and x �→ wm,2
1906
+ δ
1907
+ (x) are continuous, and using the monotonicity of m �→
1908
+ wm,2
1909
+ δ
1910
+ (x), from Dini’s Theorem we get that wm,2
1911
+ δ
1912
+ (x) converges to wδ(x) uniformly
1913
+ in x from compact sets, which concludes the proof.
1914
+
1915
+ We conclude this section with a verification result related to (4.1).
1916
+ Theorem 4.3. Let (wδ, λδ) be a solution to (4.1) with λδ > r(f). Then, we get
1917
+ λδ := sup
1918
+ V ∈Vδ lim inf
1919
+ n→∞
1920
+ 1
1921
+ n ln E(x,V )
1922
+
1923
+ e
1924
+ � nδ
1925
+ 0
1926
+ f(Ys)ds+�∞
1927
+ i=1 1{τi≤nδ}c(Yτ−
1928
+ i
1929
+ ,ξi)�
1930
+ ,
1931
+ where Vδ is a family of impulse control strategies with impulse times on the dyadic
1932
+ time-grid {0, δ, 2δ, . . .}.
1933
+ Proof. The proof follows the lines of the proof of Theorem 2.3 and is omitted for
1934
+ brevity.
1935
+
1936
+ 5. Existence of a solution to the Bellman equation
1937
+ In this section we construct a solution (w, λ) to (2.6), which together with The-
1938
+ orem 2.3 provides a solution to (2.1). The argument uses a dyadic approximation
1939
+ and the results from Section 4. More specifically, we consider a family of dyadic
1940
+ time steps δk :=
1941
+ 1
1942
+ 2k , k ∈ N. First, we specify the value of λ. In fact, we define
1943
+ λ := lim inf
1944
+ k→∞ λδk,
1945
+ (5.1)
1946
+ where λδk is a constant given by (4.2), corresponding to δk. Note that, if for some
1947
+ k0 ∈ N we get λδk0 > r(f), then using Theorem 4.3, we get that λδk ≤ λδk+1,
1948
+ k ≥ k0, and the limit inferior could be replaced by the usual limit.
1949
+ Theorem 5.1. Let λ be given by (5.1) and assume that λ > r(f). Then, there
1950
+ exists w ∈ Cb(E) such that (2.6) is satisfied.
1951
+ Proof. The argument is partially based on the one used in Theorem 4.2 thus we
1952
+ discuss only the main points. From the fact that λ > r(f) we get λδk > r(f) for
1953
+ sufficiently big k ∈ N; to simplify the notation, we assume λδ0 > r(f). Thus, using
1954
+ Theorem 4.2, for any k ∈ N, we get the existence of a map wδk ∈ Cb(E) satisfying
1955
+ wδk(x) = sup
1956
+ τ∈T
1957
+ δk
1958
+ x,b
1959
+ ln Ex
1960
+
1961
+ e
1962
+ � τ
1963
+ 0 (f(Xs)−λδk )ds+Mwδk (Xτ )�
1964
+ ,
1965
+ x ∈ E
1966
+ and such that supξ∈U wδk(ξ) = 0. Thus, we get
1967
+ −∥c∥ ≤ Mwδk(x) ≤ 0,
1968
+ k ∈ N, x ∈ E,
1969
+ and the family (Mwδk)k∈N is uniformly bounded. Also, it is equicontinuous as we
1970
+ have
1971
+ |Mwδk(x) − Mwδk(y)| ≤ sup
1972
+ x∈U
1973
+ |c(x, ξ) − c(y, ξ)|,
1974
+ x, y ∈ E.
1975
+ Thus, using Arzel`a-Ascoli theorem, we may choose a subsequence (for brevity still
1976
+ denoted by (Mwδk)), such that (Mwδk) converges uniformly on compact sets to
1977
+ some map φ. In fact, using Assumption (A1) and the argument from the first step
1978
+ of the proof of Theorem 4.1 from [15], we get that Mwδk(x) converges to φ(x) as
1979
+ k → ∞ uniformly in x ∈ E. Next, let us define
1980
+ w(x) := sup
1981
+ τ∈Tx,b
1982
+ ln Ex
1983
+
1984
+ e
1985
+ � τ
1986
+ 0 (f(Xs)−λ)ds+φ(Xτ )�
1987
+ ,
1988
+ x ∈ E.
1989
+ (5.2)
1990
+
1991
+ 18 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
1992
+ In the following, we show that wδk converges to w uniformly in compact sets as
1993
+ k → ∞. Then, we get that Mwδk converges to Mw, hence Mw ≡ φ and (2.6) is
1994
+ satisfied.
1995
+ To show the convergence, we define
1996
+ w1
1997
+ δk(x) := sup
1998
+ τ∈T
1999
+ δk
2000
+ x,b
2001
+ ln Ex
2002
+
2003
+ e
2004
+ � τ
2005
+ 0 (f(Xs)−λδk)ds+φ(Xτ )�
2006
+ ,
2007
+ k ∈ N, x ∈ E.
2008
+ In the following, we show that |w(x) − w1
2009
+ δk(x)| → 0 and |w1
2010
+ δk(x) − wδk(x)| → 0 as
2011
+ k → ∞ uniformly in x from compact sets. In fact, to show the first convergence,
2012
+ we note that
2013
+ w0
2014
+ δk(x) ≤ w1
2015
+ δk(x) ≤ w2
2016
+ δk(x),
2017
+ k ∈ N, x ∈ E,
2018
+ where
2019
+ w0
2020
+ δk(x) := sup
2021
+ τ∈T
2022
+ δk
2023
+ x,b
2024
+ ln Ex
2025
+
2026
+ e
2027
+ � τ
2028
+ 0 (f(Xs)−λ)ds+φ(Xτ )�
2029
+ ,
2030
+ k ∈ N, x ∈ E,
2031
+ w2
2032
+ δk(x) := sup
2033
+ τ∈Tx,b
2034
+ ln Ex
2035
+
2036
+ e
2037
+ � τ
2038
+ 0 (f(Xs)−λδk )ds+φ(Xτ )�
2039
+ ,
2040
+ k ∈ N, x ∈ E.
2041
+ Thus, to prove |w(x) − w1
2042
+ δk(x)| → 0 it is enough to show |w(x) − w0
2043
+ δk(x)| → 0 and
2044
+ |w(x) − w2
2045
+ δk(x)| → 0 as k → ∞.
2046
+ For transparency, we split the rest of the proof into three parts: (1) proof that
2047
+ |w(x) − w0
2048
+ δk(x)| → 0 as k → ∞ uniformly in x from compact sets; (2) proof that
2049
+ |w(x) − w2
2050
+ δk(x)| → 0 as k → ∞ uniformly in x ∈ E; (3) proof that |w1
2051
+ δk(x) −
2052
+ wδk(x)| → 0 as k → ∞ uniformly in x ∈ E.
2053
+ Step 1. We show that |w(x) − w0
2054
+ δk(x)| → 0 as k → ∞ as k → ∞ uniformly in x
2055
+ from compact sets. First, note that we have w0
2056
+ δk(x) ≤ w(x), k ∈ N, x ∈ E. Next,
2057
+ for any x ∈ E and ε > 0, let τε ∈ Tx,b be an ε-optimal stopping time for w(x) and
2058
+ let τ k
2059
+ ε be its T δk
2060
+ x,b approximation given by
2061
+ τ k
2062
+ ε := inf
2063
+
2064
+ τ ∈ T δk
2065
+ x,b : τ ≥ τε
2066
+
2067
+ =
2068
+
2069
+
2070
+ j=1
2071
+ 1{ j−1
2072
+ 2k <τε≤
2073
+ j
2074
+ 2m }
2075
+ j
2076
+ 2k .
2077
+ Then, we get
2078
+ 0 ≤ w(x) − w0
2079
+ δk(x)
2080
+ ≤ Ex
2081
+
2082
+ e
2083
+ � τε
2084
+ 0
2085
+ (f(Xs)−λ)ds+φ(Xτε )�
2086
+ − Ex
2087
+
2088
+ e
2089
+ � τk
2090
+ ε
2091
+ 0
2092
+ (f(Xs)−λ)ds+φ(Xτk
2093
+ ε )
2094
+
2095
+ + ε.
2096
+ Also, using Proposition A.2 and letting k → ∞, we have
2097
+ lim
2098
+ k→∞ Ex
2099
+
2100
+ e
2101
+ � τk
2102
+ ε
2103
+ 0
2104
+ (f(Xs)−λ)ds+φ(Xτk
2105
+ ε )
2106
+
2107
+ = Ex
2108
+
2109
+ e
2110
+ � τε
2111
+ 0
2112
+ (f(Xs)−λ)ds+φ(Xτε )�
2113
+ .
2114
+ Consequently, recalling that ε > 0 was arbitrary, we obtain limk→∞ w0
2115
+ δk(x) =
2116
+ w(x) for any x ∈ E.
2117
+ In fact, using the monotonicity of the sequence (w0
2118
+ δk)k∈N
2119
+ combined with Proposition A.3, Proposition A.4, and Dini’s theorem, we get that
2120
+ the convergence is uniform on compact sets, which concludes the proof of this step.
2121
+
2122
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 19
2123
+ Step 2. We show that |w(x) − w2
2124
+ δk(x)| → 0 as k → ∞ uniformly in x ∈ E.
2125
+ First, note that −∥φ∥ ≤ w(x) ≤ w2
2126
+ δk(x), k ∈ N, x ∈ E. Thus, using the inequality
2127
+ | ln y − ln z| ≤
2128
+ 1
2129
+ min(y,z)|y − z|, y, z > 0, we get
2130
+ 0 ≤ w2
2131
+ δk(x) − w(x) ≤ e∥φ∥(ew2
2132
+ δk (x) − ew(x)),
2133
+ k ∈ N, x ∈ E.
2134
+ Also, recalling that φ(·) ≤ 0, for any k ∈ N and x ∈ E, we obtain
2135
+ 0 ≤ ew2
2136
+ δk (x) − ew(x) ≤ sup
2137
+ τ∈Tx,b
2138
+ Ex
2139
+
2140
+ e
2141
+ � τ
2142
+ 0 f(Xs)ds �
2143
+ e−λδkτ − e−λτ��
2144
+ .
2145
+ Thus, repeating the argument from the second step of the proof of Theorem 4.2,
2146
+ we get w2
2147
+ δk(x) → w(x) as k → ∞ uniformly in x ∈ E, which concludes the proof of
2148
+ this step.
2149
+ Step 3. We show that |w1
2150
+ δk(x) − wδk(x)| → 0 as k → ∞ uniformly in x ∈ E.
2151
+ In fact, recalling that ∥Mwδk − φ∥ → 0 as k → ∞, the argument follows the lines
2152
+ of the one used in the first step of the proof of Theorem 4.2. This concludes the
2153
+ proof.
2154
+
2155
+ Appendix A. Properties of optimal stopping problems
2156
+ In this section we discuss some properties of the optimal stopping problems that
2157
+ are used in this paper.
2158
+ Throughout this section we consider g, G ∈ Cb(E) and
2159
+ assume G(·) ≤ 0 and r(g) < 0, where r(g) is the type of the semigroup given
2160
+ by (2.7) corresponding to the map g. We start with a useful result related to the
2161
+ asymptotic behaviour of the running cost function g.
2162
+ Lemma A.1. Let a be such that r(g) < a < 0. Then,
2163
+ (1) The map x �→ U g−a
2164
+ 0
2165
+ 1(x) := Ex
2166
+ �� ∞
2167
+ 0
2168
+ e
2169
+ � t
2170
+ 0 (g(Xs)−a)dsdt
2171
+
2172
+ is continuous and
2173
+ bounded.
2174
+ (2) We get
2175
+ lim
2176
+ T →∞ sup
2177
+ x∈E
2178
+ sup
2179
+ τ≥T
2180
+ τ∈Tx
2181
+ Ex
2182
+
2183
+ e
2184
+ � τ
2185
+ 0 g(Xs)ds�
2186
+ = 0.
2187
+ Proof. For transparency, we prove the claims point by point.
2188
+ Proof of (1). First, we show the boundedness of x �→ U g−a
2189
+ 0
2190
+ 1(x). Let ε <
2191
+ a − r(g).
2192
+ Using the definition of r(g − a) we may find t0 ≥ 0, such that for
2193
+ any t ≥ t0 we get supx∈E Ex
2194
+
2195
+ e
2196
+ � t
2197
+ 0 (g(Xs)−a)ds�
2198
+ ≤ et(r(g)−a+ε). Then, using Fubini’s
2199
+ theorem and noting that r(g) − a + ε < 0, for any x0 ∈ E, we get
2200
+ 0 ≤ U g−a
2201
+ 0
2202
+ 1(x0) ≤
2203
+ � ∞
2204
+ 0
2205
+ sup
2206
+ x∈E
2207
+ Ex
2208
+
2209
+ e
2210
+ � t
2211
+ 0 (g(Xs)−a)ds�
2212
+ dt
2213
+ =
2214
+ � t0
2215
+ 0
2216
+ sup
2217
+ x∈E
2218
+ Ex
2219
+
2220
+ e
2221
+ � t
2222
+ 0 (g(Xs)−a)ds�
2223
+ dt +
2224
+ � ∞
2225
+ t0
2226
+ sup
2227
+ x∈E
2228
+ Ex
2229
+
2230
+ e
2231
+ � t
2232
+ 0 (g(Xs)−a)ds�
2233
+ dt
2234
+
2235
+ � t0
2236
+ 0
2237
+ et(∥g∥−a)dt +
2238
+ � ∞
2239
+ t0
2240
+ et(r(g)−a+ε)dt < ∞,
2241
+ which concludes the proof of the boundedness of x �→ U g−a
2242
+ 0
2243
+ 1(x).
2244
+
2245
+ 20 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
2246
+ For the continuity, note that using Assumption (A2) and repeating the argument
2247
+ used in Lemma 4 in Section II.5 of [13], we get that x �→ Ex
2248
+
2249
+ e
2250
+ � t
2251
+ 0 (g(Xs)−a)dsdt
2252
+
2253
+ is
2254
+ continuous for any t ≥ 0. Also, as in the proof of the boundedness, we may show
2255
+ 0 ≤ sup
2256
+ x∈E
2257
+ Ex
2258
+
2259
+ e
2260
+ � t
2261
+ 0 (g(Xs)−a)ds�
2262
+ ≤ et(∥g∥−a)1{t∈[0,t0]} + et(r(g)−a+ε)1{t>t0}
2263
+ and the upper bound is integrable (with respect to t).
2264
+ Thus, using Lebesgue’s
2265
+ dominated convergence theorem, we get the continuity of the map x �→ U g−a
2266
+ 0
2267
+ 1(x) =
2268
+ � ∞
2269
+ 0
2270
+ Ex
2271
+
2272
+ e
2273
+ � t
2274
+ 0 (g(Xs)−a)ds�
2275
+ dt, which concludes the proof of this step.
2276
+ Proof of (2). Noting that U g−a
2277
+ 0
2278
+ 1(x) ≥
2279
+ � 1
2280
+ 0 e−t(∥g∥−a)dt, x ∈ E, we may find
2281
+ d > 0, such that U g−a
2282
+ 0
2283
+ 1(x) ≥ d > 0, x ∈ E. Thus, recalling that a < 0, we get
2284
+ 0 ≤ sup
2285
+ τ≥T
2286
+ τ∈Tx
2287
+ Ex
2288
+
2289
+ e
2290
+ � τ
2291
+ 0 g(Xs)ds�
2292
+ ≤ sup
2293
+ τ≥T
2294
+ τ∈Tx
2295
+ Ex
2296
+
2297
+ e
2298
+ � τ
2299
+ 0 (g(Xs)−a)dseaτU g−a
2300
+ 0
2301
+ 1(Xτ)1
2302
+ d
2303
+
2304
+ ≤ eaT
2305
+ d
2306
+ sup
2307
+ τ≥T
2308
+ τ∈Tx
2309
+ Ex
2310
+
2311
+ e
2312
+ � τ
2313
+ 0 (g(Xs)−a)dsU g−a
2314
+ 0
2315
+ 1(Xτ)
2316
+
2317
+ = eaT
2318
+ d
2319
+ sup
2320
+ τ≥T
2321
+ τ∈Tx
2322
+ Ex
2323
+ �� ∞
2324
+ 0
2325
+ e
2326
+ � t+τ
2327
+ 0
2328
+ (g(Xs)−a)dsdt
2329
+
2330
+ = eaT
2331
+ d
2332
+ sup
2333
+ τ≥T
2334
+ τ∈Tx
2335
+ Ex
2336
+ �� ∞
2337
+ τ
2338
+ e
2339
+ � t
2340
+ 0 (g(Xs)−a)dsdt
2341
+
2342
+ ≤ eaT
2343
+ d Ex
2344
+ �� ∞
2345
+ 0
2346
+ e
2347
+ � t
2348
+ 0 (g(Xs)−a)dsdt
2349
+
2350
+ ≤ eaT
2351
+ d ∥U g−a
2352
+ 0
2353
+ 1∥ → 0,
2354
+ T → ∞,
2355
+ which concludes the proof.
2356
+
2357
+ Using Lemma A.1 we get the uniform integrability of a suitable family of random
2358
+ variables.
2359
+ This result is extensively used throughout the paper as it simplifies
2360
+ numerous limiting arguments.
2361
+ Proposition A.2. For any x ∈ E, the family {e
2362
+ � τ
2363
+ 0 g(Xs)ds}τ∈Tx is Px-uniformly
2364
+ integrable.
2365
+ Proof. Let us fix some x ∈ E and, for any τ ∈ Tx and n ∈ N, define the event
2366
+
2367
+ n := {� τ
2368
+ 0 g(Xs)ds ≥ n}. Note that for any T ≥ 0, we get
2369
+ sup
2370
+ τ∈Tx
2371
+ Ex[1Aτne
2372
+ � τ
2373
+ 0 g(Xs)ds] ≤ sup
2374
+ τ≤T
2375
+ τ∈Tx
2376
+ Ex[1Aτne
2377
+ � τ
2378
+ 0 g(Xs)ds] + sup
2379
+ τ>T
2380
+ τ∈Tx
2381
+ Ex[1Aτne
2382
+ � τ
2383
+ 0 g(Xs)ds]
2384
+ ≤ sup
2385
+ τ≤T
2386
+ τ∈Tx
2387
+ eT ∥g∥Px[Aτ
2388
+ n] + sup
2389
+ τ>T
2390
+ τ∈Tx
2391
+ Ex[e
2392
+ � τ
2393
+ 0 g(Xs)ds].
2394
+ Next, for any ε > 0, using Lemma A.1, we may find T > 0 big enough to get
2395
+ sup
2396
+ τ>T
2397
+ τ∈Tx
2398
+ Ex[e
2399
+ � τ
2400
+ 0 g(Xs)ds] < ε.
2401
+
2402
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 21
2403
+ Also, noting that for τ ≤ T , we get Aτ
2404
+ n ⊂ {T ∥g∥ ≥ n}, for any n > T ∥g∥, we also
2405
+ get
2406
+ sup
2407
+ τ≤T
2408
+ τ∈Tx
2409
+ Px[Aτ
2410
+ n] = 0.
2411
+ Consequently, recalling that ε > 0 was arbitrary, we obtain
2412
+ lim
2413
+ n→∞ sup
2414
+ τ∈Tx
2415
+ Ex[Aτ
2416
+ ne
2417
+ � τ
2418
+ 0 g(Xs)ds] = 0,
2419
+ which concludes the proof.
2420
+
2421
+ Next, we consider an optimal stopping problem of the form
2422
+ u(x) := sup
2423
+ τ∈Tx,b
2424
+ ln Ex
2425
+
2426
+ exp
2427
+ �� τ
2428
+ 0
2429
+ g(Xs)ds + G(Xτ)
2430
+ ��
2431
+ ,
2432
+ x ∈ E;
2433
+ (A.1)
2434
+ note that here the non-positivity assumption for G is only a normalisation as for a
2435
+ generic ˜G we may set G(·) = ˜G(·) − ∥ ˜G∥ to get G(·) ≤ 0.
2436
+ The properties of the map (A.1) are summarised in the following proposition.
2437
+ Proposition A.3. Let the map u be given by (A.1). Then, x �→ u(x) is continuous
2438
+ and bounded. Also, we get
2439
+ u(x) = sup
2440
+ τ∈Tx
2441
+ ln Ex
2442
+
2443
+ exp
2444
+ �� τ
2445
+ 0
2446
+ g(Xs)ds + G(Xτ)
2447
+ ��
2448
+ ,
2449
+ x ∈ E.
2450
+ (A.2)
2451
+ Moreover, the process
2452
+ z(t) := e
2453
+ � t
2454
+ 0 g(Xs)+u(Xt),
2455
+ t ≥ 0,
2456
+ is a supermartingale and the process z(t ∧ ˆτ), t ≥ 0, is a martingale, where
2457
+ ˆτ := inf{t ≥ 0 : u(Xt) ≤ G(Xt)}.
2458
+ (A.3)
2459
+ Proof. For transparency, we split the proof into two steps: (1) proof of the conti-
2460
+ nuity of x �→ u(x) and identity (A.2); (2) proof of the martingale properties of the
2461
+ process z.
2462
+ Step 1. We show that the map x �→ u(x) is continuous and the identity (A.2)
2463
+ holds. For any T ≥ 0 and x ∈ E, let us define
2464
+ ˆu(x) := sup
2465
+ τ∈Tx
2466
+ ln Ex
2467
+
2468
+ exp
2469
+ �� τ
2470
+ 0
2471
+ g(Xs)ds + G(Xτ)
2472
+ ��
2473
+ ;
2474
+ (A.4)
2475
+ uT (x) := sup
2476
+ τ≤T
2477
+ ln Ex
2478
+
2479
+ exp
2480
+ �� τ
2481
+ 0
2482
+ g(Xs)ds + G(Xτ)
2483
+ ��
2484
+ .
2485
+ (A.5)
2486
+ Using Assumption (A3) and following the proof of Proposition 10 and Proposition
2487
+ 11 in [16], we get that the map (T, x) �→ uT (x) is jointly continuous and bounded;
2488
+ see also Remark 12 therein. We show that uT (x) → ˆu(x) as T → ∞ uniformly in
2489
+ x ∈ E. Noting that
2490
+ −∥G∥ ≤ uT (x) ≤ u(x),
2491
+ T ≥ 0, x ∈ E,
2492
+ and using the inequality | ln y−lnz| ≤
2493
+ 1
2494
+ min(y,z)|y−z|, y, z > 0, to show uT (x) → ˆu(x)
2495
+ as T → ∞ uniformly in x ∈ E it is enough to show euT (x) → eˆu(x) as T → ∞
2496
+
2497
+ 22 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
2498
+ uniformly in x ∈ E. Then, using Lemma A.1, for any ε > 0, we may find T ≥ 0
2499
+ such that for any x ∈ E, we obtain
2500
+ 0 ≤ eˆu(x) − euT (x) ≤ sup
2501
+ τ∈Tx
2502
+ Ex
2503
+
2504
+ e
2505
+ � τ
2506
+ 0 g(Xs)ds+G(Xτ ) − e
2507
+ � τ∧T
2508
+ 0
2509
+ g(Xs)ds+G(Xτ∧T )�
2510
+ ≤ sup
2511
+ τ∈Tx
2512
+ Ex
2513
+
2514
+ 1{τ≥T }
2515
+
2516
+ e
2517
+ � τ
2518
+ 0 g(Xs)ds+G(Xτ ) − e
2519
+ � T
2520
+ 0 g(Xs)ds+G(XT )��
2521
+ ≤ sup
2522
+ τ∈Tx
2523
+ Ex
2524
+
2525
+ 1{τ≥T }e
2526
+ � τ
2527
+ 0 g(Xs)ds+G(Xτ )�
2528
+ ≤ sup
2529
+ τ≥T
2530
+ τ∈Tx
2531
+ Ex
2532
+
2533
+ e
2534
+ � τ
2535
+ 0 g(Xs)ds�
2536
+ ≤ ε.
2537
+ Thus, letting ε → 0, we get euT (x) → eˆu(x) as T → ∞ uniformly in x ∈ E and
2538
+ consequently uT (x) → ˆu(x) as T → ∞ uniformly in x ∈ E.
2539
+ Thus, from the
2540
+ continuity of x �→ uT (x), T ≥ 0, we get that the map x �→ ˆu(x) is continuous.
2541
+ Now, we show that u ≡ ˆu. First, we show that limT →∞ uT (x) = ˜u(x), where
2542
+ ˜u(x) := supτ∈Tx lim infT →∞ ln Ex
2543
+
2544
+ e
2545
+ � τ∧T
2546
+ 0
2547
+ g(Xs)ds+G(Xτ∧T )�
2548
+ , x ∈ E. For any T ≥ 0
2549
+ and x ∈ E, we get
2550
+ uT (x) = sup
2551
+ τ≤T
2552
+ lim inf
2553
+ S→∞ ln Ex
2554
+
2555
+ e
2556
+ � τ∧S
2557
+ 0
2558
+ g(Xs)ds+G(Xτ∧S)�
2559
+ ≤ ˜u(x),
2560
+ thus we get limT →∞ uT (x) ≤ ˜u(x). Also, for any x ∈ E, ˜τ ∈ Tx, and T ≥ 0, we get
2561
+ ln Ex
2562
+
2563
+ e
2564
+ � ˜τ∧T
2565
+ 0
2566
+ g(Xs)ds+G(X˜τ∧T )�
2567
+ ≤ uT(x).
2568
+ Thus, letting T → ∞ and taking supremum over ˜τ ∈ Tx we get limT →∞ uT (x) =
2569
+ ˜u(x), x ∈ E. Also, using the argument from Lemma 2.2 from [17] we get ˜u ≡ u.
2570
+ Thus, we get u(x) = limT →∞ uT (x) = ˆu(x), x ∈ E, hence the map x �→ u(x) is
2571
+ continuous. Also, we get (A.2).
2572
+ Step 2. We show the martingale properties of z. First, we focus on the stopping
2573
+ time ˆτ. Let us define
2574
+ τT := inf{t ≥ 0 : uT −t(Xt) ≤ G(Xt)}.
2575
+ Using the argument from Proposition 11 in [16] we get that τT is an optimal stopping
2576
+ time for uT . Also, noting that the map T �→ uT (x), x ∈ E, is increasing, we get
2577
+ that T �→ τT is also increasing, thus we may define ˜τ := limT →∞ τT . We show that
2578
+ ˜τ ≡ ˆτ.
2579
+ Let A := {˜τ < ∞}. First, we show that ˜τ ≡ ˆτ on A. On the event A, we get
2580
+ uT −τT (XτT ) = G(XτT ). Thus, letting T → ∞, we get u(X˜τ) = G(X˜τ), hence we
2581
+ get ˆτ ≤ ˜τ. Also, noting that uS(x) ≤ u(x), x ∈ E, S ≥ 0, on the set {ˆτ ≤ T } we
2582
+ get uT −ˆτ(Xˆτ) ≤ u(Xˆτ) ≤ G(Xˆτ), hence
2583
+ τT ≤ ˆτ.
2584
+ (A.6)
2585
+ Thus, recalling that ˆτ ≤ ˜τ < ∞ and letting T → ∞ in (A.6), we get ˜τ ≤ ˆτ, which
2586
+ shows ˜τ ≡ ˆτ on A.
2587
+ Now, we show that ˜τ ≡ ˆτ on Ac. Let ω ∈ Ac and suppose that ˆτ(ω) < ∞. Then,
2588
+ we may find T ≥ 0 such that ˆτ(ω) < T . Also, for any S ≥ T we get
2589
+ uS−ˆτ(ω)(Xˆτ(ω)(ω)) ≤ u(Xˆτ(ω)(ω)) ≤ G(Xˆτ(ω)(ω)).
2590
+
2591
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 23
2592
+ Thus, we get τS(ω) ≤ ˆτ(ω) for any S ≥ T . Consequently, letting S → ∞ we get
2593
+ ˜τ(ω) < ∞, which contradicts the choice of ω ∈ Ac. Consequently, on Ac we have
2594
+ ˜τ = ∞ = ˆτ.
2595
+ Finally, we show the martingale properties. Let us define the processes
2596
+ zT (t) := e
2597
+ � t∧T
2598
+ 0
2599
+ g(Xs)ds+uT −t∧T (Xt∧T ),
2600
+ T, t ≥ 0,
2601
+ z(t) := e
2602
+ � t
2603
+ 0 g(Xs)ds+u(Xt),
2604
+ t ≥ 0.
2605
+ Using standard argument we get that for any T ≥ 0, the process zT (t), t ≥ 0, is a
2606
+ supermartingale and zT (t ∧ τT ), t ≥ 0, is a martingale; see e.g. [11, 12] for details.
2607
+ Also, recalling that from the first step we get uT (x) → u(x) as T → ∞ uniformly
2608
+ in x ∈ E, for any t ≥ 0, we get that zT (t) → z(t) and zT (t ∧ τT ) → z(t ∧ ˆτ) as
2609
+ T → ∞. Consequently, using Lebesgue’s dominated convergence theorem, we get
2610
+ that the process z(t) is a supermartingale and z(t∧ ˆτ), t ≥ 0, is a martingale, which
2611
+ concludes the proof.
2612
+
2613
+ Next, we consider an optimal stopping problem in a compact set and dyadic
2614
+ time-grid. More specifically, let δ > 0, let B ⊂ E be compact and assume that
2615
+ Px[τB < ∞] = 1, x ∈ B, where τB := δ inf{n ∈ N: Xnδ /∈ B}.
2616
+ Within this
2617
+ framework, we consider an optimal stopping problem of the form
2618
+ uB(x) := sup
2619
+ τ∈T δ ln Ex
2620
+
2621
+ exp
2622
+ �� τ∧τB
2623
+ 0
2624
+ g(Xs)ds + G(Xτ∧τB)
2625
+ ��
2626
+ ,
2627
+ x ∈ E.
2628
+ (A.7)
2629
+ The properties of (A.7) are summarised in the following proposition.
2630
+ Proposition A.4. Let uB be given by (A.7). Then, we get
2631
+ uB(x) = sup
2632
+ τ∈T δ
2633
+ x,b
2634
+ ln Ex
2635
+
2636
+ exp
2637
+ �� τ∧τB
2638
+ 0
2639
+ g(Xs)ds + G(Xτ∧τB)
2640
+ ��
2641
+ ,
2642
+ x ∈ E.
2643
+ (A.8)
2644
+ Also, the map x �→ uB(x) is continuous and bounded. Moreover, the process
2645
+ zδ(n) := e
2646
+ � nδ
2647
+ 0
2648
+ g(Xs)+u(Xnδ),
2649
+ n ∈ N,
2650
+ is a supermartingale and the process z(n ∧ ˆτ/δ), n ∈ N, is a martingale, where
2651
+ ˆτ := δ inf{n ∈ N: uB(Xnδ) ≤ G(Xnδ)}.
2652
+ (A.9)
2653
+ Proof. To ease the notation, let us define
2654
+ ˆuB(x) := sup
2655
+ τ∈T δ
2656
+ x,b
2657
+ ln Ex
2658
+
2659
+ exp
2660
+ �� τ∧τB
2661
+ 0
2662
+ g(Xs)ds + G(Xτ∧τB)
2663
+ ��
2664
+ ,
2665
+ x ∈ E,
2666
+ un
2667
+ B(x) := sup
2668
+ τ∈T δ
2669
+ τ≤nδ
2670
+ ln Ex
2671
+
2672
+ exp
2673
+ �� τ∧τB
2674
+ 0
2675
+ g(Xs)ds + G(Xτ∧τB)
2676
+ ��
2677
+ ,
2678
+ n ∈ N, x ∈ E,
2679
+ and note that we get un
2680
+ B(x) ≤ ˆuB(x) ≤ uB(x),
2681
+ x ∈ E. Next, note that using
2682
+ the boundedness of G and Proposition A.2, by Lebesgue’s dominated convergence
2683
+ theorem, we obtain
2684
+ uB(x) = sup
2685
+ τ∈T
2686
+ lim
2687
+ n→∞ ln Ex
2688
+
2689
+ exp
2690
+ �� τ∧(nδ)∧τB
2691
+ 0
2692
+ g(Xs)ds + G(Xτ∧(nδ)∧τB)
2693
+ ��
2694
+ ,
2695
+ x ∈ E.
2696
+
2697
+ 24 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
2698
+ Also, for any n ∈ N, x ∈ E, and τ ∈ T δ, we get
2699
+ un
2700
+ B(x) ≥ ln Ex
2701
+
2702
+ exp
2703
+ �� τ∧(nδ)∧τB
2704
+ 0
2705
+ g(Xs)ds + G(Xτ∧(nδ)∧τB)
2706
+ ��
2707
+ ,
2708
+ x ∈ E.
2709
+ Thus, letting n → ∞ and taking the supremum with respect to τ ∈ T δ, we get
2710
+ limn→∞ un
2711
+ B(x) �� uB(x), x ∈ E. Consequently, we have
2712
+ lim
2713
+ n→∞ un
2714
+ B(x) = ˆuB(x) = uB(x),
2715
+ x ∈ E,
2716
+ which concludes the proof of (A.8).
2717
+ Let us now show the continuity of the map x �→ uB(x) and the martingale
2718
+ characterisation. To see this, note that using a standard argument one may show
2719
+ that, for any n ∈ N and x ∈ B, we get
2720
+ u0
2721
+ B(x) = G(x), x ∈ B,
2722
+ eun+1
2723
+ B
2724
+ (x) = max(eG(x), Ex
2725
+
2726
+ 1{Xδ∈B}e
2727
+ � δ
2728
+ 0 g(Xs)ds+un
2729
+ B(Xδ) + 1{Xδ /∈B}e
2730
+ � δ
2731
+ 0 g(Xs)ds+G(Xδ)�
2732
+ ,
2733
+ and, for any n ∈ N and x /∈ B, we get un
2734
+ B(x) = G(x); see e.g. Section 2.2 in [28]
2735
+ for details. Thus, letting n → ∞, for x ∈ B, we have
2736
+ euB(x) = max(eG(x), Ex
2737
+
2738
+ 1{Xδ∈B}e
2739
+ � δ
2740
+ 0 g(Xs)ds+uB(Xδ) + 1{Xδ /∈B}e
2741
+ � δ
2742
+ 0 g(Xs)ds+G(Xδ)�
2743
+ ,
2744
+ while for x /∈ B, we get uB(x) = G(x). Also, using Assumption (A2), we get that
2745
+ the process X is strong Feller. Thus, repeating the argument used in Lemma 4
2746
+ from Chapter II.5 in [13], we get that, for any bounded and measurable function
2747
+ h: E �→ R, the map
2748
+ E ∋ x �→ Ex
2749
+
2750
+ e
2751
+ � δ
2752
+ 0 g(Xs)dsh(Xt)
2753
+
2754
+ is continuous and bounded. Applying this observation to h(x) := 1{x∈B}euB(x) and
2755
+ h(x) := 1{x/∈B}eG(x), x ∈ E, we get the continuity of x �→ uB(x). Also, using the
2756
+ argument from Proposition 3.2 we get that zδ(n), n ∈ N is a supermartingale and
2757
+ z(n ∧ ˆτ/δ), n ∈ N, is a martingale, which concludes the proof.
2758
+
2759
+ References
2760
+ [1] A. Arapostathis and A. Biswas. Infinite horizon risk-sensitive control of dif-
2761
+ fusions without any blanket stability assumptions. Stochastic Processes and
2762
+ their Applications, 128:1485–1524, 2018.
2763
+ [2] A. Basu and �L. Stettner. Zero-sum Markov games with impulse controls. SIAM
2764
+ Journal on Control and Optimization, 58(1):580–604, 2020.
2765
+ [3] E. Bayraktar, T. Emmerling, and J. Menaldi. On the impulse control of jump
2766
+ diffusions. SIAM Journal on Control and Optimization, 51(3):2612–2637, 2013.
2767
+ [4] A. Bensoussan and J.-L. Lions. Impulse Control And Quasi-Variational In-
2768
+ equalities. Gauthier-Villars, Montrouge, 1984.
2769
+ [5] T. R. Bielecki and S. R. Pliska.
2770
+ Economic properties of the risk sensitive
2771
+ criterion for portfolio management. Review of Accounting and Finance, 2:3–
2772
+ 17, 2003.
2773
+ [6] A. Biswas and V. Borkar.
2774
+ Ergodic risk-sensitive control – a survey.
2775
+ arXiv:2301.00224, 2023.
2776
+ [7] F. Bonsall. Lectures On Some Fixed Point Theorems Of Functional Analysis.
2777
+ Tata Institute of Fundamental Research, 1962.
2778
+
2779
+ ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD 25
2780
+ [8] S. Christensen.
2781
+ On the solution of general impulse control problems us-
2782
+ ing superharmonic functions.
2783
+ Stochastic Processes and their Applications,
2784
+ 124(1):709–729, 2014.
2785
+ [9] M.H.A. Davis. Markov models and optimization. Chapman & Hall/CRC, 01
2786
+ 1993.
2787
+ [10] F. Dufour and A. B. Piunovskiy. Impulsive control for continuous-time Markov
2788
+ decision processes: A linear programming approach. Applied Mathematics and
2789
+ Optimization, 74:129–161, 2016.
2790
+ [11] A. Fakeev. Optimal stopping rules for stochastic processes with continuous
2791
+ parameter. Theory of Probability & Its Applications, 15(2):324–331, 1970.
2792
+ [12] A. Fakeev. Optimal stopping of a Markov process. Theory of Probability & Its
2793
+ Applications, 16(4):694–696, 1971.
2794
+ [13] I.I. Gikhman and A.V. Skorokhod.
2795
+ The Theory of Stochastic Processes II.
2796
+ Springer, 1975.
2797
+ [14] R. A. Howard and J. E. Matheson. Risk-sensitive Markov decision processes.
2798
+ Management Science, 18(7):356–369, 1972.
2799
+ [15] D. Jelito, M. Pitera, and �L. Stettner. Long-run risk sensitive impulse control.
2800
+ SIAM Journal on Control and Optimization, 58(4):2446–2468, 2020.
2801
+ [16] D. Jelito, M. Pitera, and �L. Stettner. Risk sensitive optimal stopping. Sto-
2802
+ chastic Processes and their Applications, 136:125–144, 2021.
2803
+ [17] D. Jelito and �L. Stettner. Risk-sensitive optimal stopping with unbounded
2804
+ terminal cost function. Electronic Journal of Probability, 27:1–30, 2022.
2805
+ [18] R. Korn. Some applications of impulse control in mathematical finance. Math-
2806
+ ematical Methods of Operations Research, 50:493–518, 1999.
2807
+ [19] J. Menaldi and M. Robin. On some ergodic impulse control problems with con-
2808
+ straint. SIAM Journal on Control and Optimization, 56(4):2690–2711, 2018.
2809
+ [20] H. Nagai. Stopping problems of certain multiplicative functionals and optimal
2810
+ investment with transaction costs.
2811
+ Applied Mathematics and Optimization,
2812
+ 55(3):359–384, 2007.
2813
+ [21] J. Palczewski and �L. Stettner.
2814
+ Finite horizon optimal stopping of time-
2815
+ discontinuous functionals with applications to impulse control with delay.
2816
+ SIAM Journal on Control and Optimization, 48(8):4874–4909, 2010.
2817
+ [22] G. Peskir and A. Shiryaev. Optimal Stopping and Free-Boundary Problems.
2818
+ Springer, 2006.
2819
+ [23] H. Pham. Long time asymptotics for optimal investment. In Peter K. Friz, Jim
2820
+ Gatheral, Archil Gulisashvili, Antoine Jacquier, and Josef Teichmann, editors,
2821
+ Large Deviations and Asymptotic Methods in Finance, pages 507–528, Cham,
2822
+ 2015. Springer International Publishing.
2823
+ [24] M. Pitera and �L. Stettner.
2824
+ Long-run risk sensitive dyadic impulse control.
2825
+ Applied Mathematics & Optimization, 84(1):19–47, 2021.
2826
+ [25] A. Piunovskiy, A. Plakhov, and M. Tumanov. Optimal impulse control of a SIR
2827
+ epidemic. Optimal Control Applications and Methods, 41(2):448–468, 2020.
2828
+ [26] M.
2829
+ Robin.
2830
+ Contrˆole
2831
+ impulsionnel
2832
+ des
2833
+ processus
2834
+ de
2835
+ Markov.
2836
+ th`ese
2837
+ d’´etat,
2838
+ Universit´e
2839
+ Paris
2840
+ Dauphine,
2841
+ 1978.
2842
+ Available
2843
+ at
2844
+ https://tel.archives-ouvertes.fr/tel-00735779.
2845
+ [27] W. J. Runggaldier and K. Yasuda. Classical and restricted impulse control
2846
+ for the exchange rate under a stochastic trend model. Journal of Economic
2847
+ Dynamics and Control, 91:369–390, 2018.
2848
+
2849
+ 26 ASYMPTOTICS OF IMPULSE CONTROL PROBLEM WITH MULTIPLICATIVE REWARD
2850
+ [28] A. Shiryaev. Optimal Stopping Rules. Springer, 1978.
2851
+ [29] �L. Stettner. On impulsive control with long run average cost criterion. In
2852
+ Stochastic Differential Systems, pages 354–360. Springer, 1982.
2853
+ [30] �L. Stettner. On some stopping and implusive control problems with a general
2854
+ discount rate criteria.
2855
+ Probability and Mathematical Statistics, 10:223–245,
2856
+ 1989.
2857
+ [31] �L. Stettner. Asymptotics of HARA utility from terminal wealth under pro-
2858
+ portional transaction costs with decision lag or execution delay and obligatory
2859
+ diversification. In Giulia Di Nunno and Bernt Øksendal, editors, Advanced
2860
+ Mathematical Methods for Finance, pages 509–536, Berlin, Heidelberg, 2011.
2861
+ Springer Berlin Heidelberg.
2862
+ [32] �L. Stettner. On an approximation of average cost per unit time impulse control
2863
+ of Markov processes. SIAM Journal on Control and Optimization, 60(4):2115–
2864
+ 2131, 2022.
2865
+ Statements and Declarations
2866
+ Damian Jelito and �Lukasz Stettner acknowledge research support by Polish Na-
2867
+ tional Science Centre grant no. 2020/37/B/ST1/00463.
2868
+ The authors have no relevant financial or non-financial interests to disclose.
2869
+ The authors contributed equally to this work.
2870
+
3NE2T4oBgHgl3EQf5wjH/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
3dE1T4oBgHgl3EQf5wXA/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:10a81797dc601727c1a9bb2fc9fd5a0fc6e276284ce1c81eb0eb8727d56d17ad
3
+ size 2293805
59E1T4oBgHgl3EQfTAPi/content/2301.03074v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1a126ac50c3efb8c205a3e681cee07605b7f181d21cecbdd553525f303704628
3
+ size 4264662
59E1T4oBgHgl3EQfTAPi/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c343a369f691dd738873c698f541ce1cb2ee8b752914f339198538ccb9004774
3
+ size 145420
8dE1T4oBgHgl3EQfCAI3/content/tmp_files/2301.02858v1.pdf.txt ADDED
@@ -0,0 +1,2437 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02858v1 [eess.SP] 7 Jan 2023
2
+ 1
3
+ Three Efficient Beamforming Methods for Hybrid
4
+ IRS-aided AF Relay Wireless Networks
5
+ Xuehui Wang, Feng Shu, Mengxing Huang, Fuhui Zhou, Riqing Chen, Cunhua Pan, Yongpeng Wu,
6
+ and Jiangzhou Wang, Fellow, IEEE
7
+ Abstract—Due to the “double fading” effect caused by con-
8
+ ventional passive intelligent reflecting surface (IRS), the signal
9
+ via the reflection link is weak. To enhance the received signal,
10
+ active elements with the ability to amplify the reflected signal
11
+ are introduced to the passive IRS forming hybrid IRS. In
12
+ this paper, a hybrid IRS-aided amplify-and-forward (AF) relay
13
+ wireless network is considered, where an optimization problem
14
+ is formulated to maximize signal-to-noise ratio (SNR) by jointly
15
+ optimizing the beamforming matrix at AF relay and the reflecting
16
+ coefficient matrices at IRS subject to the constraints of transmit
17
+ power budgets at the source/AF relay/hybrid IRS and that of
18
+ unit-modulus for passive IRS phase shifts. To achieve high rate
19
+ performance and extend the coverage range, a high-performance
20
+ method based on semidefinite relaxation and fractional program-
21
+ ming (HP-SDR-FP) algorithm is presented. Due to its extremely
22
+ high complexity, a low-complexity method based on successive
23
+ convex approximation and FP (LC-SCA-FP) algorithm is put
24
+ forward. To further reduce the complexity, a lower-complexity
25
+ method based on whitening filter, general power iterative and
26
+ generalized Rayleigh-Ritz (WF-GPI-GRR) is proposed, where
27
+ different from the above two methods, it is assumed that the
28
+ amplifying coefficient of each active IRS element is equal, and
29
+ the corresponding analytical solution of the amplifying coefficient
30
+ can be obtained according to the transmit powers at AF relay
31
+ and hybrid IRS. Simulation results show that the proposed three
32
+ methods can greatly improve the rate performance compared to
33
+ the existing networks, such as the passive IRS-aided AF relay and
34
+ only AF relay network. In particular, a 50.0% rate gain over the
35
+ existing networks is approximately achieved in the high power
36
+ budget region of hybrid IRS. Moreover, it is verified that the
37
+ proposed three efficient beamforming methods have an increasing
38
+ This work was supported in part by the National Natural Science Foundation
39
+ of China (Nos.U22A2002, 62071234 and 61972093), the Major Science
40
+ and Technology plan of Hainan Province under Grant ZDKJ2021022, and
41
+ the Scientific Research Fund Project of Hainan University under Grant
42
+ KYQD(ZR)-21008.(Corresponding authors: Feng Shu).
43
+ Xuehui Wang and Mengxing Huang are with the School of Information
44
+ and Communication Engineering, Hainan University, Haikou, 570228, China.
45
+ Feng Shu is with the School of Information and Communication Engi-
46
+ neering, Hainan University, Haikou 570228, China, and also with the School
47
+ of Electronic and Optical Engineering, Nanjing University of Science and
48
+ Technology, Nanjing 210094, China (e-mail: [email protected]).
49
+ Fuhui Zhou is with the College of Electronic and Information Engineering,
50
+ Nanjing University of Aeronautics and Astronautics, Nanjing 210000, China,
51
+ also with the Key Laboratory of Dynamic Cognitive System of Electromag-
52
+ netic Spectrum Space, Nanjing University of Aeronautics and Astronautics,
53
+ Nanjing 210000, China, and also with the Ministry of Industry and Informa-
54
+ tion Technology, Nanjing 211106, China (e-mail: [email protected]).
55
+ Riqing Chen is with the Digital Fujian Institute of Big Data for Agriculture,
56
+ Fujian Agriculture and Forestry University, Fuzhou 350002, China (e-mail:
57
58
+ Cunhua Pan is with National Mobile Communications Research Laboratory,
59
+ Southeast University, Nanjing 211111, China (e-mail: [email protected]).
60
+ Yongpeng Wu is with the Shanghai Key Laboratory of Navigation and
61
+ Location Based Services, Shanghai Jiao Tong University, Minhang 200240,
62
+ China. (e-mail: [email protected]).
63
+ Jiangzhou Wang is with the School of Engineering, University of Kent,
64
+ Canterbury CT2 7NT, U.K. Email: (e-mail: [email protected]).
65
+ order in rate performance: WF-GPI-GRR, LC-SCA-FP and HP-
66
+ SDR-FP.
67
+ Index Terms—Double fading, intelligent reflecting surface,
68
+ active elements, hybrid IRS, AF relay.
69
+ I. INTRODUCTION
70
+ With the rapid expansion of Internet-of-Things (IoT), the
71
+ smart devices and data traffic explosively grows [1]–[3]. There
72
+ are more stringent requirements for IoT in terms of massive
73
+ connectivity, extended coverage, low-latency, low-power, and
74
+ low-cost [4]–[6]. Because of high hardware cost and energy
75
+ consumption, some existing technologies [7], such as mil-
76
+ limeter wave (mmWave), massive multiple-input multiple-out
77
+ (MIMO), coordinated multi-point, wireless network coding,
78
+ are far away from meeting the demands, e.g., autonomous,
79
+ ultra-large-scale, highly dynamic and fully intelligent services
80
+ [8]. In the existing wireless networks, adding relay nodes can
81
+ not only save the number of base stations, but also realize
82
+ the cooperation of multiple communication nodes, so as to
83
+ improve the throughput and reliability [9], [10]. However, the
84
+ relay is an active device, which needs much energy to process
85
+ signals. Therefore, it is imperative to develop a future wireless
86
+ network, which is innovative, efficient and resource saving.
87
+ Owing to the advantages of low circuit cost, low energy con-
88
+ sumption, programmability and easy deployment, intelligent
89
+ reflecting surface (IRS) is attractive, which has gained much
90
+ research attention from both academia and industry [11]–[13].
91
+ IRS is composed of a large number of passive electromagnetic
92
+ units, which are dynamically controlled to reflect incident
93
+ signal forming an intelligent wireless propagation environment
94
+ in a software-defined manner [14]–[17]. From the perspective
95
+ of electromagnetic theory, radiation pattern and physics nature
96
+ of IRS unit, the free-space path loss models for IRS-assisted
97
+ wireless communications were well introduced in [18]. A
98
+ IRS-aided dual-hop visible light communication (VLC)/radio
99
+ frequency (RF) system was proposed in [19] , where the
100
+ performance analysis related to the outage probability and bit
101
+ error rate (BER) were presented. Because of reconfigurability,
102
+ IRS has been viewed as an enabling and potential technology
103
+ to achieve performance enhancement, spectral and energy
104
+ efficiency improvement. With more and more research on IRS,
105
+ IRS has been widely applied to the following scenarios, physi-
106
+ cal layer security [20]–[22], simultaneous wireless information
107
+ and power transfer (SWIPT) [23], [24], multicell MIMO
108
+ communications [25], [26], covert communications [27], [28],
109
+ and wireless powered communication network (WPCN) [29]–
110
+ [31]. To maximize secrecy rate for IRS-assisted multi-antenna
111
+
112
+ 2
113
+ systems in [22], where an efficient alternating algorithm was
114
+ developed to jointly optimize the transmit covariance of the
115
+ source and the phase shift matrix of the IRS. For multicell
116
+ communication systems [25], IRS was deployed at the cell
117
+ boundary. While a method of jointly optimizing the active
118
+ precoding matrices at the base stations (BSs) and the phase
119
+ shifts at the IRS was proposed to maximize the weighted sum
120
+ rate of all users. A IRS-aided secure MIMO WPCN is consid-
121
+ ered in [31], by jointly optimizing the downlink (DL)/uplink
122
+ (UL) time allocation, the energy transmit covariance matrix
123
+ of hybrid access point (AP), the transmit beamforming matrix
124
+ of users and the phase shifts of IRS, the maximum secrecy
125
+ throughput of all users was achieved.
126
+ Combining the advantages of IRS and relay is interesting,
127
+ which can strike a good balance among cost, energy and per-
128
+ formance. Recently, there were some related research works on
129
+ the combination of IRS and relay appeared, which proved the
130
+ combination could well serve for the wireless communication
131
+ network in terms of coverage extension [32], [33], energy
132
+ efficiency [34], spectral efficiency [35] and rate performance
133
+ [36], [37]. The authors proposed an IRS-assisted dual-hop free
134
+ space optical and radio frequency (FSO-RF) communication
135
+ system with a decode-and-forward (DF) relaying protocol,
136
+ and derived the exact closed-form expressions for the outage
137
+ probability and bit error rate (BER) [32]. The simulation
138
+ results verified that the combination can improve the coverage.
139
+ An IRS-aided multi-antenna DF relay network was proposed
140
+ in [36], where three methods, an alternately iterative structure,
141
+ null-space projection plus maximum ratio combining (MRC)
142
+ and IRS element selection plus MRC, were put forward to
143
+ improve the rate performance. Obviously, the rate performance
144
+ was improved by optimizing beamforming at relay and phase
145
+ shifts at IRS. Moreover, compared with only IRS network, the
146
+ hybrid network consisting of an IRS and a single-antenna DF
147
+ relay can achieve the same rate performance with less IRS
148
+ elements [37].
149
+ However, the above existing research work focused on
150
+ conventional passive IRS. Since the received signal via the
151
+ reflecting channel link experiences large-scale fading twice
152
+ (i.e., “double fading” effect), the received signal is weak in
153
+ fact. Aiming at eliminating the “double fading” effect, the
154
+ active IRS with extra power supply emerges, which can reflect
155
+ and amplify the incident signals for obvious performance ad-
156
+ vancement. In [38], the authors proposed the concept of active
157
+ IRS and came up with a joint transmit and reflect precoding al-
158
+ gorithm to solve the problem of capacity maximization, which
159
+ existed in a signal model for active IRS. It was verified that the
160
+ proposed active IRS could achieve a noticeable capacity gain
161
+ compared to the existing passive IRS, which showed that the
162
+ “double fading” effect could be broken by active IRS. With
163
+ the same overall power budget, a fair performance comparison
164
+ between active IRS and passive IRS was made theoretically
165
+ in [39], where it proved that the active IRS surpassed passive
166
+ IRS in the case of a small or medium number of IRS elements
167
+ or sufficient power budget. Accordingly, a novel active IRS-
168
+ assisted secure wireless transmission was proposed in [40],
169
+ where the non-convex secrecy rate optimization problem was
170
+ solved by jointly optimizing the beamformer at transmitter
171
+ and reflecting coefficient matrix at IRS. It was demonstrated
172
+ that with the aid of active IRS, a significantly higher secrecy
173
+ performance gain could be obtained compared with existing
174
+ solutions with passive IRS and without IRS design.
175
+ Considering that active IRS has the ability to amplify signal,
176
+ and in order to achieve higher rate performance or save more
177
+ passive IRS elements of the combination network of IRS and
178
+ relay, we propose that adding active IRS elements to passive
179
+ IRS, thereby a combination network of hybrid IRS and relay is
180
+ generated, which makes full use of the advantages of passive
181
+ IRS, active IRS and relay to strike a good balance among
182
+ circuit cost, energy efficiency and rate performance. To our
183
+ best knowledge, it is lack of little research work on the hybrid
184
+ IRS-aided amplify-and-forward (AF) relay network.
185
+ In this case, using the criterion of Max SNR, three efficient
186
+ beamforming methods are proposed to improve the rate perfor-
187
+ mance of the proposed hybrid IRS-aided AF relay network or
188
+ dramatically extend its coverage range. The main contributions
189
+ of the paper are summarized as follows:
190
+ 1) To achieve a high rate, a high-performance method based
191
+ on semidefinite relaxation and fractional programming
192
+ (HP-SDR-FP) algorithm is presented to jointly optimize
193
+ the beamforming matrix at AF relay and the reflecting
194
+ coefficient matrices at IRS by optimizing one and fixing
195
+ the other two. However, it is difficult to directly solve
196
+ the non-convex optimization problem with fractional and
197
+ non-concave objective function and non-convex con-
198
+ straints. To address this issue, some operations such as
199
+ vectorization, Kronecker product and Hadamard product
200
+ are applied to simplify the non-convex optimization
201
+ problem, then SDR algorithm, Charnes-Cooper trans-
202
+ formation of FP algorithm and Gaussian randomization
203
+ method are adopted to obtain the optimization variable.
204
+ The proposed HP-SDR-FP method can harvest up to
205
+ 80% rate gain over the passive IRS-aided AF relay
206
+ network as the number of active IRS elements tends to
207
+ large. Additionally, its convergence rate is fast, and its
208
+ highest order of computational complexity is M 13 and
209
+ N 6.5 FLOPs.
210
+ 2) To reduce the extremely high computational complexity
211
+ of the proposed HP-SDR-FP method, a low-complexity
212
+ method based on successive convex approximation and
213
+ FP (LC-SCA-FP) algorithm is presented. For the non-
214
+ convex optimization problem, Dinkelbach’s transforma-
215
+ tion of FP algorithm is firstly performed to simplify the
216
+ objective function. Then by utilizing the first-order Tay-
217
+ lor approximation of the simplified objective function
218
+ and relaxing the unit-modulus constraint for passive IRS
219
+ phase shifts, the non-convex optimization problem is
220
+ transformed to convex, and can be solved. The proposed
221
+ LC-SCA-FP method performs much better than passive
222
+ IRS-aided AF relay network, passive IRS-aided AF
223
+ relay network with random phase and only AF relay
224
+ network in terms of rate. Its rate is 60% higher than
225
+ that of passive IRS-aided AF relay system. Furthermore,
226
+ it is convergent, and its highest order of computational
227
+ complexity is M 6 and N 3 FLOPs, which is much lower
228
+ than that of HP-SDR-FP method.
229
+
230
+ 3
231
+ 3) To further reduce the computational complexity of the
232
+ above two methods, a lower-complexity method based
233
+ on whitening filter, general power iterative algorithm
234
+ and generalized Rayleigh-Ritz theorem (WF-GPI-GRR)
235
+ is put forward, where it is assumed that the amplifying
236
+ coefficient of each active IRS element is equal in the first
237
+ time slot or the second time slot. To exploit the colored
238
+ property of noise, whitening filter operation is performed
239
+ to the received signal. In line with the transmit power at
240
+ AF relay and hybrid IRS, the analytical solution of the
241
+ amplifying coefficient can be obtained. Moreover, the
242
+ closed-form expression of beamforming matrix at AF
243
+ relay is derived by utilizing maximum-ratio combining
244
+ and maximum-ratio transmission (MRC-MRT) scheme,
245
+ GPI and GRR are respectively applied to obtain the
246
+ phase shift matrices at IRS for the first time slot and
247
+ the second time slot. Compared with passive IRS-aided
248
+ AF relay network, its rate can be improved by 49%. Its
249
+ highest order of computational complexity is M 3 and
250
+ N 3 FLOPs, which is lower than the above two methods.
251
+ The remainder of this paper is organized as follows. In
252
+ Section II, a hybrid IRS-aided AF relay network is described.
253
+ In Section III, we propose a high-performance method. Section
254
+ IV describes a a low-complexity method. A lower-complexity
255
+ method is presented in Section V. We present our simulation
256
+ results in Section VI, and draw conclusions in Section VII.
257
+ Notation: Scalars, vectors and matrices are respectively
258
+ represented by letters of lower case, bold lower case, and bold
259
+ upper case. (·)∗, (·)T , (·)H, and (·)−1 stand for matrix conju-
260
+ gate, transpose, conjugate transpose, and inverse, respectively.
261
+ E{·}, | · |, ∥ · ∥, tr(·), and arg(·) denote expectation operation,
262
+ the modulus of a scalar, 2-norm, the trace of a matrix, and the
263
+ phase of a complex number, respectively. ⊗ and ⊙ respectively
264
+ denote Kronecker product and Hadamard product. The sign IN
265
+ is the N × N identity matrix.
266
+ II. SYSTEM MODEL
267
+ A. Signal Model
268
+ Fig. 1. System model for a hybrid IRS-aided AF relay wireless network.
269
+ Fig. 1 sketches a hybrid IRS-aided AF relay network
270
+ operated in a time division half-duplex scenario, where source
271
+ (S) and destination (D) are respectively equipped with a single
272
+ antenna, a AF relay is with M antennas, and an IRS includes
273
+ N elements consisting of K active elements and L passive
274
+ elements, i.e., N = K + L. The active elements reflect the
275
+ incident signal by adjusting the amplitude and phase, while the
276
+ passive elements reflect the incident signal only by shifting the
277
+ phase. Let us define EN , EK and EL as the sets of N elements,
278
+ K active elements and L passive elements, respectively. Fur-
279
+ thermore, EN = EK ∪ EL and EK ∩ EL = ∅. The reflecting
280
+ coefficient matrices of EN , EK and EL are respectively denoted
281
+ by Θ, Φ and Ψ, where Θ = diag(α1, · · · , αN), and the
282
+ reflecting coefficients of ith element in Θ is expressed by
283
+ αi =
284
+ � |βi|ejθi
285
+ i ∈ EK,
286
+ (1a)
287
+ ejθi
288
+ i ∈ EL,
289
+ (1b)
290
+ where |βi| and θi ∈ (0, 2π] are amplifying coefficient and
291
+ phase shift of the ith element. For convenience of derivation
292
+ below, we have the following definitions
293
+ Θ = Φ + Ψ,
294
+ Φ = EKΘ,
295
+ Ψ = EKΘ,
296
+ (2)
297
+ where EK + EK = IN and EKEK = 0N. Φ, Ψ, EK and EK
298
+ are sparse diagonal matrices. EK ∈ RN×N and EK ∈ RN×N
299
+ are respectively depended on the location distribution of K
300
+ active and L passive elements in the IRS. In other words, the
301
+ kth non-zero value of the diagonal corresponding to the kth
302
+ active element is 1, thus there are K values being 1 and the
303
+ rest L values being 0 on the diagonal of EK. Additionally, EK
304
+ is similar to EK. It is assumed that the direct channel between
305
+ S and D is blocked, and the power of signals reflected by the
306
+ IRS twice or more are such weak that they can be ignored. In
307
+ the first time slot, the received signal at IRS can be denoted
308
+ as
309
+ yr
310
+ 1i =
311
+
312
+ Pshsix + n1i,
313
+ (3)
314
+ where x and Ps are the transmit signal and power from
315
+ S, E{xHx} = 1. We assume all channels follow Rayleigh
316
+ fading, hsi ∈ CN×1 is the channel from S to IRS. n1i
317
+ represents the additive white Gaussian noise (AWGN) at IRS
318
+ with distribution n1i ∼ CN(0, σ2
319
+ 1iEKIN), which is caused by
320
+ K active elements. The received signal at AF relay is given
321
+ by
322
+ yr =
323
+
324
+ Ps(hsr + HirΘ1hsi)x + HirEKΘ1n1i + nr,
325
+ (4)
326
+ where hsr ∈ CM×1 and Hir ∈ CM×N are the channels from
327
+ S to AF relay and IRS to AF relay. Θ1 = diag(α11, · · · , α1N)
328
+ and Φ1
329
+ =
330
+ diag(φ11, · · · , φ1N) are the reflecting coeffi-
331
+ cient matrices of EN and EK in the first time slot. nr ∼
332
+ CN(0, σ2
333
+ rIM) is the AWGN at AF relay. After performing
334
+ receive and transmit beamforming, the transmit signal at AF
335
+ relay can be expressed as
336
+ yt = Ayr,
337
+ (5)
338
+ where A ∈ CM×M is the beamforming matrix. In the second
339
+ time slot, the received signal at IRS is written by
340
+ yr
341
+ 2i = HH
342
+ iryt + n2i,
343
+ (6)
344
+
345
+ Hybrid IRS
346
+ First time slot
347
+ Active element
348
+ -> Second time slot
349
+ Passive element
350
+ H
351
+ nid
352
+ H
353
+ :Hir
354
+ Hir
355
+ Destination
356
+ (S)
357
+ (D)
358
+ H
359
+ nrd
360
+ AF relay4
361
+ SNR =
362
+ γs|(hH
363
+ rd + hH
364
+ idΘ2HH
365
+ ir)A(hsr + HirΘ1hsi)|2
366
+ ∥(hH
367
+ rd + hH
368
+ idΘ2HH
369
+ ir)AHirEKΘ1∥2 + ∥(hH
370
+ rd + hH
371
+ idΘ2HH
372
+ ir)A∥2 + ∥hH
373
+ idEKΘ2∥2 + 1.
374
+ (10)
375
+ where HH
376
+ ir ∈ CN×M is the channel from AF relay to IRS.
377
+ n2i ∼ CN(0, σ2
378
+ 2iEKIN) is the noise. The received signal at
379
+ D is as follows
380
+ yd = (hH
381
+ rd + hH
382
+ idΘ2HH
383
+ ir)yt + hH
384
+ idEKΘ2n2i + nd,
385
+ (7)
386
+ where hH
387
+ rd ∈ C1×M and hH
388
+ id ∈ C1×N are the channels from
389
+ AF relay to D and IRS to D. Θ2 = diag(α21, · · · , α2N) and
390
+ Φ2 = diag(φ21, · · · , φ2N) are the reflecting coefficient matri-
391
+ ces of EN and EK in the second time slot. nd ∼ CN(0, σ2
392
+ d) is
393
+ the AWGN at D. Substituting (4) and (5) into (7) yields
394
+ yd =
395
+
396
+ Ps(hH
397
+ rd + hH
398
+ idΘ2HH
399
+ ir)A(hsr + HirΘ1hsi)x
400
+ + (hH
401
+ rd + hH
402
+ idΘ2HH
403
+ ir)A(HirEKΘ1n1i + nr)
404
+ + hH
405
+ idEKΘ2n2i + nd.
406
+ (8)
407
+ It is assumed that σ2
408
+ 1i = σ2
409
+ 2i = σ2
410
+ r = σ2
411
+ d = σ2 and γs = Ps
412
+ σ2 ,
413
+ the achievable system rate can be defined as
414
+ R = 1
415
+ 2 log2(1 + SNR),
416
+ (9)
417
+ where SNR can be formulated as (10), as shown at the top of
418
+ next page.
419
+ B. Problem Formulation
420
+ To enhance the system rate performance, it is necessary
421
+ to maximize system rate. Maximizing rate is equivalent to
422
+ maximize SNR due to the fact that the log function is
423
+ a monotone increasing function of SNR. The optimization
424
+ problem is casted as
425
+ max
426
+ Θ1,Θ2,A SNR
427
+ (11a)
428
+ s.t. |Θ1(i, i)| = 1, |Θ2(i, i)| = 1, for i ∈ EL,
429
+ (11b)
430
+ γs∥EKΘ1hsi∥2 + ∥EKΘ1∥2
431
+ F ≤ γi,
432
+ (11c)
433
+ γs∥A(hsr + HirΘ1hsi)∥2
434
+ + ∥AHirEKΘ1∥2
435
+ F + ∥A∥2
436
+ F ≤ γr,
437
+ (11d)
438
+ γs∥EKΘ2HH
439
+ irA(hsr + HirΘ1hsi)∥2
440
+ + ∥EKΘ2HH
441
+ irAHirEKΘ1∥2
442
+ F
443
+ + ∥EKΘ2HH
444
+ irA∥2
445
+ F + ∥EKΘ2∥2
446
+ F ≤ γi, (11e)
447
+ where γi = Pi
448
+ σ2 and γr = Pr
449
+ σ2 , Pi and Pr respectively denote
450
+ the transmit power budgets at IRS and AF relay. Since the
451
+ IRS is hybrid consisting of active and passive elements, it
452
+ is difficult to solve the optimization problem. To enhance the
453
+ rate performance, three efficient beamforming methods: 1) HP-
454
+ SDR-FP; 2) LC-SCA-FP; and 3) WF-GPI-GRR, are proposed
455
+ to optimize AF relay beamforming matrix A, IRS reflecting
456
+ coefficient matrices Θ1 and Θ2.
457
+ III. PROPOSED A HIGH-PERFORMANCE SDR-FP-BASED
458
+ MAX-SNR METHOD
459
+ In this section, a HP-SDR-FP method is proposed to solve
460
+ problem (11). To facilitate processing, problem (11) is de-
461
+ coupled into three subproblems by optimizing one and fixing
462
+ the other two. For each subproblem, we relax it as an SDR
463
+ problem, and combine Charnes-Cooper transformation of FP
464
+ algorithm to transform the SDR problem into an semidefinite
465
+ programming (SDP) problem. Furthermore, Gaussian random-
466
+ ization method is applied to recover the rank-1 solution.
467
+ A. Optimization of A Given Θ1 and Θ2
468
+ Given Θ1 and Θ2, the optimization problem is reduced to
469
+ max
470
+ A
471
+ SNR
472
+ s.t.
473
+ (11d),
474
+ (11e).
475
+ (12)
476
+ Let us define a = vec(A) ∈ CM2×1, SNR can be translated
477
+ to
478
+ SNR =
479
+ γsaHB1a
480
+ aH(B2 + B3)a + ∥hH
481
+ idEKΘ2∥2 + 1,
482
+ (13)
483
+ where
484
+ B1 = [(hsr + HirΘ1hsi)∗(hsr + HirΘ1hsi)T ]
485
+ ⊗ [(hH
486
+ rd + hH
487
+ idΘ2HH
488
+ ir)H(hH
489
+ rd + hH
490
+ idΘ2HH
491
+ ir)], (14a)
492
+ B2 = [(HirEKΘ1)∗(HirEKΘ1)T ]
493
+ ⊗ [(hH
494
+ rd + hH
495
+ idΘ2HH
496
+ ir)H(hH
497
+ rd + hH
498
+ idΘ2HH
499
+ ir)], (14b)
500
+ B3 = IM ⊗ [(hH
501
+ rd + hH
502
+ idΘ2HH
503
+ ir)H(hH
504
+ rd + hH
505
+ idΘ2HH
506
+ ir)]. (14c)
507
+ In the same manner, the constraints (11d) and (11e) can be
508
+ respectively converted to
509
+ aH(γsC1 + C2 + IM2)a ≤ γr,
510
+ (15a)
511
+ aH(γsD1 + D2 + D3)a + ∥EKΘ2∥2
512
+ F ≤ γi,
513
+ (15b)
514
+ where
515
+ C1 = [(hsr + HirΘ1hsi)∗(hsr + HirΘ1hsi)T ] ⊗ IM, (16a)
516
+ C2 = [(HirEKΘ1)∗(HirEKΘ1)T ] ⊗ IM,
517
+ (16b)
518
+ D1 = [(hsr + HirΘ1hsi)∗(hsr + HirΘ1hsi)T ]
519
+ ⊗ [(EKΘ2HH
520
+ ir)H(EKΘ2HH
521
+ ir)],
522
+ (16c)
523
+ D2 = [(HirEKΘ1)∗(HirEKΘ1)T ]
524
+ ⊗ [(EKΘ2HH
525
+ ir)H(EKΘ2HH
526
+ ir)],
527
+ (16d)
528
+ D3 = IM ⊗ [(EKΘ2HH
529
+ ir)H(EKΘ2HH
530
+ ir)].
531
+ (16e)
532
+ Let us define �A = aaH ∈ CM2×M2, in accordance with the
533
+ rank inequality: rank P ≤ min{m, n}, where P ∈ Cm×n, we
534
+
535
+ 5
536
+ can get rank(�A) ≤ rank(a) = 1. The optimization problem
537
+ can be recast as
538
+ max
539
+ �A
540
+ γstr(B1�A)
541
+ tr{(B2 + B3)�A} + ∥hH
542
+ idEKΘ2∥2 + 1
543
+ (17a)
544
+ s.t.
545
+ tr{(γsC1 + C2 + IM2)�A} ≤ γr,
546
+ (17b)
547
+ tr{(γsD1 + D2 + D3)�A} + ∥EKΘ2∥2
548
+ F ≤ γi,
549
+ (17c)
550
+ �A ⪰ 0,
551
+ rank(�A) = 1,
552
+ (17d)
553
+ which is a non-convex problem because of rank-one constraint.
554
+ After removing rank(�A) = 1 constraint, we have the SDR
555
+ problem of (17) as follows
556
+ max
557
+ �A
558
+ γstr(B1�A)
559
+ tr{(B2 + B3)�A} + ∥hH
560
+ idEKΘ2∥2 + 1
561
+ (18a)
562
+ s.t.
563
+ (17b),
564
+ (17c),
565
+ �A ⪰ 0.
566
+ (18b)
567
+ The objective function (18a) is a linear fractional function with
568
+ respect to �A, which is a quasi-convex function with the denom-
569
+ inator > 0, so problem (18) is a quasi-convex problem with
570
+ convex constraints. It is necessary to apply Charnes-Cooper
571
+ transformation, which helps convert the optimization problem
572
+ from quasi-convex to convex. Introducing a slack variable m
573
+ and defining m = (tr{(B2 + B3)�A} + ∥hH
574
+ idEKΘ2∥2 + 1)−1,
575
+ the above problem (18) is further rewritten as follows
576
+ max
577
+ �A,m
578
+ γstr{B1�A}
579
+ (19a)
580
+ s.t. tr{(γsC1 + C2 + IM2)�A} ≤ mγr,
581
+ (19b)
582
+ tr{(γsD1 + D2 + D3)�A} + m∥EKΘ2∥2
583
+ F ≤ mγi, (19c)
584
+ tr{(B2 + B3)�A} + m∥hH
585
+ idEKΘ2∥2 + m = 1,
586
+ (19d)
587
+ �A ⪰ 0, m > 0,
588
+ (19e)
589
+ where �A = m�A. Clearly, the above optimization problem has
590
+ become a SDP problem, which is directly solved by CVX.
591
+ The solution to problem (18) is �A = �A/m. However, the
592
+ rank-one constraint rank(�A) = 1 is not considered in the SDR
593
+ problem. Since the obtained solution �A is not generally rank-
594
+ one matrix, the Gaussian randomization method is applied to
595
+ achieve a rank-one solution �A, thereby, AF relay beamforming
596
+ matrix A is achieved.
597
+ B. Optimization of Θ1 Given A and Θ2
598
+ Given that A and Θ2 are fixed, the optimization problem
599
+ can be represented by as follows
600
+ max
601
+ Θ1
602
+ γs|hH
603
+ rid(hsr + HirΘ1hsi)|2
604
+ ∥hH
605
+ ridHirEKΘ1∥2 + ∥hH
606
+ rid∥2 + ∥hH
607
+ idEKΘ2∥2 + 1
608
+ (20a)
609
+ s.t.
610
+ |Θ1(i, i)| = 1,
611
+ for i ∈ EL,
612
+ (20b)
613
+ (11c),
614
+ (11d),
615
+ (11e),
616
+ (20c)
617
+ where
618
+ hrid
619
+ =
620
+ [(hH
621
+ rd + hH
622
+ idΘ2HH
623
+ ir)A]H.
624
+ In
625
+ order
626
+ to
627
+ further
628
+ simplify
629
+ the
630
+ objective
631
+ function
632
+ and
633
+ constraints
634
+ of
635
+ the
636
+ optimization
637
+ problem,
638
+ let
639
+ us
640
+ define
641
+ u1
642
+ =
643
+ [α11, · · · , α1N]T , we have hsr + HirΘ1hsi = Hsirv1 and
644
+ hH
645
+ ridHirEKΘ1 = uT
646
+ 1 diag{hH
647
+ ridHirEK}, where v1 = [u1; 1]
648
+ and Hsir
649
+ =
650
+ [Hirdiag{hsi}, hsr]. Substituting these for-
651
+ mulas into (20a), and due to ∥uT
652
+ 1 diag{hH
653
+ ridHirEK}∥2
654
+ =
655
+ ∥diag{hH
656
+ ridHirEK}u1∥2, the object function can be further
657
+ rewritten as
658
+ vH
659
+ 1 F1v1
660
+ vH
661
+ 1 F2v1
662
+ ,
663
+ (21)
664
+ where F1 = γsHH
665
+ sirhridhH
666
+ ridHsir and F2 is written as (22) at
667
+ the top of next page. The constraint (20b) for passive elements
668
+ EL can be rewritten as
669
+ |v1(i)|2 = 1,
670
+ for i ∈ EL.
671
+ (23)
672
+ Obviously, ∥EKΘ1∥2
673
+ F = ∥EKu1∥2, and the constraint (11c)
674
+ can be translated to
675
+ vH
676
+ 1 G1v1 ≤ γi,
677
+ (24)
678
+ where
679
+ G1 =
680
+
681
+ γsdiag{hH
682
+ si}EKdiag{hsi} + EK
683
+ 0N×1
684
+ 01×N
685
+ 0
686
+
687
+ .
688
+ (25)
689
+ Then for constraint (11d), according to the property of
690
+ Hadamard product: tr(X(Y ⊙ Z)) = tr((X ⊙ YT )Z), where
691
+ X ∈ Cm×n, Y ∈ Cn×m and Z ∈ Cn×m, we have
692
+ ∥AHirEKΘ1∥2
693
+ F = ∥AHirEKdiag{u1}∥2
694
+ F
695
+ = tr{EKHH
696
+ irAHAHirEKdiag{u1}diag{uH
697
+ 1 }}
698
+ = tr{EKHH
699
+ irAHAHir[EK ⊙ (u1uH
700
+ 1 )]}
701
+ = uH
702
+ 1 [(EKHH
703
+ irAHAHir) ⊙ EK]u1
704
+ = uH
705
+ 1 [(HH
706
+ irAHAHir) ⊙ EK]u1
707
+ (26)
708
+ Inserting hsr + HirΘ1hsi = Hsirv1 and (26) back into the
709
+ constraint (11d), which can be rewritten as
710
+ vH
711
+ 1 G2v1 ≤ γr,
712
+ (27)
713
+ where
714
+ G2 =γsHH
715
+ sirAHAHsir +
716
+
717
+ (HH
718
+ irAHAHir) ⊙ EK
719
+ 0N×1
720
+ 01×N
721
+ ∥A∥2
722
+ F
723
+
724
+ .
725
+ (28)
726
+ Similarly, (11e) can be written in the following form
727
+ vH
728
+ 1 G3v1 ≤ γi,
729
+ (29)
730
+ where G3 is written as (30), as shown at the top of the page.
731
+ Substituting the simplified objective function and constraints
732
+ into (20), the optimization problem can be equivalently trans-
733
+ formed into
734
+ max
735
+ v1
736
+ (21)
737
+ (31a)
738
+ s.t.
739
+ (23), (24), (27), (29), v1(N + 1) = 1.
740
+ (31b)
741
+ Aiming at further transforming the optimization problem, and
742
+ defining V1 = v1vH
743
+ 1 , problem (31) can be equivalently given
744
+ by
745
+ max
746
+ V1
747
+ tr(F1V1)
748
+ tr(F2V1)
749
+ (32a)
750
+ s.t.
751
+ V1(i, i) = 1,
752
+ for i ∈ EL,
753
+ (32b)
754
+ V1(N + 1, N + 1) = 1,
755
+ (32c)
756
+ tr(G1V1) ≤ γi, tr(G2V1) ≤ γr,
757
+ (32d)
758
+ tr(G3V1) ≤ γi, rank(V1) = 1, V1 ⪰ 0.
759
+ (32e)
760
+
761
+ 6
762
+ F2 =
763
+ � diag{EKHH
764
+ irhrid}diag{hH
765
+ ridHirEK}
766
+ 0N×1
767
+ 01×N
768
+ ∥hH
769
+ rid∥2 + ∥hH
770
+ idEKΘ2∥2 + 1
771
+
772
+ ,
773
+ (22)
774
+ G3 =γsHH
775
+ sirAHHirΘH
776
+ 2 EKΘ2HH
777
+ irAHsir
778
+ +
779
+
780
+ (HH
781
+ irAHHirΘH
782
+ 2 EKΘ2HH
783
+ irAHir) ⊙ EK
784
+ 0N×1
785
+ 01×N
786
+ ∥EKΘ2HH
787
+ irA∥2
788
+ F + ∥EKΘ2∥2
789
+ F
790
+
791
+ .
792
+ (30)
793
+ Due to the fact that the object function is quasi-convex
794
+ and constraint rank(V1) = 1 is non-convex, (32) is still
795
+ a non-convex problem. Relaxing the rank-1 constraint, the
796
+ problem is transformed into a SDR problem, which can also be
797
+ solved by applying Charnes-Cooper transformation. Moreover,
798
+ introducing a slack variable τ, then defining τ = tr(F2V1)−1
799
+ and �V1 = τV1, the SDR problem of (32) can be translated to
800
+ a SDP problem, i.e.,
801
+ max
802
+ �V1,τ
803
+ tr(F1�V1)
804
+ (33a)
805
+ s.t.
806
+ �V1(i, i) = τ,
807
+ for i ∈ EL,
808
+ (33b)
809
+ �V1(N + 1, N + 1) = τ, τ > 0,
810
+ (33c)
811
+ tr(G1�V1) ≤ τγi, tr(G2�V1) ≤ τγr,
812
+ (33d)
813
+ tr(G3�V1) ≤ τγi, tr(F2�V1) = 1, �V1 ⪰ 0,
814
+ (33e)
815
+ which can be directly solved by CVX, thereby the solution V1
816
+ of SDR problem of (32) is achieved, and Gaussian randomiza-
817
+ tion method is used to recover a rank-one solution V1. Then
818
+ the solution v1 is extracted from the eigenvalue decomposition
819
+ of V1, subsequently, IRS reflecting coefficient matrix Θ1 can
820
+ be obtained.
821
+ C. Optimization of Θ2 Given A and Θ1
822
+ In the subsection, defining u2 = [α21, · · · , α2N]H, we have
823
+ hH
824
+ rd +hH
825
+ idΘ2HH
826
+ ir = vH
827
+ 2 Hrid and Θ2HH
828
+ irA(hsr +HirΘ1hsi) =
829
+ diag{HH
830
+ irA(hsr + HirΘ1hsi)}u∗
831
+ 2, where v2 = [u2; 1] and
832
+ Hrid = [diag{hH
833
+ id}HH
834
+ ir; hH
835
+ rd]. Similarly, when A and Θ1 are
836
+ fixed, the SDP problem to optimize �V2 can be expressed as
837
+ max
838
+ �V2,ρ
839
+ tr(H1�V2)
840
+ (34a)
841
+ s.t.
842
+ �V2(i, i) = ρ,
843
+ for i ∈ EL,
844
+ (34b)
845
+ �V2(N + 1, N + 1) = ρ, ρ > 0,
846
+ (34c)
847
+ tr(J�V2) ≤ ργi, tr(H2�V2) = 1, �V2 ⪰ 0,
848
+ (34d)
849
+ where ρ = tr(H2v2vH
850
+ 2 )−1 is a slack variable, �V2 = ρv2vH
851
+ 2 ,
852
+ H1 = γsHridA(hsr + HirΘ1hsi)[HridA(hsr + HirΘ1hsi)]H,
853
+ H2 =HridA(HirEKΘ1ΘH
854
+ 1 EKHH
855
+ ir + IM)AHHH
856
+ rid
857
+ +
858
+
859
+ diag{hH
860
+ idEK}diag{EKhid}
861
+ 0N×1
862
+ 01×N
863
+ 1
864
+
865
+ ,
866
+ (35)
867
+ and J is written as (36) at the top of next page, where
868
+ H3
869
+ =
870
+ EKdiag{HT
871
+ irA∗(hsr + HirΘ1hsi)∗} and H4
872
+ =
873
+ HH
874
+ irAHirEKΘ1. It is observed that (34) is similar to (33),
875
+ thus (34) can be solved in the same way as (33). Finally the
876
+ solutions v2 and Θ2 are obtained, and the details are omitted
877
+ here for brevity.
878
+ D. Overall Algorithm and Complexity Analysis
879
+ Since the objective function of problem (11) is non-
880
+ decreasing and the transmit powers of S, AF relay and IRS
881
+ active elements are limited, the objective function has an
882
+ upper bound. Therefore, the convergence of the proposed HP-
883
+ SDR-FP algorithm can be guaranteed. Our idea is alternative
884
+ iteration, that is, the alternative iteration process are performed
885
+ among A, Θ1 and Θ2 until the convergence criterion is
886
+ satisfied, while the system rate is maximum. The proposed
887
+ HP-SDR-FP method is summarized in Algorithm 1.
888
+ Algorithm 1 Proposed HP-SDR-FP Method
889
+ 1. Initialize A0, Θ0
890
+ 1 and Θ0
891
+ 2. According to (9), R0 can be
892
+ obtained.
893
+ 2.
894
+ set the convergence error δ and the iteration number
895
+ t = 0.
896
+ 3. repeat
897
+ 4. Given Θt
898
+ 1 and Θt
899
+ 2, solve problem (19) for �A
900
+ t+1, recover
901
+ rank-1 solution �A
902
+ t+1 via Gaussian randomization, obtain
903
+ At+1.
904
+ 5. Given At+1 and Θt
905
+ 2, solve problem (33) for �V
906
+ t+1
907
+ 1
908
+ ,
909
+ recover rank-1 solution Vt+1
910
+ 1
911
+ via Gaussian randomization,
912
+ obtain Θt+1
913
+ 1
914
+ .
915
+ 6. Given At+1 and Θt+1
916
+ 1
917
+ , solve problem (34) for �V
918
+ t+1
919
+ 2
920
+ ,
921
+ recover rank-1 solution Vt+1
922
+ 2
923
+ via Gaussian randomization,
924
+ obtain Θt+1
925
+ 2
926
+ .
927
+ 7. Calculate Rt+1 by using At+1, Θt+1
928
+ 1
929
+ and Θt+1
930
+ 2
931
+ .
932
+ 8. Update t = t + 1.
933
+ 9. until
934
+ ��Rt+1 − Rt�� ≤ δ.
935
+ After that, the complexity of Algorithm 1 is calculated
936
+ and analyzed according to problems (19), (33) and (34).
937
+ Problem (19) has 4 linear constraints with dimension 1, one
938
+ linear matrix inequality (LMI) constraint of size M 2 and
939
+ M 4+1 decision variables. Hence, the computational complex-
940
+ ity of problem (19) is denoted as O{nA
941
+
942
+ M 2 + 4(M 6 + 4 +
943
+ nA(M 4 + 4) + n2
944
+ A)ln(1/ε)} float-point operations (FLOPs),
945
+ where nA = M 4 + 1 and ε represents the computation
946
+ accuracy. For problem (33), there exit L + 6 linear constraints
947
+ with dimension 1, one LMI constraint of size N + 1 and
948
+ (N +1)2+1 decision variables, so the computational complex-
949
+ ity of problem (33) is written as O{nV1
950
+
951
+ N + L + 7((N +
952
+
953
+ 7
954
+ J =
955
+
956
+ γsHH
957
+ 3 H3 + (H4HH
958
+ 4 + HH
959
+ irAAHHir + IN) ⊙ EK
960
+ 0N×1
961
+ 01×N
962
+ 0
963
+
964
+ .
965
+ (36)
966
+ 1)3 + L + 6 + nV1((N + 1)2 + L + 6) + n2
967
+ V1)ln(1/ε)} FLOPs,
968
+ where nV1 = (N + 1)2 + 1. For problem (34), there are L + 4
969
+ linear constraints with dimension 1, one LMI constraint of
970
+ size N + 1 and (N + 1)2 + 1 decision variables. Thus, the
971
+ computational complexity of problem (34) is expressed as
972
+ O{nV2
973
+
974
+ N + L + 5((N + 1)3 + L + 4 + nV2((N + 1)2 +
975
+ L + 4) + n2
976
+ V2)ln(1/ε)} FLOPs, where nV2 = (N + 1)2 + 1.
977
+ Therefore, the total computational complexity of Algorithm 1
978
+ is written by
979
+ O{D1[nA
980
+
981
+ M 2 + 4(M 6 + 4 + nA(M 4 + 4) + n2
982
+ A)
983
+ + nV1
984
+
985
+ N + L + 7((N + 1)3 + L + 6 + nV1((N + 1)2
986
+ + L + 6) + n2
987
+ V1) + nV2
988
+
989
+ N + L + 5((N + 1)3 + L + 4
990
+ + nV2((N + 1)2 + L + 4) + n2
991
+ V2)]ln(1/ε)}
992
+ (37)
993
+ FLOPs, where D1 is the maximum number of alternating
994
+ iterations needed for convergence in Algorithm 1. It is obvious
995
+ that the highest order of computational complexity is M 13 and
996
+ N 6.5 FLOPs.
997
+ IV. PROPOSED A LOW-COMPLEXITY SCA-FP-BASED
998
+ MAX-SNR METHOD
999
+ In the previous section, HP-SDR-FP method is proposed
1000
+ to obtain AF relay beamforming matrix A, IRS reflecting
1001
+ coefficient matrices Θ1 and Θ2. However, its computational
1002
+ complexity is very high because of SDR algorithm with lots of
1003
+ FLOPs. To reduce the high computational complexity of HP-
1004
+ SDR-FP method, a low-complexity SCA-FP-based Max-SNR
1005
+ method is proposed in this section.
1006
+ A. Optimize A With Fixed Θ1 and Θ2
1007
+ For given Θ1 and Θ2, the optimization problem based on
1008
+ (13) is given by
1009
+ max
1010
+ a
1011
+ γsaHB1a
1012
+ aH(B2 + B3)a + ∥hH
1013
+ idEKΘ2∥2 + 1
1014
+ (38a)
1015
+ s.t.
1016
+ (15a), (15b).
1017
+ (38b)
1018
+ Observing the above objective function, it is seen that (38)
1019
+ is also a fractional optimization problem. In the subsection,
1020
+ Dinkelbachs transformation is introduced to solve problem
1021
+ (38). Here, introducing a slack variables µ, the problem (38)
1022
+ is reformulated as
1023
+ max
1024
+ a,µ
1025
+ γsaHB1a − µ[aH(B2 + B3)a + ∥hH
1026
+ idEKΘ2∥2 + 1]
1027
+ (39a)
1028
+ s.t.
1029
+ (15a), (15b),
1030
+ (39b)
1031
+ where µ is iteratively updated by
1032
+ µ(t + 1) =
1033
+ γsaH(t)B1a(t)
1034
+ aH(t)(B2 + B3)a(t) + ∥hH
1035
+ idEKΘ2∥2 + 1, (40)
1036
+ where t is the iteration number. µ is nondecreasing after each
1037
+ iteration, which guarantees the convergence of the objective
1038
+ function (39a). Note that the above problem is still non-
1039
+ convex due to the first term of the objective function is non-
1040
+ concave, which can be solved by using SCA method. We
1041
+ approximate the first term by using a linear function, i.e.,
1042
+ its first-order Taylor expansion at feasible vector �a, which
1043
+ is γsaHB1a ≥ 2γsℜ{aHB1�a} − γs�aHB1�a, where �a is the
1044
+ solution of previous iteration. Inserting the low bound of
1045
+ γsaHB1a back into problem (39) yields
1046
+ max
1047
+ a
1048
+ 2γsℜ{aHB1�a} − γs�aHB1�a
1049
+ − µ[aH(B2 + B3)a + ∥hH
1050
+ idEKΘ2∥2 + 1]
1051
+ (41a)
1052
+ s.t.
1053
+ (15a), (15b).
1054
+ (41b)
1055
+ It is known that the above optimization problem consists of
1056
+ a concave objective function and several convex constraints.
1057
+ Therefore, problem (41) is a convex optimization problem.
1058
+ When �a and µ are fixed, a can be directly achieved by CVX.
1059
+ Correspondingly, A can be obtained.
1060
+ B. Optimize Θ1 With Fixed A and Θ2
1061
+ It is assumed that AF relay beamforming matrix A and Θ2
1062
+ are given. The constraint (11b) can be re-expressed as
1063
+ |u1(i)|2 = 1,
1064
+ for i ∈ EL,
1065
+ (42)
1066
+ which can be relaxed as
1067
+ uH
1068
+ 1 (i)u1(i) ≤ 1,
1069
+ for i ∈ EL.
1070
+ (43)
1071
+ Problem (11) with respect to u1 can be rearranged as
1072
+ max
1073
+ u1
1074
+ γs|hH
1075
+ 1 u1 + a|2
1076
+ ∥diag{hH
1077
+ ridHirEK}u1∥2 + b
1078
+ (44a)
1079
+ s.t.
1080
+ uH
1081
+ 1 (i)u1(i) ≤ 1,
1082
+ for i ∈ EL,
1083
+ (44b)
1084
+ γs∥EKdiag{hsi}u1∥2 + ∥EKu1∥2 ≤ γi,
1085
+ (44c)
1086
+ γs∥Ahsr + P1u1∥2 + ∥AHirEKdiag{u1}∥2
1087
+ F
1088
+ + ∥A∥2
1089
+ F ≤ γr,
1090
+ (44d)
1091
+ γs∥h2 + P2u1∥2 + ∥P3EKdiag{u1}∥2
1092
+ F ≤ �γi,
1093
+ (44e)
1094
+ where
1095
+ h1 = [(hH
1096
+ rd + hH
1097
+ idΘ2HH
1098
+ ir)AHirdiag{hsi}]H,
1099
+ (45a)
1100
+ h2 = EKΘ2HH
1101
+ irAhsr, P1 = AHirdiag{hsi},
1102
+ (45b)
1103
+ P2 = EKΘ2HH
1104
+ irAHirdiag{hsi},
1105
+ (45c)
1106
+ P3 = EKΘ2HH
1107
+ irAHir, a = (hH
1108
+ rd + hH
1109
+ idΘ2HH
1110
+ ir)Ahsr, (45d)
1111
+ b = ∥(hH
1112
+ rd + hH
1113
+ idΘ2HH
1114
+ ir)A∥2 + ∥hH
1115
+ idEKΘ2∥2 + 1,
1116
+ (45e)
1117
+ �γi = γi − ∥EKΘ2HH
1118
+ irA∥2
1119
+ F − ∥EKΘ2∥2
1120
+ F .
1121
+ (45f)
1122
+
1123
+ 8
1124
+ Problem (44) can be further converted to
1125
+ max
1126
+ u1
1127
+ γs|hH
1128
+ 1 u1 + a|2
1129
+ ∥diag{hH
1130
+ ridHirEK}u1∥2 + b
1131
+ (46a)
1132
+ s.t.
1133
+ uH
1134
+ 1 (i)u1(i) ≤ 1,
1135
+ for i ∈ EL,
1136
+ (46b)
1137
+ uH
1138
+ 1 (γsdiag{hH
1139
+ si}EKdiag{hsi} + EK)u1 ≤ γi,
1140
+ (46c)
1141
+ uH
1142
+ 1 [γsPH
1143
+ 1 P1 + (HH
1144
+ irAHAHir) ⊙ EK]u1 + ∥A∥2
1145
+ F
1146
+ + 2γsℜ{uH
1147
+ 1 PH
1148
+ 1 Ahsr} + γshH
1149
+ srAHAhsr ≤ γr,
1150
+ (46d)
1151
+ uH
1152
+ 1 [γsPH
1153
+ 2 P2 + (PH
1154
+ 3 P3) ⊙ EK]u1
1155
+ + 2γsℜ{uH
1156
+ 1 PH
1157
+ 2 h2} + γshH
1158
+ 2 h2 ≤ �γi.
1159
+ (46e)
1160
+ In the same manner, Dinkelbach’s transformation is also
1161
+ introduced to problem (46). Problem (46) can be rewritten
1162
+ as
1163
+ max
1164
+ u1
1165
+ γs|hH
1166
+ 1 u1 + a|2 − ωb
1167
+ − ωuH
1168
+ 1 diag{EKHH
1169
+ irhrid}diag{hH
1170
+ ridHirEK}u1 (47a)
1171
+ s.t.
1172
+ (46b), (46c), (46d), (46e),
1173
+ (47b)
1174
+ where ω is a variable scalar, which is defined as
1175
+ ω(t + 1) =
1176
+ γs|hH
1177
+ 1 u1(t) + a|2
1178
+ ∥diag{hH
1179
+ ridHirEK}u1(t)∥2 + b.
1180
+ (48)
1181
+ Similarly, aiming at converting the objective function (47a)
1182
+ to convex, the first-order Taylor expansion at the point �u1 is
1183
+ employed to γs|hH
1184
+ 1 u1 + a|2 and transform it into the linear
1185
+ function, i.e., |hH
1186
+ 1 u1 + a|2 ≥ 2ℜ{uH
1187
+ 1 h1(hH
1188
+ 1 �u1 + a)} + a∗a −
1189
+ �uH
1190
+ 1 h1hH
1191
+ 1 �u1. Inserting the low bound of
1192
+ ��hH
1193
+ 1 u1 + a
1194
+ ��2 back into
1195
+ problem (47) yields the following optimization problem
1196
+ max
1197
+ u1
1198
+ 2γsℜ{uH
1199
+ 1 h1(hH
1200
+ 1 �u1 + a)} + γsa∗a − γs�uH
1201
+ 1 h1hH
1202
+ 1 �u1−
1203
+ ω(b + uH
1204
+ 1 diag{EKHH
1205
+ irhrid}diag{hH
1206
+ ridHirEK}u1) (49a)
1207
+ s.t.
1208
+ (46b), (46c), (46d), (46e),
1209
+ (49b)
1210
+ where the object function is concave and the constraints are
1211
+ convex, thus problem (49) is convex. For a given feasible
1212
+ vector �u1 and ω, problem (49) can be solved by CVX directly,
1213
+ thereby u1 is achieved.
1214
+ C. Optimize Θ2 With Fixed A and Θ1
1215
+ Similarly, given AF relay beamforming matrix A and Θ1,
1216
+ the optimization problem with respect to u2 is modeled as
1217
+ max
1218
+ u2
1219
+ 2γsℜ{uH
1220
+ 2 h3(hH
1221
+ 3 �u2 + c∗)} + γscc∗ − γs�uH
1222
+ 2 h3hH
1223
+ 3 �u2
1224
+ − λ(uH
1225
+ 2 Q1QH
1226
+ 1 u2 + 2ℜ{uH
1227
+ 2 Q1h4} + hH
1228
+ 4 h4)
1229
+ − λ(uH
1230
+ 2 Q2QH
1231
+ 2 u2 + 2ℜ{uH
1232
+ 2 Q2AHhrd})
1233
+ − λhH
1234
+ rdAAHhrd − λuH
1235
+ 2 Q3QH
1236
+ 3 u2 − λ
1237
+ (50a)
1238
+ s.t.
1239
+ uH
1240
+ 2 (i)u2(i) ≤ 1, for i ∈ EL,
1241
+ (50b)
1242
+ uH
1243
+ 2 [γsHH
1244
+ 3 H3 + (H4HH
1245
+ 4 + HH
1246
+ irAAHHir + IN) ⊙ EK]u2
1247
+ ≤ γi,
1248
+ (50c)
1249
+ where λ is a variable, �u2 is a feasible vector, and
1250
+ h3 = diag{hH
1251
+ id}HH
1252
+ irA(hsr + HirΘ1hsi),
1253
+ (51a)
1254
+ h4 = (hH
1255
+ rdAHirEKΘ1)H,
1256
+ (51b)
1257
+ Q1 = diag{hH
1258
+ id}HH
1259
+ irAHirEKΘ1,
1260
+ (51c)
1261
+ Q2 = diag{hH
1262
+ id}HH
1263
+ irA, Q3 = diag{hH
1264
+ idEK},
1265
+ (51d)
1266
+ c = hH
1267
+ rdA(hsr + HirΘ1hsi),
1268
+ (51e)
1269
+ λ(t + 1) =
1270
+ γs|uH
1271
+ 2 (t)h3 + c|2
1272
+ ∥uH
1273
+ 2 (t)Q1 + hH
1274
+ 4 ∥2 + ∥uH
1275
+ 2 (t)Q2 + hH
1276
+ rdA∥2 + ∥uH
1277
+ 2 (t)Q3∥2 + 1.
1278
+ (51f)
1279
+ It is clear that problem (50) is a convex optimization problem
1280
+ with concave objective function and convex constraints. Given
1281
+ �u2 and λ, u2 can be effectively obtained by CVX.
1282
+ D. Overall Algorithm and Complexity Analysis
1283
+ In the same manner, the proposed LC-SCA-FP method
1284
+ is convergent with an upper bound. The alternate iteration
1285
+ idea is roughly as follows: for given Θ1 and Θ2, first-
1286
+ order Taylor expansion is applied in problem (39), AF relay
1287
+ beamforming vector a can be calculated by solving problem
1288
+ (41) iteratively; similarly, for given A and Θ2, reflecting
1289
+ coefficient vector u1 can be obtained by solving problem (49)
1290
+ iteratively; for given A and Θ1, reflecting coefficient vector
1291
+ u2 can be achieved by solving problem (50) iteratively. Then
1292
+ the alternative iteration process are operated among A, Θ1
1293
+ and Θ2 until the convergence criterion is satisfied, while the
1294
+ system rate is maximum. The proposed LC-SCA-FP method
1295
+ is summarized in Algorithm 2.
1296
+ Furthermore, we calculate and analyze the complexity of
1297
+ Algorithm 2 in accordance with problems (41), (49) and (50).
1298
+ It is observed that problem (41) consists of one SOC constraint
1299
+ of dimension M 2 and one SOC constraint of dimension
1300
+ M 2 + 1. The number of decision variables na = M 2. The
1301
+ computational complexity corresponding to problem (41) is
1302
+ represented as O{2na(M 4+(M 2+1)2+n2
1303
+ a)ln(1/ε)} FLOPs.
1304
+ Problem (49) includes L SOC constraints of dimension 1,
1305
+ one SOC constraint of dimension N, one SOC constraint of
1306
+ dimension N +1 and one SOC constraint of dimension N +2.
1307
+ The number of decision variables nu1 = N. The computa-
1308
+ tional complexity corresponding to problem (49) is written as
1309
+ O{nu1
1310
+
1311
+ 2L + 6(L+N 2+(N +1)2+(N +2)2+n2
1312
+ u1)ln(1/ε)}
1313
+ FLOPs. Problem (50) is composed of L SOC constraints of
1314
+ dimension 1 and one SOC constraint of dimension N. The
1315
+ number of decision variables nu2 = N. The computational
1316
+ complexity corresponding to problem (50) is expressed as
1317
+ O{nu2
1318
+ √2L + 2(L+N 2+n2
1319
+ u2)ln(1/ε)} FLOPs. Consequently,
1320
+ the total computational complexity of Algorithm 2 is denoted
1321
+ as
1322
+ O{D2[2na(M 4 + (M 2 + 1)2 + n2
1323
+ a) + nu1
1324
+
1325
+ 2L + 6
1326
+ · (L + N 2 + (N + 1)2 + (N + 2)2 + n2
1327
+ u1)
1328
+ + nu2
1329
+
1330
+ 2L + 2(L + N 2 + n2
1331
+ u2)]ln(1/ε)}
1332
+ (52)
1333
+ FLOPs, where D2 is the maximum number of alternating
1334
+ iterations to obtain a, u1 and u2. For Algorithm 2, its highest
1335
+
1336
+ 9
1337
+ Algorithm 2 Proposed LC-SCA-FP Method
1338
+ 1. Initialize A0, Θ0
1339
+ 1 and Θ0
1340
+ 2. According to (9), R0 can be
1341
+ obtained.
1342
+ 2. set the convergence error δ and the iteration number
1343
+ t = 0.
1344
+ 3. repeat
1345
+ 4. Fix Θt
1346
+ 1 and Θt
1347
+ 2, initialize �a0, set δ and t1 = 0.
1348
+ 5.
1349
+ repeat
1350
+ 6.
1351
+ Update solution at1+1 with (�at1, µt1) by solving
1352
+ problem (41), t1 = t1 + 1.
1353
+ 7.
1354
+ Set �at1+1 = at1+1 and update µt1+1.
1355
+ 8.
1356
+ until (41a) converges, update at+1 = at1+1 and
1357
+ obtain At+1.
1358
+ 9. Fix At+1 and Θt
1359
+ 2, initialize �u0
1360
+ 1, set δ and t2 = 0.
1361
+ 10.
1362
+ repeat
1363
+ 11.
1364
+ Update solution ut2+1
1365
+ 1
1366
+ with (�ut2
1367
+ 1 , wt2) by solving
1368
+ problem (49), t2 = t2 + 1.
1369
+ 12.
1370
+ Set �ut2+1
1371
+ 1
1372
+ = ut2+1
1373
+ 1
1374
+ and update wt2+1.
1375
+ 13.
1376
+ until (49a) converges, update ut+1
1377
+ 1
1378
+ = ut2+1
1379
+ 1
1380
+ and
1381
+ obtain Θt+1
1382
+ 1
1383
+ .
1384
+ 14. Fix At+1 and Θt+1
1385
+ 1
1386
+ , initialize �u0
1387
+ 2, set δ and t3 = 0.
1388
+ 15.
1389
+ repeat
1390
+ 16.
1391
+ Update solution ut3+1
1392
+ 2
1393
+ with (�ut3
1394
+ 2 , λt3) by solving
1395
+ problem (50), t3 = t3 + 1.
1396
+ 17.
1397
+ Set �ut3+1
1398
+ 2
1399
+ = ut3+1
1400
+ 2
1401
+ and update λt3+1.
1402
+ 18.
1403
+ until (50a) converges, update ut+1
1404
+ 2
1405
+ = ut3+1
1406
+ 2
1407
+ and
1408
+ obtain Θt+1
1409
+ 2
1410
+ .
1411
+ 19. Calculate R by using At+1, Θt+1
1412
+ 1
1413
+ and Θt+1
1414
+ 2
1415
+ , t = t+1.
1416
+ 20. until
1417
+ ��Rt+1 − Rt�� ≤ δ.
1418
+ order of computational complexity is M 6 and N 3 FLOPS,
1419
+ which is greatly reduced compared to the complexity of HP-
1420
+ SDR-FP method.
1421
+ V. PROPOSED A LOWER-COMPLEXITY
1422
+ WF-GPI-GRR-BASED MAX-SNR METHOD
1423
+ In what follows, to further reduce the computational com-
1424
+ plexity, a lower-complexity WF-GPI-GRR-based Max-SNR
1425
+ method is put forward. For gaining rate enhancement, we ap-
1426
+ ply WF operation to exploit the colored property of noise and
1427
+ present the related system model. Here, active IRS reflecting
1428
+ coefficient matrix is split into amplifying coefficient and IRS
1429
+ phase-shift matrix. The details of derivation on the amplifying
1430
+ coefficients, AF relay beamforming matrix and IRS phase-shift
1431
+ matrices are described as below.
1432
+ A. System Model
1433
+ For brevity, it is assumed that the amplifying coefficients of
1434
+ each IRS active element in the first time slot and the second
1435
+ time slot are |β1| and |β2|, respectively. Let us define
1436
+ Ψ1 = EK �Θ1, Φ1 = |β1|EK �Θ1,
1437
+ (53a)
1438
+ Ψ2 = EK �Θ2, Φ2 = |β2|EK �Θ2,
1439
+ (53b)
1440
+ where the phase-shift matrix �Θ1 = diag(ejθ1i, · · · , ejθ1N ),
1441
+ �Θ2 = diag(ejθ2i, · · · , ejθ2N), | �Θ1(i, i)| = 1 and | �Θ2(i, i)| =
1442
+ 1. Thus we have
1443
+ Θ1 = (EK + |β1|EK) �Θ1, Θ2 = (EK + |β2|EK) �Θ2. (54)
1444
+ In the first time slot, the received signal at AF relay can be
1445
+ redescribed as
1446
+ yr =
1447
+
1448
+ Ps[hsr + Hir(EK + |β1|EK) �Θ1hsi]x
1449
+ + (|β1|HirEK �Θ1n1i + nr)
1450
+
1451
+ ��
1452
+
1453
+ n1r
1454
+ .
1455
+ (55)
1456
+ As matter of fact, n1r is color, not white. It is necessary for
1457
+ us to whiten the color noise n1r by using covariance matrix
1458
+ Cn. The covariance W1r of n1r is given by
1459
+ W1r = β2
1460
+ 1∥HirEK �Θ1∥2
1461
+ F σ2 + σ2.
1462
+ (56)
1463
+ While n1i and nr are the independent and identically dis-
1464
+ tributed random vectors, n1r has a mean vector of all-zeros
1465
+ and covariance matrix
1466
+ C1r = β2
1467
+ 1σ2HirEK �Θ1 �ΘH
1468
+ 1 EKHH
1469
+ ir + σ2IM,
1470
+ (57)
1471
+ where obviously C1r is a positive definite matrix. Defining the
1472
+ WF matrix W1r with W1rWH
1473
+ 1r = C−1
1474
+ 1r , which yields
1475
+ W1r = C
1476
+ − 1
1477
+ 2
1478
+ 1r = (Q1rΛ1rQH
1479
+ 1r)− 1
1480
+ 2 = Q1rΛ
1481
+ − 1
1482
+ 2
1483
+ 1r QH
1484
+ 1r,
1485
+ (58)
1486
+ where Q1r is an unitary matrix, and Λ1r is a diagonal matrix
1487
+ consisting of eigenvalues. Performing the WF operation to (55)
1488
+ yields
1489
+ yr =
1490
+
1491
+ PsW1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]x
1492
+ + W1r(|β1|HirEK �Θ1n1i + nr)
1493
+
1494
+ ��
1495
+
1496
+ n1r
1497
+ ,
1498
+ (59)
1499
+ where n1r is the standard white noise with covariance matrix
1500
+ IM. The transmit signal at AF relay is yt = Ayr. In the second
1501
+ time slot, the received signal at D is denoted as
1502
+ yd =
1503
+
1504
+ Ps[hH
1505
+ rd + hH
1506
+ id(EK + |β2|EK) �Θ2HH
1507
+ ir]AW1r
1508
+ · [hsr + Hir(EK + |β1|EK) �Θ1hsi]x
1509
+ + [hH
1510
+ rd + hH
1511
+ id(EK + |β2|EK) �Θ2HH
1512
+ ir]An1r
1513
+ + |β2|hH
1514
+ idEK �Θ2n2i + nd.
1515
+ (60)
1516
+ The corresponding SNR can be represented as (61), as shown
1517
+ at the top of next page. It is assumed that the power budgets
1518
+ Ps, Pr and Pi are respectively fully used to transmit signals
1519
+ at S, AF relay and IRS. Therefore, the optimization problem
1520
+ can be converted to
1521
+ max
1522
+ |β1|,|β2|, �
1523
+ Θ1, �
1524
+ Θ2,A
1525
+ (61)
1526
+ (62a)
1527
+ s.t.
1528
+ | �Θ1(i, i)| = 1,
1529
+ | �Θ2(i, i)| = 1.
1530
+ (62b)
1531
+ It is necessary to solve the above problem for optimal |β1|,
1532
+ |β2|, �Θ1, �Θ2 and A.
1533
+
1534
+ 10
1535
+ SNR =
1536
+ γs|[hH
1537
+ rd + hH
1538
+ id(EK + |β2|EK) �Θ2HH
1539
+ ir]AW1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]|2
1540
+ β2
1541
+ 1∥[hH
1542
+ rd + hH
1543
+ id(EK + |β2|EK) �Θ2HH
1544
+ ir]AW1rHirEK �Θ1∥2 + ∥[hH
1545
+ rd + hH
1546
+ id(EK + |β2|EK) �Θ2HH
1547
+ ir]AW1r∥2 + β2
1548
+ 2∥hH
1549
+ idEK �Θ2∥2 + 1
1550
+ .
1551
+ (61)
1552
+ B. Solve |β1| and |β2|
1553
+ In the first time slot, the reflected signal at IRS is written
1554
+ by
1555
+ yt
1556
+ 1i =
1557
+
1558
+ PsΘ1hsix + Φ1n1i,
1559
+ =
1560
+
1561
+ PsEK �Θ1hsix
1562
+
1563
+ ��
1564
+
1565
+ ypt
1566
+ 1i
1567
+ +
1568
+
1569
+ Ps|β1|EK �Θ1hsix + |β1|EK �Θ1n1i
1570
+
1571
+ ��
1572
+
1573
+ yat
1574
+ 1i
1575
+ ,
1576
+ (63)
1577
+ where ypt
1578
+ 1i and yat
1579
+ 1i are respectively the signals reflected by
1580
+ passive elements EL and active elements EK. Additionally, the
1581
+ power consumed by the active elements is Pi. We have
1582
+ Pi = Psβ2
1583
+ 1∥EK �Θ1hsi∥2 + β2
1584
+ 1∥EK �Θ1∥2
1585
+ F σ2
1586
+ 1i
1587
+ = β2
1588
+ 1Ps
1589
+ K
1590
+
1591
+ k=1
1592
+ |ejθ1khk
1593
+ si|2 + β2
1594
+ 1
1595
+ K
1596
+
1597
+ k=1
1598
+ |ejθ1k|2σ2
1599
+ 1i
1600
+ = β2
1601
+ 1Ps
1602
+ K
1603
+
1604
+ k=1
1605
+ |hk
1606
+ si|2 + Kβ2
1607
+ 1σ2,
1608
+ (64)
1609
+ where θ1k is the phase shift of the kth IRS active element
1610
+ in the first time slot, hk
1611
+ si is the channel between S and the
1612
+ kth IRS active element and follows Rayleigh distribution with
1613
+ the expression hk
1614
+ si =
1615
+
1616
+ PLk
1617
+ sigk
1618
+ sie−jϕsk, where PLk
1619
+ si, gk
1620
+ si and
1621
+ ϕsk denote the path loss, the channel gain and the channel
1622
+ phase from S to the kth IRS active element, respectively. |gk
1623
+ si|2
1624
+ follows Exponential distribution [41], and the corresponding
1625
+ probability density function is given by
1626
+ f|gk
1627
+ si|2(x) =
1628
+
1629
+
1630
+
1631
+ 1
1632
+ λsi
1633
+ e−
1634
+ x
1635
+ λsi
1636
+ x ∈ [0, +∞),
1637
+ (65a)
1638
+ 0
1639
+ otherwise,
1640
+ (65b)
1641
+ where λsi is the Exponential distribution parameter. Let us
1642
+ define PLk
1643
+ si is equal to the path loss from S to IRS (i.e.,
1644
+ PLsi). Using the weak law of large numbers, (64) can be
1645
+ further written as
1646
+ Pi = β2
1647
+ 1Ps
1648
+ K
1649
+
1650
+ k=1
1651
+ |
1652
+
1653
+ PLsigk
1654
+ sie−jϕsk|2 + Kβ2
1655
+ 1σ2
1656
+ = β2
1657
+ 1PsPLsi
1658
+ K
1659
+
1660
+ k=1
1661
+ |gk
1662
+ si|2 + Kβ2
1663
+ 1σ2
1664
+ ≈ Kβ2
1665
+ 1PsPLsi · E(|gk
1666
+ si|2) + Kβ2
1667
+ 1σ2
1668
+ = Kβ2
1669
+ 1PsPLsiλsi + Kβ2
1670
+ 1σ2,
1671
+ (66)
1672
+ β1 can be achieved as
1673
+ |β1| =
1674
+
1675
+ Pi
1676
+ KPsPLsiλsi + Kσ2 .
1677
+ (67)
1678
+ Similarly, the received signal of the kth active IRS element in
1679
+ the second time slot is
1680
+ yrk
1681
+ 2i = hH
1682
+ rkAyr + n2i,k = hH
1683
+ rkyt + n2i,k,
1684
+ (68)
1685
+ where hH
1686
+ rk ∈ C1×M represents the channel between AF relay
1687
+ and the kth active IRS element,
1688
+ hH
1689
+ rk = [
1690
+
1691
+ PL1k
1692
+ ri g1k
1693
+ ri e−jϕ1k, · · · ,
1694
+
1695
+ PLMk
1696
+ ri gMk
1697
+ ri e−jϕMk], (69)
1698
+ where PLmk
1699
+ ri , gmk
1700
+ ri
1701
+ and ϕmk are the path loss, the channel gain
1702
+ and the channel phase between the mth antenna at AF relay
1703
+ and the kth active IRS element. Defining PLmk
1704
+ ri
1705
+ = PLri,
1706
+ PLri is the path loss from AF relay to IRS. The reflected
1707
+ signal of the kth active IRS element is
1708
+ ytk
1709
+ 2i = |β2|ejθ2khH
1710
+ rkyt + |β2|ejθ2kn2i,k
1711
+ = |β2||hH
1712
+ rk||yt|ej(θ2k+ϕrkt) + |β2|ejθ2kn2i,k,
1713
+ (70)
1714
+ where θ2k is the phase shift of the kth IRS active element in
1715
+ the second time slot, ϕrkt is the phase of hH
1716
+ rkyt. It is assumed
1717
+ that the transmit power of AF relay is Pr, the corresponding
1718
+ power of the reflected signal of the kth active IRS element is
1719
+ P tk
1720
+ 2i = β2
1721
+ 2|hH
1722
+ rk|2|yt|2 + β2
1723
+ 2σ2
1724
+ 2i,k
1725
+ = β2
1726
+ 2PrPLri
1727
+ M
1728
+
1729
+ m=1
1730
+ |gmk
1731
+ ri |2 + β2
1732
+ 2σ2
1733
+ K
1734
+ = Mβ2
1735
+ 2PrPLriλri + β2
1736
+ 2σ2
1737
+ K ,
1738
+ (71)
1739
+ where σ2
1740
+ 2i,k = σ2
1741
+ 2i/K = σ2/K, λri is the Exponential
1742
+ distribution parameter of channel from AF relay to IRS. Thus
1743
+ the power of the reflected signal of K active IRS elements is
1744
+ Pi =
1745
+ K
1746
+
1747
+ k=1
1748
+ P tk
1749
+ 2i = KMβ2
1750
+ 2PrPLriλri + β2
1751
+ 2σ2,
1752
+ (72)
1753
+ which yields
1754
+ |β2| =
1755
+
1756
+ Pi
1757
+ KMPrPLriλri + σ2 .
1758
+ (73)
1759
+ C. Optimize A Given �Θ1 and �Θ2
1760
+ Aiming at maximizing the received signal power, MRC-
1761
+ MRT method are applied to solve A as follows
1762
+ A = A [hrd + Hir �ΘH
1763
+ 2 (EK + |β2|EK)hid]
1764
+ ∥hH
1765
+ rd + hH
1766
+ id(EK + |β2|EK) �Θ2HH
1767
+ ir∥
1768
+ · [hsr + Hir(EK + |β1|EK) �Θ1hsi]HWH
1769
+ 1r
1770
+ ∥W1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]∥
1771
+ = AΥ,
1772
+ (74)
1773
+ where A is the amplify factor of AF relay. Since the transmit
1774
+ power of AF relay is Pr, we have A as shown in (75) at the top
1775
+ of next page. Inserting A back into (74), A can be obtained.
1776
+
1777
+ 11
1778
+ A =
1779
+
1780
+ γr
1781
+ γs∥ΥW1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]∥2 + β2
1782
+ 1∥ΥW1rHirEK �Θ1∥2
1783
+ F + ∥ΥW1r∥2
1784
+ F
1785
+ ,
1786
+ (75)
1787
+ �F2 =
1788
+
1789
+ β2
1790
+ 1diag{EKHH
1791
+ ir�hrid}diag{�h
1792
+ H
1793
+ ridHirEK}
1794
+ 0N×1
1795
+ 01×N
1796
+ ∥�h
1797
+ H
1798
+ rid∥2 + β2
1799
+ 2∥hH
1800
+ idEK �Θ2∥2 + 1
1801
+
1802
+ .
1803
+ (77)
1804
+ D. Optimize �Θ1 Given A and �Θ2
1805
+ By defining �u1 = [ejθ1i, · · · , ejθ1N ]T , �v1 = [�u1; 1] and
1806
+ �Hsir = [Hir(EK + |β1|EK)diag{hsi}, hsr]. Given A and �Θ2,
1807
+ the optimization problem is equivalent to
1808
+ max
1809
+ �v1
1810
+ �vH
1811
+ 1 �F1�v1
1812
+ �vH
1813
+ 1 �F2�v1
1814
+ (76a)
1815
+ s.t.
1816
+ |�v1(i)| = 1, ∀i = 1, 2, · · · , N,
1817
+ (76b)
1818
+ �v1(N + 1) = 1,
1819
+ (76c)
1820
+ where �F1 and �F2 are Hermitian matrices, and �F2 is positive
1821
+ semi-definite. �F1 = γs �H
1822
+ H
1823
+ sir�hrid�h
1824
+ H
1825
+ rid �Hsir, �hrid = [(hH
1826
+ rd +
1827
+ hH
1828
+ id(EK +|β2|EK) �Θ2HH
1829
+ ir)AW1r]H, and �F2 is denoted as (77)
1830
+ at the top of next page. The above problem can be relaxed to
1831
+ max
1832
+ �v1
1833
+ �vH
1834
+ 1 �F1�v1
1835
+ �vH
1836
+ 1 �F2�v1
1837
+ s.t.
1838
+ ∥�v1∥2 = N + 1,
1839
+ (78)
1840
+ which can be constructed as
1841
+ max
1842
+ �v1
1843
+ �vH
1844
+ 1 �F1�v1
1845
+ �vH
1846
+ 1 �F2�v1
1847
+ · �vH
1848
+ 1 IN+1�v1
1849
+ �vH
1850
+ 1 IN+1�v1
1851
+ s.t.
1852
+ ∥�v1∥2 = N + 1. (79)
1853
+ �v1 can be solved by using GPI algorithm, the details of
1854
+ GPI procedure is presented in Algorithm 3, where we define
1855
+ Ω(�vt
1856
+ 1) = (�vH
1857
+ 1 �F1�v1)IN+1 + (�vH
1858
+ 1 IN+1�v1)�F1 and Ξ1(�vt
1859
+ 1) =
1860
+ (�vH
1861
+ 1 �F2�v1)IN+1 + (�vH
1862
+ 1 IN+1�v1)�F2.
1863
+ Algorithm 3 GPI Algorithm to Compute Phase-Shift
1864
+ Vector �v1 with Given A and �Θ2
1865
+ 1. Given A and �Θ2, and initialize �v0
1866
+ 1.
1867
+ 2. Set the tolerance factor ξ and the iteration number t = 0.
1868
+ 3. repeat
1869
+ 4.
1870
+ Compute the function matrix Ω(�vt
1871
+ 1) and Ξ1(�vt
1872
+ 1).
1873
+ 5.
1874
+ Calculate yt = Ξ1(�vt
1875
+ 1)†Ω(�vt
1876
+ 1)�vt
1877
+ 1.
1878
+ 6.
1879
+ Update �vt+1
1880
+ 1
1881
+ =
1882
+ yt
1883
+ ∥yt∥.
1884
+ 7.
1885
+ Update t = t + 1.
1886
+ 8. until
1887
+ ∥�vt+1
1888
+ 1
1889
+ − �vt
1890
+ 1∥ ≤ ξ.
1891
+ E. Optimize �Θ2 Given A and �Θ1
1892
+ If
1893
+ A
1894
+ and
1895
+ �Θ1
1896
+ are
1897
+ fixed,
1898
+ let
1899
+ us
1900
+ define
1901
+ �u2
1902
+ =
1903
+ [ejθ2i, · · · , ejθ2N ]H, �v2 = [�u2; 1], �Hrid = [diag{hH
1904
+ id(EK +
1905
+ |β2|EK)}HH
1906
+ ir; hH
1907
+ rd]. Accordingly, the optimization problem is
1908
+ reduced to
1909
+ max
1910
+ �v2
1911
+ �vH
1912
+ 2 �H1�v2
1913
+ �vH
1914
+ 2 �H2�v2
1915
+ (80a)
1916
+ s.t.
1917
+ |�v2(i)| = 1, ∀i = 1, 2, · · · , N,
1918
+ (80b)
1919
+ �v2(N + 1) = 1,
1920
+ (80c)
1921
+ where �H1 and �H2 are Hermitian matrices, and �H2 is positive
1922
+ definite. �H1 = γs �HridAW1r[hsr +Hir(EK +|β1|EK) �Θ1hsi]·
1923
+ {�HridAW1r[hsr + Hir(EK + |β1|EK) �Θ1hsi]}H, and
1924
+ �H2 = �HridAW1r(β2
1925
+ 1HirEK �Θ1 �ΘH
1926
+ 1 EKHH
1927
+ ir + IM)WH
1928
+ 1rAH·
1929
+ �H
1930
+ H
1931
+ rid +
1932
+
1933
+ β2
1934
+ 2diag{hH
1935
+ idEK}diag{EKhid}
1936
+ 0N×1
1937
+ 01×N
1938
+ 1
1939
+
1940
+ .
1941
+ (81)
1942
+ We have the following relaxed transformation
1943
+ max
1944
+ �v2
1945
+ �vH
1946
+ 2 �H1�v2
1947
+ �vH
1948
+ 2 �H2�v2
1949
+ s.t.
1950
+ �vH
1951
+ 2 �v2 = 1
1952
+ (82)
1953
+ where �v2 =
1954
+ �v2
1955
+ √N+1. Moreover, in line with the GRR theorem,
1956
+ the optimal �v2 is obtained as the eigenvector corresponding
1957
+ to the largest eigenvalue of �H
1958
+ −1
1959
+ 2 �H1. Thereby �v2 and �Θ2 is
1960
+ achieved.
1961
+ F. Overall Algorithm and Complexity Analysis
1962
+ The proposed lower-complexity WF-GPI-GRR method is
1963
+ summarized in Algorithm 4. The main idea consists of two
1964
+ parts: the amplifying coefficient of active element and the
1965
+ iterative idea. The analytic solutions of amplifying coefficients
1966
+ of IRS active elements in the first time slot and the second time
1967
+ slot, i.e., β1 and β2, are determined by the transmit power
1968
+ of S, AF relay, IRS. Furthermore, β1 and β2 are denoted as
1969
+ (67) and (73). The iterative idea can be described as follows:
1970
+ for given �Θ1 and �Θ2, the closed-form expression of A are
1971
+ represented as (74) by utilizing MRC-MRT; for given A and
1972
+ �Θ2, GPI is applied to achieve �Θ1; for given A and �Θ1, �Θ2 is
1973
+ obtained in a closed-form expression by using GRR theorem.
1974
+ The alternative iteration process are performed among A, �Θ1
1975
+ and �Θ2 until the stop criterion is satisfied, while the system
1976
+ rate is maximum.
1977
+ In the following, the total computational complexity of
1978
+ Algorithm 4 is calculated as
1979
+ O{D3(N 3 + 4M 3 + 4M 2N + 2MN 2 + 2M 2K+
1980
+ 8M 2 + 6N 2 + 9MN + 5MK + 5M + 11N+
1981
+ 3 + D4(7N 3 + 27N 2 + 43N + 18))}
1982
+ (83)
1983
+
1984
+ 12
1985
+ Algorithm 4 Proposed WF-GPI-GRR Method
1986
+ 1.
1987
+ Calculate β1 and β2 through (67) and (73).
1988
+ 2.
1989
+ Initialize A0, �Θ0
1990
+ 1 and �Θ0
1991
+ 2. According to (9) and (61),
1992
+ R0 can be obtained.
1993
+ 3.
1994
+ set the convergence error δ and the iteration number
1995
+ t = 0.
1996
+ 4. repeat
1997
+ 5.
1998
+ Fix �Θt
1999
+ 1 and �Θt
2000
+ 2, compute At+1 through (74).
2001
+ 6.
2002
+ Fix At+1 and �Θt
2003
+ 2, solve problem (79) to achieve
2004
+ �vt+1
2005
+ 1
2006
+ based on GPI presented in Algorithm 3, �Θt+1
2007
+ 1
2008
+ =
2009
+ diag{�vt+1
2010
+ 1
2011
+ (1 : N)}.
2012
+ 7.
2013
+ Fix At+1 and �Θt+1
2014
+ 1
2015
+ , solve problem (82) to achieve
2016
+ �vt+1
2017
+ 2
2018
+ based on GRR theorem, �Θt+1
2019
+ 2
2020
+ = diag{�vt+1
2021
+ 2
2022
+ (1 : N)}.
2023
+ 8.
2024
+ Update Rt+1 by using β1, β2, At+1, �Θt+1
2025
+ 1
2026
+ and �Θt+1
2027
+ 2
2028
+ .
2029
+ 9.
2030
+ Update t = t + 1.
2031
+ 10. until
2032
+ ��Rt+1 − Rt�� ≤ δ.
2033
+ FLOPs, where D3 is the maximum number of alternating
2034
+ iterations for Algorithm 4 and D4 is the number of iteration in
2035
+ GPI algorithm. Its highest order of computational complexity
2036
+ is M 3 and N 3 FLOPs, which is lower than the complexity of
2037
+ Algorithm 1 and Algorithm 2.
2038
+ VI. SIMULATION AND NUMERICAL RESULTS
2039
+ In this section, in order to evaluate the rate performance
2040
+ among the proposed three methods, numerical simulations are
2041
+ performed. Moreover, it is assumed that S, D, hybrid IRS
2042
+ and AF relay are located in three-dimensional (3D) space, the
2043
+ related coordinate simulation setup is shown in Fig. 2, where
2044
+ S, D, hybrid IRS and AF relay are located at (0, 0, 0), (0, 100,
2045
+ 0), (−10, 50, 20) and (10, 50, 10) in meter (m), respectively.
2046
+ The path loss is modeled as PL(d) = PL0 − 10αlog10( d
2047
+ d0 ),
2048
+ where PL0 = −30dB is the path loss at the reference distance
2049
+ d0 = 1m, d is the distance between transmitter and receiver,
2050
+ and α is the path loss exponent, respectively. Here, the path
2051
+ loss exponents of each channel link associated with IRS, i.e.,
2052
+ S-IRS, IRS-AF relay and IRS-D, are set as 2.0, and those of
2053
+ S-AF relay and AF relay-D links are considered as 3.0. The
2054
+ remaining system parameters are set as follow: σ2 = −80dBm
2055
+ and EK is randomly generated.
2056
+ Fig. 2. Simulation setup.
2057
+ Additionally, to demonstrate the proposed three methods,
2058
+ the following three benchmark schemes are taken into account.
2059
+ 1) AF relay+passive IRS: A passive IRS-aided AF relay
2060
+ network is considered, where IRS only reflects the signal
2061
+ without amplifying the reflected signal, and the reflecting
2062
+ coefficient of each IRS element is set as 1;
2063
+ 2) AF relay+passive IRS with random phase: With ran-
2064
+ dom phase of each reflection element uniformly and indepen-
2065
+ dently generated from the interval (0, 2π], the beamforming
2066
+ matrix A at AF relay is optimized.
2067
+ 3) Only AF relay: A AF relay network without IRS
2068
+ is considered, while the AF relay beamforming matrix A
2069
+ can be achieved by MRC-MRT, which is given by A =
2070
+
2071
+ Pr
2072
+ Ps∥Γhsr∥2+σ2∥Γ∥2
2073
+ F Γ, where Γ =
2074
+ hrdhH
2075
+ sr
2076
+ ∥hH
2077
+ rd∥∥hsr∥.
2078
+ Towards a fair comparison between a hybrid IRS-aided
2079
+ AF relay wireless network and the above three benchmark
2080
+ schemes, let us define that the total transmit power budgets
2081
+ of S and AF relay in the three benchmark schemes are the
2082
+ same as that of S, AF relay and IRS in the hybrid IRS-aided
2083
+ AF relay network. For instance, the AF relay transmit power
2084
+ budget PR in the three benchmark schemes is equal to Pi+Pr.
2085
+ 4
2086
+ 5
2087
+ 6
2088
+ 7
2089
+ 8
2090
+ 9
2091
+ 10
2092
+ 11
2093
+ 12
2094
+ log2N
2095
+ 105
2096
+ 1010
2097
+ 1015
2098
+ 1020
2099
+ 1025
2100
+ 1030
2101
+ Computational Complexity (FLOPs)
2102
+ Proposed HP-SDR-FP
2103
+ Proposed LC-SCA-FP
2104
+ Proposed WF-GPI-GRR
2105
+ Fig. 3. Computational complexity versus N with (M, K, D1, D2, D3, D4) =
2106
+ (2, 4, 6, 10, 5, 2).
2107
+ Fig. 3 plots the computational complexity of the proposed
2108
+ three methods. By suppressing ln(1/ε) [42], the computational
2109
+ complexities of the proposed three methods, 1) HP-SDR-
2110
+ FP; 2) LC-SCA-FP; and 3) WF-GPI-GRR, increase as N
2111
+ increases. It is clear that the first method has the highest
2112
+ computational complexity, which is much higher than those
2113
+ of the other two methods. In addition, the third method has
2114
+ the lowest computational complexity.
2115
+ Fig. 4 demonstrates the proposed three methods are con-
2116
+ vergent under different Ps, respectively. Obviously, for Ps =
2117
+ 10dBm, the proposed HP-SDR-FP, LC-SCA-FP and WF-GPI-
2118
+ GRR methods require about only four iterations to achieve the
2119
+ rate ceil. While for Ps = 30dBm, it takes ten iterations for the
2120
+ proposed three methods to converge to the rate ceil. From the
2121
+ above two cases, we conclude that the proposed three methods
2122
+ are feasible.
2123
+ Fig. 5 shows the achievable rate versus Ps with (M, N, K)
2124
+ = (2, 32, 4). It can be seen that the proposed HP-SDR-
2125
+ FP, LC-SCA-FP and WF-GPI-GRR methods with (Pi, Pr) =
2126
+ (30dBm, 30dBm) perform better than AF relay+passive IRS,
2127
+
2128
+ Hybrid IRS (-10, 50, 20)
2129
+ y
2130
+ AF relay (10, 50, 10)
2131
+ S
2132
+ (0, 0, 0)
2133
+ (0, 100, 0)
2134
+ X13
2135
+ 0
2136
+ 3
2137
+ 6
2138
+ 9
2139
+ 12
2140
+ 15
2141
+ 18
2142
+ Number of iterations
2143
+ 4
2144
+ 5
2145
+ 6
2146
+ 7
2147
+ 8
2148
+ 9
2149
+ 10
2150
+ Achivable Rate(bits/s/Hz)
2151
+ Proposed HP-SDR-FP
2152
+ Proposed LC-SCA-FP
2153
+ Proposed WF-GPI-GRR
2154
+ 30dBm
2155
+ 10dBm
2156
+ Fig. 4. Convergence of proposed methods with (M, N, K, Pi, Pr) = (2, 32,
2157
+ 4, 30dBm, 30dBm).
2158
+ 0
2159
+ 5
2160
+ 10
2161
+ 15
2162
+ 20
2163
+ 25
2164
+ 30
2165
+ Ps (dBm)
2166
+ 0
2167
+ 1
2168
+ 2
2169
+ 3
2170
+ 4
2171
+ 5
2172
+ 6
2173
+ 7
2174
+ 8
2175
+ 9
2176
+ Achivable Rate (bits/s/Hz)
2177
+ Proposed HP-SDR-FP
2178
+ Proposed LC-SCA-FP
2179
+ Proposed WF-GPI-GRR
2180
+ AF relay+passive IRS
2181
+ AF relay+passive IRS with random phase
2182
+ Only AF relay
2183
+ Fig. 5. Achievable rate versus Ps with (M, N, K) = (2, 32, 4).
2184
+ AF relay+passive IRS with random phase and only AF relay
2185
+ with PR = 33dBm. Furthermore, the rate performance of LC-
2186
+ SCA-FP method is the most closest to that of HP-SDR-FP
2187
+ method in the low and medium power Ps region. For instance,
2188
+ when power Ps is equal to 15dBm, the rate performance gaps
2189
+ between the method LC-SCA-FP, the worst method WF-GPI-
2190
+ GRR and the best method HP-SDR-FP method are respectively
2191
+ 0.037bits/s/Hz and 0.245bits/s/Hz.
2192
+ Fig. 6 illustrates the achievable rate versus Pi
2193
+ with
2194
+ (M, N, K, Ps) = (2, 32, 4, 30dBm). It is particularly noted
2195
+ that the proposed three methods with Pr = 30dBm make
2196
+ a better rate performance improvement than that of AF re-
2197
+ lay+passive IRS, AF relay+passive IRS with random phase
2198
+ and only AF relay with PR = Pi + Pr. For example, when
2199
+ Pi equals 40dBm, the proposed worst method, WF-GPI-GRR
2200
+ method, can harvest up to 49.8% rate gain over AF re-
2201
+ lay+passive IRS. The best method HP-SDR-FP approximately
2202
+ has a 53.3% rate gain over AF relay+passive IRS. This shows
2203
+ that as Pi increases, significant rate gains are achieved for
2204
+ the proposed hybrid IRS-aided AF relay wireless network.
2205
+ Moreover, the rate performance of LC-SCA-FP is getting
2206
+ closer to that of HP-SDR-FP, and the gap between LC-SCA-
2207
+ FP and WF-GPI-GRR becomes smaller.
2208
+ 10
2209
+ 15
2210
+ 20
2211
+ 25
2212
+ 30
2213
+ 35
2214
+ 40
2215
+ Pi (dBm)
2216
+ 3
2217
+ 4
2218
+ 5
2219
+ 6
2220
+ 7
2221
+ 8
2222
+ 9
2223
+ Achivable Rate (bits/s/Hz)
2224
+ Proposed HP-SDR-FP
2225
+ Proposed LC-SCA-FP
2226
+ Proposed WF-GPI-GRR
2227
+ AF relay+passive IRS
2228
+ AF relay+passive IRS with random phase
2229
+ Only AF relay
2230
+ Fig. 6. Achievable rate versus P i with (M, N, K, Ps) = (2, 32, 4, 30dBm).
2231
+ 0
2232
+ 1
2233
+ 2
2234
+ 3
2235
+ 4
2236
+ 5
2237
+ log2K
2238
+ 4
2239
+ 5
2240
+ 6
2241
+ 7
2242
+ 8
2243
+ 9
2244
+ 10
2245
+ Achivable Rate(bits/s/Hz)
2246
+ Proposed HP-SDR-FP
2247
+ Proposed LC-SCA-FP
2248
+ Proposed WF-GPI-GRR
2249
+ AF relay+passive IRS
2250
+ AF relay+passive IRS with random phase
2251
+ Only AF relay
2252
+ Fig. 7. Achievable rate versus K with (M, N, Ps) = (2, 32, 30dBm).
2253
+ Fig. 7 presents the achievable rate versus the number of
2254
+ active IRS elements K with (M, N, Ps) = (2, 32, 30dBm)
2255
+ for the proposed three methods with (Pi, Pr) = (30dBm,
2256
+ 30dBm) and the three benchmark schemes with PR = 33dBm.
2257
+ From Fig. 7, it can be observed that as the number of active
2258
+ IRS elements K increases, the rate gains of the proposed
2259
+ three methods over AF relay+passive IRS, AF relay+passive
2260
+ IRS with random phase and only AF relay increase gradually
2261
+ and become more significant. Meanwhile, the proposed three
2262
+ methods have the following increasing order on rate: HP-
2263
+ SDR-FP, LC-SCA-FP and WF-GPI-GRR. Compared with the
2264
+ benchmark scheme of AF relay+passive IRS, our proposed
2265
+ three methods perform much better, which shows that the
2266
+ optimization of beamforming is important and efficient.
2267
+ VII. CONCLUSIONS
2268
+ In this paper, we have made an investigation of beamform-
2269
+ ing methods of optimizing the beamforming matrix at AF
2270
+ relay and reflecting coefficient matrices at IRS in a hybrid
2271
+ IRS-aided AF relay network, where the hybrid IRS includes
2272
+ few active elements amplifying and reflecting the incident
2273
+ signal. By using the criterion of Max SNR, three schemes,
2274
+ namely HP-SDR-FP, LC-SCA-FP and WF-GPI-GRR, have
2275
+
2276
+ 14
2277
+ been proposed to improve the rate performance. Simulation
2278
+ results show that the proposed three methods can make a
2279
+ dramatic rate enhancement compared to AF relay+passive
2280
+ IRS, AF relay+passive IRS with random phase and only
2281
+ AF relay, which verifies the active IRS elements can break
2282
+ the “double fading” effect caused by conventional passive
2283
+ IRS. For instance, an approximate 50.0% rate gain over the
2284
+ three benchmark schemes can be achieved in the high power
2285
+ budget region of hybrid IRS. Therefore, a hybrid IRS-aided
2286
+ AF relay network can provide an enhancement in accordance
2287
+ with rate performance and extended coverage for the mobile
2288
+ communications.
2289
+ REFERENCES
2290
+ [1] D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato,
2291
+ O. Dobre, and H. V. Poor, “6G internet of things: A comprehensive
2292
+ survey,” IEEE Internet Things J., vol. 9, no. 1, pp. 359–383, Jan. 2022.
2293
+ [2] L. Chettri and R. Bera, “A comprehensive survey on internet of things
2294
+ (IoT) toward 5G wireless systems,” IEEE Internet Things J., vol. 7,
2295
+ no. 1, pp. 16–32, Jan. 2020.
2296
+ [3] B. M. Lee, “Adaptive switching scheme for rs overhead reduction in
2297
+ massive MIMO with industrial internet of things,” IEEE Internet Things
2298
+ J., vol. 8, no. 4, pp. 2585–2602, Feb. 2021.
2299
+ [4] G. Yu, X. Chen, C. Zhong, D. W. Kwan Ng, and Z. Zhang, “Design,
2300
+ analysis, and optimization of a large intelligent reflecting surface-aided
2301
+ B5G cellular Internet of Things,” IEEE Internet Things J., vol. 7, no. 9,
2302
+ pp. 8902–8916, Sep. 2020.
2303
+ [5] R. Zi, J. Liu, L. Gu, and X. Ge, “Enabling security and high energy
2304
+ efficiency in the internet of things with massive mimo hybrid precoding,”
2305
+ IEEE Internet Things J., vol. 6, no. 5, pp. 8615–8625, Oct. 2019.
2306
+ [6] X. Zhang, H. Qi, X. Zhang, and L. Han, “Energy-efficient resource
2307
+ allocation and data transmission of cell-free internet of things,” IEEE
2308
+ Internet Things J., vol. 8, no. 20, pp. 15 107–15 116, Oct. 2021.
2309
+ [7] J. Chen, S. Li, J. Xing, J. Wang, and S. Fu, “Multiple nodes access
2310
+ of wireless beam modulation for 6g-enabled internet of things,” IEEE
2311
+ Internet Things J., vol. 8, no. 20, pp. 15 191–15 204, Oct. 2021.
2312
+ [8] V. W. S. Wong, R. Schober, D. W. K. Ng, and L.-C. Wang, Key
2313
+ Technologies for 5G Wireless Systems, Cambridge U.K.: Cambridge
2314
+ Univ. Press, 2017.
2315
+ [9] S. Poursajadi, M. H. Madani, and H. K. Bizaki, “Power allocation
2316
+ and outage probability analysis of AF relaying systems with multiple
2317
+ antennas at terminal nodes,” IEEE Trans. Veh. Technol., vol. 66, no. 1,
2318
+ pp. 377–384, Jan. 2017.
2319
+ [10] B. Rankov and A. Wittneben, “Spectral efficient protocols for half-
2320
+ duplex fading relay channels,” IEEE J. Sel. Areas Commun., vol. 25,
2321
+ no. 2, pp. 379–389, Feb. 2007.
2322
+ [11] E. Bjornson, O. Ozdogan, and E. G. Larsson, “Intelligent reflecting
2323
+ surface versus decode-and-forward: How large surfaces are needed to
2324
+ beat relaying?” IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 244–
2325
+ 248, Feb. 2020.
2326
+ [12] Q. Wu and R. Zhang, “Beamforming optimization for wireless network
2327
+ aided by intelligent reflecting surface with discrete phase shifts,” IEEE
2328
+ Trans. Commun., vol. 68, no. 3, pp. 1838–1851, Mar. 2020.
2329
+ [13] E. Basar, M. Di Renzo, J. De Rosny, M. Debbah, M.-S. Alouini, and
2330
+ R. Zhang, “Wireless communications through reconfigurable intelligent
2331
+ surfaces,” IEEE Access, vol. 7, pp. 116 753–116 773, Sep. 2019.
2332
+ [14] R. Li, B. Guo, M. Tao, Y.-F. Liu, and W. Yu, “Joint design of hybrid
2333
+ beamforming and reflection coefficients in RIS-aided mmWave MIMO
2334
+ systems,” IEEE Trans. Commun., vol. 70, no. 4, pp. 2404–2416, April
2335
+ 2022.
2336
+ [15] W. Zhang, J. Xu, W. Xu, D. W. K. Ng, and H. Sun, “Cascaded chan-
2337
+ nel estimation for IRS-assisted mmwave multi-antenna with quantized
2338
+ beamforming,” IEEE Commun. Lett., vol. 25, no. 2, pp. 593–597, Feb.
2339
+ 2021.
2340
+ [16] S. Gong, C. Xing, P. Yue, L. Zhao, and T. Q. S. Quek, “Hybrid analog
2341
+ and digital beamforming for RIS-assisted mmWave communications,”
2342
+ IEEE Trans. Wireless Commun., pp. 1–17, 2022.
2343
+ [17] Y. Liang, J. Chen, R. Long, Z. He, X. Lin, C. Huang, S. Liu, X. Shen,
2344
+ and M. D. Renzo, “Reconfigurable intelligent surfaces for smart wireless
2345
+ environments: channel estimation, system design and applications in 6G
2346
+ networks,” Sci. China Inf. Sci., vol. 64, no. 10, pp. 1–21, Jul. 2021.
2347
+ [18] W. Tang, M. Z. Chen, X. Chen, J. Y. Dai, Y. Han, M. Di Renzo,
2348
+ Y. Zeng, S. Jin, Q. Cheng, and T. J. Cui, “Wireless communications with
2349
+ reconfigurable intelligent surface: Path loss modeling and experimental
2350
+ measurement,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 421–
2351
+ 439, Jan. 2021.
2352
+ [19] L. Yang, X. Yan, D. B. da Costa, T. A. Tsiftsis, H.-C. Yang, and M.-
2353
+ S. Alouini, “Indoor mixed dual-hop VLC/RF systems through reconfig-
2354
+ urable intelligent surfaces,” IEEE Wireless Commun. Lett., vol. 9, no. 11,
2355
+ pp. 1995–1999, Nov. 2020.
2356
+ [20] F. Shu, L. Yang, X. Jiang, W. Cai, W. Shi, M. Huang, J. Wang,
2357
+ and X. You, “Beamforming and transmit power design for intelligent
2358
+ reconfigurable surface-aided secure spatial modulation,” IEEE J. Sel.
2359
+ Topics Signal Process., vol. 16, no. 5, pp. 933–949, Aug. 2022.
2360
+ [21] F. Shu, Y. Teng, J. Li, M. Huang, W. Shi, J. Li, Y. Wu, and J. Wang,
2361
+ “Enhanced secrecy rate maximization for directional modulation net-
2362
+ works via IRS,” IEEE Trans. Commun., vol. 69, no. 12, pp. 8388–8401,
2363
+ Dec. 2021.
2364
+ [22] H. Shen, W. Xu, S. Gong, Z. He, and C. Zhao, “Secrecy rate
2365
+ maximization for intelligent reflecting surface assisted multi-antenna
2366
+ communications,” IEEE Commun. Lett., vol. 23, no. 9, pp. 1488–1492,
2367
+ Sep. 2019.
2368
+ [23] Q. Wu and R. Zhang, “Weighted sum power maximization for intelligent
2369
+ reflecting surface aided SWIPT,” IEEE Wireless Commun. Lett., vol. 9,
2370
+ no. 5, pp. 586–590, May 2020.
2371
+ [24] W. Shi, X. Zhou, L. Jia, Y. Wu, F. Shu, and J. Wang, “Enhanced
2372
+ secure wireless information and power transfer via intelligent reflecting
2373
+ surface,” IEEE Commun. Lett., vol. 25, no. 4, pp. 1084–1088, Apr. 2021.
2374
+ [25] C. Pan, H. Ren, K. Wang, W. Xu, M. Elkashlan, A. Nallanathan,
2375
+ and L. Hanzo, “Multicell MIMO communications relying on intelligent
2376
+ reflecting surfaces,” IEEE Trans. Wireless Commun., vol. 19, no. 8, pp.
2377
+ 5218–5233, Aug. 2020.
2378
+ [26] A. Rezaei, A. Khalili, J. Jalali, H. Shafiei, and Q. Wu, “Energy-efficient
2379
+ resource allocation and antenna selection for IRS-assisted multicell
2380
+ downlink networks,” IEEE Wireless Commun. Lett., vol. 11, no. 6, pp.
2381
+ 1229–1233, June 2022.
2382
+ [27] X. Zhou, S. Yan, Q. Wu, F. Shu, and D. Ng, “Intelligent reflecting surface
2383
+ (IRS)-aided covert wireless communications with delay constraint,”
2384
+ IEEE Trans. Wireless Commun., vol. 21, no. 1, pp. 532–547, Jan. 2022.
2385
+ [28] X. Chen, T.-X. Zheng, L. Dong, M. Lin, and J. Yuan, “Enhancing MIMO
2386
+ covert communications via intelligent reflecting surface,” IEEE Wireless
2387
+ Commun. Lett., vol. 11, no. 1, pp. 33–37, Jan. 2022.
2388
+ [29] Q. Wu, X. Zhou, W. Chen, J. Li, and X. Zhang, “IRS-aided WPCNs:
2389
+ A new optimization framework for dynamic IRS beamforming,” IEEE
2390
+ Trans. Wireless Commun., vol. 21, no. 7, pp. 4725–4739, July 2022.
2391
+ [30] H. Cao, Z. Li, and W. Chen, “Resource allocation for IRS-assisted
2392
+ wireless powered communication networks,” IEEE Wireless Commun.
2393
+ Lett., vol. 10, no. 11, pp. 2450–2454, Nov. 2021.
2394
+ [31] W. Shi, Q. Wu, F. Xiao, F. Shu, and J. Wang, “Secrecy throughput
2395
+ maximization for IRS-aided MIMO wireless powered communication
2396
+ networks,” IEEE Trans. Commun., vol. 70, no. 11, pp. 7520–7535, Nov.
2397
+ 2022.
2398
+ [32] L. Yang, W. Guo, and S. I. Ansari, “Mixed dual-hop fso-rf communica-
2399
+ tion systems through reconfigurable intelligent surface,” IEEE Commun.
2400
+ Lett., vol. 24, no. 7, pp. 1558–1562, July 2020.
2401
+ [33] I. Yildirim, F. Kilinc, E. Basar, and G. C. Alexandropoulos, “Hybrid RIS-
2402
+ empowered reflection and decode-and-forward relaying for coverage
2403
+ extension,” IEEE Commun. Lett., vol. 25, no. 5, pp. 1692–1696, May
2404
+ 2021.
2405
+ [34] M. Obeed and A. Chaaban, “Relay-reconfigurable intelligent surface
2406
+ cooperation for energy-efficient multiuser systems,” in 2021 IEEE Int.
2407
+ Conf. Commun. Workshops (ICC Workshops), pp. 1–6.
2408
+ [35] N. T. Nguyen, Q.-D. Vu, K. Lee, and M. Juntti, “Spectral efficiency
2409
+ optimization for hybrid relay-reflecting intelligent surface,” in 2021
2410
+ IEEE Int. Conf. Commun. Workshops (ICC Workshops), Jul. 2021, pp.
2411
+ 1–6.
2412
+ [36] X. Wang, F. Shu, W. Shi, X. Liang, R. Dong, J. Li, and J. Wang,
2413
+ “Beamforming design for IRS-aided decode-and-forward relay wireless
2414
+ network,” IEEE Trans. Green Commun. Netw., vol. 6, no. 1, pp. 198–
2415
+ 207, Mar. 2022.
2416
+ [37] Z. Abdullah, G. Chen, S. Lambotharan, and J. A. Chambers, “A
2417
+ hybrid relay and intelligent reflecting surface network and its ergodic
2418
+ performance analysis,” IEEE Wireless Commun. Lett., vol. 9, no. 10, pp.
2419
+ 1653–1657, Oct. 2020.
2420
+ [38] Z. Zhang, L. Dai, X. Chen, C. Liu, F. Yang, R. Schober, and H. Vin-
2421
+ cent Poor, “Active RIS vs. passive RIS: Which will prevail in 6G?”
2422
+ IEEE Trans. Commun., pp. 1–9, 2022.
2423
+
2424
+ 15
2425
+ [39] K. Zhi, C. Pan, H. Ren, K. K. Chai, and M. Elkashlan, “Active RIS
2426
+ versus passive RIS: Which is superior with the same power budget?”
2427
+ IEEE Commun. Lett., vol. 26, no. 5, pp. 1150–1154, May 2022.
2428
+ [40] L. Dong, H.-M. Wang, and J. Bai, “Active reconfigurable intelligent
2429
+ surface aided secure transmission,” IEEE Trans. Veh. Technol., vol. 71,
2430
+ no. 2, pp. 2181–2186, Feb. 2022.
2431
+ [41] N. Mensi and D. B. Rawat, “Reconfigurable intelligent surface selection
2432
+ for wireless vehicular communications,” IEEE Wireless Commun. Lett.,
2433
+ vol. 11, no. 8, pp. 1743–1747, Aug. 2022.
2434
+ [42] X. Zhou, J. Li, F. Shu, Q. Wu, Y. Wu, W. Chen, and L. Hanzo, “Secure
2435
+ SWIPT for directional modulation-aided AF relaying networks,” IEEE
2436
+ J. Sel. Areas Commun., vol. 37, no. 2, pp. 253–268, Feb. 2019.
2437
+
8dE1T4oBgHgl3EQfCAI3/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8dE4T4oBgHgl3EQf2w3D/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:dc0b93494ae63e0ad3a9d1838d6cd463fe86642853ae819b5d133b62ff3026c7
3
+ size 33292333
9tE0T4oBgHgl3EQffwDm/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:91e1eda4326eee9edf40249d9f06da76a64cc97047e70c9dc62ab4ee8afd45f4
3
+ size 2818093
9tE0T4oBgHgl3EQffwDm/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:94183404fbdb10e46aafb533268a1005642cde156e43fc99ec2d9dc98cae49a9
3
+ size 121291
C9E2T4oBgHgl3EQfoAjs/content/tmp_files/2301.04015v1.pdf.txt ADDED
@@ -0,0 +1,1048 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Science
2
+ Education
3
+ Do Inquiring Minds Have Positive
4
+ Attitudes? The Science Education
5
+ of Preservice Elementary Teachers
6
+ CATHERINE RIEGLE-CRUMB,1 KARISMA MORTON,1 CHELSEA MOORE,2
7
+ ANTONIA CHIMONIDOU,3 CYNTHIA LABRAKE,4 SACHA KOPP5
8
+ 1Department of Curriculum and Instruction, STEM Education, University of Texas at
9
+ Austin; 2Department of Psychology, University of Massachusetts, Amherst; 3UTeach
10
+ Primary, College of Natural Sciences, University of Texas at Austin; 4Department of
11
+ Chemistry, University of Texas at Austin; and 5College of Arts and Sciences, SUNY
12
+ Stonybrook
13
+ Received 26 June 2014; revised 27 February 2015; accepted 30 March 2015
14
+ DOI 10.1002/sce.21177
15
+ Published online 14 July 2015 in Wiley Online Library (wileyonlinelibrary.com).
16
+ ABSTRACT: Owing to their potential impact on students’ cognitive and noncognitive
17
+ outcomes, the negative attitudes toward science held by many elementary teachers are a
18
+ critical issue that needs to be addressed. This study focuses on the science education of
19
+ preservice elementary teachers with the goal of improving their attitudes before they begin
20
+ their professional lives as classroom teachers. Specifically, this study builds on a small
21
+ body of research to examine whether exposure to inquiry-based science content courses
22
+ that actively involve students in the collaborative process of learning and discovery can
23
+ promote a positive change in attitudes toward science across several different dimensions.
24
+ To examine this issue, surveys and administrative data were collected from over 200 students
25
+ enrolled in the Hands on Science (HoS) program for preservice teachers at the University
26
+ of Texas at Austin, as well as more than 200 students in a comparison group enrolled
27
+ in traditional lecture-style classes. Quantitative analyses reveal that after participating in
28
+ HoS courses, preservice teachers significantly increased their scores on scales measuring
29
+ confidence, enjoyment, anxiety, and perceptions of relevance, while those in the comparison
30
+ group experienced a decline in favorable attitudes to science. These patterns offer empirical
31
+ support for the attitudinal benefits of inquiry-based instruction and have implications for
32
+ the future learning opportunities available to students at all education levels.
33
+ C⃝ 2015
34
+ Wiley Periodicals, Inc. Sci Ed 99:819–836, 2015
35
+ Correspondence to: Dr. Catherine Riegle-Crumb; e-mail: [email protected]
36
+ C⃝ 2015 Wiley Periodicals, Inc.
37
+
38
+ 820
39
+ RIEGLE-CRUMB ET AL.
40
+ INTRODUCTION
41
+ While the metaphor of science, technology, engineering, and mathematics (STEM) as a
42
+ pipeline has been rightly criticized as too simplistic, it is nevertheless clear that students’
43
+ early experiences in science classrooms shape their future achievement and interests (Xie &
44
+ Shauman, 2003). With the goal of better understanding and ultimately improving elemen-
45
+ tary science education in the United States, researchers and policymakers have increased
46
+ their attention toward teachers. A growing body of research now focuses on the science
47
+ content knowledge of elementary science teachers, as the subject matter expertise that
48
+ they possess has clear implications for what students learn (Diamond, Maerten-Rivera,
49
+ Rohrer, & Lee, 2014; Heller, Daehler, Wong, Shinohara, & Miratrix, 2012; Kanter & Kon-
50
+ stantopoulus, 2010; Sadler, Sonnert, Coyle, Cook-Smith, & Miller, 2013). Compared to
51
+ secondary teachers, elementary teachers are much more likely to be trained as generalists
52
+ and consequently less likely to have extensive content knowledge, and this pattern appears
53
+ particularly pronounced for science (Haefner & Zembal-Saul, 2004). Clearly there are con-
54
+ tinued concerns about the need for teacher training programs and professional development
55
+ to focus on increasing subject matter expertise.
56
+ Yet content knowledge is a necessary but insufficient characteristic of a successful teacher.
57
+ Teachers’ attitudes about the content they teach is another critical factor that has implications
58
+ for classroom learning, and importantly, negative attitudes can exist independent of content-
59
+ area expertise (Beilock, Gunderson, Ramirez, & Levine, 2010; Tosun, 2000). While there
60
+ is comparatively less research on elementary teachers’ attitudes toward science than math
61
+ (Bursal & Paznokas, 2006), there is nevertheless evidence that many elementary teachers
62
+ are not favorably inclined toward science. Such negative attitudes on the part of teachers can
63
+ impact their students’ attitudes toward science and can inhibit students’ learning (Beilock
64
+ et al., 2010; Jarrett, 1999; Ramey-Gassert, Shroyer, & Staver, 1996), creating a vicious
65
+ cycle that must be interrupted. However, effectively changing how teachers view science is
66
+ a challenging task (Mulholland & Wallace, 1996; Palmer, 2002).
67
+ The goal of this study is to examine whether inquiry-based science content classes might
68
+ function to help break this cycle by improving preservice teachers’ attitudes at a critical
69
+ juncture before they begin their professional lives as classroom teachers. While there is
70
+ much research on the positive impact of inquiry on outcomes for K–12 students (Borman,
71
+ Gamoran, & Bowdon, 2008; Diamond et al., 2014; National Research Council, 2012b), we
72
+ build on a smaller body of qualitative research regarding the benefits of inquiry instruction
73
+ in college for preservice elementary teachers (Mulholland & Wallace, 1996; Palmer, 2002).
74
+ Specifically, we suggest that students can become empowered and enthusiastic about the
75
+ domain of science through active involvement in the process of inquiry, defined as engaging
76
+ in the pursuit of scientific questions via data collection, experimentation, exploration, and
77
+ discussion (National Research Council, 2000).
78
+ To examine this issue, we collected data from the hands-on science (HoS) undergraduate
79
+ program at the University of Texas at Austin (Ludwig et al., 2013) to determine whether
80
+ exposure to these inquiry-based science content courses promoted a change in the science
81
+ attitudes of a sample of over 200 preservice elementary teachers. In exploring preservice
82
+ teachers’ attitudes, we go beyond the typical singular focus of much research on self-
83
+ efficacy to instead consider personal attitudes toward science across several dimensions
84
+ (van Aalderen-Smeets, Walma van der Molen, & Asma, 2012). Additionally, to ensure
85
+ the robustness of our results, our design utilizes a comparison group of noneducation and
86
+ nonscience majors enrolled in more traditional lecture-based science courses; our analyses
87
+ also account for students’ social and academic background. Our study offers promising
88
+ evidence that science content classes in college can be a positive vehicle for changing the
89
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
90
+
91
+ DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
92
+ 821
93
+ attitudes of future elementary teachers, and subsequently has potential implications for
94
+ the opportunities to learn both cognitive and noncognitive skills that are offered to future
95
+ generations of elementary science students.
96
+ LITERATURE REVIEW
97
+ Framework: Considering Attitudes Across Multiple Dimensions
98
+ When exploring attitudes toward science, it is critical to recognize multiple relevant
99
+ dimensions. Based on a comprehensive review of prior research on teacher attitudes, and
100
+ motivated by the lack of substantive clarity and empirical transparency of most prior
101
+ research, van Aalderen-Smeets et al. (2012) recently advanced a new theoretical framework
102
+ to provide a cohesive model that captures primary teachers’ attitudes toward science.
103
+ Specifically, they developed a tripartite model of primary teachers’ attitudes toward science
104
+ that distinguishes between three overarching dimensions, each of which is composed of
105
+ different elements: (1) perceived control (which includes elements such as self-efficacy), (2)
106
+ affective states (which includes enjoyment and anxiety), and (3) cognitive beliefs (such as
107
+ perceived relevance). This framework is informed by earlier theoretical models of attitudes
108
+ (Eagly & Chaiken, 1993), but departs from prior models by considering perceived control
109
+ (e.g., self-efficacy) as a core dimension, and furthermore defining behavioral intentions
110
+ as a consequence rather than a component of science attitudes. Their model also calls for
111
+ researchers to make a clear distinction regarding whether the focus is on teachers’ personal
112
+ attitudes toward science or their professional attitudes toward teaching science, as studies
113
+ that combine teachers’ views of science as a domain with their views on science instruction
114
+ in their own classroom into one empirical scale blur the object of teachers’ attitudes, making
115
+ substantive interpretation difficult.
116
+ The three dimensions of attitudes (whether personal or professional) advanced by van
117
+ Aalderen-Smeets et al. (2012) are logically related to one another. For example, Bursal and
118
+ Paznokas(2006) found that teachers with higher levels of self-efficacy had lower anxiety,
119
+ a finding supported by several other studies (Bleicher, 2007; Palmer, 2002). Yet while
120
+ related, they nevertheless capture somewhat distinct thoughts and beliefs. For instance, an
121
+ individual might expect to master an activity or believe that it is useful, but nevertheless
122
+ find it is unappealing (e.g., flossing their teeth) or even anxietyproducing (e.g., running 10
123
+ miles). Therefore, considering elements of all three dimensions is critical to developing a
124
+ comprehensive picture of teachers’ attitudes toward science.
125
+ Yet most of the literature about the attitudes of elementary science teachers (either
126
+ preservice or in-service) focuses on their perceived control in the form of self-efficacy,
127
+ as there is relatively scant research on either the cognitive beliefs or affective attitudes
128
+ of teachers (van Aalderen-Smeets et al., 2012). Thus, a key contribution of our study is
129
+ our consideration of elements of all three dimensions of attitude to more fully capture the
130
+ complexity of preservice teachers’ attitudes toward science.1 Below we discuss the prior
131
+ literature on the science attitudes of preservice elementary teachers in more detail, including
132
+ how such attitudes may influence the outcomes of future students. Because our research
133
+ questions and subsequent empirical analyses focus on preservice teachers well before they
134
+ 1In this paper, we address all three dimensions of van Aalderen-Smeets et al.’s (2012) theoretical model,
135
+ but do not discuss (or model) every element within each dimension. For example, while the authors include
136
+ context dependency as an element that falls under the dimension of perceived control, we do not address this
137
+ here as it refers to the support that practicing teachers receive from their administrators and therefore is not
138
+ particularly relevant for a study concerning the personal (rather than professional) attitudes of preservice
139
+ teachers.
140
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
141
+
142
+ 822
143
+ RIEGLE-CRUMB ET AL.
144
+ actually enter the elementary classroom, we concentrate on literature on personal attitudes
145
+ toward science. We then turn to a discussion of why inquiry-based science content classes
146
+ for preservice teachers have the potential to increase individuals’ attitudes across all three
147
+ dimensions.
148
+ Perceived Control: Considering Self-Efficacy.
149
+ A key element of the attitudinal dimen-
150
+ sion of perceived control is self-efficacy, which according to Bandura’s (1977, 1982)
151
+ foundational work is defined as an individual’s belief that she can successfully master a
152
+ situation or deal with an obstacle that arises. An individual’s self-efficacy has logical im-
153
+ plications for her subsequent behaviors and choices, as she is likely to attempt to avoid
154
+ those situations or activities where she does not feel she can be efficacious, and persist
155
+ where she feels confident that she can be successful. While research has demonstrated
156
+ that in-service elementary teachers exhibit low levels of efficacy in their science teaching
157
+ (see, for example,Atwater, Gardner, & Kight, 1991; Harlen, 1997; Ramey-Gassert et al.,
158
+ 1996), not surprisingly this pattern is also evident among preservice teachers, who feel less
159
+ efficacious about their own ability to learn science. For example, Skamp (1991) determined
160
+ that less than half of the preservice elementary teachers in his study reported having even
161
+ a fair amount of confidence in their science ability. Similarly, Bleicher’s (2007) study of
162
+ preservice elementary teachers found that participants in a science methods class exhibited
163
+ low scores on science self-efficacy scales. Low efficacy is often attributed to prior negative
164
+ educational experiences in science. For example, in a study of five preservice teachers,
165
+ Mulholland and Wallace (1996) found that their respondents reported very little confidence
166
+ in their own science abilities and attributed this to negative experiences in their own science
167
+ schooling as children.
168
+ Affective States: Considering Enjoyment and Anxiety.
169
+ Individuals’ affect toward a
170
+ domain represents another attitudinal dimension. As articulated by van Aalderen-Smeets
171
+ et al. (2012), the dimension of affect can be further categorized into the positive element
172
+ of enjoyment and the negative element of anxiety. Beginning with the former, Liang and
173
+ Gabel (2005) found that most preservice elementary teachers in their study reported that
174
+ science had never been enjoyable for them. These teachers also indicated that they took
175
+ science courses only because it was required for their degree program. Smith (2000) and
176
+ Howes (2002) found similar results. Additionally, the preservice participants in all of these
177
+ studies attributed their low levels of enjoyment to negative experiences in either (or both)
178
+ their high school and college science courses, a point to which we will return to later.
179
+ Anxiety captures the negative aspect of the affective dimension. Early research by Mallow
180
+ (1981; also Mallow & Greenburg, 1983) as well as Westerback (1984) define science anxiety
181
+ as the fear, worry, or apprehension that some individuals experience when presented with
182
+ the task of learning science. While research on the math anxiety of preservice teachers is
183
+ extensive (Udo, Ramsey, & Mallow, 2004), and research considering both math anxiety and
184
+ science anxiety find a strong association between the two (Cady & Rearden, 2007), there is
185
+ comparatively little research focusing specifically on science anxiety (Bursal & Paznokas,
186
+ 2006). Yet several studies do provide evidence that preservice elementary teachers report
187
+ relatively high levels of science anxiety about teaching science, as well as more generalized
188
+ anxiety about learning science themselves (Cady & Rearden, 2007; Udo et al., 2004;
189
+ Westerback & Long, 1990).
190
+ Cognitive Beliefs: Considering the Relevance of Science.
191
+ Finally, we discuss research
192
+ on preservice elementary teachers’ beliefs in the relevance of science, a critical element
193
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
194
+
195
+ DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
196
+ 823
197
+ of the attitudinal dimension of cognitive beliefs. The limited extant research on this topic
198
+ focuses on perceptions of science as useful or relevant for society and for them personally,
199
+ and finds that preservice elementary teachers report generally favorable views. Specifically,
200
+ in a study of 200 preservice teachers, Coulson (1992) used a survey instrument that in-
201
+ cluded a personal usefulness science scale and found that on average, respondents indicated
202
+ moderate levels of agreement. Cobern and Loving’s (2002) study at a large Midwestern
203
+ university also found that on Likert scales measuring the perceived importance of science
204
+ to all citizens, preservice elementary teachers on average agreed with this sentiment. These
205
+ findings echo the sentiments of the general population, which generally regard science and
206
+ technology as useful for making their lives better (Evans & Durant, 1995; Kohut, Keeter,
207
+ Doherty, & Dimock, 2009). Therefore among the three attitudinal dimensions discussed,
208
+ promoting preservice teachers’ views of the relevance of science is perhaps somewhat less
209
+ of a pressing problem than promoting both their perceived control in the form of science
210
+ efficacy and their affective attitudes of enjoyment and anxiety.
211
+ Examining the Impact of Teacher Attitudes
212
+ There is a logical connection between teachers’ attitudes toward a subject and student
213
+ outcomes, both in terms of impacting students’ opportunities to learn science and their own
214
+ developing attitudes. First, research indicates that the negative attitudes toward science held
215
+ by many elementary teachers are likely to result in less coverage of science content and
216
+ less engaging and effective instruction. Teachers who are not confident in their own science
217
+ knowledge are likely to worry that they cannot effectively answer students’ questions nor
218
+ keep them engaged with interesting activities (Jarrett, 1999). Consequently, elementary
219
+ teachers who feel less efficacious and more anxious are likely to try to avoid teaching
220
+ science and spend less time teaching when they cannot avoid it altogether (Brownlow,
221
+ Jacobi, & Rogers, 2000; Pine et al., 2006; Ramey-Gassert et al., 1996). Appleton and Kindt
222
+ (1999) also found evidence that avoidance occurred when teachers did not find science to
223
+ be as relevant as other subjects such as English or math. One such teacher reported that “If
224
+ you’re running out of time in the week, you think ‘Oh I just won’t worry about that science
225
+ activity’” (p. 162).
226
+ When teachers do teach science, their negative attitudes can impact their pedagogical
227
+ practices and subsequently their capacity to reach and engage students. Appleton and
228
+ Kindt’s (1999) study of in-service elementary teachers found that those exhibiting low
229
+ confidence were less likely to engage their students in hands-on learning. Ramey-Gassert
230
+ et al. (1996) found that elementary teachers with low science self-efficacy had a minimal
231
+ desire to engage in professional development activities that could improve their teaching of
232
+ science. Lack of belief in the usefulness or relevance of science could also logically result
233
+ in a reduced effort to provide engaging instruction to students.
234
+ Additionally, the negative attitudes toward science held by many elementary teachers can
235
+ result in the socialization of students toward a negative stance toward science. As students
236
+ look to their teachers as role models and authorities, they begin to mimic and potentially
237
+ internalize such attitudes as their own (Jussim & Eccles, 1992; McKown & Weinstein,
238
+ 2002). This can lead to a vicious cycle where negative attitudes such as anxiety and low
239
+ efficacy are passed from teachers to their students, and therefore from one generation
240
+ to the next. For example, Beilock et al. (2010) found that elementary teachers’ math
241
+ anxiety influenced students’ own attitudes toward math, with girls in particular more likely
242
+ to evidence declining math attitudes and increasingly gender-stereotyped views of math
243
+ over the course of the year. This particular study highlights additional concerns regarding
244
+ gender rolemodeling; as most elementary teachers are female, and a substantial number
245
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
246
+
247
+ 824
248
+ RIEGLE-CRUMB ET AL.
249
+ of them exhibit negative attitudes toward science (as well as math), this could be a strong
250
+ conduit through which young girls begin to believe that these subjects are less interesting,
251
+ less important, and overall less-suited for them. Furthermore, as students’ own attitudes
252
+ decline, so does their engagement and motivation to learn, which further impacts their
253
+ achievement (Eccles, 1994).
254
+ In sum, the research literature provides compelling evidence that teachers’ negative
255
+ attitudes can impact students’ learning and attitudinal outcomes, and as such are a critical
256
+ issue that needs to be addressed. To effectively break this cycle, necessitates intervening
257
+ to change teachers’ attitudes before they enter the classroom. In short, the education of
258
+ preservice teachers is an ideal place to focus.
259
+ Educating Preservice Teachers: Inquiry as a Tool for Improving
260
+ Attitudes
261
+ As mentioned earlier, the negative attitudes of preservice elementary teachers can at
262
+ least in part be traced back to their own negative experiences with science classes in high
263
+ school and in college. For example, Liang and Gabel (2005) found that preservice teachers
264
+ attributed their lack of enjoyment of science to their prior experiences in classes dominated
265
+ by lectures that necessitated copious amounts of note-taking and memorization. Similarly,
266
+ Smith (2000) reports that preservice elementary teachers in his study often complained
267
+ about the boredom of their procedure-based high school and college science courses.
268
+ Simply put, many preservice teachers have had little exposure to inquiry-based science
269
+ instruction in their lives as students. We posit that exposure while in college to pedagogy
270
+ that actively involves them in the process of scientific discovery can ultimately help them to
271
+ see that science is meaningful, interesting, and accessible, thereby changing their attitudes
272
+ toward science.
273
+ Several studies support the supposition that inquiry classes can promote such changes,
274
+ in spite of the possibility of some initial student frustration with an approach that deviates
275
+ from teachers’ didactic presentations of the “right” answer (Volkmann, Abell, & Zgagacz,
276
+ 2005). For example, in a qualitative study of preservice teachers at a large university in
277
+ the southwest, Kelly (2000) found that after completing an active, inquiry-based science
278
+ methods course, most participants reported that their interest in science had increased.
279
+ Kelly (2000) attributes this shift to the use of hands-on explorations and discussions where
280
+ students came to embody the process of scientific inquiry by formulating and exploring
281
+ ideas. Similarly, in a study of preservice elementary teachers, Palmer (2002) interviewed
282
+ four participants who reported that their attitudes toward science had changed from negative
283
+ to positive due to the excitement of inquiry-based lessons. A study of five teachers by
284
+ Mulholland and Wallace (1996) reported similar results. Finally, in a quantitative study
285
+ of 112 preservice elementary teachers, Jarrett (1999) found that an inquiry-based science
286
+ methods class increased the participants’ personal interest in science. The author attributed
287
+ this change to preservice teachers becoming active agents in the classroom and learning to
288
+ view science as a process of discovery. Thus, a small body of research finds that inquiry-
289
+ based pedagogy in science educational methods courses can have a positive impact on
290
+ preservice elementary teachers’ attitudes.
291
+ CURRENT STUDY
292
+ Building on the insights of this prior research, we posit that required science content
293
+ courses could also represent a powerful venue for change for college students at the
294
+ beginning stages of preparing for their careers as future teachers. Specifically, the purpose
295
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
296
+
297
+ DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
298
+ 825
299
+ of this study is to examine whether inquiry-based science content courses promote a change
300
+ in attitudes toward science among preservice elementary teachers. The courses are part of
301
+ the HoS undergraduate program, developed at The University of Texas at Austin in the
302
+ College of Natural Sciences, with cooperation from the College of Education. HoS is
303
+ required of all students in the elementary education program and covers four semesters of
304
+ science courses with a curriculum that is composed heavily of the topics that preservice
305
+ teachers will be expected to teach their students once they become teachers (Ludwig et al.,
306
+ 2013). The design of the HoS program is based on the Physics and Everyday Thinking
307
+ (Goldberg, 2008) framework that centers around the development of students’ physical
308
+ science understandings through experimentation and follows the example of work from
309
+ Western Washington University extending this framework to other disciplines (Nelson,
310
+ 2008). The curriculum is based upon big ideas in science, with specific emphasis on the
311
+ themes of Matter and Energy, which are integrated across different science disciplines. The
312
+ course sequence focuses on physics in Semester 1, chemistry and geology in Semester 2,
313
+ biological systems in Semester 3, and astronomy and earth science in Semester 4.
314
+ HoS classes were designed to utilize the essential elements of inquiry-based learning
315
+ as defined by the influential National Research Council report on inquiry (Forbes, 2011;
316
+ National Research Council, 2000); specifically, students engage in scientifically oriented
317
+ questions by collecting, organizing, and analyzing data. From that data they formulate
318
+ explanations, connect them to scientific knowledge, and subsequently evaluate their expla-
319
+ nations in contrast to alternative explanations. Additionally, students share and justify those
320
+ explanations with others.
321
+ The HoS program is best categorized as teacher-directed or guided inquiry (Cuevas, Lee,
322
+ Hart, & Deaktor, 2005; National Research Council, 2000; Volkmann et al., 2005). Initial
323
+ questions are posed by the instructor and all activities are carefully designed to present
324
+ opportunities for students to confront misconceptions, with both topics and skills developed
325
+ in a structured progression. The instructor does not lecture but probes student knowledge and
326
+ offers helpful nudges in the right direction, working with students both in small groups and
327
+ via whole class discussions to construct knowledge and develop explanations (Volkmann
328
+ et al., 2005). Finally, consistent with inquiry approaches to learning, the course emphasizes
329
+ big ideas in science while engaging students in hands-on learning and constant exploration
330
+ and discussion while in groups with their peers (National Research Council, 2000, 2012b).
331
+ An example of a typical 2-hour class session is a lesson on sound that begins with the
332
+ following teacher-generated questions: How does sound travel through a room? How does
333
+ sound travel from your classmate to you? Students then work in groups of three or four to
334
+ answer these questions and discuss their initial ideas or preconceptions; they subsequently
335
+ share their ideas with the entire class, so that there is a collective knowledge of alternative
336
+ ways of thinking about how sound travels. Working in their small groups, students then
337
+ engage in a series of experiments, using an “airzooka” and candles, a string telephone, and
338
+ a loudspeaker, that require that they gather data and then generate models based on these
339
+ data. They are regularly prompted by the instructor to make predictions and connect trends
340
+ to other previously seen concepts. Finally, students reflect and summarize key ideas and
341
+ connect them to other contexts by using evidence-based reasoning from the data collected
342
+ in their experiments. These questions are the basis for whole-class discussions, where
343
+ students present and justify their ideas to their peers. Students typically end lessons by
344
+ writing a scientific narrative summarizing how their thinking was revised from their initial
345
+ ideas, drawing on evidence gained through the experiments and whole class sharing and
346
+ discussion. For example, a student might share how her initial idea that “sound travels as a
347
+ wave” has become more sophisticated, discussing the role of vibrations and the transfer of
348
+ mechanical energy from the source to the receiver.
349
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
350
+
351
+ 826
352
+ RIEGLE-CRUMB ET AL.
353
+ Our examination of whether the inquiry-based science content courses of the HoS pro-
354
+ gram promote a change in attitudes toward science among preservice elementary teachers is
355
+ described in detail below. Here, we briefly note that our study contributes to the literature a
356
+ rigorous quantitative examination of change in attitudes across multiple dimensions among
357
+ preservice elementary teachers, utilizing a comparison group of students in more traditional
358
+ science content courses, as well as accounting for differences among students in academic
359
+ and social background characteristics that may have implications for their attitudes.
360
+ Data and Method
361
+ Analytic Sample.
362
+ Our analytic sample includes 238 preservice elementary teachers who
363
+ enrolled in the HoS program between Fall 2010 and Spring 2012. Students completed
364
+ presurveys prior to the start of the first course and postsurveys at the end of the second
365
+ course in the sequence.2 Surveys were done online, and were administered during class
366
+ by members of the research team. Additionally, our sample includes a comparison group
367
+ composed of 263 nonscience and noneducation majors enrolled in traditional lecture-style
368
+ undergraduate science courses in Spring 2012. While our design falls shorts of a pure
369
+ treatment versus control comparison, we chose courses that represent what our sample of
370
+ preservice elementary teachers would have been required to take in the absence of the
371
+ HoS program. Therefore, our comparison group includes students who were enrolled in
372
+ either an introductory-level chemistry or biology class. These students were surveyed at
373
+ the beginning and end of the semester. As the time period between pre- and postsurveys
374
+ is longer for HoS students than for non-HoS students, we discuss the implications and
375
+ limitations of this comparison later.
376
+ Administrative records were linked to student surveys, allowing us to examine the demo-
377
+ graphic and academic background information of students in our sample and to consider
378
+ how HoS students differed from those in the comparison group. Not surprisingly given the
379
+ gender composition of the elementary teacher population nationwide, HoS students were
380
+ overwhelmingly female (95%), compared to 65% of our comparison sample of nonedu-
381
+ cation and nonscience majors. There were no statistically significant differences between
382
+ the two groups of students by mother’s education; for race/ethnicity, there were signifi-
383
+ cantly fewer students who identified as American Indian among HoS students compared
384
+ to non-HoS students. Regarding academic background prior to college entry, HoS students
385
+ had lower SAT math scores than their fellow students taking typical science classes by
386
+ more than one-third of a standard deviation (see Table 1). To ensure that any differences
387
+ observed between the two groups in their changes in attitudes over time are not confounded
388
+ by differences in their background characteristics, our subsequent multivariate models will
389
+ control for all of these factors.3
390
+ Student Attitude Surveys.
391
+ The pre- and postsurveys administered to both groups con-
392
+ sisted of 21 items geared toward assessing student attitudes toward science. To examine
393
+ multiple dimensions of attitudes, we selected items from preexisting surveys to measure
394
+ 2At the time of this study, students were only required to take the first two semesters of the total four
395
+ semester sequence.
396
+ 3Mother’s education level is an ordinal variable with the following categories: (1) did not attend high
397
+ school, (2) attended high school but did not graduate, (3) high school diploma or GED, (4) some college, (5)
398
+ earned associate’s degree, (6) bachelor’s degree, (7) graduate or professional degree. Math SAT score and
399
+ mother’s education level were imputed for those students who had missing values. We utilized information
400
+ on gender, race, high school rank, family income, and father’s education to conduct single imputation using
401
+ Stata. Analyses using list-wise deletion produced similar results.
402
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
403
+
404
+ DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
405
+ 827
406
+ TABLE 1
407
+ Descriptive Statistics
408
+ Hands-on Science
409
+ (HoS) Students
410
+ Non-HoS Students
411
+ N = 238
412
+ N = 263
413
+ Gender
414
+ Female***
415
+ 94.5%
416
+ 65.4%
417
+ Race/ethnicity
418
+ White (non-Hispanic)
419
+ 63.4%
420
+ 60.1%
421
+ Black
422
+ 2.9%
423
+ 3.4%
424
+ Hispanic
425
+ 21%
426
+ 19%
427
+ Asian
428
+ 11.3%
429
+ 14.4%
430
+ American Indian**
431
+ 0.4%
432
+ 2.7%
433
+ Native Hawaiian/Pacific Islander
434
+ 0.8%
435
+ 0.4%
436
+ Other background characteristics
437
+ Mean
438
+ SD
439
+ Mean
440
+ SD
441
+ SAT math score***
442
+ 574.87
443
+ 75.60
444
+ 607.62
445
+ 73.39
446
+ Mother’s educational level
447
+ 5.10
448
+ 1.60
449
+ 5.07
450
+ 1.69
451
+ ***p < .001, **p < .01, *p < .05, p < .10.
452
+ confidence (an element of perceived control)4, enjoyment and anxiety (positive and neg-
453
+ ative elements of affective states), and relevance (a key element of cognitive beliefs). To
454
+ measure anxiety, we used the Math Anxiety Rating Scale (Hopko, 2003) and substituted
455
+ the word science for all references to math. To measure all other attitudes, we selected
456
+ items developed by the National Center for Education Statistics (www.nces.ed.gov), and
457
+ used in national surveys, including the Educational Longitudinal Study, the High School
458
+ Longitudinal Study, and the U.S. component of the Trends in International Mathematics
459
+ and Science Study. Principal component analyses with promax rotation using the complete
460
+ set of 21 survey items revealed four factors with Eigenvalues greater than one. We sub-
461
+ sequently created separate scales (described below) composed of the individual items that
462
+ loaded onto each of the four factors. The scales clearly corresponded to the elements of
463
+ confidence, enjoyment, anxiety, and relevance; using the full sample, the Cronbach’s alpha
464
+ for each scale was .8 or higher.5
465
+ The confidence scale is composed of four items that gauge students’ level of confidence
466
+ when engaging in scientific activities. The items were as follows: “I have always done well
467
+ in science,” “Science is not one of my strengths” (reverse coded), “I am confident that I can
468
+ understand the most difficult material presented in my science textbooks,” and “Science
469
+ 4Because the questions ask students to reflect more on their assessment of their current success in science,
470
+ we refer to this scale as measuring confidence rather than self-efficacy for future success. However, prior
471
+ research has consistently noted a very strong correspondence between indicators of self-confidence and
472
+ self-efficacy (Wigfield & Eccles, 2000).
473
+ 5To further test the reliability of the four scales, we calculated Cronbach’s alphas separately for (a)
474
+ treatment and reference groups; (b) first year cohort and second year cohorts (for treatment group), and
475
+ (c) survey responses at time 1 and time 2 (for different cohorts and for different treatment groups). In all,
476
+ we calculated alpha reliabilities for each of our four scales for 15 different subsamples with remarkably
477
+ consistent results ranging from a low of .77 to a high of .88. (exploratory factor analyses using each of
478
+ these groups also yielded the same four factor model).
479
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
480
+
481
+ 828
482
+ RIEGLE-CRUMB ET AL.
483
+ has always been one of my best subjects.” The five items in the enjoyment scale capture
484
+ students’ level of positive affect for science and included “I enjoy learning science,” “I look
485
+ forward to going to science courses,” “Science is fun,” “I like science,” and “Science is
486
+ boring” (reversecoded for inclusion in the scale). Categories of response were the same as
487
+ those for the confidence scale.
488
+ For each of the eight items in the anxiety scale, students were asked to indicate how
489
+ much the situation made them feel anxious or worried. Similar to the other measures, the
490
+ responses ranged from (1) not at all anxious to (5) very much anxious or worried. The items
491
+ included “Looking through the pages in a science text,” “Thinking about an upcoming
492
+ science test one day before the test,” “Reading and interpreting a scientific graph, chart, or
493
+ illustration,” “Taking an exam in a science course,” “Watching and listening to a teacher
494
+ explaining a scientific concept or phenomena,” “Waiting to get a science test returned in
495
+ which you expected to do well,” “Walking on campus and thinking about a science course,”
496
+ and “Being given a ‘pop’ quiz in science class.”
497
+ Finally, the four items making up the relevance scale include questions that focused
498
+ on students’ perception of the meaning or usefulness of science in their daily lives. The
499
+ items are as follows: “The subject of science is not very relevant to most people,” “It is not
500
+ important for most people to understand science,” “I think learning science will help me in
501
+ my daily life,” and “Science is important to me personally.” Students indicated the extent to
502
+ which they agreed or disagreed with the statements with possible responses ranging from
503
+ strongly agree (1) to strongly disagree (5).
504
+ ANALYSES AND RESULTS
505
+ To examine whether inquiry-based science content courses promote a positive change
506
+ in attitudes toward science for preservice elementary teachers, we begin by comparing the
507
+ means on the pre- and postmeasures of our four attitudinal scales for HoS students. Results
508
+ of paired t-tests indicate a statistically significant improvement over time for each scale.
509
+ Specifically, for confidence, the mean increased from 2.61 to 2.98 (p < .001), reflecting
510
+ a 0.37 point increase or almost half of a standard deviation change from pre to post. HoS
511
+ students’ science enjoyment increased by about a fourth of point (and about a third of a
512
+ standard deviation), from the presurvey mean of 3.24 to a postsurvey mean of 3.51 (p <
513
+ .001). The largest change was observed for the anxiety scale, where the average decreased
514
+ (meaning that students became less anxious over time) from a presurvey mean of 3.11 to a
515
+ postsurvey mean of 2.63 (p < .001), a difference of almost half of a point and approximately
516
+ two-thirds of a standard deviation. Finally, as discussed earlier, students view science as a
517
+ relevant domain, as evidenced by a relatively high presurvey mean of 3.66 on the utility
518
+ scale. Nevertheless, they slightly increased their views of the relevance of science after
519
+ taking HoS courses (p < .05) to a postsurvey mean of 3.74, a change of about a tenth of a
520
+ standard deviation.
521
+ Subsequently, we turn to an examination of how the changes we observe for HoS students
522
+ compare to changes in attitudes toward science among students taking more traditional
523
+ lecture-based science content courses. Here, we utilize multilevel mixed-effects models,
524
+ an extension of regression analysis that is similar to a mixed-design analysis of variance
525
+ and appropriate when data are nested. For this study, repeated measures of attitudes are
526
+ nested within individuals with time treated as a random effect (Rabe-Hesketh & Skrondal,
527
+ 2008).The goal of this analysis was to determine whether the change in different dimensions
528
+ of science attitudes observed for HoS students was similar or different than that observed
529
+ for non-HoS students while controlling for students’ background characteristics (which
530
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
531
+
532
+ DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
533
+ 829
534
+ TABLE 2
535
+ Regression Analyses Predicting Attitudes to Sciencea
536
+ Model 1
537
+ Model 2
538
+ Model 3
539
+ Model 4
540
+ Confidence
541
+ Enjoyment
542
+ Anxiety
543
+ Relevance
544
+ Hands-on science (HoS) students
545
+ (ref = non-HoS students)
546
+ –0.391***
547
+ –0.163*
548
+ 0.106
549
+ –0.051
550
+ (0.071)
551
+ (0.072)
552
+ (0.066)
553
+ (0.059)
554
+ Time (change from pre- to postsurvey)
555
+ –0.127**
556
+ –0.131***
557
+ 0.074�
558
+ –0.116**
559
+ (0.039)
560
+ (0.039)
561
+ (0.041)
562
+ (0.036)
563
+ Time ×HoS
564
+ 0.500***
565
+ 0.391***
566
+ –0.553***
567
+ 0.200***
568
+ (0.056)
569
+ (0.056)
570
+ (0.060)
571
+ (0.052)
572
+ Female
573
+ –0.402***
574
+ –0.395***
575
+ 0.311***
576
+ 0.046
577
+ (0.085)
578
+ (0.084)
579
+ (0.076)
580
+ (0.069)
581
+ Race/ethnicity (ref = white)
582
+ Black
583
+ 0.078
584
+ –0.069
585
+ 0.018
586
+ –0.159
587
+ (0.188)
588
+ (0.185)
589
+ (0.168)
590
+ (0.149)
591
+ Hispanic
592
+ –0.136
593
+ 0.054
594
+ 0.055
595
+ –0.023
596
+ (0.093)
597
+ (0.091)
598
+ (0.083)
599
+ (0.073)
600
+ Asian
601
+ –0.314**
602
+ –0.110
603
+ 0.232**
604
+ –0.002
605
+ (0.098)
606
+ (0.097)
607
+ (0.088)
608
+ (0.078)
609
+ American Indian/Alaska native
610
+ –0.591*
611
+ –0.181
612
+ 0.287
613
+ 0.112
614
+ (0.251)
615
+ (0.249)
616
+ (0.224)
617
+ (0.204)
618
+ Native Hawaiian/other Pacific
619
+ Islander
620
+ 0.635
621
+ 0.380
622
+ –0.524
623
+ 0.537�
624
+ (0.418)
625
+ (0.407)
626
+ (0.374)
627
+ (0.322)
628
+ SAT math score
629
+ 0.002***
630
+ –0.000
631
+ –0.002***
632
+ 0.000
633
+ (0.000)
634
+ (0.000)
635
+ (0.000)
636
+ (0.000)
637
+ Mother’s education level
638
+ –0.038�
639
+ –0.013
640
+ 0.029
641
+ –0.003
642
+ (0.022)
643
+ (0.022)
644
+ (0.020)
645
+ (0.017)
646
+ Constant
647
+ 2.680***
648
+ 4.179***
649
+ 3.748***
650
+ 3.762***
651
+ (0.320)
652
+ (0.315)
653
+ (0.288)
654
+ (0.255)
655
+ aCoefficients calculated from a multilevel regression model in Stata where observations of
656
+ attitudes are nested within individuals.
657
+ ***p < .001, **p < .01, *p < .05, �p < .1; standard errors in parentheses; n = 501.
658
+ is particularly important as our two groups of students differed by gender and math SAT
659
+ scores, both factors which likely predict attitudes).
660
+ Table 2 displays the results of separate analyses for each dependent variable. The first
661
+ row displays the coefficient comparing HoS and non-HoS students on the presurvey (or
662
+ time 1) for each attitudinal dimension. The second row displays the average change over
663
+ time between the pre- and postsurvey, while the third row displays the interaction between
664
+ student group (HoS or non-HoS) and time. The change in attitudes from pre- to postsurvey
665
+ for HoS students is calculated as the sum of the main effect of time and the interaction term,
666
+ while change for non-HoS students is captured by the main effect of time only. To simplify
667
+ the presentation of results, we include figures for each attitudinal outcome (Figures 1–4)
668
+ that display the changes over time for each group, adjusted for the social and academic
669
+ characteristics discussed above.6
670
+ 6Figures 1–4 display the adjusted pre and post means for each group. These are calculated using a
671
+ postestimation command in Stata where all other variables in the model(other than student group, time, and
672
+ the interaction) are set to the mean (or alternatively to the mode for categorical variables).
673
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
674
+
675
+ 830
676
+ RIEGLE-CRUMB ET AL.
677
+ Figure 1. Confidence.
678
+ Figure 2. Enjoyment.
679
+ Figure 3. Anxiety.
680
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
681
+
682
+ 3.8
683
+ 3.6
684
+ 3.4
685
+ score
686
+ 3.2
687
+ Adjusted
688
+ HoSstudents
689
+ 3
690
+ ...Non-Hosstudents
691
+ 2.8
692
+ 2.6
693
+ 2.4
694
+ Pre
695
+ Post3.8
696
+ 3.6
697
+ 3.4
698
+ score
699
+ 3.2
700
+ Adjusted :
701
+ HoSstudents
702
+ 3
703
+ ...Non-Hos students
704
+ 2.8
705
+ 2.6
706
+ 2.4
707
+ Pre
708
+ Post3.8
709
+ 3.6
710
+ 3.4
711
+ Adjusted score
712
+ 3.2
713
+ HoSstudents
714
+ 3
715
+ .Non-HoSstudents
716
+ 2.8
717
+ 2.6
718
+ 2.4
719
+ Pre
720
+ PostDO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
721
+ 831
722
+ Figure 4. Relevance.
723
+ Beginning with the first column predicting confidence, the results reveal that compared to
724
+ their peers in traditional science classes, HoS students reported significantly lower science
725
+ confidence on the presurvey (–.391***). The coefficient for time is negative and significant,
726
+ yet the interaction between time and student group is positive and significant, indicating
727
+ that HoS students increased their confidence over time relative to non-HoS students. To help
728
+ clarify the patterns for the two groups, Figure 1 displays the trends for each group. Here, we
729
+ see clearly that changes in attitudes occurred for both groups in opposite directions. While
730
+ HoS students initially had lower confidence than their non-HoS peers, they significantly
731
+ increased their confidence over time. In contrast, non-HoS students significantly decreased
732
+ their science confidence (–.127***), such that their confidence was slightly lower than
733
+ non-HoS students on the postsurvey.
734
+ Returning to Table 2, we see a similar pattern when predicting change in science en-
735
+ joyment. HoS students initially reported significantly lower levels of enjoyment than their
736
+ peers in more traditional classes (–.163**). However, once again we see a negative main
737
+ effect of time but a positive and significant interaction between student group and time, in-
738
+ dicating opposite directions of change for each group. As displayed graphically in Figure 2,
739
+ HoS students significantly increase their enjoyment over time, while on average non-HoS
740
+ students report a decrease in their affect toward science (–.131***), and end their course
741
+ reporting lower enjoyment than HoS students.
742
+ Regarding changes in anxiety, we note that HoS and non-HoS students do not differ
743
+ significantly on the presurvey. The main effect of time is positive and borderline significant,
744
+ yet the interaction term reveals a statistically significant difference between the two groups’
745
+ average change in anxiety. Figure 3 clearly shows the marked decrease in anxiety from the
746
+ pre- to the postsurvey for HoS students. For their non-HoS peers, however, the figure shows
747
+ a slight increase in anxiety (�.074).
748
+ Finally, Table 2 displays the results for models predicting changes in attitudes toward
749
+ the relevance of science. HoS and non-HoS students do not differ significantly on the
750
+ presurvey. But once again the interaction term reveals a statistically significant difference
751
+ between groups in change over time, and the sign of the coefficient is positive in contrast
752
+ to negative main effect of time. Figure 4 displays the disordinal patterns for the groups.
753
+ HoS students’ views of relevance increase a small amount from the pre- to the postsurvey,
754
+ whereas their peers’ perceptions of the relevance of science decreases (–.116**).
755
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
756
+
757
+ 3.8
758
+ 3.6
759
+ 3.4
760
+ score
761
+ 3.2
762
+ Adjusted
763
+ HoSstudents
764
+ 3
765
+ ... Non-HoS students
766
+ 2.8
767
+ 2.6
768
+ 2.4
769
+ Pre
770
+ Post832
771
+ RIEGLE-CRUMB ET AL.
772
+ Finally, while the main focus of our analyses was to assess differences between HoS and
773
+ non-HoS students regarding changes in their science attitudes, our multivariate analyses
774
+ revealed patterns consistent with prior research, namely that females are significantly less
775
+ confident in their science ability and report significantly less enjoyment and more science
776
+ anxiety than their male peers (Correll, 2001; Eccles, 1994). Our models also indicate some
777
+ evidence of racial/ethnic differences in attitudes (see the models predicting confidence and
778
+ anxiety), as well as differences by prior math achievement, as those with higher scores on
779
+ the math portion of the SAT report significantly higher levels of confidence in their science
780
+ ability and less anxiety. Given the differential distribution of HoS and non-HoS students on
781
+ several of these covariates (see Table 1), including them in our models generally decreased
782
+ the size of the difference between groups on the presurvey (e.g., the more male composition
783
+ of the non-HoS group helped to account for their initially stronger math confidence), and
784
+ also revealed larger differences between the groups on the postsurvey than could be detected
785
+ in simpler models that did not account for these factors.
786
+ DISCUSSION AND CONCLUSION
787
+ The goal of this study was to focus on future elementary teachers’ views toward science
788
+ at a point when they are still explicitly occupying the role of a learner, before they are tasked
789
+ with assuming the role of a science teacher. Specifically, we investigated whether enrollment
790
+ in HoS, a program of inquiry-based science content courses, promoted a favorable change
791
+ in the science attitudes of a sample of over 200 preservice elementary teachers. Building
792
+ on the theoretical framework advanced by van Aalderen-Smeets and colleagues (2012), our
793
+ study examined changes in attitudes on multiple dimensions, and also utilized a comparison
794
+ group of noneducation/nonscience majors to help contextualize the changes observed for
795
+ our focal sample of elementary preservice teachers.
796
+ Data analyses reveal a remarkably consistent and positive story for HoS students; students
797
+ significantly changed their views toward science from the pre- to the postsurvey, such that
798
+ after participating in inquiry-based content courses they reported more confidence in their
799
+ skills as science learners, more enjoyment and less anxiety toward science, and perceived it
800
+ as more relevant. Conversely, patterns for those in the comparison group revealed a decline
801
+ in favorable attitudes toward science after enrolling in a traditional, lecture-based content
802
+ course. Importantly, these results are independent of differences between HoS and non-HoS
803
+ students (e.g., gender and SAT math score) that are associated with attitudes; therefore,
804
+ our analyses indicates that it was differences in the courses that the two groups of students
805
+ enrolled in, rather than characteristics of the individual students themselves, that led to
806
+ changes in attitudes.
807
+ Our study has several likely implications for the future classrooms of preservice teach-
808
+ ers, as prior research suggests that teachers with negative views toward science may both
809
+ socialize their young students to develop similar views, as well as offer less science instruc-
810
+ tion in class due to a desire to avoid the subject (Bursal & Paznokas, 2006; Jarrett, 1999).
811
+ Thus, to the extent that HoS students have more positive attitudes toward science as a result
812
+ of inquiry-based instruction, we have positively intervened to disrupt the vicious cycle of
813
+ elementary school teachers passing their negative views of science onto the next generation.
814
+ Instead, future elementary students could ultimately be the beneficiaries, having teachers
815
+ who are favorably inclined and excited about teaching science and therefore spend more
816
+ time and focus on it.
817
+ Additionally, we suggest that our results have potential implications for gender equity in
818
+ the classroom, particularly because, while all observed changes for HoS students were in
819
+ a favorable direction, the largest changes were for decreasing anxiety. Recent research by
820
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
821
+
822
+ DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
823
+ 833
824
+ Beilock et al. (2010) offered evidence that the math anxiety of female elementary teachers
825
+ had a negative impact on their female students in particular. The authors argue that due
826
+ to the inclination for children to more strongly connect to adults of the same gender as
827
+ role models, young girls in the classroom were more susceptible to teachers’ math anxiety,
828
+ and consequently exhibited more negative attitudes of their own as well as lower math
829
+ achievement. Their study provides powerful evidence that teacher role-modeling can be a
830
+ key factor that leads to the development of the gender gap in math as early as elementary
831
+ school (Beilock et al., 2010). Such a pattern can be logically extended to science anxiety;
832
+ thus by intervening to decrease the anxiety of (predominantly female) preservice elementary
833
+ teachers, more young girls could have the opportunity to interact with a positive female role
834
+ model, thereby thwarting emerging gender disparities in children’s views and performance
835
+ (Eccles, 1994).
836
+ Our study also has potential ramifications for the type of instruction and classrooms
837
+ experienced by future elementary students. As research suggests that preservice teachers
838
+ tend to teach their students in ways similar to how they were taught (Gess-Newsome &
839
+ Lederman, 1999), programs such as HoS can serve as a powerful model for implement-
840
+ ing inquiry in their own classrooms, and thus ultimately contribute to greater uptake of
841
+ recommended science reform. The Next Generation Science Standards call for elementary
842
+ teachers to engage their students in inquiry-based practices, as well as emphasize disci-
843
+ plinary core ideas in the classroom (National Research Council, 2012b). The HoS classes
844
+ offer preservice teachers the critical opportunity to develop an understanding of and real
845
+ experience with inquiry-based teaching and learning that is consistent with these standards.
846
+ We concur with Volkmann et al. (2005), who argue that “if learning through inquiry is to
847
+ become a reality in today’s schools, then university science courses must model inquiry so
848
+ that pre-service teachers may experience it” (p. 867). Programs such as HoS have the power
849
+ to do exactly this, and thereby help break the cycle of teacher-centered didactic instruction.
850
+ While the primary focus of this study is the educational experiences of preservice teachers
851
+ during college and the subsequent implications for future elementary classrooms, our study
852
+ also speaks to the need to improve undergraduate science education more broadly. A recent
853
+ meta-analysis of student academic performance in STEM undergraduate courses provides
854
+ evidence that traditional lecture formats lead to higher failure rates and lower achievement
855
+ when compared to classes that are more constructivist based (Freeman et al., 2014 ). Our
856
+ study focuses on attitudinal rather than performance outcomes, and in doing so heeds recent
857
+ calls by the National Research Council to examine a more comprehensive range of student
858
+ outcomes at the postsecondary level (National Research Council, 2012). Specifically, we
859
+ find that, even after adjusting for differences in social and academic background between
860
+ our two groups (preservice education students and noneducation/nonscience students),
861
+ enrollment in traditional lecture classes has the opposite effect of enrolling in inquiry-
862
+ based content classes. We suggest that the decline in confidence, affect, and utility, as well
863
+ as a slight increase in anxiety that we observed for students in traditional lecture-based
864
+ science content classes, are important consequences of their relatively low engagement in
865
+ the classroom, and perhaps linked to patterns of lower performance documented elsewhere
866
+ (Freeman et al., 2014; Seymour & Hewitt, 1997).
867
+ As with any study, ours has limitations. First, we note a lack of parallel time frames for
868
+ our focal HoS students (two semesters between pre- and postsurveys) and our comparison
869
+ group (one semester between pre- and postsurveys). Therefore, it is possible that part of the
870
+ positive change in attitudes observed for HoS students is due to the longer exposure period;
871
+ while we cannot dismiss this possibility entirely we are nevertheless skeptical that a shorter
872
+ survey window for HoS students would have substantively changed our findings regarding
873
+ opposite directions of change for the two groups. Indeed, we did collect postsurveys for a
874
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
875
+
876
+ 834
877
+ RIEGLE-CRUMB ET AL.
878
+ small subsample of HoS students at the end of the first semester, and the results, although
879
+ slightly weaker in magnitude, were statistically significant and in the same positive direction
880
+ as the full sample of HoS students included here.
881
+ Additionally, we did not collect data to assess what features of these inquiry-based
882
+ classes students found most favorable; for instance, it could be that the significant amount
883
+ of time spent on group work was a particularly influential factor leading to their change
884
+ in attitudes (Park Rogers & Abell, 2008). We think this is an important area for future
885
+ research to address, to better ascertain which aspects of inquiry-based classrooms are most
886
+ effective at promoting favorable shifts on different dimensions of science attitudes. More
887
+ long-term studies are also needed to assess whether and how the potential implications we
888
+ discuss above come to fruition and make a difference for elementary students in the science
889
+ classroom.
890
+ Finally, it is important to point out that designing and implementing inquiry-based science
891
+ content courses that depart from the typical lecture-based format of most postsecondary
892
+ instruction is certainly not without its challenges and difficulties (Allen & Tanner, 2005;
893
+ Armbruster, Johnson, & Weiss, 2009). One such obstacle is convincing science instructors
894
+ and university administrators of the benefits of inquiry-based instruction for their students.
895
+ Our study contributes to the small number of studies that offer robust empirical evidence
896
+ on this topic (Seymour, 2002), and in doing so offers additional support to the call to
897
+ implement inquiry-based science instruction at all levels and for all students.
898
+ This research was supported by a grant from the National Science Foundation (NSF DUE 0942943,
899
+ PI: Sacha Kopp), and a grant from the Eunice Kennedy Shriver National Institute of Health and Child
900
+ Development (5 R24 HD042849) awarded to the Population Research Center at The University of
901
+ Texas at Austin. Opinions reflect those of the authors and do not necessarily reflect those of the
902
+ granting agencies.
903
+ REFERENCES
904
+ Allen, D., & Tanner, K. (2005). Infusing active learning into the large-enrollment biology class: Seven strategies,
905
+ from the simple to complex. Cell Biology Education, 4(4), 262–268.
906
+ Appleton, K., & Kindt, I. (1999). Why teach primary science? Influences on beginning teachers’ practices.
907
+ International Journal of Science Education, 21(2), 155–168.
908
+ Armbruster, P. P. M., Johnson, E., & Weiss, M. (2009). Active learning and student-centered pedagogy improve
909
+ student attitudes and performance in introductory biology. CBE-Life Sciences Education, 8(3), 203–213.
910
+ Atwater, M. M., Gardner, C., & Kight, C. R. (1991). Beliefs and attitudes of urban primary teaachers toward
911
+ physical science and teaching physical science. Journal of Elementary Science Education, 3(1), 3–12.
912
+ Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2),
913
+ 191–215.
914
+ Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122.
915
+ Beilock, S. L., Gunderson, E. A., Ramirez, G., & Levine, S. C. (2010). Female teachers’ math anxiety affects
916
+ girls’ math achievement. Proceedings of the National Academy of Sciences, 107(5), 1860–1863.
917
+ Bleicher, R. E. (2007). Nurturing confidence in preservice elementary science teachers. Journal of Science Teacher
918
+ Education, 18(6), 841–860.
919
+ Borman, G. D., Gamoran, A., & Bowdon, J. (2008). A randomized trial of teacher development in elementary
920
+ science: First-year achievement effects. Journal of Research on Educational Effectiveness, 1(4), 237–264.
921
+ Brownlow, S., Jacobi, T., & Rogers, M. (2000). Science anxiety as a function of gender and experience. Sex
922
+ Roles, 42(1–2), 119–131.
923
+ Bursal, M., & Paznokas, L. (2006). Mathematics anxiety and preservice elementary teachers’ confidence to teach
924
+ mathematics and science. School Science and Mathematics, 106(4), 173–180.
925
+ Cady, J. A., & Rearden, K. (2007). Pre-service teacher’s beliefs about knowledge, mathematics, and science.
926
+ School Science and Mathematics, 107(6), 237–245.
927
+ Cobern, W. W., & Loving, C. C. (2002). Investigation of preservice elementary teachers’ thinking about science.
928
+ Journal of Research in Science Teaching, 39(10), 1016–1031.
929
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
930
+
931
+ DO INQUIRING MINDS HAVE POSITIVE ATTITUDES?
932
+ 835
933
+ Correll, S. J. (2001). Gender and the career choice process: The role of biased self-assessments. American Journal
934
+ of Sociology 106, 1691–1730.
935
+ Coulson, M. R. (1992). Development of an instrument for measuring attitudes of early childhood educators
936
+ towards science. Research in Science Education, 22(1), 101–105.
937
+ Cuevas, P., Lee, O., Hart, J., & Deaktor, R. (2005). Improving science inquiry with elementary students of diverse
938
+ backgrounds. Journal of Research in Science Teaching, 42(3), 337–357.
939
+ Diamond, B. S., Maerten-Rivera, J., Rohrer, R. E., & Lee, O. (2014). Effectiveness of a curricular and profes-
940
+ sional development intervention at improving elementary teachers’ science content knowledge and student
941
+ achievement outcomes: Year 1 results. Journal of Research in Science Teaching, 51(5), 635–658.
942
+ Eagly, A. H., & Chaiken, S. (1993). The psychology of attitudes. Orlando, Florida: Harcourt Brace Jovanovich
943
+ College.
944
+ Eccles, J. S. (1994). Understanding women’s educational and occupational choices. Psychology of Women
945
+ Quarterly, 18, 585–609.
946
+ Evans, G., & Durant, J. (1995). The relationship between knowledge and attitudes in the public understanding of
947
+ science in Britain. Public Understanding of Science, 4(1), 57–74.
948
+ Forbes, C. T. (2011). Preservice elementary teachers’ adaptation of science curriculum materials for inquiry-based
949
+ elementary science. Science Education, 95(5), 927–955.
950
+ Freeman, S., Eddy, S. L., McDonough, M., Smith, M. K., Okoroafor, N., Jordt, H. et al. (2014). Active learning
951
+ increases student performance in science, engineering, and mathematics. Paper presented at the Proceedings
952
+ of the National Academy of Sciences, 2013, 19030.
953
+ Gess-Newsome, J., & Lederman, N. G. (1999). Examining pedagogical content knowledge. Dordrect, The Nether-
954
+ lands: Kluwer.
955
+ Goldberg, F., Robinson, S., Otero, V., Kruse, R., & Thompson, N. (2008). Physical Science and Everyday Thinking,
956
+ 2nd edition. Armonk, New York: It’s About Time, Herff Jones Educational Division.
957
+ Haefner, L. A., & Zembal-Saul, C. (2004). Learning by doing? Prospective elementary teachers’ developing un-
958
+ derstandings of scientific inquiry and science teaching and learning. International Journal of Science Education,
959
+ 26(13), 1653–1674.
960
+ Harlen, W. (1997). Primary teachers’ understanding in science and its impact in the classroom. Research in
961
+ Science Education, 27(3), 323–337.
962
+ Heller, J. I., Daehler, K. R., Wong, N., Shinohara, M., & Miratrix, L. W. (2012). Differential effects of three
963
+ professional development models on teacher knowledge and student achievement in elementary science. Journal
964
+ of Research in Science Teaching, 49(3), 333–362.
965
+ Hopko, D. (2003). Confirmatory factor analysis of the math anxiety rating scale-revised. Educational and Psy-
966
+ chological Measurement, 63, 336.
967
+ Howes, E. (2002). Learning to teach science for all in the elementary grades: What do preservice teachers bring?
968
+ Journal of Research in Science Teaching, 39(9), 845–869.
969
+ Jarrett, O. S. (1999). Science interest and confidence among preservice elementary teachers. Journal of Elementary
970
+ Science Education, 11(1), 49–59.
971
+ Jussim, L., & Eccles, J. S. (1992). Teacher expectations II: Construction and reflection of student achievement.
972
+ Journal of Personality and Social Psychology, 63, 947.
973
+ Kanter, D. E., & Konstantopoulus, S. (2010). The impact of a project based science curriculum on minority
974
+ student achievement, attitudes, and careers: The effects of teacher content and pedagogical content knowledge
975
+ and inquiry based practices. Science Education, 94(5), 855–887.
976
+ Kelly, J. (2000). Rethinking the elementary science methods course: A case for content, pedagogy, and informal
977
+ science education. International Journal of Science Education, 22(7), 755–777.
978
+ Kohut, A., Keeter, S., Doherty, C., & Dimock, M. (2009). Scientific achievements less prominent than a decade
979
+ ago: Public praises science; scientists fault public, media. Washington, DC: The Pew Research Center for the
980
+ People and the Press.
981
+ Liang, L. L., & Gabel, D. L. (2005). Effectiveness of a constructivist approach to science instruction for prospective
982
+ elementary teachers. International Journal of Science Education, 27(10), 1143–1162.
983
+ Ludwig, R., Chimonidou, A., Barr, A., Baumann, M., Dunn, D., English, P., et al. (2013). Hands-on-science:
984
+ Hands-on, integrated natural sciences for pre-service elementary teachers. Paper presented at the National
985
+ Association for Research in Science Teaching, Rio Grande, PR.
986
+ Mallow, J. V. (1981). Science anxiety: Fear of science and how to overcome it. New York: Van Nostrand Reinhold.
987
+ Mallow, J. V., & Greenburg, S. L. (1983). Science anxiety and science learning. Physics Teacher, 21(2),
988
+ 95–99.
989
+ McKown, C., & Weinstein, R. S. (2002). Modeling the role of child ethnicity and gender in. children’s differential
990
+ response to teacher expectations. Journal of Applied Social Psychology, 32, 159–184.
991
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
992
+
993
+ 836
994
+ RIEGLE-CRUMB ET AL.
995
+ Mulholland, J., & Wallace, J. (1996). Breaking the cycle: Preparing elementary teachers to teach science. Journal
996
+ of Elementary Science Education, 8(1), 17–38.
997
+ National Research Council. (2000). Inquiry and the national science education standards: A guide for teaching
998
+ and learning. Washington, DC: National Academies Press.
999
+ National Research Council. (2012). Discipline-Based Education Research: Understanding and Improving Learning
1000
+ in Undergraduate Science and Engineering. In S. R. Singer, N. R. Nielsen, & H. A. Schweingruber (Eds.),
1001
+ Committee on the Status, Contributions, and Future Directions of Discipline-Based Education Research. Board
1002
+ on Science Education, Division of Behavioral and Social Sciences and Education. Washington, DC: The
1003
+ National Academies Press.
1004
+ National Research Council. (2012b). A framework for K–12 science education: Practices, crosscutting concepts,
1005
+ and core ideas. Washi ngton, DC: National Academies Press.
1006
+ Nelson, G. (2008). Physics and everyday thinking as a model for introductory biology and geology courses. Paper
1007
+ presented at the PTEC-Northwest Regional Conference, Seattle, WA.
1008
+ Palmer, D. (2002). Factors contributing to attitude exchange amongst preservice elementary teachers. Science
1009
+ Education, 86(1), 122–138.
1010
+ Park Rogers, M. A., & Abell, S. K. (2008). The design, enactment, and experience of inquiry-based instructon in
1011
+ undergraduate science education: A case study. Science Education, 92(4), 591–607.
1012
+ Pine, J., Aschbacher, P., Roth, E., Jones, M., McPhee, C., Martin, C. et al. (2006). Fifth graders’ science inquiry
1013
+ abilities: A comparative study of students in hands-on and textbook curricula. Journal of Research in Science
1014
+ Teaching, 43(5), 467–484.
1015
+ Rabe-Hesketh, S., & Skrondal, A. (2008). Multilevel and longitudinal modeling using Stata. College Station,
1016
+ Texas: STATA Press.
1017
+ Ramey-Gassert, L., Shroyer, M. G., & Staver, J. R. (1996). A qualitative study of factors influencing science
1018
+ teaching self-efficacy of elementary level teachers. Science Teacher Education, 80(3), 283–315.
1019
+ Sadler, P. M., Sonnert, G., Coyle, H. P., Cook-Smith, N., & Miller, J. L. (2013). The influence of teachers’
1020
+ knowledge on student learning in middle school physical science classrooms. American Educational Research
1021
+ Journal, 50(5), 1020–1049.
1022
+ Seymour, E. (2002). Tracking the processes of change in US undergraduate education in science, mathematics,
1023
+ engineering, and technology. Science Education, 86(1), 79–105.
1024
+ Seymour, E., & Hewitt, N. M. (1997). Talking about leaving: Why undergraduates leave the sciences (Vol. 12).
1025
+ Bo ulder, CO: Westview Press.
1026
+ Skamp, K. (1991). Primary science and technology: How confident are teachers? Research in Science Education,
1027
+ 21(1), 290–299.
1028
+ Smith, D. (2000). Content and pedagogical content knowledge for elementary science teacher educators: Knowing
1029
+ our students. Journal of Science Teacher Education, 11(1), 27–46.
1030
+ Tosun, T. (2000). The beliefs of preservice elementary teachers toward science and science teaching. School
1031
+ Science and Mathematics, 100(7), 374–379.
1032
+ Udo, M. K., Ramsey, G. P., & Mallow, J. V. (2004). Science anxiety and gender in students taking general
1033
+ education science courses. Journal of Science Education and Technology, 13(4), 435–446.
1034
+ vanAalderen-Smeets, S. I., Walma van der Molen, J. H., & Asma, L. J. F. (2012). Primary teachers’ attitudes
1035
+ toward science: A new theoretical framework. Science Education, 96(1), 158–182.
1036
+ Volkmann, M. J., Abell, S. K., & Zgagacz, M. (2005). The challenges of teaching physics to preservice elementary
1037
+ teachers: Orientations of the professor, teaching assistant, and students. Science Education, 89(5), 847–869.
1038
+ Westerback, M. E. (1984). Studies on anxiety about teaching science in preservice elementary teachers. Journal
1039
+ of Research in Science Teaching, 21(9), 937–950.
1040
+ Westerback, M. E., & Long, M. J. (1990). Science knowledge and the reduction of anxiety about teaching Earth
1041
+ science in exemplary teachers as measured by the science teaching state-trait anxiety inventory. School Science
1042
+ and Mathematics, 90(5), 361–374.
1043
+ Wigfield, A., & Eccles, J. S. (2000). Expectancy–Value Theory of Achievement Motivation. Contemporary
1044
+ Educational Psychology, 25(1), 68–81.
1045
+ Xie, Y., & Shauman, K. A. (2003). Women in science: Career processes and outcomes (Vol. 26, No. 73.4).
1046
+ Cambridge, MA: Harvard University Press.
1047
+ Science Education, Vol. 99, No. 5, pp. 819–836 (2015)
1048
+
C9E2T4oBgHgl3EQfoAjs/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CdE0T4oBgHgl3EQfyQI7/content/2301.02656v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d4f10cdec983d7843ab5d72dd082584f6c12cef46f8864b0c0c10c9e1c388705
3
+ size 4023863
CdE0T4oBgHgl3EQfyQI7/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8b8b6842cc9cb3591e7a18a355c361d241fb8b33add32064fe8506876d86013a
3
+ size 307741
CtAzT4oBgHgl3EQfiP1R/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a039110eea74b7c264a86be303f99807b816614ca8bebfb7d1d4ce760c99de75
3
+ size 2687021
EdAzT4oBgHgl3EQfiv0h/content/tmp_files/2301.01503v1.pdf.txt ADDED
@@ -0,0 +1,1378 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Addressing Cosmological Tensions by Non-Local Gravity
2
+ Filippo Bouchè,1, a Salvatore Capozziello,1, 2, 3, b and V. Salzano4, c
3
+ 1Dipartimento di Fisica “E. Pancini”, Università di Napoli “Federico II", Via Cinthia 21, I-80126, Napoli, Italy
4
+ 2DipaScuola Superiore Meridionale, Largo S. Marcellino 10, I-80138, Napoli, Italy
5
+ 3Istituto Nazionale di Fisica Nucleare, Sez. di Napoli, Via Cinthia 21, I-80126, Napoli, Italy
6
+ 4Institute of Physics, University of Szczecin, Wielkopolska 15, 70-451 Szczecin, Poland
7
+ (Dated: January 5, 2023)
8
+ Alternative cosmological models have been under deep scrutiny in recent years, aiming to address
9
+ the main shortcomings of the ΛCDM model. Moreover, as the accuracy of cosmological surveys
10
+ improved, new tensions have risen between the model-dependent analysis of the Cosmic Microwave
11
+ Background and lower redshift probes. Within this framework, we review two quantum-inspired
12
+ non-locally extended theories of gravity, whose main cosmological feature is a geometrically driven
13
+ accelerated expansion. The models are especially investigated in light of the Hubble and growth
14
+ tension, and promising features emerge for the Deser–Woodard one. On the one hand, the cosmolog-
15
+ ical analysis of the phenomenological formulation of the model shows a lowered growth of structures
16
+ but an equivalent background with respect to ΛCDM. On the other hand, the study of the lensing
17
+ features at the galaxy cluster scale of a new formulation of non-local cosmology, based on Noether
18
+ symmetries, makes room for the possibility of alleviating both the H0 and σ8 tension. However, the
19
+ urgent need for a screening mechanism arises for this non-local theory of gravity.
20
+ I.
21
+ INTRODUCTION
22
+ Recent astrophysical and cosmological surveys, both from ground-based and space experiments, have provided
23
+ extremely high-quality data. The observations point towards a Universe in which the cosmological principle holds
24
+ on large scales, namely the Universe appears homogeneous and isotropic if averaged over scales of ∼100 h−1Mpc or
25
+ more [1, 2]. Moreover, the Universe is undergoing an accelerated expansion phase [3, 4], subsequent to a decelerated
26
+ era in which the structure formation occurred. All these features, together with the nuclei abundances produced in
27
+ the Big Bang Nucleosynthesis (BBN), the Baryon Acoustic Oscillations (BAO) and many others, are well predicted
28
+ by the Lambda Cold Dark Matter (ΛCDM) model, which has been adopted as the standard cosmological model
29
+ accordingly. Such a model provides an effective description of the Universe, which relies on the assumption that
30
+ General Relativity (GR) is the final theory of gravitation that governs the cosmic dynamics. As a consequence, two
31
+ more fluids other than baryonic matter and radiation must be inserted in the matter–energy content of the Universe
32
+ in order to adjust GR predictions to data: the Dark Energy (DE), responsible for the late time cosmic acceleration,
33
+ and the Dark Matter (DM), which accounts for the structure formation. Together, they should represent ∼95% of
34
+ the matter–energy budget of the Universe [5–7], thus dominating the cosmic dynamics at all scales.
35
+ Building on its capability to fit the whole cosmological and astrophysical dataset with a relatively small number of
36
+ parameters, the ΛCDM model stands as the pillar of our comprehension of the Universe. However, several shortcomings
37
+ [8] and recently risen tensions [9–11] affect its reliability. On the one hand, we have a huge assortment of candidates
38
+ but no final solution for DM [12, 13] and DE [14–16]. On the other hand, the presence of singularities, as well as the
39
+ inconsistency at quantum level, undermine the credibility of GR as the final theory of gravity. Even more puzzling
40
+ are the cosmological tensions, which have emerged in recent years as the result of the growing availability of a wide
41
+ range of extremely precise data. A multitude of independent observations appears indeed to be in a ≳2σ tension
42
+ with the reference ΛCDM estimates by the Planck collaboration [5]. Even though systematic experimental errors may
43
+ account for part of these tensions, their statistical significance and their persistence after several check analyses have
44
+ thrown up some serious red flags. Since the Planck constraints for the cosmological parameters relies on a strongly
45
+ ΛCDM-model-dependent analysis of the Cosmic Microwave Background (CMB), such tensions may be the signature
46
+ of the brakedown of the concordance model, hence of new physics. In this paper, we pay particular attention to the
47
+ two most well-known tensions: the H0 tension [10], which emerges from the comparison between early-time [5] and
48
+ late-time measurements [17] of the Hubble constant, and the growth tension [11] between the CMB value [5] of the
49
+ aElectronic address: fi[email protected]
50
+ bElectronic address: [email protected]
51
+ cElectronic address: [email protected]
52
+ arXiv:2301.01503v1 [astro-ph.CO] 4 Jan 2023
53
+
54
+ 2
55
+ cosmological parameters ΩM and σ8 and those from lower redshift probes, such as Weak Lensing (WL) [18], Cluster
56
+ Counts (CC) [19] and Redshift Space Distortion (RSD) [20].
57
+ In order to meet the challenges posed by ΛCDM theoretical shortcomings, as well as by its observational tensions, a
58
+ zoo of alternative cosmological models has been formulated in recent years. The common feature of any proposed model
59
+ is the introduction of additional degrees of freedom, whether in the gravitational or the matter–energy Lagrangian.
60
+ Several approaches have been adopted: from the simple generalization of the Hilbert–Einstein action to functions
61
+ of the curvature scalar, namely f(R) theories [21–27], to the addition of further geometric invariants such as the
62
+ torsion scalar T [27–32] or the Gauss–Bonnet scalar G [33–36]. The introduction of scalar/vector fields minimally or
63
+ non-minimally coupled to gravity [37–41], as well as the emergence of non-trivial dynamics in the dark sector [42–46],
64
+ also represent intriguing possibilities in the extremely wide framework of the alternatives to GR/ΛCDM (see [47, 48]
65
+ for the state of the art). In this paper, we want to inquire into a specific class of alternative cosmological models
66
+ ruled by non-local gravitational interactions [49]. Among others, we investigate the cosmological implications of two
67
+ non-locally extended theories of gravity: the Deser–Woodard (DW) model [50] and the Ricci-Transverse (RT) model
68
+ [51]. These theories have drawn increasing attention in recent years due to their capability to account for late-time
69
+ cosmic acceleration, thus avoiding the introduction of any form of unknown dark energy. Moreover, the non-local
70
+ corrections may provide a viable mechanism to alleviate some of the main cosmological tensions.
71
+ The paper is organized as follow: in Section II, we outline the main motives for formulating non-local theories
72
+ of gravity, and we present the two ways in which dynamical non-locality can be implemented. Then, we introduce
73
+ the two chosen models and their theoretical features. In Section III, we investigate the mechanisms through which
74
+ the DW and the RT model account for the accelerated expansion of the Universe. In Section IV, we present the
75
+ non-locally driven evolution of cosmological perturbations for the two models and the resulting impact on the σ8
76
+ tension. Moreover, in Section V, we assess the H0 tension in light of the non-local theories. Finally, in Section VI,
77
+ we present the main astrophysical tests of the non-local gravity models. The conclusions are drawn in Section VII.
78
+ II.
79
+ NON-LOCAL GRAVITY
80
+ Non-locality naturally emerges in Quantum Physics, both as a kinematical and a dynamical feature. On the other
81
+ hand, locality is a key property of classical field theories, and thus represents one of the main obstacles to overcome
82
+ in order to merge gravitational interaction formalism with that of Quantum Field Theory (QFT). As a consequence,
83
+ the introduction of non-locality in our theory of gravitation seems to be an unavoidable step towards the unification
84
+ of the fundamental interactions.
85
+ There exist at least two ways to achieve non-locality: at fundamental level, in
86
+ which kinematical non-locality can be implemented by discretizing spacetime and introducing a minimal length scale
87
+ (usually the Planck length); as an effective approach, in which non-local geometrical operators can be added to the
88
+ gravitational Lagrangian to obtain a non-local dynamics in a continuum background spacetime [52]. Here, we want
89
+ to focus on the latter scenario, which is of great interest for cosmological applications.
90
+ Two main classes of non-locally extended theories of gravity have been developed in recent years [49]: Infinite
91
+ Derivative theories of Gravity (IDGs), involving entire analytic transcendental functions of a differential operator,
92
+ and Integral Kernel theories of Gravity (IKGs) based on integral kernels of differential operators, such as
93
+ □−1R(x) =
94
+
95
+ d4x′G(x, x′)R(x′) ,
96
+ (2.1)
97
+ where G(x′x′) is the Green function associated to the inverse d’Alembertian. IDGs usually address the ultraviolet (UV)
98
+ problems of the ΛCDM model by ensuring classical asymptotic freedom. The gravitational interaction is weakened
99
+ on small scales and the singularities disappear accordingly. Non-singular black holes [53], as well as inflationary [54]
100
+ and bouncing cosmologies [55], are indeed forecast in the IDG framework. On the other hand, IKGs are introduced
101
+ to account for the infrared (IR) shortcomings of the concordance model of cosmology. The phenomenology of both
102
+ dark fluids can be actually reproduced by non-local corrections that switch on at large scales [50, 56, 57].
103
+ In this paper, we focus on two specific curvature-based IKGs [50, 51] and their cosmological features. IKGs indeed
104
+ have special relevance due to the fact that they combine suitable cosmological behavior with well-justified Lagrangians
105
+ at the fundamental level. GR is actually plagued by quantum IR divergences that already appear for pure gravity in
106
+ flat space [58]. This pathological behavior implies that the long-range dynamics of the gravitational interaction may
107
+ be non-trivial, and non-perturbative techniques are thus required. Applying such non-perturbative methods to the
108
+ renormalization of the quantum effective action of the gravity theory, non-local terms emerge both associated [59, 60]
109
+ or not associated [61, 62] to a dynamical mass scale. Analogous results can be recovered through the trace anomaly
110
+ [63].
111
+
112
+ 3
113
+ A.
114
+ The Deser–Woodard Model
115
+ The first model that we want to highlight is an IKG initially proposed in [50]. The non-locally extended gravitational
116
+ action of the Deser–Woodard model reads
117
+ S =
118
+ 1
119
+ 16πG
120
+
121
+ d4x√−g
122
+
123
+ R
124
+
125
+ 1 + f(□−1R)
126
+ ��
127
+ ,
128
+ (2.2)
129
+ where the non-local correction is given by the so-called distortion function, namely a general function of the inverse
130
+ box of the Ricci scalar, as in Equation (2.1).It is worth noticing that the non-local theory reduces to GR as soon as
131
+ f(□−1R) vanishes. The modified field equations descending from Equation (2.2) are
132
+ Gµν + ∆Gµν = κT (m)
133
+ µν
134
+ ,
135
+ (2.3)
136
+ where the non-local correction reads
137
+ ∆Gµν =
138
+
139
+ Gµν + gµν□ − ∇µ∇ν
140
+ ��
141
+ f
142
+
143
+ □−1R
144
+
145
+ + □−1�
146
+ Rf ′�
147
+ □−1R
148
+ ���
149
+ +
150
+
151
+ 1
152
+ 2
153
+
154
+ δα
155
+ µδβ
156
+ ν + δβ
157
+ µδα
158
+ ν
159
+
160
+ − 1
161
+ 2gµνgαβ
162
+
163
+ ∂α
164
+
165
+ □−1R
166
+
167
+ ∂β
168
+
169
+ □−1�
170
+ Rf ′�
171
+ □−1R
172
+ ���
173
+ .
174
+ (2.4)
175
+ Furthermore, the non-local gravitational action in Equation (2.2) can be easily rewritten under the standard of
176
+ local scalar–tensor theories by introducing an auxiliary scalar field
177
+ R(x) = □η(x) ,
178
+ (2.5)
179
+ which does not carry any independent degree of freedom.
180
+ The local canonical form of the scalar–tensor action,
181
+ equivalent to the non-local theory, thus reads [64]
182
+ S = 1
183
+
184
+
185
+ d4x√−g
186
+
187
+ R
188
+
189
+ 1 + f
190
+
191
+ η
192
+ ��
193
+ − ∂µξ∂µη − ξR
194
+
195
+ ,
196
+ (2.6)
197
+ where ξ(x) is a Lagrangian multiplier which has been promoted to a position- and time-dependent scalar field. In this
198
+ formulation, the gravitational field equation is
199
+ Gµν =
200
+ 1
201
+ 1 + f(η) − ξ
202
+
203
+ κT (m)
204
+ µν
205
+ − 1
206
+ 2gµν∂αξ∂αη + 1
207
+ 2
208
+
209
+ ∂µξ∂νη + ∂µη∂νξ
210
+
211
+
212
+
213
+ gµν□ − ∇µ∇ν
214
+ ��
215
+ f(η) − ξ
216
+
217
+
218
+ ,
219
+ (2.7)
220
+ while the Klein–Gordon equations for the two auxiliary scalar fields are
221
+ □η = R ,
222
+ (2.8)
223
+ □ξ = −R∂f(η)
224
+ ∂η
225
+ .
226
+ (2.9)
227
+ B.
228
+ The Ricci-Transverse Model
229
+ The second non-local model that we investigate through this paper is a metric IKG proposed in [51]. This is a
230
+ quantum-inspired model, whose quantum effective action is
231
+ Γ =
232
+ 1
233
+ 64πG
234
+
235
+ d4x
236
+
237
+ hµνEµν,αβhαβ − 2
238
+ 3m2�
239
+ P µνhµν
240
+ �2
241
+
242
+ ,
243
+ (2.10)
244
+
245
+ 4
246
+ where gµν = ηµν+κhµν is the linearized metric tensor, Eµν,αβ is the Lichnerowicz operator1, P µν = ηµν−(∂µ∂ν/□) is a
247
+ projector operator and m is the mass of the conformal mode of the gravitational field. Performing the covariantization
248
+ of Equation (2.10), the modified gravitational field equation reads
249
+ Gµν − 1
250
+ 3m2(gµν□−1R)T = κTµν ,
251
+ (2.11)
252
+ where we take the transverse part of the symmetric non-local tensor Sµν = gµν□−1R
253
+ Sµν = ST
254
+ µν + 1
255
+ 2(∇µSν + ∇νSµ) ,
256
+ (2.12)
257
+ and Sµ is an associated four-vector. The Bianchi identities are guaranteed accordingly, i.e., ∇µST
258
+ µν = 0.
259
+ In the same way as the DW model, the Ricci-Transverse model can be localized through a scalar–tensor–vector
260
+ formulation [51, 65]. Here, we introduce two auxiliary objects, namely
261
+ U(x) = −□−1R(x) ,
262
+ Sµν(x) = −U(x)gµν(x) = gµν(x)□−1R(x) .
263
+ (2.13)
264
+ An auxiliary four-vector field Sµ(x) therefore enters the localized equations because of Equation (2.12).
265
+ The
266
+ gravitational field equation, Equation (2.11), turns into
267
+ Gµν + m2
268
+ 6
269
+
270
+ 2Ugµν + ∇µSν + ∇νSµ
271
+
272
+ = κTµν
273
+ (2.14)
274
+ plus the two equations of motions of the two auxiliary fields
275
+ □U = −R ,
276
+ (2.15)
277
+
278
+ δµ
279
+ ν □ + ∇µ∇ν
280
+
281
+ Sµ = −2∂νU .
282
+ (2.16)
283
+ III.
284
+ THE LATE-TIME COSMIC ACCELERATION
285
+ The Universe is currently undergoing an accelerated expansion. The first evidence of this peculiar behavior dates
286
+ back to the end of the twentieth century, when the observation of several Type Ia Supernovae (SNIa) [3, 4] pointed out
287
+ the unavoidable necessity of a cosmological constant to fit the cosmic expansion history. On the one hand, these results
288
+ have been corroborated by the observations of all the recent surveys [5, 66–68]. On the other hand, the theoretical
289
+ explanation of this issue has two main drawbacks: the fine tuning problem [69] and the coincidence problem [70]. The
290
+ former is related to the huge discrepancy (∼120 orders of magnitude) between the observed value of the cosmological
291
+ constant and the vacuum energy density calculated via QFT. The latter is linked with the similar current values of
292
+ ΩΛ and ΩM, despite their radically different evolution laws.
293
+ The next generation of cosmological surveys should boost the investigation of the nature of the so-called cosmological
294
+ constant, providing powerful data to discriminate between DE solutions and extended theories of gravity. Within this
295
+ framework, non-local gravity provides viable mechanisms that could account for the observed accelerated expansion
296
+ of the Universe.
297
+ 1 Eµν,αβ = 1
298
+ 2 (ηµρηνσ + ηµσηνρ − 2ηµνηρσ)□ + (ηρσ∂µ∂ν + ηµν∂ρ∂σ) − 1
299
+ 2 (ηµρ∂σ∂ν + ηνρ∂σ∂µ + ηµσ∂ρ∂ν + ηµσ∂ρ∂µ)
300
+
301
+ 5
302
+ A.
303
+ The DW Case: Delayed Response to Cosmic Events
304
+ The main reason why the DW model has been in the spotlight since its formulation is its effective way to explain
305
+ late-time cosmic acceleration without the introduction of any form of dark energy. Computing the non-local correction
306
+ of Equation (2.2) in the Friedmann–Lemaitre–Robertson–Walker (FLRW) metric,
307
+ ds2 = −dt2 + a2(t)d⃗x · d⃗x ,
308
+ (3.1)
309
+ one obtains a non-negligible geometrical contribution,
310
+
311
+ □−1R
312
+
313
+ (t) =
314
+ � t
315
+ 0
316
+ dt′
317
+ 1
318
+ a3(t′)
319
+ � t′
320
+ 0
321
+ dt′′a3(t′′)R(t′′) = −6s(2s − 1)
322
+ 3s − 1
323
+
324
+ �ln
325
+
326
+ t
327
+ teq
328
+
329
+
330
+ 1
331
+ 3s − 1 +
332
+ 1
333
+ 3s − 1
334
+
335
+ teq
336
+ t
337
+ �3s−1�
338
+ � ,
339
+ (3.2)
340
+ where a(t) ∼ t s, and the integration constant is set to make the non-local correction vanish before the radiation–
341
+ matter equivalence time, teq. Then, for t > teq the non-local correction starts to grow, becoming non-negligible at
342
+ late time and driving the accelerated cosmic expansion. Non-locality thus emerges in the cosmological framework as
343
+ a delayed response to the radiation-to-matter dominance transition, i.e., as a time-like non-local effect.
344
+ The introduction of non-locality may therefore have beneficial effects on cosmological scales, both at background
345
+ level and perturbations level. Two different approaches can be adopted for the DW model: on the one hand, one can
346
+ exploit the freedom guaranteed by the undetermined form of the distortion function to fit the observed expansion
347
+ history of the universe. In such a scenario, the DW cosmology is made equivalent to ΛCDM at the background
348
+ level. However, different features emerge when perturbations are taken into account, and the physics of structure
349
+ formation is affected accordingly. On the other hand, one can select the form of the distortion function building on
350
+ some fundamental principles, such as the Noether symmetries of the system. In this case, the non-local cosmology is
351
+ also modified at background level and stronger deviations from the concordance model should rise.
352
+ In [71], the first method has been applied, and the ΛCDM expansion history of the Universe has been accurately
353
+ reproduced by matching the data through a non-trivial form of the distortion function
354
+ f(□−1R) = 0.245
355
+
356
+ tanh
357
+
358
+ 0.350X + 0.032X2 + 0.003X3�
359
+ − 1
360
+
361
+ ,
362
+ (3.3)
363
+ where X = □−1R + 16.5.
364
+ B.
365
+ The RT Case: Dynamical Dark Energy
366
+ Considering a spatially flat FLRW metric, Equation (3.1), the equations of motion of the RT model, Equa-
367
+ tions (2.14)–(2.16), become [72]
368
+ H2 − m2
369
+ 9 (U − ˙S0) = 8πG
370
+ 3
371
+ ρ ,
372
+ (3.4)
373
+ ¨U + 3H ˙U = 6 ˙H + 12H2 ,
374
+ (3.5)
375
+ ¨S0 + 3H ˙S0 − 3H2S0 = ˙U ,
376
+ (3.6)
377
+ where the spatial components of the vector field Sµ vanish to preserve the rotational invariance of the FLRW metric,
378
+ and the stress–energy tensor is taken to be T µ
379
+ ν
380
+ =diag(−ρ, p, p, p).
381
+ Defining Y = U − ˙S0, ˜h = H/H0 and the
382
+ dimensionless variable x ≡ ln a(t), then the modified Friedmann equation, Equation (3.4), reads
383
+ ˜h2(x) = ΩMe−3x + γY (x) ,
384
+ (3.7)
385
+
386
+ 6
387
+ with γ ≡ m2/(9H2
388
+ 0). An effective dark energy thus appears
389
+ ρDE(t) = ρ0γY (t) ,
390
+ (3.8)
391
+ where ρ0 = 3H2
392
+ 0/(8πG). Once the initial conditions for the auxiliary fields are set (see [56] for details), the evolution
393
+ of ρDE(t)/ρT OT (t) can be studied: the non-local effective dark energy is actually negligible until recent time and then
394
+ starts to dominate the cosmic expansion. Moreover, it is possible to study the DE equation of state
395
+ ˙ρDE + 3H(1 + ωDE)ρDE = 0 ,
396
+ (3.9)
397
+ and different evolutions for ρDE(z) follow from different choices for the initial conditions of the auxiliary fields. For
398
+ small values of the initial conditions, one obtains a fully phantom DE, namely ωDE(z) is always less than −1. For
399
+ large values of the initial conditions, ρDE(z) has a "phantom crossing" behavior, i.e., there is a transition from the
400
+ phantom regime to −1 < ωDE < 0 of about z ≃ 0.3. Regardless of the initial conditions, therefore, the non-local
401
+ model provides a dynamical DE density which drives the accelerated expansion of the Universe.
402
+ IV.
403
+ THE GROWTH OF PERTURBATIONS AND THE σ8 TENSION
404
+ Building on the primordial density fluctuations emerged from the inflation, cosmic structures have formed due
405
+ to gravitational instability. Studying the large-scale structure of the Universe and its evolution through the cosmic
406
+ epochs, it is possible to trace the growth of the so-called cosmological perturbations.
407
+ Associated to this observable, one of the main cosmological tensions has risen: the growth tension. It has come
408
+ about as the result of the discrepancy between the Planck value of the cosmological parameters ΩM and σ8 and those
409
+ from WL measurements, CC and RSD data. The former dynamical probes point towards lower values of the amplitude
410
+ (σ8) or the rate (fσ8 = [ΩM(z = 0)]0.55σ8) of growth of structures with respect to the CMB experiments, giving rise to
411
+ a 2−3σ tension [9, 11]. Moreover, the Planck 2018 value of the joint parameter S8 = σ8
412
+
413
+ ΩM/0.3 (S8 = 0.834±0.016
414
+ [5]) is confirmed by another recent CMB analysis by the ACT + WMAP collaboration (S8 = 0.840 ± 0.030 [66]),
415
+ thus erasing the possibility of a systematic error related to the excess of lensing amplitude measured by Planck [73].
416
+ A 2.3σ tension emerges accordingly with both the original WL analysis of KiDS-450 [74] and KiDS-450 + VIKING
417
+ data [75], while updated constraints from the same datasets [76, 77] show greater discrepancies.
418
+ The same 2.3σ
419
+ tension also occurs with the data from DES’s first year release (DESY1) [78], while the combination of KiDS-450 +
420
+ VIKING + DESY1 weak lensing datasets results in a 2.5σ [79] or 3.2σ [80] tension depending on the analysis. The
421
+ most recent cosmic shear data release from both KiDS-1000 and DESY3 confirms the previous estimates [18, 81–84]
422
+ (S8 = 0.759+0.024
423
+ −0.021 from KiDS-1000 [18]). Analogous results have been obtained with the 3 × 2 pt correlation function
424
+ analysis (cosmic shear correlation function, galaxy clustering angular auto-correlation function and galaxy–galaxy
425
+ lensing cross-correlation function) of KiDS-1000 + BOSS + 2dFLenS datset [85]. Additional results, in agreement
426
+ with those from WL surveys, have been achieved by number counting of galaxy clusters, using multiwavelength
427
+ datasets [19, 86–91]. Supplementary observational evidence for the weaker growth of structures is also given by the
428
+ exploitation of RSD data [20, 92–95].
429
+ A.
430
+ The Deser–Woodard Evolution of Scalar Perturbations
431
+ To investigate the growth of structures in the non-local DW model, we select the phenomenological form of the
432
+ distortion function given by Equation (3.3). As a consequence, the non-local background evolution is made equivalent
433
+ to that of ΛCDM, and any deviation is enclosed in the cosmological perturbations.
434
+ Consider the field equations of the scalar–tensor equivalent of the DW model, Equations (2.7)–(2.9). Specializing
435
+ to the cosmological case by assuming the FLRW metric, Equation (3.1), the field equations now read
436
+ H2�
437
+ 1 + f − ξ
438
+
439
+ + H
440
+
441
+ f ′ ˙η − ˙ξ
442
+
443
+ − 1
444
+ 6 ˙η ˙ξ = 8πG
445
+ 3
446
+ ρ ,
447
+ (4.1)
448
+ ˙H
449
+
450
+ 1 + f − ξ
451
+
452
+ − H
453
+ 2
454
+
455
+ f ′ ˙η − ˙ξ
456
+
457
+ + 1
458
+ 2 ˙η ˙ξ + 1
459
+ 2
460
+
461
+ f ′′ ˙η2 + f ′¨η − ¨ξ
462
+
463
+ = −4πG(p + ρ) ,
464
+ (4.2)
465
+
466
+ 7
467
+ ¨η + 3H ˙η = −6
468
+ � ˙H + 2H2�
469
+ ,
470
+ (4.3)
471
+ ¨ξ + 3H ˙ξ = 6f ′� ˙H + 2H2�
472
+ ,
473
+ (4.4)
474
+ where the former two are the (0,0) and the (1,1) component of Equation (2.7), while the latter two are the cosmological
475
+ formulation of Equations (2.8) and (2.9).
476
+ The linear perturbation equations have been derived in [96] for the scalar–tensor equivalent of the non-local theory,
477
+ and then analogous results have been found in [97] for the original formulation. Using the perturbed FLRW metric
478
+ in the Newtonian gauge,
479
+ ds2 = −(1 + 2Ψ)dt2 + a2(t)(1 + 2Φ)δijdxidxj ,
480
+ (4.5)
481
+ the growth equation reads
482
+ ¨δM + (2 − ξ) ˙δM =
483
+ 3H2
484
+ 0
485
+
486
+ 1 − ξ − 8f ′(η) + f(η)
487
+
488
+ Ω0
489
+ M
490
+ 2a3H2�
491
+ 1 − ξ − 6f ′(η) + f(η)
492
+ ��
493
+ 1 + f(η) − ξ
494
+ � δM ,
495
+ (4.6)
496
+ where δM = δρM/ρM is the matter density perturbation in the sub-horizon limit.
497
+ Numerical results for the growth rate fσ8 ≡ σ8δ′
498
+ M/δM have been obtained in [96] and [97] for both the formulations
499
+ of the Deser–Woodard model, and good agreement with the Redshift Space Distortion (RSD) data has emerged
500
+ (σNL
501
+ 8
502
+ = 0.78). Moreover, when the DW cosmological parameters are inferred by matching the CMB data [98], a lower
503
+ growth amplitude with respect to that of ΛCDM turns out. The non-local model thus alleviates the growth tension,
504
+ predicting compatible values of σ8 both from Planck–CMB and the other dynamical probes, as shown in Figure 1.
505
+ However, even though the non-local clustering of linear structures is weakened with respect to ΛCDM, and the DW
506
+ prediction for the matter power spectrum is about 10% lower [98], the non-local lensing response is counterintuitively
507
+ enhanced due to a severe increase in the lensing potential. This peculiar behavior results in a slight tension between
508
+ CMB and RSD [98]: performing the joint fit, the RSD dataset tends to push the DW predictions for the CMB lensing
509
+ potential Cφφ
510
+
511
+ out of the 1σ error bars at low-ℓ. Applying the Bayesian tools for the model selection, a “weak evidence”
512
+ [103] for the ΛCDM model consequently emerges.
513
+ B.
514
+ The Ricci-Transverse Evolution of Scalar Perturbations
515
+ The scalar perturbations of the RT model have been investigated in [56, 104], using the FLRW metric in the
516
+ Newtonian gauge, Equation (4.5), and perturbing the auxiliary fields as
517
+ U(t, x) = ¯U(t) + δU(t, x) ,
518
+ (4.7)
519
+ Sµ(t, x) = ¯S0(t) + δSµ(t, x) = ¯S0(t) + δS0(t, x) + ∂i
520
+
521
+ δS(t, x)
522
+
523
+ ,
524
+ (4.8)
525
+ where the spatial part of the vector perturbation does not vanish and, for scalar perturbations, only depends on
526
+ δS. Building on the RT cosmological equations Equations (3.4)–(3.6), the growth equation for the matter density
527
+ perturbation in the sub-horizon limit reads [104]
528
+ ¨δM + 2H ˙δM = 3
529
+ 2
530
+ Geff
531
+ G
532
+ H2
533
+ 0ΩMδM ,
534
+ (4.9)
535
+ where in Geff
536
+
537
+ Ψ, Φ, δU, δS0, S
538
+
539
+ is encoded the deviation of the non-local theory from GR. In the sub-horizon modes,
540
+ namely ˆk ≫ 1, such deviation is
541
+
542
+ 8
543
+ 0.70
544
+ 0.75
545
+ 0.80
546
+ 0.85
547
+ S8
548
+ CMB Planck (DW non-local)
549
+ CMB Planck + RSD + JLA (DW non-local)
550
+ CMB Planck + BAO + Pantheon (RT-minimal non-local)
551
+ CMB Planck + BAO + Pantheon (RT non-local, ΔN=64)
552
+ CMB Planck TT,TE,EE + lowE
553
+ CMB ACT + WMAP
554
+ WL KiDS-1000
555
+ WL DES-Y3
556
+ WL CFHTLenS
557
+ WL KiDS + VIKING + DES-Y1
558
+ WL + CMB lensing DES-Y3 + SPT + Planck
559
+ WL + GC KiDS-1000 3×2pt
560
+ WL + GC DES-Y3 3×2pt
561
+ WL + GC KiDS + VIKING-450 + BOSS
562
+ GC BOSS + eBOSS
563
+ GC BOSS power spectra
564
+ GC + CMB lensing DESI + Plank
565
+ CC AMICO KiDS-DR3
566
+ CC SDSS-DR8
567
+ CC Planck tSZ
568
+ RSD + BAO + Pantheon
569
+ RSD
570
+ RSD
571
+ 0.70
572
+ 0.75
573
+ 0.80
574
+ 0.85
575
+ S8
576
+ FIG. 1: Estimates of S8 provided by the two non-local cosmological analyses [56, 98], and the ΛCDM fit of the CMB [5, 66],
577
+ the WL data [18, 20, 80, 83, 84, 99], the combination of WL and galaxy clustering observations [100–102], cluster counting
578
+ [19, 87, 88] and RSD surveys [92, 94]. The colored band corresponds to the S8 value derived by the analysis of the Planck–CMB
579
+ data in the ΛCDM framework [5].
580
+ 1 − Geff
581
+ G
582
+ = O
583
+ � 1
584
+ ˆk2
585
+
586
+ ,
587
+ (4.10)
588
+ and the RT model is thus safe regarding the time variation of the effective Newton’s constant. Geff indeed reduces
589
+ to G at the Solar System scale, while a deviation of ∼1% rises at cosmological scales.
590
+ In [56], the growth rate f(z, k) ≡ d ln δM/d ln a is also derived. The results do not differ from those of ΛCDM
591
+ cosmology: f(z, k) can be fitted with a k-independent function f(z) = [ΩM(z)]γ, where γ ≃ 0.55 is roughly constant.
592
+ Accordingly, any possible deviation in the growth of perturbations should be due to the amplitude σ8. In order to find
593
+ any signature of the non-local model at perturbation level, which could account for the growth tension, the theory was
594
+ compared with cosmological observations: Planck–CMB, Pantheon SNIa and SDSS-BAO. The Bayesian parameter
595
+ estimation shows a full equivalence between the RT non-local cosmology and the ΛCDM one. No statistically signifi-
596
+ cant deviation in the σ8 parameter emerges for any of the tested versions of the Ricci-Transverse model. Eventually,
597
+ this theory cannot alleviate the growth tension, as shown in Figure 1.
598
+ V.
599
+ HUBBLE TENSION IN LIGHT OF THE NON-LOCAL MODELS
600
+ Hubble tension is certainly the most renowned and significant tension of the ΛCDM model. It emerges from the
601
+ comparison between early-time and late-time measurements of the Hubble constant. From one side, CMB analysis
602
+ [5, 66, 105–108], BAO surveys [6, 101, 109, 110] with standard BBN constraints [111] and combinations of CMB,
603
+ BAO, SNIa [112], RSD and cosmic shear data [78, 113, 114] point towards lower values of H0 (H0 = 67.4 ± 0.5 km
604
+ s−1Mpc−1 from Planck 2018 [5]). On the other side, the local measurements based on standard candles prefer higher
605
+ values for the Hubble constant [115] (H0 = 73.04 ± 1.04 km s−1Mpc−1 from SH0ES 2022 [17]). The main results are
606
+ achieved by the SH0ES collaboration using Hubble Space Telescope observations: on the one hand, they analyzed
607
+
608
+ 9
609
+ 65
610
+ 70
611
+ 75
612
+ 80
613
+ H0 ( km s-1 Mpc-1 )
614
+ CMB Planck (DW non-local)
615
+ CMB Planck + RSD + JLA (DW non-local)
616
+ CMB Planck + BAO + Pantheon (RT-minimal non-local)
617
+ CMB Planck + BAO + Pantheon (RT non-local, ΔN=64)
618
+ CMB Planck
619
+ CMB Planck + lensing
620
+ SPT-3G CMB
621
+ ACT + WMAP CMB
622
+ Planck + SPT + ACT CMB
623
+ BOSS correlation function + BAO + BBN
624
+ BOSS power spectrum + BAO + BBN
625
+ BOSS DR12 + BBN
626
+ BAO + RSD
627
+ LSS equivalence-time ruler
628
+ LSS equivalence-time ruler + lensing
629
+ SNIa-Cepheid
630
+ SNIa-TRGB
631
+ SNIa-Miras
632
+ SneII
633
+ SnIa-Cepheid + TD lensing
634
+ Time-delay lensing
635
+ Time-delay lensing
636
+ Time-delay lensing + SLACS
637
+ GW Standard Sirens
638
+ GW Standard Sirens
639
+ GW Standard Sirens
640
+ Masers
641
+ Masers
642
+ Tully Fisher
643
+ Surface Brightness Fluctuations
644
+ 0.70
645
+ 0.72
646
+ 0.74
647
+ 0.76
648
+ 0.78
649
+ 0.80
650
+ S8
651
+ FIG. 2: Estimates of H0 provided by the two non-local cosmological analyses [56, 98], and the ΛCDM fit of the CMB [5, 66,
652
+ 105, 107], the matter power spectrum combined with BAO [20, 110, 126] and RSD [127], the Large Scale Structure teq standard
653
+ ruler [128, 129], the supernovae [17, 121, 124, 130, 131], the time-delay lensing [121, 132, 133], the gravitational waves [134–136],
654
+ the water megamasers [125, 137], the Tully–Fisher relation [138] and the SBF [139]. The colored bands correspond to the H0
655
+ estimates derived by the Planck–CMB analysis in the ΛCDM framework (purple) [5] and the SNIa–Cepheids analysis by SH0ES
656
+ (orange) [17].
657
+ SNIa data with distance calibration by Cepheid variables in the host galaxies [116, 117]; on the other hand, they
658
+ targeted long-period pulsating Cepheid variables [17, 118], calibrating the geometric distance to the Large Magellanic
659
+ Cloud, both from eclipsing binaries and parallaxes from the Gaia satellite [119, 120]. Moreover, other independent
660
+ local measurement of H0 have been performed by using time delays between multiple images of strong lensed quasars
661
+ [121, 122], the tip of the Red Giant Branch [123] and Miras (variable red giant stars) [124] with water megamaser as
662
+ distance indicator [125]. All these measurements agree on higher values of the Hubble constant, thus generating a
663
+ 4 − 5σ tension with early-time model-dependent estimates.
664
+ A.
665
+ The Deser–Woodard Expansion History
666
+ The stat-of-the-art investigation of the DW non-local model does not allow any attempt to address H0 tension. To
667
+ make the model predictive, the form of the distortion function needs to be specified, and most of the analyses have
668
+ been focused on the phenomenological ΛCDM form of Equation (3.3), until now (see [98] for the latest results). This
669
+ choice implies that the DW cosmology is made equivalent to that of the concordance model at background level, and
670
+ the same expansion history, as well as the same H0, are thus predicted (see Figure 2).
671
+ However, another option is also available for the selection of the distortion function. In [57, 140, 141], a specific
672
+ form of f(η) has been derived by exploiting the Noether symmetries [142] of a spherically symmetric background
673
+ spacetime
674
+ f(η) = 1 + e η .
675
+ (5.1)
676
+ The accurate cosmological analysis of this form of the DW model has yet to be carried out, but some results have
677
+ already been achieved, such as exact solutions [49] and a phase-space view of solutions [143]. Furthermore, several
678
+
679
+ 10
680
+ astrophysical tests have been performed on very different scales, and viable results turned out. In [141], the lensing
681
+ properties of the galaxy clusters have been investigated in light of the exponential DW model, and a fully non-local
682
+ regime with enhanced lensing strength has been highlighted. This feature clearly resembles the improved lensing
683
+ response of the phenomenological form of the DW model, which is co-responsible for the lowered estimate of the σ8
684
+ parameter. A promising insight upon the cosmological behavior of the non-local theory based on Equation (5.1) thus
685
+ emerges. Therefore, this model may alleviate not only the growth tension but also the Hubble tension, since it also
686
+ deviates from GR at the background level [144]. Further analysis of the exponential DW model should be carried out
687
+ accordingly.
688
+ B.
689
+ The Ricci-Transverse Expansion History
690
+ For what concerns the RT model, the most updated cosmological analysis is due to Belgacem et al. [56]. As we
691
+ saw in Section IV, different versions of the non-local model, relying on different choices for initial conditions of the
692
+ auxiliary fields, have been compared against Planck–CMB, Pantheon SNIa and SDSS-BAO data. Since the RT model
693
+ has no freedom with regard to the functional form of the action, the theory cannot be adjusted to data, and no
694
+ background equivalence to the ΛCDM cosmology can be established a priori. In such a scenario, the solution to the
695
+ Hubble tension may thus be possible. However, the estimator tool defined in Equation (4.10), which accounts for
696
+ the deviation from GR of the non-local theory, only shows little discrepancies. This manifests in the values of the
697
+ cosmological parameters inferred via Markov Chain Monte Carlo (MCMC), which are almost equivalent to those of
698
+ the concordance model. The only model that exhibits some slight discrepancies is the so-called "RT-minimal", which
699
+ relies on the assumption that the auxiliary scalar field U(x) starts its evolution during the radiation dominance era.
700
+ On the one hand, this model predict a non-vanishing value for the sum of neutrino masses, while the ΛCDM model
701
+ and the other versions of the RT model show a marginalized posterior which is peaked in zero. On the other hand,
702
+ the RT-minimal model provides a barely higher estimate of the Hubble constant, i.e., H0 = 68.74+0.59
703
+ −0.51 km s−1Mpc−1.
704
+ Accordingly, the Hubble tension is just reduced to ∼4σ, as shown in Figure 2.
705
+ The RT model in its minimal setup thus provides a viable mechanism to account for the late-time cosmic acceleration,
706
+ as well as for the inclusion of non-zero neutrino masses. However, the predictions for both the background evolution
707
+ and the linear perturbations are too similar to that of the ΛCDM model, hence the cosmological tensions cannot be
708
+ alleviated.
709
+ VI.
710
+ ASTROPHYSICAL TESTS OF NON-LOCAL GRAVITY
711
+ As we saw, good cosmological behavior emerges for both of the non-local models, thus enabling the possibility to
712
+ avoid the introduction of any form of unknown dark energy. In order to further investigate the viability of such models
713
+ as alternatives to GR, it is then necessary to test the non-local predictions down to astrophysical scales. Moreover,
714
+ an accurate investigation of the possible screening mechanisms should be performed, if necessary.
715
+ A.
716
+ Testing the Deser–Woodard Model by Galaxy Clusters, Elliptical Galaxies and the S2 Star
717
+ The DW model has been tested on a wide range of astrophysical scales, from the galaxy clusters [141] to the stellar
718
+ orbits around Sagittarius A* [140]. Most of the tests have been carried out for the exponential form of the non-local
719
+ model, namely
720
+ S = 1
721
+
722
+
723
+ d4x√−g
724
+
725
+ R
726
+
727
+ 2 + e η�
728
+ − ∂µξ∂µη − ξR
729
+
730
+ ,
731
+ (6.1)
732
+ where the distortion function has been picked out by exploiting the Noether Symmetry Approach [145]. The analyses
733
+ presented are all performed in the post-Newtonian limit, hence the non-local gravitational and metric potential are
734
+ φ(r) = − GMηc
735
+ r
736
+ + G2M 2
737
+ 2c2r2
738
+
739
+ 14
740
+ 9 η2
741
+ c + 18rξ − 11rη
742
+ 6rηrξ
743
+ r
744
+
745
+ − G3M 3
746
+ 2c4r3
747
+
748
+ 50rξ − 7rη
749
+ 12rηrξ
750
+ ηcr + 16
751
+ 27η3
752
+ c −
753
+ 2r2
754
+ ξ − r2
755
+ η
756
+ r2ηr2
757
+ ξ
758
+ r2
759
+
760
+ ,
761
+ (6.2)
762
+ ψ(r) = −GMηc
763
+ 3r
764
+ − G2M 2
765
+ 2c2r2
766
+
767
+ 2
768
+ 9η2
769
+ c + 3rη − 2rξ
770
+ 2rηrξ
771
+ r
772
+
773
+ ,
774
+ (6.3)
775
+
776
+ 11
777
+ where ηc is set to 1 so as to recover GR in the limit of φ(r). The two length scales rη and rξ are the characteristic
778
+ non-local parameters that define the scale at which the non-local gravity corrections become effective.
779
+ The first test of this form of the DW model has been carried out in [140], where the weak field non-local predictions
780
+ have been compared against the NTT/VLT observations of S2 star orbit [146]. Exploiting a modified Marquardt–
781
+ Levenberg algorithm, the fit between the simulated orbit and the observed one has shown a slightly better agreement
782
+ for the non-local model with respect to the Keplerian orbit. Moreover, some constraints have been set on the non-local
783
+ length scales.
784
+ A further test has been subsequently performed in [141], exploiting the CLASH lensing data from 19 massive clusters
785
+ [147, 148]. The point-mass potentials of Equations (6.2) and (6.3) were extended to a spherically symmetric mass
786
+ distribution, i.e., the Navarro–Frenk–White density profile, and the non-local predictions for the lensing convergence
787
+ were achieved. Therefore, the MCMC analysis has highlighted two effective regimes in which the non-local model
788
+ is able to match the observations at the same level of statistical significance as GR. In the high-value limit of the
789
+ non-local parameters, the non-local model reduces to a GR-like theory, whose lensing strength is 2/3 of the standard
790
+ one. In this scenario, the DW theory is thus able to fit the data at the cost of increased cluster mass estimates.
791
+ On the other hand, approaching the low-value limit of the non-local length scales, the non-local corrections to the
792
+ lensing potential become larger and comparable to the zeroth-order terms. In this regime, the non-local model is
793
+ able to reproduce GR phenomenology, neither affecting the mass estimates nor the statistical viability of the model.
794
+ Furthermore, when the non-local contributions becomes completely dominant, the non-local theory seems to be able
795
+ to fit the lensing observations with extremely low cluster masses. Accordingly, an intriguing possibility to fit data
796
+ with no dark matter emerges. Additional constraints on the non-local parameters were also derived.
797
+ The most recent astrophysical test of the exponential-DW model was carried out in [57], using the velocity distri-
798
+ bution of elliptical galaxies [149]. Computing the non-local velocity dispersion as a function of the galaxy effective
799
+ radius, the empirical relation of the so-called Fundamental Plane has been recovered so as to constrain the non-local
800
+ gravity parameters. The results of the fit highlight the possibility to recover the fundamental plane without the dark
801
+ matter hypothesis, setting new constraints for rη and rξ.
802
+ It is worth noticing, however, that the non-local Deser–Woodard model exhibits worrisome features at the scale of
803
+ the Solar System. Indeed, in [150], it was demonstrated that the screening mechanism proposed by the same authors
804
+ of the non-local model does not work. As a consequence, the DW model would show a time dependence of the effective
805
+ Newton constant in the small-scale limit, and it would be ruled out by Lunar Laser Ranging (LLR) observations. This
806
+ conclusion, however, seems to be too strong, since it is still not clear how an FLRW background quantity behaves
807
+ when evaluated from cosmological scales down to Solar System ones, where the system decouples from the Hubble
808
+ flow. In fact, a full non-linear time- and scale-dependent solution around a non-linear structure would be necessary.
809
+ A number of proposals go in this direction, and the so-called Vainshtein mechanism [151] can be regarded as the
810
+ paradigm to realize the screening. Basically, any screening mechanism requires a scalar field coupled to matter and
811
+ mediating a fifth force which might span from Solar System up to cosmological scales. Since non-local terms can be
812
+ “localized”, thus resulting in effective scalar fields depending on the scale, some screening mechanism could naturally
813
+ emerge so as to solve the above reported problems.
814
+ B.
815
+ Testing the Ricci-Transverse Model by Solar System Observations and Gravitational Waves Detection
816
+ The main astrophysical tests of the RT model are related to Solar System observations. As we saw in the previous
817
+ sub-section, any theory that extends GR has to reduce to Einstein’s theory at small scales. However, this is highly
818
+ non-trivial when additional degrees of freedom are included, and screening mechanisms involving non-linear features
819
+ are required. The RT model, instead, smoothly reduces to GR already at linear level, and no vDVZ discontinuity
820
+ arises when m → 0 [56]. Note that such results are valid both in the flat and the Schwarzschild spacetime. Moreover,
821
+ the non-local model passes the LLR test about the time variation of the effective Newton constant [150]. As stated
822
+ in Equation (4.10), indeed, the deviation parameter Geff reduces to GN as soon as the system’s characteristic scale
823
+ decreases.
824
+ Another non-local feature of the RT model that has been investigated is the deviation from GR of the predicted
825
+ gravitational radiation [152, 153]. The RT model, similarly to some other extended theories of gravity such as f(R)
826
+ gravity and DHOST theories, has survived the GW170817 event, which set a stringent constraint on the Gravitational
827
+ Waves (GW) speed [154]. Indeed, this non-local model only modifies the friction term in the GW propagation equation,
828
+ thus predicting a massless graviton. Moreover, neither the coupling with matter nor the gravitational interaction
829
+ between the coalescing binaries are affected (the RT model reduces to GR at short distances), and the only difference
830
+ will therefore be due to the free propagation of the GW from the source to the observer. The GW amplitude indeed
831
+ undergoes a modified dampening in the non-local model
832
+
833
+ 12
834
+ ˜hA(η, k) ∼
835
+ 1
836
+ dgw
837
+ L (z) =
838
+
839
+ dem
840
+ L (z) exp
841
+
842
+
843
+ � z
844
+ 0
845
+ dz′
846
+ 1 + z′ δ(z′)
847
+ ��−1
848
+ ,
849
+ (6.4)
850
+ where
851
+ δ(η) = m2 ¯S0(η)
852
+ 6H(η) ,
853
+ (6.5)
854
+ and ˜hA(η, k) are the Fourier modes of the GW amplitude, with A = ×, + labeling the polarization. Computing
855
+ the ratio between the non-local behavior given by Equation (6.4) and the GR behavior, ˜hA(η, k) ∼ 1/dem
856
+ L (z), little
857
+ deviation emerges for the RT-minimal model, while a 20−80% deviation manifests at large z for the RT formulations
858
+ in which the auxiliary fields start their evolution during the de Sitter inflation. The more e-folds we consider between
859
+ the onset of the auxiliary fields and the end of the inflation, the greater the deviation from GR. We can use a simple
860
+ parametrization for the considered ratio
861
+ dgw
862
+ L (z)
863
+ dem
864
+ L (z) = Ξ0 + 1 − Ξ0
865
+ (1 + z)n ,
866
+ (6.6)
867
+ where Ξ0 is the asymptotic value reached by the ratio and n is the rate at which Ξ0 is approached. Then,
868
+ δ(z) =
869
+ δ(0)
870
+ 1 − Ξ0 + Ξ0(1 + z)n ,
871
+ (6.7)
872
+ with δ(0) = n(1 − Ξ0), and the event GW170817 provided the following constraint for such a parameter [153]:
873
+ δ(0) = −7.8+9.7
874
+ −18.4.
875
+ More stringent constraints will certainly be set with the next generation of GW detectors by
876
+ exploiting the observations of GW events with electromagnetic counterparts.
877
+ VII.
878
+ CONCLUSIONS AND PERSPECTIVES
879
+ In this paper, we reviewed the cosmological properties of two of the main proposals in the framework of the non-
880
+ locally extended theories of gravity. In particular, we considered two metric IKGs that are inspired by quantum
881
+ corrections and manifest a suitable cosmological behavior as well. Both the DW and RT models are able to reproduce
882
+ the expansion history of the Universe, exhibiting a late-time accelerated expansion driven by the onset of the non-local
883
+ corrections. The non-local extensions of the Hilbert–Einstein Lagrangian thus provide a viable mechanism to avoid
884
+ the introduction of any form of unknown dark energy. Building on these appealing properties, we inquired into the
885
+ chance of addressing the two main cosmological tensions, namely the σ8 and H0 tensions.
886
+ On the one hand, the non-local DW model has shown suitable features towards this aim. The phenomenological
887
+ formulation of the model indeed predicts a lowered amplitude of growth of perturbations, therefore solving the σ8
888
+ tension. However, this model is made equivalent to the ΛCDM cosmology at the background level, hence no chance
889
+ to account for the Hubble tension arises. Another formulation of the DW theory, based on the Noether symmetries
890
+ of the system, may address both the tensions. This model lacks a proper cosmological analysis, but the investigation
891
+ of its lensing properties at the galaxy clusters scale has shown the same features that, in the phenomenological DW
892
+ model, allow the weakening of the growth of structures. Moreover, this formulation of the non-local theory deviates
893
+ from GR also at background level, thus enabling the possibility to alleviate the Hubble tension as well. The model has
894
+ been also tested on astrophysical scales, and substantial statistical equivalence to GR has emerged in very different
895
+ systems, such as the S2 star, the elliptical galaxies and the galaxy clusters. The main drawback of the DW model,
896
+ however, is the absence of an effective screening mechanism on small scales, which has to be further investigated.
897
+ On the other hand, the non-local RT model perfectly reduces to GR at the Solar System scale, thus avoiding the
898
+ necessity of non-trivial screening mechanisms. Accordingly, the model is not ruled out by the LLR test. Moreover, the
899
+ non-minimal formulations of the RT model show a strong deviation from GR for what concerns the GW propagation
900
+ at large redshift. A powerful tool to test the model with the next generation of GW detectors thus emerges. However,
901
+ this non-local model is not able to address any of the cosmological tensions, as it mimics the ΛCDM evolution both
902
+ at the background and linear perturbations level.
903
+
904
+ 13
905
+ In view of the fact that the next generation of cosmological surveys are expected to provide sufficiently accurate
906
+ data to reach a turning point in our comprehension of the Universe, it is of great interest to further investigate the
907
+ main alternatives to GR. A complete cosmological analysis should especially be carried out for the non-local DW
908
+ model in its formulation based on the Noether Symmetry Approach. This model indeed provides one of the most
909
+ promising windows towards the solution of both the cosmological tensions and the dark energy problem. The large-
910
+ scale structure especially appears as a privileged environment for testing the non-local models, since one of their main
911
+ features is the emergence of characteristic length scales. However, it must be stressed that as long as no screening
912
+ mechanism will be found for the DW model, its reliability will be compromised.
913
+ Acknowledgments
914
+ This article is based upon work from COST Action CA21136 Addressing observational tensions in cosmology
915
+ with systematic and fundamental physics (CosmoVerse) supported by COST (European Cooperation in Science and
916
+ Technology). FB and SC acknowledge the support of Istituto Nazionale di Fisica Nucleare (INFN), iniziative specifiche
917
+ QGSKY and MOONLIGHT2.
918
+ Appendix A: Abbreviations
919
+ The following abbreviations are used in this manuscript:
920
+ BBN
921
+ Big Bang Nucleosynthesis
922
+ BAO
923
+ Baryon Acoustic Oscillations
924
+ ΛCDM Lambda Cold Dark Matter
925
+ GR
926
+ General Relativity
927
+ DE
928
+ Dark Energy
929
+ DM
930
+ Dark Matter
931
+ CMB
932
+ Cosmic Microwave Background
933
+ WL
934
+ Weak Lensing
935
+ CC
936
+ Cluster Counts
937
+ RSD
938
+ Redshift Space Distortion
939
+ DW
940
+ Deser–Woodard
941
+ RT
942
+ Ricci-Transverse
943
+ QFT
944
+ Quantum Field Theory
945
+ IDG
946
+ Infinite Derivative Theory of Gravity
947
+ IKG
948
+ Integral Kernel Theory of Gravity
949
+ UV
950
+ UltraViolet
951
+ IR
952
+ InfraRed
953
+ SNIa
954
+ Type Ia Supernovae
955
+ FLRW Friedmann–Lemaitre–Robertson–Walker
956
+ MCMC Markov Chain Monte Carlo
957
+ LLR
958
+ Lunar Laser Ranging
959
+ GW
960
+ Gravitational Waves
961
+ [1] Hogg, D.W.; Eisenstein, D.J.; Blanton, M.R.; Bahcall, N.A.; Brinkmann, J.; Gunn, J.E.; Schneider, D.P.
962
+ Cosmic
963
+ homogeneity demonstrated with luminous red galaxies. Astrophys. J. 2005, 624, 54. https://doi.org/10.1086/429084.
964
+ [2] Labini, F.S.; Vasilyev, N.L.; Pietronero, L.; Baryshev, Y.V. Absence of self-averaging and of homogeneity in the large-scale
965
+ galaxy distribution. Europhys. Lett. 2009, 86, 49001. https://doi.org/10.1209/0295-5075/86/49001.
966
+ [3] Riess, A.G.; Filippenko, A.V.; Challis, P.; Clocchiatti, A.; Diercks, A.; Garnavich, P.M.; Gilliland, R.L.; Hogan, C.J.;
967
+ Jha, S.; Kirshner, R.P.; et al. Observational Evidence from Supernovae for an Accelerating Universe and a Cosmological
968
+ Constant. Astron. J. 1998, 116, 1009. https://doi.org/10.1086/300499.
969
+ [4] Perlmutter, S.; Aldering, G.; Goldhaber, G.; Knop, R.A.; Nugent, P.; Castro, P.G.; Deustua, S.; Fabbro, S.; Goobar, A.;
970
+ Groom, D.E.; et al. Measurements of Omega and Λ from 42 High-Redshift Supernovae. Astrophys. J. 1999, 517, 565.
971
+ https://doi.org/10.1086/307221.
972
+ [5] Aghanim, N.; Akrami, Y.; Ashdown, M.; Aumont, J.; Baccigalupi, C.; Ballardini, M.; Banday, A.J.; Barreiro, R.B.;
973
+ Bartolo, N.; Basak, S.; et al. Planck 2018 results. VI. Cosmological parameters. Astron. Astrophys. 2020, 641, A6;
974
+ Erratum in Astron. Astrophys. 2021, 652, C4. https://doi.org/10.1051/0004-6361/201833910.
975
+
976
+ 14
977
+ [6] Alam, S.; Aubert, M.; Avila, S.; Balland, C.; Bautista, J.E.; Bershady, M.A.; Bizyaev, D.; Blanton, M.R.; Bolton,
978
+ A.S.; Bovy, J.; et al. Completed SDSS-IV extended Baryon Oscillation Spectroscopic Survey: Cosmological implications
979
+ from two decades of spectroscopic surveys at the Apache Point Observatory. Phys. Rev. D 2021, 103, 083533. https:
980
+ //doi.org/10.1103/physrevd.103.083533.
981
+ [7] Abbott, T.; Aguena, M.; Alarcon, A.; Allam, S.; Alves, O.; Amon, A.; Andrade-Oliveira, F.; Annis, J.; Avila, S.; Bacon,
982
+ D.; et al. Dark Energy Survey Year 3 results: Cosmological constraints from galaxy clustering and weak lensing. Phys.
983
+ Rev. D 2022, 105, 023520. https://doi.org/10.1103/physrevd.105.023520.
984
+ [8] Bull, P.; Akrami, Y.; Adamek, J.; Baker, T.; Bellini, E.; Jiménez, J.B.; Bentivegna, E.; Camera, S.; Clesse, S.; Davis,
985
+ J.H.; et al. Beyond ΛCDM: Problems, solutions, and the road ahead. Phys. Dark Universe 2016, 12, 56–99. https:
986
+ //doi.org/10.1016/j.dark.2016.02.001.
987
+ [9] Perivolaropoulos, L.; Skara, F. Challenges for ΛCDM: An update. New Astron. Rev. 2022, 95, 101659. https://doi.
988
+ org/10.1016/j.newar.2022.101659.
989
+ [10] Di Valentino, E.; Anchordoqui, L.A.; Özgür Akarsu.; Ali-Haimoud, Y.; Amendola, L.; Arendse, N.; Asgari, M.; Ballardini,
990
+ M.; Basilakos, S.; Battistelli, E.; et al. Snowmass2021—Letter of interest cosmology intertwined II: The hubble constant
991
+ tension. Astropart. Phys. 2021, 131, 102605. https://doi.org/10.1016/j.astropartphys.2021.102605.
992
+ [11] Di Valentino, E.; Anchordoqui, L.A.; Özgür Akarsu.; Ali-Haimoud, Y.; Amendola, L.; Arendse, N.; Asgari, M.; Ballardini,
993
+ M.; Basilakos, S.; Battistelli, E.; et al. Cosmology intertwined III: fσ8 and S8. Astropart. Phys. 2021, 131, 102604.
994
+ https://doi.org/10.1016/j.astropartphys.2021.102604.
995
+ [12] Bertone, G.; Hooper, D.; Silk, J. Particle dark matter: Evidence, candidates and constraints. Phys. Rep. 2005, 405,
996
+ 279–390. https://doi.org/10.1016/j.physrep.2004.08.031.
997
+ [13] Batista, R.A.; Amin, M.A.; Barenboim, G.; Bartolo, N.; Baumann, D.; Bauswein, A.; Bellini, E.; Benisty, D.; Bertone,
998
+ G.; Blasi, P.; et al. EuCAPT White Paper: Opportunities and Challenges for Theoretical Astroparticle Physics in the
999
+ Next Decade. arXiv Prepr. 2021, arXiv:2110.10074. https://doi.org/10.48550/ARXIV.2110.10074.
1000
+ [14] Copeland, E.J.; Sami, M.; Tsujikawa, S. Dynamics of dark energy. Int. J. Mod. Phys. D 2006, 15, 1753–1935. https:
1001
+ //doi.org/10.1142/S021827180600942X.
1002
+ [15] Padmanabhan, T. Cosmological constant: The Weight of the vacuum. Phys. Rept. 2003, 380, 235–320. https://doi.
1003
+ org/10.1016/S0370-1573(03)00120-0.
1004
+ [16] Nojiri, S.; Odintsov, S.D. Introduction to modified gravity and gravitational alternative for dark energy. Int. J. Geom.
1005
+ Methods Mod. Phys. 2007, 4, 115–145. https://doi.org/10.1142/S0219887807001928.
1006
+ [17] Riess, A.G.; Yuan, W.; Macri, L.M.; Scolnic, D.; Brout, D.; Casertano, S.; Jones, D.O.; Murakami, Y.; Anand, G.S.;
1007
+ Breuval, L.; et al. A Comprehensive Measurement of the Local Value of the Hubble Constant with 1 km s−1 Mpc−1
1008
+ Uncertainty from the Hubble Space Telescope and the SH0ES Team. Astrophys. J. Lett. 2022, 934, L7. https://doi.
1009
+ org/10.3847/2041-8213/ac5c5b.
1010
+ [18] Asgari, M.; Lin, C.A.; Joachimi, B.; Giblin, B.; Heymans, C.; Hildebrandt, H.; Kannawadi, A.; Stölzner, B.; Tröster, T.;
1011
+ van den Busch, J.L.; et al. KiDS-1000 cosmology: Cosmic shear constraints and comparison between two point statistics.
1012
+ Astron. Astrophys. 2021, 645, A104. https://doi.org/10.1051/0004-6361/202039070.
1013
+ [19] Lesci, G.F.; Marulli, F.; Moscardini, L.; Sereno, M.; Veropalumbo, A.; Maturi, M.; Giocoli, C.; Radovich, M.; Bellagamba,
1014
+ F.; Roncarelli, M.; et al. AMICO galaxy clusters in KiDS-DR3: Cosmological constraints from counts and stacked weak
1015
+ lensing. Astron. Astrophys. 2022, 659, A88. https://doi.org/10.1051/0004-6361/202040194.
1016
+ [20] Chen, S.F.; Vlah, Z.; White, M. A new analysis of galaxy 2-point functions in the BOSS survey, including full-shape
1017
+ information and post-reconstruction BAO. J. Cosmol. Astropart. Phys. 2022, 2022, 008. https://doi.org/10.1088/
1018
+ 1475-7516/2022/02/008.
1019
+ [21] Capozziello, S.
1020
+ Curvature Quintessence.
1021
+ Int. J. Mod. Phys. D 2002, 11, 483–491.
1022
+ https://doi.org/10.1142/
1023
+ s0218271802002025.
1024
+ [22] Nojiri, S.; Odintsov, S.D. Modified f(R) gravity consistent with realistic cosmology: From a matter dominated epoch to
1025
+ a dark energy universe. Phys. Rev. D 2006, 74, 086005. https://doi.org/10.1103/physrevd.74.086005.
1026
+ [23] Starobinsky, A.A. Disappearing cosmological constant in f(R) gravity. JETP Lett. 2007, 86, 157–163. https://doi.
1027
+ org/10.1134/s0021364007150027.
1028
+ [24] Fay, S.; Nesseris, S.; Perivolaropoulos, L. Can f(R) Modified Gravity Theories Mimic a ΛCDM Cosmology? Phys. Rev.
1029
+ D 2007, 76, 063504. https://doi.org/10.1103/PhysRevD.76.063504.
1030
+ [25] Lazkoz, R.; Ortiz-Baños, M.; Salzano, V. f(R) gravity modifications: From the action to the data. Eur. Phys. J. C 2018,
1031
+ 78, 213. https://doi.org/10.1140/epjc/s10052-018-5711-6.
1032
+ [26] Bajardi, F.; D’Agostino, R.; Benetti, M.; De Falco, V.; Capozziello, S. Early and late time cosmology: The f(R) gravity
1033
+ perspective. Eur. Phys. J. Plus 2022, 137, 1239. https://doi.org/10.1140/epjp/s13360-022-03418-8.
1034
+ [27] D’Agostino, R.; Nunes, R.C. Measurements of H0 in modified gravity theories: The role of lensed quasars in the late-time
1035
+ Universe. Phys. Rev. D 2020, 101, 103505. https://doi.org/10.1103/physrevd.101.103505.
1036
+ [28] Nesseris, S.; Basilakos, S.; Saridakis, E.N.; Perivolaropoulos, L. Viable f(T) models are practically indistinguishable from
1037
+ ΛCDM. Phys. Rev. D 2013, 88, 103010. https://doi.org/10.1103/PhysRevD.88.103010.
1038
+ [29] Cai, Y.F.; Capozziello, S.; De Laurentis, M.; Saridakis, E.N. f(T) teleparallel gravity and cosmology. Rep. Prog. Phys.
1039
+ 2016, 79, 106901. https://doi.org/10.1088/0034-4885/79/10/106901.
1040
+ [30] Golovnev, A.; Koivisto, T. Cosmological perturbations in modified teleparallel gravity models. J. Cosmol. Astropart.
1041
+ Phys. 2018, 11, 012. https://doi.org/10.1088/1475-7516/2018/11/012.
1042
+ [31] Wang, D.; Mota, D. Can f(T) gravity resolve the H0 tension? Phys. Rev. D 2020, 102, 063530. https://doi.org/10.
1043
+ 1103/physrevd.102.063530.
1044
+
1045
+ 15
1046
+ [32] Bahamonde, S.; Dialektopoulos, K.F.; Escamilla-Rivera, C.; Farrugia, G.; Gakis, V.; Hendry, M.; Hohmann, M.;
1047
+ Said, J.L.; Mifsud, J.; Di Valentino, E.
1048
+ Teleparallel Gravity: From Theory to Cosmology. Rep. Prog. Phys. 2022,
1049
+ doi:10.1088/1361-6633/ac9cef.
1050
+ [33] Nojiri, S.; Odintsov, S.D. Modified Gauss-Bonnet theory as gravitational alternative for dark energy. Phys. Lett. B 2005,
1051
+ 631, 1–6. https://doi.org/10.1016/j.physletb.2005.10.010.
1052
+ [34] Li, B.; Barrow, J.D.; Mota, D.F. The Cosmology of Modified Gauss-Bonnet Gravity. Phys. Rev. D 2007, 76, 044027.
1053
+ https://doi.org/10.1103/PhysRevD.76.044027.
1054
+ [35] Myrzakulov, R.; Saez-Gomez, D.; Tureanu, A. On the ΛCDM Universe in f(G) gravity. Gen. Relativ. Gravit. 2011, 43,
1055
+ 1671–1684. https://doi.org/10.1007/s10714-011-1149-y.
1056
+ [36] Bajardi, F.; Capozziello, S. f(G) Noether cosmology. Eur. Phys. J. C 2020, 80, 704. https://doi.org/10.1140/epjc/
1057
+ s10052-020-8258-2.
1058
+ [37] Capozziello, S.; Nesseris, S.; Perivolaropoulos, L. Reconstruction of the Scalar-Tensor Lagrangian from a LCDM Back-
1059
+ ground and Noether Symmetry. J. Cosmol. Astropart. Phys. 2007, 12, 009. https://doi.org/10.1088/1475-7516/
1060
+ 2007/12/009.
1061
+ [38] Heisenberg, L. A systematic approach to generalisations of General Relativity and their cosmological implications. Phys.
1062
+ Rept. 2019, 796, 1–113. https://doi.org/10.1016/j.physrep.2018.11.006.
1063
+ [39] Langlois, D. Dark energy and modified gravity in degenerate higher-order scalar–tensor (DHOST) theories: A review.
1064
+ Int. J. Mod. Phys. D 2019, 28, 1942006. https://doi.org/10.1142/S0218271819420069.
1065
+ [40] D’Agostino, R.; Luongo, O. Growth of matter perturbations in nonminimal teleparallel dark energy. Phys. Rev. D 2018,
1066
+ 98, 124013. https://doi.org/10.1103/physrevd.98.124013.
1067
+ [41] Bajardi, F.; Capozziello, S. Equivalence of nonminimally coupled cosmologies by Noether symmetries. Int. J. Mod. Phys.
1068
+ D 2020, 29, 2030015. https://doi.org/10.1142/s0218271820300153.
1069
+ [42] Amendola, L.; Campos, G.C.; Rosenfeld, R.
1070
+ Consequences of dark matter-dark energy interaction on cosmological
1071
+ parameters derived from type Ia supernova data. Phys. Rev. D 2007, 75, 083506. https://doi.org/10.1103/physrevd.
1072
+ 75.083506.
1073
+ [43] Wang, B.; Abdalla, E.; Atrio-Barandela, F.; Pavón, D. Dark matter and dark energy interactions: Theoretical challenges,
1074
+ cosmological implications and observational signatures. Rep. Prog. Phys. 2016, 79, 096901. https://doi.org/10.1088/
1075
+ 0034-4885/79/9/096901.
1076
+ [44] Di Valentino, E.; Melchiorri, A.; Mena, O. Can interacting dark energy solve the H0 tension? Phys. Rev. D 2017, 96,
1077
+ 043503. https://doi.org/10.1103/physrevd.96.043503.
1078
+ [45] Asghari, M.; Jiménez, J.B.; Khosravi, S.; Mota, D.F. On structure formation from a small-scales-interacting dark sector.
1079
+ J. Cosmol. Astropart. Phys. 2019, 2019, 042. https://doi.org/10.1088/1475-7516/2019/04/042.
1080
+ [46] Yang, W.; Vagnozzi, S.; Di Valentino, E.; Nunes, R.C.; Pan, S.; Mota, D.F.
1081
+ Listening to the sound of dark sector
1082
+ interactions with gravitational wave standard sirens. J. Cosmol. Astropart. Phys. 2019, 2019, 037. https://doi.org/
1083
+ 10.1088/1475-7516/2019/07/037.
1084
+ [47] Saridakis, E.N.; Lazkoz, R.; Salzano, V.; Moniz, P.V.; Capozziello, S.; Jiménez, J.B.; De Laurentis, M.; Olmo, G.J.
1085
+ Modified Gravity and Cosmology: An Update by the CANTATA Network; Springer: Cham, Switzerland, 2021.
1086
+ [48] Di Valentino, E.; Mena, O.; Pan, S.; Visinelli, L.; Yang, W.; Melchiorri, A.; Mota, D.F.; Riess, A.G.; Silk, J. In the
1087
+ realm of the Hubble tension—A review of solutions. Class. Quant. Grav. 2021, 38, 153001. https://doi.org/10.1088/
1088
+ 1361-6382/ac086d.
1089
+ [49] Capozziello, S.; Bajardi, F.
1090
+ Nonlocal gravity cosmology: An overview.
1091
+ Int. J. Mod. Phys. D 2021, 31, 2230009.
1092
+ https://doi.org/10.1142/s0218271822300099.
1093
+ [50] Deser, S.; Woodard, R.P.
1094
+ Nonlocal Cosmology.
1095
+ Phys. Rev. Lett. 2007, 99, 111301.
1096
+ https://doi.org/10.1103/
1097
+ physrevlett.99.111301.
1098
+ [51] Maggiore, M. Phantom dark energy from nonlocal infrared modifications of general relativity. Phys. Rev. D 2014, 89,
1099
+ 043008. https://doi.org/10.1103/physrevd.89.043008.
1100
+ [52] Buoninfante, L.
1101
+ Nonlocal Field Theories: Theoretical and Phenomenological Aspects.
1102
+ Ph.D. Thesis, University of
1103
+ Groningen, Groningen, The Netherlands, 2019. https://doi.org/10.33612/diss.99349099.
1104
+ [53] Biswas, T.; Gerwick, E.; Koivisto, T.; Mazumdar, A. Towards Singularity- and Ghost-Free Theories of Gravity. Phys.
1105
+ Rev. Lett. 2012, 108, 031101. https://doi.org/10.1103/physrevlett.108.031101.
1106
+ [54] Briscese, F.; Marcianò , A.; Modesto, L.; Saridakis, E.N. Inflation in (super-)renormalizable gravity. Phys. Rev. D 2013,
1107
+ 87, 083507. https://doi.org/10.1103/physrevd.87.083507.
1108
+ [55] Biswas, T.; Mazumdar, A.; Siegel, W. Bouncing universes in string-inspired gravity. J. Cosmol. Astropart. Phys. 2006,
1109
+ 2006, 009. https://doi.org/10.1088/1475-7516/2006/03/009.
1110
+ [56] Belgacem, E.; Dirian, Y.; Finke, A.; Foffa, S.; Maggiore, M. Gravity in the infrared and effective nonlocal models. J.
1111
+ Cosmol. Astropart. Phys. 2020, 2020, 010. https://doi.org/10.1088/1475-7516/2020/04/010.
1112
+ [57] Borka, D.; Borka Jovanović, V.; Capozziello, S.; Jovanović, P. Velocity distribution of elliptical galaxies in the framework
1113
+ of Non-local Gravity model. Adv. Space Res. 2022, in press. https://doi.org/https://doi.org/10.1016/j.asr.2022.
1114
+ 08.060.
1115
+ [58] Strominger, A. Lectures on the Infrared Structure of Gravity and Gauge Theory; Princeton University Press: Princeton,
1116
+ NJ, USA, 2018. https://doi.org/10.48550/ARXIV.1703.05448.
1117
+ [59] Reuter, M.; Saueressig, F. A class of nonlocal truncations in quantum Einstein gravity and its renormalization group
1118
+ behavior. Phys. Rev. D 2002, 66, 125001. https://doi.org/10.1103/physrevd.66.125001.
1119
+ [60] Wetterich, C. Infrared limit of quantum gravity. Phys. Rev. D 2018, 98, 026028. https://doi.org/10.1103/physrevd.
1120
+
1121
+ 16
1122
+ 98.026028.
1123
+ [61] Barvinsky, A.O.; Gusev, Y.V.; Mukhanov, V.F.; Nesterov, D.V. Nonperturbative late time asymptotics for heat kernel
1124
+ in gravity theory. Phys. Rev. D 2003, 68, 105003. https://doi.org/10.1103/PhysRevD.68.105003.
1125
+ [62] Barvinsky, A.O. Aspects of nonlocality in quantum field theory, quantum gravity and cosmology. Mod. Phys. Lett. A
1126
+ 2015, 30, 1540003. https://doi.org/10.1142/s0217732315400039.
1127
+ [63] Maggiore, M. Nonlocal Infrared Modifications of Gravity. A Review. In Gravity and the Quantum; Springer: Cham,
1128
+ Switzerland, 2017; pp. 221–281. https://doi.org/10.48550/ARXIV.1606.08784.
1129
+ [64] Nojiri, S.; Odintsov, S.D. Modified non-local-F(R) gravity as the key for the inflation and dark energy. Phys. Lett. B
1130
+ 2008, 659, 821–826. https://doi.org/10.1016/j.physletb.2007.12.001.
1131
+ [65] Kehagias, A.; Maggiore, M. Spherically symmetric static solutions in a nonlocal infrared modification of General Relativity.
1132
+ J. High Energy Phys. 2014, 2014, 29. https://doi.org/10.1007/jhep08(2014)029.
1133
+ [66] Aiola, S.; Calabrese, E.; Maurin, L.; Naess, S.; Schmitt, B.L.; Abitbol, M.H.; Addison, G.E.; Ade, P.A.R.; Alonso, D.;
1134
+ Amiri, M.; et al. The Atacama Cosmology Telescope: DR4 maps and cosmological parameters. J. Cosmol. Astropart.
1135
+ Phys. 2020, 2020, 47. https://doi.org/10.1088/1475-7516/2020/12/047.
1136
+ [67] Tröster, T.; Asgari, M.; Blake, C.; Cataneo, M.; Heymans, C.; Hildebrandt, H.; Joachimi, B.; Lin, C.A.; Sá nchez, A.G.;
1137
+ Wright, A.H.; et al. KiDS-1000 Cosmology: Constraints beyond flat LambdaCDM. Astron. Astrophys. 2021, 649, A88.
1138
+ https://doi.org/10.1051/0004-6361/202039805.
1139
+ [68] Pandey, S.; Krause, E.; DeRose, J.; MacCrann, N.; Jain, B.; Crocce, M.; Blazek, J.; Choi, A.; Huang, H.; To, C.; et al.
1140
+ Dark Energy Survey year 3 results: Constraints on cosmological parameters and galaxy-bias models from galaxy clustering
1141
+ and galaxy-galaxy lensing using the redMaGiC sample. Phys. Rev. D 2022, 106, 043520. https://doi.org/10.1103/
1142
+ physrevd.106.043520.
1143
+ [69] Weinberg, S. The cosmological constant problem. Rev. Mod. Phys. 1989, 61, 1. https://doi.org/10.1103/RevModPhys.
1144
+ 61.1.
1145
+ [70] Velten, H.E.S.; vom Marttens, R.F.; Zimdahl, W. Aspects of the cosmological “coincidence problem”. Eur. Phys. J. C
1146
+ 2014, 74, 3160. https://doi.org/10.1140/epjc/s10052-014-3160-4.
1147
+ [71] Deffayet, C.; Woodard, R. Reconstructing the distortion function for nonlocal cosmology. J. Cosmol. Astropart. Phys.
1148
+ 2009, 2009, 023. https://doi.org/10.1088/1475-7516/2009/08/023.
1149
+ [72] Foffa, S.; Maggiore, M.; Mitsou, E. Cosmological dynamics and dark energy from nonlocal infrared modifications of
1150
+ gravity. Int. J. Mod. Phys. A 2014, 29, 1450116. https://doi.org/10.1142/s0217751x14501164.
1151
+ [73] Calabrese, E.; Slosar, A.; Melchiorri, A.; Smoot, G.F.; Zahn, O. Cosmic microwave weak lensing data as a test for the
1152
+ dark universe. Phys. Rev. D 2008, 77, 123531. https://doi.org/10.1103/physrevd.77.123531.
1153
+ [74] Hildebrandt, H.; Viola, M.; Heymans, C.; Joudaki, S.; Kuijken, K.; Blake, C.; Erben, T.; Joachimi, B.; Klaes, D.; Miller,
1154
+ L.; et al. KiDS-450: Cosmological parameter constraints from tomographic weak gravitational lensing. Mon. Not. R.
1155
+ Astron. Soc. 2016, 465, 1454–1498. https://doi.org/10.1093/mnras/stw2805.
1156
+ [75] Hildebrandt, H.; Köhlinger, F.; van den Busch, J.L.; Joachimi, B.; Heymans, C.; Kannawadi, A.; Wright, A.H.; Asgari,
1157
+ M.; Blake, C.; Hoekstra, H.; et al. KiDS+VIKING-450: Cosmic shear tomography with optical and infrared data. Astron.
1158
+ Astrophys. 2020, 633, A69. https://doi.org/10.1051/0004-6361/201834878.
1159
+ [76] Köhlinger, F.; Viola, M.; Joachimi, B.; Hoekstra, H.; van Uitert, E.; Hildebrandt, H.; Choi, A.; Erben, T.; Heymans, C.;
1160
+ Joudaki, S.; et al. KiDS-450: The tomographic weak lensing power spectrum and constraints on cosmological parameters.
1161
+ Mon. Not. R. Astron. Soc. 2017, 471, 4412–4435. https://doi.org/10.1093/mnras/stx1820.
1162
+ [77] Wright, A.H.; Hildebrandt, H.; van den Busch, J.L.; Heymans, C.; Joachimi, B.; Kannawadi, A.; Kuijken, K.
1163
+ KiDS+VIKING-450: Improved cosmological parameter constraints from redshift calibration with self-organising maps.
1164
+ Astron. Astrophys. 2020, 640, L14. https://doi.org/10.1051/0004-6361/202038389.
1165
+ [78] Troxel, M.; MacCrann, N.; Zuntz, J.; Eifler, T.; Krause, E.; Dodelson, S.; Gruen, D.; Blazek, J.; Friedrich, O.; Samuroff,
1166
+ S.; et al. Dark Energy Survey Year 1 results: Cosmological constraints from cosmic shear. Phys. Rev. D 2018, 98, 043528.
1167
+ https://doi.org/10.1103/physrevd.98.043528.
1168
+ [79] Joudaki, S.; Hildebrandt, H.; Traykova, D.; Chisari, N.E.; Heymans, C.; Kannawadi, A.; Kuijken, K.; Wright, A.H.;
1169
+ Asgari, M.; Erben, T.; et al.
1170
+ KiDS+VIKING-450 and DES-Y1 combined: Cosmology with cosmic shear.
1171
+ Astron.
1172
+ Astrophys. 2020, 638, L1. https://doi.org/10.1051/0004-6361/201936154.
1173
+ [80] Asgari, M.; Tröster, T.; Heymans, C.; Hildebrandt, H.; van den Busch, J.L.; Wright, A.H.; Choi, A.; Erben, T.; Joachimi,
1174
+ B.; Joudaki, S.; et al. KiDS+VIKING-450 and DES-Y1 combined: Mitigating baryon feedback uncertainty with COSEBIs.
1175
+ Astron. Astrophys. 2020, 634, A127. https://doi.org/10.1051/0004-6361/201936512.
1176
+ [81] Loureiro, A.; Whittaker, L.; Mancini, A.S.; Joachimi, B.; Cuceu, A.; Asgari, M.; Stölzner, B.; Tröster, T.; Wright, A.H.;
1177
+ Bilicki, M.; et al. KiDS and Euclid: Cosmological implications of a pseudo angular power spectrum analysis of KiDS-1000
1178
+ cosmic shear tomography. Astron. Astrophys. 2022, 665. https://doi.org/10.1051/0004-6361/202142481.
1179
+ [82] Chang, C.; Omori, Y.; Baxter, E.J.; Doux, C.; Choi, A.; Pandey, S.; Alarcon, A.; Alves, O.; Amon, A.; Andrade-Oliveira,
1180
+ F.; et al. Joint analysis of DES Year 3 data and CMB lensing from SPT and Planck II: Cross-correlation measurements
1181
+ and cosmological constraints. arXiv Prepr. 2022, arXiv:2203.12440. https://doi.org/10.48550/ARXIV.2203.12440.
1182
+ [83] Amon, A.; Gruen, D.; Troxel, M.; MacCrann, N.; Dodelson, S.; Choi, A.; Doux, C.; Secco, L.; Samuroff, S.; Krause, E.;
1183
+ et al. Dark Energy Survey Year 3 results: Cosmology from cosmic shear and robustness to data calibration. Phys. Rev.
1184
+ D 2022, 105, 023514. https://doi.org/10.1103/physrevd.105.023514.
1185
+ [84] Secco, L.; Samuroff, S.; Krause, E.; Jain, B.; Blazek, J.; Raveri, M.; Campos, A.; Amon, A.; Chen, A.; Doux, C.; et al.
1186
+ Dark Energy Survey Year 3 results: Cosmology from cosmic shear and robustness to modeling uncertainty. Phys. Rev. D
1187
+ 2022, 105, 023515. https://doi.org/10.1103/physrevd.105.023515.
1188
+
1189
+ 17
1190
+ [85] Heymans, C.; Tröster, T.; Asgari, M.; Blake, C.; Hildebrandt, H.; Joachimi, B.; Kuijken, K.; Lin, C.A.; Sá nchez, A.G.;
1191
+ van den Busch, J.L.; et al.
1192
+ KiDS-1000 Cosmology: Multi-probe weak gravitational lensing and spectroscopic galaxy
1193
+ clustering constraints. Astron. Astrophys. 2021, 646, A140. https://doi.org/10.1051/0004-6361/202039063.
1194
+ [86] Mantz, A.B.; von der Linden, A.; Allen, S.W.; Applegate, D.E.; Kelly, P.L.; Morris, R.G.; Rapetti, D.A.; Schmidt, R.W.;
1195
+ Adhikari, S.; Allen, M.T.; et al. Weighing the giants – IV. Cosmology and neutrino mass. Mon. Not. R. Astron. Soc.
1196
+ 2014, 446, 2205–2225. https://doi.org/10.1093/mnras/stu2096.
1197
+ [87] Salvati, L.; Douspis, M.; Aghanim, N. Constraints from thermal Sunyaev-Zel’dovich cluster counts and power spectrum
1198
+ combined with CMB. Astron. Astrophys. 2018, 614, A13. https://doi.org/10.1051/0004-6361/201731990.
1199
+ [88] Costanzi, M.; Rozo, E.; Simet, M.; Zhang, Y.; Evrard, A.E.; Mantz, A.; Rykoff, E.S.; Jeltema, T.; Gruen, D.; Allen, S.;
1200
+ et al. Methods for cluster cosmology and application to the SDSS in preparation for DES Year 1 release. Mon. Not. R.
1201
+ Astron. Soc. 2019, 488, 4779–4800. https://doi.org/10.1093/mnras/stz1949.
1202
+ [89] Bocquet, S.; Dietrich, J.P.; Schrabback, T.; Bleem, L.E.; Klein, M.; Allen, S.W.; Applegate, D.E.; Ashby, M.L.N.;
1203
+ Bautz, M.; Bayliss, M.; et al. Cluster Cosmology Constraints from the 2500 deg2 SPT-SZ Survey: Inclusion of Weak
1204
+ Gravitational Lensing Data from Magellan and the Hubble Space Telescope.
1205
+ Astrophys. J. 2019, 878, 55.
1206
+ https:
1207
+ //doi.org/10.3847/1538-4357/ab1f10.
1208
+ [90] Abbott, T.; Aguena, M.; Alarcon, A.; Allam, S.; Allen, S.; Annis, J.; Avila, S.; Bacon, D.; Bechtol, K.; Bermeo, A.; et al.
1209
+ Dark Energy Survey Year 1 Results: Cosmological constraints from cluster abundances and weak lensing. Phys. Rev. D
1210
+ 2020, 102, 023509. https://doi.org/10.1103/physrevd.102.023509.
1211
+ [91] Abdullah, M.H.; Klypin, A.; Wilson, G. Cosmological Constraints on ΩM and σ8 from Cluster Abundances Using the
1212
+ GalWCat19 Optical-spectroscopic SDSS Catalog. Astrophys. J. 2020, 901, 90. https://doi.org/10.3847/1538-4357/
1213
+ aba619.
1214
+ [92] Kazantzidis, L.; Perivolaropoulos, L. Evolution of the fσ8 tension with the Planck15/ΛCDM determination and implica-
1215
+ tions for modified gravity theories. Phys. Rev. D 2018, 97, 103503. https://doi.org/10.1103/physrevd.97.103503.
1216
+ [93] Benisty, D. Quantifying the S8 tension with the Redshift Space Distortion data set. Phys. Dark Universe 2021, 31,
1217
+ 100766. https://doi.org/10.1016/j.dark.2020.100766.
1218
+ [94] Nunes, R.C.; Vagnozzi, S. Arbitrating the S8 discrepancy with growth rate measurements from redshift-space distortions.
1219
+ Mon. Not. R. Astron. Soc. 2021, 505, 5427–5437. https://doi.org/10.1093/mnras/stab1613.
1220
+ [95] Philcox, O.H.; Ivanov, M.M. BOSS DR12 full-shape cosmology: ΛCDM constraints from the large-scale galaxy power
1221
+ spectrum and bispectrum monopole. Phys. Rev. D 2022, 105, 043517. https://doi.org/10.1103/physrevd.105.043517.
1222
+ [96] Nersisyan, H.; Cid, A.F.; Amendola, L. Structure formation in the Deser-Woodard nonlocal gravity model: A reappraisal.
1223
+ J. Cosmol. Astropart. Phys. 2017, 2017, 046. https://doi.org/10.1088/1475-7516/2017/04/046.
1224
+ [97] Park, S. Revival of the Deser-Woodard nonlocal gravity model: Comparison of the original nonlocal form and a localized
1225
+ formulation. Phys. Rev. D 2018, 97, 044006. https://doi.org/10.1103/physrevd.97.044006.
1226
+ [98] Amendola, L.; Dirian, Y.; Nersisyan, H.; Park, S. Observational constraints in nonlocal gravity: The Deser-Woodard
1227
+ case. J. Cosmol. Astropart. Phys. 2019, 2019, 045. https://doi.org/10.1088/1475-7516/2019/03/045.
1228
+ [99] Joudaki, S.; Blake, C.; Heymans, C.; Choi, A.; Harnois-Deraps, J.; Hildebrandt, H.; Joachimi, B.; Johnson, A.; Mead,
1229
+ A.; Parkinson, D.; et al. CFHTLenS revisited: Assessing concordance with Planck including astrophysical systematics.
1230
+ Mon. Not. R. Astron. Soc. 2016, 465, 2033–2052. https://doi.org/10.1093/mnras/stw2665.
1231
+ [100] Ivanov, M.M. Cosmological constraints from the power spectrum of eBOSS emission line galaxies. Phys. Rev. D 2021,
1232
+ 104, 103514. https://doi.org/10.1103/physrevd.104.103514.
1233
+ [101] Ivanov, M.M.; Simonović , M.; Zaldarriaga, M. Cosmological parameters from the BOSS galaxy power spectrum. J.
1234
+ Cosmol. Astropart. Phys. 2020, 2020, 042. https://doi.org/10.1088/1475-7516/2020/05/042.
1235
+ [102] White, M.; Zhou, R.; DeRose, J.; Ferraro, S.; Chen, S.F.; Kokron, N.; Bailey, S.; Brooks, D.; Garcí a-Bellido, J.; Guy,
1236
+ J.; et al. Cosmological constraints from the tomographic cross-correlation of DESI Luminous Red Galaxies and Planck
1237
+ CMB lensing. J. Cosmol. Astropart. Phys. 2022, 2022, 007. https://doi.org/10.1088/1475-7516/2022/02/007.
1238
+ [103] Jeffreys, H. The Theory of Probability; Oxford University Press: Oxford, UK, 1998.
1239
+ [104] Nesseris, S.; Tsujikawa, S. Cosmological perturbations and observational constraints on nonlocal massive gravity. Phys.
1240
+ Rev. D 2014, 90, 024070. https://doi.org/10.1103/physrevd.90.024070.
1241
+ [105] Dutcher, D.; Balkenhol, L.; Ade, P.; Ahmed, Z.; Anderes, E.; Anderson, A.; Archipley, M.; Avva, J.; Aylor, K.; Barry,
1242
+ P.; et al. Measurements of the E-mode polarization and temperature-E-mode correlation of the CMB from SPT-3G 2018
1243
+ data. Phys. Rev. D 2021, 104, 022003. https://doi.org/10.1103/physrevd.104.022003.
1244
+ [106] Wang, K.; Huang, Q.G. Implications for cosmology from ground-based Cosmic Microwave Background observations. J.
1245
+ Cosmol. Astropart. Phys. 2020, 2020, 045. https://doi.org/10.1088/1475-7516/2020/06/045.
1246
+ [107] Balkenhol, L.; Dutcher, D.; Ade, P.; Ahmed, Z.; Anderes, E.; Anderson, A.; Archipley, M.; Avva, J.; Aylor, K.; Barry,
1247
+ P.; et al. Constraints on ΛCDM extensions from the SPT-3G 2018 EE and TE power spectra. Phys. Rev. D 2021, 104,
1248
+ 083509. https://doi.org/10.1103/physrevd.104.083509.
1249
+ [108] Addison, G.E. High H0 values from CMB E-mode Data: A Clue for Resolving the Hubble Tension? Astrophys. J. Lett.
1250
+ 2021, 912, L1. https://doi.org/10.3847/2041-8213/abf56e.
1251
+ [109] D’Amico, G.; Gleyzes, J.; Kokron, N.; Markovic, K.; Senatore, L.; Zhang, P.; Beutler, F.; Gil-Marín, H. The cosmological
1252
+ analysis of the SDSS/BOSS data from the Effective Field Theory of Large-Scale Structure. J. Cosmol. Astropart. Phys.
1253
+ 2020, 2020, 005. https://doi.org/10.1088/1475-7516/2020/05/005.
1254
+ [110] Colas, T.; D’Amico, G.; Senatore, L.; Zhang, P.; Beutler, F. Efficient cosmological analysis of the SDSS/BOSS data from
1255
+ the Effective Field Theory of Large-Scale Structure. J. Cosmol. Astropart. Phys. 2020, 2020, 001. https://doi.org/10.
1256
+ 1088/1475-7516/2020/06/001.
1257
+
1258
+ 18
1259
+ [111] Cooke, R.J.; Pettini, M.; Steidel, C.C. One Percent Determination of the Primordial Deuterium Abundance. Astrophys.
1260
+ J. 2018, 855, 102. https://doi.org/10.3847/1538-4357/aaab53.
1261
+ [112] Scolnic, D.M.; Jones, D.O.; Rest, A.; Pan, Y.C.; Chornock, R.; Foley, R.J.; Huber, M.E.; Kessler, R.; Narayan, G.;
1262
+ Riess, A.G.; et al. The Complete Light-curve Sample of Spectroscopically Confirmed SNe Ia from Pan-STARRS1 and
1263
+ Cosmological Constraints from the Combined Pantheon Sample. Astrophys. J. 2018, 859, 101. https://doi.org/10.
1264
+ 3847/1538-4357/aab9bb.
1265
+ [113] Abbott, T.; Abdalla, F.; Alarcon, A.; Aleksić, J.; Allam, S.; Allen, S.; Amara, A.; Annis, J.; Asorey, J.; Avila, S.; et al.
1266
+ Dark Energy Survey year 1 results: Cosmological constraints from galaxy clustering and weak lensing. Phys. Rev. D
1267
+ 2018, 98, 043526. https://doi.org/10.1103/physrevd.98.043526.
1268
+ [114] Krause, E.; Eifler, T.F.; Zuntz, J.; Friedrich, O.; Troxel, M.A.; Dodelson, S.; Blazek, J.; Secco, L.F.; MacCrann, N.;
1269
+ Baxter, E.; et al. Dark Energy Survey Year 1 Results: Multi-Probe Methodology and Simulated Likelihood Analyses.
1270
+ arXiv Prepr. 2017, arXiv:1706.09359. https://doi.org/10.48550/ARXIV.1706.09359.
1271
+ [115] Riess, A.G. The expansion of the Universe is faster than expected. Nat. Rev. Phys. 2019, 2, 10–12. https://doi.org/
1272
+ 10.1038/s42254-019-0137-0.
1273
+ [116] Riess, A.G.; Macri, L.; Casertano, S.; Lampeitl, H.; Ferguson, H.C.; Filippenko, A.V.; Jha, S.W.; Li, W.; Chornock, R.
1274
+ A 3% solution: Determination of the Hubble constant with the Hubble Space Telescope and the Wide Field Camera 3.
1275
+ Astrophys. J. 2011, 730, 119. https://doi.org/10.1088/0004-637x/730/2/119.
1276
+ [117] Riess, A.G.; Macri, L.M.; Hoffmann, S.L.; Scolnic, D.; Casertano, S.; Filippenko, A.V.; Tucker, B.E.; Reid, M.J.; Jones,
1277
+ D.O.; Silverman, J.M.; et al. A 2.4% determination of the local value of the Hubble constant. Astrophys. J. 2016, 826,
1278
+ 56. https://doi.org/10.3847/0004-637x/826/1/56.
1279
+ [118] Riess, A.G.; Casertano, S.; Yuan, W.; Bowers, J.B.; Macri, L.; Zinn, J.C.; Scolnic, D. Cosmic Distances Calibrated to
1280
+ 1% Precision with Gaia EDR3 Parallaxes and Hubble Space Telescope Photometry of 75 Milky Way Cepheids Confirm
1281
+ Tension with ΛCDM. Astrophys. J. Lett. 2021, 908, L6. https://doi.org/10.3847/2041-8213/abdbaf.
1282
+ [119] Gaia Collaboration.; Brown, A. G. A..; Vallenari, A..; Prusti, T..; de Bruijne, J. H. J..; Babusiaux, C..; Biermann, M..;
1283
+ Creevey, O. L..; Evans, D. W..; Eyer, L..; et al.
1284
+ Gaia Early Data Release 3—Summary of the contents and survey
1285
+ properties. Astron. Astrophys. 2021, 649. https://doi.org/10.1051/0004-6361/202039657.
1286
+ [120] Lindegren, L..; Bastian, U..; Biermann, M..; Bombrun, A..; de Torres, A..; Gerlach, E..; Geyer, R..; Hernández, J..; Hilger,
1287
+ T..; Hobbs, D..; et al. Gaia Early Data Release 3 - Parallax bias versus magnitude, colour, and position. Astronomy &
1288
+ Astrophysics 2021, 649, A1. https://doi.org/10.1051/0004-6361/202039653.
1289
+ [121] Wong, K.C.; Suyu, S.H.; Chen, G.C.F.; Rusu, C.E.; Millon, M.; Sluse, D.; Bonvin, V.; Fassnacht, C.D.; Taubenberger, S.;
1290
+ Auger, M.W.; et al. H0LiCOW - XIII. A 2.4 per cent measurement of H0 from lensed quasars: 5.3σ tension between early-
1291
+ and late-Universe probes. Mon. Not. R. Astron. Soc. 2019, 498, 1420–1439. https://doi.org/10.1093/mnras/stz3094.
1292
+ [122] Shajib, A.J.; Birrer, S.; Treu, T.; Agnello, A.; Buckley-Geer, E.J.; Chan, J.H.H.; Christensen, L.; Lemon, C.; Lin, H.;
1293
+ Millon, M.; et al. STRIDES: A 3.9 per cent measurement of the Hubble constant from the strong lens system DES
1294
+ J0408-5354. Mon. Not. R. Astron. Soc. 2020, 494, 6072–6102. https://doi.org/10.1093/mnras/staa828.
1295
+ [123] Yuan, W.; Riess, A.G.; Macri, L.M.; Casertano, S.; Scolnic, D.M. Consistent Calibration of the Tip of the Red Giant
1296
+ Branch in the Large Magellanic Cloud on the Hubble Space Telescope Photometric System and a Re-determination of
1297
+ the Hubble Constant. Astrophys. J. 2019, 886, 61. https://doi.org/10.3847/1538-4357/ab4bc9.
1298
+ [124] Huang, C.D.; Riess, A.G.; Yuan, W.; Macri, L.M.; Zakamska, N.L.; Casertano, S.; Whitelock, P.A.; Hoffmann, S.L.;
1299
+ Filippenko, A.V.; Scolnic, D. Hubble Space Telescope Observations of Mira Variables in the SN Ia Host NGC 1559: An
1300
+ Alternative Candle to Measure the Hubble Constant. Astrophys. J. 2020, 889, 5. https://doi.org/10.3847/1538-4357/
1301
+ ab5dbd.
1302
+ [125] Reid, M.J.; Pesce, D.W.; Riess, A.G. An Improved Distance to NGC 4258 and Its Implications for the Hubble Constant.
1303
+ Astrophys. J. 2019, 886, L27. https://doi.org/10.3847/2041-8213/ab552d.
1304
+ [126] Zhang, P.; D’Amico, G.; Senatore, L.; Zhao, C.; Cai, Y. BOSS Correlation Function analysis from the Effective Field
1305
+ Theory of Large-Scale Structure. J. Cosmol. Astropart. Phys. 2022, 2022, 036. https://doi.org/10.1088/1475-7516/
1306
+ 2022/02/036.
1307
+ [127] Wang, Y.; Xu, L.; Zhao, G.B. A Measurement of the Hubble Constant Using Galaxy Redshift Surveys. Astrophys. J.
1308
+ 2017, 849, 84. https://doi.org/10.3847/1538-4357/aa8f48.
1309
+ [128] Farren, G.S.; Philcox, O.H.; Sherwin, B.D. Determining the Hubble constant without the sound horizon: Perspectives
1310
+ with future galaxy surveys. Phys. Rev. D 2022, 105, 063503. https://doi.org/10.1103/physrevd.105.063503.
1311
+ [129] Philcox, O.H.; Sherwin, B.D.; Farren, G.S.; Baxter, E.J. Determining the Hubble constant without the sound horizon:
1312
+ Measurements from galaxy surveys. Phys. Rev. D 2021, 103, 023538. https://doi.org/10.1103/physrevd.103.023538.
1313
+ [130] Anand, G.S.; Tully, R.B.; Rizzi, L.; Riess, A.G.; Yuan, W. Comparing Tip of the Red Giant Branch Distance Scales: An
1314
+ Independent Reduction of the Carnegie-Chicago Hubble Program and the Value of the Hubble Constant. Astrophys. J.
1315
+ 2022, 932, 15. https://doi.org/10.3847/1538-4357/ac68df.
1316
+ [131] de Jaeger, T.; Galbany, L.; Riess, A.G.; Stahl, B.E.; Shappee, B.J.; Filippenko, A.V.; Zheng, W. A 5% measurement of
1317
+ the Hubble constant from Type II supernovae. Mon. Not. R. Astron. Soc. 2022, 514, 4620–4628. https://doi.org/10.
1318
+ 1093/mnras/stac1661.
1319
+ [132] Denzel, P.; Coles, J.P.; Saha, P.; Williams, L.L.R. The Hubble constant from eight time-delay galaxy lenses. Mon. Not.
1320
+ R. Astron. Soc. 2020, 501, 784–801. https://doi.org/10.1093/mnras/staa3603.
1321
+ [133] Chen, G.C.F.; Fassnacht, C.D.; Suyu, S.H.; Rusu, C.E.; Chan, J.H.H.; Wong, K.C.; Auger, M.W.; Hilbert, S.; Bonvin,
1322
+ V.; Birrer, S.; et al. A SHARP view of H0LiCOW: H0 from three time-delay gravitational lens systems with adaptive
1323
+ optics imaging. Mon. Not. R. Astron. Soc. 2019, 490, 1743–1773. https://doi.org/10.1093/mnras/stz2547.
1324
+
1325
+ 19
1326
+ [134] Mukherjee, S.; Krolewski, A.; Wandelt, B.D.; Silk, J. Cross-correlating dark sirens and galaxies: Measurement of H0
1327
+ from GWTC-3 of LIGO-Virgo-KAGRA. arXiv Prepr. 2022, arXiv:2203.03643. https://doi.org/10.48550/ARXIV.2203.
1328
+ 03643.
1329
+ [135] The LIGO Scientific Collaboration; The Virgo Collaboration; The KAGRA Collaboration; Abbott, R.; Abe, H.; Acernese,
1330
+ F.; Ackley, K.; Adhikari, N.; Adhikari, R.X.; Adkins, V.K.; et al. Constraints on the cosmic expansion history from
1331
+ GWTC-3. arXiv Prepr. 2021, arXiv:2111.03604. https://doi.org/10.48550/ARXIV.2111.03604.
1332
+ [136] Gayathri, V.; Healy, J.; Lange, J.; O’Brien, B.; Szczepanczyk, M.; Bartos, I.; Campanelli, M.; Klimenko, S.; Lousto, C.;
1333
+ O’Shaughnessy, R. Hubble Constant Measurement with GW190521 as an Eccentric Black Hole Merger. arXiv Prepr.,
1334
+ 2020, arXiv:2009.14247. https://doi.org/10.48550/ARXIV.2009.14247.
1335
+ [137] Pesce, D.W.; Braatz, J.A.; Reid, M.J.; Riess, A.G.; Scolnic, D.; Condon, J.J.; Gao, F.; Henkel, C.; Impellizzeri, C.M.V.;
1336
+ Kuo, C.Y.; et al. The Megamaser Cosmology Project. XIII. Combined Hubble Constant Constraints. Astrophys. J. 2020,
1337
+ 891, L1. https://doi.org/10.3847/2041-8213/ab75f0.
1338
+ [138] Kourkchi, E.; Tully, R.B.; Anand, G.S.; Courtois, H.M.; Dupuy, A.; Neill, J.D.; Rizzi, L.; Seibert, M. Cosmicflows-4: The
1339
+ Calibration of Optical and Infrared Tully—Fisher Relations. Astrophys. J. 2020, 896, 3. https://doi.org/10.3847/
1340
+ 1538-4357/ab901c.
1341
+ [139] Blakeslee, J.P.; Jensen, J.B.; Ma, C.P.; Milne, P.A.; Greene, J.E. The Hubble Constant from Infrared Surface Brightness
1342
+ Fluctuation Distances. Astrophys. J. 2021, 911, 65. https://doi.org/10.3847/1538-4357/abe86a.
1343
+ [140] Dialektopoulos, K.F.; Borka, D.; Capozziello, S.; Borka Jovanović, V.; Jovanović, P. Constraining nonlocal gravity by S2
1344
+ star orbits. Phys. Rev. D 2019, 99, 044053. https://doi.org/10.1103/PhysRevD.99.044053.
1345
+ [141] Bouchè, F.; Capozziello, S.; Salzano, V.; Umetsu, K. Testing non-local gravity by clusters of galaxies. Eur. Phys. J. C
1346
+ 2022, 82, 652, https://doi.org/10.1140/epjc/s10052-022-10586-5.
1347
+ [142] Capozziello, S.; De Ritis, R.; Rubano, C.; Scudellaro, P. Noether symmetries in cosmology. La Rivista del Nuovo Cimento
1348
+ 1996, 19N4, 1–114. https://doi.org/10.1007/BF02742992.
1349
+ [143] Capozziello, S.; D’Agostino, R.; Luongo, O. The phase-space view of non-local gravity cosmology. Phys. Lett. B 2022,
1350
+ 834, 137475. https://doi.org/10.1016/j.physletb.2022.137475.
1351
+ [144] Capozziello, S.; Lambiase, G. PeV IceCube signals and H0 tension in the framework of Non-Local Gravity. arXiv Prepr.
1352
+ 2022, arXiv:2206.03690. https://doi.org/10.48550/ARXIV.2206.03690.
1353
+ [145] Dialektopoulos, K.F.; Capozziello, S. Noether symmetries as a geometric criterion to select theories of gravity. Int. J.
1354
+ Geom. Methods Mod. Phys. 2018, 15, 1840007. https://doi.org/10.1142/s0219887818400078.
1355
+ [146] Gillessen, S.; Eisenhauer, F.; Trippe, S.; Alexander, T.; Genzel, R.; Martins, F.; Ott, T. Monitoring stellar orbits around
1356
+ the massive black hole in the galactic centre. Astrophys. J. 2009, 692, 1075. https://doi.org/10.1088/0004-637x/
1357
+ 692/2/1075.
1358
+ [147] Postman, M.; Coe, D.; Benítez, N.; Bradley, L.; Broadhurst, T.; Donahue, M.; Ford, H.; Graur, O.; Graves, G.; Jouvel,
1359
+ S.; et al. The Cluster Lensing And Supernova survey with Hubble: An overview. Astrophys. J. Suppl. Ser. 2012, 199, 25.
1360
+ https://doi.org/10.1088/0067-0049/199/2/25.
1361
+ [148] Umetsu, K.; Zitrin, A.; Gruen, D.; Merten, J.; Donahue, M.; Postman, M. CLASH: Joint analysis of strong-lensing,
1362
+ weak-lensing shear, and magnification data for 20 galaxy clusters. Astrophys. J. 2016, 821, 116. https://doi.org/10.
1363
+ 3847/0004-637X/821/2/116.
1364
+ [149] Burstein, D.; Bender, R.; Faber, S.; Nolthenius, R.
1365
+ Global Relationships Among the Physical Properties of Stellar
1366
+ Systems. Astron. J. 1997, 114. https://doi.org/10.1086/118570.
1367
+ [150] Belgacem, E.; Finke, A.; Frassino, A.; Maggiore, M. Testing nonlocal gravity with Lunar Laser Ranging. J. Cosmol.
1368
+ Astropart. Phys. 2019, 2019, 035. https://doi.org/10.1088/1475-7516/2019/02/035.
1369
+ [151] Vainshtein, A. To the problem of nonvanishing gravitation mass. Phys. Lett. B 1972, 39, 393–394. https://doi.org/
1370
+ https://doi.org/10.1016/0370-2693(72)90147-5.
1371
+ [152] Belgacem, E.; Dirian, Y.; Foffa, S.; Maggiore, M. Gravitational-wave luminosity distance in modified gravity theories.
1372
+ Phys. Rev. D 2018, 97, 104066. https://doi.org/10.1103/physrevd.97.104066.
1373
+ [153] Belgacem, E.; Dirian, Y.; Foffa, S.; Maggiore, M. Modified gravitational-wave propagation and standard sirens. Phys.
1374
+ Rev. D 2018, 98, 023510. https://doi.org/10.1103/physrevd.98.023510.
1375
+ [154] Abbott, B.P.; Abbott, R.; Abbott, T.D.; Acernese, F.; Ackley, K.; Adams, C.; Adams, T.; Addesso, P.; Adhikari, R.X.;
1376
+ Adya, V.B.; et al. Gravitational Waves and Gamma-Rays from a Binary Neutron Star Merger: GW170817 and GRB
1377
+ 170817A. Astrophys. J. 2017, 848, L13. https://doi.org/10.3847/2041-8213/aa920c.
1378
+
EdAzT4oBgHgl3EQfiv0h/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
GdAzT4oBgHgl3EQfHfsT/content/2301.01044v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:26e51f1f84cbced899d3e749d3156d6dcc0ff3f14c0766b6b2a546d8a40f5f39
3
+ size 983080
GdAzT4oBgHgl3EQfHfsT/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:04071f60b7794af0b2f4ffc14ffa1a615373752da79cabbf997956ad012b0a7e
3
+ size 176024
GtFLT4oBgHgl3EQfHC_F/content/tmp_files/2301.11995v1.pdf.txt ADDED
@@ -0,0 +1,1568 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A NEW SYMMETRIC HOMOMORPHIC FUNCTIONAL
2
+ ENCRYPTION OVER A HIDDEN RING FOR POLYNOMIAL PUBLIC
3
+ KEY ENCAPSULATIONS
4
+ Randy Kuang, Maria Perepechaenko, Ryan Toth
5
+ Quantropi Inc.
6
+ Ottawa, Canada
7
+ {randy.kuang, maria.perepechaenko, ryan.toth}@quantropi.com
8
+ ABSTRACT
9
+ This paper proposes a new homomorphic functional encryption using modular multiplications over
10
+ a hidden ring. Unlike traditional homomorphic encryption where users can only passively perform
11
+ ciphertext addition or multiplication, the homomorphic functional encryption retains homomorphic
12
+ addition and scalar multiplication properties, but also allows for the user’s inputs through polynomial
13
+ variables. The homomorphic encryption key consists of a pair of values, one used to create the hidden
14
+ ring and the other taken from this ring to form an encryption operator for modular multiplication en-
15
+ cryption. The proposed homomorphic encryption can be applied to any polynomials over a finite field,
16
+ with their coefficients considered as their privacy. We denote the polynomials before homomorphic
17
+ encryption as plain polynomials and after homomorphic encryption as cipher polynomials. A cipher
18
+ polynomial can be evaluated with variables from the finite field, GF(p), by calculating the monomials
19
+ of variables modulo a prime p. These properties allow functional homomorphic encryption to be
20
+ used for public key encryption of certain asymmetric cryptosystems, such as Multivariate Public Key
21
+ Cryptography schemes or MPKC to hide the structure of its central map construction. We propose
22
+ a new variant of MPKC with homomorphic encryption of its public key. This variant simplifies
23
+ MPKC central map to two multivariate polynomials constructed from polynomial multiplications,
24
+ applying homomorphic encryption to the map, and changing its decryption from employing inverse
25
+ maps to a polynomial division. We propose to use a single plaintext vector and a noise vector of
26
+ multiple variables to be associated with the central map, in place of the secret plaintext vector to be
27
+ encrypted in MPKC. We call this variant of encrypted MPKC, a Homomorphic Polynomial Public
28
+ Key algorithm or HPPK algorithm. The HPPK algorithm holds the property of indistinguishability
29
+ under the chosen-plaintext attacks or IND-CPA. The overall classical complexity to crack the HPPK
30
+ algorithm is exponential in the size of the prime field GF(p). We briefly report on benchmarking
31
+ performance results using the SUPERCOP toolkit. Benchmarking results demonstrate that HPPK
32
+ offers rather fast performance, which is comparable and in some cases outperforms the NIST PQC
33
+ finalists for key generation, encryption, and decryption.
34
+ Keywords Homomorphic Functional Encryption · Post-Quantum Cryptography · Public-Key Cryptography · PQC ·
35
+ Key Encapsulation Mechanism · KEM · Multivariate Public Key Cryptosystem · MPKC · PQC Performance.
36
+ 1
37
+ Introduction
38
+ Homomorphic encryption was first proposed by Rivest et al. in 1978 [1], one year after filing the patent for the
39
+ RSA public key cryptography [2]. Homomorphic encryption commonly refers to privacy encryption for computation
40
+ in an encrypted mode, without knowing the homomorphic key and the decryption procedure. This is noticeably
41
+ different from the cryptographic algorithms used to encrypt data for secure communications or storage with public key
42
+ mechanisms such as RSA [2] and Diffie-Hellman [3], and Elliptic Curve Cryptography [4, 5] to establish the shared key
43
+ for symmetric encryption using algorithms as Advanced Encryption Standard or AES.
44
+ arXiv:2301.11995v1 [cs.CR] 27 Jan 2023
45
+
46
+ Novel Homomorphic Functional Encryption over a Hidden Ring
47
+ Homomorphic encryption can be classified into partially homomorphic and fully homomorphic. The partially homomor-
48
+ phic encryption supports either multiplicative or additive homomorphic operations, RSA [6] and ElGamal cryptosystems
49
+ [7] are multiplicatively homomorphic; Goldwasser–Micali [8], Benaloh [9], and Paillier [10] are additively homo-
50
+ morphic. The first milestone for fully homomorphic encryption was achieved by Gentry in 2009 using lattice-based
51
+ cryptography [11] to support both addition and multiplication operators in the encrypted mode. Meanwhile, Chan in
52
+ 2009 proposed a symmetric homomorphic scheme based on improved Hill Cipher [12]. Kipnis and Hibshoosh proposed
53
+ their symmetric homomorphic scheme in 2012 [13] with a randomization function for non-deterministic encryption.
54
+ Gupta and Sharma proposed their symmetric homomorphic scheme based on linear algebraic computation in 2013 [14].
55
+ Very recently, Li et al. in 2016 proposed a new symmetric homomorphic scheme, called Li-Scheme for outsourcing
56
+ databases [15]. Their scheme, at large, is associated with two finite fields: a secret small field Fq and a big public field
57
+ Fp, with modular exponentiation with its secret base s followed by modular multiplication with plaintext message m.
58
+ Li-Scheme supports both additive and multiplicative operations so it is a full homomorphic encryption. Wang et al.
59
+ performed a cryptoanalysis of the Li-Scheme in 2018 [16] and broke the scheme with certain known plaintext-ciphertext
60
+ pairs. Wang et al. further improved their cryptoanalysis in 2019 and successfully recovered the secret key with the
61
+ ciphertext-only attack using lattice reduction algorithm [17].
62
+ Homomorphic encryption solely focuses on addition and multiplication operations on the encrypted data for plain data
63
+ privacy. However, it would be very interesting to see an extension of homomorphic encryption from data privacy to
64
+ functional privacy with variables to take the user’s inputs in a framework of a public key scheme. It is rarely seen
65
+ that a public key cryptosystem, more precisely quantum-safe public key cryptosystem, is purposely designed with
66
+ careful considerations not only to leverage homomorphic properties of ciphertext addition and scalar multiplication
67
+ but also to take user’s secrets into ciphertext computation. This served as a motivation for our paper. We introduce a
68
+ new Homomorphic Polynomial Public Key encapsulation or HPPK, which is an asymmetric key encapsulation scheme,
69
+ with public keys encrypted using functional homomorphic encryption. HPPK uses multivariate polynomials to not
70
+ only leverage homomorphic properties of addition and scalar multiplication but also allows for encrypting party’s
71
+ input during the ciphertext creation. That is, the public key polynomial coefficients are encrypted using homomorphic
72
+ function to ensure they are never truly public and hide the structure of the public key, at the same time, treating variables
73
+ of the said public key polynomials as user input allows for freedom during the encryption process.
74
+ HPPK cryptosystem has two distinct features, namely, the homomorphic encryption of the public key that allows
75
+ for the user’s input during ciphertext creation, and the use of a hidden ring. HPPK is not the first cryptosystem to
76
+ use hidden structure. For instance, the work of Li et al. describes a cryptosystem with a hidden prime ring [15].
77
+ Another important example is Hidden Field Equations (HFE) cryptosystems. The examples of asymmetric multivariate
78
+ encryption schemes that are based on HFE include [18, 19, 20, 21]. Various signature schemes based on HFE were
79
+ also proposed [22, 23, 24, 25, 26]. In the framework of HFE, the private polynomials as well as the structure they are
80
+ defined over, a field extension, are both hidden using affine transformations.
81
+ The algorithms based on HFE, mentioned above fall in the category of quantum-safe algorithms. More precisely,
82
+ multivariate quantum-safe algorithms. Quantum computing developments have been receiving a lot of focus from the
83
+ academic community as well as industry leaders since Google announced its first quantum advantage in 2019 [27].
84
+ But it was the National Institution of Standards and Technology (NIST) that opened the arena for quantum-resistant
85
+ cryptography, when they started the post-quantum cryptography (PQC) standardization process in November 2017.
86
+ Recently, they have announced third-round finalists which include four key exchange mechanism schemes (KEM) and
87
+ three finalists for digital signatures [28]. Four KEM finalists include code-based Classic McEliece [29], lattice-based
88
+ CRYSTALS-KYBER [30], NTRU [31, 32], and Saber [33] algorithms. At the latest announcement, NIST selected
89
+ CRYSTALS-KYBER to be standardized algorithm for KEM. In addition to the aforementioned finalists for KEM, the
90
+ Multivariate Public Key Cryptosystems or MPKC is worth a special discussion. Algorithms based on multivariate
91
+ polynomial problems are considered to be quantum-safe, but they also make an excellent candidate for homomorphic
92
+ encryption due to the use of multivariate polynomials.
93
+ The framework of MPKC is built on a system of quadratic polynomials. The public key is represented by a central map
94
+ P : Fm
95
+ p → Fℓ
96
+ p with m variables and ℓ polynomials [34]. Many variants of MPKC central map constructions have been
97
+ proposed since Matsumoto and Imai first introduced this cryptosystem in 1988 [35], including single field systems and
98
+ mixed field systems [36]. Single field MPKC includes several Triangular systems and the Oil and Vinegar system since
99
+ Patarin and Goubin in 1997 [37] and unbalanced Oil and Vinegar scheme by Kipnis et. al. in 1999 [18]. The mixed
100
+ field MPKC refers to Matsumoto-Imai system [35] and Hidden Field Equation [38]. In addition, Wang et al. in 2006
101
+ proposed a Medium-Field MPKC scheme [39] and an improved scheme in 2008 [40]. Ding and Schmidt proposed
102
+ Rainbow as a MPKC digital signature scheme in 2005 [25].
103
+ Attacks on MPKC cryptosystems are mainly classified into two categories: algebraic solving attacks and linear algebra
104
+ attacks. Algebra solving attacks attempt to solve the MPKC multivariate equation system from the public key with
105
+ 2
106
+
107
+ Novel Homomorphic Functional Encryption over a Hidden Ring
108
+ ciphertext (z1, z2, . . . , zℓ) to recover the pre-image (x1, x2, . . . , xm). Faugére reported his first attack on MPKC in
109
+ 1999[41] and in 2002[42] using Gröber bases (F4), later in 2003 Faugére and Antoine reported their attack on HFE
110
+ Gröber bases (F5). Ding et. al. proposed their new Zhuang-Zi algorithm to solve the multivariate system in 2006 [43].
111
+ In linear algebra attacks, Courtois et al. reported their attack on MPKC using the relinearization technique, aclled XL
112
+ in 2000 [44]. The Minrank attack has been successfully applied by Goubin and Courtois on the single field system in
113
+ 2000 [45] and by Kipnis and Patarin on the mixed field system in 1999 [46].
114
+ A new type of polynomial public key has been recently proposed by Kuang in 2021 [47], based on univariate polynomial
115
+ multiplications, by Kuang and Barbeau in 2021 [48, 49, 50], based on multivariate polynomial multiplications with two
116
+ noise functions to increase the public key security against possible public key attacks. The digital signature scheme of
117
+ the multivariate polynomial public key or MPPK has been prosoed by Kuang, Perepechaenko and Barbeau in 2022 [51].
118
+ This paper explores the possibility to combine a new homomorphic encryption to key construction to further enhance
119
+ the security of the MPPK cryptography for key encapsulation mechanism or KEM.
120
+ The proposed HPPK scheme can be also considered as a new variant of MPKC scheme with public keys being
121
+ encrypted using homomorphic functional encryption. We begin by introducing the proposed symmetric homomorphic
122
+ encryption scheme in A New Symmetric Homomorphic Functional Encryption over a Hidden Ring. The proposed
123
+ HPPK algorithm is then discussed in Homomorphic Polynomial Public Key Cryptosystem. We present the reader with
124
+ thorough security analysis of HPPK in HPPK Security Analysis, and report on benchmarking the performance of HPPK
125
+ in Brief Benchmarking Performance. We conclude with Conclusion.
126
+ 2
127
+ A New Symmetric Homomorphic Functional Encryption over a Hidden Ring
128
+ In contrast to conventional homomorphic cryptography used for data privacy, in this paper we propose homomorphic
129
+ functional encryption to be applied to the public key in the framework of multivariate asymmetric cryptography. This
130
+ will allow for an asymmetric scheme with encrypted public keys. Moreover, by construction, functional homomorphic
131
+ encryption allows for user’s input during the ciphertext generation procedure. That is, the ciphertext can be created
132
+ with the input of the encrypting party, however, the public key used for encryption is itself encrypted using functional
133
+ homomorphic operator. The decrypting party is the only party that has knowledge of the private key associated
134
+ with the functional homomorphic encryption operator as well as the asymmetric scheme private key. Essentially, the
135
+ homomorphic functional encryption defined in this paper provides a round-trip envelope for a public key encryption.
136
+ In a way, such approach combines three main areas of cryptography, namely, asymmetric cryptography, homomorphic
137
+ encryption, and symmetric cryptography with self-shared key. This phenomenon is illustrated in Fig. 1. In the figure, the
138
+ traditional public key derived from a given assymetric algorithm is called plain public key or PPK, the homomorphically
139
+ encrypted PPK is called cipher public key or CPK. The cipher is produced by evaluating the public key polynomial
140
+ values using a user-selected secret. The decryption would perform in two stages: homomorphic decryption and then
141
+ secret extraction.
142
+ Figure 1: Illustration of a cryptosystem combining asymmetric cryptography, symmetric cryptography with a single
143
+ self-shared key, and homomorphic encryption.
144
+ We begin by introducing the Homomorphic Functional Encryption Operator. In order to allow for the user’s input during
145
+ ciphertext creation, and leverage additive and scalar multiplicative homomorphic features, the functional homomorphic
146
+ 3
147
+
148
+ Symmetric
149
+ Encrypt
150
+ 0
151
+ Enc
152
+ Crypto
153
+ PPK
154
+ Dec
155
+ Dec
156
+ HPPK
157
+ 997
158
+ CPK
159
+ Cipher
160
+ Homomorphic CryptoNovel Homomorphic Functional Encryption over a Hidden Ring
161
+ encryption is applied to polynomials. We discuss the reason for this further. Hence, when introducing the said operator
162
+ we assume that it will be applied to polynomials.
163
+ 2.1
164
+ Homomorphic Encryption Operator
165
+ Let S be a positive integer, and R be a randomly chosen value such that R ∈ ZS and gcd(R, S) = 1. We propose a
166
+ Homomorphic Functional Encryption Operator ˆE(R,S), with a secret homomorphic key being a tuple (R, S). The values
167
+ S and R are never shared.
168
+ In its general form, the encryption operator is defined as a multiplicative operation modulo a hidden value S as
169
+ ˆE(R,S)(f) = (R ◦ f) mod S,
170
+ (1)
171
+ where f denotes any univariate or multivariate polynomial f = �k
172
+ i=0 fiXi, over Fp with Xi being its monomials. The
173
+ encryption operator acts on the coefficients of f, which we refer to as plain coefficients. This produces what we call
174
+ cipher coefficients, denoted hi, as
175
+ ˆE(R,S)fi = Rfi mod S = hi
176
+ for every i. Similarly, we can define a Homomorphic Functional Decryption Operator as
177
+ ˆE(R−1,S)h = (R−1 ◦ h) mod S.
178
+ (2)
179
+ Such operator decrypts the coefficients of the polynomial h. That is, it successfully decrypts the cipher coefficients
180
+ back to the plain coefficients. More precisely,
181
+ ˆE(R−1,S)hi = R−1(Rfi) mod S = (R−1R)fi mod S = fi
182
+ for any i.
183
+ The above defined homomorphic operator ˆE(R,S) holds following homomorphic properties:
184
+ • ˆE(R,S) is additively homomorphic: if a and b are two plain constants, then ˆE(R,S)(a+b) = R(a+b) mod S =
185
+ Ra + Rb mod S = ˆE(R,S)a + ˆE(R,S)b;
186
+ • ˆE(R,S) is scalar multiplicatively homomorphic: if a is a plain constant and x is a variable, then ˆE(R,S)(ax) =
187
+ R(ax) = (Ra)x = [ ˆE(R,S)a]x.
188
+ Thus, the operator ˆE(R,S) offers partially homomorphic encryption. We leave it to the reader to verify that the
189
+ same properties hold true for the proposed homomorphic functional decryption operator ˆE(R−1,S). Note that these
190
+ homomorphic properties come from linearity, and thus are natural to polynomials. Indeed, polynomials hold additive
191
+ and scalar multiplicative properties through their coefficients. Moreover, polynomials can be defined and evaluated with
192
+ coefficients in a field or a ring, different from a field or a ring for variables. We leverage this property, and thus, apply
193
+ the functional homomorphic encryption to public key cryptosystems with polynomial public keys.
194
+ 2.2
195
+ Homomorphically Encrypted Polynomials
196
+ As we have previously stated, the proposed homomorphic encryption is applicable to all polynomials over a ring Zp
197
+ or finite field Fp characterized by a prime p. In this work, when we refer to polynomials, we imply that the plain
198
+ polynomials, to be encrypted, are considered modulo p, unless stated otherwise. A generic multivariate polynomial has
199
+ the following form
200
+ p(x1, . . . , xm) =
201
+ ℓ1
202
+
203
+ j1=1
204
+ · · ·
205
+ ℓm
206
+
207
+ jm=1
208
+ pij1...jmxj1
209
+ 1 · · · xjm
210
+ m .
211
+ Alternatively, let Xj = xj1
212
+ 1 · · · xjm
213
+ m denote the monomials of such polynomial, then
214
+ p(x1, . . . , xm) =
215
+ L
216
+
217
+ j=1
218
+ pjXj,
219
+ (3)
220
+ where L denotes the total number of terms.
221
+ To successfully encrypt and decrypt any polynomial p(x1, . . . , xm) using the functional homomorphic encryption and
222
+ decryption operators defined in Eq. (1) and (2) respectively, the following conditions must be met:
223
+ 4
224
+
225
+ Novel Homomorphic Functional Encryption over a Hidden Ring
226
+ • The monomials Xj are to be computed as Xj = (Xj mod p). The values of monomials reduced modulo p are
227
+ used to compute the value of the polynomial p(x1, . . . , xm).
228
+ • The homomorphic secret key value S should satisfy the bit length condition: |S|2 > 2|p|2 + |L|2.
229
+ The first condition ensures that polynomial p(x1, . . . , xm) is evaluated as if the mononials Xj are new variables over
230
+ Fp, Indeed, the operator ˆE(R,S) is applied to the polynomial p(x1, . . . , xm) in the following way
231
+ ˆE(R,S)p(x1, . . . , xm) =
232
+ L
233
+
234
+ j=1
235
+ [Rpj mod S]Xj.
236
+ (4)
237
+ Such encrypted polynomial can be computed as
238
+ L
239
+
240
+ j=1
241
+ [Rpj mod S](Xj mod p) = ¯p.
242
+ Note that the computed value was not reduced modulo any integer, nor is the arithmetic performed modulo any integer.
243
+ Thus, the user’s input through monomials Xj remains intact and can be decrypted correctly. Let the plain value of the
244
+ polynomial with user’s input, that is, if the polynomial was not encrypted with ˆE(R,S), be
245
+ ˆp =
246
+ L
247
+
248
+ j=1
249
+ pjXj mod p.
250
+ To ensure successful decryption, the second condition must be met. If the size of S is sufficiently large, the values of
251
+ coefficients and variables remains the same after decryption, and it is possible to recover ˆp. Indeed,
252
+ ˆE(R−1,S)¯p =
253
+ L
254
+
255
+ j=1
256
+ [R−1Rpj mod S](Xj mod p) =
257
+ L
258
+
259
+ j=1
260
+ pj(Xj mod p),
261
+ (5)
262
+ and then the value �L
263
+ j=1 pj(Xj mod p) can be reduced modulo p to yield �L
264
+ j=1 pjXj mod p = ˆp.
265
+ To elaborate more on this, we present the reader with two examples of functional homomorphic encryption of linear
266
+ and quadratic polynomials.
267
+ 2.2.1
268
+ Linear Polynomials
269
+ Recall, that we encrypt the coefficients of the polynomials defined over Fp, which successfully maps polynomials from
270
+ Fp[x1, . . . , xm] to ZS[x1, . . . , xm], leaving x1, . . . , xm ∈ Fp. A generic linear multivariate polynomial over a finite
271
+ field Fp has form
272
+ p(x1, x2, . . . , xm) =
273
+ m
274
+
275
+ j=1
276
+ pjxj mod p.
277
+ (6)
278
+ Conventionally, in the asymmetric encryption schemes, the public key inherits mathematical logic from the private
279
+ key, making it vulnerable. Hence, if public key consists of polynomials, we wish to encrypt the coefficients of the said
280
+ polynomials using functional homomorphic operator, to hide the mathematical logic. In this case we share the cipher
281
+ public key, encrypted using functional homomorphic operator. To ensure that the ciphertext can be still created in the
282
+ framework of asymmetric public key scheme, the variables in the public key polynomials are used for user’s input.
283
+ They are not encrypted using homomorphic encryption, but only using the encryption procedure from the asymmetric
284
+ scheme. Such variable values can consist of the plaintext only, or plaintext and noise used for obscurity.
285
+ Applying homomorphic encryption operator to the above linear polynomial, defined in Eq.(6), produces a cipher linear
286
+ polynomial with coefficients in a hidden ring ZS, and variables in Fp :
287
+ P(x1, x2, . . . , xm) = ˆE(R,S)p(x1, x2, . . . , xm)
288
+ =
289
+ m
290
+
291
+ j=1
292
+ (Rpj mod S)xj =
293
+ m
294
+
295
+ j=1
296
+ Pjxj.
297
+ (7)
298
+ 5
299
+
300
+ Novel Homomorphic Functional Encryption over a Hidden Ring
301
+ While the plain coefficients, pj, are encrypted into cipher coefficients, Pj, the cipher polynomial P(x1, x2, . . . , xm)
302
+ can still be evaluated with a set of chosen values r1, . . . , rm ∈ Fp to produce value ¯P
303
+ ¯P = P(r1, r2, . . . , rm) =
304
+ m
305
+
306
+ j=1
307
+ Pj(rj mod p).
308
+ (8)
309
+ Let the value ¯p = �m
310
+ i=1 pjrj mod p, be the original ciphertext of the asymmetric scheme. However, it is encrypted
311
+ into the value ¯P using homomorphic encryption. To recover the plain polynomial value, that is, decrypt the cipher
312
+ coefficients, into the plain coefficients and evaluate polynomial modulo p, we first apply the functional homomorphic
313
+ decryption operator ˆE(R−1,S) to get ˆE(R−1,S) ¯P, and then reduce this value modulo p. More precisely,
314
+ ˆE(R−1,S) ¯P =
315
+ m
316
+
317
+ j=1
318
+ [R−1Pj mod S](rj mod p) =
319
+ m
320
+
321
+ i=1
322
+ pj(rj mod p),
323
+ which reduced modulo p is
324
+ m
325
+
326
+ i=1
327
+ pjrj mod p = ¯p.
328
+ In a framework of asymmetric scheme with functional homomorphic encryption element, polynomials such as in Eq. (6)
329
+ are associated with plain coefficients, that is, the original public keys. The cipher polynomials have form as in Eq. (7),
330
+ with coefficients being encrypted from the plain public keys, using homomorphic encryption. Such cipher public keys
331
+ are shared, and the plain public keys are stored securely and never shared. The ciphertext in this combined algorithm
332
+ is of the form as in Eq. (8). The decrypting party first needs to decrypt the ciphertext to nullify the homomorphic
333
+ encryption of the public key, as shown in Eq. (8). Afterwards, the decryption party can perform decryption procedure
334
+ that corresponds to the given asymmetric scheme.
335
+ 2.2.2
336
+ Quadratic Polynomials
337
+ Multivariate quadratic polynomials serve as the foundation of Multivariate Public Key Cryptosystem or MPKC[34,
338
+ 52, 53]. Thus, we want to pay special attention on applications of functional homomorphic encryption on multivariate
339
+ quadratic polynomials. A general quadratic multivariate polynomial p(x1, x2, . . . , xn) over a finite field Fp has the
340
+ following form
341
+ p(x1, x2, . . . , xm) =
342
+ m
343
+
344
+ 1≤i≤j
345
+ pijxixj mod p,
346
+ (9)
347
+ where the coefficients pij are considered as the privacy constants for this polynomial function so they must be hidden
348
+ from public. This is done by applying the functional homomorphic encryption operator to this polynomial as follows
349
+ P(x1, x2, . . . , xm) = ˆE(R,S)p(x1, x2, . . . , xm)
350
+ (10)
351
+ =
352
+ m
353
+
354
+ 1≤i≤j
355
+ (Rpij mod S)xixj =
356
+ m
357
+
358
+ 1≤i≤j
359
+ Pijxixj.
360
+ (11)
361
+ (12)
362
+ Here, the encrypted coefficients are defined over the hidden ring ZS, however, all the variables x1, . . . , xm are still
363
+ elements of the field Fp. As we have previously mentioned, we refer to the coefficients pij as plain coefficients, and Pij
364
+ are referred to as cipher coefficients. Similarly, P(x1, x2, . . . , xm) and p(x1, x2, . . . , xm) are referred to as cipher and
365
+ plain polynomials respectively.
366
+ While coefficients are encrypted with homomorphic encryption operator, the polynomial P(x1, x2, . . . , xm) still accepts
367
+ user’s input. That is, the cipher polynomial value ¯P can be still calculated with a chosen set of r1, . . . , rm from the
368
+ field Fp as follows
369
+ ¯P = P(r1, r2, . . . , rm) =
370
+ m
371
+
372
+ 1≤i≤j
373
+ Pij(xixj mod p).
374
+ (13)
375
+ Note that the computed value ¯P is an integer. The arithmetic to compute such value was not performned modulo any
376
+ integer. The plain polynomial values are securely hidden through the hidden ring ZS. To recover the plain polynomial
377
+ 6
378
+
379
+ Novel Homomorphic Functional Encryption over a Hidden Ring
380
+ equation, decryption opertor ˆE(R−1,S) can be applied to the cipher polynomial value ¯P, followed by reduction mod p:
381
+ ˆE(R−1,S) ¯P = R−1 ¯P mod S, then
382
+ (14)
383
+ (R−1 ¯P mod S) mod p = p(r1, r2, . . . , rm) = ¯p.
384
+ (15)
385
+ The value ¯p is the plain polynomial value for the chosen values of variables x1, . . . , xm by the encrypting party.
386
+ Similar to the linear case, the public key of the asymmetric scheme consist of quadratic polynomials of the form (9), to
387
+ be encrypted using homomorphic functional encryption operators. The cipher public keys are of the form (10). Such
388
+ cipher public keys are the ones shared, while the plain public keys are not. The ciphertext in the combined scheme is of
389
+ the form (13), which needs to be decrypted back to the plain value. For that a homomorphic decryption operator is
390
+ applied, as in Eq (14), and the plain ciphertext value is recovered.
391
+ 3
392
+ Homomorphic Polynomial Public Key Cryptosystem
393
+ 3.1
394
+ Brief Summary of MPKC
395
+ An interested reader can find the detail description of MPKC schemes by Ding and Yang [34]. In this section, we
396
+ briefly outline the basic mechanism of MPKC algorithms. The framework mainly consists of ℓ quadratic multivariate
397
+ polynomials
398
+ p1(x1, . . . , xm), p2(x1, . . . , xm), . . . , pℓ(x1, . . . , xm)
399
+ in m variables over finite field Fp. Each polynomial pk(x1, . . . , xm) can be written in its expanded form as
400
+ pk(x1, . . . , xm) =
401
+ m
402
+
403
+ i<j=1
404
+ pijkxixj
405
+ (16)
406
+ for k = 1, 2, . . . , l. In the literature Eq.(16) is generally written in a matrix form as
407
+ pk(x1, . . . , xm) = (x1, . . . , xm)
408
+
409
+
410
+
411
+
412
+
413
+ p11k
414
+ p12k
415
+ . . .
416
+ p1mk
417
+ . . .
418
+ . . .
419
+ . . .
420
+ . . .
421
+ pi1k
422
+ pi2k
423
+ . . .
424
+ pimk
425
+ . . .
426
+ . . .
427
+ . . .
428
+ . . .
429
+ pm1k
430
+ pm2k
431
+ . . .
432
+ pmmk
433
+
434
+
435
+
436
+
437
+ � (x1, . . . , xm)T
438
+ (17)
439
+ briefly expressed as,
440
+ pk(x1, . . . , xm) = ⃗x · Pk · ⃗xT ,
441
+ where Pk is an m × m square matrix. Considering all ℓ polynomials, we can write the MPKC map from Fm
442
+ p to Fℓ
443
+ p as a
444
+ 3-dimensional matrix P[ℓ][m][m], which is a trapdoor called the central map. The central map is selected to be easily
445
+ invertible. In order to protect this central map and its structure, two affine linear invertible maps T and S are chosen to
446
+ construct the MPKC public key:
447
+ • Public Key: ¯P = T ◦ P ◦ S.
448
+ • Private Key: (T, P, S).
449
+ The MPKC encryption procedure simply to evaluates ℓ polynomials over the field Fp as
450
+ ⃗z = ¯P(⃗x) = {z1 = p1(x1, . . . , xm), z2 = p2(x1, . . . , xm), . . . , zℓ = pℓ(x1, . . . , xm)}
451
+ (18)
452
+ and decryption works as follows
453
+ ⃗u = T −1(⃗z),⃗v = P−1(⃗u), ⃗x = S−1(⃗v).
454
+ The major step to use MPKC is to construct the invertible central map P over a finite field Fp to perform a map:
455
+ Fm
456
+ p → Fℓ
457
+ p.
458
+ There may be a potential way to enhance the security of MPKC cryptosystem by applying the proposed homomorphic
459
+ encryption on its map: Fm
460
+ p → Fℓ
461
+ p. The homomorphic encryption effectively hides the public key construction logic
462
+ over a hidden ring ZS. In this case, an encryption key Rk is required for each quadratic polynomial pk(x1, . . . , xm),
463
+ with value Rk chosen over the hidden ring ZS for all k. Hence, there are a total of ℓ encryption keys for MPKC. The
464
+ MPKC encryption in this case is almost the same as the original MPKC encryption. The ciphertext (z1, z2, . . . , zℓ) is to
465
+ be homomorphically decrypted to create original multivariate equation system, as illustrated in Eq.(18). This means,
466
+ 7
467
+
468
+ Novel Homomorphic Functional Encryption over a Hidden Ring
469
+ Eq.(18) is hidden under the hidden ring ZS. On one hand, applying the homomorphic encryption would increase the
470
+ public key size for MPKC, however, the number of variables can be reduced due to the homomorphic encryption.
471
+ In this paper, we are not going to further explore this variant of MPKC schemes but we will focus on another variant of
472
+ MPKC, called HPPK which we propose in the new section.
473
+ 3.2
474
+ HPPK Encapsulation
475
+ We propose a new variant of an MPKC scheme, called the Homomorphic Polynomial Public Key or HPPK, with the
476
+ following considerations:
477
+ • The vector on the left hand side of the map P is treated as ⃗xl and the vector on the right hand side as ⃗xr;
478
+ • The vector ⃗xl is replaced with ⃗xl = (x0, x1, x2, . . . , xn), considering ⃗xl as a message vector in a polynomial
479
+ vector space represented by a basis {x0, x1, x2, . . . , xn} for a message variable x and ⃗xr = (x1, . . . , xm) as a
480
+ noise vector for noise variables x1, . . . , xm;
481
+ • The proposed homomorphic encryption is applied to the central map P, mapping the elements from Fp → ZS:
482
+ ¯P = ˆE(R,S)P
483
+ and the decryption is de-mapping from ZS → Fp:
484
+ P = ˆE(R−1,S) ¯P mod p
485
+ • The number of polynomials is reduced to ℓ = 2;
486
+ • The decryption mechanism is changed from inverting maps to modular division, which automatically cancels
487
+ the noise used for obscurity.
488
+ 3.2.1
489
+ Key Construction
490
+ Without loss of generality, we change the notation of the unencrypted central map to P. Under the above considerations,
491
+ the central map P consists of two multivariate polynomials
492
+ p1(x, x1, x2, . . . , xm) = (1, x1, . . . , xn)
493
+
494
+
495
+
496
+
497
+
498
+
499
+
500
+ p011
501
+ p021
502
+ . . .
503
+ p0m1
504
+ p111
505
+ p121
506
+ . . .
507
+ p1m1
508
+ . . .
509
+ . . .
510
+ . . .
511
+ . . .
512
+ pi11
513
+ pi21
514
+ . . .
515
+ pim1
516
+ . . .
517
+ . . .
518
+ . . .
519
+ . . .
520
+ pn11
521
+ pn21
522
+ . . .
523
+ pnm1
524
+
525
+
526
+
527
+
528
+
529
+
530
+
531
+ (x1, x2, . . . , xm)T ,
532
+ (19)
533
+ and
534
+ p2(x, x1, x2, . . . , xm) = (1, x1, . . . , xn)
535
+
536
+
537
+
538
+
539
+
540
+
541
+
542
+ p012
543
+ p122
544
+ . . .
545
+ p0m2
546
+ p112
547
+ p122
548
+ . . .
549
+ p1m2
550
+ . . .
551
+ . . .
552
+ . . .
553
+ . . .
554
+ pi12
555
+ pi22
556
+ . . .
557
+ pim2
558
+ . . .
559
+ . . .
560
+ . . .
561
+ . . .
562
+ pn12
563
+ pn22
564
+ . . .
565
+ pnm2
566
+
567
+
568
+
569
+
570
+
571
+
572
+
573
+ (x1, x2, . . . , xm)T .
574
+ (20)
575
+ Note that the matrix maps P1 and P2 are of size (n + 1) × m, thus, no longer square.
576
+ The construction of
577
+ p1(x, x1, . . . , xm) and p2(x, x1, . . . , xm) can alternatively be achieved with polynomial multiplications
578
+ p1(x, x1, . . . , xm) = b(x, x1, . . . , xm)f1(x)
579
+ (21)
580
+ p2(x, x1, . . . , xm) = b(x, x1, . . . , xm)f2(x),
581
+ where the base multivariate polynomial b(x, x1, x2, . . . , xm) and univariate polynomials f1(x) and f2(x) have the
582
+ following generic forms
583
+ b(x, x1, . . . , xm) =
584
+ nb
585
+
586
+ i=0
587
+ m
588
+
589
+ j=1
590
+ bijxixj
591
+ (22)
592
+ f1(x) =
593
+ λ
594
+
595
+ i=0
596
+ f1ixi
597
+ f2(x) =
598
+ λ
599
+
600
+ i=0
601
+ f2ixi.
602
+ 8
603
+
604
+ Novel Homomorphic Functional Encryption over a Hidden Ring
605
+ Here, nb and λ are orders of base multivariate polynomial and univariate polynomials with respect to message variable
606
+ x respectively. Without loss of generality, we assume that the univariate polynomials f1(x) and f2(x) are solvable, in
607
+ other words λ < 5. Using Eq.(21) and (22), we can express
608
+ p1(x, x1, . . . , xm) =
609
+ n
610
+
611
+ i=0
612
+ m
613
+
614
+ j=1
615
+ pij1xixj = ⃗xl · P1 · ⃗xr
616
+ (23)
617
+ p2(x, x1, . . . , xm) =
618
+ n
619
+
620
+ i=0
621
+ m
622
+
623
+ j=1
624
+ pij2xixj = ⃗xl · P2 · ⃗xr,
625
+ with pij1 = �
626
+ s+t=i bsjf1t and pij2 = �
627
+ s+t=i bsjf2t being the coefficients, and n = nb + λ. It is apparent that
628
+ the plain central map P as shown in Eq.(19) and Eq.(20) expanded as Eq.(23) inherits a lot of structure. Given
629
+ that the components of the central map are private key elements, the map in its unaltered form is not secure against
630
+ potential attacks such as polynomial factorization, root finding, etc. To secure the central map, we apply functional
631
+ homomorphic encryption operator to the plain central map by acting with ˆE(R1,S) on p1(x, x1, . . . , xm) and ˆE(R2,S) on
632
+ p2(x, x1, . . . , xm). To be more precise, the cipher central map consists of two polynomials
633
+ P1(x, x1, . . . , xm) =
634
+ n
635
+
636
+ i=0
637
+ m
638
+
639
+ j=1
640
+ (R1pij1 mod S)xixj = ⃗xl · P1 · ⃗xr
641
+ (24)
642
+ P2(x, x1, . . . , xm) =
643
+ n
644
+
645
+ i=0
646
+ m
647
+
648
+ j=1
649
+ (R2pij2 mod S)xixj = ⃗xl · P2 · ⃗xr.
650
+ We set public key to be the cipher central map P, while private key consists of the homomorphic operators, the hidden
651
+ ring, together with univariate polynomials:
652
+ • Security parameter: the prime finite field Fp which is agreed on before the key generation procedure.
653
+ • Private Key:
654
+ ◦ hidden ring ZS with a randomly selected S for the required bit length;
655
+ ◦ homomorphic encryption key values R1 and R2 chosen from ZS;
656
+ ◦ univariate polynomials f1(x) and f2(x) with coefficients randomly selected from FS;
657
+ • Public Key: the map P, consisting of
658
+ ◦P1(⃗xl, ⃗xr) = ⃗xl · P1 · ⃗xr
659
+ ◦P2(⃗xl, ⃗xr) = ⃗xl · P2 · ⃗xr
660
+ 3.2.2
661
+ Encryption
662
+ Encryption is straightforward by determining the value for the secret x and randomly choosing values for the noise
663
+ variables x1, . . . , xm over the field Fp and evaluating ciphertext integer values ¯P1 and ¯P2. That is, the ciphertext
664
+ consists of two integer values C = ( ¯P1, ¯P2), where
665
+ ¯P1 =
666
+ n
667
+
668
+ i=0
669
+ m
670
+
671
+ j=1
672
+ Pij1(xjxi mod p)
673
+ (25)
674
+ ¯P2 =
675
+ n
676
+
677
+ i=0
678
+ m
679
+
680
+ j=1
681
+ Pij2(xjxi mod p).
682
+ Here, Pij1 and Pij2 denote the cipher coefficients encrypted with the homomorphic encryption operators. Note that the
683
+ cipher polynomials have coefficients in the hidden ring ZS, and all monomial calculations are performed mod p, the rest
684
+ of the arithmetic is performed over integers. The values ¯P1, and ¯P2 are integers forming the ciphertext C = {P1, P2}.
685
+ 3.2.3
686
+ Decryption
687
+ It is easy to verify that the HPPK map as in Eq.(19) and Eq.(20), under construction as shown in Eq.(21), holds a
688
+ division invariant property on the multiplicand or the base multivariate polynomial b(x, x1, x2, . . . , xm). Indeed,
689
+ p1(x, x1, . . . , xm)
690
+ p2(x, x1, . . . , xm) = b(x, x1, . . . , xm)f1(x)
691
+ b(x, x1, . . . , xm)f2(x) = f1(x)
692
+ f2(x).
693
+ 9
694
+
695
+ Novel Homomorphic Functional Encryption over a Hidden Ring
696
+ The first step in the decryption process is to apply the functional homomorphic decryption operator to the cipher-
697
+ text to recover plain polynomial values ¯p1 and ¯p2, which are evaluation results of plain multivariate polynomials
698
+ p1(x, x1, . . . , xm) and p2(x, x1, . . . , xm) at the chosen message and noises respectively. This can be done as
699
+ ˆE(R−1
700
+ 1
701
+ ,S) ¯P1 = p1(x, x1, . . . , xm) = ¯p1
702
+ ˆE(R−1
703
+ 2
704
+ ,S) ¯P2 = p2(x, x1, . . . , xm) = ¯p2.
705
+ These values are used to compute the ratio K modulo p of the form
706
+ K = ¯p1
707
+ ¯p2
708
+ = p1(x, x1, . . . , xm)
709
+ p2(x, x1, . . . , xm) = f1(x)
710
+ f2(x) mod p
711
+ (26)
712
+ Note that the noise vector ⃗xr is automatically eliminated through the division. The secret x can then be found from
713
+ Eq.(26) by radicals if f1(x) and f2(x) are solvable such as linear or quadratic polynomials.
714
+ Note that when λ > 1, an extra 8-bit flag σ should be added to the plaintext to distinguish the correct plaintext during
715
+ the decryption procedure. We propose a formatted plaintext X = (σ|x), with σ to be a one byte flag. That is, σ is
716
+ concatenated with x, such that the most significant 8 bits of X are set as σ and the remaining bits as x. The flag σ
717
+ can be generated by a cyclic redundancy check or CRC with the secret x. There are different CRC algorithms such as
718
+ CRC-8, CRC-32, etc. 8 bits of CRC codes should be sufficient to make a right decision from the roots obtained during
719
+ decryption. After decryption with successful flag verification, the shared secret would be established by removing the
720
+ most significant 8 bits of the obtained value X. Note that the field size should account for the flag σ. In this work,
721
+ however, we focus mainly on the case λ = 1.
722
+ This division invariant property is the foundation for the HPPK encapsulation to be indistinguishable under chosen
723
+ plaintext attacks.
724
+ 3.3
725
+ A Toy Example
726
+ We demonstrate how HPPK works with a toy example.
727
+ 3.3.1
728
+ Key Pair Generation
729
+ Considering a prime field F13 with the prime p = 13 and two noise variables x1, x2 for the simplicity of the
730
+ demonstration purpose only, we can choose the hidden ring characterized by an integer of length > 12 bits. The private
731
+ key consists of the following values:
732
+ • S = 6798, R1 = 4267, R2 = 6475
733
+ • f1(x) = 4 + 9x
734
+ • f2(x) = 10 + 7x
735
+ • B(x, x1, x2) = (8 + 7x)x1 + (5 + 11x)x2 (note: just for key pair construction procedure; this polynomial is
736
+ not stored in the memory)
737
+ The plain public key or PPK is simply constructed as
738
+ • P1(x, x1, x2) = f1(x)B(x, x1, x2) mod 13 = x1(6 + 9x + 11x2) + x2(7 + 11x + 8x2),
739
+ • P2(x, x1, x2) = f2(x)B(x, x1, x2) mod 13 = x1(2 + 9x + 10x2) + x2(11 + 2x + 12x2).
740
+ The PPK polynomials are encrypted with the self-shared key R1, R2 over the ring ZS
741
+ • P1(x, x1, x2) = E(R−1
742
+ 1
743
+ ,S)P1(x, x1, x2) = x1(5208 + 4413x + 6149x2) + x2(2677 + 6149x + 146x2)
744
+ =⇒ P1 =
745
+ �5208
746
+ 2677
747
+ 4413
748
+ 6149
749
+ 6149
750
+ 146
751
+
752
+ • P2(x, x1, x2) = E(R−1
753
+ 1
754
+ ,S)P2(x, x1, x2) = x1(6152 + 3891x + 3568x2) + x2(3245 + 6152x + 2922x2)
755
+ =⇒ P2 =
756
+ �6152
757
+ 3245
758
+ 3891
759
+ 6152
760
+ 3568
761
+ 2922
762
+
763
+ to create the so-called CPK P1 and P2.
764
+ 10
765
+
766
+ Novel Homomorphic Functional Encryption over a Hidden Ring
767
+ 3.3.2
768
+ Encryption
769
+ We randomly choose variables from F13: x = 8, x1 = 3, x2 = 6. We, then, pre-calculate values
770
+ x11 = xx1 mod 13 = 8 × 3 mod 13 = 11,
771
+ x12 = x2x1 mod 13 = 82 × 3 mod 13 = 10,
772
+ x21 = xx2 mod 13 = 8 × 6 mod 13 = 9,
773
+ x22 = x2x2 mod 13 = 82 × 6 mod 13 = 7.
774
+ Now we can calculate the ciphertext C = {198082, 192229} as follows
775
+ • ¯P1 = x1(5208 + 4413x + 6149x2) + x2(2677 + 6149x + 146x2) = 198082
776
+ • ¯P2 = x1(6152 + 3891x + 3568x2) + x2(3245 + 6152x + 2922x2) = 192229
777
+ 3.3.3
778
+ Decryption
779
+ We first perform the homomorphic decryption to rebuild the plain polynomial equations
780
+ • P1(x, x1, x2) = f1(x)B(x, x1, x2) = [E(R−1
781
+ 1
782
+ ,S)19808] mod 13 = [ 19808
783
+ 4267 mod 6798] mod 13 = 8
784
+ • P2(x, x1, x2) = f2(x)B(x, x1, x2) = [E(R−1
785
+ 2
786
+ ,S)192229] mod 13 = [ 192229
787
+ 6475 mod 6798] mod 13 = 9
788
+ then we can eliminate the noise introduced by the base multivariate polynomial
789
+ P1(x, x1, x2)
790
+ P2(x, x1, x2) = 4 + 9x
791
+ 10 + 7x = 8
792
+ 9 mod 13 = 11
793
+ where the secret x can be easily extracted as x = 8. The encryption can be done with any possible values for x1 and x2
794
+ at a given secret x, which would produce different ciphertext C, but the decryption would reveal the same secret. This
795
+ simple toy example demonstrates its capability of randomized encryption.
796
+ 4
797
+ HPPK Security Analysis
798
+ In this section, we analyze the security of the proposed HPPK algorithm. The security of HPPK relies on computational
799
+ hardness of Modular Diophantine Equation, introduced in Definition 4.1, and Hilbert’s tenth Problem, introduced in
800
+ Definition 4.7. We begin by proving that HPPK satisfies the IND-CPA indistinguishability property. These results are
801
+ then extended to prove that task of recovering plaintext from ciphertext in the framework of HPPK is NP-complete, and
802
+ state its classical and quantum complexity. Afterwards, we focus on the private key attack and prove that the problem of
803
+ obtaining the private key from the public key is NP-complete. Here we also provide classical and quantum complexities
804
+ of obtaining privates key from public key.
805
+ 4.1
806
+ Plaintext attack
807
+ An attentive reader will notice that the evaluated ciphertext as illustrated in Eq. (25) has not been reduced modulo
808
+ any integer. Thus, an adversary looking to perpetrate an attack to recover the plaintext can treat the coefficients of the
809
+ polynomials in Eq. (25) and evaluated ciphertext as integers. The plaintext values, sought after by the adversary, are
810
+ elements of the field Fp, thus the malicious party can reduce the public values of the ciphertext modulo p to solve for
811
+ plaintext variables in the Eq (25). We formally phrase it in the following remark.
812
+ Remark 4.0.1. For the purpose of obtaining the plaintext, the ciphertext and cipher coefficients as illustrated in the
813
+ Eq. (25) can be considered modulo p as follows
814
+ C =
815
+ ��n
816
+ i=0
817
+ �m
818
+ j=1 Pij1xjxi − ¯P1 = 0 (mod p)
819
+ �n
820
+ i=0
821
+ �m
822
+ j=1 Pij2xjxi − ¯P2 = 0 (mod p)
823
+ (27)
824
+ Definition 4.1 (Modular Diophantine Equation). The Modular Diophantine Equation asks whether an integer solution
825
+ exists to the equation
826
+ P(y1, . . . , yk) − 1 = 0
827
+ mod p,
828
+ given as an input of a polynomial P(y1, . . . , yk) and a prime p.
829
+ Remark 4.0.2. A positive answer to this question would include a solution.
830
+ 11
831
+
832
+ Novel Homomorphic Functional Encryption over a Hidden Ring
833
+ Let m + 1 > 2. Note that the system in the Eq. (27) can be normalized as
834
+ C =
835
+ ��n
836
+ i=0
837
+ �m
838
+ j=1 P′
839
+ ij1xjxi − 1 = 0 (mod p),
840
+ �n
841
+ i=0
842
+ �m
843
+ j=1 P′
844
+ ij2xjxi − 1 = 0 (mod p).
845
+ (28)
846
+ The most naive way of solving such normalized system is to solve each equation and find a common solution. Each
847
+ such equation is an instance of a Modular Diophantine Equation. The more obvious way to solve the system in Eq. (27)
848
+ would be to use Gaussian elimination and transform the system to a single equation. Indeed, since the coefficients of
849
+ the ciphertext are publicly known, and the noise variables are linear in the ciphertext, the adversary can express any
850
+ noise variable using the remaining terms of the equation and reduce the system to a single equation of the form
851
+ H(x, x1, . . . , xm−1) − 1 = 0
852
+ (29)
853
+ over Fp with m unknowns, where m > 1. We assume that the adversary favours the ciphertext form with less variables.
854
+ Thus, from the perspective of the adversary the cipheretext has form as in Eq. (29). From here on forward, we consider
855
+ the ciphertext in the form given in Eq. (29). We formally define said form below.
856
+ Definition 4.2. Let m + 1 > 2. The ciphertext in its normalized reduced form is a single equation
857
+ H(x, x1, . . . , xm−1) − 1 = 0
858
+ (30)
859
+ over Fp, where x corresponds to the plaintext variable and the remaining variables are noise variables.
860
+ Note that even in its normalized reduced form the ciphertext is an instance of a Modular Diophantine Equation. Since
861
+ m + 1 > 2 we can argue that the adversary does not benefit much by reducing the system in Eq. (28) to a single
862
+ equation (30), and eliminating one variable. The number of expected solutions to the Eq. (30) remains pm−1, and
863
+ the adversary is facing with the problem of deciding which solution is the correct one. That is, a brute-force search
864
+ algorithm can find a list of solutions to the Eq. (30) by trying all the possible m − 1 variables values over Fp. The
865
+ adversary is interested in a particular solution from the list.
866
+ One might argue that the attacker is interested only in the plaintext variable x ∈ Fp. Thus, the adversary can simply
867
+ guess the value x. The complexity of this guess is O(p). However, note that the guess has to be tested for correctness.
868
+ This will require coming up with noise variables and testing whether the guess is correct. Moreover, NIST requires the
869
+ size of the actual communicated secret to be 32 bytes. Thus, the secret that is transferred between two parties consists
870
+ of K blocks, where each block is p bits. Each block corresponds to the HPPK secret x. The secret message is then
871
+ K different values x concatenated together to form a 32 byte secret. Each such block x is encrypted separately using
872
+ HPPK. The complexity of correctly guessing the transferred secret message is then O(p4).
873
+ Theorem 4.1. The Modular Diophantine Equation Problem is NP-complete.
874
+ Proof. The proof, using the Boolean Satisfiability Problem, is given by Moore and Meterns [54, Section 5.4.4].
875
+ Theorem 4.1 states that a brute-force search algorithm can find a solution to the Modular Diophantine Equation by
876
+ trying all the possible solutions. Thus, without loss of generality, we treat the ciphertext-only attack on a ciphertext in
877
+ its normal reduced form as a Modular Diophantine Problem. Indeed, by Theorem 4.1 the algorithm to find a solution
878
+ to a Modular Diophantine Equation does not simply terminate to give a solution, it is a brute-force search algorithm
879
+ that considers every possible solution before producing a result. In other words, it goes through all the possibilities to
880
+ choose the correct one.
881
+ 4.1.1
882
+ IND-CPA Indistinguishability Property and Ciphertext only Attack
883
+ We suppose that the adversary will choose to perpetrate the attack on the ciphertext in its normal reduced form as in
884
+ Eq. (30), for its easier to attack. In the framework of HPPK, the public key elements are the coefficients of the ciphertext
885
+ polynomials. Thus, if the ciphertext is presented in its reduced normalized form, as defined in Eq. (30), setting the
886
+ coefficients of such polynomial to be the ciphertext does not disadvantage the adversary.
887
+ Theorem 4.2 (HPPK has IND-CPA property). Let m > 1, where m is the total number of variables in the normalized
888
+ reduced form of the ciphertext as in Eq. (30). If the Modular Diophantine Equation is NP-complete, the HPPK
889
+ encryption system is provably secure in the IND-CPA security model with a reduction loss of pm−2.
890
+ Proof. Assume that there exists an adversary A that (t, ϵ)-breaks the HPPK encryption system in the IND-CPA
891
+ security model. We construct a simulator B that solves the Modular Diophantine Equation. Given as input, a Modular
892
+ Diophantine Equation instance (p, H(x, x1, . . . , xm−1)), where H(x, x1, . . . , xm−1) is of the form (30) and m > 1,
893
+ 12
894
+
895
+ Novel Homomorphic Functional Encryption over a Hidden Ring
896
+ the simulator B runs A as follows. The simulator sets the normalized public key over Fp to the coefficients of the
897
+ polynomial H(x, x1, . . . , xm−1). The challenge consists of the following game. The adversary A generates two distinct
898
+ messages m0 and m1 ∈ Fp, and submits them to the simulator. The simulator B randomly chooses b in {0, 1} as well
899
+ as random values r1, . . . , rm−1 for the noise variables, and sets the ciphertext to be the value
900
+ ¯H = H(mb, r1, . . . , rm−1).
901
+ The challenge for the adversary then consists of the following equation to be solved for x:
902
+ ˆH(x, x1, . . . , xm−1) − 1 = 0
903
+ over Fp. Here,
904
+ ˆH(x, x1, . . . , xm−1) = 1
905
+ ¯H H(x, x1, . . . , xm−1).
906
+ The challenge remains to be the Modular Diophantine Equation H(x, x1, . . . , xm−1) − 1 = 0, since the value 1
907
+ ¯
908
+ H can
909
+ be pushed to the noise variables, which are random and do not influence the plaintext. Indeed, let hij be the coefficients
910
+ of the polynomial H(x, x1, . . . , xm−1) for any i ∈ {0, . . . , n} and j ∈ {1, . . . , m − 1}, then
911
+ l
912
+
913
+ i=0
914
+ m−1
915
+
916
+ j=1
917
+ hijxixj ×
918
+ 1
919
+ H(mb, r1, . . . , rm−1) =
920
+ l
921
+
922
+ i=0
923
+ m−1
924
+
925
+ j=1
926
+ hijxix′
927
+ j,
928
+ where x′
929
+ j = xj
930
+ ¯
931
+ H . The challenge in this case is correct, as it corresponds to the challenged plaintext and remains in the
932
+ form of a Diophantine equation chosen by the simulator.
933
+ The coefficients of the challenge equation come from the submitted Diophantine equation, and thus, from the point
934
+ of view of the adversary are random. The values r1, . . . , rm−1 are selected at random. The adversary does not
935
+ have knowledge of the values {x′
936
+ 1, . . . , x′
937
+ m−1} and they can not be calculated from the other parameters given to the
938
+ adversary. So the noise variables x′
939
+ j for all j ∈ {1, . . . , m − 1} are random. Hence, the simulation holds randomness
940
+ property. By construction, the simulation is indistinguishable from a real attack. That is, the adversary is challenged
941
+ with solving the equation as in the Eq. (30), which is HPPK ciphertext in its normalized reduced form.
942
+ There is no abort in the simulation. The adversary outputs a random guess b′ of b. When b′ is equal to b, the adversary
943
+ wins. Otherwise, the adversary looses. The probability of simply guessing the value for x is Pr = 1
944
+ 2. We will calculate
945
+ the probability of solving the IND-CPA challenge with the advantage of the adversary, that is Pr = 1
946
+ 2 + α. The
947
+ advantage comes from the assumption that the adversary can break the HPPK cryptosystem.
948
+ The challenge has a general form as in the Eq. (30), thus, the equation is expected to have pm−1 distinct solutions,
949
+ considering all m variables. On the other hand, it is known that the variable x ∈ {m0, m1}. Assuming x = m0,
950
+ there are now pm−2 possible solutions to choose the correct solution from. The same is true for x = m1. That is, the
951
+ probability of finding correct solution of the equation H(x, x1, . . . , xm−1) − 1 = 0 is
952
+ Pr(correct solution|x0 = m0) = Pr(correct solution|x = m1) =
953
+ 1
954
+ pm−2 ,
955
+ where Pr(correct solution) denotes probability of finding the correct solution to the equation H(x, x1, . . . , xm−1)−1 =
956
+ 0. Then by the law of total probability, the probability of solving the challenge equation is
957
+ Pr(correct solution) = Pr(correct solution|x = m0)Pr(x = m0)+Pr(correct solution|x = m1)Pr(x = m1) =
958
+ 1
959
+ pm−2 .
960
+ Accounting for the advantage that the adversary has, the probability α is Pr(correct solution) =
961
+ ϵ
962
+ pm−2 . The total
963
+ probability of solving the IND-CPA challenge is then 1
964
+ 2 +
965
+ ϵ
966
+ pm−2 .
967
+ The simulation is indistinguishable from a real attack. So the adversary who can break the challenge ciphertext will
968
+ uncover the solution to the given Modular Diophantine Equation problem. The probability of breaking the ciphertext is
969
+ ϵ
970
+ pm−2 .
971
+ The advantage of solving the Diophantive Equation problem is then
972
+ ϵ
973
+ pm−2 . Let Ts denote the time cost of the simulation.
974
+ We have Ts = O(1). The simulator B solves the Modular Diophantine Equation with time cost and advantage
975
+ (t + Ts, ϵ/pm−2) = (t, ϵ/pm−2). Thus, contradicting the Theorem 4.1 so the initial assumption is wrong.
976
+ The framework of the IND-CPA challenge entails known plaintext, in other words, the adversary knows that the secret
977
+ x ∈ {m0, m1}. We now state the complexity of the unknown plaintext ciphertext-only attack.
978
+ 13
979
+
980
+ Novel Homomorphic Functional Encryption over a Hidden Ring
981
+ Lemma 4.3 (Ciphertext-only attack). Let m + 1 > 2. The classical complexity of finding the plaintext from the
982
+ ciphertext is O(pm−1).
983
+ Proof. Let the adversary favour the ciphertext in its reduced normal form (30). Without any knowledge about the
984
+ plaintext, the adversary will need to solve the Eq. (30) to obtain the plaintext along with the noise variables. A single
985
+ equation over Fp with m variables is expected to have pm−1 possible solutions over Fp. The correct one is among them.
986
+ That is, the plaintext encapsulated in a single variable x is not the sole variable in the ciphertext equation. However, it is
987
+ the only unknown of interest. The adversary can try and simply guess x, the complexity of the guess is O(p). However,
988
+ they have to test whether their guess is correct. Moreover, the secret transferred between the communicating parties
989
+ consist of 32 bytes as required by NIST. Thus, the adversary will have to guess K many values for x, where K = 32×8
990
+ p
991
+ .
992
+ In this case, the complexity is O(pK). We expect K > m − 1. Quantum complexity of the described attack due to
993
+ Grover’s search algorithm is O(p
994
+ m−1
995
+ 2 ).
996
+ 4.2
997
+ Private key attack
998
+ Lemma 4.4. Let λ ≤ 2. There exists a polynomial time algorithm to find coefficients of univariate polynomials f1(x0)
999
+ and f2(x0) given the plain central maps P1 and P2.
1000
+ Proof. Note that all the plain coefficients of the polynomials p1(x, x1, . . . , xm) and p2(x, x1, . . . , xm) as defined in
1001
+ Eq. (22) are defined over the prime field Fp. Thus, for any fixed j, it is possible to use Gaussian elimination to reduce
1002
+ the system of equations formed by the plain coefficients of p1(x, x1, . . . , xm) and p2(x, x1, . . . , xm) of the form
1003
+
1004
+
1005
+
1006
+
1007
+
1008
+
1009
+
1010
+
1011
+
1012
+ fz0b0j = p0jz,
1013
+ fz1b0j + fz0b1j = p1jz,
1014
+ ...
1015
+ fzλbnbj = pnjz,
1016
+ (31)
1017
+ where z ∈ {1, 2} corresponding to either plain polynomial p1(x, x1, . . . , xm) or p2(x, x1, . . . , xm) for any given noise
1018
+ variable xj. Gaussian elimination would produce a single polynomial in λ variables, namely fz2
1019
+ fz0 and fz1
1020
+ fz0 for λ = 2 or
1021
+ fz1
1022
+ fz0 if λ = 1. Such univariate or bivariate equation is solvable. Depending on the HPPK parameters, the adversary can
1023
+ simply use radical solutions, Evdokimov’s algorithm [55], or resultants together with Evdokimov’s algorithm to solve
1024
+ such equation [55, 56]. Gaussian elimination can be performed in polynomial time, and finding solutions by radicals,
1025
+ Evdokimov’s algorithm and computing resultants all have polynomial time complexity [55, 56].
1026
+ Lemma 4.5. Let λ ≤ 2. Finding private key from the cipher public key in the framework of HPPK reduces to finding
1027
+ the homomorphic encryption key S, R1, and R2.
1028
+ Proof. The private key consists of the coefficients of the univariate polynomials f1(x), f2(x) as well as values S, R1, R2
1029
+ used to encrypt the plain public key to the cipher public key. By Lemma 4.4 once the values R1, R2 and S are known,
1030
+ the coefficients of f1(x), f2(x) can be found in polynomial time.
1031
+ Definition 4.3 (Diophantine set). The Diophantine set is a set S ⊂ N associated with a Diophantine equation
1032
+ P(b, a1, . . . , ak) ∈ Z[b, a1, . . . , ak], where k > 0 such that
1033
+ b ∈ S if and only if (∃a1, . . . , ak)(P(b, a1, . . . , am) = 0)
1034
+ Theorem 4.6 (MRDP Theorem). The Matiyasevich–Robinson–Davis–Putnam (MRDP) theorem states that every
1035
+ computably enumerable set is Diophantine, and every Diophantine set is computably enumerable.
1036
+ Proof. The result has been proven in various works, for instance [57].
1037
+ Theorem 4.7 (Hilbert’s tenth problem). Hilbert’s tenth problem asks whether the general Diophantine Problem is
1038
+ solvable. Due to MRDP, Hilbert’s tenth problem is undecidable.
1039
+ Proof. For proof see [57].
1040
+ Theorem 4.8. Private key attack is non-deterministic and has complexity of at least O(T 3), where T is the largest
1041
+ number with 2|p|2 + |L|2 bit-length.
1042
+ 14
1043
+
1044
+ Novel Homomorphic Functional Encryption over a Hidden Ring
1045
+ Proof. By Lemma 4.4 and 4.5 the attack on public key reduces to finding the values S, R1, and R2. From the perspective
1046
+ of the attacker, the values S, R1, and R2 could be treated as a one-time pad keys as they have been chosen at random,
1047
+ and can not be calculated from other parameters given to the attacker. An obvious attack would be a brute force search
1048
+ for all the three values, S, R1, and R2. The direct brute force search classical complexity would be greater than O(T 3)
1049
+ for the three values together, where T is the largest (2|p|2 + |L|2)-bit number. Due to Grover’s algorithm, the quantum
1050
+ complexity is greater than O(T
1051
+ 3
1052
+ 2 ). Note however, because of the condition gcd(S, R1) = gcd(S, R2) = 1, once S is
1053
+ found the search span for R1 and R2 reduces. Brute force search entails a non-deterministic result, however, we provide
1054
+ a more formal argument below.
1055
+ For each fixed chose of j, each public key coefficient can be written in the integer domain as follows
1056
+
1057
+
1058
+
1059
+
1060
+
1061
+
1062
+
1063
+
1064
+
1065
+ fz0b′
1066
+ z0j = r0jzS + P0jz,
1067
+ fz1b′
1068
+ z0j + fz0b′
1069
+ z1j = r1jzS + P1jz,
1070
+ ...
1071
+ fzλb′
1072
+ znbj = rnjzS + Pnjz,
1073
+ (32)
1074
+ with j = 1, . . . , m, z = 1, 2, and b′
1075
+ zij = Rzbij. Here, Rz, and S are unknowns from the hidden ring ZS. Values rijz
1076
+ are merely some unknown integers. The only known values are those of the form Pijz. Using Gaussian eliminations,
1077
+ all unknowns of the form b′
1078
+ zij can be eliminated, and the equation system in Eq (32) can be reduced to a single equation
1079
+ over Z
1080
+ P(fz0, . . . , fzλ, r0jz, . . . , rnjz, S) − ¯P = 0.
1081
+ (33)
1082
+ Solving such equation by Theorem 4.6 and 4.7 is an NP-complete task. For each j, we can generate one such equation.
1083
+ Considering them all together, the adversary will arrive at an underdetermined system as the variables in the system
1084
+ depend on j. Each equation in such a system is a multivariate Diophantine equation. One way to solve this system
1085
+ is to solve each equation separately and search for common solutions. However, by Theorem 4.6 and 4.7 this is an
1086
+ NP-complete problem. Reducing the system to a single polynomial still produces a multivariate Diophantine equation,
1087
+ solving which is an NP-complete problem by Theorem 4.6 and 4.7.
1088
+ 4.3
1089
+ Security Conclusion
1090
+ At large, the security of the HPPK cryptosystem relies on the problem of solving undetermined system of equations
1091
+ over Fp. Such system is expected to have pn−m possible solutions, where n is the number of variables and m is the
1092
+ number of equations in the system. The attacker can solve this system to find all possible solutions, however, it is the
1093
+ problem of determining the correct solution from all the possible solutions that makes HPPK secure.
1094
+ The ciphertext attack requires the adversary to solve an underdetermined system of equations over Fp, which can be
1095
+ reduced to a single Modular Diophantine equation. Solving this equation is an NP-complete problem.
1096
+ The public key attack aimed to unveil the plaintext reduces to a brute force search for three unknown values S, R1, R2.
1097
+ To find these values, the attacker can either use brute-force search or solve an underdetermined system of equations
1098
+ over the integers. The former yields non-deterministic results and the latter is an NP-complete problem.
1099
+ We conclude that from the point of view of the adversary, the following is true.
1100
+ Proposition 4.8.1. The best classical complexity to attack HPPK is O(pm−1).
1101
+ Proof. We assume that the malicious party will take the most advantageous path for them. Thus, by Lemma 4.3,
1102
+ Lemma 4.4, Lemma 4.5, and Theorem 4.8 we can conclude that the best attack is to obtain the plaintext from the
1103
+ ciphertext. Such attack is non-deterministic with classical complexity of O(pm−1).
1104
+ 5
1105
+ Brief Benchmarking Performance
1106
+ To account for the best complexity of O(pm−1), we recommend the following configuration to achieve NIST security
1107
+ levels I, III, and V, as illustrated in Table 1.
1108
+ To measure the performance of the HPPK algorithm we used benchmarking toolkit, called the SUPERCOP. NIST PQC
1109
+ finalists used the SUPERCOP for their benchmarking and have contributed the results to the platform, thus, we take
1110
+ advantage of the available resources, and report on the performance of HPPK alongside with the NIST PQC schemes,
1111
+ namely, McEliece, Kyber, NTRU, and Saber algorithms. From now on we refer to them as the NIST finalists. For our
1112
+ work we used a 16-core Intel®Core™i7-10700 CPU at 2.90 GHz system. We have not, however, configured the AVX
1113
+ 15
1114
+
1115
+ Novel Homomorphic Functional Encryption over a Hidden Ring
1116
+ Table 1: Configuration of HPPK for different NIST Security Levels.
1117
+ Security Level
1118
+ Configuration
1119
+ Level I
1120
+ Level III
1121
+ Level V
1122
+ (log p, nb, λ, m)
1123
+ (64, 1, 1, 3)
1124
+ (64, 1, 1, 4),
1125
+ (64, 1, 1, 5)
1126
+ (log p, nb, λ, m)
1127
+ (64, 2, 1, 3)
1128
+ (64, 2, 1, 4),
1129
+ (64, 2, 1, 5)
1130
+ solution for optimized HPPK performance. Therefore, comparisons in this benchmarking performance are set to the
1131
+ reference mode for all finalists but in the same computing system.
1132
+ We start by illustrating the parameter set of all the measured primitives for all three security levels in the Table 2. As
1133
+ required by NIST, the secret is set at 32 bytes. The data illustrates that for each security level, HPPK offers considerably
1134
+ small public key sizes and ciphertext sizes for all three security levels compared to all NIST finalists, except for the
1135
+ ciphertext size of McEliece at level I and level III. We point out that, HPPK offers the same secret key size of 83 bytes
1136
+ and ciphertext size of 208 bytes for all three levels. In comparison with the NIST standardized KEM algorithm Kyber,
1137
+ HPPK’s public key sizes are less than half of respective public key sizes for Kyber for all three security levels. Secret
1138
+ key sizes for Kyber are about 20 times bigger at level I and close to 40 times bigger at level V than those of HPPK. As
1139
+ for the ciphertext sizes, Kyber demonstrates 3.7-7.5 times bigger ciphertext sizes than those of HPPK.
1140
+ Table 2: Parameter set of the measured primitives for NIST security levels I, III, and V, given the secret size of 32 bytes
1141
+ Crypto
1142
+ Size (Bytes)
1143
+ system
1144
+ Level I
1145
+ Level III
1146
+ Level V
1147
+ PK1
1148
+ SK1
1149
+ CT1
1150
+ PK
1151
+ SK
1152
+ CT
1153
+ PK
1154
+ SK
1155
+ CT
1156
+ McEliece2 [29]
1157
+ 261120
1158
+ 6492
1159
+ 128
1160
+ 524,160
1161
+ 13,608
1162
+ 188
1163
+ 1,044,992
1164
+ 13,932
1165
+ 240
1166
+ NTRU4 [31]
1167
+ 699
1168
+ 935
1169
+ 699
1170
+ 930
1171
+ 1,234
1172
+ 930
1173
+ 1,230
1174
+ 1,590
1175
+ 1,230
1176
+ Saber5 [33]
1177
+ 672
1178
+ 1568
1179
+ 736
1180
+ 1,312
1181
+ 3,040
1182
+ 1,472
1183
+ 1,312
1184
+ 3,040
1185
+ 1,472
1186
+ Kyber3 [30]
1187
+ 800
1188
+ 1632
1189
+ 768
1190
+ 1,184
1191
+ 2,400
1192
+ 1,088
1193
+ 1,568
1194
+ 3,168
1195
+ 1,568
1196
+ HPPK(nb = 1)6
1197
+ 306
1198
+ 83
1199
+ 208
1200
+ 408
1201
+ 83
1202
+ 208
1203
+ 510
1204
+ 83
1205
+ 208
1206
+ HPPK(nb = 2)6
1207
+ 408
1208
+ 83
1209
+ 208
1210
+ 544
1211
+ 83
1212
+ 208
1213
+ 680
1214
+ 83
1215
+ 208
1216
+ 1 We denote the secret key as SK, the public key as PK, and the ciphertext as CT.
1217
+ 2 mceliece348864 primitive was measured for Level I, mceliece460896 primitive was measured for Level III, and mceliece6688128
1218
+ for Level V
1219
+ 3 Kyber512 primitive was measured for Level I, Kyber768 primitive was measured for Level III, and Kyber1024 for Level V
1220
+ 4 NTRUhps2048509 primitive was measured for Level I, ntruhps2048677 primitive was measured for Level III, and ntruhps4096821
1221
+ for Level V
1222
+ 5 Light Saber primitive was measured for Level I, Saber primitive was measured for Level III, and FireSaber for Level V
1223
+ 6 For each security level, HPPK primitive is configured as shown in Table 1
1224
+ Table 3 provides the reader with median values in clock cycles of the measurement results for the key generation
1225
+ procedure of all the primitives configured to provide security levels I, III, and V. To provide a bigger picture we include
1226
+ results for RSA-2048. The results correspond only to security level I, as RSA-2048 provides 112 bits of entropy. The
1227
+ reader can see that HPPK key generation performance is rather fast, with median clock cycles of over 18, 000 for nb = 1
1228
+ and 22, 000 for nb = 2 for level I, over 21, 000 for nb = 1 and 28, 000 for nb = 2 for level III, and over 26, 000 for
1229
+ nb = 1 and 34, 000 for nb = 2 for level V. The fastest key generation performance among the NIST finalists is offered
1230
+ by Saber and Kyber, with median values of over 39, 000 and 72, 000 clock cycles respectively for level I, median values
1231
+ over 115000 for level III, and median values of 128, 000 clock cycles for level V. Compared to the standard algorithm
1232
+ Kyber, HPPK demonstrates a 3.5-6 times faster key generation performance. The remaining primitives measured,
1233
+ including RSA, display median values of over 6 million clock cycles for level I, over 10 million for level III, and over
1234
+ 16 million clock cycles for level V.
1235
+ We provide Table 4 to illustrate encryption procedure performance of HPPK, NIST finalists, and RSA-2048. The table
1236
+ illustrates median values given in clock cycles. HPPK offers fast encryption with clock cycles from 17,000 for security
1237
+ level I to 25,000 for security level V, outperforming all mentioned NIST finalists. More specifically comparing the
1238
+ NIST standard algorithm, Kyber, to HPPK the table illustartes that Kyber offers 4-8 times slower encryption than HPPK
1239
+ for all levels. However, RSA-2048 offers the fastest encryption performance among all the other primitives measured
1240
+ for level I, due to its small public encryption key, usually chosen to be 65535.
1241
+ In Table 5 we illustrate median values given in clock cycles for the decryption procedure corresponding to the HPPK
1242
+ algortihm, the NIST finalists algorithms, and RSA-2048. Table 5 shows that HPPK offers fast decryption performance
1243
+ 16
1244
+
1245
+ Novel Homomorphic Functional Encryption over a Hidden Ring
1246
+ Table 3: Median values of the key generation performance for NIST security levels I, III, and V.
1247
+ Crypto
1248
+ Performance (Clock cycles)
1249
+ system
1250
+ Level I
1251
+ Level III
1252
+ Level V
1253
+ McEliece1 [29]
1254
+ 152,424,455
1255
+ 509,364,485
1256
+ 1,127,581,201
1257
+ NTRU3 [31]
1258
+ 6,554,031
1259
+ 10,860,295
1260
+ 16,046,953
1261
+ Saber4 [33]
1262
+ 39,654
1263
+ 128,935
1264
+ 128,412
1265
+ Kyber2 [30]
1266
+ 72,403
1267
+ 115,654
1268
+ 177,818
1269
+ HPPK (nb = 1)5
1270
+ 18,034
1271
+ 21,946
1272
+ 26,603
1273
+ HPPK(nb = 2)5
1274
+ 22,625
1275
+ 28,360
1276
+ 34,719
1277
+ RSA-2048
1278
+ 91,985,129
1279
+ -
1280
+ -
1281
+ 1 mceliece348864 primitive was measured for Level I, mceliece460896 primitive was measured for Level III, and mceliece6688128
1282
+ for Level V
1283
+ 2 Kyber512 primitive was measured for Level I, Kyber768 primitive was measured for Level III, and Kyber1024 for Level V
1284
+ 3 NTRUhps2048509 primitive was measured for Level I, ntruhps2048677 primitive was measured for Level III, and ntruhps4096821
1285
+ for Level V
1286
+ 4 Light Saber primitive was measured for Level I, Saber primitive was measured for Level III, and FireSaber for Level V
1287
+ 5 For each security level, HPPK primitive is configured as shown in Table 1
1288
+ Table 4: Median values of the key encapsulation performance estimated in clock cycles for NIST security levels I, III,
1289
+ and V.
1290
+ Crypto
1291
+ Performance (Clock cycles)
1292
+ system
1293
+ Level I
1294
+ Level III
1295
+ Level V
1296
+ McEliece1 [29]
1297
+ 108,741
1298
+ 172,538
1299
+ 263,169
1300
+ NTRU3 [31]
1301
+ 418,622
1302
+ 703,046
1303
+ 1,063,124
1304
+ Saber4 [33]
1305
+ 62,154
1306
+ 157,704
1307
+ 157,521
1308
+ Kyber2 [30]
1309
+ 95,466
1310
+ 140,376
1311
+ 205,505
1312
+ HPPK(nb = 1)5
1313
+ 17,354
1314
+ 20,951
1315
+ 25,087
1316
+ HPPK(nb = 2)5
1317
+ 23,073
1318
+ 28,642
1319
+ 35,173
1320
+ RSA-2048
1321
+ 13,429
1322
+ -
1323
+ -
1324
+ 1 mceliece348864 primitive was measured for Level I, mceliece460896 primitive was measured for Level III, and mceliece6688128
1325
+ for Level V
1326
+ 2 Kyber512 primitive was measured for Level I, Kyber768 primitive was measured for Level III, and Kyber1024 for Level V
1327
+ 3 NTRUhps2048509 primitive was measured for Level I, ntruhps2048677 primitive was measured for Level III, and ntruhps4096821
1328
+ for Level V
1329
+ 4 Light Saber primitive was measured for Level I, Saber primitive was measured for Level III, and FireSaber for Level V
1330
+ 5 For each security level, HPPK primitive is configured as shown in Table 1
1331
+ with median values for level I being at 28, 000 clock cycles. Meanwhile, median values for the faster NIST finalists
1332
+ are over 63, 000 and 117, 000 clcok cycles for Saber and Kyber respectively configured to provide level I security.
1333
+ Both RSA-2048 and NTRU have median values over 1 million clock cycles for level I. McEliece median value is over
1334
+ 45 million clock cycles. For levels III and V the account is similar. HPPK offers median values for both of these
1335
+ levels which fall in the interval of [28000, 30000] clock cycles, while median values for Saber are over 170, 000 for
1336
+ levels III and V. Median values for Kyber fall into the interval of [166000, 238000] for levels III and V. NTRU displays
1337
+ median values of over 2 million clock cycles for level III and V. McEliece offers the slowest decryption procedure with
1338
+ median values being over 93 million for level III, and 179 million for level V. HPPK decryption demonstrates a stable
1339
+ performance at 30, 000 clock cycles for all security levels, due to its special decryption mechanism with a modular
1340
+ division.
1341
+ 6
1342
+ Conclusion
1343
+ In this paper, we introduced a new Functional Homomorphic Encryption, which in contrast with conventional homomor-
1344
+ phic encryption, is intended to secure public keys of multivariate asymmetric cryptosystems. Functional homomorphic
1345
+ encryption is applied to polynomials, to leverage homomorphic properties and allow for user input through variables.
1346
+ The functional homomorphic encryption and decryption operators are multiplication operators modulo a hidden value S,
1347
+ with values R1 and R2 respectively. Such values R1 and R2 are chosen uniformly at random from the hidden ring ZS
1348
+ with certain conditions. We propose to use said homomorphic encryption in conjunction with Multivariate Polynomial
1349
+ 17
1350
+
1351
+ Novel Homomorphic Functional Encryption over a Hidden Ring
1352
+ Table 5: Median values of key decapsulation performance for NIST security levels I, III, and V.
1353
+ Crypto
1354
+ Performance (Clock cycles)
1355
+ system
1356
+ Level I
1357
+ Level III
1358
+ Level V
1359
+ McEliece1 [29]
1360
+ 45,119,775
1361
+ 93,121,708
1362
+ 179,917,369
1363
+ NTRU3 [31]
1364
+ 1,245,062
1365
+ 2,099,254
1366
+ 3,129,150
1367
+ Saber4 [33]
1368
+ 63,048
1369
+ 173,712
1370
+ 177,109
1371
+ Kyber2 [30]
1372
+ 117,245
1373
+ 166,062
1374
+ 237,484
1375
+ HPPK(nb = 1)5
1376
+ 28,301
1377
+ 28,759
1378
+ 29,671
1379
+ HPPK (nb = 2)5
1380
+ 29,791
1381
+ 29,266
1382
+ 29,364
1383
+ RSA-2048
1384
+ 1,670,173
1385
+ -
1386
+ -
1387
+ 1 mceliece348864 primitive was measured for Level I, mceliece460896 primitive was measured for Level III, and mceliece6688128
1388
+ for Level V
1389
+ 2 Kyber512 primitive was measured for Level I, Kyber768 primitive was measured for Level III, and Kyber1024 for Level V
1390
+ 3 NTRUhps2048509 primitive was measured for Level I, ntruhps2048677 primitive was measured for Level III, and ntruhps4096821
1391
+ for Level V
1392
+ 4 Light Saber primitive was measured for Level I, Saber primitive was measured for Level III, and FireSaber for Level V
1393
+ 5 For each security level, HPPK primitive is configured as shown in Table 1
1394
+ Public-key Cryptography, to secure the polynomial public keys, however, we do not study the encrypted MPKC in
1395
+ detail. Instead, we suggest a new variant of multivariate public-key cryptosystem with public keys encrypted using
1396
+ homomorphic encryption, called Homomorphic Polynomial Public Key or HPPK. We described the HPPK algorithm
1397
+ in detail, with the framework drawn from MPKC. HPPK public keys are product polynomials of a multivariate and
1398
+ univariate polynomials, encrypted with a homomorphic encryption operator. The ciphertext is created by the encrypting
1399
+ party through the input of plaintext and random noise as public polynomial variables. The decryption procedure
1400
+ involves first decrypting the public key, to nullify the homomorphic encryption and produce the original ciphertext.
1401
+ Said ciphertext is used to divide two product polynomials. By construction, such division cancels the base multiplicand
1402
+ polynomial with noise variable. and retains a single equation in one variable. Said variable is the plaintext, which
1403
+ can be found by radicals. We give a thorough security analysis of the HPPK cryptosystem, proving that the hardness
1404
+ of breaking the HPPK algorithm comes from the computational hardness of the Modular Diophantine Equation, and
1405
+ Hilbert’s tenth problem. We also show that HPPK holds IND-CPA property. We report briefly on benchmarking the
1406
+ performance of the HPPK cryptosystem, using the NIST-recognized SUPERCOP benchmarking tool, with nb = 1 and
1407
+ λ = 1. The benchmarking data illustrates that the HPPK offers rather small public keys and comparable ciphertext sizes.
1408
+ The key generation, key encapsulation, and key decapsulation procedure performance are efficient, being noticeably
1409
+ faster when considered together with the NIST PQC finalists. If the degree of univariate polynomial f1(x) and f2(x)
1410
+ are higher than 1, such as quadratic polynomials, the decryption would produce multiple roots, then an extra verification
1411
+ procedure is required. Moreover, the decryption speed would be dramatically slower than linear polynomials f1(x) and
1412
+ f2(x). In the future work, we will perform more detail benchmarking with variety of configurations as well as a more
1413
+ extensive security analysis, considering attacks that have not been described in the work.
1414
+ References
1415
+ [1] R L Rivest, L Adleman, and M L Dertouzos. On data banks and privacy homomorphisms. Foundations of Secure
1416
+ Computation, Academia Press, pages 169–179, 1978.
1417
+ [2] Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Cryptographic communications system and method,
1418
+ December 1977. US Patent 4,405,829.
1419
+ [3] W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644–
1420
+ 654, November 1976.
1421
+ [4] Neal Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48(177):203–209, 1987.
1422
+ [5] Victor S. Miller. Use of elliptic curves in cryptography. In Hugh C. Williams, editor, Advances in Cryptology —
1423
+ CRYPTO ’85 Proceedings, pages 417–426, Berlin, Heidelberg, 1986. Springer Berlin Heidelberg.
1424
+ [6] Ronald L Rivest, Adi Shamir, and Leonard Adleman. A method for obtaining digital signatures and public-key
1425
+ cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
1426
+ [7] Taher Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In ADV. IN
1427
+ CRYPTOLOGY, SPRINGER-VERLAG, 1985.
1428
+ 18
1429
+
1430
+ Novel Homomorphic Functional Encryption over a Hidden Ring
1431
+ [8] Shafi Goldwasser and Silvio Micali. Probabilistic encryption; how to play mental poker keeping secret all partial
1432
+ information. In Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC ’82, page
1433
+ 365–377, New York, NY, USA, 1982. Association for Computing Machinery.
1434
+ [9] Laurent Fousse, Pascal Lafourcade, and Mohamed Alnuaimi. Benaloh’s dense probabilistic encryption revisited.
1435
+ In Abderrahmane Nitaj and David Pointcheval, editors, Progress in Cryptology – AFRICACRYPT 2011, pages
1436
+ 348–362, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg.
1437
+ [10] Pascal Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Jacques Stern,
1438
+ editor, Advances in Cryptology — EUROCRYPT ’99, pages 223–238, Berlin, Heidelberg, 1999. Springer Berlin
1439
+ Heidelberg.
1440
+ [11] Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. Fully homomorphic encryption over the
1441
+ integers. In Henri Gilbert, editor, Advances in Cryptology – EUROCRYPT 2010, pages 24–43, Berlin, Heidelberg,
1442
+ 2010. Springer Berlin Heidelberg.
1443
+ [12] A. C.-F. Chan. Symmetric-key homomorphic encryption for encrypted data processing. In 2009 IEEE International
1444
+ Conference on Communications, pages 1–5, 2009.
1445
+ [13] Aviad Kipnis and Eli Hibshoosh. Efficient methods for practical fully-homomorphic symmetric-key encryption,
1446
+ randomization, and verification, 2012.
1447
+ [14] C P Gupta and Iti Sharma. A fully homomorphic encryption scheme with symmetric keys with application to
1448
+ private data processing in clouds. In 2013 Fourth International Conference on the Network of the Future (NoF),
1449
+ pages 1–4, 2013.
1450
+ [15] Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, and Jun Shao. Privacy-preserving-
1451
+ outsourced association rule mining on vertically partitioned databases. IEEE Transactions on Information
1452
+ Forensics and Security, 11(8):1847–1861, 2016.
1453
+ [16] Baocang Wang, Yu Zhan, and Zhili Zhang. Cryptanalysis of a symmetric fully homomorphic encryption scheme.
1454
+ IEEE Transactions on Information Forensics and Security, 13(6):1460–1467, 2018.
1455
+ [17] Quanbo Qu, Baocang Wang, Yuan Ping, and Zhili Zhang. Improved cryptanalysis of a fully homomorphic
1456
+ symmetric encryption scheme. Security and Communication Networks, 2019:1847–1861, 2019.
1457
+ [18] Aviad Kipnis, Jacques Patarin, and Louis Goubin. Unbalanced oil and vinegar signature schemes. In IN
1458
+ ADVANCES IN CRYPTOLOGY — EUROCRYPT 1999, pages 206–222. Springer, 1999.
1459
+ [19] Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, and Ming-shing Chen. Square, a new multivariate
1460
+ encryption scheme. In Topics in Cryptology – CT-RSA 2009, Lecture Notes in Computer Science, pages 252–264.
1461
+ Springer Berlin Heidelberg, Berlin, Heidelberg, 2009.
1462
+ [20] Jaiberth Porras, John Baena, and Jintai Ding. Zhfe, a new multivariate public key encryption scheme. In Post-
1463
+ Quantum Cryptography, Lecture Notes in Computer Science, pages 229–245. Springer International Publishing,
1464
+ Cham, 2014.
1465
+ [21] Alan Szepieniec, Jintai Ding, and Bart Preneel.
1466
+ Extension field cancellation: A new central trapdoor for
1467
+ multivariate quadratic systems. In Post-Quantum Cryptography, Lecture Notes in Computer Science, pages
1468
+ 182–196. Springer International Publishing, Cham, 2016.
1469
+ [22] Jacques PATARIN, Nicolas COURTOIS, and Louis GOUBIN. Quartz, 128-bit long digital signatures. In Lecture
1470
+ notes in computer science, pages 282–297, Berlin, 2001. Springer.
1471
+ [23] Albrecht Petzoldt, Ming-Shing Chen, Bo-Yin Yang, Chengdong Tao, and Jintai Ding. Design principles for hfev-
1472
+ based multivariate signature schemes. In Advances in Cryptology – ASIACRYPT 2015, Lecture Notes in Computer
1473
+ Science, pages 311–334. Springer Berlin Heidelberg, Berlin, Heidelberg, 2016.
1474
+ [24] Wenbin Zhang and Chik How Tan. Mi-t-hfe, a new multivariate signature scheme. In Jens Groth, editor,
1475
+ Cryptography and Coding, pages 43–56, Cham, 2015. Springer International Publishing.
1476
+ [25] Jintai Ding and Dieter S. Schmidt. Rainbow, a new multivariable polynomial signature scheme. In ACNS, 2005.
1477
+ [26] Antoine Casanova, Jean-Charles Faugère, Gilles Macario-Rat, Jacques Patarin, Ludovic Perret, and Jocelyn
1478
+ Ryckeghem. Gemss: A great multivariate short signature, 2017.
1479
+ [27] Frank Arute, Kunal Arya, Ryan Babbush, Dave Bacon, Joseph C. Bardin, Rami Barends, Rupak Biswas, Sergio
1480
+ Boixo, Fernando G. S. L. Brandao, David A. Buell, Brian Burkett, Yu Chen, Zijun Chen, Ben Chiaro, Roberto
1481
+ Collins, William Courtney, Andrew Dunsworth, Edward Farhi, Brooks Foxen, Austin Fowler, Craig Gidney,
1482
+ Marissa Giustina, Rob Graff, Keith Guerin, Steve Habegger, Matthew P. Harrigan, Michael J. Hartmann, Alan
1483
+ Ho, Markus Hoffmann, Trent Huang, Travis S. Humble, Sergei V. Isakov, Evan Jeffrey, Zhang Jiang, Dvir Kafri,
1484
+ 19
1485
+
1486
+ Novel Homomorphic Functional Encryption over a Hidden Ring
1487
+ Kostyantyn Kechedzhi, Julian Kelly, Paul V. Klimov, Sergey Knysh, Alexander Korotkov, Fedor Kostritsa, David
1488
+ Landhuis, Mike Lindmark, Erik Lucero, Dmitry Lyakh, Salvatore Mandrà, Jarrod R. McClean, Matthew McEwen,
1489
+ Anthony Megrant, Xiao Mi, Kristel Michielsen, Masoud Mohseni, Josh Mutus, Ofer Naaman, Matthew Neeley,
1490
+ Charles Neill, Murphy Yuezhen Niu, Eric Ostby, Andre Petukhov, John C. Platt, Chris Quintana, Eleanor G.
1491
+ Rieffel, Pedram Roushan, Nicholas C. Rubin, Daniel Sank, Kevin J. Satzinger, Vadim Smelyanskiy, Kevin J. Sung,
1492
+ Matthew D. Trevithick, Amit Vainsencher, Benjamin Villalonga, Theodore White, Z. Jamie Yao, Ping Yeh, Adam
1493
+ Zalcman, Hartmut Neven, and John M. Martinis. Quantum supremacy using a programmable superconducting
1494
+ processor. Nature, 574(7779):505–510, 2019.
1495
+ [28] NIST. Post-quantum cryptography. https://csrc.nist.gov/projects/post-quantum-cryptography, 2021.
1496
+ [29] R. J. McEliece. A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep Space Network Progress
1497
+ Report, 44:114–116, January 1978.
1498
+ [30] Roberto Avanzi, Joppe Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M Schanck,
1499
+ Peter Schwabe, Gregor Seiler, and Damien Stehlé. Crystals-kyber algorithm specifications and supporting
1500
+ documentation. NIST PQC Round, 2:4, 2017.
1501
+ [31] Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. Ntru: A ring-based public key cryptosystem. In Joe P.
1502
+ Buhler, editor, Algorithmic Number Theory, pages 267–288, Berlin, Heidelberg, 1998. Springer Berlin Heidelberg.
1503
+ [32] Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, and Christine van Vredendaal. NTRU prime:
1504
+ Reducing attack surface at low cost. In Carlisle Adams and Jan Camenisch, editors, Selected Areas in Cryptography
1505
+ – SAC 2017, pages 235–260, Cham, 2018. Springer International Publishing.
1506
+ [33] Ir Frederik Vercauteren. Saber: Mod-lwr based kem (round 3 submission).
1507
+ [34] Jintai Ding and Bo-Yin Yang. Multivariate Public Key Cryptography, pages 193–241. Springer Berlin Heidelberg,
1508
+ Berlin, Heidelberg, 2009.
1509
+ [35] Tsutomu Matsumoto and Hideki Imai. Public quadratic polynomial-tuples for efficient signature-verification and
1510
+ message-encryption. In D. Barstow, W. Brauer, P. Brinch Hansen, D. Gries, D. Luckham, C. Moler, A. Pnueli,
1511
+ G. Seegmüller, J. Stoer, N. Wirth, and Christoph G. Günther, editors, Advances in Cryptology — EUROCRYPT
1512
+ ’88, pages 419–453, Berlin, Heidelberg, 1988. Springer Berlin Heidelberg.
1513
+ [36] Christopher Wolf and Bart Preneel. Large superfluous keys in multivariate quadratic asymmetric systems. In
1514
+ Proceedings of the 8th International Conference on Theory and Practice in Public Key Cryptography, PKC’05,
1515
+ page 275–287, Berlin, Heidelberg, 2005. Springer-Verlag.
1516
+ [37] Jacques Patarin and Louis Goubin. Trapdoor one-way permutations and multivariate polynomials. In Proc. of
1517
+ ICICS’97, LNCS 1334, pages 356–368. Springer, 1997.
1518
+ [38] Jacques Patarin. Hidden fields equations (hfe) and isomorphisms of polynomials (ip): Two new families of
1519
+ asymmetric algorithms. In Ueli Maurer, editor, Advances in Cryptology — EUROCRYPT ’96, pages 33–48, Berlin,
1520
+ Heidelberg, 1996. Springer Berlin Heidelberg.
1521
+ [39] Lih chung Wang, Bo yin Yang, Yu hua Hu, and Feipei Lai. A medium field multivariate public-key encryption
1522
+ scheme. In In CT-RSA 2006, volume 3860 of LNCS, pages 132–149, 2006.
1523
+ [40] Xin Wang and Xinmei Wang. An improved medium field multivariate public key cryptosystem. In 2008 Third
1524
+ International Conference on Convergence and Hybrid Information Technology, volume 2, pages 1120–1124, 2008.
1525
+ [41] Jean-Charles Faugére. A new efficient algorithm for computing gröbner bases (f4). Journal of Pure and Applied
1526
+ Algebra, 139(1):61–88, 1999.
1527
+ [42] Jean charles Faugère. A new efficient algorithm for computing gröbner bases (f4). In IN: ISSAC ’02: PROCEED-
1528
+ INGS OF THE 2002 INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION,
1529
+ pages 75–83, 2002.
1530
+ [43] Jintai Ding, J. Gower, and D. Schmidt. Zhuang-zi: A new algorithm for solving multivariate polynomial equations
1531
+ over a finite field. IACR Cryptol. ePrint Arch., 2006:38, 2006.
1532
+ [44] Nicolas Courtois, Alexander Klimov, Jacques Patarin, and Adi Shamir. Efficient algorithms for solving overdefined
1533
+ systems of multivariate polynomial equations. In Advances in Cryptology - EUROCRYPT 2000, International
1534
+ Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000,
1535
+ Proceeding, volume 1807 of Lecture Notes in Computer Science, pages 392–407. Springer, 2000.
1536
+ [45] Louis Goubin and Nicolas T. Courtois. Cryptanalysis of the ttm cryptosystem. In Tatsuaki Okamoto, editor,
1537
+ Advances in Cryptology — ASIACRYPT 2000, pages 44–57, Berlin, Heidelberg, 2000. Springer Berlin Heidelberg.
1538
+ 20
1539
+
1540
+ Novel Homomorphic Functional Encryption over a Hidden Ring
1541
+ [46] Aviad Kipnis, Jacques Patarin, and Louis Goubin. Unbalanced oil and vinegar signature schemes. In Jacques
1542
+ Stern, editor, Advances in Cryptology — EUROCRYPT ’99, pages 206–222, Berlin, Heidelberg, 1999. Springer
1543
+ Berlin Heidelberg.
1544
+ [47] Randy Kuang. A deterministic polynomial public key algorithm over a prime galois field gf(p). In 2021 2nd Asia
1545
+ Conference on Computers and Communications (ACCC), pages 79–88, 2021.
1546
+ [48] Randy Kuang and Michel Barbeau. Indistinguishability and non-deterministic encryption of the quantum safe
1547
+ multivariate polynomial public key cryptographic system. In 2021 IEEE Canadian Conference on Electrical and
1548
+ Computer Engineering (CCECE), pages 1–5, 2021.
1549
+ [49] Randy Kuang and Michel Barbeau. Performance analysis of the quantum safe multivariate polynomial public
1550
+ key algorithm. In 2021 IEEE International Conference on Quantum Computing and Engineering (QCE), pages
1551
+ 351–358. IEEE, 2021.
1552
+ [50] Randy Kuang and Michel Barbeau. Performance analysis of the quantum safe multivariate polynomial public
1553
+ key algorithm. In 2021 IEEE International Conference on Quantum Computing and Engineering (QCE), pages
1554
+ 351–358, 2021.
1555
+ [51] Randy Kuang, Maria Perepechaenko, and Michel Barbeau. A new quantum-safe multivariate polynomial public
1556
+ key digital signature algorithm. Scientific Reports, 12, 2022.
1557
+ [52] Jintai Ding, Albrecht Petzoldt, and Dieter S. Schmidt. The SimpleMatrix Encryption Scheme, pages 169–183.
1558
+ Springer US, New York, NY, 2020.
1559
+ [53] Jintai Ding, Albrecht Petzoldt, and Dieter S. Schmidt. Multivariate Cryptography, pages 7–23. Springer US, New
1560
+ York, NY, 2020.
1561
+ [54] C. Moore and S. Mertens. The Nature of Computation. OUP Oxford, 2011.
1562
+ [55] Sergei Evdokimov. Factorization of polynomials over finite fields in subexponential time under grh. In Interna-
1563
+ tional Algorithmic Number Theory Symposium, pages 209–219. Springer, 1994.
1564
+ [56] Peter F. Stiller. An introduction to the theory of resultants. 2004.
1565
+ [57] Yuri Matiyasevich. Hilbert’s tenth problem. Foundations of Computing Series. MIT Press, Cambridge, MA, 1993.
1566
+ Translated from the 1993 Russian original by the author, with a foreword by Martin Davis.
1567
+ 21
1568
+
GtFLT4oBgHgl3EQfHC_F/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
H9E1T4oBgHgl3EQfrgXE/content/tmp_files/2301.03356v1.pdf.txt ADDED
@@ -0,0 +1,531 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
2
+ DOI: 10.5121/ijans.2022.12403 35
3
+
4
+ SENSOR SIGNAL PROCESSING USING HIGH-LEVEL
5
+ SYNTHESIS AND INTERNET OF THINGS WITH A
6
+ LAYERED ARCHITECTURE
7
+
8
+ CS Reddy1 and Krishna Anand2
9
+
10
+ 1Department of Mathematics, CIT - NC, VTU University, Bangalore, India
11
+ 2Department of Computer Engineering, Anurag University, Hyderabad, India
12
+
13
+ ABSTRACT
14
+
15
+ Sensor routers play a crucial role in the sector of Internet of Things applications, in which the capacity for
16
+ transmission of the network signal is limited from cloud systems to sensors and its reversal process. It
17
+ describes a robust recognized framework with various architected layers to process data at high level
18
+ synthesis. It is designed to sense the nodes instinctually with the help of Internet of Things where the
19
+ applications arise in cloud systems. In this paper embedded PEs with four layer new design framework
20
+ architecture is proposed to sense the devises of IOT applications with the support of high-level synthesis
21
+ DBMF (database management function) tool.
22
+
23
+ KEYWORDS
24
+
25
+ Network Protocols, Wireless Network, Mobile Network, Internet of Things, Reconfigurable dynamic
26
+ processor, Sensor signal processing.
27
+
28
+ 1. INTRODUCTION
29
+
30
+ Sensor routers play a crucial role in the sector of Internet of Things (IOT) applications, in which
31
+ the capacity for transmission of the network signal is limited from cloud systems to sensors and
32
+ its reversal process. Consequence to this volume of the data reduction is obligatory to combat
33
+ device computing functions between sensor nodes and transmitter to exchange the sufficient data
34
+ with the available networks [1-3]. Hence, low power consumption and small footprints are
35
+ commanded among sensor nodes to process information. One of the replacements for
36
+ microcontroller units is field programmable gate arrays to optimize the footprints size, so that it is
37
+ to be observed keenly the routing with configurable logic blocks and switches of look-up tables
38
+ which causes placement inefficiency [4, 7]. To fabricate Field Programmable Gate Arrays
39
+ (FPGA) it is wise to use High-level synthesis which will enable global optimization and
40
+ recompense the limitation of Routing and Placement [5, 6].
41
+
42
+ In this paper embedded PEs with four layer new design framework architecture is proposed to
43
+ sense the devises of IOT applications with the support of high-level synthesis DBMF (database
44
+ management function) tool [8, 17, 19]. It exploits the repetitive high level synthesis process.
45
+ Macro blocks synthesized through high-level behavioural synthesis are registered in a database
46
+ before the system level synthesis, and the information in the database is used for the optimization
47
+ of resource consumption through the system level synthesis [10]. In this work authors tried to
48
+ investigate the dependencies of resource consumption on the granularity of coarse grained
49
+ function definitions using the extended database management function of Cyber Work Bench.
50
+ The evaluation results show that small footprint was achieved especially with dynamically
51
+ reconfigurable technique [9, 15].
52
+
53
+ International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
54
+ 36
55
+ Dynamically reconfigurable processors using high-level synthesis were proposed to improve the
56
+ efficiency, whereas the inefficiency of fixed mesh pointed out in still remains [11-14]. Fixed bit
57
+ widths of data paths, elementary blocks, and switch matrices aiming at mass production of the
58
+ devices were one example of the inefficiency. Sensors used in IOT applications have various data
59
+ interfaces, such as 8, 12, 14, or 16 bits [ 17, 19]. Predefined data path between arrays of
60
+ arithmetic logic units prevents behavioural synthesis tools from the optimization of layout size
61
+ and the reduction in power consumption. Therefore, optimized Arithmetic Logic Units (ALU)
62
+ and flexible data paths are required to embed processors in sensor units [13, 15-17].
63
+
64
+ 2. HIGH-LEVEL SYNTHESIS TOOLS
65
+
66
+ High-level synthesis is increasingly popular for the design of high-performance and energy-
67
+ efficient heterogeneous systems, shortening time-to-market and addressing today’s system
68
+ complexity [18, 20, 25]. Early academic work extracted scheduling, allocation, and binding as the
69
+ basic steps for high-level-synthesis [22, 24, 32]. Scheduling partitions in the algorithm to control
70
+ steps that are used in the model are defined the states in the finite-state machine [21, 33].
71
+
72
+ First generation behavioural synthesis was introduced by Synopsys in 1994 as behavioural
73
+ Compiler and used Verilog or VHDL as input languages. 10 years later, in 2004, there emerged a
74
+ number of next generation commercial high-level synthesis products which provided synthesis of
75
+ circuits specified at C level to a register transfer level specification [23, 25, 26]. It was primarily
76
+ adopted in Japan and Europe in the early years. As of late 2008, there was an emerging adoption
77
+ in the United States. High-level synthesis (HLS) allows designers to work at a higher level of
78
+ abstraction by using a software program to specify the hardware functionality [28, 29].
79
+ Additionally, HLS is particularly interesting for designing field-programmable gate array circuits,
80
+ where hardware implementations can be easily refined and replaced in the target device [27, 30-
81
+ 32]. Recent years have seen much activity in the HLS research community, with a plethora of
82
+ HLS tool offerings, from both industry and academia.
83
+
84
+
85
+
86
+ Fig.1. Classification of High-Level Synthesis Input Language.
87
+
88
+ Applicationdomains:
89
+ HighLevelSynthesis
90
+ Tool status:
91
+ All domains
92
+ Imaging
93
+ Tools
94
+ InUse
95
+ Streaming
96
+ Stream/lmage
97
+ Abandoned
98
+ Loop/Pipeline
99
+ NIA
100
+ DSP
101
+ DataFlow
102
+ .NET
103
+ DomainSpecific
104
+ Generic
105
+ ODSE
106
+ Languages
107
+ Languages
108
+ NEW
109
+ C-extended
110
+ Procedural
111
+ ObjectOriented
112
+ Languages
113
+ Languages
114
+ Languages
115
+ Languages
116
+ O CyberWorkBench (BDL)
117
+ CoDeveloper (ImpulseC)
118
+ O Vivado HLS
119
+ CtoVerilog
120
+ Maxeler (MaxJ)
121
+ OBluespec (BSV)
122
+ DK Design Suite (HandelC)
123
+ oCatapult
124
+ O C2H
125
+ X
126
+ KIWI (C#)
127
+ PipeRench(DIL)
128
+ SA-C (SA-C)
129
+ oCtos
130
+ OSynphHLS
131
+ SeaCucumber (Java)
132
+ O HercuLeS (NAC)
133
+ Garp (Cpragmas)
134
+ SPARK
135
+ MATCH
136
+ Cynthesizer (SystemC)
137
+ Napa-C (Cpragmas)
138
+ O CHC
139
+ AccelDSP
140
+ eXCite (CSP pragmas)
141
+ O LegUp
142
+ O CHiMPS
143
+ ROCCC (C extended)
144
+ OBambu
145
+ ?DEFACTO
146
+ GAUT
147
+ ogcc2verilog
148
+ TridentInternational Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
149
+ 37
150
+ HLS tools start from a software programmable high-level language to automatically produce a
151
+ circuit specification in HDL that performs the same function. The most common source inputs for
152
+ high-level synthesis are based on standard languages such as ANSI C/C++, System C and
153
+ MATLAB. HLS has also been recently applied to a variety of applications (e.g., medical
154
+ imaging, convolutional neural networks, and machine learning), with significant benefits in terms
155
+ of performance and energy consumption.
156
+
157
+ These HLS tools can leverage dedicated optimizations or micro architectural solutions for the
158
+ specific domain. However, the algorithm designer, who is usually a software engineer, has to
159
+ understand how to properly update the code. This approach is usually time-consuming and error
160
+ prone. For this reason, some HLS tools offer complete support for a standard HLL, such as C,
161
+ giving complete freedom to the algorithm designer. High level languages mainly classified into
162
+ two types that are shown in Fig. 1. One is Domain specific languages and other one is Generic
163
+ languages. In Domain specific languages it consist new languages and C- extended languages,
164
+ whereas, in Generic languages it consist Procedural and Object Oriented languages. HLS tool
165
+ select specific language for specific applications.
166
+
167
+ 2.1. Five Key Challenges
168
+
169
+ In this section the important crucial challenges that arise in the process of signal synthesis in the
170
+ layered architecture.
171
+
172
+  Hardware in inherently concurrent, whereas software representations are sequential. HLS
173
+ must map the sequential algorithm onto concurrent hardware.
174
+  Timing is implicit in software in the sequence of instructions used. Synchronous hardware
175
+ must deal with timing constraints, with controlling and synchronizing operations at the clock
176
+ cycle level.
177
+  In software, the word length is fixed (8, 16, 32 or 64bits), but in hardware, it is usually
178
+ optimized for the task being performed.
179
+  The software model of memory is as a single block with a monolithic address space, with
180
+ almost all data items stored in memory. On an FPGA, local variables are stored in registers,
181
+ with multiple distributed memory blocks, each with their own independent address space. In
182
+ such an environment, pointers have little meaning, and dynamic memory allocation is very
183
+ difficult. Communication in software is usually through shared memory, whereas on an
184
+ FPGA it relies on constructing appropriate hardware, from implicit (within stream
185
+ processing), to simple token passing, to using dedicated FIFOs to manage flow control.
186
+
187
+ 3. DATA LAYER INTERACTION ARCHITECTURE
188
+
189
+
190
+ Traditionally, the word architecture is concerned with the art or science of building, where it
191
+ relates to structural concepts and to styles of design. Here the authors will use it in the sense of
192
+ structured deceptions of a system from a number of compatible and complementary viewpoints
193
+ which, taken together, cover functional, design, fabrication and performance issues. The term
194
+ layer is used to refer to a particular descriptive viewpoint. Within a layer, descriptions will
195
+ generally be hierarchic to allow the containment of complexity or the exposure of detail by
196
+ suitable aggregation or decomposition techniques. Architecture(s) may be singular or plural
197
+ depending on whether it will be addressed as an individual layer or the complete set of
198
+ descriptions across all layers. It is clear from this definition that the architecture of a system is not
199
+ just confined to some sort of functional partitioning at the front end of a development, but
200
+ essentially embraces descriptions generated during all phases and stages of the development
201
+ process.
202
+
203
+ International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
204
+ 38
205
+ The Data Interaction Architecture is a prime example of a layered architecture. It contains four
206
+ layers, each of which can be regarded as a model of the system from a particular viewpoint.
207
+ Fig.2. shows some small representational fragments for each of the four layers. The layers consist
208
+ of I/O circuitry, fine grained layer, coarse grained function definition layer, and bypass
209
+ connection layer, where they are listed from the bottom layer to the top layer, respectively. Well
210
+ defined notations and technical conventions exist for each of these layers and are closely
211
+ modelled on those of MASCOT, Modular Approach to Software Construction Operation and
212
+ Test. Where relevant the notations include composite structures to support hierarchical
213
+ representations over multiple levels within a layer. The motivation behind the layered
214
+ architecture method is to provide the means of moving from a functional model of a system to an
215
+ execution model.
216
+
217
+
218
+
219
+ Fig.2. Data Interaction Architecture
220
+
221
+ The emphasis on the identification of well-defined interactions in the functional model, and the
222
+ preservation of these speck tied interaction properties through the subsequent layers, provides the
223
+ structural conformance by which traceability is achieved. It follows that the functional model is
224
+ binding on subsequent development. Developers are not free to reverse engineer the functional
225
+ model to allow an alternative development path in which traceability would be lost. Of course the
226
+ functional model may need to be changed, either because system requirements have changed, or
227
+ because detail design has shown that an alternative functional model would be better. Whatever
228
+ the reason for change, consistency across the model set must be preserved.
229
+
230
+ The main distinguishing feature of Data Interaction Architecture (DIA) is the explicit
231
+ representation of shared information and shared data. Here i will concentrate on the sharing
232
+
233
+ Model
234
+ Representation example
235
+ Focus
236
+ Functional
237
+ What
238
+ Generator
239
+ User
240
+ Design
241
+ How
242
+ Writer
243
+ Reader
244
+ Distribution
245
+ Where
246
+ Writer
247
+ Reader
248
+ Execution
249
+ When
250
+ Writer
251
+ Reader
252
+ V
253
+ Kemel
254
+ KermelInternational Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
255
+ 39
256
+ implicit in the bilateral interactions between processes, leaving discussion of the more general
257
+ information retention element. A summary description of the model in each layer shows how
258
+ bilateral interaction properties are tracked.
259
+
260
+ 4. ARCHITECTURE OF PROCESSING ELEMENTS
261
+
262
+ In this paper authors proposed to establish a new design framework to solve issues described in
263
+ the preceding section by exploiting the binding process of high-level/behavioural synthesis.
264
+
265
+ 4.1. Layered Architecture
266
+
267
+ The purpose of the conventional high-level synthesis tools is to generate finite state machines
268
+ with data paths. Here File System Meta-Data (FSMD) referred as fine grained layer. It is
269
+ expanded with the scope of high-level synthesis to coarse grained layer to exploit the functional
270
+ representations of circuitries. ALUs in coarse grained layer are defined by the functional
271
+ representations of high-level programming languages. Switches are added as bypass connection
272
+ layer for the scope of high-level synthesis intentionally. Implicit as-built meshes of switches put
273
+ constraints on high-level synthesis. In the processes are allowed as unprejudiced bypass switches
274
+ to remove the meshes. Communications between the PEs are limited between adjacent PEs,
275
+ whereas it is found no limitations for sensor applications with the limited communication paths.
276
+
277
+ The following explains these layers I/O circuitry is implemented with random logic gates and
278
+ mixed signal I/O circuitries. They are connected to the fine grained blocks in the above layer. The
279
+ fine grained layer mainly consists of finite state machines and data paths. They are replaceable to
280
+ follow the context described by high-level languages. The coarse grained function definition
281
+ layer is located on the fine grained layer. Optimized ALUs for a certain application are defined in
282
+ this layer. An operation primitive defined in the layer corresponds to an operation code (op code)
283
+ of a conventional multipoint control unit (MCU), whereas it does not have to be standardized for
284
+ over many applications. As for the topmost bypass connection layer, simple bypass switch
285
+ images can be specified over coarse grained blocks. The connections between inputs and outputs
286
+ of PEs are configurable with the bypass switches.
287
+
288
+ 4.2. Design Flow
289
+
290
+ The following six steps compose the design flow of the design framework to design a PE through
291
+ layered scheme.
292
+
293
+ Step 1: Describe a system in high-level language.
294
+ Step 2: Define coarse grained operations. Typical dedicated functions for sensor signals are
295
+ signal compensation, feature point identification for image recognition, and image
296
+ compression in addition to basic arithmetic operations. The defined coarse grained
297
+ operations are exploited in high-level synthesis and behavioural synthesis process.
298
+ Step 3: Generate source codes written in hardware description language through behavioural
299
+ synthesis. The hard macros defined and implemented in the step 2 are exploited for
300
+ generating circuitries by the functions of CWB.
301
+ Step 4: This step is identical to conventional logic synthesis.
302
+ Step 5: This step is identical to conventional layout design.
303
+ Step 6: The verification and validation step include back annotation based on the result of delay
304
+ analysis.
305
+
306
+
307
+ International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
308
+ 40
309
+ In the work authors used a data base management function of CWB to exploit the definitions of
310
+ operations in the coarse grained layer during the behavioural synthesis to treat a function as an
311
+ operator. The operations can be implemented as hard macros by using custom ASIC design tools
312
+ and/or LUTs of FPGAs. The operator definitions were exploited on the step 3 as macro blocks.
313
+ Once macro blocks are registered in a database, CWB can use the macro blocks during the
314
+ binding process of high-level synthesis automatically to reduce layout area size. The binding
315
+ process of high-level synthesis is regarded as nondeterministic polynomial (NP) hard and
316
+ heuristic approach was often employed. The design flow enables the automation of binding
317
+ process instead of the heuristic approach.
318
+
319
+ 4.3. Typical Design of Processing Element
320
+
321
+ Two types of context were identified with reference to semantics or lambda calculus of functional
322
+ representations to define ALUs in coarse grained function definition layer. One is a configurable
323
+ static context often mentioned as stored information in a file, and the other is a dynamic context
324
+ as stored information in heap registers as shown in Fig. 3. The static contexts of an application
325
+ are expressed with finite state machines and data paths implemented by n sets of hard- ware
326
+ circuitry of PEs. The dynamic contexts of an application are specified as m sets of registers and
327
+ instructions. The instruction sets are optimized for an application, and each optimized instruction
328
+ set can be shared among some dynamic contexts.
329
+
330
+
331
+
332
+ Fig.3. Modified High-Level Synthesis Process.
333
+
334
+ The program code is implemented with a specific C-language comment description /* Cyber func
335
+ = operator */ for defining dynamic and static contexts, which are the sets of pairs of registers and
336
+ optimized instruction sets. The pair of a register set and an instruction set can be shared among
337
+ dynamic contexts using another specific C-language comment description as /* Cyber share name
338
+ = NAME */. NAME is an arbitrary designation. The binding process of high-level behavioural
339
+
340
+ Higher
341
+ Hard
342
+ Hard
343
+ module
344
+ Macro
345
+ Macro
346
+ Highlevel/Behavioral
347
+ Highlevel /Behavioral
348
+ Highlevel/Behavioral
349
+ synthesis
350
+ synthesis
351
+ synthesis
352
+ CDFGgeneration
353
+ Allocation
354
+
355
+ LMSPEC
356
+ RTL
357
+ LMSPEC
358
+ RTL
359
+ Scheduling
360
+
361
+ Binding
362
+ FSMDgeneration
363
+ RTL
364
+ Logic synthesis
365
+ Place and Route
366
+ RTL:RegisterTransferLevel
367
+
368
+ LMSPEC:LowerModuleSpecificationFile
369
+ CDFG:ControlandDataFlowGraph
370
+ Configuration
371
+ FSMD:FiniteStateMachinewithDatapath
372
+ DataInternational Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
373
+ 41
374
+ synthesis can be controlled by these descriptions to exploit the functional representations defined
375
+ in a high-level programming language.
376
+
377
+ 5. RESULTS
378
+
379
+ Experiments are carried out to evaluate the design framework using convolution operations; those
380
+ are often used for sensor applications, with following three conditions. The matrix functions of
381
+ the filters are similar and the difference is the parameters of 3×3 matrices. It is observed one can
382
+ evaluate the layout area size reduction results by using an FPGA, Xilinx XC7A200T FPGA,
383
+ although the design framework was established aiming at improving ASIC design at first.
384
+
385
+  Defining a convolution function as one operator.
386
+  Implementing ALUs with basic operations, i.e., plus, minus, multiply, divide, and
387
+ comparison operations, using dynamically reconfiguration technique designated as
388
+ flexible reliability reconfigurable array (FRRA).
389
+  Elaborating whole design with FPGA libraries without operator definitions and a
390
+ function definition database.
391
+
392
+
393
+
394
+ Fig.4. Comparison of LUT utilizations According to Operator Definitions
395
+
396
+ Derived LUT counts for each evaluation case are shown in Fig.4. The LUT counts of basic
397
+ operations were excluded for comparison. The larger the granularity of an operation was, the less
398
+ counts of LUTs were consumed. Remarkable difference of LUT counts was shown for cascaded
399
+ operations. The LUT counts of cascaded operations using FPGA library was more than double
400
+ compared to single operation. The results show that exploiting granularity in behavioural
401
+ synthesis was carried out by CWB automatically without specifying the reuse of macro blocks
402
+ explicitly. The difference between one operation and cascaded operations using FRRAs with
403
+ dynamically reconfiguration technique was 22% less than the difference using the operator
404
+ definition on convolution operations.
405
+
406
+ 6. CONCLUSIONS
407
+
408
+ A novel model is developed to design a framework to reduce the footprints of programmable
409
+ functions of sensing devices for IOT applications. The design framework consists of four layered
410
+ structure of PE architecture and the extended database management function of a high-level
411
+ synthesis tool to exploit functional representations in high-level programming languages.
412
+
413
+ Laplacian Filter
414
+ GaussianFilter+LaplacianFilter
415
+ (a)
416
+ (b)
417
+ (c)
418
+ 0
419
+ 200
420
+ 400
421
+ 600
422
+ 800
423
+ LUT countsInternational Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
424
+ 42
425
+ The layout size reduction is useful to embed a PE into a sensing device and to provide device
426
+ computing capabilities with a sensing device. The experimental results report the power
427
+ consumption reduction by adopting the design framework on a Nano Bridge FPGA.
428
+
429
+ REFERENCES
430
+
431
+ [1]
432
+ Hihara, H., Iwasaki, A., Hashimoto, M., Ochi, H., Mitsuyama, Y., Onodera, H., ... & Sakamoto, T.
433
+ (2018). “Sensor signal processing using high-level synthesis with a layered architecture”, IEEE
434
+ Embedded Systems Letters, 10(4), 119-122.
435
+ [2]
436
+ Sreelatha, V., Mamatha, E., Reddy, C. S., & Rajdurai, P. S. (2022). “Spectrum Relay Performance of
437
+ Cognitive Radio between Users with Random Arrivals and Departures,” In Mobile Radio
438
+ Communications and 5G Networks (pp. 533-542). Springer, Singapore.
439
+ [3]
440
+ R. Zhao, M. Tan, S. Dai, and Z. Zhang, “Area-efficient pipelining for FPGA-targeted high-level
441
+ synthesis,” in Proc. 52nd ACM/EDAC/IEEE Design Autom. Conf. (DAC), San Francisco, CA, USA,
442
+ 2015.
443
+ [4]
444
+ Saritha, S., Mamatha, E., Reddy, C. S., & Rajadurai, P. (2022). “A model for overflow queuing
445
+ network with two-station heterogeneous system,” International Journal of Process Management and
446
+ Benchmarking, 12(2), 147-158.
447
+ [5]
448
+ Mamatha, E., Anand, S. K., Devika, B., Prasad, S. T., & Reddy, C. S. (2021, July). “Performance
449
+ Analysis of Data Packets Service in Queuing Networks System,” In 2021 12th International
450
+ Conference on Computing Communication and Networking Technologies (ICCCNT) (pp. 1-4).
451
+ IEEE.
452
+ [6]
453
+ M. Gort and J. Anderson, “Design re-use for compile time reduction in FPGA high-level synthesis
454
+ flows,” in Proc. Int. Conf. Field Program. Technol. (FPT), Shanghai, China, 2014, pp. 4–11.
455
+ [7]
456
+ Saritha, S., Mamatha, E., Reddy, C.S., Anand, K. (2019). “A model for compound poisson process
457
+ queuing system with batch arrivals and services,” Journal Européen des Systèmes Automatisés, Vol.
458
+ 53, No. 1, pp. 81-86.
459
+ [8]
460
+ M. Schmid, O. Reiche, C. Schmitt, F. Hannig, and J. Teich, “Code generation for high-level synthesis
461
+ of multi resolution applications on FPGAs,” in Proc. FSP, 2014, pp. 21–26.
462
+ [9]
463
+ Mamatha, E., et al. "Mathematical modelling and performance analysis of single server queuing
464
+ system-eigenspectrum," International Journal of Mathematics in Operational Research 16.4 (2020):
465
+ 455-468.
466
+ [10] Saritha, S., Mamatha, E., Reddy, C.S. (2019). “Performance measures of online warehouse service
467
+ system with replenishment policy. Journal Européen des Systèmes Automatisés,” Vol. 52, No. 6, pp.
468
+ 631-638
469
+ [11] D. Alnajjar et al., “Reliability-configurable mixed-grained reconfigurable array supporting C-to-array
470
+ mapping and its radiation testing,” in Proc. IEEE A-SSCC, 2013, pp. 313–316.
471
+ [12] Mamatha, E., C. S. Reddy, and Rohit Sharma. "Effects of viscosity variation and thermal effects in
472
+ squeeze films." Annales de Chimie. Science des Materiaux. Vol. 42. No. 1. Lavoisier, 2018.
473
+ [13] Kumar, MV Sravan, et al. "Data hiding with dual based reversible image using sudoku technique."
474
+ 2017 International Conference on Advances in Computing, Communications and Informatics
475
+ (ICACCI). IEEE, 2017.
476
+ [14] Mamatha, E., C. S. Reddy, and S. Krishna Anand. "Focal point computation and homogeneous
477
+ geometrical transformation for linear curves." Perspectives in Science 8 (2016): 19-21.
478
+ [15] Mamatha, E., Reddy, C. S., & Prasad, R. (2012). “Mathematical modeling of markovian queuing
479
+ network with repairs, breakdown and fixed buffer.” i-Manager's Journal on Software Engineering,
480
+ 6(3), 21.
481
+ [16] Anand, Krishna, et al. "Design of neural network based expert system for automated lime kiln
482
+ system." Journal Européen des Systèmes Automatisés 52.4 (2019): 369-376.
483
+ [17] F. Wang, G. T. Wang, R. H. Wang, and X. W. Huang, “FPGA implementation of Laplacian of
484
+ Gaussian edge detection algorithm,” Adv. Mater. Res., vols. 282–283, pp. 157–160, Jul. 2011.
485
+ [18] Elliriki, M., Reddy, C. S., Anand, K., & Saritha, S. (2021). “Multi server queuing system with crashes
486
+ and alternative repair strategies.” Communications in Statistics-Theory and Methods, 1-13.
487
+ [19] Y. Hasegawa et al., “Design methodology and trade-offs analysis for parameterized dynamically
488
+ reconfigurable processor arrays,” in Proc. FPL, Amsterdam, The Netherlands, 2007, pp. 796–799.
489
+
490
+ International Journal on AdHoc Networking Systems (IJANS) Vol. 12, No. 4, October 2022
491
+ 43
492
+ [20] T. Toi et al., “High-level synthesis challenges and solutions for a dynamically reconfigurable
493
+ processor,” in Proc. IEEE/ACM Int. Conf. Comput. Aided Design, San Jose, CA, USA, 2006, pp.
494
+ 702–708.
495
+ [21] Mamatha, E., C. S. Reddy, and K. R. Prasad. "Antialiased Digital Pixel Plotting for Raster Scan Lines
496
+ Using Area Evaluation." Emerging Research in Computing, Information, Communication and
497
+ Applications. Springer, Singapore, 2016. 461-468.
498
+ [22] K. Wakabayashi, “Cyber Workbench: Integrated design environment based on C-based behavior
499
+ synthesis and verification,” in Proc. IEEE VLSI-TSA Int. Symp., H sinchu, Taiwan, 2005, pp. 173–
500
+ 176.
501
+ [23] Mamatha, E., S. Saritha, and C. S. Reddy. "Stochastic Scheduling Algorithm for Distributed Cloud
502
+ Networks using Heuristic Approach." International Journal of Advanced Networking and
503
+ Applications 8.1 (2016): 3009.
504
+ [24] Reddy, C. S., et al. "Obtaining Description for Simple Images using Surface Realization Techniques
505
+ and Natural Language Processing." Indian Journal of Science and Technology 9.22 (2016): 1-7.
506
+ [25] M. Meribout and M. Motomura, “A-combined approach to highlevel synthesis for dynamically
507
+ reconfigurable systems,” IEEE Trans. Comput., vol. 53, no. 12, pp. 1508–1522, Dec. 2004.
508
+ [26] R. Hartenstein, “The microprocessor is no longer general purpose: Why future reconfigurable
509
+ platforms will win,” in Proc. 2nd Annu. IEEE Int. Conf. Innov. Syst. Silicon, Austin, TX, USA, 1997,
510
+ pp. 2–12.
511
+ [27] Elliriki, M., Reddy, C. C. S., & Anand, K. (2019). “An efficient line clipping algorithm in 2D space.”
512
+ Int. Arab J. Inf. Technol., 16(5), 798-807.
513
+ [28] L. Chen, “Fast generation of Gaussian and Laplacian image pyramids using an FPGA-based custom
514
+ computing platform,” M.S. thesis, Virginia Polytechnic Inst. State Univ., Blacksburg, VA, USA,
515
+ 1994.
516
+ [29] Raw, R. S., & Lobiyal, D. K. (2012). Throughput and delay analysis of next-hop forwarding method
517
+ for non-linear vehicular ad hoc networks. International Journal on Ad Hoc Networking Systems, 2(2),
518
+ 33-44.
519
+ [30] Mamatha, E., Sasritha, S., & Reddy, C. S. (2017). “Expert system and heuristics algorithm for cloud
520
+ resource scheduling.” Romanian Statistical Review, 65(1), 3-18.
521
+ [31] H. Hihara et al., “Novel processor architecture for onboard infrared sensors,” in Proc. SPIE Infrared
522
+ Remote Sens. Instrum. XXIV, vol. 9973, San Diego, CA, USA, Sep. 2016, Art. no. 99730S.
523
+ [32] Abdelgadir, M., Saeed, R. A., & Babiker, A. (2018). Cross layer design approach for efficient data
524
+ delivery based on IEEE 802.11 P in vehicular ad-hoc networks (VANETS) for city scenarios.
525
+ International Journal on Ad Hoc Networking Systems (IJANS), 8(4), 01-12.
526
+ [33] Beritelli, F., La Corte, A., Rametta, C., & Scaglione, F. (2015). A Cellular bonding and adaptive load
527
+ balancing based multi-sim gateway for mobile ad hoc and sensor networks. International Journal on
528
+ Ad Hoc Networking Systems (IJANS), 5(3).
529
+
530
+
531
+
H9E1T4oBgHgl3EQfrgXE/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,531 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf,len=530
2
+ page_content='International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
3
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
4
+ page_content=' 4, October 2022 DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
5
+ page_content='5121/ijans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
6
+ page_content='2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
7
+ page_content='12403 35 SENSOR SIGNAL PROCESSING USING HIGH-LEVEL SYNTHESIS AND INTERNET OF THINGS WITH A LAYERED ARCHITECTURE CS Reddy1 and Krishna Anand2 1Department of Mathematics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
8
+ page_content=' CIT - NC,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
9
+ page_content=' VTU University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
10
+ page_content=' Bangalore,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
11
+ page_content=' India 2Department of Computer Engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
12
+ page_content=' Anurag University,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
13
+ page_content=' Hyderabad,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
14
+ page_content=' India ABSTRACT Sensor routers play a crucial role in the sector of Internet of Things applications,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
15
+ page_content=' in which the capacity for transmission of the network signal is limited from cloud systems to sensors and its reversal process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
16
+ page_content=' It describes a robust recognized framework with various architected layers to process data at high level synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
17
+ page_content=' It is designed to sense the nodes instinctually with the help of Internet of Things where the applications arise in cloud systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
18
+ page_content=' In this paper embedded PEs with four layer new design framework architecture is proposed to sense the devises of IOT applications with the support of high-level synthesis DBMF (database management function) tool.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
19
+ page_content=' KEYWORDS Network Protocols, Wireless Network, Mobile Network, Internet of Things, Reconfigurable dynamic processor, Sensor signal processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
20
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
21
+ page_content=' INTRODUCTION Sensor routers play a crucial role in the sector of Internet of Things (IOT) applications, in which the capacity for transmission of the network signal is limited from cloud systems to sensors and its reversal process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
22
+ page_content=' Consequence to this volume of the data reduction is obligatory to combat device computing functions between sensor nodes and transmitter to exchange the sufficient data with the available networks [1-3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
23
+ page_content=' Hence, low power consumption and small footprints are commanded among sensor nodes to process information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
24
+ page_content=' One of the replacements for microcontroller units is field programmable gate arrays to optimize the footprints size, so that it is to be observed keenly the routing with configurable logic blocks and switches of look-up tables which causes placement inefficiency [4, 7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
25
+ page_content=' To fabricate Field Programmable Gate Arrays (FPGA) it is wise to use High-level synthesis which will enable global optimization and recompense the limitation of Routing and Placement [5, 6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
26
+ page_content=' In this paper embedded PEs with four layer new design framework architecture is proposed to sense the devises of IOT applications with the support of high-level synthesis DBMF (database management function) tool [8, 17, 19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
27
+ page_content=' It exploits the repetitive high level synthesis process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
28
+ page_content=' Macro blocks synthesized through high-level behavioural synthesis are registered in a database before the system level synthesis, and the information in the database is used for the optimization of resource consumption through the system level synthesis [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
29
+ page_content=' In this work authors tried to investigate the dependencies of resource consumption on the granularity of coarse grained function definitions using the extended database management function of Cyber Work Bench.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
30
+ page_content=' The evaluation results show that small footprint was achieved especially with dynamically reconfigurable technique [9, 15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
31
+ page_content=' International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
32
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
33
+ page_content=' 4, October 2022 36 Dynamically reconfigurable processors using high-level synthesis were proposed to improve the efficiency, whereas the inefficiency of fixed mesh pointed out in still remains [11-14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
34
+ page_content=' Fixed bit widths of data paths, elementary blocks, and switch matrices aiming at mass production of the devices were one example of the inefficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
35
+ page_content=' Sensors used in IOT applications have various data interfaces, such as 8, 12, 14, or 16 bits [ 17, 19].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
36
+ page_content=' Predefined data path between arrays of arithmetic logic units prevents behavioural synthesis tools from the optimization of layout size and the reduction in power consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
37
+ page_content=' Therefore, optimized Arithmetic Logic Units (ALU) and flexible data paths are required to embed processors in sensor units [13, 15-17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
38
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
39
+ page_content=' HIGH LEVEL SYNTHESIS TOOLS High-level synthesis is increasingly popular for the design of high-performance and energy- efficient heterogeneous systems, shortening time-to-market and addressing today’s system complexity [18, 20, 25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
40
+ page_content=' Early academic work extracted scheduling, allocation, and binding as the basic steps for high-level-synthesis [22, 24, 32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
41
+ page_content=' Scheduling partitions in the algorithm to control steps that are used in the model are defined the states in the finite-state machine [21, 33].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
42
+ page_content=' First generation behavioural synthesis was introduced by Synopsys in 1994 as behavioural Compiler and used Verilog or VHDL as input languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
43
+ page_content=' 10 years later, in 2004, there emerged a number of next generation commercial high-level synthesis products which provided synthesis of circuits specified at C level to a register transfer level specification [23, 25, 26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
44
+ page_content=' It was primarily adopted in Japan and Europe in the early years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
45
+ page_content=' As of late 2008, there was an emerging adoption in the United States.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
46
+ page_content=' High-level synthesis (HLS) allows designers to work at a higher level of abstraction by using a software program to specify the hardware functionality [28, 29].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
47
+ page_content=' Additionally, HLS is particularly interesting for designing field-programmable gate array circuits, where hardware implementations can be easily refined and replaced in the target device [27, 30- 32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
48
+ page_content=' Recent years have seen much activity in the HLS research community, with a plethora of HLS tool offerings, from both industry and academia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
49
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
50
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
51
+ page_content=' Classification of High Level Synthesis Input Language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
52
+ page_content=' Applicationdomains: HighLevelSynthesis Tool status: All domains Imaging Tools InUse Streaming Stream/lmage Abandoned Loop/Pipeline NIA DSP DataFlow .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
53
+ page_content='NET ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
54
+ page_content='DomainSpecific ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
55
+ page_content='Generic ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
56
+ page_content='ODSE ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
57
+ page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
58
+ page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
59
+ page_content='NEW ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
60
+ page_content='C-extended ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
61
+ page_content='Procedural ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
62
+ page_content='ObjectOriented ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
63
+ page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
64
+ page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
65
+ page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
66
+ page_content='Languages ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
67
+ page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
68
+ page_content='CyberWorkBench ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
69
+ page_content='(BDL) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
70
+ page_content='CoDeveloper ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
71
+ page_content='(ImpulseC) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
72
+ page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
73
+ page_content='Vivado ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
74
+ page_content='HLS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
75
+ page_content='CtoVerilog ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
76
+ page_content='Maxeler ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
77
+ page_content='(MaxJ) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
78
+ page_content='OBluespec ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
79
+ page_content='(BSV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
80
+ page_content='DK ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
81
+ page_content='Design ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
82
+ page_content='Suite ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
83
+ page_content='(HandelC) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
84
+ page_content='oCatapult ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
85
+ page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
86
+ page_content='C2H ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
87
+ page_content='X ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
88
+ page_content='KIWI ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
89
+ page_content='(C#) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
90
+ page_content='PipeRench(DIL) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
91
+ page_content='SA-C ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
92
+ page_content='(SA-C) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
93
+ page_content='oCtos ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
94
+ page_content='OSynphHLS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
95
+ page_content='SeaCucumber ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
96
+ page_content='(Java) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
97
+ page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
98
+ page_content='HercuLeS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
99
+ page_content='(NAC) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
100
+ page_content='Garp ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
101
+ page_content='(Cpragmas) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
102
+ page_content='SPARK ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
103
+ page_content='MATCH ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
104
+ page_content='Cynthesizer ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
105
+ page_content='(SystemC) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
106
+ page_content='Napa-C ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
107
+ page_content='(Cpragmas) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
108
+ page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
109
+ page_content='CHC ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
110
+ page_content='AccelDSP ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
111
+ page_content='eXCite ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
112
+ page_content='(CSP ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
113
+ page_content='pragmas) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
114
+ page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
115
+ page_content='LegUp ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
116
+ page_content='O ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
117
+ page_content='CHiMPS ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
118
+ page_content='ROCCC ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
119
+ page_content='(C ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
120
+ page_content='extended) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
121
+ page_content='OBambu ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
122
+ page_content='?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
123
+ page_content='DEFACTO GAUT ogcc2verilog TridentInternational Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
124
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
125
+ page_content=' 4, October 2022 37 HLS tools start from a software programmable high-level language to automatically produce a circuit specification in HDL that performs the same function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
126
+ page_content=' The most common source inputs for high-level synthesis are based on standard languages such as ANSI C/C++, System C and MATLAB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
127
+ page_content=' HLS has also been recently applied to a variety of applications (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
128
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
129
+ page_content=', medical imaging, convolutional neural networks, and machine learning), with significant benefits in terms of performance and energy consumption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
130
+ page_content=' These HLS tools can leverage dedicated optimizations or micro architectural solutions for the specific domain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
131
+ page_content=' However, the algorithm designer, who is usually a software engineer, has to understand how to properly update the code.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
132
+ page_content=' This approach is usually time-consuming and error prone.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
133
+ page_content=' For this reason, some HLS tools offer complete support for a standard HLL, such as C, giving complete freedom to the algorithm designer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
134
+ page_content=' High level languages mainly classified into two types that are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
135
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
136
+ page_content=' One is Domain specific languages and other one is Generic languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
137
+ page_content=' In Domain specific languages it consist new languages and C- extended languages, whereas, in Generic languages it consist Procedural and Object Oriented languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
138
+ page_content=' HLS tool select specific language for specific applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
139
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
140
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
141
+ page_content=' Five Key Challenges In this section the important crucial challenges that arise in the process of signal synthesis in the layered architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
142
+ page_content=' \uf0d8 Hardware in inherently concurrent, whereas software representations are sequential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
143
+ page_content=' HLS must map the sequential algorithm onto concurrent hardware.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
144
+ page_content=' \uf0d8 Timing is implicit in software in the sequence of instructions used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
145
+ page_content=' Synchronous hardware must deal with timing constraints, with controlling and synchronizing operations at the clock cycle level.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
146
+ page_content=' \uf0d8 In software, the word length is fixed (8, 16, 32 or 64bits), but in hardware, it is usually optimized for the task being performed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
147
+ page_content=' \uf0d8 The software model of memory is as a single block with a monolithic address space, with almost all data items stored in memory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
148
+ page_content=' On an FPGA, local variables are stored in registers, with multiple distributed memory blocks, each with their own independent address space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
149
+ page_content=' In such an environment, pointers have little meaning, and dynamic memory allocation is very difficult.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
150
+ page_content=' Communication in software is usually through shared memory, whereas on an FPGA it relies on constructing appropriate hardware, from implicit (within stream processing), to simple token passing, to using dedicated FIFOs to manage flow control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
151
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
152
+ page_content=' DATA LAYER INTERACTION ARCHITECTURE Traditionally, the word architecture is concerned with the art or science of building, where it relates to structural concepts and to styles of design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
153
+ page_content=' Here the authors will use it in the sense of structured deceptions of a system from a number of compatible and complementary viewpoints which, taken together, cover functional, design, fabrication and performance issues.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
154
+ page_content=' The term layer is used to refer to a particular descriptive viewpoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
155
+ page_content=' Within a layer, descriptions will generally be hierarchic to allow the containment of complexity or the exposure of detail by suitable aggregation or decomposition techniques.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
156
+ page_content=' Architecture(s) may be singular or plural depending on whether it will be addressed as an individual layer or the complete set of descriptions across all layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
157
+ page_content=' It is clear from this definition that the architecture of a system is not just confined to some sort of functional partitioning at the front end of a development, but essentially embraces descriptions generated during all phases and stages of the development process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
158
+ page_content=' International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
159
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
160
+ page_content=' 4, October 2022 38 The Data Interaction Architecture is a prime example of a layered architecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
161
+ page_content=' It contains four layers, each of which can be regarded as a model of the system from a particular viewpoint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
162
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
163
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
164
+ page_content=' shows some small representational fragments for each of the four layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
165
+ page_content=' The layers consist of I/O circuitry, fine grained layer, coarse grained function definition layer, and bypass connection layer, where they are listed from the bottom layer to the top layer, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
166
+ page_content=' Well defined notations and technical conventions exist for each of these layers and are closely modelled on those of MASCOT, Modular Approach to Software Construction Operation and Test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
167
+ page_content=' Where relevant the notations include composite structures to support hierarchical representations over multiple levels within a layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
168
+ page_content=' The motivation behind the layered architecture method is to provide the means of moving from a functional model of a system to an execution model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
169
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
170
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
171
+ page_content=' Data Interaction Architecture The emphasis on the identification of well-defined interactions in the functional model, and the preservation of these speck tied interaction properties through the subsequent layers, provides the structural conformance by which traceability is achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
172
+ page_content=' It follows that the functional model is binding on subsequent development.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
173
+ page_content=' Developers are not free to reverse engineer the functional model to allow an alternative development path in which traceability would be lost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
174
+ page_content=' Of course the functional model may need to be changed, either because system requirements have changed, or because detail design has shown that an alternative functional model would be better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
175
+ page_content=' Whatever the reason for change, consistency across the model set must be preserved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
176
+ page_content=' The main distinguishing feature of Data Interaction Architecture (DIA) is the explicit representation of shared information and shared data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
177
+ page_content=' Here i will concentrate on the sharing Model Representation example Focus Functional What Generator User Design How Writer Reader Distribution Where Writer Reader Execution When Writer Reader V Kemel KermelInternational Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
178
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
179
+ page_content=' 4, October 2022 39 implicit in the bilateral interactions between processes, leaving discussion of the more general information retention element.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
180
+ page_content=' A summary description of the model in each layer shows how bilateral interaction properties are tracked.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
181
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
182
+ page_content=' ARCHITECTURE OF PROCESSING ELEMENTS In this paper authors proposed to establish a new design framework to solve issues described in the preceding section by exploiting the binding process of high-level/behavioural synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
183
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
184
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
185
+ page_content=' Layered Architecture The purpose of the conventional high-level synthesis tools is to generate finite state machines with data paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
186
+ page_content=' Here File System Meta-Data (FSMD) referred as fine grained layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
187
+ page_content=' It is expanded with the scope of high-level synthesis to coarse grained layer to exploit the functional representations of circuitries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
188
+ page_content=' ALUs in coarse grained layer are defined by the functional representations of high-level programming languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
189
+ page_content=' Switches are added as bypass connection layer for the scope of high-level synthesis intentionally.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
190
+ page_content=' Implicit as-built meshes of switches put constraints on high-level synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
191
+ page_content=' In the processes are allowed as unprejudiced bypass switches to remove the meshes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
192
+ page_content=' Communications between the PEs are limited between adjacent PEs, whereas it is found no limitations for sensor applications with the limited communication paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
193
+ page_content=' The following explains these layers I/O circuitry is implemented with random logic gates and mixed signal I/O circuitries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
194
+ page_content=' They are connected to the fine grained blocks in the above layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
195
+ page_content=' The fine grained layer mainly consists of finite state machines and data paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
196
+ page_content=' They are replaceable to follow the context described by high-level languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
197
+ page_content=' The coarse grained function definition layer is located on the fine grained layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
198
+ page_content=' Optimized ALUs for a certain application are defined in this layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
199
+ page_content=' An operation primitive defined in the layer corresponds to an operation code (op code) of a conventional multipoint control unit (MCU), whereas it does not have to be standardized for over many applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
200
+ page_content=' As for the topmost bypass connection layer, simple bypass switch images can be specified over coarse grained blocks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
201
+ page_content=' The connections between inputs and outputs of PEs are configurable with the bypass switches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
202
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
203
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
204
+ page_content=' Design Flow The following six steps compose the design flow of the design framework to design a PE through layered scheme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
205
+ page_content=' Step 1: Describe a system in high-level language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
206
+ page_content=' Step 2: Define coarse grained operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
207
+ page_content=' Typical dedicated functions for sensor signals are signal compensation, feature point identification for image recognition, and image compression in addition to basic arithmetic operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
208
+ page_content=' The defined coarse grained operations are exploited in high-level synthesis and behavioural synthesis process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
209
+ page_content=' Step 3: Generate source codes written in hardware description language through behavioural synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
210
+ page_content=' The hard macros defined and implemented in the step 2 are exploited for generating circuitries by the functions of CWB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
211
+ page_content=' Step 4: This step is identical to conventional logic synthesis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
212
+ page_content=' Step 5: This step is identical to conventional layout design.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
213
+ page_content=' Step 6: The verification and validation step include back annotation based on the result of delay analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
214
+ page_content=' International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
215
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
216
+ page_content=' 4, October 2022 40 In the work authors used a data base management function of CWB to exploit the definitions of operations in the coarse grained layer during the behavioural synthesis to treat a function as an operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
217
+ page_content=' The operations can be implemented as hard macros by using custom ASIC design tools and/or LUTs of FPGAs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
218
+ page_content=' The operator definitions were exploited on the step 3 as macro blocks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
219
+ page_content=' Once macro blocks are registered in a database, CWB can use the macro blocks during the binding process of high-level synthesis automatically to reduce layout area size.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
220
+ page_content=' The binding process of high-level synthesis is regarded as nondeterministic polynomial (NP) hard and heuristic approach was often employed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
221
+ page_content=' The design flow enables the automation of binding process instead of the heuristic approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
222
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
223
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
224
+ page_content=' Typical Design of Processing Element Two types of context were identified with reference to semantics or lambda calculus of functional representations to define ALUs in coarse grained function definition layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
225
+ page_content=' One is a configurable static context often mentioned as stored information in a file, and the other is a dynamic context as stored information in heap registers as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
226
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
227
+ page_content=' The static contexts of an application are expressed with finite state machines and data paths implemented by n sets of hard- ware circuitry of PEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
228
+ page_content=' The dynamic contexts of an application are specified as m sets of registers and instructions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
229
+ page_content=' The instruction sets are optimized for an application, and each optimized instruction set can be shared among some dynamic contexts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
230
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
231
+ page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
232
+ page_content=' Modified High Level Synthesis Process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
233
+ page_content=' The program code is implemented with a specific C-language comment description /* Cyber func = operator */ for defining dynamic and static contexts, which are the sets of pairs of registers and optimized instruction sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
234
+ page_content=' The pair of a register set and an instruction set can be shared among dynamic contexts using another specific C-language comment description as /* Cyber share name = NAME */.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
235
+ page_content=' NAME is an arbitrary designation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
236
+ page_content=' The binding process of high-level behavioural ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
237
+ page_content='Higher Hard Hard module Macro Macro Highlevel/Behavioral Highlevel /Behavioral Highlevel/Behavioral synthesis synthesis synthesis CDFGgeneration Allocation 不 LMSPEC RTL LMSPEC RTL Scheduling 不 Binding FSMDgeneration RTL Logic synthesis Place and Route RTL:RegisterTransferLevel 不 LMSPEC:LowerModuleSpecificationFile CDFG:ControlandDataFlowGraph Configuration FSMD:FiniteStateMachinewithDatapath DataInternational Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
238
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
239
+ page_content=' 4, October 2022 41 synthesis can be controlled by these descriptions to exploit the functional representations defined in a high-level programming language.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
240
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
241
+ page_content=' RESULTS Experiments are carried out to evaluate the design framework using convolution operations;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
242
+ page_content=' those are often used for sensor applications, with following three conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
243
+ page_content=' The matrix functions of the filters are similar and the difference is the parameters of 3×3 matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
244
+ page_content=' It is observed one can evaluate the layout area size reduction results by using an FPGA, Xilinx XC7A200T FPGA, although the design framework was established aiming at improving ASIC design at first.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
245
+ page_content=' \uf0d8 Defining a convolution function as one operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
246
+ page_content=' \uf0d8 Implementing ALUs with basic operations, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
247
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
248
+ page_content=', plus, minus, multiply, divide, and comparison operations, using dynamically reconfiguration technique designated as flexible reliability reconfigurable array (FRRA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
249
+ page_content=' \uf0d8 Elaborating whole design with FPGA libraries without operator definitions and a function definition database.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
250
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
251
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
252
+ page_content=' Comparison of LUT utilizations According to Operator Definitions Derived LUT counts for each evaluation case are shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
253
+ page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
254
+ page_content=' The LUT counts of basic operations were excluded for comparison.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
255
+ page_content=' The larger the granularity of an operation was, the less counts of LUTs were consumed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
256
+ page_content=' Remarkable difference of LUT counts was shown for cascaded operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
257
+ page_content=' The LUT counts of cascaded operations using FPGA library was more than double compared to single operation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
258
+ page_content=' The results show that exploiting granularity in behavioural synthesis was carried out by CWB automatically without specifying the reuse of macro blocks explicitly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
259
+ page_content=' The difference between one operation and cascaded operations using FRRAs with dynamically reconfiguration technique was 22% less than the difference using the operator definition on convolution operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
260
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
261
+ page_content=' CONCLUSIONS A novel model is developed to design a framework to reduce the footprints of programmable functions of sensing devices for IOT applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
262
+ page_content=' The design framework consists of four layered structure of PE architecture and the extended database management function of a high-level synthesis tool to exploit functional representations in high-level programming languages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
263
+ page_content=' Laplacian Filter GaussianFilter+LaplacianFilter (a) (b) (c) 0 200 400 600 800 LUT countsInternational Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
264
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
265
+ page_content=' 4, October 2022 42 The layout size reduction is useful to embed a PE into a sensing device and to provide device computing capabilities with a sensing device.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
266
+ page_content=' The experimental results report the power consumption reduction by adopting the design framework on a Nano Bridge FPGA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
267
+ page_content=' REFERENCES [1] Hihara, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
268
+ page_content=', Iwasaki, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
269
+ page_content=', Hashimoto, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
270
+ page_content=', Ochi, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
271
+ page_content=', Mitsuyama, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
272
+ page_content=', Onodera, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
273
+ page_content=', .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
274
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
275
+ page_content=' & Sakamoto, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
276
+ page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
277
+ page_content=' “Sensor signal processing using high-level synthesis with a layered architecture”, IEEE Embedded Systems Letters, 10(4), 119-122.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
278
+ page_content=' [2] Sreelatha, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
279
+ page_content=', Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
280
+ page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
281
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
282
+ page_content=', & Rajdurai, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
283
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
284
+ page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
285
+ page_content=' “Spectrum Relay Performance of Cognitive Radio between Users with Random Arrivals and Departures,” In Mobile Radio Communications and 5G Networks (pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
286
+ page_content=' 533-542).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
287
+ page_content=' Springer, Singapore.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
288
+ page_content=' [3] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
289
+ page_content=' Zhao, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
290
+ page_content=' Tan, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
291
+ page_content=' Dai, and Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
292
+ page_content=' Zhang, “Area-efficient pipelining for FPGA-targeted high-level synthesis,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
293
+ page_content=' 52nd ACM/EDAC/IEEE Design Autom.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
294
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
295
+ page_content=' (DAC), San Francisco, CA, USA, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
296
+ page_content=' [4] Saritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
297
+ page_content=', Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
298
+ page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
299
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
300
+ page_content=', & Rajadurai, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
301
+ page_content=' (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
302
+ page_content=' “A model for overflow queuing network with two-station heterogeneous system,” International Journal of Process Management and Benchmarking, 12(2), 147-158.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
303
+ page_content=' [5] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
304
+ page_content=', Anand, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
305
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
306
+ page_content=', Devika, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
307
+ page_content=', Prasad, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
308
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
309
+ page_content=', & Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
310
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
311
+ page_content=' (2021, July).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
312
+ page_content=' “Performance Analysis of Data Packets Service in Queuing Networks System,” In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT) (pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
313
+ page_content=' 1-4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
314
+ page_content=' IEEE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
315
+ page_content=' [6] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
316
+ page_content=' Gort and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
317
+ page_content=' Anderson, “Design re-use for compile time reduction in FPGA high-level synthesis flows,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
318
+ page_content=' Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
319
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
320
+ page_content=' Field Program.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
321
+ page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
322
+ page_content=' (FPT), Shanghai, China, 2014, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
323
+ page_content=' 4–11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
324
+ page_content=' [7] Saritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
325
+ page_content=', Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
326
+ page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
327
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
328
+ page_content=', Anand, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
329
+ page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
330
+ page_content=' “A model for compound poisson process queuing system with batch arrivals and services,” Journal Européen des Systèmes Automatisés, Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
331
+ page_content=' 53, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
332
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
333
+ page_content=' 81-86.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
334
+ page_content=' [8] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
335
+ page_content=' Schmid, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
336
+ page_content=' Reiche, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
337
+ page_content=' Schmitt, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
338
+ page_content=' Hannig, and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
339
+ page_content=' Teich, “Code generation for high-level synthesis of multi resolution applications on FPGAs,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
340
+ page_content=' FSP, 2014, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
341
+ page_content=' 21–26.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
342
+ page_content=' [9] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
343
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
344
+ page_content=' "Mathematical modelling and performance analysis of single server queuing system-eigenspectrum," International Journal of Mathematics in Operational Research 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
345
+ page_content='4 (2020): 455-468.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
346
+ page_content=' [10] Saritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
347
+ page_content=', Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
348
+ page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
349
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
350
+ page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
351
+ page_content=' “Performance measures of online warehouse service system with replenishment policy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
352
+ page_content=' Journal Européen des Systèmes Automatisés,” Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
353
+ page_content=' 52, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
354
+ page_content=' 6, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
355
+ page_content=' 631-638 [11] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
356
+ page_content=' Alnajjar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
357
+ page_content=', “Reliability-configurable mixed-grained reconfigurable array supporting C-to-array mapping and its radiation testing,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
358
+ page_content=' IEEE A-SSCC, 2013, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
359
+ page_content=' 313–316.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
360
+ page_content=' [12] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
361
+ page_content=', C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
362
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
363
+ page_content=' Reddy, and Rohit Sharma.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
364
+ page_content=' "Effects of viscosity variation and thermal effects in squeeze films.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
365
+ page_content='" Annales de Chimie.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
366
+ page_content=' Science des Materiaux.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
367
+ page_content=' Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
368
+ page_content=' 42.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
369
+ page_content=' No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
370
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
371
+ page_content=' Lavoisier, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
372
+ page_content=' [13] Kumar, MV Sravan, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
373
+ page_content=' "Data hiding with dual based reversible image using sudoku technique.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
374
+ page_content='" 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
375
+ page_content=' IEEE, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
376
+ page_content=' [14] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
377
+ page_content=', C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
378
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
379
+ page_content=' Reddy, and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
380
+ page_content=' Krishna Anand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
381
+ page_content=' "Focal point computation and homogeneous geometrical transformation for linear curves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
382
+ page_content='" Perspectives in Science 8 (2016): 19-21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
383
+ page_content=' [15] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
384
+ page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
385
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
386
+ page_content=', & Prasad, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
387
+ page_content=' (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
388
+ page_content=" “Mathematical modeling of markovian queuing network with repairs, breakdown and fixed buffer.” i-Manager's Journal on Software Engineering, 6(3), 21." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
389
+ page_content=' [16] Anand, Krishna, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
390
+ page_content=' "Design of neural network based expert system for automated lime kiln system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
391
+ page_content='" Journal Européen des Systèmes Automatisés 52.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
392
+ page_content='4 (2019): 369-376.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
393
+ page_content=' [17] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
394
+ page_content=' Wang, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
395
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
396
+ page_content=' Wang, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
397
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
398
+ page_content=' Wang, and X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
399
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
400
+ page_content=' Huang, “FPGA implementation of Laplacian of Gaussian edge detection algorithm,” Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
401
+ page_content=' Mater.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
402
+ page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
403
+ page_content=', vols.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
404
+ page_content=' 282–283, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
405
+ page_content=' 157–160, Jul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
406
+ page_content=' 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
407
+ page_content=' [18] Elliriki, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
408
+ page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
409
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
410
+ page_content=', Anand, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
411
+ page_content=', & Saritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
412
+ page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
413
+ page_content=' “Multi server queuing system with crashes and alternative repair strategies.” Communications in Statistics-Theory and Methods, 1-13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
414
+ page_content=' [19] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
415
+ page_content=' Hasegawa et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
416
+ page_content=', “Design methodology and trade-offs analysis for parameterized dynamically reconfigurable processor arrays,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
417
+ page_content=' FPL, Amsterdam, The Netherlands, 2007, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
418
+ page_content=' 796–799.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
419
+ page_content=' International Journal on AdHoc Networking Systems (IJANS) Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
420
+ page_content=' 12, No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
421
+ page_content=' 4, October 2022 43 [20] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
422
+ page_content=' Toi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
423
+ page_content=', “High-level synthesis challenges and solutions for a dynamically reconfigurable processor,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
424
+ page_content=' IEEE/ACM Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
425
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
426
+ page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
427
+ page_content=' Aided Design, San Jose, CA, USA, 2006, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
428
+ page_content=' 702–708.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
429
+ page_content=' [21] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
430
+ page_content=', C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
431
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
432
+ page_content=' Reddy, and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
433
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
434
+ page_content=' Prasad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
435
+ page_content=' "Antialiased Digital Pixel Plotting for Raster Scan Lines Using Area Evaluation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
436
+ page_content='" Emerging Research in Computing, Information, Communication and Applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
437
+ page_content=' Springer, Singapore, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
438
+ page_content=' 461-468.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
439
+ page_content=' [22] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
440
+ page_content=' Wakabayashi, “Cyber Workbench: Integrated design environment based on C-based behavior synthesis and verification,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
441
+ page_content=' IEEE VLSI-TSA Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
442
+ page_content=' Symp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
443
+ page_content=', H sinchu, Taiwan, 2005, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
444
+ page_content=' 173– 176.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
445
+ page_content=' [23] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
446
+ page_content=', S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
447
+ page_content=' Saritha, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
448
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
449
+ page_content=' Reddy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
450
+ page_content=' "Stochastic Scheduling Algorithm for Distributed Cloud Networks using Heuristic Approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
451
+ page_content='" International Journal of Advanced Networking and Applications 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
452
+ page_content='1 (2016): 3009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
453
+ page_content=' [24] Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
454
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
455
+ page_content=', et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
456
+ page_content=' "Obtaining Description for Simple Images using Surface Realization Techniques and Natural Language Processing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
457
+ page_content='" Indian Journal of Science and Technology 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
458
+ page_content='22 (2016): 1-7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
459
+ page_content=' [25] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
460
+ page_content=' Meribout and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
461
+ page_content=' Motomura, “A-combined approach to highlevel synthesis for dynamically reconfigurable systems,” IEEE Trans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
462
+ page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
463
+ page_content=', vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
464
+ page_content=' 53, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
465
+ page_content=' 12, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
466
+ page_content=' 1508–1522, Dec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
467
+ page_content=' 2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
468
+ page_content=' [26] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
469
+ page_content=' Hartenstein, “The microprocessor is no longer general purpose: Why future reconfigurable platforms will win,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
470
+ page_content=' 2nd Annu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
471
+ page_content=' IEEE Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
472
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
473
+ page_content=' Innov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
474
+ page_content=' Syst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
475
+ page_content=' Silicon, Austin, TX, USA, 1997, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
476
+ page_content=' 2–12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
477
+ page_content=' [27] Elliriki, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
478
+ page_content=', Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
479
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
480
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
481
+ page_content=', & Anand, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
482
+ page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
483
+ page_content=' “An efficient line clipping algorithm in 2D space.” Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
484
+ page_content=' Arab J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
485
+ page_content=' Inf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
486
+ page_content=' Technol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
487
+ page_content=', 16(5), 798-807.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
488
+ page_content=' [28] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
489
+ page_content=' Chen, “Fast generation of Gaussian and Laplacian image pyramids using an FPGA-based custom computing platform,” M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
490
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
491
+ page_content=' thesis, Virginia Polytechnic Inst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
492
+ page_content=' State Univ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
493
+ page_content=', Blacksburg, VA, USA, 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
494
+ page_content=' [29] Raw, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
495
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
496
+ page_content=', & Lobiyal, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
497
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
498
+ page_content=' (2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
499
+ page_content=' Throughput and delay analysis of next-hop forwarding method for non-linear vehicular ad hoc networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
500
+ page_content=' International Journal on Ad Hoc Networking Systems, 2(2), 33-44.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
501
+ page_content=' [30] Mamatha, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
502
+ page_content=', Sasritha, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
503
+ page_content=', & Reddy, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
504
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
505
+ page_content=' (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
506
+ page_content=' “Expert system and heuristics algorithm for cloud resource scheduling.” Romanian Statistical Review, 65(1), 3-18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
507
+ page_content=' [31] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
508
+ page_content=' Hihara et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
509
+ page_content=', “Novel processor architecture for onboard infrared sensors,” in Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
510
+ page_content=' SPIE Infrared Remote Sens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
511
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
512
+ page_content=' XXIV, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
513
+ page_content=' 9973, San Diego, CA, USA, Sep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
514
+ page_content=' 2016, Art.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
515
+ page_content=' no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
516
+ page_content=' 99730S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
517
+ page_content=' [32] Abdelgadir, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
518
+ page_content=', Saeed, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
519
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
520
+ page_content=', & Babiker, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
521
+ page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
522
+ page_content=' Cross layer design approach for efficient data delivery based on IEEE 802.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
523
+ page_content='11 P in vehicular ad-hoc networks (VANETS) for city scenarios.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
524
+ page_content=' International Journal on Ad Hoc Networking Systems (IJANS), 8(4), 01-12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
525
+ page_content=' [33] Beritelli, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
526
+ page_content=', La Corte, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
527
+ page_content=', Rametta, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
528
+ page_content=', & Scaglione, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
529
+ page_content=' (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
530
+ page_content=' A Cellular bonding and adaptive load balancing based multi-sim gateway for mobile ad hoc and sensor networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
531
+ page_content=' International Journal on Ad Hoc Networking Systems (IJANS), 5(3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9E1T4oBgHgl3EQfrgXE/content/2301.03356v1.pdf'}
I9E1T4oBgHgl3EQfGAMz/content/2301.02908v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fed07636ca478ef1938bc850b539e661090b9ab16058a15e896413fad068b169
3
+ size 205978
I9E1T4oBgHgl3EQfGAMz/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:14d88a780fc03fac4a0a2fe6b53ce45f90ba554374c68677cccc14f728dafd79
3
+ size 2752557
I9E1T4oBgHgl3EQfGAMz/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d4d145baeac8932cc2134bdd9e006571fddeda94ec6c72dbd8e0f6c19cc7c800
3
+ size 96900
I9FIT4oBgHgl3EQfYyvF/content/tmp_files/2301.11250v1.pdf.txt ADDED
@@ -0,0 +1,1870 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Lattice models for ballistic aggregation: cluster-shape dependent exponents
2
+ P. Fahad,1, 2, ∗ Apurba Biswas,3, 4, † V. V. Prasad,5, ‡ and R. Rajesh3, 4, §
3
+ 1Institut f¨ur Materialphysik im Weltraum, Deutsches Zentrum f¨ur Luft- und Raumfahrt (DLR), 51170 K¨oln, Germany
4
+ 2Institut f¨ur Theoretische Physik, Universit¨at zu K¨oln, Z¨ulpicher Strasse 77, 50937 K¨oln, Germany
5
+ 3The Institute of Mathematical Sciences, C.I.T. Campus, Taramani, Chennai 600113, India
6
+ 4Homi Bhabha National Institute, Training School Complex, Anushakti Nagar, Mumbai 400094, India
7
+ 5Department of Physics, Cochin University of Science and Technology, Cochin - 682022 India
8
+ (Dated: January 27, 2023)
9
+ We study ballistic aggregation on a two dimensional square lattice, where particles move ballis-
10
+ tically in between momentum and mass conserving coalescing collisions. Three models are studied
11
+ based on the shapes of the aggregates: in the first the aggregates remain point particles, in the sec-
12
+ ond they retain the fractal shape at the time of collision, and in the third they assume a spherical
13
+ shape. The exponents describing the power law temporal decay of number of particles and energy
14
+ as well as dependence of velocity correlations on mass are determined using large scale Monte Carlo
15
+ simulations. It is shown that the exponents are universal only for the point particle model. In the
16
+ other two cases, the exponents are dependent on the initial number density and correlations vanish
17
+ at high number densities. The fractal dimension for the second model is close to 1.49.
18
+ I.
19
+ INTRODUCTION
20
+ There is a wide variety of physical phenomena at
21
+ different length scales in which aggregation of parti-
22
+ cles/clusters to form larger particles is the predominant
23
+ dynamical process [1]. Examples include aerosols [2, 3],
24
+ agglomeration of soot
25
+ [4, 5], gelation [6], cloud forma-
26
+ tion [7], astrophysical problems [8], aggregation of dust
27
+ particles in planetary discs [9–11], dynamics of Saturn’s
28
+ rings [10, 12], polyelectrolytes [13, 14], networks [15],
29
+ etc. A minimal model that focuses only on the effects
30
+ of aggregation is the cluster-cluster aggregation (CCA)
31
+ model in which particles that come into contact undergo
32
+ mass conserving coalescence (reviews may be found in
33
+ Refs. [16–18]).
34
+ In addition to its relevance for differ-
35
+ ent physical phenomena, CCA has also been studied as
36
+ a nonequilibrium system undergoing scale invariant dy-
37
+ namics that is described by exponents that depend only
38
+ on very generic features of the transport process. This
39
+ universal feature allows applications of results for CCA in
40
+ seemingly unrelated systems like Burgers turbulence [19–
41
+ 23], Kolmogorov self-similar scaling [24–26], granular sys-
42
+ tems [27–29], hydrodynamics of run and tumble par-
43
+ ticles [30], evolution of planetesimals [31], geophysical
44
+ flows [32], etc.
45
+ Among the different transport processes,
46
+ ballistic
47
+ transport is of particular importance and the resultant
48
+ CCA is known as the ballistic aggregation (BA) model,
49
+ the focus of this paper. In the BA model, momentum
50
+ is additionally conserved in collisions.
51
+ The BA model
52
+ with spherical particles has been studied using mean field
53
+ theory, large scale simulations in two and three dimen-
54
+ sions, and is exactly solvable in one dimension.
55
+ It is
56
57
58
59
60
+ found that the number of particles, n(t), and energy,
61
+ e(t), decrease with time, t, as power-laws: n(t) ∝ t−θn,
62
+ e(t) ∝ t−θe. These exponents have been determined in
63
+ d-dimensions within a mean field approximation which
64
+ assumes that the particle density is small, that the parti-
65
+ cles are compact spherical clusters of equal density, and
66
+ that the velocities of the particles constituting a cluster
67
+ are uncorrelated. Within these assumptions, scaling ar-
68
+ guments predict the existence of a growing length scale
69
+ Lt ∼ t1/zmf with zmf = (d + 2)/2d and mean field ex-
70
+ ponents, θmf
71
+ n
72
+ = 2d/(d + 2) and θmf
73
+ e
74
+ = θmf
75
+ n
76
+ [33].
77
+ The
78
+ correlations in the initial velocities of the constituents of
79
+ a cluster is characterized by an exponent η: ⟨v2
80
+ m⟩ ∼ m−η,
81
+ where ⟨v2
82
+ m⟩ is the mean square velocity of a particle of
83
+ mass m. In the mean field approximation, by assump-
84
+ tion, ηmf = 1. The mean field results for the exponents
85
+ are of particular significance to the study of the unrelated
86
+ problem of freely cooling granular gas in which ballis-
87
+ tic particles undergo energy-dissipating, momentum con-
88
+ serving binary collisions. It has been shown that expo-
89
+ nent characterizing the energy decay in the granular gas
90
+ is equal to θmf
91
+ e
92
+ in dimensions upto three [27, 29, 34].
93
+ In one dimension, BA is exactly solvable and the ex-
94
+ ponents match with the mean-field exponents [20, 35–
95
+ 37]. However, in two and three dimensions, it has been
96
+ shown that the exponents for BA with spherical parti-
97
+ cles depend on the initial number density n0.
98
+ In two
99
+ dimensions and for dilute systems (n0 → 0), it has been
100
+ shown that the numerically obtained θn is 17% larger
101
+ than θmf
102
+ n
103
+ because of strong velocity correlations between
104
+ colliding aggregates, with η decreasing from η ≈ 1.33 for
105
+ low densities to η ≈ 1 = ηmf for high densities [38–41].
106
+ In three dimensions, it is found that as n0 increases from
107
+ 0.005 to 0.208, θe decreases from θe = 1.283 to 1.206
108
+ and appears to converge to the θmf
109
+ e
110
+ = 1.2 with increasing
111
+ n0, and η decreases from η ≈ 1.23 for low densities to
112
+ η ≈ 1 = ηmf for high densities [29, 41]. It is remark-
113
+ able that the mean field results describe well only the
114
+ systems with large n0, while its derivation assumes the
115
+ arXiv:2301.11250v1 [cond-mat.stat-mech] 26 Jan 2023
116
+
117
+ 2
118
+ limit n0 → 0. This counterintuitive result has been ar-
119
+ gued to be due to the randomization of the velocities at
120
+ higher densities due to avalanche of coagulation events
121
+ that occur due to the overlap of a newly created spheri-
122
+ cal particle with already existing particles, as the number
123
+ density is increased.
124
+ While the kinetics of BA with spherical particles are
125
+ reasonably understood, much less is known for the ex-
126
+ ponents when clusters have non-spherical shapes. The
127
+ scaling analysis can be extended to the case when the
128
+ mass scales with radius with a fractal dimension df [39]
129
+ (also see Sec. III where we review scaling theory). The
130
+ scaling theory leads to hyperscaling relations between
131
+ the different exponents independent of the mean field as-
132
+ sumptions. Fractal shapes are of particular importance in
133
+ the case of the experiments on aggregates of soot [5, 42],
134
+ mammary epithelial cells [43, 44], spray flames [45], etc.,
135
+ where the aggregates have a fractal dimension different
136
+ from those of compact structures (df = 2, 3).
137
+ While
138
+ the fractal dimensions seen in experiments [5, 43] are
139
+ sometimes close to that for diffusion limited aggregation
140
+ (df ≈ 1.7), there are many examples for which it is very
141
+ different (for instance 1.54 for sprays [45], 1.5 for cells [44]
142
+ or 2.4 for soot [42]). The fractal dimension of aggregates
143
+ formed by ballistic motion is not known to the best of
144
+ our knowledge.
145
+ In addition, it is also not known how
146
+ the exponents for BA change when the shape of the clus-
147
+ ters deviates from spherical. Neither is it known whether
148
+ the mean field limit is reached for any particular limit
149
+ of number density when the clusters are fractal. Finally,
150
+ in the characterization of mass distribution, a relevant
151
+ exponent is the scaling of mass distribution with small
152
+ mass, namely N(m) ∼ mζ [also see definition in Eq. (6)].
153
+ The exponent ζ is an independent exponent and cannot
154
+ be obtained from scaling theory, and is not known even
155
+ for BA with spherical particles.
156
+ To answer these questions, we study three differently
157
+ shaped clusters (named as models A, B, C) undergoing
158
+ BA on the square lattice. We choose a lattice approach
159
+ as it allows us to maintain fractal shapes in a computa-
160
+ tionally efficient manner. Lattice models are known to
161
+ reproduce the same results as the continuum for BA in
162
+ one dimension [23, 46], and we expect the equivalence to
163
+ hold true for two and higher dimensions. In model A, the
164
+ clusters occupy a single site irrespective of its mass. This
165
+ limiting model allows us to separate the dependence of
166
+ the velocity correlations on the initial density from the
167
+ dependence on mass-dependent shape. In model B, we
168
+ study clusters where the clusters maintain the shape at
169
+ the time of contact. Such clusters turn out to be frac-
170
+ tal. In model C, we study “spherical” clusters in which
171
+ the lattice approximation to the disc is maintained. This
172
+ model allows us to study lattice effects by comparing the
173
+ results on the lattice with the continuum results. In ad-
174
+ dition, we obtain the value of the exponent ζ for all the
175
+ three models. The results for the three models are sum-
176
+ marized in Table II (model A), Table III and Fig. 17
177
+ (model B), Table IV and Fig. 23 (model C). For model
178
+ A, we show that the exponents are universal, in the sense
179
+ that it is independent of the initial number density, n0
180
+ and it is different from the mean field results. For models
181
+ B and C, we find that the exponents are dependent on
182
+ n0 and approach the mean field assumptions of uncorre-
183
+ lated velocities only in the limit of large n0. The fractal
184
+ dimension for model B, on the other hand, is universal,
185
+ with df ≈ 1.49.
186
+ The remainder of the paper is organized as follows.
187
+ Section II contains a definition of the different models
188
+ as well as a description of the simulation methods. We
189
+ briefly review the scaling theory for BA with differently
190
+ shaped particles in Sec. III. In Sec. IV, for the three mod-
191
+ els, we describe the results for the different exponents
192
+ obtained from large scale Monte Carlo simulations. Sec-
193
+ tion V contains a summary and discussion of the results.
194
+ II.
195
+ MODEL
196
+ In this section, we define the three models that we
197
+ study in this paper.
198
+ Consider a square lattice of size
199
+ L × L with periodic boundary conditions.
200
+ Initially N
201
+ particles, each of mass 1, are randomly distributed with a
202
+ site having utmost one particle. Each particle is assigned
203
+ a velocity whose magnitude is drawn from a uniform dis-
204
+ tribution in [0, 1) and whose direction is chosen uniformly
205
+ in [0, 2π). The velocity of the center of mass is set to be
206
+ zero by choosing an appropriate frame of reference. The
207
+ system evolves stochastically in time as follows. A par-
208
+ ticle with velocity (vx, vy) hops in the x-direction with
209
+ rate |vx| in the positive (negative) direction depending on
210
+ whether vx is positive (negative). Likewise, it hops along
211
+ the y-axis with rate |vy| in the direction determined by
212
+ the sign of vy. When two particles collide, they aggregate
213
+ to form a new particle. The mass of the new particle is
214
+ the sum of the constituent particles while the new veloc-
215
+ ity is determined by conservation of linear momentum.
216
+ The shape of the new particle is determined based on
217
+ three different rules, leading to three different models.
218
+ Model A: Point particles
219
+ In model A, when a particle hops onto a site which
220
+ is already occupied, then the two particles coalesce, con-
221
+ serving mass and momentum. The new particle occupies
222
+ the same lattice site. We call this model the point parti-
223
+ cle model, since the sizes of all the particles are the same
224
+ (one lattice site) irrespective of their mass.
225
+ Model B: Fractal clusters
226
+ In model B, the particles, also referred to as clusters,
227
+ are extended objects consisting of a collection of sites
228
+ that are linked to each other by nearest neighbor bonds.
229
+
230
+ 3
231
+ (a)
232
+ (b)
233
+ (c)
234
+ (d)
235
+ FIG. 1.
236
+ Snapshots of the configurations at different times
237
+ t for model B (fractal clusters), where different clusters are
238
+ shown by different colors. The different panels correspond to
239
+ (a) t = 50, (b) t = 500, (c) t = 5000 and (d) t = 25790.
240
+ The data are for system size L = 200 and initial number of
241
+ N = 2000 particles (n0 = 0.05).
242
+ When a cluster hops, if any of the lattice sites belong-
243
+ ing to it becomes adjacent to a site belonging to another
244
+ cluster, then the two clusters coalesce.
245
+ The new clus-
246
+ ter maintains the shape at the time of coalescing, till it
247
+ collides with another cluster at a future time. The new
248
+ velocity of the cluster is determined through momentum
249
+ conservation. Snapshots of the configuration at different
250
+ times are shown in Fig. 1. The clusters are extended and
251
+ will be shown to be fractals.
252
+ Model C: Spherical clusters
253
+ In model C, like in model B, particles are extended
254
+ clusters. However, the shape of these particles are con-
255
+ strained to be spherical. When two particles come into
256
+ contact, they are replaced by a new spherical particle.
257
+ The center of mass of the new particle is chosen to be
258
+ lattice site closest to the center of mass of the constituent
259
+ particles. To construct a spherical cluster on the square
260
+ lattice, we fill all lattice sites within circles of increas-
261
+ ing radius. The sites in the outermost shell, if not fully
262
+ occupied, are chosen at random. This rearrangement of
263
+ sites to form a spherical shape will, at times, lead to the
264
+ new cluster overlapping with other nearby clusters, trig-
265
+ (a)
266
+ (b)
267
+ FIG. 2. Snapshots of the configurations at different times t
268
+ for model C (spherical clusters), where different clusters are
269
+ shown by different colors. The different panels correspond to
270
+ (a) t = 100 and (b) t = 500. The data are for system size
271
+ L = 200 and initial number of N = 4000 particles (n0 = 0.1).
272
+ TABLE I. Simulation details.
273
+ Model
274
+ L’s simulated
275
+ Number densities (n0)
276
+ A
277
+ upto 1000
278
+ 0.01 - 1.00
279
+ B
280
+ upto 10000
281
+ 0.001 - 0.01
282
+ C
283
+ upto 10000
284
+ 0.0001 - 0.16
285
+ gering an avalanche of coalescence events. Snapshots of
286
+ a typical time evolution are shown in Fig. 2.
287
+ Details of simulation
288
+ In model B and model C, where extended clusters
289
+ hop as a single unit, we identify the different clusters
290
+ and their merging using the Hoshen-Kopelman algo-
291
+ rithm [47]. Simulations were carried out for different sys-
292
+ tem sizes varying from L = 100 upto L = 10000 for all
293
+ three models and a wide range of number densities n0.
294
+ The simulation is continued till all the clusters aggregate
295
+ together to form the final single cluster. The details of
296
+ the densities and the lattice sizes used for simulations of
297
+ the three models are given in Table I.
298
+ III.
299
+ REVIEW OF SCALING THEORY
300
+ In this section, we review the scaling theory for BA,
301
+ described initially in Ref. [33]. Here, we give a scaling
302
+ argument based on the Smoluchowski equation for aggre-
303
+ gation (see Refs. [16, 17] for reviews). Different scaling
304
+ arguments, leading to the same results, may be found in
305
+ Refs. [39, 40]. Let N(m, t) denote the average density of
306
+
307
+ 4
308
+ clusters of mass m at time t. N(m, t) evolves in time as
309
+ dN(m, t)
310
+ dt
311
+ = −N(m, t)
312
+ � ∞
313
+ 0
314
+ dm1K(m, m1)N(m1, t)
315
+ + 1
316
+ 2
317
+ � m
318
+ 0
319
+ dmK(m1, m − m1)N(m, t)N(m − m1, t), (1)
320
+ where the kernel K(m1, m2) is the rate at which particles
321
+ of masses m1 and m2 collide. The first term in the right
322
+ hand side of Eq. (1) describes a loss term where a particle
323
+ of mass m collides with another particle, while the second
324
+ term describes a gain term where two particles collide to
325
+ form a particle of mass m.
326
+ We restrict ourselves to homogeneous kernels, which
327
+ are known to describe many physical systems, examples
328
+ of which may be found in Refs. [16, 17]. Homogeneous
329
+ kernels have the property
330
+ K(hm1, hm2) = hλK(m1, m2),
331
+ h > 0,
332
+ (2)
333
+ where λ is called the homogeneity exponent. For λ < 1,
334
+ and for large masses and times, it can be shown that
335
+ Eq. (1) is solved by a N(m, t) which has the scaling form
336
+ N(m, t) ≃
337
+ 1
338
+ t2θn Φ
339
+ � m
340
+ tθn
341
+
342
+ .
343
+ (3)
344
+ For x ≫ 1, Φ(x) vanishes exponentially. For x ≪ 1, Φ(x)
345
+ is a power law
346
+ Φ(x) ∼ xζ,
347
+ x ≪ 1.
348
+ (4)
349
+ Thus, there are two exponents θn and ζ characterizing
350
+ the mass distribution N(m, t).
351
+ The exponent θn describes how the mean density of
352
+ particles n(t) =
353
+
354
+ m N(m, t)dm decreases with time. In-
355
+ tegrating Eq. (3), we obtain
356
+ n(t) ∼ t−θn.
357
+ (5)
358
+ The exponent ζ describes the power law dependence of
359
+ N(m, t) on mass for small masses:
360
+ N(m, t) ∼
361
+
362
+ tθn(2+ζ) ,
363
+ m ≪ tθn.
364
+ (6)
365
+ The dependence of θn on the homogeneity exponent λ
366
+ can be obtained by substituting Eq. (3) into Eq. (1), and
367
+ is known to be (for example, see Refs. [16, 17])
368
+ θn =
369
+ 1
370
+ 1 − λ.
371
+ (7)
372
+ We now focus on the collision kernel that corresponds
373
+ to BA. Assuming a homogeneous mixture of clusters of
374
+ all masses, the rate of collision between two masses m1
375
+ and m2 is proportional to (r1 + r2)d−1|⃗v1 − ⃗v2| where
376
+ r1 and r2 are the radii of the particles, ⃗v1 and ⃗v2 the
377
+ velocities, and d is the dimension. The relative velocity
378
+ may be approximated as |⃗v1 − ⃗v2| ≈
379
+
380
+ v2
381
+ 1 + v2
382
+ 2. Thus, the
383
+ collision kernel for BA may be written as
384
+ K(m1, m2) ∝ (r1 + r2)d−1
385
+
386
+ v2
387
+ 1 + v2
388
+ 2.
389
+ (8)
390
+ To express the radii and velocities in terms of the masses,
391
+ we assume that the typical speed, vm, of particles of mass
392
+ m, scales with mass as
393
+ v2
394
+ m ∼ m−η.
395
+ (9)
396
+ The radii are related to mass though the fractal dimen-
397
+ sion, df, of a cluster:
398
+ r ∝ m1/df .
399
+ (10)
400
+ Thus, the kernel in Eq. (8) reduces to
401
+ K(m1, m2) ∝
402
+
403
+ m1/df
404
+ 1
405
+ + m1/df
406
+ 2
407
+ �d−1 �
408
+ m−η
409
+ 1
410
+ + m−η
411
+ 2 . (11)
412
+ This kernel is homogeneous in its arguments with ho-
413
+ mogeneity exponent given by
414
+ λ = d − 1
415
+ df
416
+ − η
417
+ 2.
418
+ (12)
419
+ From Eq. (7), we then obtain
420
+ θn =
421
+ 2df
422
+ 2df − 2(d − 1) + ηdf
423
+ .
424
+ (13)
425
+ Another quantity of interest is the mean kinetic energy
426
+ e(t), defined as
427
+ e(t) ≃
428
+
429
+ dm1
430
+ 2mv2
431
+ mN(m, t).
432
+ (14)
433
+ The energy density decreases in time as a power law
434
+ e(t) ∼ t−θe.
435
+ Substituting v2
436
+ m ∼ m−η, we obtain the
437
+ scaling relation
438
+ θe = ηθn.
439
+ (15)
440
+ We now reproduce the results obtained for BA in
441
+ Ref. [33] which we refer to as the mean field BA ex-
442
+ ponents. Here, it is assumed that the clusters that are
443
+ formed are spherical (df = d) and that the velocities of
444
+ the constituent particles of a given cluster are uncorre-
445
+ lated implying that η = 1. Substituting these values into
446
+ Eqs. (13) and (15), we reproduce the results
447
+ θmf
448
+ n
449
+ = θmf
450
+ e
451
+ =
452
+ 2d
453
+ d + 2,
454
+ (16)
455
+ where the superscript mf denotes mean field. Note that
456
+ the main simplifying assumption is that η = 1. In one
457
+ dimension η continues to be 1 as the order of particles is
458
+ maintained and a cluster made up of m initial neighbor-
459
+ ing particles will have uncorrelated velocities. However,
460
+ η need not be 1 in higher dimensions.
461
+
462
+ 5
463
+ We now summarize the scaling theory predictions for
464
+ the models studied in this paper.
465
+ For model A, since
466
+ particles are point-like objects we have r ∼ m0 or df =
467
+ ∞.
468
+ Similarly, in model C since clusters are spherical
469
+ df = d, which is spatial dimension itself. We thus obtain
470
+ θn =
471
+
472
+
473
+
474
+
475
+
476
+ 2
477
+ 2+η,
478
+ model A,
479
+ 2df
480
+ 2df −2+ηdf ,
481
+ model B,
482
+ 2
483
+ 1+η,
484
+ model C,
485
+ (17)
486
+ with θe = ηθn.
487
+ It is useful to have a relation between θn and θe that
488
+ does not involve η. This will enable us to verify scaling
489
+ theory without having to numerically measure the differ-
490
+ ent exponents. Eliminating η, we obtain
491
+ 2θn + θe =2,
492
+ model A,
493
+ 2θn
494
+ 2θn + θe − 2 =df,
495
+ model B,
496
+ (18)
497
+ θn + θe =2,
498
+ model C.
499
+ IV.
500
+ RESULTS
501
+ In this section, we describe the results, obtained from
502
+ extensive Monte Carlo simulations, for models A, B, and
503
+ C. For all the three models, we will independently de-
504
+ termine the exponents θn, θe, η and ζ. For model B the
505
+ fractal dimension df is also measured. Their dependence
506
+ on number density, the scaling relations between them,
507
+ as well as deviation from the mean field results, are de-
508
+ termined.
509
+ A.
510
+ Model A: Point particles
511
+ We first determine θn from the power law decay of
512
+ the mean density of particles, n, with time t. The data
513
+ for different initial number density n0 and initial mean
514
+ speed v0 collapse onto one curve when scaled, based on
515
+ dimensional analysis, according to
516
+ n(t, n0) ≃ n0f(tn0v0),
517
+ (19)
518
+ as shown in Fig. 3.
519
+ After an initial crossover time
520
+ tc ∼ n−1
521
+ 0 , n(t) decreases as a power law. From the excel-
522
+ lent collapse of the data for different n0 onto one curve,
523
+ we conclude that the power law exponent is independent
524
+ of the initial number density. From fitting a power law
525
+ to the data, we obtain θn = 0.633(7), which describes the
526
+ data well over 5 decades. In the inset of Fig. 3, the com-
527
+ pensated curve tθnn(t) is shown for n0 = 1. The mean
528
+ slope of the curve changes from negative to positive as θn
529
+ varies from 0.626 to 0.640, consistent with our estimate
530
+ of θn from direct measurement.
531
+ We now numerically determine θn using different anal-
532
+ yses, both for the sake of consistency as well as for bench-
533
+ marking different methods that will be more useful in
534
+ determining exponents for models B and C.
535
+ 10-6
536
+ 10-5
537
+ 10-4
538
+ 10-3
539
+ 10-2
540
+ 10-1
541
+ 100
542
+ 10-2
543
+ 100
544
+ 102
545
+ 104
546
+ 106
547
+ 108
548
+ 1010
549
+ 1012
550
+ 1014
551
+ n/n0
552
+ tn0v0
553
+ n0 = 0.01
554
+ n0 = 0.10
555
+ n0 = 0.20
556
+ n0 = 0.40
557
+ n0 = 0.70
558
+ n0 = 1.00
559
+ 0.9
560
+ 1
561
+ 1.1
562
+ 1.2
563
+ 102
564
+ 103
565
+ 104
566
+ 105
567
+ 106
568
+ 107
569
+ tθn n(t)
570
+ t
571
+ θn = 0.640
572
+ θn = 0.633
573
+ θn = 0.626
574
+ FIG. 3.
575
+ The data (model A) for mean number density of par-
576
+ ticles, n(t), for different initial number densities n0 collapse
577
+ onto a single curve when n(t) and t are scaled as in Eq. (19).
578
+ The solid line is a power law t−0.633. Inset: The compensated
579
+ data n(t)tθn is shown for three different choices of θn differing
580
+ by 0.007 for n0 = 1.0. The curve is flat for θn = 0.633. The
581
+ data are obtained for L = 1000. All data have been averaged
582
+ over 300 different initial conditions.
583
+ 10-4
584
+ 10-3
585
+ 10-2
586
+ 10-1
587
+ 100
588
+ 101
589
+ 102
590
+ 103
591
+ 104
592
+ 10-2
593
+ 10-1
594
+ 100
595
+ 101
596
+ 102
597
+ 103
598
+ 104
599
+ t 2θn N(m,t)
600
+ m/tθn
601
+ t = 250
602
+ t = 1000
603
+ t = 4000
604
+ t = 16000
605
+ t = 64000
606
+ t = 256000
607
+ t = 1024000
608
+ 10-3
609
+ 10-1
610
+ 101
611
+ 103
612
+ 105
613
+ 100
614
+ 101
615
+ 102
616
+ 103
617
+ 104
618
+ 105
619
+ N(m,t)
620
+ m
621
+ t = 250
622
+ t = 2000
623
+ t = 16000
624
+ t = 128000
625
+ t = 1024000
626
+ FIG. 4.
627
+ The mass distribution N(m, t) for different times
628
+ collapse onto a single curve when scaled as in Eq. (3), with
629
+ θn = 0.633. The data are for model A, with initial number
630
+ density n0 = 1.0, and system size L = 1000 lattice. Inset:
631
+ The unscaled data for N(m, t) for different times t.
632
+ First we check that the measured value of θn is consis-
633
+ tent with the mass distribution N(m, t) and then we use
634
+ the finite size scaling for large times. The dependence
635
+ of N(m, t) on time and mass are shown in the inset of
636
+ Fig. 4. When scaled as in Eq. (3) with θn = 0.633, the
637
+ data for different times, that span three decades, collapse
638
+ onto a single curve (see Fig. 4).
639
+ Finally, we examine finite size effects. For very large
640
+ times, when the number of clusters is order one, we ex-
641
+ pect that n(t) ∼ L−2, where L is the system size. As-
642
+ suming finite size scaling, we can write
643
+ n(t) ≃ 1
644
+ L2 fn
645
+
646
+ t
647
+ L2/θn
648
+
649
+ ,
650
+ (20)
651
+ where the scaling function fn(x) ∼ x−θn for x ≪ 1, and
652
+
653
+ 6
654
+ 10-1
655
+ 100
656
+ 101
657
+ 102
658
+ 103
659
+ 104
660
+ 105
661
+ 106
662
+ 10-8
663
+ 10-6
664
+ 10-4
665
+ 10-2
666
+ 100
667
+ n L2
668
+ t/L2/θn
669
+ L = 1000
670
+ L = 750
671
+ L = 500
672
+ L = 250
673
+ t -θn
674
+ FIG. 5.
675
+ The number density n(t) for different system sizes L
676
+ collapse onto a single curve when scaled as in Eq. (20), with
677
+ θn = 0.633. The data are for model A, and initial number
678
+ density n0 = 1.0.
679
+ fn(x) ∼ constant for x ≫ 1. The data for n(t) for differ-
680
+ ent L, when scaled as in Eq. (20) with θn = 0.633, col-
681
+ lapse onto a single curve, as shown in Fig. 5. For model
682
+ B and C, we will find the analysis of the data based on
683
+ N(m, t) and finite size scaling very useful for determining
684
+ the exponents.
685
+ We now determine θe from the power law decay of
686
+ the mean energy density e with time t.
687
+ The data for
688
+ energy for different initial number density n0, initial
689
+ speed v0 and initial mean energy e0 collapse onto one
690
+ curve when scaled, based on dimensional analysis, as
691
+ e(t) ≃ e0fe(tn0v0), as can be seen in Fig. 6. After an
692
+ initial crossover time tc ∼ n−1
693
+ 0 , e(t) decreases as a power
694
+ law. From the excellent data collapse, we conclude that
695
+ the power law exponent is independent of the initial num-
696
+ ber density. From fitting a power law to the data, we
697
+ obtain θe = 0.728(5), which describes the data well over
698
+ 5 decades. In the inset of Fig. 6, the compensated curve
699
+ tθee(t) is shown for n0 = 1.0.
700
+ The mean slope of the
701
+ curve changes from negative to positive as θn varies from
702
+ 0.723 to 0.733, consistent with our direct measurement
703
+ of θe.
704
+ The exponent θe can also be determined from finite
705
+ size scaling. As for number density, e(t) is expected to
706
+ obey finite size scaling of the form
707
+ e(t) ≃
708
+ 1
709
+ L2θe/θn fe
710
+
711
+ t
712
+ L2/θn
713
+
714
+ ,
715
+ (21)
716
+ where the scaling function fe(x) ∼ x−θe for x ≪ 1, and
717
+ fe(x) ∼ constant for x ≫ 1. The simulation data for
718
+ different L collapse onto a single curve (see Fig. 7) when
719
+ e(t) and t are scaled as in Eq. (21) with θn = 0.633 and
720
+ θe = 0.728. The power law extends over 4 decades.
721
+ We now determine the exponent η relating the scaling
722
+ of velocity with mass as v2
723
+ m ∼ m−η [see Eq. (9)]. As seen
724
+ from Fig. 8, ⟨v2⟩ for a fixed mass scales as a power law
725
+ with m. We obtain η = 1.1505(3).
726
+ Note that η is not an independent exponent, but re-
727
+ lated to θn and θe through scaling theory, to be η = θe/θn
728
+ 10-14
729
+ 10-12
730
+ 10-10
731
+ 10-8
732
+ 10-6
733
+ 10-4
734
+ 10-2
735
+ 100
736
+ 10-2
737
+ 100
738
+ 102
739
+ 104
740
+ 106
741
+ 108
742
+ 1010
743
+ e/e0
744
+ tn0 v0
745
+ n0 = 0.01
746
+ n0 = 0.10
747
+ n0 = 0.20
748
+ n0 = 0.40
749
+ n0 = 0.70
750
+ n0 = 1.00
751
+ 0.14
752
+ 0.15
753
+ 0.16
754
+ 0.17
755
+ 102
756
+ 103
757
+ 104
758
+ 105
759
+ 106
760
+ tθee(t)
761
+ t
762
+ θe = 0.733
763
+ θe = 0.728
764
+ θe = 0.723
765
+ FIG. 6.
766
+ The data for mean energy density, e(t), at time t for
767
+ different initial number densities n0 in model A collapse onto
768
+ a single curve when e(t) and t are scaled as shown in figure.
769
+ The solid line is a power law t−0.728. Inset: The compensated
770
+ data n(t)tθe is shown for three different choices of θe differing
771
+ by 0.005 for n0 = 1.0. The curve is flat for θe = 0.728. The
772
+ data are obtained for L = 1000. All data have been averaged
773
+ over 300 different initial conditions.
774
+ 10-6
775
+ 10-4
776
+ 10-2
777
+ 100
778
+ 102
779
+ 104
780
+ 106
781
+ 10-8
782
+ 10-6
783
+ 10-4
784
+ 10-2
785
+ 100
786
+ L2θe /θn e(t)
787
+ t/L2/θn
788
+ L = 1000
789
+ L = 750
790
+ L = 500
791
+ L = 250
792
+ t -θe
793
+ FIG. 7.
794
+ The mean energy e(t) for different system sizes L
795
+ collapse onto a single curve when scaled as in Eq. (21), with
796
+ θn = 0.633 and θe = 0.728. The data are for model A, and
797
+ initial number density n0 = 1.0.
798
+ [see Eq. (17)]. From the measured values of θe = 0.728
799
+ and θn = 0.633, we obtain η = 1.15, consistent with
800
+ the value from direct measurement η = 1.1505(3), thus
801
+ providing support for the correctness of scaling theory.
802
+ We now provide a more direct evidence of scaling the-
803
+ ory being correct. From Eqs. (17) and (15), we obtain,
804
+ by eliminating η, a relation between θe and θn as given in
805
+ Eq. (18). If this relation is true, it implies that t2n2(t)e(t)
806
+ should not depend on time t. In Fig. 9, we show the vari-
807
+ ation of tan2(t)e(t) with a = 1.98, 2.00, 2.02. It is clear
808
+ that only for a = 2.0, the curve is horizontal. This gives
809
+ us a way of validating the scaling relations without the
810
+ need to measure any exponent directly.
811
+ Finally, we determine the exponent ζ defined in Eq. (6)
812
+ for small masses: N(m, t) ∼ mζt−θn(2+ζ). Note that ζ
813
+ is not related to θn or θe and is an independent expo-
814
+
815
+ 7
816
+ 10-8
817
+ 10-7
818
+ 10-6
819
+ 10-5
820
+ 10-4
821
+ 10-3
822
+ 10-2
823
+ 10-1
824
+ 100
825
+ 100
826
+ 101
827
+ 102
828
+ 103
829
+ 104
830
+ 105
831
+ 〈v2〉
832
+ m
833
+ m-1.1505
834
+ FIG. 8.
835
+ The variation of the mean square velocity ⟨v2⟩ with
836
+ mass m. The solid line is power law t−η with η = −1.1505.
837
+ The data are for model A, with n0 = 1.0 and system size
838
+ L = 1000.
839
+ 0.04
840
+ 0.05
841
+ 0.06
842
+ 0.07
843
+ 0.08
844
+ 0.09
845
+ 0.1
846
+ 102
847
+ 103
848
+ 104
849
+ 105
850
+ 106
851
+ 107
852
+ 108
853
+ t ae(t)n(t) 2
854
+ t
855
+ a = 2.02
856
+ a = 2.00
857
+ a = 1.98
858
+ FIG. 9.
859
+ The variation of tan2(t)e(t) with time t for three
860
+ different values of a close to 2.
861
+ The compensated curve
862
+ is horizontal for a = 2.0, validating the scaling relation in
863
+ Eq. (18). The data are for model A, with initial number den-
864
+ sity n0 = 1.0 and system size L = 1000.
865
+ nent. To determine ζ, we study the temporal behavior
866
+ of N(m, t) for fixed mass m = 2, 4, 8, 12, 16. As shown
867
+ in Fig. 10, the data for the different masses for large
868
+ times collapse onto one curve when N(m, t) is scaled as
869
+ N(m, t)/mζ, with ζ = 0.270(5). We additionally check
870
+ that the scaled data are consistent with the power law
871
+ t−θn(2+ζ) for large times.
872
+ The numerically obtained values of the exponents for
873
+ model A are summarized in Table II.
874
+ B.
875
+ Model B: Fractal Clusters
876
+ In this subsection, we determine the exponents θn, θe,
877
+ η and ζ for model B. We first show that the clusters in
878
+ model B are fractal with a fractal dimension, df, that
879
+ lies between 1 and 2. To determine df, we consider the
880
+ final cluster in each of the simulations for a given initial
881
+ number density n0. df of this cluster is measured using
882
+ 10-8
883
+ 10-7
884
+ 10-6
885
+ 10-5
886
+ 10-4
887
+ 10-3
888
+ 10-2
889
+ 10-1
890
+ 100
891
+ 100
892
+ 101
893
+ 102
894
+ 103
895
+ 104
896
+ 105
897
+ N(m,t)/mζ
898
+ t
899
+ m = 2
900
+ m = 4
901
+ m = 8
902
+ m = 12
903
+ m = 16
904
+ t -θn(2+ζ)
905
+ FIG. 10. The data for N(m, t) for different masses for large
906
+ times collapse onto one curve when the number density is
907
+ scaled as N(m, t)/mζ with ζ = 0.270.
908
+ The solid line is a
909
+ power law t−θn(2+ζ) with θn = 0.633. The data are for model
910
+ A, with initial number density n0 = 1.0.
911
+ TABLE II. Summary of the numerically obtained values of
912
+ the exponents for model A. The values are independent of
913
+ initial density n0.
914
+ exponent
915
+ value
916
+ θn
917
+ 0.633(7)
918
+ θe
919
+ 0.728(5)
920
+ η
921
+ 1.1505(3)
922
+ ζ
923
+ 0.270(5)
924
+ the box counting method [48]. In this method, the lattice
925
+ is tiled with square boxes of length ℓ. Let M be the num-
926
+ ber of non-empty boxes. Then M ∼ ℓ−df . The results
927
+ for three different n0 are shown in Fig. 11. The data for
928
+ different n0 fall on top of each other for intermediate box
929
+ sizes. The same is true for other n0 and we conclude that
930
+ df is independent of n0. We estimate df to be 1.49(3).
931
+ Consider now the decay of the density of particles n(t)
932
+ with time t. We find that for model B, it is difficult to
933
+ accurately determine θn directly from the data for n(t)
934
+ because of strong crossover effects. This can be seen from
935
+ Fig. 12 where the variation of n(t) with t is shown for two
936
+ different initial densities n0 = 0.00125 and n0 = 0.01.
937
+ The data for the two densities overlap for short times but
938
+ deviate for larger times. The solid lines, which are the
939
+ estimates for θn from finite size scaling (to be discussed
940
+ below) match with the data only for late times. The con-
941
+ vergence to the asymptotic answer can also be seen from
942
+ measuring the instantaneous slope θn = −d ln n(t)/d ln t
943
+ for each time (see inset of Fig. 12). We find that the expo-
944
+ nent θn saturates only at late times for the larger initial
945
+ densities. We find that the same issue is present for the
946
+ temporal decay of energy e(t), making it also difficult to
947
+ measure θe directly.
948
+ We determine θn from finite size scaling.
949
+ For finite
950
+ systems, n(t) has the finite size scaling form given in
951
+
952
+ 8
953
+ 10-6
954
+ 10-5
955
+ 10-4
956
+ 10-3
957
+ 10-2
958
+ 10-1
959
+ 100
960
+ 101
961
+ 100
962
+ 101
963
+ 102
964
+ 103
965
+ M /(n0 L2)
966
+ l
967
+ n0=0.0001
968
+ n0=0.0025
969
+ n0=0.01
970
+ l -1.49
971
+ FIG. 11.
972
+ Determination of the fractal dimension of the
973
+ largest cluster in model B using the box counting method.
974
+ The number of non-empty boxes, M, varies with the size ℓ
975
+ of the boxes used to tile the lattice as M ∼ ℓ−df . We find
976
+ df ≈ 1.49(3) (power law shown by solid line) irrespective of
977
+ the initial density. The data are for L = 5000.
978
+ 10-5
979
+ 10-4
980
+ 10-3
981
+ 10-2
982
+ 10-1
983
+ 100
984
+ 10-3
985
+ 10-2
986
+ 10-1
987
+ 100
988
+ 101
989
+ 102
990
+ 103
991
+ 104
992
+ t -1.10
993
+ t -1.01
994
+ n/n0
995
+ tn0v0
996
+ n0 = 0.00125
997
+ n0 = 0.01
998
+ 0.2
999
+ 0.6
1000
+ 1
1001
+ 1.4
1002
+ 102
1003
+ 104
1004
+ 106
1005
+ θn
1006
+ t
1007
+ n0=0.00125
1008
+ n0=0.01
1009
+ FIG. 12. The variation of the mean density of clusters n(t) in
1010
+ model B with time t is shown for two different initial densi-
1011
+ ties. The exponents for the power laws, shown by solid lines,
1012
+ have been obtained from finite size scaling. Inset: The time
1013
+ dependent exponent θn obtained from θn = −d ln n(t)/d ln t is
1014
+ shown. θn saturates for the larger initial densities only at late
1015
+ times. Data are for L = 2000 and averaged over 300 different
1016
+ initial conditions.
1017
+ Eq. (20), namely n(t) ≃ L−2fn(t/L2/θn). In Fig. 13, we
1018
+ show the results for two representative initial densities
1019
+ n0 = 0.00125 and n0 = 0.01. The data for different L,
1020
+ when scaled as in Eq. (20), collapse onto a single curve
1021
+ with θn = 1.01(1) for n0 = 0.00125 and θn = 1.10(1) for
1022
+ n0 = 0.01. The results for other n0 are listed in Table III,
1023
+ based on which we conclude that θn depends on n0 and
1024
+ converges to θn = 1 as n0 → 0. We also check that the
1025
+ same value of θn leads to the collapse of the data for
1026
+ N(m, t) for different times when scaled as in Eq. (3).
1027
+ The limiting value of θn = 1 for n0 → 0 coincides
1028
+ with θmf
1029
+ n
1030
+ = 1. However, it is not clear whether the mean
1031
+ field result is obtained because correlations vanish. We
1032
+ check for correlations by measuring the exponent η. In
1033
+ Fig. 14, we show the dependence of the mean squared
1034
+ 100
1035
+ 101
1036
+ 102
1037
+ 103
1038
+ 104
1039
+ 105
1040
+ 106
1041
+ 107
1042
+ 108
1043
+ 10-6
1044
+ 10-4
1045
+ 10-2
1046
+ 100
1047
+ 102
1048
+ n0=0.01
1049
+ n0=0.00125
1050
+ n(t)L2
1051
+ t/L2/θn
1052
+ L = 10000
1053
+ L = 5000
1054
+ L = 2000
1055
+ L = 1000
1056
+ L = 500
1057
+ L = 250
1058
+ FIG. 13. Finite size scaling of n(t) for model B: The number
1059
+ density n(t) for different system sizes L collapse onto a single
1060
+ curve when scaled as in Eq. (20), with θn = 1.01 and θn =
1061
+ 1.10 for the initial densities n0 = 0.00125 and n0 = 0.01
1062
+ respectively.
1063
+ The data for n0 = 0.01 has been shifted for
1064
+ clarity.
1065
+ 10-10
1066
+ 10-8
1067
+ 10-6
1068
+ 10-4
1069
+ 10-2
1070
+ 100
1071
+ 100
1072
+ 101
1073
+ 102
1074
+ 103
1075
+ 104
1076
+ 105
1077
+ m-1.293
1078
+ m-1.204
1079
+ 〈v2〉
1080
+ m
1081
+ n0=0.00125
1082
+ n0=0.01
1083
+ FIG. 14.
1084
+ The variation of the mean square velocity ⟨v2⟩
1085
+ with mass m for different initial densities.
1086
+ The solid lines
1087
+ are power-laws m−η with η = 1.293(4) for n0 = 0.00125 and
1088
+ η = 1.204(3) for n0 = 0.01. The data are for model B with
1089
+ system sizes L = 10000 for n0 = 0.00125 and L = 5000 for
1090
+ n0 = 0.01. The data for n0 = 0.01 has been shifted for clarity.
1091
+ velocity on the mass m for two initial densities.
1092
+ The
1093
+ power law dependence extends over three decades and we
1094
+ obtain exponents that depend on the initial density n0
1095
+ with η = 1.293(4) for n0 = 0.00125 and η = 1.204(3) for
1096
+ n0 = 0.01. The results for other n0 are listed in Table III,
1097
+ based on which we conclude that η also depends on n0
1098
+ and differs significantly from one for small n0. However,
1099
+ as n0 increases, we find that η → 1.
1100
+ Since it is difficult to measure θe directly from e(t),
1101
+ we estimate θe using the scaling relation θe = ηθn [see
1102
+ Eq. (15)]. To check for consistency, we confirm that for
1103
+ this choice of θe, the data for different system sizes col-
1104
+ lapse onto one curve when e(t) and t are scaled using
1105
+ finite size scaling as described in Eq. (21). The data col-
1106
+ lapse for two different n0, shown in Fig. 15, is satisfactory.
1107
+ The results of θe for different n0 are listed in Table III.
1108
+
1109
+ 9
1110
+ 10-2
1111
+ 100
1112
+ 102
1113
+ 104
1114
+ 106
1115
+ 108
1116
+ 1010
1117
+ 10-6
1118
+ 10-4
1119
+ 10-2
1120
+ 100
1121
+ 102
1122
+ n0=0.01
1123
+ n0=0.00125
1124
+ e(t)L2θe /θn
1125
+ t/L2/θn
1126
+ L = 10000
1127
+ L = 5000
1128
+ L = 2000
1129
+ L = 1000
1130
+ L = 500
1131
+ L = 250
1132
+ FIG. 15. Finite size scaling of e(t) for model B: The mean
1133
+ energy e(t) for different system sizes L collapse onto a single
1134
+ curve when scaled as in Eq. (21). Results for two different
1135
+ densities n0 = 0.00125 and n0 = 0.01(vertically shifted for
1136
+ visualization) is shown with θn obtained using finite size scal-
1137
+ ing [Eq. (20)] whereas θe is obtained using the hyperscaling
1138
+ relation [Eq. (15)].
1139
+ 10-8
1140
+ 10-6
1141
+ 10-4
1142
+ 10-2
1143
+ 100
1144
+ 102
1145
+ 100
1146
+ 101
1147
+ 102
1148
+ 103
1149
+ 104
1150
+ 105
1151
+ 106
1152
+ 107
1153
+ 108
1154
+ n0=0.01
1155
+ n0=0.00125
1156
+ N(m,t)/mζ
1157
+ t
1158
+ m = 2
1159
+ m = 4
1160
+ m = 8
1161
+ m = 12
1162
+ m = 16
1163
+ t-θn(2+ζ)
1164
+ FIG. 16. The data for N(m, t) in model B for fixed masses
1165
+ collapse onto one curve when the number density is scaled as
1166
+ N(m, t)/mζ with ζ = −0.422(6) for n0 = 0.00125 whereas
1167
+ ζ = −0.538(24) for n0 = 0.01. The solid line is a power law
1168
+ t−θn(2+ζ) with θn taking values 1.01 and 1.10 for the initial
1169
+ densities 0.00125 and 0.01 (vertically shifted for visualization)
1170
+ respectively.
1171
+ Finally, we determine the exponent ζ defined in Eq. (6)
1172
+ for small masses. Similar to model A, in order to deter-
1173
+ mine ζ, we study the temporal behavior of N(m, t) for
1174
+ fixed mass m = 2, 4, 8, 12, 16. Here, we illustrate the be-
1175
+ havior of ζ for two different initial densities. As shown
1176
+ in Fig. 16, the data for the different masses collapse
1177
+ onto one curve for the respective initial densities when
1178
+ N(m, t) is scaled as N(m, t)/mζ, with ζ = −0.4229(6)
1179
+ for n0 = 0.00125 and ζ = −0.538(24) for n0 = 0.01. As
1180
+ an additional check, the scaled data are consistent with
1181
+ the power law with an exponent t−θn(2+ζ).
1182
+ Thus, the
1183
+ exponent ζ is dependent on the initial density n0. Also,
1184
+ they are negative, as compared to model A where the
1185
+ exponent is positive.
1186
+ TABLE III. Summary of the numerically obtained values of
1187
+ the exponents for model B.
1188
+ n0
1189
+ θn
1190
+ η
1191
+ θe
1192
+ df
1193
+ df
1194
+ ζ
1195
+ (= ηθn)
1196
+ [Eq. (18)]
1197
+ 0.00100 1.01(5) 1.291(4) 1.30(7) 1.49(3) 1.54(17) -0.41(5)
1198
+ 0.00125 1.01(8) 1.293(4) 1.30(10) 1.49(3) 1.54(23) -0.42(1)
1199
+ 0.00250 1.03(4) 1.261(7) 1.30(6) 1.49(3) 1.52(14) -0.46(2)
1200
+ 0.00500 1.08(4) 1.231(2) 1.33(5) 1.49(3) 1.46(12) -0.49(2)
1201
+ 0.01
1202
+ 1.10(2) 1.204(3) 1.32(3) 1.49(3)
1203
+ 1.45(7)
1204
+ -0.54(2)
1205
+ 0.04
1206
+
1207
+ 1.10
1208
+
1209
+
1210
+
1211
+
1212
+ 0.08
1213
+
1214
+ 1.08
1215
+
1216
+
1217
+
1218
+
1219
+ 0.16
1220
+
1221
+ 1.05
1222
+
1223
+
1224
+
1225
+
1226
+ 1
1227
+ 1.1
1228
+ 1.2
1229
+ 1.3
1230
+ 1.4
1231
+ 1.5
1232
+ 10-3
1233
+ 10-2
1234
+ 10-1
1235
+ θn, θe , η
1236
+ n0
1237
+ θn
1238
+ θe
1239
+ η
1240
+ FIG. 17.
1241
+ The variation of the exponents θn, θe and η are
1242
+ shown as function of the initial density n0. The data are for
1243
+ model B. θn and θe approach an asymptotic limit 1.0 and 1.3
1244
+ respectively for lowest densities. The exponent η ≈ 1.3 in the
1245
+ low density limit and approaches the mean field result (η = 1)
1246
+ for higher density.
1247
+ The results for the exponents θn, θe, η, df and ζ are
1248
+ summarized in Table III and their dependence on num-
1249
+ ber density n0 is shown in Fig. 17. For higher densities,
1250
+ it is difficult to get the exponents θn and hence θe due
1251
+ to increasing finite-size effects. However, the exponent η
1252
+ can be calculated for the densities larger than 0.01. From
1253
+ Table III, we observe that, when n0 → 0, the exponents
1254
+ tend to the limiting values θn → 1, η → 1.3 and θe → 1.3.
1255
+ When the density increases, we find that η → 1, thus ap-
1256
+ proaching its mean field value ηmf = 1. We conclude that
1257
+ velocity correlations vanish as density increases. We note
1258
+ that in model B, there are no avalanche of coalescence
1259
+ events caused due to two clusters colliding. We also ver-
1260
+ ify that the exponents satisfy the hyperscaling relation
1261
+ given by Eq. (18). In Table III, the fractal dimension
1262
+ determined numerically is compared with that obtained
1263
+ by Eq. (18) [see columns 5 and 6]. For all densities, the
1264
+ values are equal within error bars, thus consistent with
1265
+ the scaling theory.
1266
+
1267
+ 10
1268
+ 10-7
1269
+ 10-6
1270
+ 10-5
1271
+ 10-4
1272
+ 10-3
1273
+ 10-2
1274
+ 10-1
1275
+ 100
1276
+ 10-4
1277
+ 10-2
1278
+ 100
1279
+ 102
1280
+ 104
1281
+ 106
1282
+ t -0.83
1283
+ t -0.93
1284
+ n(t)/n0
1285
+ tn0v0
1286
+ n0 = 0.0001
1287
+ n0 = 0.16
1288
+ 0.2
1289
+ 0.6
1290
+ 1
1291
+ 102
1292
+ 104
1293
+ 106
1294
+ θn
1295
+ t
1296
+ FIG. 18. The variation of the mean density of clusters n(t) in
1297
+ model C with time t is shown for two different initial densi-
1298
+ ties. The exponents for the power laws, shown by solid lines,
1299
+ have been obtained from finite size scaling. Inset: The time
1300
+ dependent exponent θn obtained from θn = −d ln n(t)/d ln t is
1301
+ shown. θn saturates for the larger initial densities only at late
1302
+ times. The dashed lines are the reference for the exponents
1303
+ 0.83 and 0.93. Data are for L = 2000 and averaged over 300
1304
+ different initial conditions.
1305
+ C.
1306
+ Model C: Spherical clusters
1307
+ We now determine the exponents θn, θe, η and ζ for
1308
+ model C. We first show that the exponent θn depends on
1309
+ initial densities n0. Figure 18 shows the variation of n(t)
1310
+ with time t for two different initial densities, one small
1311
+ and one large. The time dependent θn = −d ln n(t)/d ln t,
1312
+ shown in the inset, saturates at different values for the
1313
+ different initial densities. Like for model B, it is difficult
1314
+ to measure θn directly as n(t) shows strong crossover ef-
1315
+ fects. For this reason, we determine θn from finite size
1316
+ scaling (see below) following which we obtain θn = 0.83
1317
+ for n0 = 0.0001 and θn = 0.93 for n0 = 0.16. The ex-
1318
+ ponents obtained from finite size scaling are shown in
1319
+ Fig. 18 for comparison and they describe the data for
1320
+ large times well.
1321
+ We determine the exponent θn using the finite size scal-
1322
+ ing n(t) ≃ L−2fn(t/L2/θn) [see Eq. (20)]. Two represen-
1323
+ tative cases are shown in Fig. 19. The data of n(t) for
1324
+ different L, when scaled as in Eq. (20) collapse onto a
1325
+ single curve for θn = 0.83 for n0 = 0.001 and θn = 0.93
1326
+ for n0 = 0.16. The results for other n0 are listed in Ta-
1327
+ ble IV, based on which we conclude that θn depends on
1328
+ n0 and increases to the mean field result θmf
1329
+ n
1330
+ = 1 with
1331
+ increasing n0. We also check that the same value of θn
1332
+ leads to the collapse of the data for N(m, t) for different
1333
+ times when scaled as in Eq. (3).
1334
+ It is possible that the mean field result is obtained at
1335
+ higher n0 because the correlations vanish. Two repre-
1336
+ sentative cases are shown in Fig. 20.
1337
+ We find that η
1338
+ depends on the initial density n0 with η = 1.283(13) for
1339
+ n0 = 0.0001 and η = 1.114(2) for n0 = 0.16. The results
1340
+ for other n0 are listed in Table IV and it shows that η
1341
+ decreases to its mean field prediction ηmf = 1 as density
1342
+ 100
1343
+ 101
1344
+ 102
1345
+ 103
1346
+ 104
1347
+ 105
1348
+ 106
1349
+ 107
1350
+ 108
1351
+ 109
1352
+ 10-8
1353
+ 10-6
1354
+ 10-4
1355
+ 10-2
1356
+ 100
1357
+ n0=0.0001
1358
+ n0=0.16
1359
+ L2n(t)
1360
+ t/L2/θn
1361
+ L10000
1362
+ L5000
1363
+ L2000
1364
+ L1000
1365
+ L500
1366
+ FIG. 19. Finite size scaling of n(t) for model C: The number
1367
+ density n(t) for different system sizes L collapse onto a single
1368
+ curve when scaled as in Eq. (20), with θn = 0.83(4) and θn =
1369
+ 0.93(5) for the initial densities n0 = 0.0001 and n0 = 0.16
1370
+ respectively.
1371
+ The data for n0 = 0.16 has been shifted for
1372
+ clarity.
1373
+ 10-12
1374
+ 10-10
1375
+ 10-8
1376
+ 10-6
1377
+ 10-4
1378
+ 10-2
1379
+ 100
1380
+ 100
1381
+ 101
1382
+ 102
1383
+ 103
1384
+ 104
1385
+ 105
1386
+ m-1.283
1387
+ m-1.114
1388
+ 〈v2〉
1389
+ m
1390
+ n0=0.0001
1391
+ n0=0.16
1392
+ FIG. 20.
1393
+ The variation of the mean square velocity ⟨v2⟩
1394
+ plotted as function of mass m for different initial densities.
1395
+ The solid lines are power-laws m−η with η = 1.283(13) and
1396
+ η = 1.114(2) for n0 = 0.0001 and n0 = 0.16 respectively.
1397
+ The data are for model C with system sizes L = 10000 and
1398
+ L = 2000 for the densities n0 = 0.0001 and n0 = 0.16 respec-
1399
+ tively. The data for n0 = 0.16 has been shifted for clarity.
1400
+ increases.
1401
+ We find that it is difficult to measure θe directly from
1402
+ the power-law decay of e(t). Hence, we measure θe using
1403
+ the scaling relation, θe = ηθn [see Eq. (15)]. To check
1404
+ for the consistency of the result for θe obtained using
1405
+ the scaling relation [Eq. (15)], we confirm that for this
1406
+ choice of θe, the data for different system sizes can be
1407
+ collapsed onto one curve using finite size scaling e(t) ≃
1408
+ L−2θe/θnfe(t/L2/θn) [see Eq. (21)]. The data collapse is
1409
+ satisfactory as shown in Fig. 21 for the two different n0.
1410
+ The results of θe for different n0 are listed in Table IV
1411
+ which shows that θe is close to the mean field limit, θmf
1412
+ e
1413
+ =
1414
+ 1 for all n0.
1415
+ Finally, we determine the exponent ζ [defined in
1416
+ Eq. (6)] for small masses. In order to determine ζ, we
1417
+
1418
+ 11
1419
+ 10-8
1420
+ 10-6
1421
+ 10-4
1422
+ 10-2
1423
+ 100
1424
+ 102
1425
+ 104
1426
+ 106
1427
+ 108
1428
+ 10-8
1429
+ 10-7
1430
+ 10-6
1431
+ 10-5
1432
+ 10-4
1433
+ 10-3
1434
+ 10-2
1435
+ 10-1
1436
+ 100
1437
+ n0=0.0001
1438
+ n0=0.16
1439
+ L2θe / θn n(t)
1440
+ t/L 2/θn
1441
+ L10000
1442
+ L5000
1443
+ L2000
1444
+ L1000
1445
+ L500
1446
+ FIG. 21.
1447
+ Finite size scaling of e(t) for model C: The mean
1448
+ energy density e(t) for different system sizes L collapse onto
1449
+ a single curve when scaled as in Eq. (21). Results for two
1450
+ different densities n0 = 0.0001 and n0 = 0.16 is shown with
1451
+ θn obtained using finite size scaling [Eq. (20)] whereas θe ob-
1452
+ tained using the hyperscaling relation [Eq. (15)]. The data
1453
+ for n0 = 0.0001 has been shifted for clarity.
1454
+ 10-8
1455
+ 10-7
1456
+ 10-6
1457
+ 10-5
1458
+ 10-4
1459
+ 10-3
1460
+ 10-2
1461
+ 10-1
1462
+ 100
1463
+ 101
1464
+ 100
1465
+ 101
1466
+ 102
1467
+ 103
1468
+ 104
1469
+ 105
1470
+ 106
1471
+ 107
1472
+ 108
1473
+ 109
1474
+ n0=0.0001
1475
+ n0=0.16
1476
+ N(m,t)/mζ
1477
+ t
1478
+ m = 2
1479
+ m = 4
1480
+ m = 8
1481
+ m = 16
1482
+ t-θn(2+ζ)
1483
+ FIG. 22. The data for N(m, t) in model C for fixed masses
1484
+ collapse onto one curve when the number density is scaled as
1485
+ N(m, t)/mζ with ζ = −0.248(26) for n0 = 0.0001 whereas
1486
+ ζ = −0.563(10) for n0 = 0.16. The solid line is a power law
1487
+ t−θn(2+ζ) with θn as 0.83 and 0.93 for the initial densities
1488
+ 0.0001 and 0.16 respectively. The data for n0 = 0.0001 has
1489
+ been shifted for clarity.
1490
+ study the temporal behavior of N(m, t) for fixed mass
1491
+ m = 2, 4, 8, 16. Here, we illustrate the behavior of ζ for
1492
+ two different initial densities. As shown in Fig. 22, the
1493
+ data for the different masses collapse onto one curve for
1494
+ the respective initial densities when N(m, t) is scaled as
1495
+ N(m, t)/mζ, with ζ = −0.248(26) for n0 = 0.0001 and
1496
+ ζ = −0.563(10) for n0 = 0.16. As an additional check,
1497
+ the scaled data are consistent with the power law with
1498
+ an exponent t−θn(2+ζ). The results of ζ for other densi-
1499
+ ties are listed in Table IV. We conclude that ζ is strongly
1500
+ dependent on n0.
1501
+ We find that the exponents θn, θe, η and ζ are den-
1502
+ sity dependent [see Table IV and Fig. 23(a)].
1503
+ θn in-
1504
+ creases with the increase in density and approaches the
1505
+ TABLE IV. Summary of the numerically obtained values of
1506
+ the exponents for model C.
1507
+ n0
1508
+ θn
1509
+ η
1510
+ θe(= ηθn)
1511
+ ζ
1512
+ 0.0001
1513
+ 0.83(4)
1514
+ 1.283(13)
1515
+ 1.06(6)
1516
+ -0.248(26)
1517
+ 0.00125
1518
+ 0.84(5)
1519
+ 1.275(10)
1520
+ 1.07(7)
1521
+ -0.350(27)
1522
+ 0.01
1523
+ 0.85(5)
1524
+ 1.241(2)
1525
+ 1.05(6)
1526
+ -0.364(6)
1527
+ 0.04
1528
+ 0.87(6)
1529
+ 1.174(3)
1530
+ 1.02(7)
1531
+ -0.403(4)
1532
+ 0.16
1533
+ 0.93(5)
1534
+ 1.114(2)
1535
+ 1.04(6)
1536
+ -0.563(10)
1537
+ (a)
1538
+ (b)
1539
+ FIG. 23.
1540
+ (a) The variation of the exponents θn, θe and η with
1541
+ initial density, n0, for model C. The horizontal dotted line is
1542
+ the mean field prediction, θmf
1543
+ n
1544
+ = θmf
1545
+ e
1546
+ = ηmf = 1. (b) Com-
1547
+ parison of the exponent θn with results of earlier simulations
1548
+ of BA in the continuum [39, 41].
1549
+ mean field predictions θmf
1550
+ n
1551
+ = 1. An opposite trend is ob-
1552
+ served in the variation of exponent η with density where
1553
+ it decreases with the increase in initial density but, ap-
1554
+ proaches the mean field prediction ηmf = 1 with the in-
1555
+ crease in density. On the other hand, θe has a rather weak
1556
+ dependence on the initial density and is always close to
1557
+ the mean field result θmf
1558
+ e
1559
+ = 1 irrespective of the initial
1560
+ density. We compare our results with those for BA in the
1561
+ continuum [39, 41] in Fig. 23(b). We find that the data
1562
+ are in good agreement, suggesting that the stochasticity
1563
+ introduced in the temporal evolution of the lattice model
1564
+ is not relevant.
1565
+
1566
+ 12
1567
+ V.
1568
+ CONCLUSION
1569
+ In this paper, we studied the problem of ballistic ag-
1570
+ gregation in two dimensions using three different lat-
1571
+ tice models. In all the three models, particles move, on
1572
+ an average, in a straight line and undergo momentum-
1573
+ conserving aggregation on contact. The three models dif-
1574
+ fer in the shape of the particles. In Model A, the particles
1575
+ are point-sized and occupy a single lattice site. In model
1576
+ B, the shape of the aggregate is the combined shape of
1577
+ the two aggregating particles at the time of collision, and
1578
+ is a fractal. In model C, the shape of the particles are
1579
+ spherical, to the closest lattice approximation. For the
1580
+ three models, from large scale Monte Carlo simulations,
1581
+ we determine the exponents characterizing the power-law
1582
+ decay of the number density of particles, the mean en-
1583
+ ergy, the fractal dimension, the correlation between the
1584
+ velocities of the particles constituting an aggregate and
1585
+ the scaling function for the mass distribution. The re-
1586
+ sults for the three models are summarized in Table II
1587
+ (model A), Table III and Fig. 17 (model B), Table IV
1588
+ and Fig. 23 (model C).
1589
+ We find that the values of the exponents are indepen-
1590
+ dent of the initial number density only for model A. For
1591
+ models B and C, the exponents are weakly dependent on
1592
+ the initial number density, making them non-universal.
1593
+ The fractal dimension in model B is, however, indepen-
1594
+ dent of the initial number density, within the numeri-
1595
+ cal accuracy that we could achieve.
1596
+ In model C, the
1597
+ trends in the dependence of the exponents on n0 are con-
1598
+ sistent with the corresponding simulations for spherical
1599
+ particles in the continuum [29, 38–41]. While the expo-
1600
+ nent θn matches closely with the continuum results [see
1601
+ Fig. 23(b)], we find that the numerical values of the ex-
1602
+ ponent θe is less than the continuum result [41] and ap-
1603
+ proaches the mean field result faster. This discrepancy
1604
+ could be due to difficulties in measuring θe accurately
1605
+ due to strong crossovers seen in the data. We have shown
1606
+ that the results for the exponents in all the models, irre-
1607
+ spective of its dependence on n0, satisfy the hyperscaling
1608
+ relations derived from scaling theory.
1609
+ The fractal dimension of clusters formed by aggrega-
1610
+ tion is of interest in many experiments (for example,
1611
+ see [5, 42–45]). While it is to be expected that the expo-
1612
+ nents θn and θe will depend on the nature of transport
1613
+ and the shapes of the clusters, it is not clear whether the
1614
+ fractal dimension depends on transport. Fractal dimen-
1615
+ sion of the cluster in two-dimensional diffusion-limited
1616
+ aggregation (DLA) models, where clusters grow from a
1617
+ nucleating center, show df ≃ 1.70 [49, 50].
1618
+ However,
1619
+ fractal dimension of clusters, when there is no nucleating
1620
+ center but all the aggregates undergo diffusive motion, is
1621
+ different from that of DLA. In the case when the diffu-
1622
+ sion constant of larger masses decreases with mass or is
1623
+ mass-independent, df has been been shown to be in the
1624
+ range df ≃ 1.38−1.52 [51–53]. This result is close to our
1625
+ result for ballistic aggregation (model B) for which we
1626
+ found df ≃ 1.49. While close, it is not clear whether the
1627
+ fractal dimension is different for the diffusive and ballis-
1628
+ tic models. The value 1.49 is very close to that observed
1629
+ in sprays (1.54) [45], and cells (1.5) [44].
1630
+ It would be
1631
+ interesting to explore this connection further as well as
1632
+ understand the dependence of the fractal dimension on
1633
+ different mass dependent velocities, especially the limit
1634
+ where larger masses move faster.
1635
+ The mean field approximation assumes that the ve-
1636
+ locities of the particles forming a cluster are uncorre-
1637
+ lated. The correlations are characterized by the power-
1638
+ law dependence of the speed on the mass of the aggre-
1639
+ gate: ⟨v2(m)⟩ ∼ m−η, with ηmf = 1. Earlier simulations
1640
+ of spherical particles in the continuum show that η de-
1641
+ creases to η = ηmf as the initial number density of parti-
1642
+ cles, n0, is increased [29, 38–41]. This lack of correlation
1643
+ was attributed to the increased avalanche of coagulation
1644
+ events that occur due to the overlap of a newly created
1645
+ spherical particle with already existing particles, as the
1646
+ number density is increased.
1647
+ In this paper, we deter-
1648
+ mined η for the three models.
1649
+ For model A, we find
1650
+ that η ≈ 1.15 is independent of n0 and hence there is no
1651
+ limit in which velocities become uncorrelated. For mod-
1652
+ els B and C, we find that η → ηmf with increasing n0
1653
+ (see Tables III and IV). However, in model B there are
1654
+ no avalanche of collisions while model C has avalanche
1655
+ of collisions.
1656
+ Thus, contrary to earlier conjecture, the
1657
+ avalanche of collisions cannot be a necessary condition
1658
+ for velocities to become uncorrelated.
1659
+ In contrast to BA in the continuum where the dy-
1660
+ namics is deterministic, the temporal evolution in the
1661
+ lattice models is stochastic.
1662
+ Each particle moves in a
1663
+ straight line only on an average. In the continuum models
1664
+ stochasticity enters only through the initial conditions.
1665
+ However, for BA in one dimension, it has been shown
1666
+ that the stochasticity in the dynamics not only does not
1667
+ affect scaling laws, the lattice models reproduce many
1668
+ details of the trajectory like shock positions for the same
1669
+ initial conditions [23, 46]. For model C, we find that the
1670
+ results for θn match with the earlier continuum results in
1671
+ two dimensions for all n0. We thus conclude that stochas-
1672
+ ticity in the initial conditions dominate the fluctuations
1673
+ induced by the dynamics. This is in sharp contrast to
1674
+ diffusive systems where diffusive fluctuations dominate
1675
+ randomness in initial conditions.
1676
+ For all the three models, we measure the exponent ζ
1677
+ [see definition in Eq. (6)] which characterizes the behavior
1678
+ of smaller mass aggregates. The exponent ζ is not easily
1679
+ obtained from scaling arguments and for the correspond-
1680
+ ing diffusive problem requires renormalisation group cal-
1681
+ culations [54–56]. For model A, we find that ζ is positive,
1682
+ implying that there is a typical time dependent mass.
1683
+ This is in contrast to point particles in one dimension
1684
+ where the mass distribution is a power law. For models
1685
+ B and C, we find that ζ is dependent on n0. However,
1686
+ it is negative for all values of n0, implying that the mass
1687
+ distribution is a power law in mass, for a given time.
1688
+
1689
+ 13
1690
+ ACKNOWLEDGMENTS
1691
+ The simulations were carried out on the supercomputer
1692
+ Nandadevi at The Institute of Mathematical Sciences
1693
+ (IMSc). P.F would like to thank IMSc for the visiting stu-
1694
+ dentship. VVP acknowledges SERB SRG 2022/001077
1695
+ for support.
1696
+ [1] G. M. Whitesides and B. Grzybowski, Self-assembly at
1697
+ all scales, Science 295, 2418 (2002).
1698
+ [2] G. M. Hidy, J. R. Brock, et al., Dynamics of aerocolloidal
1699
+ systems (Pergamon Press, 1970).
1700
+ [3] R. Drake, Topics in current aerosol research, vol. 3, part
1701
+ 2 (1972).
1702
+ [4] S. K. Friedlander et al., Smoke, dust, and haze, Vol. 198
1703
+ (Oxford University Press New York, 2000).
1704
+ [5] C. M. Sorensen, J. Yon, F. Liu, J. Maughan, W. R. Hein-
1705
+ son, and M. J. Berg, Light scattering and absorption by
1706
+ fractal aggregates including soot, Journal of Quantitative
1707
+ Spectroscopy and Radiative Transfer 217, 459 (2018).
1708
+ [6] W. H. Stockmayer, Theory of molecular size distribution
1709
+ and gel formation in branched-chain polymers, The Jour-
1710
+ nal of chemical physics 11, 45 (1943).
1711
+ [7] H. R. Pruppacher and J. D. Klett, Microphysics of clouds
1712
+ and precipitation, 2nd ed. (Dordrecht : Kluwer Academic
1713
+ Publishers, 1997).
1714
+ [8] M. H. Lee, On the validity of the coagulation equation
1715
+ and the nature of runaway growth, Icarus 143, 74 (2000).
1716
+ [9] L. Esposito, Planetary rings, Vol. 4 (Cambridge Univer-
1717
+ sity Press, 2006).
1718
+ [10] N. Brilliantov, P. Krapivsky, A. Bodrova, F. Spahn,
1719
+ H. Hayakawa, V. Stadnichuk, and J. Schmidt, Size distri-
1720
+ bution of particles in saturn’s rings from aggregation and
1721
+ fragmentation, Proceedings of the National Academy of
1722
+ Sciences 112, 9536 (2015).
1723
+ [11] J. Blum, Dust evolution in protoplanetary discs and the
1724
+ formation of planetesimals, Space Science Reviews 214,
1725
+ 1 (2018).
1726
+ [12] C. Connaughton, A. Dutta, R. Rajesh, N. Siddharth, and
1727
+ O. Zaboronski, Stationary mass distribution and nonlo-
1728
+ cality in models of coalescence and shattering, Physical
1729
+ Review E 97, 022137 (2018).
1730
+ [13] A. M. Tom, R. Rajesh, and S. Vemparala, Aggregation
1731
+ dynamics of rigid polyelectrolytes, The Journal of Chem-
1732
+ ical Physics 144, 034904 (2016).
1733
+ [14] A. M. Tom, R. Rajesh, and S. Vemparala, Aggregation
1734
+ of flexible polyelectrolytes: Phase diagram and dynamics,
1735
+ The Journal of chemical physics 147, 144903 (2017).
1736
+ [15] S. N. Dorogovtsev and J. F. Mendes, Evolution of net-
1737
+ works, Advances in physics 51, 1079 (2002).
1738
+ [16] F. Leyvraz, Scaling theory and exactly solved models in
1739
+ the kinetics of irreversible aggregation, Physics Reports
1740
+ 383, 95 (2003).
1741
+ [17] C. Connaughton, R. Rajesh, and O. Zaboronski, Ki-
1742
+ netics of cluster-cluster aggregation, in Handbook of
1743
+ Nanophysics: Clusters and Fullerenes, edited by K. D.
1744
+ Sattler (Taylor and Francis, 2010).
1745
+ [18] D. J. Aldous, Deterministic and stochastic models for co-
1746
+ alescence (aggregation and coagulation): a review of the
1747
+ mean-field theory for probabilists, Bernoulli , 3 (1999).
1748
+ [19] S. Kida, Asymptotic properties of burgers turbulence,
1749
+ Journal of Fluid mechanics 93, 337 (1979).
1750
+ [20] L. Frachebourg, P. A. Martin, and J. Piasecki, Ballistic
1751
+ aggregation: a solvable model of irreversible many parti-
1752
+ cles dynamics, Physica A: Statistical Mechanics and its
1753
+ Applications 279, 69 (2000).
1754
+ [21] R. Tribe and O. Zaboronski, On the large time asymp-
1755
+ totics of decaying burgers turbulence, Communications
1756
+ in Mathematical Physics 212, 415 (2000).
1757
+ [22] J. M. Burgers, The nonlinear diffusion equation: asymp-
1758
+ totic solutions and statistical problems (Springer Science
1759
+ & Business Media, 2013).
1760
+ [23] S. Dey, D. Das, and R. Rajesh, Lattice models for ballistic
1761
+ aggregation in one dimension, EPL (Europhysics Letters)
1762
+ 93, 44001 (2011).
1763
+ [24] H. Takayasu, Steady-state distribution of generalized ag-
1764
+ gregation system with injection, Physical review letters
1765
+ 63, 2563 (1989).
1766
+ [25] C. Connaughton, R. Rajesh, and O. Zaboronski, Break-
1767
+ down of kolmogorov scaling in models of cluster aggrega-
1768
+ tion, Physical review letters 94, 194503 (2005).
1769
+ [26] C. Connaughton, R. Rajesh, and O. Zaboronski, Cluster–
1770
+ cluster aggregation as an analogue of a turbulent cascade:
1771
+ Kolmogorov phenomenology, scaling laws and the break-
1772
+ down of self-similarity, Physica D: Nonlinear Phenomena
1773
+ 222, 97 (2006).
1774
+ [27] E. Ben-Naim, S. Y. Chen, G. D. Doolen, and S. Redner,
1775
+ Shocklike dynamics of inelastic gases, Phys. Rev. Lett.
1776
+ 83, 4069 (1999).
1777
+ [28] X. Nie, E. Ben-Naim, and S. Chen, Dynamics of freely
1778
+ cooling granular gases, Physical review letters 89, 204301
1779
+ (2002).
1780
+ [29] S. N. Pathak, Z. Jabeen, D. Das, and R. Rajesh, Energy
1781
+ decay in three-dimensional freely cooling granular gas,
1782
+ Phys. Rev. Lett. 112, 038001 (2014).
1783
+ [30] R. Dandekar, S. Chakraborti, and R. Rajesh, Hard core
1784
+ run and tumble particles on a one-dimensional lattice,
1785
+ Physical Review E 102, 062111 (2020).
1786
+ [31] G. Wetherill, The Formation and Evolution of Planetary
1787
+ Systems (Cambridge University Press, Cambridge, 1988).
1788
+ [32] P. Meakin, Fractal aggregates in geophysics, Reviews of
1789
+ Geophysics 29, 317 (1991).
1790
+ [33] G. F. Carnevale, Y. Pomeau, and W. R. Young, Statis-
1791
+ tics of ballistic agglomeration, Phys. Rev. Lett. 64, 2913
1792
+ (1990).
1793
+ [34] S. N. Pathak, D. Das, and R. Rajesh, Inhomogeneous
1794
+ cooling of the rough granular gas in two dimensions, EPL
1795
+ (Europhysics Letters) 107, 44001 (2014).
1796
+ [35] J. Piasecki, Universal distribution of masses in a one-
1797
+ dimensional sticky gas, Physica A: Statistical Mechanics
1798
+ and its Applications 190, 95 (1992).
1799
+ [36] L. Frachebourg, Exact solution of the one-dimensional
1800
+
1801
+ 14
1802
+ ballistic aggregation, Physical review letters 82, 1502
1803
+ (1999).
1804
+ [37] E. Ben-Naim and P. Krapivsky, Stochastic aggregation:
1805
+ scaling properties, Journal of Physics A: Mathematical
1806
+ and General 33, 5477 (2000).
1807
+ [38] E. Trizac and J.-P. Hansen, Dynamic scaling behavior of
1808
+ ballistic coalescence, Phys. Rev. Lett. 74, 4114 (1995).
1809
+ [39] E. Trizac and J.-P. Hansen, Dynamics and growth of par-
1810
+ ticles undergoing ballistic coalescence, Journal of Statis-
1811
+ tical Physics 82, 1345 (1996).
1812
+ [40] E. Trizac and P. L. Krapivsky, Correlations in ballistic
1813
+ processes, Phys. Rev. Lett. 91, 218302 (2003).
1814
+ [41] S. Paul and S. K. Das, Dimension dependence of cluster-
1815
+ ing dynamics in models of ballistic aggregation and freely
1816
+ cooling granular gas, Phys. Rev. E 97, 032902 (2018).
1817
+ [42] C. Zhang, W. R. Heinson, P. Liu, P. Beeler, Q. Li,
1818
+ J. Jiang, and R. K. Chakrabarty, Three-dimensional
1819
+ tomography reveals distinct morphological and optical
1820
+ properties of soot aggregates from coal-fired residential
1821
+ stoves in china, Journal of Quantitative Spectroscopy and
1822
+ Radiative Transfer 254, 107184 (2020).
1823
+ [43] S. E. Leggett, Z. J. Neronha, D. Bhaskar, J. Y. Sim, T. M.
1824
+ Perdikari, and I. Y. Wong, Motility-limited aggregation
1825
+ of mammary epithelial cells into fractal-like clusters, Pro-
1826
+ ceedings of the National Academy of Sciences 116, 17298
1827
+ (2019).
1828
+ [44] C.-Y. Liu, H.-Y. Chen, and I. Lin, Scale-free aggregation
1829
+ and interface fluctuations of cancer clusters in cancer-
1830
+ endothelial cell mixtures: From the dilute state to con-
1831
+ fluent monolayer, Physical Review Research 3, L032050
1832
+ (2021).
1833
+ [45] M. Simmler, M. Meier, and H. Nirschl, Characterization
1834
+ of fractal structures by spray flame synthesis using x-ray
1835
+ scattering, Materials 15, 2124 (2022).
1836
+ [46] S. Ostojic, D. Panja, and B. Nienhuis, Clustering in a
1837
+ one-dimensional inelastic lattice gas, Physical Review E
1838
+ 69, 041301 (2004).
1839
+ [47] J. Hoshen and R. Kopelman, Percolation and cluster
1840
+ distribution. i. cluster multiple labeling technique and
1841
+ critical concentration algorithm, Phys. Rev. B 14, 3438
1842
+ (1976).
1843
+ [48] K. Falconer, Fractal geometry: mathematical foundations
1844
+ and applications (John Wiley & Sons, 2004).
1845
+ [49] T. A. Witten and L. M. Sander, Diffusion-limited aggre-
1846
+ gation, a kinetic critical phenomenon, Phys. Rev. Lett.
1847
+ 47, 1400 (1981).
1848
+ [50] J. M. Tenti, S. N. Hern´andez Guiance, and I. M. Irurzun,
1849
+ Fractal dimension of diffusion-limited aggregation clus-
1850
+ ters grown on spherical surfaces, Phys. Rev. E 103,
1851
+ 012138 (2021).
1852
+ [51] P. Meakin, Formation of fractal clusters and networks
1853
+ by irreversible di���usion-limited aggregation, Phys. Rev.
1854
+ Lett. 51, 1119 (1983).
1855
+ [52] M. Kolb, R. Botet, and R. Jullien, Scaling of kinetically
1856
+ growing clusters, Phys. Rev. Lett. 51, 1123 (1983).
1857
+ [53] J. Wang, B. H.-j. Lee, and G. Arya, Kinetically assembled
1858
+ binary nanoparticle networks, Nanoscale 12, 5091 (2020).
1859
+ [54] S. Krishnamurthy, R. Rajesh, and O. Zaboronski, Kang-
1860
+ Redner small-mass anomaly in cluster-cluster aggrega-
1861
+ tion, Physical Review E 66, 066118 (2002).
1862
+ [55] S. Krishnamurthy, R. Rajesh, and O. Zaboronski, Per-
1863
+ sistence properties of a system of coagulating and anni-
1864
+ hilating random walkers, Physical Review E 68, 046103
1865
+ (2003).
1866
+ [56] R. Rajesh and O. Zaboronski, Survival probability of a
1867
+ diffusing test particle in a system of coagulating and an-
1868
+ nihilating random walkers, Physical Review E 70, 036111
1869
+ (2004).
1870
+
I9FIT4oBgHgl3EQfYyvF/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
INE3T4oBgHgl3EQfugsS/content/2301.04684v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8a7cc32ef58ba19e6ad58eb56e17c7bdb6e4c8fc5dc6482492853b91bd7ed8a9
3
+ size 5073985
ItAyT4oBgHgl3EQf5vr6/content/tmp_files/2301.00812v1.pdf.txt ADDED
@@ -0,0 +1,1909 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ *Corresponding author: [email protected]
3
+ One-shot domain adaptation in video-based assessment of surgical skills
4
+ Erim Yanik1*, Steven Schwaitzberg2, Gene Yang2, Xavier Intes1, and Suvranu De1,3
5
+ 1 Center for Modeling, Simulation & Imaging in Medicine, Rensselaer Polytechnic Institute, NY,
6
+ USA
7
+ 2 School of Medicine and Biomedical Sciences, University at Buffalo, NY, USA
8
+ 3 College of Engineering, Florida A&M University and The Florida State University, FL, USA
9
+
10
+ Deep Learning (DL) has achieved automatic and objective assessment of surgical skills.
11
+ However, DL models are data-hungry and restricted to their training domain. This prevents
12
+ them from transitioning to new tasks where data is limited. Hence, domain adaptation is
13
+ crucial to implement DL in real life. Here, we propose a meta-learning model, A-VBANet,
14
+ that can deliver domain-agnostic surgical skill classification via one-shot learning. We
15
+ develop the A-VBANet on five laparoscopic and robotic surgical simulators. Additionally,
16
+ we test it on operating room (OR) videos of laparoscopic cholecystectomy. Our model
17
+ successfully adapts with accuracies up to 99.5% in one-shot and 99.9% in few-shot settings
18
+ for simulated tasks and 89.7% for laparoscopic cholecystectomy. For the first time, we
19
+ provide a domain-agnostic procedure for video-based assessment of surgical skills. A
20
+ significant implication of this approach is that it allows the use of data from surgical
21
+ simulators to assess performance in the operating room.
22
+ There is growing interest in using deep learning (DL) approaches in surgical skill assessment1,2.
23
+ DL models1–20 enable real-time objective assessment of surgical skills with sufficient procedure-
24
+ specific data. However, surgical data is scarce20–23, expensive to collect2 in real environments, and
25
+ time-consuming to process/annotate24. Thus, current models are typically developed and tested for
26
+ one specific task, limiting their utility to the community at large. To generalize such models to
27
+ other surgical tasks – or domains – manually-intensive post-processing methodologies, such as
28
+ transfer learning25,26, are required. This is highly impractical and inefficient as the number of
29
+ surgical procedures performed and their variations are vast. Therefore, a major hurdle for the wide
30
+ dissemination of DL models and impacting clinical practice is for them to provide robust
31
+ performances while adapting to new surgical procedures for which limited data are available.
32
+ Herein, we propose a domain-agnostic DL model, Adaptive Video-Based Assessment Network
33
+ (A-VBANet), for surgical skill assessment using video streams. Fig. 1 details our approach. We
34
+ utilized few-(one-)shot26–30 meta-learning26,31–36 and investigated adaptability in five physical
35
+ simulators and laparoscopic cholecystectomy in the operating room (OR). Existing literature in
36
+ surgical skill assessment is not linked to meta-learning so far, and the closest study was adaptive
37
+ tool detection in robotic surgery30. This renders our pipeline the first in the field. A-VBANet has
38
+ the potential for broad implementation for surgical training, assessment, and credentialing.
39
+
40
+ Results
41
+ Metaset characteristics. Datasets. Our metaset comprised six surgical tasks from four cohorts
42
+ that include laparoscopic pattern cutting (cohort 1), laparoscopic suturing (cohort 2), robotic
43
+ suturing23, needle passing23, knot tying23 (cohort 3), and laparoscopic cholecystectomy (test
44
+ cohort). This yielded 29 students and 43 surgeons of 16 skill classes performing more than 2,300
45
+ trials (Fig. 1). The skill classes for laparoscopic pattern cutting and cholecystectomy were based
46
+
47
+
48
+ 2
49
+
50
+ on trial-wise performance. For the remaining tasks, we labeled using the surgical expertise of the
51
+ subjects.
52
+ Preprocessing. We utilized SimCLR37 to preprocess surgical videos. For each cohort, the model
53
+ was trained separately. Then, the trained models were used in their respective cohorts to extract
54
+ self-supervised features (SSFs) per frame in temporal order. This generated spatiotemporal feature
55
+ set used as input to the meta-learner. Our study included increasing SSFs from 2 to 64 as multiples
56
+ of two.
57
+
58
+ Fig. 1 | Overview of the A-VBANet pipeline. a. Surgical tasks and cohorts of the metaset. Here,
59
+ laparoscopic cholecystectomy is an OR surgery, while the remaining are simulators. b. The self-
60
+ supervision network and the corresponding spatiotemporal feature extraction. Here, T denotes
61
+ temporal length. c. The meta-learner pipeline. The model adapts to one task at a time in a round-
62
+ robin fashion, using the residual backbone designed for sequential inputs. At each turn, the trained
63
+ models are tested in the validation task and laparoscopic cholecystectomy. d. The t-SNE plot
64
+ shows the distribution of spatiotemporal feature sets. As seen, different cohorts generate different
65
+ clusters. e. The metaset characteristics.
66
+
67
+
68
+ Pattern cutting
69
+ Suturing (Lap.)
70
+ Suturing (Rob.)
71
+ Knot tying
72
+ Needle passing
73
+ Cholecystectomy
74
+ ynet
75
+ Irain
76
+ Validate
77
+ (+Test)
78
+ Proto-MAML
79
+ Datasets
80
+ Subjects
81
+ Classes / Number of trials
82
+ Fail
83
+ Pass
84
+ Pattern Cutting Residents
85
+ 213
86
+ 1,842
87
+ Novice
88
+ Expert
89
+ Suturing (Lap.)
90
+ Both
91
+ 24
92
+ 39
93
+ Novice Intermediate Expert
94
+ Suturing (Rob.)
95
+ 38
96
+ 20
97
+ 20
98
+ Needle Passing
99
+ Surgeons
100
+ 22
101
+ 16
102
+ 18
103
+ Knot Tying
104
+ 32
105
+ 20
106
+ 20
107
+ Low perform.
108
+ High perform.
109
+ Cholecystectomy Surgeons
110
+ 12
111
+ 3
112
+ 3
113
+
114
+ A-VBANet adapts to simulation tasks. We trained and validated our pipeline in a round-robin
115
+ fashion via one-shot learning. For instance, when pattern cutting was the target domain, the
116
+ remaining tasks were the source domain, i.e., the training domain of the network. At each round,
117
+ the validation task was also used for testing. Notably, laparoscopic cholecystectomy was excluded
118
+ from this scheme. Instead, we used it to further test the trained model’s adaptability in real-life
119
+ surgery at each round (Fig. 1). In this study, the results of a task are given for the best SSF set via
120
+ one-test-shot (k=1), an average of 100 repetitions for cohorts 1-3, and the best of 100 repetitions
121
+ for the test cohort.
122
+
123
+ A-VBANet adapts to binary-class tasks. In pattern cutting, the adaptation accuracy was
124
+ 0.900±.023 (Table 1). We also report the area under curve (AUC) of the Receiver Operating
125
+ Characteristics (ROC) to be 0.955±.020. In laparoscopic suturing, these values were 0.995±.008
126
+ and 0.999±.005 for accuracy and AUC. Fig. 2a illustrates the ROC curves for pattern cutting and
127
+ suturing. In addition, accuracy increased with k, i.e., few-test-shot setting, in both tasks (Table 1
128
+ and Extended Table 1).
129
+
130
+
131
+ Besides performance, we evaluated the reliability of the true predictions in each skill class
132
+ using NetTrustScore (NTS)38. (Supplementary Information / NetTrustScore). In pattern cutting,
133
+ NTSs were 0.989±.068 for Fail and 0.991±.047 for Pass. In laparoscopic suturing, these values
134
+ were 0.991±.009 for Novice and 0.998±.005 for Expert. Moreover, NTS increased with k in both
135
+ tasks (Extended Table 2). Fig. 2b details the trust density distribution over Softmax.
136
+
137
+ AVBA-Net adapts to multi-class tasks. The adaptation accuracies were 0.651±.040, 0.626±.027,
138
+ and 0.688±.022 in robotic suturing, needle passing, and knot tying (Table 1). Here, the model’s
139
+ performance increased with k in all tasks (Extended Table 1). Notably, k = 16 was not observed
140
+ in needle passing due to insufficient data. In addition, for true predictions, the NTSs were
141
+ 0.998±.003, 0.994±.008, and 0.994±.008 for Novice, Intermediate, and Expert in robotic suturing.
142
+ In needle passing, these values were 0.981±.020, 0.978±.022, and 0.965±.026. Finally, in knot
143
+ tying, we obtained 0.921±.039, 0.868±.052, and 0.817±.065. NTS increased with k in all tasks
144
+ (Extended Table 2). Fig. 3 illustrates the trust density distribution over SoftMax.
145
+
146
+
147
+
148
+
149
+ Table 1 | Task adaptation accuracies.
150
+ Val. and Test Dataset
151
+ k = 1
152
+ k = 2
153
+ k = 4
154
+ k = 8
155
+ k = 16
156
+ Pattern Cutting
157
+ 0.900±.023 0.910±.022
158
+ 0.920±.018 0.925±.019
159
+ 0.929±.017
160
+ Suturing (Lap.)
161
+ 0.995±.008 0.995±.008
162
+ 0.995±.006 0.997±.006
163
+ 0.999±.005
164
+ Suturing (Robotic)
165
+ 0.651±.040 0.664±.027
166
+ 0.697±.039 0.716±.035
167
+ 0.761±.044
168
+ Needle Passing
169
+ 0.626±.027 0.645±.022
170
+ 0.690±.033 0.727±.038
171
+ N/A
172
+ Knot Tying
173
+ 0.688±.022 0.697±.031
174
+ 0.714±.042 0.763±.057
175
+ 0.835±.077
176
+
177
+
178
+ 4
179
+
180
+
181
+ Fig 2. | a. ROCs and b. trust spectrums, resulting from 100 repetitions in pattern cutting (purple)
182
+ and laparoscopic suturing (turquoise).
183
+
184
+ Fig 3. | Trust spectrums for k = 1 cumulative of 100 runs in a. robotic suturing, b. needle passing
185
+ and c. knot tying.
186
+ a
187
+ b
188
+ c
189
+ a
190
+ b
191
+
192
+ 160
193
+ 100
194
+ Novice
195
+ 100
196
+ 140
197
+ Intermediate
198
+ Expert
199
+ 80
200
+ 80
201
+ 60
202
+ 09
203
+ 80
204
+ 60
205
+ 40
206
+ 40
207
+ 40
208
+ 20
209
+ 20
210
+ 20
211
+ 0
212
+ 0
213
+ 0.0
214
+ 0.2
215
+ 0.4
216
+ 0.6
217
+ 0.8
218
+ 1.0
219
+ 0.0
220
+ 0.2
221
+ 0.4
222
+ 0.6
223
+ 0.8
224
+ 1.0
225
+ 0.0
226
+ 0.2
227
+ 0.4
228
+ 0.6
229
+ 0.8
230
+ 1.0
231
+ SoftmaxDistribution
232
+ Softmax Distribution
233
+ Softmax Distribution
234
+ 80
235
+ 70
236
+ Novice
237
+ Intermediate
238
+ 60
239
+ Expert
240
+ 60
241
+ 50
242
+ ·50
243
+ 40
244
+ 40
245
+ 30
246
+ 30
247
+ 20
248
+ 20
249
+ 10
250
+ 10
251
+ 0
252
+ 0
253
+ 0
254
+ 0.0
255
+ 0.2
256
+ 0.4
257
+ 0.6
258
+ 0.8
259
+ 1.0
260
+ 0.0
261
+ 0.2
262
+ 0.4
263
+ 0.6
264
+ 0.8
265
+ 1.0
266
+ 0.0
267
+ 0.2
268
+ 0.4
269
+ 0.6
270
+ 0.8
271
+ 1.0
272
+ Softmax Distribution
273
+ Softmax Distribution
274
+ SoftmaxDistribution
275
+ 70
276
+ Novice
277
+ 25
278
+ Intermediate
279
+ 17.5
280
+ Expert
281
+ 60
282
+ 15.0
283
+ 20
284
+ 12.5
285
+ 40
286
+ 15
287
+ 10.0
288
+ 10
289
+ 7.5
290
+ 5.0
291
+ 10
292
+ 5
293
+ 2.5
294
+ 0
295
+ 0
296
+ 0.0
297
+ 0.0
298
+ 0.2
299
+ 0.4
300
+ 0.6
301
+ 0.8
302
+ 1.0
303
+ 0.0
304
+ 0.2
305
+ 0.4
306
+ 0.6
307
+ 0.8
308
+ 1.0
309
+ 0.0
310
+ 0.2
311
+ 0.4
312
+ 0.6
313
+ 0.8
314
+ 1.0
315
+ Softmax Distribution
316
+ Softmax Distribution
317
+ Softmax Distribution1.0
318
+ 1e3
319
+ Fail
320
+ Pass
321
+ 4
322
+ 4
323
+ 0.6
324
+ 3
325
+ 2
326
+ 2
327
+ 1
328
+ 1
329
+ 0.0
330
+ 0
331
+ 0
332
+ 0.0
333
+ 0.2
334
+ 0.4
335
+ 0.6
336
+ 0.8
337
+ 1.0
338
+ 0.0
339
+ 0.2
340
+ 0.4
341
+ 0.6
342
+ 8'0
343
+ 1.0
344
+ 0'0
345
+ 0.2
346
+ 0.4
347
+ 0.6
348
+ 0.8
349
+ 1.0
350
+ False Positive Rate
351
+ Softmax
352
+ Distribution
353
+ Softmax
354
+ Distribution
355
+ 1.0
356
+ 160
357
+ Novice
358
+ 200
359
+ Expert
360
+ 140
361
+ 150
362
+ 0.6
363
+ 100
364
+ 80
365
+ 100
366
+ 0.4
367
+ 60
368
+ 40
369
+ 50
370
+ 20
371
+ 0.0
372
+ 0
373
+ 0
374
+ 0.0
375
+ 0.2
376
+ 0.4
377
+ 0.6
378
+ 0.8
379
+ 1.0
380
+ 0.0
381
+ 0.2
382
+ 0.4
383
+ 0.6
384
+ 0.8
385
+ 1.0
386
+ 0.0
387
+ 0.2
388
+ 0.4
389
+ 0.6
390
+ 0.8
391
+ 1.0
392
+ False Positive Rate
393
+ Softmax Distribution
394
+ Softmax Distribution
395
+ 5
396
+
397
+ A-VBANet adapts to an operating room procedure. After being validated on a different
398
+ simulator at each round, we tested how well the A-VBANet can perform on laparoscopic
399
+ cholecystectomy. The accuracies are reported in Table 2. We obtained an overall accuracy of 0.867
400
+ and an AUC of 0.840. We did not analyze the few-shot setting due to limited data. When we broke
401
+ down the performance in individual validation tasks, we observed consistency between the tasks
402
+ (Table 2 and Extended Table 3). In addition, the NTSs for true predictions were 1.0 for both the
403
+ Low Performance and High Performance classes (Extended Table 4). Fig. 4 shows the trust density
404
+ distributions over SoftMax.
405
+
406
+
407
+
408
+
409
+
410
+
411
+
412
+
413
+
414
+
415
+ Fig 4. | Trust spectrums for each validation task for k = 1 in laparoscopic cholecystectomy for
416
+ Low Performance (left) and High Performance (right) classes.
417
+
418
+ Discussion
419
+ For over two decades, global rating tools, i.e., OSATS24 and FLS39 scoring, have been the gold
420
+ standard in assessing surgical skills. Current surgical skill assessment models rely on these rating
421
+ tools. However, such models are data-intensive and domain-specific. Further, surgical data is
422
+ limited2, and more than a few domains exist in real life. Furthermore, extracting fundamental
423
+ features of what constitutes surgical skills is challenging to determine manually. Hence, for DL
424
+ models to be useful, they must be capable of extracting information from simulator data and
425
+ adapting that to operating room procedures.
426
+ The main contribution of this paper is to utilize meta-learning effectively to pave the way for
427
+ DL approaches for surgical skill assessment without the need for extensive data. The A-VBANet
428
+ is able to adapt to surgical simulations by seeing only one sample (Table 1). This is the first step
429
+ Table 2 | Adaptation accuracies on laparoscopic cholecystectomy for k = 1
430
+ Validation dataset
431
+ Accuracy
432
+ AUC
433
+ Pattern Cutting
434
+ 0.872
435
+ 0.818
436
+ Suturing (Lap.)
437
+ 0.872
438
+ 0.848
439
+ Suturing (Rob.)
440
+ 0.821
441
+ 0.833
442
+ Needle Passing
443
+ 0.872
444
+ 0.838
445
+ Knot Tying
446
+ 0.897
447
+ 0.864
448
+ Overall
449
+ 0.867
450
+ 0.840
451
+
452
+ 35
453
+ Pattern cutting
454
+ 15.0
455
+ Pattern cutting
456
+ 30
457
+ Suturing (Lap.)
458
+ Suturing (Lap.)
459
+ ity
460
+ 25
461
+ Suturing (Rob.)
462
+ Suturing (Rob.)
463
+ Needle passing
464
+ 10.0
465
+ Needle passing
466
+ Knot tying
467
+ 7.5
468
+ Knot tying
469
+ Trust
470
+ 5.0
471
+ 5
472
+ 2.5
473
+ 0
474
+ 0.0
475
+ 0.0
476
+ 0.2
477
+ 0.4
478
+ 0.6
479
+ 0.8
480
+ 1.0
481
+ 0.0
482
+ 0.2
483
+ 0.4
484
+ 0.6
485
+ 0.8
486
+ 1.0
487
+ Softmax Distribution
488
+ Softmax Distribution
489
+ 6
490
+
491
+ in the real-life deployment of such technology in surgical training2,40–42 and credentialing39,43
492
+ outside the operating room. Both laparoscopic pattern cutting and suturing are prerequisites for
493
+ board certification in general and ob/GYN surgery39. Our model’s adaptation accuracy was 0.900
494
+ and 0.995 in these tasks.
495
+ Domain-agnostic assessment in the operating room is the second goal of this paper. Assessing
496
+ real-life expertise is essential for lifelong learning44 and continuous certification45–47. However, it
497
+ is inherently difficult and time-consuming to collect and annotate data from unregulated
498
+ environments such as the operating room2. Companies and medical societies engaged in collecting
499
+ limited datasets and expensive manual annotations typically restrict free public access to those
500
+ annotated data. For the widespread application of DL to surgical skill evaluation, it is crucial to
501
+ overcome these data-related challenges. The A-VBANet, trained and validated on simulators, was
502
+ tested on laparoscopic cholecystectomy. We investigated the best overall performance our model
503
+ can attain and obtained promising adaptation accuracy (overall 0.867 up to 0.897) and AUC of the
504
+ ROC (0.840 up to 0.964) (Table 2) from raw video data collected in the operating room without
505
+ annotation. This showed for the first time that adapting to the operating room is feasible with only
506
+ one sample via taking advantage of simulation task data. These results are preliminary under the
507
+ context of given surgical tasks. By adding more diverse representation, i.e., different real-life
508
+ procedures and cohorts, to the source set, the performance can be further improved.
509
+ A critical consideration for DL model development is that the network should be trustworthy,
510
+ i.e., ensure consistent performance for unseen trials. Hence, we also measured the network's
511
+ confidence in true predictions using NTS38. In Figs. 2, 3, and 4, we observed high density
512
+ distribution towards high Softmax values, indicating robust NTS (>0.8) for all tasks. In other
513
+ words, the prediction probabilities for the actual classes were well-separable from the probabilities
514
+ of other classes. Thus, the adapted models were reliable and highly likely to perform consistently.
515
+ In addition, we investigated the few-test-shot (k>1) setting for all the tasks other than
516
+ laparoscopic cholecystectomy. The performance of the A-VBANet increased with k (Extended
517
+ Tables 1). This is expected as increasing k implies more information for the network to adapt to a
518
+ new domain. However, the drawback of using larger k is that it decreases the number of testing
519
+ samples, increasing epistemic uncertainty48. This can be seen in increasing standard deviation in
520
+ datasets with limited sample size, i.e., JIGSAWS tasks. On the other hand, the NTS got better in
521
+ laparoscopic pattern cutting and suturing but did not follow a trend for the rest of the tasks as the
522
+ sample size was limited (Extended Tables 2). The models need to be tested with more data before
523
+ a conclusive statement can be made for NTS.
524
+ We did not observe a linear correlation between SSF and model performance (Extended Tables
525
+ 1 and 3). However, increased SSF led to increased NTS (Extended Tables 2 and 4). This signifies
526
+ that more information leads to higher confidence in true predictions. However, it decreases the
527
+ possibility of cross-overs, i.e., false prediction being predicted correctly and vice versa. This makes
528
+ the model less flexible. Thus, more prone to overfitting.
529
+ Another strength of our study is using videos over sensor-based kinematics, as the latter is
530
+ more expensive to collect and often unavailable2. On the other hand, videos are increasingly more
531
+ available 49. In addition, video-based assessment (VBA) is currently the main focus of national
532
+ institutions44,50 to replace traditional intraoperative training1,24,49. Besides, videos enabled us to
533
+ derive additional information from unlabeled data. For instance, even though there were 15 labeled
534
+ laparoscopic cholecystectomy trials, the self-supervision model corresponding to this cohort was
535
+ trained on 198 (183 of which were unlabeled) videos. Although we had limited data, we did not
536
+ implement the snippeting technique15,18,51 to augment the data size. This is because it inflates the
537
+
538
+
539
+ 7
540
+
541
+ score prediction12,24. Moreover, it causes inconsistent labeling as it is uncertain that performance
542
+ is isotropic within every trial12.
543
+ Some limitations of our study include cohort-specific preprocessing and limited testing data
544
+ and tasks. In future studies, we plan to incorporate meta-learning into self-supervision to provide
545
+ cohort-agnostic feature extraction from videos. This allows an end-to-end pipeline for domain
546
+ adaptation. Further, we aim to incorporate a broader range of surgical tasks.
547
+ This study demonstrated for the first time that one-shot domain adaptation is feasible in
548
+ surgical skill assessment, and a DL model can successfully adapt to multiple domains effectively
549
+ and automatically. This brings DL models one step closer to real-life implementation for surgical
550
+ training, assessment, and credentialing.
551
+
552
+ Methods
553
+ Metaset generation. The pattern cutting and suturing data were collected separately by our group in collaboration
554
+ with the University at Buffalo. They are subtasks of the Fundamentals of Laparoscopic Surgery (FLS) program,
555
+ which is a prerequisite for board certification39. For both, Institutional Review Board (IRB) approval was sought at
556
+ Rensselaer Polytechnic Institute and University at Buffalo. Further, informed consent was collected from each
557
+ subject.
558
+ Pattern cutting enrolled 21 residents (6 males / 15 females), ages between 21 and 30 (Mean: 23.95 / Std.: 1.69),
559
+ with no laparoscopy background. Here, one subject was left-handed. The subjects executed the task for 12 days,
560
+ generating 2,055 trials. We labeled each trial Pass or Fail (Fig. 1e) based on the FLS-based cut-off threshold52. This
561
+ produced 1,842 Pass and 213 Fail samples. Videos were collected at 640 x 480 resolution at 30 FPS via the FLS box
562
+ camera.
563
+ Laparoscopic suturing included 10 surgeons (5 males / 5 females) and 8 residents (5 males / 3 females), with
564
+ ages ranging from 23 to 56 (Mean: 31 / Std.: 7.9). All the surgeons were experienced in FLS with years of
565
+ experience varying between 1 to 20 years, while no resident had prior expertise in laparoscopy. This totaled 63
566
+ suturing trials (Fig. 1e). Notably, using the same methodology as pattern cutting, we ended up with only three Fail
567
+ samples. Thus, instead, we labeled the trials by residents as Novice and surgeons as Expert. This generated 24
568
+ Novice and 39 Expert samples. The videos were recorded at 720x480 resolution at 30 FPS via the FLS box camera.
569
+ We also employed robotic suturing, needle passing, and knot tying from the publicly available JIGSAWS
570
+ dataset23. All the tasks were conducted via the Da Vinci Surgical System. For each task, 8 surgeons performed
571
+ approximately five times. The class labels were assigned based on the surgical expertise in robotic surgery.
572
+ Surgeons with less than 10 hours of experience were labeled Novices, while more than 100 hours were Experts.
573
+ Surgeons in between were Intermediates. This led to 4 Novice, 2 Intermediate, and 2 Expert surgeons (Fig. 1e). In
574
+ addition, two separate video streams were collected per task from different angles at 640x480 resolution and 30 FPS.
575
+ We assumed each view as a separate trial to augment the data size.
576
+ Laparoscopic cholecystectomy videos were collected at Kaleida Health in Buffalo, New York, totaling 198
577
+ trials. In this study, 15 trials were annotated as Low Performance and High Performance, based on the OSATS
578
+ scores, yielding 12 and 3 samples (Fig. 1e) in each category. The criterion for a trial labeled as High Performance
579
+ was having an OSATS score greater than 23 (out of 25) (See Extended Table 5 for the OSATS breakdown). Next,
580
+ the surgical videos were collected via laparoscopes of varying resolutions at 30 FPS.
581
+
582
+ Model development. Developing feature extractor. SimCLR37 is a self-supervised contrastive network used to
583
+ extract comprehensive spatiotemporal features. We used SimCLR to reinforce our pipeline against corrupted frames,
584
+ e.g., blurry frame and background interference, such as changing light conditions and jitter. SimCLR uses a
585
+ backbone, 𝑓𝑏(. ) ∈ ℝ𝐷, to aggregate D-dimensional feature sets, i.e., representations37 from the video frames. In this
586
+ study, the backbone is ResNet34, with D = 512. Then, using
587
+ a linear classifier, it maps the representations into K-(128-) dimensional hidden space, 𝑓ℎ(. )∈ ℝ𝐾. The aim is to
588
+ maximize the likelihood of the classifier finding the augmented versions of the input frame in a large batch of
589
+ uncorrelated frames in 𝑓ℎ(.)37. Once trained, the classifier is removed. Extended Fig. 1 illustrates the SimCLR
590
+ architecture and deployment.
591
+ Generating spatiotemporal features. To generate spatiotemporal features (𝑿), we applied the trained backbone
592
+ 𝑓𝑏(. ) to each frame in a surgical video53 in temporal order, i.e., 𝑿𝑖 = [𝑓𝑏(𝑥𝑖1),… ,𝑓𝑏(𝑥𝑖𝑗),…, 𝑓𝑏(𝑥𝑖𝑇)] ∈ ℝ𝑇𝑥𝐷,
593
+ where 𝑥𝑖 ∈ ℝ𝑇𝑥3 is the list of frames of the 𝑖𝑡ℎ trial. Here, T is the temporal length and 𝑥𝑖𝑗 is the 𝑖𝑡ℎ trial’s 𝑗𝑡ℎ frame.
594
+
595
+
596
+ 8
597
+
598
+ Finally, 𝑿𝑖 ∈ ℝ𝑇𝑥𝐷 is the spatiotemporal feature set for the 𝑖𝑡ℎ trial. In addition, we used 1D Global Average
599
+ Pooling (GAP)54 to downsample 𝐷-dimensional representations: 𝐺𝐴𝑃(𝑿𝑖) ∈ ℝ𝑇𝑥𝐷 → 𝑿𝒊
600
+ ′ ∈ ℝ𝑇𝑥𝐷′ where 𝐷′ is of
601
+ 2,4,8,16,32, and 64-dimensions.
602
+ The meta-learner methodology. ProtoMAML35 is the combination of Prototypical Network (ProtoNet)34 and
603
+ Model-agnostic meta-learning (MAML)36. ProtoNet is a metric-based55 meta-learning model, learning to learn
604
+ prototypical (class) centers, 𝑣𝑐, in nonlinear embedding space34. MAML, on the other hand, is a model-based55 meta-
605
+ learner that offers fast and flexible adaptability to the target domains by learning the "global" optimal initialization
606
+ parameters (𝜃)36. One shortcoming of MAML is the lack of robust initialization to the output layer35. Proto-MAML
607
+ addresses this by combining MAML’s flexible adaptability with the prototypical center methodology from ProtoNet
608
+ and reports the best overall performance in multiple image datasets35. Specifically, ProtoMAML works by splitting
609
+ the training and validation sets into support and query sets. The support sets were used to optimize the parameter
610
+ space. On the other hand, the query sets were used to compute the train and validation losses. (Supplementary
611
+ Information / ProtoMAML implementation).
612
+ Developing the backbone of the meta-learner. The backbone of the ProtoMAML was developed based on our
613
+ previously published state-of-the-art model, the VBA-Net12, and the residual networks proposed by He et al.53. The
614
+ backbone consisted of two attention-infused56 residual blocks and 1x1 convolutional layer54 in between to adjust the
615
+ dimension. In addition, each block had two convolutional layers and an identity shortcut12. Further, the
616
+ convolutional layers were diluted to expand the receptive field without losing temporal resolution57. Notably,
617
+ dilation proved helpful in improving model performance when working with sequential data12.
618
+ The residual layers were followed by a classifier adjusted to work with the meta-learner. Meta-learning models
619
+ are used for object classification30,34–36. In such models, the input is spatial, 𝑥 ∈ ℝ𝐵𝑥𝐻𝑥𝑊𝑥3 (B: batch size, H: height,
620
+ W: width). and reduced to 𝑥̂ ∈ ℝ𝐵𝑥𝐷𝑜 by a flattening layer where 𝐷𝑜 is the output dimension. However, our input is
621
+ spatiotemporal, 𝑥 ∈ ℝ𝐵𝑥𝑇𝑥𝐷′. Hence, the residual blocks were followed by a 1D GAP layer in our design to obtain
622
+ 𝑥̂ ∈ ℝ𝐵𝑥𝐷𝑜. GAP also enabled us to use entire sequences. Following GAP, a fully-connected layer generated the
623
+ embedding space, 𝑓(𝑥̂) ∈ ℝ𝐷𝑜. Finally, a linear classifier, initialized via 𝑣𝑐, outputted predictions35. In this study,
624
+ 𝐷𝑜 varied based on 𝐷′. (See Supplementary Information / Hyperparameter selection for more information and
625
+ Extended Fig. 2 for the backbone architecture).
626
+
627
+ Training. Feature extractor. When training SimCLR, we used a train/validate split of 143,287/17,373 frames in
628
+ pattern cutting. These values were 21,191/3,315 in laparoscopic suturing and 447,314/66,836 for the JIGSAWS
629
+ dataset. In laparoscopic cholecystectomy, the split was 353,168/46,310. To generate the augmented version of the
630
+ input frames, we used the contrastive transformations suggested by the SimCLR developers37. This included
631
+ horizontal flip, random resized crop, jittering, grayscaling, and Gaussian blur. All the images were normalized prior
632
+ to training.
633
+ During the training, we set the minimum number of epochs to 200. Further, we implemented early stopping
634
+ with the patience of 10, i.e., training is terminated when there is no improvement in accuracy for ten consequent
635
+ epochs. Notably, self-supervised learning benefits from high batch size37. It increases the negative samples in the
636
+ batch, making it harder for the network to find the augmented pairs. This encourages the network to extract salient
637
+ features. As a result, we set the mini-batch size to 256 for pattern cutting and 512 for the rest of the tasks.
638
+ Meta-learner. Before the training, we downsampled each video stream to 1 FPS. This lowers computational
639
+ cost20 while retaining the salient information, as shown by our recently published DL model12 that achieved state-of-
640
+ the-art performance for the JIGSAWS tasks at 1 FPS. In addition, training and validation sets were normalized
641
+ separately using min-max normalization. During the training, we set the minimum epochs to 40. Also, we used early
642
+ stopping with a patience of 10. The mini-batch size was 8.
643
+ One restriction to Proto-MAML is the need for an equal number of samples per class34. The absence of this rule
644
+ causes an inflated representation of some classes over the others. This leads to biased, i.e., domain-specific,
645
+ estimations. However, in our study, each skill class had a different sample size (Fig. 1e). Therefore, we ran each
646
+ round 100 times with different seeds. We removed the outlier performances based on accuracies using the Tukey
647
+ Fences58 method. Also, for each repetition, we randomly sampled Ntrain trials from each class. Here, Ntrain is the
648
+ smallest sample size in a class among all the classes in the training set. For the validation set, this value was Nval.
649
+ Another limitation is that the model needs the same input size for each mini-batch. However, our data was
650
+ spatiotemporal with varying lengths, both inter- and intra-tasks. Hence, we incorporated mini-batch zero padding to
651
+ Proto-MAML. Here, we did not zero-pad the entire input based on the longest sequence, as some tasks were
652
+ considerably shorter than others. This difference would lead to an abundance of zeros in those datasets, increasing
653
+ computational cost.
654
+
655
+
656
+ 9
657
+
658
+
659
+ Evaluation. We used the round-robin scheme to evaluate the A-VBANet. Specifically, one task was used at each
660
+ round to validate and test the model, while the remaining trained the network. This was repeated until every task in
661
+ the cohorts other than the test cohort was the target. At each round, we also tested the trained A-VBANet on
662
+ laparoscopic cholecystectomy. Then, after all the rounds, we averaged the results to obtain the overall adaptation
663
+ performance.
664
+ During testing, few-test-shots (k) were used to adapt to the new domain. The rest of the samples were utilized to
665
+ compute the performance. For multi-class tasks, the accuracies were micro-averaged.
666
+ In this study, the models were developed on Pytorch, and training was conducted via the IBM Artificial
667
+ Intelligence Multiprocessing Optimized System (AiMOS) at Rensselaer Polytechnic Institute on 8 NVIDIA Tesla
668
+ V100 GPUs, each with 32 GB capacity.
669
+
670
+ Data availability
671
+ The laparoscopic pattern cutting and suturing datasets were collected by our group under IRB regulations, and the
672
+ deidentified source frames and class labels will be released upon publication. The JIGSAWS dataset is available at
673
+ https://cirl.lcsr.jhu.edu/research/hmm/datasets/jigsaws_release/.
674
+
675
+ Code availability
676
+ The code for developing the models will be made public upon publication.
677
+
678
+ References
679
+ 1.
680
+ Hung, A. J. et al. Deep learning to automate technical skills assessment in robotic surgery. BJU Int. 124, 487–
681
+ 495 (2019).
682
+ 2.
683
+ Yanik, E. et al. Deep neural networks for the assessment of surgical skills: A systematic review. J. Def. Model.
684
+ Simul. 19, 159–171 (2022).
685
+ 3.
686
+ Khalid, S., Goldenberg, M., Grantcharov, T., Taati, B. & Rudzicz, F. Evaluation of deep learning models for
687
+ identifying surgical actions and measuring performance. JAMA Netw. open 3, e201664–e201664 (2020).
688
+ 4.
689
+ Lajko, G., Elek, R. N. & Haidegger, T. Endoscopic image-based skill assessment in robot-assisted minimally
690
+ invasive surgery. Foot Ankle Spec. 14, 153–157 (2021).
691
+ 5.
692
+ Lajkó, G., Elek, R. N. & Haidegger, T. Surgical skill assessment automation based on sparse optical flow data.
693
+ in IEEE 25th International Conference on Intelligent Engineering Systems (INES) 201–208 (IEEE, 2021).
694
+ doi:10.1109/INES52918.2021.9512917
695
+ 6.
696
+ Ming, Y. et al. Surgical skills assessment from robot assisted surgery video data. in Proceedings of 2021 IEEE
697
+ International Conference on Power Electronics, Computer Applications (ICPECA) 392–396 (IEEE, 2021).
698
+ doi:10.1109/ICPECA51329.2021.9362525
699
+ 7.
700
+ Nguyen, X. A., Ljuhar, D., Pacilli, M., Nataraja, R. M. & Chauhan, S. Surgical skill levels: Classification and
701
+ analysis using deep neural network model and motion signals. Comput. Methods Programs Biomed. 177, 1–
702
+ 8 (2019).
703
+ 8.
704
+ Soleymani, A., Li, X. & Tavakoli, M. Deep neural skill assessment and transfer: Application to robotic surgery
705
+ training. in IEEE International Conference on Intelligent Robots and Systems (IROS) 8822–8829 (IEEE,
706
+ 2021). doi:10.1109/IROS51168.2021.9636627
707
+ 9.
708
+ Wang, Y. et al. Evaluating robotic-assisted surgery training videos with multi-task convolutional neural
709
+ networks. J. Robot. Surg. 16, 917–925 (2021).
710
+ 10.
711
+ Wang, Z. & Fey, A. M. SATR-DL: Improving surgical skill assessment and task recognition in robot-assisted
712
+ surgery with deep neural networks. in Proceedings of the Annual International Conference of the IEEE
713
+ Engineering
714
+ in
715
+ Medicine
716
+ and
717
+ Biology
718
+ Society
719
+ (EMBS)
720
+ 1793–1796
721
+ (IEEE,
722
+ 2018).
723
+ doi:10.1109/EMBC.2018.8512575
724
+ 11.
725
+ Wang, Z. & Majewicz Fey, A. Deep learning with convolutional neural network for objective skill evaluation
726
+ in robot-assisted surgery. Int. J. Comput. Assist. Radiol. Surg. 13, 1959–1970 (2018).
727
+ 12.
728
+ Yanik, E., Kruger, U., Intes, X., Rahul, R. & De, S. Video-based formative and summative assessment of
729
+ surgical tasks using deep learning results. (2022). doi:10.48550/arXiv.2203.09589
730
+ 13.
731
+ Anh, N. X., Nataraja, R. M. & Chauhan, S. Towards near real-time assessment of surgical skills: A comparison
732
+ of feature extraction techniques. Comput. Methods Programs Biomed. 187, 105234 (2020).
733
+ 14.
734
+ Castro, D., Pereira, D., Zanchettin, C., MacEdo, D. & Bezerra, B. L. D. Towards optimizing convolutional
735
+
736
+
737
+ 10
738
+
739
+ neural networks for robotic surgery skill evaluation. in Proceedings of the International Joint Conference on
740
+ Neural Networks (IJCNN) 1–8 (IEEE, 2019). doi:10.1109/IJCNN.2019.8852341
741
+ 15.
742
+ Doughty, H., Damen, D. & Mayol-Cuevas, W. Who’s better? Who’s best? Pairwise deep ranking for skill
743
+ determination. in IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 6057–6066 (IEEE,
744
+ 2018).
745
+ 16.
746
+ Fathollahi, M. et al. Video-based surgical skills assessment using long term tool tracking. in International
747
+ Conference on Medical Image Computing and Computer-Assisted Intervention (MICCAI) 541–550 (Springer,
748
+ Cham, 2022).
749
+ 17.
750
+ Fawaz, H. I., Forestier, G., Weber, J., Idoumghar, L. & Muller, P.-A. Evaluating surgical skills from kinematic
751
+ data using convolutional neural networks. in International Conference on Medical Image Computing and
752
+ Computer-Assisted Intervention (MICCAI) 214–221 (Springer, 2018). doi:10.1007/978-3-030-00937-3
753
+ 18.
754
+ Funke, I., Mees, S. T., Weitz, J. & Speidel, S. Video-based surgical skill assessment using 3D convolutional
755
+ neural networks. Int. J. Comput. Assist. Radiol. Surg. 14, 1217–1225 (2019).
756
+ 19.
757
+ Ismail Fawaz, H., Forestier, G., Weber, J., Idoumghar, L. & Muller, P. A. Accurate and interpretable
758
+ evaluation of surgical skills from kinematic data using fully convolutional neural networks. Int. J. Comput.
759
+ Assist. Radiol. Surg. 14, 1611–1617 (2019).
760
+ 20.
761
+ Jin, A. et al. Tool detection and operative skill assessment in surgical videos using region-based convolutional
762
+ neural networks. in Proceedings - 2018 IEEE Winter Conference on Applications of Computer Vision (WACV)
763
+ 691–699 (IEEE, 2018). doi:10.1109/WACV.2018.00081
764
+ 21.
765
+ Srivastav, V. et al. MVOR: A multi-view RGB-D operating room dataset for 2D and 3D human pose
766
+ estimation. (2018). doi:10.48550/arXiv.1808.08180
767
+ 22.
768
+ Twinanda, A. P. et al. EndoNet: A deep architecture for recognition tasks on laparoscopic videos. IEEE Trans.
769
+ Med. Imaging 36, 86–97 (2017).
770
+ 23.
771
+ Gao, Y. et al. JHU-ISI gesture and skill assessment working set (JIGSAWS): A surgical activity dataset for
772
+ human motion modeling. Model. Monit. Comput. Assist. Interv. – MICCAI Work. 3, (2014).
773
+ 24.
774
+ Pugh, C. M., Hashimoto, D. A. & Korndorffer, J. R. The what? how? and who? of video based assessment.
775
+ Am. J. Surg. 221, 13–18 (2021).
776
+ 25.
777
+ Zhang, D. et al. Automatic microsurgical skill assessment based on cross-domain transfer learning. IEEE
778
+ Robot. Autom. Lett. 5, 4148–4155 (2020).
779
+ 26.
780
+ Gevaert, O. Meta-learning reduces the amount of data needed to build AI models in oncology. Br. J. Cancer
781
+ 125, 309–310 (2021).
782
+ 27.
783
+ Ma, J. et al. Few-shot learning creates predictive models of drug response that translate from high-throughput
784
+ screens to individual patients. Nat. Cancer 2, 233–244 (2021).
785
+ 28.
786
+ Sun, Q., Liu, Y., Chua, T. & Schiele, B. Meta-transfer learning for few-shot learning. in Proceedings of the
787
+ IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 403–412 (IEEE, 2019).
788
+ 29.
789
+ Walsh, R., Abdelpakey, M. H., Shehata, M. S. & Mohamed, M. M. Automated human cell classification in
790
+ sparse datasets using few-shot learning. Sci. Rep. 12, 1–11 (2022).
791
+ 30.
792
+ Zhao, Z. et al. One to many: Adaptive instrument segmentation via meta learning and dynamic online
793
+ adaptation in robotic surgical video. in IEEE International Conference on Robotics and Automation (ICRA)
794
+ 13553–13559 (IEEE, 2021). doi:10.1109/ICRA48506.2021.9561690
795
+ 31.
796
+ Stanley, K. O., Clune, J., Lehman, J. & Miikkulainen, R. Designing neural networks through neuroevolution.
797
+ Nat. Mach. Intell. 1, 24–35 (2019).
798
+ 32.
799
+ Zador, A. M. A critique of pure learning and what artificial neural networks can learn from animal brains.
800
+ Nat. Commun. 10, 1–7 (2019).
801
+ 33.
802
+ Javed, K. & White, M. Meta-learning representations for continual learning. Adv. Neural Inf. Process. Syst.
803
+ 32, 1–11 (2019).
804
+ 34.
805
+ Snell, J., Swersky, K. & Zemel, R. Prototypical networks for few-shot learning. in Advances in Neural
806
+ Information Processing Systems 30 (NeurIPS) 4078–4088 (NeurIPS Proceedings, 2017).
807
+ 35.
808
+ Triantafillou, E. et al. Meta-dataset: A dataset of datasets for learning to learn from few examples. (2020).
809
+ doi:10.48550/arXiv.1903.03096
810
+ 36.
811
+ Finn, C., Abbeel, P. & Levine, S. Model-agnostic meta-learning for fast adaptation of deep networks. in 34th
812
+ International Conference on Machine Learning (ICML) 3, 1856–1868 (PMLR, 2017).
813
+ 37.
814
+ Chen, T., Kornblith, S., Norouzi, M. & Hinton, G. E. A simple framework for contrastive learning of visual
815
+ representations. in Proceedings of the 37th International Conference on Machine Learning (ICML) 1597–
816
+ 1607 (PMLR, 2020).
817
+ 38.
818
+ Wong, A., Wang, X. Y. & Hryniowski, A. How much can we really trust you? Towards simple, interpretable
819
+
820
+
821
+ 11
822
+
823
+ trust quantification metrics for deep neural networks. arXiv (2020). doi:10.48550/arXiv.2009.05835
824
+ 39.
825
+ Fried, G. M. FLS assessment of competency using simulated laparoscopic tasks. J. Gastrointest. Surg. 12,
826
+ 210–212 (2008).
827
+ 40.
828
+ Brinkman, W. M. et al. Da vinci skills simulator for assessing learning curve and criterion-based training of
829
+ robotic basic skills. Urology 81, 562–566 (2013).
830
+ 41.
831
+ Korndorffer, J. R. et al. Simulator training for laparoscopic suturing using performance goals translates to the
832
+ operating room. J. Am. Coll. Surg. 201, 23–29 (2005).
833
+ 42.
834
+ Sroka, G. et al. Fundamentals of laparoscopic surgery simulator training to proficiency improves laparoscopic
835
+ performance in the operating room-a randomized controlled trial. Am. J. Surg. 199, 115–120 (2010).
836
+ 43.
837
+ Hafford, M. L. et al. Ensuring competency: Are fundamentals of laparoscopic surgery training and
838
+ certification necessary for practicing surgeons and operating room personnel? Surg. Endosc. 27, 118–126
839
+ (2013).
840
+ 44.
841
+ Feldman, L. S. et al. SAGES Video-based assessment (VBA) program: a vision for life-long learning for
842
+ surgeons. Surg. Endosc. 34, 3285–3288 (2020).
843
+ 45.
844
+ Pradarelli, J. C. et al. Surgical coaching to achieve the ABMS vision for the future of continuing board
845
+ certification. Am. J. Surg. 221, 4–10 (2021).
846
+ 46.
847
+ Esposito, A. C., Coppersmith, N. A., White, E. M. & Yoo, P. S. Video coaching in surgical education: Utility,
848
+ opportunities, and barriers to implementation. J. Surg. Educ. 79, 717–724 (2021).
849
+ 47.
850
+ Statement on continuous certification. Available at: https://www.sages.org/publications/guidelines/statement-
851
+ on-continuous-certification/. (Accessed: 26th January 2022)
852
+ 48.
853
+ Abdar, M. et al. A review of uncertainty quantification in deep learning: Techniques, applications and
854
+ challenges. Inf. Fusion 76, 243–297 (2021).
855
+ 49.
856
+ McQueen, S., McKinnon, V., VanderBeek, L., McCarthy, C. & Sonnadara, R. Video-Based assessment in
857
+ surgical education: a scoping review. J. Surg. Educ. 76, 1645–1654 (2019).
858
+ 50.
859
+ ABS to explore video-based assessment in pilot program launching june 2021. Ava ilable at:
860
+ https://www.absurgery.org/default.jsp?news_vba04.21. (Accessed: 26th January 2022)
861
+ 51.
862
+ Fathabadi, F. R., Grantner, J. L., Shebrain, S. A. & Abdel-Qader, I. Surgical skill assessment system using
863
+ fuzzy logic in a multi-class detection of laparoscopic box-trainer instruments. in Conference Proceedings -
864
+ IEEE International Conference on Systems, Man and Cybernetics (SMC) 1248–1253 (IEEE, 2021).
865
+ doi:10.1109/SMC52423.2021.9658766
866
+ 52.
867
+ Fraser, S. A. et al. Evaluating laparoscopic skills, setting the pass/fail score for the MISTELS system. Surg.
868
+ Endosc. Other Interv. Tech. 17, 964–967 (2003).
869
+ 53.
870
+ He, K., Zhang, X., Ren, S. & Sun, J. Deep Residual Learning for Image Recognition. in Proceedings of the
871
+ IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR) 770–778 (IEEE,
872
+ 2006). doi:10.1002/chin.200650130
873
+ 54.
874
+ Lin, M., Chen, Q. & Yan, S. Network in network. (2014). doi:10.48550/arXiv.1312.4400
875
+ 55.
876
+ Tian, Y., Zhao, X. & Huang, W. Meta-learning approaches for learning-to-learn in deep learning: A survey.
877
+ Neurocomputing 494, 203–223 (2022).
878
+ 56.
879
+ Hu, J., Shen, L. & Sun, G. Squeeze-and-excitation networks. in Proceedings of the IEEE Computer Society
880
+ Conference on Computer Vision and Pattern Recognition (CVPR) 7132–7141 (IEEE, 2018).
881
+ 57.
882
+ Yu, F.
883
+ &
884
+ Koltun, V.
885
+ Multi-scale context aggregation by dilated convolutions. (2016).
886
+ doi:10.48550/arXiv.1511.07122
887
+ 58.
888
+ Hoaglin, D. C. Tukey and data analysis. Stat. Sci. 18, 311–318 (2003).
889
+ 59.
890
+ Hryniowski, A., Wong, A. & Wang, X. Y. Where Does Trust Break Down? A Quantitative Trust Analysis of
891
+ Deep Neural Networks via Trust Matrix and Conditional Trust Densities. J. Comput. Vis. Imaging Syst. 6, 1–
892
+ 5 (2021).
893
+ 60.
894
+ Fei-Fei, L., Deng, J. & Li, K. ImageNet: Constructing a large-scale image database. J. Vis. 9, 1037–1037
895
+ (2010).
896
+ 61.
897
+ Barz, B. & Denzler, J. Deep learning on small datasets without pre-training using cosine loss. in Proceedings
898
+ - 2020 IEEE Winter Conference on Applications of Computer Vision (WACV) 1360–1369 (IEEE, 2020).
899
+ doi:10.1109/WACV45572.2020.9093286
900
+
901
+
902
+
903
+
904
+
905
+
906
+ 12
907
+
908
+ Acknowledgments
909
+ The authors graciously acknowledge Dr. Yuanyuan Gao for assisting with the pattern cutting video data collection
910
+ and Dr. Lora Cavuoto for spearheading the laparoscopic suturing experiments and data collection.
911
+
912
+ Author contributions
913
+ E.Y. and S.D. conceived the idea. E.Y. designed the analysis, developed the network architecture, trained the pipeline,
914
+ and drafted the manuscript. S.D. and X.I. were responsible for supervising and revising the manuscript. S.S. and G.Y.
915
+ collected the laparoscopic cholecystectomy videos and G.Y. provided corresponding OSATS scores.
916
+
917
+ Competing Interests
918
+ The authors declare no competing interests.
919
+
920
+ Additional Information
921
+ Supplementary information is available.
922
+ Supplementary figures and tables are available.
923
+ Correspondence and requests for materials should be addressed to S.D.
924
+
925
+
926
+ Supplementary Information
927
+ NetTrustScore (NTS). NTS is a trustworthiness estimation based on the Softmax of predictions38.
928
+ NTS builds around the following steps:
929
+
930
+ Question-answer trust, 𝑄𝑧(𝑥, 𝑦). It quantifies the reliability of the predicted label (𝑦) for a
931
+ given sample (𝑥) via model 𝑀. As seen in Eqn 1, for true predictions( 𝑅𝑦=𝑧, 𝑧 being the actual
932
+ label / class), the Softmax values, 𝐶(𝑦|𝑥), are aggregated via a reward coefficient (𝛼). For the
933
+ false predictions (𝑅𝑦≠𝑧), the Softmax values were subtracted from 1 with a penalty coefficient
934
+ (𝛽). In this study, both 𝛼 and 𝛽 are 1.
935
+
936
+ 𝑄𝑧(𝑥,𝑦) = {
937
+ 𝐶(𝑦|𝑥) 𝛼
938
+ (1 − 𝐶(𝑦|𝑥)) 𝛽
939
+ 𝑖𝑓 𝑥 𝜖 𝑅𝑦=𝑧|𝑀
940
+ 𝑖𝑓 𝑥 𝜖 𝑅𝑦≠𝑧|𝑀
941
+ (1)
942
+
943
+
944
+ For conditional trustworthiness59, i.e., reliability of a condition such as true predictions or
945
+ false predictions, we use Eqn. 2 differently than in the original paper (Eqn. 1), as the false
946
+ predictions are handled separately from the true ones without the need to penalize them. In Eqn.
947
+ 2, 𝑅𝑐 is the condition space.
948
+
949
+ 𝑄𝑐(𝑥,𝑦) = 𝐶(𝑦|𝑥)𝛼 𝑖𝑓 𝑥 𝜖 𝑅𝑐|𝑀
950
+ (2)
951
+
952
+
953
+ Trust Density, 𝐹(𝑄𝑐). It is the trust behavior of the model for all the samples (𝑥𝑠) in a
954
+ given condition. It is obtained using non-parametric density estimation through Gaussian kernel38.
955
+ Here, the bandwidth of the kernel is
956
+ 𝛾
957
+ √𝑁 with 𝛾 = 0.5 and 𝑁 = 𝑙𝑒𝑛𝑔𝑡ℎ(𝑥).
958
+
959
+ Trust Spectrum, 𝑇𝑀(𝑐). It is the trust behavior of the network for all the conditions in a
960
+ dataset, as given in Eqn. 3. In the equation, 𝑇𝑀(𝑐), outputs a list of overall trustworthiness for each
961
+ condition.
962
+
963
+
964
+ 13
965
+
966
+ 𝑇𝑀(𝑐) = 1
967
+ 𝑁 ∫𝑄𝑐(𝑥)𝑑𝑥
968
+ (3)
969
+
970
+ NetTrustScore, NTS. Based on the original proposal, NTS is the overall trustworthiness
971
+ score of the network via all the predictions and classes and scales from 0 to 1. However, in this
972
+ study, when we report NTS, it is not global but for a condition instead as governed by Eqns. 2 and
973
+ 3.
974
+
975
+ Proto-MAML implementation. Proto-MAML35 is a meta-learner that combines Model-agnostic
976
+ meta-learning (MAML)36 and Prototypical Networks (ProtoNet)34.
977
+
978
+ MAML. In MAML, the model (𝑓) learns the best parameter space (𝜃) to provide fast and
979
+ flexible adaptability. In detail, first, 𝜃 is randomly initialized, and the input is passed forward (𝑓𝜃)
980
+ for task 𝑇𝑖. Then based on the computed loss (𝐿𝑇𝑖) in the embedded space, backpropagation is
981
+ applied to update weights (𝛻𝜃) as shown in Eqn. 4.
982
+
983
+ 𝜃𝑖
984
+ ′ = 𝜃 − 𝜶𝛻𝜃𝐿𝑇𝑖 (𝑓𝜃)
985
+ (4)
986
+
987
+ Ideally, 𝑓(𝜃𝑖
988
+ ′) represents the 𝑇𝑖 robustly after several updates, i.e., 𝑁𝑤: the number of
989
+ updates, same as conventional training. However, in meta-learning, the objective is not to find the
990
+ optimal parameters for a task but to find the parameters that ensure adaptation. Therefore, we apply
991
+ Eqn. 4 to each task in the task distribution, 𝑃(𝑇), and obtain respective parameter spaces (𝜃′),
992
+ which are then passed forward, 𝑓𝜃′, to compute the new loss as seen in Eqn. 5. This way, we obtain
993
+ the optimal parameter space that minimizes the joint cost function. This step is called the inner
994
+ loop. Thus, in Eqn. 4, 𝜶 is the inner learning rate.
995
+
996
+ 𝜃 = 𝑎𝑟𝑔𝑚𝑖𝑛𝜃 ∑
997
+ 𝐿𝑇𝑖(
998
+ 𝑇𝑖~𝑃(𝑇)
999
+ 𝑓𝜃𝑖
1000
+ ′)
1001
+ (5)
1002
+
1003
+
1004
+ Next, we update 𝜃 based on the optimal parameters from the inner loop, as illustrated in
1005
+ Eqn. 6. This step is called the outer loop, and 𝜷 is the outer learning rate.
1006
+
1007
+ 𝜃 = 𝜃 − 𝜷𝛻𝜃 ∑
1008
+ 𝐿𝑇𝑖 (
1009
+ 𝑇𝑖~𝑃(𝑇)
1010
+ 𝑓𝜃𝑖
1011
+ ′)
1012
+ (6)
1013
+
1014
+
1015
+ As seen in Eqn. 6, a gradient's gradient is computed, i.e., Hessian-vector product36, which
1016
+ is computationally expensive. Thus, the authors of the MAML article 36 proposed first-order
1017
+ MAML (fo-MAML), which only uses the first-order gradients. We also followed this paradigm,
1018
+ hence updated Eqn. 6 as follows:
1019
+ 𝜃 = 𝜃 − 𝜷 ∑
1020
+ 𝛻𝜃𝑖
1021
+ ′𝐿𝑇𝑖 (
1022
+ 𝑇𝑖~𝑃(𝑇)
1023
+ 𝑓𝜃𝑖
1024
+ ′)
1025
+ (7)
1026
+
1027
+
1028
+
1029
+
1030
+ 14
1031
+
1032
+ ProtoNet. The way the ProtoNet works is detailed as follows. First, the training set is split
1033
+ into
1034
+ support
1035
+ set,
1036
+ 𝑆 = [(𝑥1,𝑦1),… , (𝑥𝑠,𝑦𝑠),… ,(𝑥𝑁,𝑦𝑁)]
1037
+ and
1038
+ query
1039
+ set,
1040
+ 𝑄 =
1041
+ [(𝑥1,𝑦1), …, (𝑥𝑞,𝑦𝑞),…, (𝑥𝑁,𝑦𝑁)] with 𝑁 samples. Here, 𝑥𝑠,𝑥𝑞 ∈ ℝ𝐷 are inputs whereas 𝑦𝑠 and
1042
+ 𝑦𝑞 are the corresponding labels in the support and query sets. Then, the model, 𝑓𝜃, embeds the
1043
+ inputs into 𝑀-dimensional feature set, 𝑓𝜃(. ): ℝ𝐷 → ℝ𝑀. Next, using the embedded support set
1044
+ samples, the prototypical center (𝑣𝑐) is computed as given in Eqn. 8. In the equation, 𝑆𝑐 is all the
1045
+ (𝑥𝑠,𝑦𝑠) pairs in the support set with 𝑦 = 𝑐. Here 𝑐 ∈ 𝑪 | 𝑪: all the classes represented in 𝑆.
1046
+
1047
+ 𝑣𝑐 = 1
1048
+ |𝑆𝑐|
1049
+
1050
+ 𝑓𝜃(𝑥𝑠,𝑖)
1051
+ (𝑥𝑠,𝑖,𝑦𝑠,𝑖)∈𝑆𝑐
1052
+
1053
+ (8)
1054
+
1055
+ The query set is then used to compute the loss function (𝐿) based on the distance between
1056
+ the query samples, 𝑥𝑞, and 𝑣𝑐 via the distance function, 𝑑𝜑: the Euclidean Distance.
1057
+
1058
+ ProtoMAML. It follows the MAML, specifically fo-MAML, methodology to adapt35, while
1059
+ for the final layer, i.e., the layer that outputs for a specific task, the weights (𝑊𝑐) and bias (𝑏𝑐) are
1060
+ initialized based on the 𝑣𝑐 as computed in Eqn. 8, instead of random initialization as used by the
1061
+ vanilla fo-MAML. Particularly, the initialization occurs as follows: 𝑊𝑐 = 2𝑣𝑐 and 𝑏𝑐 = −||𝑣𝑐||2.
1062
+ For more information please refer to the original paper35.
1063
+
1064
+ Hyperparameter selection. The SimCLR network uses the pretrained ResNet3453 - on
1065
+ ImageNet60 – as its backbone. Moreover, the pipeline aims to minimize the loss function, InfoNCE
1066
+ (NT-Xent)37, via the Adam optimizer with a learning rate of 0.0005. Further, the non-linearity is
1067
+ added via ReLU.
1068
+
1069
+ The ProtoMAML minimizes Cosine Similarity Loss61 based on Euclidean distance34. The
1070
+ inner and outer loop optimizers are Stochastic Gradient Descent (SGD) and Adam, respectively,
1071
+ while the learning rates are 0.1 and 0.01. Moreover, we used a learning rate scheduler in which the
1072
+ rate was factored by 0.6 for every 10 epochs without improving the validation accuracy. Further,
1073
+ 𝑁𝑤, i.e., number of inner loop weight updates, is 1 in training and 20 in testing. Finally, for self-
1074
+ supervised feature (SSF) sets from 2 to 32, the 𝑣𝑐 is a 512-dimensional feature vector; for the SSF
1075
+ set of 64, this value is 1,024.
1076
+ In addition, the meta-learner utilizes an in-house Residual Neural Network (RNN) as the
1077
+ backbone. The filter size is 5 for the convolutional layers of the first residual block. This value is
1078
+ 3 for the second. On the other hand, the dilation rates are 1 and 2, and the stride is 1. Finally, the
1079
+ non-linearity is added using ReLU.
1080
+
1081
+
1082
+
1083
+
1084
+
1085
+
1086
+
1087
+
1088
+
1089
+
1090
+
1091
+
1092
+ 15
1093
+
1094
+ Supplementary Tables
1095
+ Extended Table 1 | Accuracies for task adaptation. k: number of test shots. Bold values are
1096
+ reported in the manuscript. For needle passing, k = 16 was not investigated as it leaves no
1097
+ Intermediate class for the query set.
1098
+ Validation
1099
+ and
1100
+ Testing
1101
+ Dataset
1102
+ SSF
1103
+ set
1104
+ No. of test-shots
1105
+ k = 1
1106
+ k = 2
1107
+ k = 4
1108
+ k = 8
1109
+ k = 16
1110
+ Pattern
1111
+ Cutting
1112
+ 2
1113
+ 0.858±.045
1114
+ 0.871±.044
1115
+ 0.881±.039
1116
+ 0.888±.039
1117
+ 0.892±.037
1118
+ 4
1119
+ 0.889±.037
1120
+ 0.903±.033
1121
+ 0.910±.032
1122
+ 0.916±.030
1123
+ 0.918±.029
1124
+ 8
1125
+ 0.900±.023
1126
+ 0.910±.022
1127
+ 0.920±.018
1128
+ 0.925±.019
1129
+ 0.929±.017
1130
+ 16
1131
+ 0.899±.035
1132
+ 0.910±.034
1133
+ 0.914±.033
1134
+ 0.915±.033
1135
+ 0.914±.035
1136
+ 32
1137
+ 0.868±.042
1138
+ 0.888±.043
1139
+ 0.896±.039
1140
+ 0.898±.038
1141
+ 0.900±.038
1142
+ 64
1143
+ 0.821±.066
1144
+ 0.839±.062
1145
+ 0.847±.055
1146
+ 0.853±.048
1147
+ 0.853±.049
1148
+ Suturing
1149
+ (Lap.)
1150
+ 2
1151
+ 0.987±.012
1152
+ 0.989±.011
1153
+ 0.989±.011
1154
+ 0.990±.011
1155
+ 0.997±.009
1156
+ 4
1157
+ 0.991±.013
1158
+ 0.988±.019
1159
+ 0.993±.009
1160
+ 0.994±.008
1161
+ 0.999±.005
1162
+ 8
1163
+ 0.995±.008
1164
+ 0.995±.008
1165
+ 0.995±.006
1166
+ 0.997±.006
1167
+ 0.998±.008
1168
+ 16
1169
+ 0.990±.013
1170
+ 0.992±.011
1171
+ 0.993±.010
1172
+ 0.992±.011
1173
+ 0.999±.006
1174
+ 32
1175
+ 0.992±.011
1176
+ 0.992±.012
1177
+ 0.992±.011
1178
+ 0.992±.011
1179
+ 0.999±.005
1180
+ 64
1181
+ 0.966±.036
1182
+ 0.969±.033
1183
+ 0.971±.032
1184
+ 0.974±.029
1185
+ 0.964±.042
1186
+ Suturing
1187
+ (Robotic)
1188
+ 2
1189
+ 0.618±.014
1190
+ 0.649±.018
1191
+ 0.649±.029
1192
+ 0.631±.036
1193
+ 0.708±.058
1194
+ 4
1195
+ 0.625±.014
1196
+ 0.657±.021
1197
+ 0.669±.029
1198
+ 0.686±.041
1199
+ 0.692±.063
1200
+ 8
1201
+ 0.650±.015
1202
+ 0.659±.018
1203
+ 0.661±.018
1204
+ 0.675±.024
1205
+ 0.662±.035
1206
+ 16
1207
+ 0.650±.023
1208
+ 0.664±.027
1209
+ 0.697±.039
1210
+ 0.716±.035
1211
+ 0.761±.044
1212
+ 32
1213
+ 0.644±.022
1214
+ 0.653±.021
1215
+ 0.663±.026
1216
+ 0.686±.038
1217
+ 0.691±.050
1218
+ 64
1219
+ 0.651±.040
1220
+ 0.679±.050
1221
+ 0.692±.052
1222
+ 0.688±.068
1223
+ 0.740±.091
1224
+ Needle
1225
+ Passing
1226
+ 2
1227
+ 0.607±.021
1228
+ 0.626±.025
1229
+ 0.666±.033
1230
+ 0.694±.042
1231
+ N/A
1232
+ 4
1233
+ 0.616±.018
1234
+ 0.645±.022
1235
+ 0.690±.033
1236
+ 0.727±.038
1237
+ 8
1238
+ 0.621±.026
1239
+ 0.637±.029
1240
+ 0.645±.042
1241
+ 0.697±.046
1242
+ 16
1243
+ 0.626±.027
1244
+ 0.640±.034
1245
+ 0.666±.040
1246
+ 0.692±.042
1247
+ 32
1248
+ 0.614±.027
1249
+ 0.632±.046
1250
+ 0.639±.045
1251
+ 0.683±.054
1252
+ 64
1253
+ 0.581±.019
1254
+ 0.587±.026
1255
+ 0.611±.038
1256
+ 0.618±.049
1257
+ Knot
1258
+ Tying
1259
+ 2
1260
+ 0.676±.023
1261
+ 0.691±.023
1262
+ 0.698±.032
1263
+ 0.707±.044
1264
+ 0.707±.042
1265
+ 4
1266
+ 0.688±.022
1267
+ 0.694±.020
1268
+ 0.698±.024
1269
+ 0.742±.036
1270
+ 0.766±.062
1271
+ 8
1272
+ 0.670±.015
1273
+ 0.686±.021
1274
+ 0.713±.025
1275
+ 0.730±.034
1276
+ 0.786±.057
1277
+ 16
1278
+ 0.688±.028
1279
+ 0.697±.031
1280
+ 0.714±.042
1281
+ 0.749±.060
1282
+ 0.831±.064
1283
+ 32
1284
+ 0.673±.026
1285
+ 0.694±.029
1286
+ 0.708±.042
1287
+ 0.763±.057
1288
+ 0.835±.077
1289
+ 64
1290
+ 0.653±.033
1291
+ 0.673±.043
1292
+ 0.692±.050
1293
+ 0.715±.060
1294
+ 0.733±.078
1295
+
1296
+
1297
+
1298
+
1299
+ 16
1300
+
1301
+ Extended Table 2 | NTS for true predictions in task adaptation. k: number of test shots. Bold
1302
+ values are reported in the manuscript, selected based on best accuracies in Extended Table 1. For
1303
+ needle passing, k = 16 was not investigated as it leaves no Intermediate class for the query set.
1304
+ Val. and
1305
+ Testing
1306
+ Dataset
1307
+ SSF
1308
+ set
1309
+ Classes
1310
+ No. of test-shots
1311
+ k = 1
1312
+ k = 2
1313
+ k = 4
1314
+ k = 8
1315
+ k = 16
1316
+ Pattern
1317
+ Cutting
1318
+ 2
1319
+ Fail
1320
+ 0.984±.011 0.984±.012 0.985±.012 0.986±.012 0.986±.013
1321
+ Pass
1322
+ 0.988±.009 0.989±.009 0.991±.008 0.991±.008 0.991±.008
1323
+ 4
1324
+ Fail
1325
+ 0.986±.007 0.988±.007 0.988±.007 0.989±.007 0.989±.007
1326
+ Pass
1327
+ 0.989±.005 0.991±.005 0.992±.005 0.992±.004 0.992±.004
1328
+ 8
1329
+ Fail
1330
+ 0.989±.007 0.990±.007 0.990±.007 0.991±.006 0.991±.006
1331
+ Pass
1332
+ 0.991±.005 0.993±.004 0.994±.003 0.994±.003 0.994±.003
1333
+ 16
1334
+ Fail
1335
+ 0.998±.003 0.999±.002 0.999±.003 0.999±.002 0.999±.003
1336
+ Pass
1337
+ 0.999±.002 0.999±.001 0.999±.001 0.999±.001 0.999±.002
1338
+ 32
1339
+ Fail
1340
+ 0.997±.004 0.998±.004 0.998±.004 0.998±.005 0.998±.005
1341
+ Pass
1342
+ 0.998±.004 0.998±.003 0.999±.003 0.999±.003 0.999±.003
1343
+ 64
1344
+ Fail
1345
+ 1.0
1346
+ 1.0
1347
+ 1.0
1348
+ 1.0
1349
+ 1.0
1350
+
1351
+ Pass
1352
+ 1.0
1353
+ 1.0
1354
+ 1.0
1355
+ 1.0
1356
+ 1.0
1357
+ Suturing
1358
+ (Lap.)
1359
+ 2
1360
+ Novice
1361
+ 0.968±.027 0.971±.028 0.971±.029 0.973±.027 0.979±.029
1362
+ Expert
1363
+ 0.967±.043 0.968±.046 0.966±.049 0.966±.049 0.972±.044
1364
+ 4
1365
+ Novice
1366
+ 0.981±.017 0.983±.015 0.984±.014 0.986±.014 0.997±.007
1367
+ Expert
1368
+ 0.989±.020 0.988±.024 0.988±.024 0.990±.022 0.990±.025
1369
+ 8
1370
+ Novice
1371
+ 0.991±.009 0.992±.010 0.993±.009 0.993±.008 0.987±.018
1372
+ Expert
1373
+ 0.998±.005 0.997±.007 0.996±.010 0.996±.009 0.998±.008
1374
+ 16
1375
+ Novice
1376
+ 0.997±.005 0.997±.005 0.997±.006 0.997±.006
1377
+ 1.0
1378
+ Expert
1379
+ 0.999±.004 0.999±.003 0.999±.002 0.999±.002 0.999±.003
1380
+ 32
1381
+ Novice
1382
+ 0.998±.003 0.999±.003 0.998±.003 0.998±.004 0.999±.006
1383
+ Expert
1384
+ 1.0
1385
+ 1.0
1386
+ 1.0
1387
+ 1.0
1388
+ 1.0
1389
+ 64
1390
+ Novice
1391
+ 1.0
1392
+ 1.0
1393
+ 1.0
1394
+ 1.0
1395
+ 1.0
1396
+
1397
+ Expert
1398
+ 1.0
1399
+ 1.0
1400
+ 1.0
1401
+ 1.0
1402
+ 1.0
1403
+ Suturing
1404
+ (Robotic)
1405
+ 2
1406
+ Novice
1407
+ 0.884±.041 0.861±.046 0.888±.054 0.897±.058 0.910±.064
1408
+ Interm.
1409
+ 0.818±.057 0.774±.066 0.724±.075 0.759±.096 0.562±.056
1410
+ Expert
1411
+ 0.782±.063 0.693±.073 0.661±.071 0.721±.086 0.585±.070
1412
+ 4
1413
+ Novice
1414
+ 0.878±.042 0.868±.049 0.886±.054 0.891±.059 0.894±.065
1415
+ Interm.
1416
+ 0.820±.058 0.753±.072 0.691±.084 0.637±.098 0.623±.110
1417
+ Expert
1418
+ 0.794±.059 0.759±.067 0.692±.073 0.666±.085 0.592±.098
1419
+ 8
1420
+ Novice
1421
+ 0.897±.041 0.918±.043 0.929±.042 0.927±.043 0.938±.051
1422
+ Interm.
1423
+ 0.757±.062 0.725±.076 0.681±.078 0.582±.060 0.598±.100
1424
+ Expert
1425
+ 0.806±.058 0.768±.065 0.681±.073 0.607±.059 0.577±.058
1426
+ 16
1427
+ Novice
1428
+ 0.984±.022 0.986±.023 0.989±.028 0.989±.028 0.990±.030
1429
+ Interm.
1430
+ 0.959±.045 0.954±.057 0.901±.110 0.881±.140 0.816±.180
1431
+ Expert
1432
+ 0.959±.039 0.947±.061 0.907±.088 0.895±.110 0.855±.140
1433
+
1434
+
1435
+ 17
1436
+
1437
+ 32
1438
+ Novice
1439
+ 0.977±.030 0.979±.029 0.984±.025 0.984±.027 0.985±.031
1440
+ Interm.
1441
+ 0.950±.045 0.933±.067 0.919±.087 0.850±.130 0.862±.170
1442
+ Expert
1443
+ 0.947±.048 0.925±.067 0.908±.092 0.817±.140 0.761±.210
1444
+ 64
1445
+ Novice
1446
+ 0.998±.003 0.999±.003 0.999±.003 0.999±.002 0.999±.006
1447
+ Interm.
1448
+ 0.994±.008 0.992±.017 0.989±.023 0.992±.020 0.963±.089
1449
+ Expert
1450
+ 0.994±.008 0.992±.013 0.992±.017 0.989±.024 0.965±.083
1451
+ Needle
1452
+ Passing
1453
+ 2
1454
+ Novice
1455
+ 0.907±.041 0.881±.061 0.869±.080 0.871±.110
1456
+ N/A
1457
+ Interm.
1458
+ 0.927±.038 0.889±.054 0.894±.068 0.871±.110
1459
+ Expert
1460
+ 0.878±.050 0.804±.071 0.760±.095 0.698±.110
1461
+ 4
1462
+ Novice
1463
+ 0.925±.037 0.910±.048 0.894±.078 0.903±.095
1464
+ Interm.
1465
+ 0.935±.040 0.912±.054 0.893±.064 0.903±.095
1466
+ Expert
1467
+ 0.885±.050 0.857±.066 0.777±.095 0.764±.120
1468
+ 8
1469
+ Novice
1470
+ 0.939±.035 0.920±.044 0.905±.057 0.894±.083
1471
+ Interm.
1472
+ 0.953±.028 0.909±.048 0.906±.065 0.946±.068
1473
+ Expert
1474
+ 0.896±.049 0.847±.067 0.811±.089 0.796±.120
1475
+ 16
1476
+ Novice
1477
+ 0.981±.020 0.981±.023 0.979±.026 0.984±.027
1478
+ Interm.
1479
+ 0.978±.022 0.974±.031 0.969±.035 0.984±.031
1480
+ Expert
1481
+ 0.965±.026 0.955±.042 0.947±.056 0.946±.070
1482
+ 32
1483
+ Novice
1484
+ 0.981±.018 0.970±.034 0.972±.034 0.977±.042
1485
+ Interm.
1486
+ 0.985±.017 0.984±.021 0.983±.028 0.969±.051
1487
+ Expert
1488
+ 0.970±.028 0.954±.044 0.946±.056 0.936±.075
1489
+ 64
1490
+ Novice
1491
+ 0.996±.067 0.998±.005 0.997±.009 0.997±.010
1492
+ Interm.
1493
+ 0.997±.006 0.996±.006 0.993±.021 0.993±.025
1494
+ Expert
1495
+ 0.994±.009 0.995±.008 0.993±.015 0.993±.015
1496
+ Knot
1497
+ Tying
1498
+ 2
1499
+ Novice
1500
+ 0.875±.053 0.871±.055 0.859±.068 0.894±.070 0.883±.080
1501
+ Interm.
1502
+ 0.817±.064 0.789±.075 0.728±.091 0.720±.100 0.691±.120
1503
+ Expert
1504
+ 0.776±.072 0.743±.085 0.699±.096 0.639±.097 0.629±.100
1505
+ 4
1506
+ Novice
1507
+ 0.921±.039 0.924±.040 0.907±.041 0.935±.047 0.934±.059
1508
+ Interm.
1509
+ 0.868±.052 0.844±.061 0.814±.079 0.687±.120 0.666±.140
1510
+ Expert
1511
+ 0.817±.065 0.806±.063 0.796±.071 0.682±.120 0.692±.120
1512
+ 8
1513
+ Novice
1514
+ 0.926±.038 0.923±.045 0.923±.043 0.928±.058 0.949±.044
1515
+ Interm.
1516
+ 0.875±.064 0.831±.080 0.791±.095 0.740±.130 0.736±.110
1517
+ Expert
1518
+ 0.808±.073 0.787±.079 0.774±.082 0.749±.086 0.658±.130
1519
+ 16
1520
+ Novice
1521
+ 0.970±.029 0.965±.034 0.966±.036 0.970±.041 0.977±.039
1522
+ Interm.
1523
+ 0.960±.049 0.951±.057 0.943±.075 0.863±.140 0.984±.130
1524
+ Expert
1525
+ 0.919±.068 0.928±.067 0.923±.075 0.892±.120 0.866±.160
1526
+ 32
1527
+ Novice
1528
+ 0.980±.020 0.982±.022 0.975±.030 0.982±.030 0.985±.034
1529
+ Interm.
1530
+ 0.962±.034 0.955±.044 0.956±.049 0.891±.120 0.933±.110
1531
+ Expert
1532
+ 0.930±.056 0.932±.058 0.937±.060 0.901±.120 0.894±.140
1533
+ 64
1534
+ Novice
1535
+ 0.995±.008 0.997±.006 0.997±.007 0.996±.013 0.997±.010
1536
+ Interm.
1537
+ 0.992±.011 0.991±.016 0.991±.020 0.976±.062 0.981±.064
1538
+
1539
+
1540
+ 18
1541
+
1542
+ Expert
1543
+ 0.989±.014 0.990±.016 0.989±.020 0.974±.059 0.972±.080
1544
+
1545
+ Extended Table 3 | Accuracies and AUC in cholecystectomy. k: number of test shots. Bold values
1546
+ are reported in the manuscript.
1547
+ Validation Dataset
1548
+ SSF
1549
+ set
1550
+ No. of test-shots
1551
+ k = 1
1552
+
1553
+
1554
+ Accuracy
1555
+ AUC
1556
+ Pattern Cutting
1557
+ 2
1558
+ 0.692
1559
+ 0.798
1560
+ 4
1561
+ 0.718
1562
+ 0.803
1563
+ 8
1564
+ 0.795
1565
+ 0.848
1566
+ 16
1567
+ 0.821
1568
+ 0.803
1569
+ 32
1570
+ 0.795
1571
+ 0.788
1572
+ 64
1573
+ 0.872
1574
+ 0.818
1575
+ Suturing (Lap.)
1576
+ 2
1577
+ 0.667
1578
+ 0.747
1579
+ 4
1580
+ 0.718
1581
+ 0.841
1582
+ 8
1583
+ 0.821
1584
+ 0.864
1585
+ 16
1586
+ 0.872
1587
+ 0.848
1588
+ 32
1589
+ 0.846
1590
+ 0.848
1591
+ 64
1592
+ 0.821
1593
+ 0.818
1594
+ Suturing (Robotic)
1595
+ 2
1596
+ 0.718
1597
+ 0.788
1598
+ 4
1599
+ 0.718
1600
+ 0.788
1601
+ 8
1602
+ 0.769
1603
+ 0.848
1604
+ 16
1605
+ 0.615
1606
+ 0.652
1607
+ 32
1608
+ 0.795
1609
+ 0.833
1610
+ 64
1611
+ 0.821
1612
+ 0.833
1613
+ Needle Passing
1614
+ 2
1615
+ 0.872
1616
+ 0.838
1617
+ 4
1618
+ 0.846
1619
+ 0.859
1620
+ 8
1621
+ 0.846
1622
+ 0.876
1623
+ 16
1624
+ 0.692
1625
+ 0.677
1626
+ 32
1627
+ 0.692
1628
+ 0.758
1629
+ 64
1630
+ 0.872
1631
+ 0.818
1632
+ Knot Tying
1633
+ 2
1634
+ 0.667
1635
+ 0.755
1636
+ 4
1637
+ 0.564
1638
+ 0.621
1639
+ 8
1640
+ 0.795
1641
+ 0.838
1642
+ 16
1643
+ 0.872
1644
+ 0.864
1645
+ 32
1646
+ 0.615
1647
+ 0.715
1648
+ 64
1649
+ 0.897
1650
+ 0.864
1651
+
1652
+
1653
+
1654
+
1655
+
1656
+ 19
1657
+
1658
+ Extended Table 4 | NTS for true predictions in cholecystectomy. k: number of test shots. Bold
1659
+ values are used to obtain average NTSs, as reported in the manuscript. They are selected based on
1660
+ the best accuracies in Extended Table 3.
1661
+ Validation
1662
+ Dataset
1663
+ SSF
1664
+ set
1665
+ Classes
1666
+ No. of test-shots
1667
+ k = 1
1668
+ Pattern
1669
+ Cutting
1670
+ 2
1671
+ Low Performance
1672
+ 1.0
1673
+ High Performance
1674
+ 1.0
1675
+ 4
1676
+ Low Performance
1677
+ 1.0
1678
+ High Performance
1679
+ 1.0
1680
+ 8
1681
+ Low Performance
1682
+ 1.0
1683
+ High Performance
1684
+ 1.0
1685
+ 16
1686
+ Low Performance
1687
+ 1.0
1688
+ High Performance
1689
+ 1.0
1690
+ 32
1691
+ Low Performance
1692
+ 1.0
1693
+ High Performance
1694
+ 1.0
1695
+ 64
1696
+ Low Performance
1697
+ 1.0
1698
+ High Performance
1699
+ 1.0
1700
+ Suturing
1701
+ (Lap.)
1702
+ 2
1703
+ Low Performance
1704
+ 1.0
1705
+ High Performance
1706
+ 1.0
1707
+ 4
1708
+ Low Performance
1709
+ 1.0
1710
+ High Performance
1711
+ 1.0
1712
+ 8
1713
+ Low Performance
1714
+ 1.0
1715
+ High Performance
1716
+ 1.0
1717
+ 16
1718
+ Low Performance
1719
+ 1.0
1720
+ High Performance
1721
+ 1.0
1722
+ 32
1723
+ Low Performance
1724
+ 1.0
1725
+ High Performance
1726
+ 1.0
1727
+ 64
1728
+ Low Performance
1729
+ 1.0
1730
+ High Performance
1731
+ 1.0
1732
+ Suturing
1733
+ (Robotic)
1734
+ 2
1735
+ Low Performance
1736
+ 1.0
1737
+ High Performance
1738
+ 1.0
1739
+ 4
1740
+ Low Performance
1741
+ 1.0
1742
+ High Performance
1743
+ 1.0
1744
+ 8
1745
+ Low Performance
1746
+ 1.0
1747
+ High Performance
1748
+ 1.0
1749
+ 16
1750
+ Low Performance
1751
+ 1.0
1752
+ High Performance
1753
+ 1.0
1754
+ 32
1755
+ Low Performance
1756
+ 1.0
1757
+ High Performance
1758
+ 1.0
1759
+ 64
1760
+ Low Performance
1761
+ 1.0
1762
+ High Performance
1763
+ 1.0
1764
+
1765
+
1766
+ 20
1767
+
1768
+ Needle
1769
+ Passing
1770
+ 2
1771
+ Low Performance
1772
+ 1.0
1773
+ High Performance
1774
+ 1.0
1775
+ 4
1776
+ Low Performance
1777
+ 1.0
1778
+ High Performance
1779
+ 1.0
1780
+ 8
1781
+ Low Performance
1782
+ 1.0
1783
+ High Performance
1784
+ 1.0
1785
+ 16
1786
+ Low Performance
1787
+ 1.0
1788
+ High Performance
1789
+ 1.0
1790
+ 32
1791
+ Low Performance
1792
+ 1.0
1793
+ High Performance
1794
+ 1.0
1795
+ 64
1796
+ Low Performance
1797
+ 1.0
1798
+ High Performance
1799
+ N/A
1800
+ Knot
1801
+ Tying
1802
+ 2
1803
+ Low Performance
1804
+ 1.0
1805
+ High Performance
1806
+ 1.0
1807
+ 4
1808
+ Low Performance
1809
+ 1.0
1810
+ High Performance
1811
+ 1.0
1812
+ 8
1813
+ Low Performance
1814
+ 1.0
1815
+ High Performance
1816
+ 1.0
1817
+ 16
1818
+ Low Performance
1819
+ 1.0
1820
+ High Performance
1821
+ 1.0
1822
+ 32
1823
+ Low Performance
1824
+ 1.0
1825
+ High Performance
1826
+ 1.0
1827
+ 64
1828
+ Low Performance
1829
+ 1.0
1830
+ High Performance
1831
+ 1.0
1832
+ Mean
1833
+
1834
+ Low Performance
1835
+ 1.0
1836
+ High Performance
1837
+ 1.0
1838
+
1839
+ Extended Table 5 | OSATS scores breakdown.
1840
+ OSATS score
1841
+ Number of trials
1842
+ Assigned label
1843
+ 13
1844
+ 1
1845
+ Low performance
1846
+ 15
1847
+ 1
1848
+ 16
1849
+ 2
1850
+ 18
1851
+ 1
1852
+ 19
1853
+ 1
1854
+ 20
1855
+ 1
1856
+ 21
1857
+ 2
1858
+ 22
1859
+ 1
1860
+ 23
1861
+ 2
1862
+ 24
1863
+ 2
1864
+ High performance
1865
+ 25
1866
+ 1
1867
+
1868
+
1869
+
1870
+ 21
1871
+
1872
+ Supplementary Figures
1873
+ Extended Fig. 1 | SimCLR architecture and spatiotemporal feature set generation. 𝐷 represents
1874
+ the output dimension of the SimCLR once trained while 𝐷′ is the dimension after the 1D GAP
1875
+ layer. 𝑇 is the temporal length of a given sample. Pattern cutting frames were used to represent the
1876
+ pipeline.
1877
+ Extended Fig. 2 | The backbone of the pipeline. 𝐷 and 𝐾 represent the dimension of the
1878
+ convolutional layers. In this study, 𝐷 is equal to the output dimension of the SimCLR–. 𝐾 is 16
1879
+ for 𝐷 = 2,4,8 and 𝐾 is 64 for 𝐷 = 16,32, and 𝐾 is 256 for 𝐷 = 64.
1880
+
1881
+ ResNet Block1
1882
+ ResNet Block2
1883
+ D
1884
+ SimCLR
1885
+
1886
+ kernel size = 5,
1887
+ kernel size = 1,
1888
+ kernel size = 3,
1889
+ dilation = 1
1890
+ dilation=1
1891
+ dilation=2
1892
+ : 1D Conv. layer
1893
+ : 1D GAPlayer
1894
+ :Attention layer
1895
+ : Fully -connected layerTransform.2
1896
+ IdenticalResNet34s
1897
+ Removedaftertraining
1898
+ Training
1899
+ Maximize
1900
+ aggrement
1901
+ Transform.1
1902
+ D-dimensional
1903
+ representations
1904
+ 1DGAP
1905
+ ResNet34
1906
+ Post-training
1907
+ TxD'-dimensional
1908
+ spatiotemporal
1909
+ featureset
ItAyT4oBgHgl3EQf5vr6/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
JdE0T4oBgHgl3EQfSACX/content/2301.02216v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b6c30564fa1177de641e18fb2b373d451eb1026202fa219005441d66f0f90db8
3
+ size 313231
JdE0T4oBgHgl3EQfSACX/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6d49ffb5e6bf7bb742896ed8cd9ab4653c12eaf53f8e574bb898fdcbc7605d99
3
+ size 185050
JtAyT4oBgHgl3EQfsPmi/content/tmp_files/2301.00574v1.pdf.txt ADDED
@@ -0,0 +1,1006 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00574v1 [quant-ph] 2 Jan 2023
2
+ Environmental-induced work extraction
3
+ Rasim Volga Ovali†,1, Shakir Ullah†,2, Mehmet Günay†,3, and Mehmet Emre Tasgin2,∗
4
+ † Contributed equally
5
+ ∗ correspondence: [email protected] and [email protected]
6
+ 1Department of Physics, Recep Tayyip Erdogan University, 53100, Rize, Turkey
7
+ 2Institute of Nuclear Sciences, Hacettepe University, 06800 Ankara, Turkey and
8
+ 3Department of Nanoscience and Nanotechnology, Faculty of Arts and Science,
9
+ Mehmet Akif Ersoy University, 15030 Burdur, Turkey
10
+ A measurement can extract work from an entangled, e.g., two-mode system. Here, we inquire
11
+ the extracted work when no intellectual creature, like an ancilla/daemon, is present. When the
12
+ monitoring is carried out by the environmental modes, that is when no measurement-apparatus is
13
+ present, the measurement-basis becomes the coherent states. This implies a Gaussian measurement
14
+ with a fixed strength λ = 1. For two-mode Gaussian states, extracted work is already independent
15
+ from the measurement outcome. After the strength is also fixed, this makes nature assign a particular
16
+ amount of work to a given entanglement degree. Extracted work becomes the entanglement-degree
17
+ times the entire thermal energy at low temperatures —e.g., room temperature for optical modes.
18
+ Environment, nature itself, converts entanglement to an ordered, macroscopic, directional (kinetic)
19
+ energy from a disordered, microscopic, randomized thermal energy. And the converted amount is
20
+ solely determined by the entanglement.
21
+ Quantum entanglement enables technologies which are
22
+ not possible without them [1].
23
+ Measurements below
24
+ the standard quantum limit [2, 3], quantum enhanced
25
+ imaging [4–6], quantum radars [7], quantum teleporta-
26
+ tion (QT) [8], and quantum computation [9] are all en-
27
+ abled by entangled —more generally nonclassical [10]—
28
+ states. Entanglement can also be utilized as a resource
29
+ for quantum heat engines [11–17] which makes them op-
30
+ erate more efficiently compared to their classical coun-
31
+ terparts [18]. As an example, an ancilla can utilize en-
32
+ tanglement for extracting a larger amount of work by
33
+ maximizing the efficiency [19]. It is quite intriguing that
34
+ entanglement can even be directly transformed into work
35
+ via measurements [20, 21]. The energy can be extracted
36
+ from a single heat bath [20, 21] [22]. This phenomenon
37
+ —we focus here— takes place as follows, e.g., in a two-
38
+ mode entangled state.
39
+ Work extraction as a measurement backaction.— Let
40
+ us assume that one of the modes (mode a) belongs to
41
+ an optical cavity which includes, for example, a free-to-
42
+ move board or a piston inside the cavity [20, 21]. The
43
+ second (b) mode relies somewhere outside of the cavity
44
+ and it is entangled with the a-mode. Both modes are
45
+ in thermal equilibrium with the environment at temper-
46
+ ature T. When a measurement is carried out on the b-
47
+ mode (outside), entropy of the cavity (a) mode decreases
48
+ to S(meas)
49
+ V
50
+ because of the measurement backaction. After
51
+ the measurement, the state (a-mode) thermalizes back
52
+ to equilibrium and assigns a higher entropy S(ther)
53
+ V
54
+ [23].
55
+ During the rethermalization with the heat bath the ex-
56
+ pansion of the a-mode pushes the board located inside
57
+ the cavity [20]. An amount of W = kBT (S(ther)
58
+ V
59
+ −S(meas)
60
+ V
61
+ )
62
+ work can be extracted from the single heat bath. That
63
+ is, W amount of thermal energy can be converted into
64
+ “directional” kinetic energy (KE) of the board. In case
65
+ of maximum entanglement, the state of the a-mode is
66
+ completely determined from the outcome of the b-mode
67
+ and entropy of the a-mode vanishes, i.e., S(meas)
68
+ V
69
+ = 0.
70
+ Thus, the extractable work becomes kBT S(ther)
71
+ V
72
+ , i.e., the
73
+ complete internal energy. The amount of extracted work
74
+ can be employed for witnessing/quantifying the entan-
75
+ glement [24–27].
76
+ In general, the extracted work depends on the nature
77
+ of the measurement and its outcome. Yet, interestingly,
78
+ the state of the a-mode (cavity field) turns out to be in-
79
+ dependent of the outcome of the b-mode as long as Gaus-
80
+ sian states and measurements are concerned [28–31]. The
81
+ state, into which the a-mode collapses, depends only on
82
+ the strength (λ) of the Gaussian measurement/operation
83
+ carried out on the b-mode [32].
84
+ Thus, also the ex-
85
+ tracted work depends only on λ.
86
+ Here, λ ∈ [0, ∞] is
87
+ the quadrature-noise belonging to the Gaussian opera-
88
+ tion [33].
89
+ That is, if λ (for a reason) assigns a fixed
90
+ value, a given degree of entanglement extracts a particu-
91
+ lar amount of work. This is the phenomenon we explore
92
+ here.
93
+ The observable that is measured in an experiment (this
94
+ can be, for example, number of photons) is determined
95
+ by the quantum apparatus employed in the measurement
96
+ of the b-mode.
97
+ More explicitly, monitoring of the en-
98
+ vironment on the apparatus (i.e., decoherence) destroys
99
+ the superpositions among the natural pointer states (the
100
+ measurement-basis). This makes us observe one of the
101
+ values in the measurement-basis. Refs. [34–39] provide
102
+ mathematical and numerical demonstrations of the mon-
103
+ itoring process.
104
+ The
105
+ question.—
106
+ Here
107
+ we
108
+ examine
109
+ the
110
+ following
111
+ already-answered-question in the context of work extrac-
112
+ tion process. What happens if no measurement appa-
113
+ ratus is present?
114
+ In other words, what is the pointer
115
+ (measurement) basis if no intellectual being, such as a
116
+ human, a daemon, or an ancilla, is present? In this case,
117
+ environmental monitoring sets the measurement-basis as
118
+
119
+ 2
120
+ the the coherent states [40–47]. Measurement strength is
121
+ λ = 1 for any one of the coherent states.
122
+ Environmental monitoring.— At this stage, we better
123
+ re-depict the picture of the system we have in mind in a
124
+ more clear way. The cavity (a) mode is entangled with
125
+ the b-mode. It is worth noting that, in general, the a
126
+ and b modes do not need to be in interaction [48]. The b-
127
+ mode is monitored by the environment. Environment (a
128
+ collection of infinite number of modes) can monitor the
129
+ b-mode only indirectly as two light beams do not interact
130
+ directly. Monitoring can be performed over common in-
131
+ teractions with masses of particles present around which
132
+ induces an effective interaction between the environment
133
+ and the b-mode [49]. It is worth noting that pointer states
134
+ are still coherent states, for instance, in case a harmonic
135
+ chain [42] is considered. Therefore, in total, environment
136
+ monitors (measures) the b-mode in one of the coherent
137
+ states. So, the measurement is a Gaussian one.
138
+ It is straightforward to realize that the measurement
139
+ strength is fixed λ = 1. Moreover, a rotated R(φ) form
140
+ of the coherent state basis —R(φ) is present in the most
141
+ general form of a Gaussian measurement [28–31]— is also
142
+ a coherent state basis. Putting things together, nature
143
+ itself makes a Gaussian measurement on one of the two
144
+ entangled modes. The measurement basis is composed
145
+ of coherent states. As the basis possesses a fixed λ: a
146
+ particular amount of work (KE) becomes assigned to a
147
+ given degree of entanglement as long as Gaussian states
148
+ are concerned.
149
+ The thermodynamical energy, proba-
150
+ bilistic and disordered in nature, is converted into an
151
+ ordered (mechanical) form of energy now belonging to
152
+ the board [20, 21]. This sets an observer-independent,
153
+ nature-assigned, association between entanglement and
154
+ directional/ordered energy.
155
+ We call this phenomenon
156
+ environment-induced work extraction (EIWE).
157
+ One can gain a better understanding by examining the
158
+ phenomenon in low-T limit —such as room temperature
159
+ for optical resonances [50]. At this limit, a simple-looking
160
+ analytical result can be obtained, because the kBT term,
161
+ present in the W formula, cancels with a 1/kBT term
162
+ appearing within the entropy difference [51].
163
+ Please,
164
+ see Eqs. (S11) and (S13) in the Supplementary Mate-
165
+ rial (SM) [52].
166
+ The extracted work W = ξ(r) (¯nℏωa) depends only on
167
+ the degree of the entanglement ξ(r) = [1−2/(1+cosh2r)]
168
+ which runs from 0 to 1 as entanglement increases. ¯n is
169
+ the occupation of the a (cavity) mode of resonance ωa.
170
+ So, (¯nℏωa) is already the “entire” thermodynamical (it is
171
+ probabilistic) energy present inside the cavity either be-
172
+ fore the measurement or after the rethermalization pro-
173
+ cess. Here we use the von Neumann entropy SV in dif-
174
+ ference to Ref. [20] where Réyni entropy is employed. r
175
+ is the two-mode squeezing rate which is proportional to
176
+ the time the entanglement device is kept open [53].
177
+ We present the derivations in the SM [52]. In the rest
178
+ of the paper, we aim to put this result into words in order
179
+ to develop a physical understanding.
180
+ We observe that the extracted work (KE of the board
181
+ or piston) is: the degree of entanglement times “all of
182
+ the thermal energy” present inside the cavity [54].
183
+ It
184
+ gets closer to (¯nℏωa) in the case of maximum (max)
185
+ entanglement [55].
186
+ In other words, max entanglement
187
+ converts the entire thermodynamical energy of the (a)
188
+ photon mode into the kinetic (directional) energy of the
189
+ board/piston [56]. As we will see below, this is true also
190
+ for other max entangled states, e.g., max two-mode en-
191
+ tangled state (|1, 0⟩ + |0, 1⟩)/
192
+
193
+ 2 and symmetrization en-
194
+ tanglement of identical particles [57]. That is, we cross-
195
+ check our EIWE result with other incidences.
196
+ What is peculiar to EIWE is that the work is extracted
197
+ by itself. That is, an observer-independent entanglement-
198
+ energy correspondence appears. The converted energy is
199
+ proportional to the degree of the entanglement ξ [58] and
200
+ depends only on the excitation spectrum.
201
+ Before making the comparison with other systems, we
202
+ would like to bring two important issues into attention.
203
+ First, we note that W is calculated using a density ma-
204
+ trix which involves classical (thermodynamical) probabil-
205
+ ities —grand canonical ensemble. It is a result weighted
206
+ over classical probabilities. For this reason, we prefer to
207
+ use the words “all of the thermal energy” present inside
208
+ the cavity is converted into the KE of the board/piston.
209
+ The energy present inside the cavity after the rether-
210
+ malization is also probabilistic. Conservation of energy,
211
+ however, tells us the following. If the energy realized in-
212
+ side the cavity after the rethermalization assigns one of
213
+ the classically probable ones, the extracted work needs
214
+ to be equal to that value.
215
+ Second, we note that al-
216
+ most all of the notion (e.g., entanglement-work conver-
217
+ sion and entanglement-energy analogy [59]) and the cal-
218
+ culations carried out here are already discussed in other
219
+ studies [20, 21].
220
+ Here, in difference, we introduce the
221
+ notion of entanglement-work correspondence due to the
222
+ presence of nature-originated measurement.
223
+ Comparison with other work extraction phenomena.—
224
+ We first compare the (i) EIWE result with the one
225
+ for another (max) entangled state (ii) |e⟩ = (|1, 0⟩ +
226
+ |0, 1⟩)/
227
+
228
+ 2 in thermal equilibrium ˆρ = P(|0, 0⟩⟨0, 0| +
229
+ e−ℏωa/kBT |e⟩⟨e|) [60]. When one measures the number
230
+ of photons and the outcome the b-mode is |1⟩, W =
231
+ xℏωa work is extracted in the cavity a-mode.
232
+ Here,
233
+ x = e−ℏωa/kBT is the classical probability for realizing
234
+ the two-mode system in the excited state |e⟩ and it is
235
+ equal to the occupation ¯n at low T , i.e., ¯n = x. This re-
236
+ sult is the same with the max entanglement (ξ = 1) case
237
+ of EIWE. In this example, too, all thermodynamical en-
238
+ ergy present in the a-mode is converted into directional
239
+ energy (work). In this case, however, the work extrac-
240
+ tion (the same amount) is subject to the measurement of
241
+ the b-mode in the excited state. In EIWE, in difference,
242
+ any measurement outcome extracts this amount of work.
243
+ We also examine the work associated to the (iii) sym-
244
+ metrization (max) entanglement [57] as a third exam-
245
+ ple.
246
+ In a recent study, we investigate the work ex-
247
+ tracted by identical particles in a system of N total
248
+ number of symmetrized bosons. The extracted work by
249
+
250
+ 3
251
+ (N − 1) particles is calculated when one of the (ran-
252
+ dom) particles is measured in the excited state, of en-
253
+ ergy ωeg [61]. In parallel with the previous cases, (i) and
254
+ (ii), the extracted work, by pushing the board located
255
+ within the condensate region, comes out as W3 = xℏωeg
256
+ at low T . Here, x = e−ℏωeg/kBT is the probability for
257
+ one of the N particles to occupy the excited state ei-
258
+ ther before the measurement or after the rethermaliza-
259
+ tion of the condensate.
260
+ Similarly, (xℏωeg) is the en-
261
+ tire thermal energy of the condensate at equilibrium.
262
+ The lowermost excited state of such a condensate is
263
+ the Dicke state |N, 1⟩ [62], where a single-particle ex-
264
+ citation is symmetrically distributed among N bosons,
265
+ |N, 1⟩ = (|e, g, g, ...⟩+|g, e, g, ...⟩...+|g, ...g, e⟩)/
266
+
267
+ N. This
268
+ is a maximally entangled state with respect to any one of
269
+ the particles. ωeg is the level-spacing between the excited
270
+ |e⟩ and ground |g⟩ states of a single particle.
271
+ We observe that the amount of extracted work, one
272
+ more time, is equal to the complete thermal energy of the
273
+ condensate (system) at thermal equilibrium. This takes
274
+ place again for a max entangled state, |N, 1⟩. We can take
275
+ the excited state, e.g., as the motional states of a Bose-
276
+ Einstein condensate with ℏωeg = h2/2mL2 [63]. Then,
277
+ the thermal energy of the condensate can be converted
278
+ into the directional (kinetic) energy of a board placed in
279
+ the condensate region. Here, again, the presented value
280
+ of the extracted work is subject to the realization of the
281
+ measured-particle in the excited state. The investigation
282
+ of this symmetrization problem has further importance
283
+ as entanglement of symmetrized many-body states and
284
+ nonclassicality of photonic states are intimately related.
285
+ A Dicke (many-body) state becomes a Fock (photon)
286
+ state when N → ∞ [64–66]. Similarly, separable coher-
287
+ ent atomic states become the photonic coherent states in
288
+ the same limit.
289
+ Summary and Discussions
290
+ Summary.— We reinvestigate an already studied phe-
291
+ nomenon –work extraction from an entangled system via
292
+ measurement backaction [20, 21]– when nature itself per-
293
+ forms the measurements. This is when there is no intel-
294
+ lectual being (such as a human, daemon, or an ancilla) is
295
+ present for the measurement; but the monitoring is con-
296
+ ducted by the environment/nature itself. In this case,
297
+ measurement-basis becomes the coherent states [40–47].
298
+ This fixes the measurement strength to λ = 1. The state
299
+ of the a-mode, in which work-extraction is carried out, is
300
+ already independent from the outcome of the b-mode [28–
301
+ 31] as long as Gaussian states and measurements are con-
302
+ cerned [28–31]. (The measurement performed by the en-
303
+ vironment is a Gaussian one as the measurement-basis
304
+ is coherent states.) Therefore, in total, the nature itself
305
+ assigns a particular amount of work/energy to a given
306
+ degree of entanglement.
307
+ Entanglement converts a disordered (randomly moving
308
+ particles, microscopic) form of energy into an ordered
309
+ form where the molecules of the board move along the
310
+ same direction, i.e., macroscopic motion. The letter is
311
+ referred as the mechanical energy, or we can tell that it
312
+ is the KE.
313
+ We find that at low T , the directional energy associated
314
+ with the entanglement is the “total thermal energy” times
315
+ the degree of the entanglement for a two-mode Gaussian
316
+ state: W = ξ(r)Uther. Here, ξ(r) = [1 − 2/(1 + cosh 2r)]
317
+ increases with the entanglement and gets closer to ξ =
318
+ 1 around the max entanglement.
319
+ r is the squeezing
320
+ strength. That is, all thermal energy can be converted
321
+ into directional energy for a maximally entangled Gaus-
322
+ sian state. Similarly, the entire thermal energy can be
323
+ converted into directional energy also for (ii) max entan-
324
+ gled number state (|0, 1⟩ + |1, 0⟩)/
325
+
326
+ 2 and for (iii) sym-
327
+ metrization entanglement of identical bosons [57]. How-
328
+ ever, the conversion in (ii) and (iii) is subject to the re-
329
+ alization of the measured mode/particle in the excited
330
+ state; while in (i) EIWE any measurement outcome ex-
331
+ tract that amount of work.
332
+ Squeezing and potential energy.— In this section, we
333
+ would like to introduce a correspondence also between
334
+ potential mechanical energy and single-mode nonclassi-
335
+ cality, SMNc, (e.g., squeezing). Entanglement and SMNc
336
+ are two different types of nonclassicalities (quantumness).
337
+ The two not only can be converted into each other via
338
+ passive optical elements, such as a beam splitter (BS),
339
+ but they also satisfy a conservation-like relations [67–
340
+ 69]. When a cavity mode is squeezed, it cannot be con-
341
+ verted into work directly.
342
+ This is because, squeezing
343
+ keeps the entropy unchanged.
344
+ However, the situation
345
+ changes when the squeezed cavity field leaks out through
346
+ the mirror(s). The interaction between the cavity and the
347
+ output modes �
348
+ k(gkˆb†
349
+ kˆa + H.c.) is in the form of a BS
350
+ interaction. Thus, the cavity and the output modes get
351
+ entangled [70]. Environmental monitoring on the output
352
+ modes ˆbk [71] makes the cavity extract work. We can also
353
+ view the process as the potential mechanical energy (as-
354
+ sociated with squeezing) transforms into the kinetic me-
355
+ chanical energy (associated with entanglement).
356
+ Connection with a recent study.— As a final but impor-
357
+ tant point, we indicate that the present research actually
358
+ investigates the results of a recent study [72]. Rigorous
359
+ calculations, employing the standard methods, clearly
360
+ show an intriguing phenomenon in an optical cavity. On-
361
+ set of entanglement exhibits itself in the response func-
362
+ tions of the optical cavity. At this point, nonanalytic-
363
+ ity of the response function moves into the upper-half of
364
+ the complex frequency plane (UH-CFP). One needs to
365
+ avoid this incident from implying the violation of causal-
366
+ ity.
367
+ Fortunately, surveys [73–75] show that a nonana-
368
+ lyticity in the UH-CFP does not imply the violation of
369
+ causality if there exists a small curvature in the back-
370
+ ground. In the present study, the total curvature of the
371
+ cavity (a-mode) increases as the disordered thermal en-
372
+ ergy is converted into ordered directional kinetic energy
373
+ of the board. That is, it indeed increases with the amount
374
+ of entanglement.
375
+
376
+ 4
377
+ Acknowledgements
378
+ We gratefully thank Vural Gökmen for the motiva-
379
+ tional support, Bayram Tekin for the scientific support,
380
+ Wojciech H. Zurek for letting us know his influential
381
+ work [40] and Alessio Serafini for his support on the
382
+ continuous-variable quantum information. We acknowl-
383
+ edge the fund TUBITAK-1001 Grant No. 121F141.
384
+ [1] A. Acín, I. Bloch, H. Buhrman, T. Calarco, C. Eichler,
385
+ J. Eisert, D. Esteve, N. Gisin, S. J. Glaser, F. Jelezko,
386
+ et al., The quantum technologies roadmap: a european
387
+ community view, New Journal of Physics 20, 080201
388
+ (2018).
389
+ [2] J. Aasi, J. Abadie, B. Abbott, R. Abbott, T. Abbott,
390
+ M. Abernathy, C. Adams, T. Adams, P. Addesso, R. Ad-
391
+ hikari, et al., Enhanced sensitivity of the ligo gravita-
392
+ tional wave detector by using squeezed states of light,
393
+ Nature Photonics 7, 613 (2013).
394
+ [3] L. Pezze, A. Smerzi, M. K. Oberthaler, R. Schmied,
395
+ and P. Treutlein, Quantum metrology with nonclassical
396
+ states of atomic ensembles, Reviews of Modern Physics
397
+ 90, 035005 (2018).
398
+ [4] L.
399
+ A.
400
+ Lugiato,
401
+ A.
402
+ Gatti,
403
+ and
404
+ E.
405
+ Brambilla,
406
+ Quantum
407
+ imaging,
408
+ Journal of Optics B: Quantum and Semiclassical Optics 4, S176 (2002).
409
+ [5] C. A. Casacio, L. S. Madsen, A. Terrasson, M. Waleed,
410
+ K. Barnscheidt, B. Hage, M. A. Taylor, and W. P. Bowen,
411
+ Quantum-enhanced nonlinear microscopy, Nature 594,
412
+ 201 (2021).
413
+ [6] S. Pirandola, B. R. Bardhan, T. Gehring, C. Weedbrook,
414
+ and S. Lloyd, Advances in photonic quantum sensing,
415
+ Nature Photonics 12, 724 (2018).
416
+ [7] L. Maccone and C. Ren, Quantum radar, Physical Re-
417
+ view Letters 124, 200503 (2020).
418
+ [8] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa,
419
+ A. Peres, and W. K. Wootters, Teleporting an unknown
420
+ quantum state via dual classical and einstein-podolsky-
421
+ rosen channels, Physical Review Letters 70, 1895 (1993).
422
+ [9] K. Wright, K. M. Beck, S. Debnath, J. Amini, Y. Nam,
423
+ N. Grzesiak, J.-S. Chen, N. Pisenti, M. Chmielewski,
424
+ C. Collins, et al., Benchmarking an 11-qubit quantum
425
+ computer, Nature Communications 10, 1 (2019).
426
+ [10] V. Dodonov, Nonclassical’states
427
+ in quantum optics:
428
+ asqueezed’review of the first 75 years, Journal of Optics
429
+ B: Quantum and Semiclassical Optics 4, R1 (2002).
430
+ [11] L. Bresque, P. A. Camati, S. Rogers, K. Murch, A. N.
431
+ Jordan, and A. Auffèves, Two-qubit engine fueled by
432
+ entanglement and local measurements, Physical Review
433
+ Letters 126, 120605 (2021).
434
+ [12] M. Josefsson and M. Leijnse, Double quantum-dot engine
435
+ fueled by entanglement between electron spins, Physical
436
+ Review B 101, 081408 (2020).
437
+ [13] A. Hewgill, A. Ferraro, and G. De Chiara, Quantum cor-
438
+ relations and thermodynamic performances of two-qubit
439
+ engines with local and common baths, Physical Review
440
+ A 98, 042102 (2018).
441
+ [14] T. Zhang, W.-T. Liu, P.-X. Chen, and C.-Z. Li, Four-
442
+ level entangled quantum heat engines, Physical Review
443
+ A 75, 062102 (2007).
444
+ [15] J. Roßnagel, O. Abah, F. Schmidt-Kaler, K. Singer, and
445
+ E. Lutz, Nanoscale heat engine beyond the carnot limit,
446
+ Physical review letters 112, 030602 (2014).
447
+ [16] R. Dillenschneider and E. Lutz, Energetics of quan-
448
+ tum correlations, EPL (Europhysics Letters) 88, 50003
449
+ (2009).
450
+ [17] M. O. Scully, M. S. Zubairy,
451
+ G. S. Agarwal, and
452
+ H. Walther, Extracting work from a single heat bath via
453
+ vanishing quantum coherence, Science 299, 862 (2003).
454
+ [18] T. D. Kieu, The second law, maxwell’s demon, and work
455
+ derivable from quantum heat engines, Physical review
456
+ letters 93, 140403 (2004).
457
+ [19] G. Francica, J. Goold, F. Plastina, and M. Paternos-
458
+ tro, Daemonic ergotropy: enhanced work extraction from
459
+ quantum correlations, npj Quantum Information 3, 1
460
+ (2017).
461
+ [20] M. Brunelli, M. G. Genoni, M. Barbieri, and M. Pater-
462
+ nostro, Detecting gaussian entanglement via extractable
463
+ work, Physical Review A 96, 062311 (2017).
464
+ [21] M. Cuzminschi, A. Zubarev, and A. Isar, Extractable
465
+ quantum work from a two-mode gaussian state in a noisy
466
+ channel, Scientific Reports 11, 1 (2021).
467
+ [22] Work extraction via a measurement can be performed
468
+ also from the internal energy of the measurement appa-
469
+ ratus [77, 78]. However, here we are interested in the con-
470
+ version of the microscopic energy (heat) present in a sin-
471
+ gle heat bath into directional mechanical energy [20, 21].
472
+ [23] The entropy after the rethermalization is equal to the one
473
+ before the measurement. More accurately, S(ther)
474
+ V
475
+ is also
476
+ the half of the entropy belonging to the two-mode state
477
+ before the measurement.
478
+ [24] J.
479
+ Oppenheim,
480
+ M.
481
+ Horodecki,
482
+ P.
483
+ Horodecki,
484
+ and
485
+ R. Horodecki, Thermodynamical approach to quantify-
486
+ ing quantum correlations, Physical Review Letters 89,
487
+ 180402 (2002).
488
+ [25] K. Maruyama, F. Morikoshi, and V. Vedral, Thermody-
489
+ namical detection of entanglement by maxwell’s demons,
490
+ Physical Review A 71, 012108 (2005).
491
+ [26] M. A. Ciampini, L. Mancino, A. Orieux, C. Vigliar,
492
+ P. Mataloni, M. Paternostro, and M. Barbieri, Experi-
493
+ mental extractable work-based multipartite separability
494
+ criteria, npj Quantum Information 3, 1 (2017).
495
+ [27] K. Maruyama, F. Nori, and V. Vedral, Colloquium: The
496
+ physics of maxwell’s demon and information, Reviews of
497
+ Modern Physics 81, 1 (2009).
498
+ [28] J. Fiurášek, Gaussian transformations and distillation of
499
+ entangled gaussian states, Physical Review Letters 89,
500
+ 137904 (2002).
501
+ [29] G. Giedke and J. I. Cirac, Characterization of gaussian
502
+ operations and distillation of gaussian states, Physical
503
+ Review A 66, 032316 (2002).
504
+ [30] J. Fiurášek and L. Mišta Jr, Gaussian localizable entan-
505
+ glement, Physical Review A 75, 060302 (2007).
506
+ [31] P. Giorda and M. G. Paris, Gaussian quantum discord,
507
+ Physical Review Letters 105, 020503 (2010).
508
+ [32] It also depends on the rotation angle φ belonging to the
509
+ Gaussian operation. But this will not be our concern as
510
+ will become apparent in the following text.
511
+
512
+ 5
513
+ [33] J. Eisert, S. Scheel, and M. B. Plenio, Distilling gaussian
514
+ states with gaussian operations is impossible, Physical
515
+ Review Letters 89, 137903 (2002).
516
+ [34] W. H. Zurek, Decoherence, einselection, and the quan-
517
+ tum origins of the classical, Reviews of Modern physics
518
+ 75, 715 (2003).
519
+ [35] M. Schlosshauer, Quantum decoherence, Physics Reports
520
+ 831, 1 (2019).
521
+ [36] W. H. Zurek, Environment-induced superselection rules,
522
+ Physical Review D 26, 1862 (1982).
523
+ [37] W. Unruh and W. H. Zurek, Reduction of a wave packet
524
+ in quantum brownian motion, Physical Review D 40,
525
+ 1071 (1989).
526
+ [38] W. H. Zurek, Pointer basis of quantum apparatus: Into
527
+ what mixture does the wave packet collapse?, Physical
528
+ Review D 24, 1516 (1981).
529
+ [39] W. H. Zurek, Quantum darwinism, Nature physics 5, 181
530
+ (2009).
531
+ [40] W. H. Zurek, S. Habib, and J. P. Paz, Coherent states via
532
+ decoherence, Physical Review Letters 70, 1187 (1993).
533
+ [41] M. R. Gallis, Emergence of classicality via decoherence
534
+ described by lindblad operators, Physical Review A 53,
535
+ 655 (1996).
536
+ [42] M. Tegmark and H. S. Shapiro, Decoherence produces
537
+ coherent states: An explicit proof for harmonic chains,
538
+ Physical Review E 50, 2538 (1994).
539
+ [43] H. Wiseman and J. Vaccaro, Maximally robust unrav-
540
+ elings of quantum master equations, Physics Letters A
541
+ 250, 241 (1998).
542
+ [44] W. H. Zurek and J. P. Paz, Decoherence, chaos, and the
543
+ second law, Physical Review Letters 72, 2508 (1994).
544
+ [45] W. Zurek and J. Paz, Decoherence, chaos, the quantum
545
+ and the classical, Il Nuovo Cimento B (1971-1996) 110,
546
+ 611 (1995).
547
+ [46] G.-S. Paraoanu, Selection of squeezed states via decoher-
548
+ ence, EPL (Europhysics Letters) 47, 279 (1999).
549
+ [47] W. H. Zurek, Preferred states, predictability, classicality
550
+ and the environment-induced decoherence, Progress of
551
+ Theoretical Physics 89, 281 (1993).
552
+ [48] J.-W.
553
+ Pan,
554
+ D.
555
+ Bouwmeester,
556
+ H.
557
+ Weinfurter,
558
+ and
559
+ A. Zeilinger, Experimental entanglement swapping: en-
560
+ tangling photons that never interacted, Physical Review
561
+ Letters 80, 3891 (1998).
562
+ [49] Coupling of a cavity field/mode to the input/output (vac-
563
+ uum) modes already employs exactly the same mecha-
564
+ nism [79].
565
+ [50] Or for a Swinger pair creation (mass-energy conversion)
566
+ process taking place over a critical electric field.
567
+ [51] We can tell that the result is T -independent except a
568
+ factor ¯n = 1/(eℏωa/kBT − 1) → e−ℏωa/kBT which stands
569
+ for the probability of finding one of the two modes in the
570
+ excited state. (¯nℏωa) is already the energy present in the
571
+ a-mode.
572
+ [52] See Supplemental Material.
573
+ [53] M. O. Scully and M. S. Zubairy, Quantum optics, Cam-
574
+ bridge Univ. Press (1997).
575
+ [54] Here, we prefer to use the words “all of the thermal en-
576
+ ergy” at equilibrium, because this is the grand canonical
577
+ mean energy which is (classical) probabilistic. The en-
578
+ ergy present inside the cavity after the rethermalization
579
+ is also probabilistic. Conservation of energy tells us the
580
+ following. If the energy realized inside the cavity after
581
+ the rethermalization assigns one of the classical probable
582
+ ones, the extracted work needs to be equal to that value.
583
+ [55] Please note that energy of a maximum entangled two-
584
+ mode Gaussian state approaches to infinite. Here, we
585
+ confine ourselves to a regime where squeezing rate r ≪
586
+ ℏωa/kBT . The latter is typically ∼ 100 for optical modes
587
+ at room temperature. See the discussion above Eq. (S11)
588
+ in the SM [52].
589
+ [56] Please note that this statement is valid at any tempera-
590
+ ture.
591
+ [57] M. E. Tasgin, Energy of the symmterization entangle-
592
+ ment, will be available in Researchgate (2023).
593
+ [58] It should be noted that one can quantify entanglement
594
+ in various alternative ways such as entropy of the re-
595
+ duced state [80], symplectic spectrum [81] or via nonclas-
596
+ sical depth [82] when single-mode nonclassicality is wiped
597
+ out [83]. They, all, display parallel behavior to the mea-
598
+ sure logarithmic negativity EN for Gaussian states [84].
599
+ [59] R. Horodecki, M. Horodecki, and P. Horodecki, Balance
600
+ of information in bipartite quantum-communication sys-
601
+ tems: Entanglement-energy analogy, Physical Review A
602
+ 63, 022310 (2001).
603
+ [60] We ignore other excited states, such as |0, 1⟩ and |1, 0⟩,
604
+ which actually have the same energy. We do this for the
605
+ sake of a reasonable comparison only.
606
+ [61] One should note that measuring the quantum state of
607
+ a single particle in a condensate of N identical particles
608
+ is not a straightforward process. It necessitates certain
609
+ rules/conditions which is studied experimentally [85–87]
610
+ and theoretically [66, 88]. Please see Ref. [57] for a de-
611
+ tailed analysis.
612
+ [62] L. Mandel and E. Wolf, Optical coherence and Quantum
613
+ optics (Cambridge University Press, 1995).
614
+ [63] M. Moore, O. Zobay, and P. Meystre, Quantum optics of
615
+ a bose-einstein condensate coupled to a quantized light
616
+ field, Physical Review A 60, 1491 (1999).
617
+ [64] J. Radcliffe, Some properties of coherent spin states,
618
+ Journal of Physics A: General Physics 4, 313 (1971).
619
+ [65] J. R. Klauder and B.-S. Skagerstam, Coherent states: ap-
620
+ plications in physics and mathematical physics (World
621
+ scientific, 1985).
622
+ [66] M. E. Tasgin, Many-particle entanglement criterion for
623
+ superradiantlike states, Physical Review Letters 119,
624
+ 033601 (2017).
625
+ [67] W. Ge, M. E. Tasgin, and M. S. Zubairy, Conservation
626
+ relation of nonclassicality and entanglement for gaussian
627
+ states in a beam splitter, Physical Review A 92, 052328
628
+ (2015).
629
+ [68] I. I. Arkhipov, J. Peřina Jr, J. Svozilík, and A. Miranow-
630
+ icz, Nonclassicality invariant of general two-mode gaus-
631
+ sian states, Scientific reports 6, 1 (2016).
632
+ [69] I. I. Arkhipov, J. Peřina Jr, J. Peřina, and A. Miranow-
633
+ icz, Interplay of nonclassicality and entanglement of two-
634
+ mode gaussian fields generated in optical parametric pro-
635
+ cesses, Physical Review A 94, 013807 (2016).
636
+ [70] We note that such a study should employ the entangle-
637
+ ment quantifications for wave-packets [89] which calcu-
638
+ lates entanglement of the cavity mode with all of the
639
+ vacuum modes. This can be performed using the input-
640
+ output formalism developed for the wave-packets [90].
641
+ [71] One may keep the quality of the optical cavity very high,
642
+ e.g., 105 Hz [91], so that environment monitors the out-
643
+ put modes in a much shorter decoherence time over the
644
+ mass of particles present around.
645
+
646
+ 6
647
+ [72] M.E.
648
+ Tasgin,
649
+ Entanglement
650
+ and
651
+ Viola-
652
+ tion
653
+ of
654
+ Kramers-Kronic
655
+ relations,
656
+ (2022),
657
+ https://www.researchgate.net/publication/361662995_Entanglement_and_violation_of_Kramers-Kronig_relations.
658
+ [73] T. J. Hollowood and G. M. Shore, The refractive index
659
+ of curved spacetime: the fate of causality in qed, Nuclear
660
+ Physics B 795, 138 (2008).
661
+ [74] T. J. Hollowood and G. M. Shore, Causality and micro-
662
+ causality in curved spacetime, Physics Letters B 655, 67
663
+ (2007).
664
+ [75] T. J. Hollowood and G. M. Shore, The causal structure
665
+ of qed in curved spacetime: analyticity and the refractive
666
+ index, Journal of High Energy Physics 2008, 091 (2008).
667
+ [76] A. Serafini, F. Illuminati, and S. De Siena, Symplectic
668
+ invariants, entropic measures and correlations of gaus-
669
+ sian states, Journal of Physics B: Atomic, Molecular and
670
+ Optical Physics 37, L21 (2003).
671
+ [77] C. Elouard and A. N. Jordan, Efficient quantum mea-
672
+ surement engines, Physical Review Letters 120, 260601
673
+ (2018).
674
+ [78] C. Elouard, D. Herrera-Martí, B. Huard, and A. Auf-
675
+ feves, Extracting work from quantum measurement in
676
+ maxwell’s demon engines, Physical Review Letters 118,
677
+ 260603 (2017).
678
+ [79] C. Gardiner, P. Zoller, and P. Zoller, Quantum noise:
679
+ a handbook of Markovian and non-Markovian quantum
680
+ stochastic methods with applications to quantum optics
681
+ (Springer Science & Business Media, 2004).
682
+ [80] Entropy
683
+ of
684
+ Entanglement,
685
+ https://en.wikipedia.org/wiki/Entropy_of_entanglement.
686
+ [81] G. Adesso, A. Serafini, and F. Illuminati, Extremal en-
687
+ tanglement and mixedness in continuous variable sys-
688
+ tems, Physical Review A 70, 022318 (2004).
689
+ [82] C. T. Lee, Measure of the nonclassicality of nonclassical
690
+ states, Physical Review A 44, R2775 (1991).
691
+ [83] M. E. Tasgin and M. S. Zubairy, Quantifications for mul-
692
+ timode entanglement, Physical Review A 101, 012324
693
+ (2020).
694
+ [84] M.
695
+ B.
696
+ Plenio,
697
+ Logarithmic
698
+ negativity:
699
+ A
700
+ full
701
+ entanglement
702
+ monotone
703
+ that
704
+ is
705
+ not
706
+ convex,
707
+ Phys. Rev. Lett. 95, 090503 (2005).
708
+ [85] D. Stamper-Kurn, A. Chikkatur, A. Görlitz, S. Inouye,
709
+ S. Gupta, D. Pritchard, and W. Ketterle, Excitation of
710
+ phonons in a bose-einstein condensate by light scattering,
711
+ Physical Review Letters 83, 2876 (1999).
712
+ [86] J. Stenger, S. Inouye, A. P. Chikkatur, D. Stamper-Kurn,
713
+ D. Pritchard, and W. Ketterle, Bragg spectroscopy of
714
+ a bose-einstein condensate, Physical Review Letters 82,
715
+ 4569 (1999).
716
+ [87] M. Andersen, C. Ryu, P. Cladé, V. Natarajan, A. Vaziri,
717
+ K. Helmerson, and W. D. Phillips, Quantized rotation
718
+ of atoms from photons with orbital angular momentum,
719
+ Physical review letters 97, 170406 (2006).
720
+ [88] M. E. Taşgın, Ö. Müstecaplıoglu, and L. You, Creation
721
+ of a vortex in a bose-einstein condensate by superradiant
722
+ scattering, Physical Review A 84, 063628 (2011).
723
+ [89] M. E. Tasgin, M. Gunay, and M. S. Zubairy, Nonclassical-
724
+ ity and entanglement for wave packets, Physical Review
725
+ A 101, 062316 (2020).
726
+ [90] S. Ullah, M. Gunay, R. V. Ovali, and M. E. Tasgin, Input
727
+ output formalism for wave packets, in preperation, will
728
+ be available on Researgate (2023).
729
+ [91] J. Thompson, B. Zwickl, A. Jayich, F. Marquardt,
730
+ S. Girvin, and J. Harris, Strong dispersive coupling of a
731
+ high-finesse cavity to a micromechanical membrane, Na-
732
+ ture 452, 72 (2008).
733
+
734
+ 7
735
+ I.
736
+ SUPPLEMENTARY MATERIAL
737
+ FOR
738
+ ENVIRONMENTAL-INDUCED WORK
739
+ EXTRACTION (EIWE)
740
+ In this supplementary material (SM), we first ob-
741
+ tain the environmentally extracted in a two-mode (TM)
742
+ squeezed thermal (Gaussian) state in Sec. 1. We show
743
+ that it is in the form W
744
+ = ξ(r) × (¯nℏω) at low-
745
+ temperatures (T ) —e.g., room temperature for optical
746
+ modes.
747
+ Here, ξ(r), given in Eq. (??), quantifies the
748
+ strength of the entanglement. We use von Neumann en-
749
+ tropy (SV ) in our calculations, in difference to Ref. [20].
750
+ Second, in Sec. 2, we show that the same form for the
751
+ work extraction, i.e., W = ξ(r) × (¯nℏω), appears also for
752
+ other TM Gaussian states.
753
+ 1. EIWE for two-mode squeezed thermal state
754
+ Initially, before the measurement, both modes, a and b,
755
+ are in thermal equilibrium with an environment at tem-
756
+ perature T . When one carries out a Gaussian measure-
757
+ ment on the b-mode, the enropy of the b-mode reduces
758
+ below the one for the thermal equilibrium. When the a-
759
+ mode re-thermalizes with the environment it performs a
760
+ work in the amount of [27]
761
+ W = kBT (S(ther)
762
+ V
763
+ − S(meas)
764
+ V
765
+ ).
766
+ (1)
767
+ Here, S(meas)
768
+ V
769
+ is the reduced entropy of the a-mode after
770
+ the measurement in the b-mode is carried out. S(ther)
771
+ V
772
+ is
773
+ the entropy of the a-mode after the rethermalization of
774
+ the mode.
775
+ Entropy of a Gaussian state can be determined by its
776
+ covariance matrix, which includes the noise elements of
777
+ the modes. Covariance matrix of a biparitite Gaussian
778
+ state can be cast in the form [? ]
779
+ σab =
780
+ �σa cab
781
+ cT
782
+ ab σb
783
+
784
+ (2)
785
+ via local symplectic transformation Sp(2, R) ⊕ Sp(2, R)-
786
+ i.e., transformations altering neither of the entropy or
787
+ entanglement. Here, σa = diag(a, a) and σb = diag(b, b)
788
+ are the reduced covariance matrices of the a and b
789
+ modes, respectively. cab = diag(c1, c2) refers to corre-
790
+ lations/entanglement between the two mode. For a sym-
791
+ metrically squeezed two-mode thermal state, i.e., both
792
+ modes used to be in thermal equilibrium with the same
793
+ T in the squeezing process, b = a and c2 = −c1 = −c.
794
+ The state into which the a-mode collapses is indepen-
795
+ dent from the outcome of the b-mode measurement as
796
+ long as a Gaussian measurement is carried out [28–31].
797
+ The covariance matrix of the a-mode after the measure-
798
+ ment becomes
799
+ σπb
800
+ a = σa − cab (σb + γπb)−1 cT
801
+ ab.
802
+ (3)
803
+ Here, γπb = R(φ) diag(λ/2, λ−1/2) R(φ)T refers to the
804
+ covariance matrix associated with a Gaussian operation
805
+ (measurment) [28–31]. λ is the measurement strength.
806
+ For a Gaussian measurement having the coherent states
807
+ as a basis, λ = 1 and γπb = diag(1/2, 1/2) independent
808
+ of the rotations R(φ) in the a-mode, i.e., ˆa → ˆaeiφ.
809
+ The entropy of a Gaussian state is determined solely
810
+ by purity, µ =
811
+ 1
812
+ 2n√
813
+ Detσ, which takes the form
814
+ SV = 1 − µ
815
+
816
+ ln
817
+ �1 + µ
818
+ 1 − µ
819
+
820
+ − ln
821
+ � 2µ
822
+ 1 + µ
823
+
824
+ (4)
825
+ for a single-mode state [? ].
826
+ The purity of the a-mode, after the b-mode measure-
827
+ ment, can be obtained as
828
+ µ1 ≡ µ(meas) =
829
+ a + 1/2
830
+ 2(a2 − c2 + a/2).
831
+ (5)
832
+ For a TM squeezed thermal state,
833
+ a = (¯n + 1
834
+ 2) cosh(2r),
835
+ (6)
836
+ c = (¯n + 1
837
+ 2) sinh(2r),
838
+ (7)
839
+ the purity becomes
840
+ µ1 =
841
+ a + 1/2
842
+ 2(¯n + 1/2)2 + a,
843
+ (8)
844
+ where ¯n = (eℏωa/kBT − 1)−1 is the occupation of the a-
845
+ mode, which becomes ¯n → e−ℏωa/kBT at low T— e.g.,
846
+ the room temperature for optical modes of resonance ωa.
847
+ r is the two-mode squeezing strength with which entan-
848
+ glement increases [53].
849
+ ¯n is extremely small at low T regime. So, it is
850
+ µ1 ∼= 1 −
851
+ 2¯n
852
+ a + 1/2.
853
+ (9)
854
+ Then, the entropy can be approximately written as,
855
+ S(meas)
856
+ V
857
+ ∼=
858
+ ¯n
859
+ a + 1/2[ln(2) − ln(2¯n) + ln(a + 1
860
+ 2)]
861
+ (10)
862
+
863
+ 2¯n
864
+ a + 1/2,
865
+ where a = (¯n + 1/2) cosh(2r). The last term originates
866
+ from the ln
867
+
868
+
869
+ 1+µ
870
+
871
+ term given in Eq. (S4).
872
+ In the square brackets, in Eq. (S10), ln(¯n) = ℏωa
873
+ kBT ≫ 1
874
+ and ln(a + 1/2) ∼= ln(cosh(2r)). Assuming that the squ-
875
+ uezing rate is much smaller than
876
+ ℏωa
877
+ kBT , which is about
878
+ ∼100 at the room temperatures, i.e., r ≪
879
+ ℏωa
880
+ kBT , the en-
881
+ tropy takes the form
882
+ S(meas)
883
+ V
884
+ ∼=
885
+ 2¯n
886
+ 1 + cosh(2r)
887
+ ℏωa
888
+ kBT ,
889
+ (11)
890
+ where the last term in Eq. (S10) is also neglected.
891
+
892
+ 8
893
+ Some time after the measurement, a-mode rethermal-
894
+ izes with the enviroment and at equilibrium its purity
895
+ becomes
896
+ µ2 ≡ µ(ther) =
897
+ 1
898
+ 1 + 2¯n.
899
+ (12)
900
+ The entropy at equilibrium can similarly calculated as
901
+ S(ther)
902
+ V
903
+ ∼= ¯n ℏωa
904
+ kBT .
905
+ (13)
906
+ Therefore, the extracted work becomes
907
+ W =
908
+
909
+ 1 −
910
+ 2
911
+ 1 + cosh(2r)
912
+
913
+ ¯nℏωa,
914
+ (14)
915
+ where the kBT term in Eq. (S1) is canceled by 1/kBT
916
+ appearing in (S11) and (S13).
917
+ 2. EIWE for other Gaussian states
918
+ We derived the simple form for the extracted work
919
+ W = ξ(r)(¯nℏωa) for the TM squeezed thermal states.
920
+ Now, we aim to show that a similar form appears also for
921
+ other Gassian states given by the covariance matrix (S2).
922
+ When the b-mode is measured by the enviroment, the
923
+ a-mode collapses to a covariance matrix with determi-
924
+ nant
925
+ detσπb
926
+ a = (a2 − c2
927
+ 1 + a/2)(a2 − c2
928
+ 2 + a/2)
929
+ (a + 1/2)2
930
+ .
931
+ (15)
932
+ The entropy after the measurement is similarly µ(meas) =
933
+ 1
934
+ 2√
935
+ detσ
936
+ πb
937
+ a
938
+ [76]. For c1 = −c2 = c, µ(meas) becomes the
939
+ purity given in Eq. (S5).
940
+ As we aim to show that the extracted work has a “form”
941
+ similar to W = ξ · (¯nℏωa) also for other Gaussian states,
942
+ we express Eq. (S15) in terms of Sp(4, R) invariants
943
+ detσ = (a2 − c2
944
+ 1)(a2 − c2
945
+ 2),
946
+ (16)
947
+ ∆ = 2(a2 + c1c2),
948
+ (17)
949
+ where detσ is the determinant of the two-mode state
950
+ before the measurement.
951
+ We do this because any one
952
+ of the two-mode Gaussian states, Eq. (S2), can be ob-
953
+ tained from Sp(4, R) transformations of the TM squeezed
954
+ thermal state Eq. (15) of Ref. [76]. The determinant in
955
+ Eq. (S15) can be expressed as
956
+ detσπb
957
+ a
958
+ = (a2 − c2
959
+ 1)(a2 − c2
960
+ 2) + a
961
+ 2 (2a2 − c2
962
+ 1 − c2
963
+ 2)
964
+ ( 1
965
+ 2 + a)2
966
+ ,
967
+ (18)
968
+ where the first term is the Sp(4, R) invariant detσ. In
969
+ the second term, I = 2a2 − c2
970
+ 1 − c2
971
+ 2 can be expressed in
972
+ terms of Sp(4, R) invariants (Please note that a is only
973
+ local Sp(2, R) invariant) as
974
+ detσπb = (a2I + ∆2/4 − ∆a2)
975
+ (a + 1
976
+ 2)2
977
+ .
978
+ (19)
979
+ We note that detσ = (˜a2
980
+ TMS − ˜c2)2 and ∆ = 2(˜a2 − ˜c2)
981
+ for the TM squeezed thermal states and they are Sp(4, R)
982
+ invariant. Thus, Eq. (S19) can be recast as
983
+ (˜a2 − ˜c2)2 = a2I + (˜a2 − ˜c2)2 − ∆a2.
984
+ (20)
985
+ Please note that, in this section, we use tilde symbol for
986
+ the covariance matrix elements of the TM squeezed ther-
987
+ mal states in order to distinguish them from the variable
988
+ a given in the general matrix given in Eq. (S2).
989
+ Cancellation in Eq. (S20) results
990
+ I = 2a2 − c2
991
+ 1 − c2 = ∆.
992
+ (21)
993
+ Using this in Eq. (S19), we obtain the expression
994
+ µ(meas) =
995
+ a + 1/2
996
+ 2(z + a/2),
997
+ (22)
998
+ where z = ˜a2−˜c2 = (¯n+1/2)2. Please note that Eq. (S22)
999
+ is in the same form with Eq. (S5) from which we obtain
1000
+ the extracted work
1001
+ W = ξ (��nℏωc).
1002
+ (23)
1003
+ Thus, above we showed that Eq. (S23) is a general form
1004
+ for the extracted work from a symmetric TM Gaussian
1005
+ state.
1006
+
K9E0T4oBgHgl3EQfigH5/content/2301.02448v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d3bd5d610f9dc6faebb2679cddea0f6b0a40a990ff6be80fd80031764b365b7c
3
+ size 523909
K9E0T4oBgHgl3EQfigH5/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5dd9c78bba91c243afe191efc05e06567c89721518c6cd67d4a6b8fb9fdba94e
3
+ size 3080237