Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -NAzT4oBgHgl3EQfg_yi/content/tmp_files/2301.01478v1.pdf.txt +0 -0
- -NAzT4oBgHgl3EQfg_yi/content/tmp_files/load_file.txt +0 -0
- -NFIT4oBgHgl3EQf8ysQ/content/tmp_files/2301.11403v1.pdf.txt +1044 -0
- -tE4T4oBgHgl3EQf4A1b/content/tmp_files/2301.05310v1.pdf.txt +1583 -0
- -tE4T4oBgHgl3EQf4A1b/content/tmp_files/load_file.txt +0 -0
- .gitattributes +55 -0
- 0dFIT4oBgHgl3EQf3CsM/vector_store/index.pkl +3 -0
- 2dE1T4oBgHgl3EQf5gVO/content/2301.03512v1.pdf +3 -0
- 2dE1T4oBgHgl3EQf5gVO/vector_store/index.pkl +3 -0
- 3dAzT4oBgHgl3EQf9P73/content/2301.01918v1.pdf +3 -0
- 4tE4T4oBgHgl3EQfBAt_/content/tmp_files/2301.04848v1.pdf.txt +2047 -0
- 4tE4T4oBgHgl3EQfBAt_/content/tmp_files/load_file.txt +0 -0
- 5dE3T4oBgHgl3EQfpQo9/content/tmp_files/2301.04640v1.pdf.txt +825 -0
- 5dE3T4oBgHgl3EQfpQo9/content/tmp_files/load_file.txt +468 -0
- 6NE1T4oBgHgl3EQf6wWy/vector_store/index.pkl +3 -0
- 8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf +3 -0
- 8dA0T4oBgHgl3EQfOv8t/vector_store/index.faiss +3 -0
- 8dA0T4oBgHgl3EQfOv8t/vector_store/index.pkl +3 -0
- B9E3T4oBgHgl3EQfUAr7/content/2301.04448v1.pdf +3 -0
- B9E3T4oBgHgl3EQfUAr7/vector_store/index.faiss +3 -0
- B9E3T4oBgHgl3EQfUAr7/vector_store/index.pkl +3 -0
- BdE2T4oBgHgl3EQfngiP/content/2301.04009v1.pdf +3 -0
- BdE2T4oBgHgl3EQfngiP/vector_store/index.faiss +3 -0
- BdE2T4oBgHgl3EQfngiP/vector_store/index.pkl +3 -0
- CdAzT4oBgHgl3EQfiP0X/content/tmp_files/2301.01495v1.pdf.txt +1449 -0
- CdAzT4oBgHgl3EQfiP0X/content/tmp_files/load_file.txt +0 -0
- DtAyT4oBgHgl3EQf4vpJ/content/tmp_files/2301.00791v1.pdf.txt +0 -0
- DtAyT4oBgHgl3EQf4vpJ/content/tmp_files/load_file.txt +0 -0
- E9A0T4oBgHgl3EQfBP8f/content/2301.01972v1.pdf +3 -0
- E9A0T4oBgHgl3EQfBP8f/vector_store/index.pkl +3 -0
- E9E5T4oBgHgl3EQfVA-E/content/tmp_files/2301.05548v1.pdf.txt +1854 -0
- E9E5T4oBgHgl3EQfVA-E/content/tmp_files/load_file.txt +0 -0
- F9AyT4oBgHgl3EQfSveK/content/tmp_files/2301.00092v1.pdf.txt +0 -0
- F9AyT4oBgHgl3EQfSveK/content/tmp_files/load_file.txt +0 -0
- FtE0T4oBgHgl3EQfRAB3/content/tmp_files/2301.02201v1.pdf.txt +867 -0
- FtE0T4oBgHgl3EQfRAB3/content/tmp_files/load_file.txt +0 -0
- G9E2T4oBgHgl3EQfTge-/content/tmp_files/2301.03804v1.pdf.txt +0 -0
- G9E2T4oBgHgl3EQfTge-/content/tmp_files/load_file.txt +0 -0
- G9E4T4oBgHgl3EQfgQ3v/content/2301.05116v1.pdf +3 -0
- G9E4T4oBgHgl3EQfgQ3v/vector_store/index.faiss +3 -0
- HtE1T4oBgHgl3EQfXwQA/content/tmp_files/2301.03129v1.pdf.txt +1705 -0
- HtE1T4oBgHgl3EQfXwQA/content/tmp_files/load_file.txt +0 -0
- ItE3T4oBgHgl3EQfXAqD/vector_store/index.faiss +3 -0
- ItFKT4oBgHgl3EQfdy7h/content/2301.11822v1.pdf +3 -0
- ItFKT4oBgHgl3EQfdy7h/vector_store/index.faiss +3 -0
- ItFKT4oBgHgl3EQfdy7h/vector_store/index.pkl +3 -0
- JdAyT4oBgHgl3EQf5_qu/vector_store/index.pkl +3 -0
- JtE0T4oBgHgl3EQfSADl/content/tmp_files/2301.02217v1.pdf.txt +1455 -0
- JtE0T4oBgHgl3EQfSADl/content/tmp_files/load_file.txt +0 -0
- LNFAT4oBgHgl3EQfwR78/vector_store/index.faiss +3 -0
-NAzT4oBgHgl3EQfg_yi/content/tmp_files/2301.01478v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
-NAzT4oBgHgl3EQfg_yi/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
-NFIT4oBgHgl3EQf8ysQ/content/tmp_files/2301.11403v1.pdf.txt
ADDED
@@ -0,0 +1,1044 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Detecting Pump&Dump Stock Market Manipulation from Online
|
2 |
+
Forums
|
3 |
+
D. Nam
|
4 |
+
D.B. Skillicorn
|
5 |
+
School of Computing
|
6 |
+
Queen’s University
|
7 |
+
Kingston. Canada
|
8 | |
9 |
+
Abstract
|
10 |
+
The intersection of social media, low-cost trading platforms, and naive investors has created an
|
11 |
+
ideal situation for information-based market manipulations, especially pump&dumps. Manipulators
|
12 |
+
accumulate small-cap stocks, disseminate false information on social media to inflate their price,
|
13 |
+
and sell at the peak.
|
14 |
+
We collect a dataset of stocks whose price and volume profiles have the
|
15 |
+
characteristic shape of a pump&dump, and social media posts for those same stocks that match the
|
16 |
+
timing of the initial price rises. From these we build predictive models for pump&dump events based
|
17 |
+
on the language used in the social media posts.
|
18 |
+
There are multiple difficulties: not every post will cause the intended market reaction, some
|
19 |
+
pump&dump events may be triggered by posts in other forums, and there may be accidental con-
|
20 |
+
fluences of post timing and market movements. Nevertheless, our best model achieves a prediction
|
21 |
+
accuracy of 85% and an F1-score of 62%. Such a tool can provide early warning to investors and
|
22 |
+
regulators that a pump&dump may be underway.
|
23 |
+
1
|
24 |
+
Introduction
|
25 |
+
New financial products and technologies have allowed naive investors to easily enter financial mar-
|
26 |
+
kets.
|
27 |
+
This has increased the risk of manipulation, and detecting and investigating fraudulent
|
28 |
+
activities has become much more difficult. Many go undetected [8].
|
29 |
+
Social media has created new methods for manipulating markets. A scheme known as Pump
|
30 |
+
and Dump (P&D) is one popular mechanism. Fraudsters buy quantities of a stock, disseminate
|
31 |
+
false information about it to artificially raise its price, and then sell their purchased shares at the
|
32 |
+
higher price. Social media provides a channel for rapid dissemination and a pool of investors with
|
33 |
+
little knowledge or experience who may not detect that the information is false.
|
34 |
+
Conventional approaches to detecting manipulation look for known patterns, and for anomalous
|
35 |
+
activity such as exceeded thresholds for prices and trading volumes. Suspicious activities can be
|
36 |
+
detected using sets of rules and triggers that cause notifications of potential manipulation. However,
|
37 |
+
those methods struggle in the presence of behaviours that deviate from historical patterns [16].
|
38 |
+
Previous work has also focused on detecting manipulations so that regulators can penalise those
|
39 |
+
who carry them out. This does little to help investors, either to prevent their being deceived or
|
40 |
+
recovering their investments.
|
41 |
+
1
|
42 |
+
arXiv:2301.11403v1 [cs.SI] 26 Jan 2023
|
43 |
+
|
44 |
+
Data-analytic techniques have the potential to detect false information as it being disseminated
|
45 |
+
[11, 25]. Natural language analytics can detect the posts in social media that are intended to pump
|
46 |
+
particular stocks, providing a real-time warning to potential investors. We investigate how well
|
47 |
+
P&D schemes can be detected in posts on social media, by matching the language patterns in the
|
48 |
+
posts to the pattern of stock price corresponding to a P&D manipulation.
|
49 |
+
A penny stock is a stock that is traded by a small public company for less than $5 per share
|
50 |
+
[24].
|
51 |
+
Many of these companies are known for their volatility due to their limited coverage by
|
52 |
+
analysts and interest from institutional buyers. Because of their low price, retail investors can buy
|
53 |
+
large quantities of these stocks without having to invest much money. This, however, makes their
|
54 |
+
prices volatile and so creates the potential for large returns on investments; but also leaves them
|
55 |
+
vulnerable to manipulation by malicious actors. One study found that 50% of manipulated stocks
|
56 |
+
are those with a small market capitalization [1].
|
57 |
+
It might be supposed that the connection between a social media post and a P&D event is too
|
58 |
+
tenuous to be detected – after all, not every post will have the desired effect, and a P&D might be
|
59 |
+
triggered by some less visible social media activity. We show that, at least for penny stocks, the
|
60 |
+
connection is reasonably detectable, and we achieve prediction accuracies (that a post is intended
|
61 |
+
to cause a P&D event) of 85%, with an F1 score of 67% (± 12 percentage points) from posts alone,
|
62 |
+
and 62% (± 3 percentage points) from posts and comments.
|
63 |
+
2
|
64 |
+
Tools
|
65 |
+
Stance detection is a technique to determine the attitude or viewpoint of a text towards a target.
|
66 |
+
It aims to detect whether the author of the text is in support of or against a given entity [21].
|
67 |
+
Some applications of stance detection have been in political debates, fake news, and social media
|
68 |
+
[15, 26, 30].
|
69 |
+
Empath is a tool that was developed by Fast et al. [13] for researchers to generate and validate
|
70 |
+
new lexical categories on demand. It uses deep learning to establish connections between words
|
71 |
+
and phrases used in modern fiction. Given a small set of seed words that represents a category,
|
72 |
+
Empath can provide new related terms using its neural embeddings. It also employs the use of
|
73 |
+
crowd-sourcing to validate the terms that it considers are related. Along with the ability to create
|
74 |
+
new categories, Empath comes with 200 built-in, pre-validated categories for common topics (e.g.,
|
75 |
+
neglect, government, social media).
|
76 |
+
SHAP (SHapley Additive exPlanation) is a tool that was developed by Lundberg and Lee [22]
|
77 |
+
to determine the impact of each attribute on the output of a predictive model. It is based on
|
78 |
+
Shapley values, a concept from game theory that determines a fair way to distribute the payoff for
|
79 |
+
players that have worked in coalition towards an outcome [33].
|
80 |
+
Extreme Gradient Boosting is a decision-tree based ensemble algorithm that has become known
|
81 |
+
for its speed and performance [5]. Decision trees are built sequentially so that each one reduces
|
82 |
+
the errors of the previous one [35]. Random Forests is a decision-tree based ensemble algorithm
|
83 |
+
with each tree built from a subset of the rows and columns of the dataset [34]. This allows for
|
84 |
+
variation among the trees and results in lower correlation among their predictions [37]. Support
|
85 |
+
Vector Machines are a supervised learning algorithm that finds a hyperplane that best separates
|
86 |
+
the data points from two classes [14].
|
87 |
+
Artificial Neural Networks are computational networks that are inspired by the biological ner-
|
88 |
+
vous system [10]. ANNs excel at prediction for data where the amount of information in each
|
89 |
+
2
|
90 |
+
|
91 |
+
Figure 1: Stages of Pump and Dump
|
92 |
+
attribute is small and there are non-linear interactions among them. Deep learning models are a
|
93 |
+
class of extensions to ANNs that have solved long standing prediction problems in image recogni-
|
94 |
+
tion and natural language [20]. Convolutional Neural Networks (CNNs) are a class of deep learning
|
95 |
+
networks that were designed initially to work with images but work surprisingly well with sequence
|
96 |
+
data such as texts as well. Long Short-Term Memory (LSTM) deep learning networks are a type of
|
97 |
+
recurrent neural network designed to handle the long-term dependencies present in sequence pre-
|
98 |
+
diction problems [4]. Understanding text often requires looking ahead (think of verbs in German)
|
99 |
+
and so processing text in both directions, using a biLSTM, provides better results for language [6].
|
100 |
+
3
|
101 |
+
Experiments
|
102 |
+
Within a typical online forum, there are two different categories of texts. The first is a post, which
|
103 |
+
initiates a discussion.
|
104 |
+
The second is a set of comments responding to the post.
|
105 |
+
For example,
|
106 |
+
an individual may post saying that, in their opinion, a stock’s price is about to rise, with others
|
107 |
+
respond by sharing their opinions in the same thread. Responders may agree with the original post,
|
108 |
+
or disagree.
|
109 |
+
P&D is an information-based manipulation, artificially raising the price of a stock through the
|
110 |
+
dissemination of false information. As shown in Figure 1, this manipulation strategy involves three
|
111 |
+
different stages [19]. The operators of the scheme first purchase the stock that they are planning
|
112 |
+
to manipulate (Accumulation). Once they have acquired enough shares, they will disseminate false
|
113 |
+
information to make it appear more desirable, driving up the price (Pump). Once the price has
|
114 |
+
risen to the desired level of profit, the operators sell off their shares before anyone uncovers that
|
115 |
+
the information has no basis or the hype dies down (Dump).
|
116 |
+
To identify P&Ds within the market, patterns associated with the scheme must be established.
|
117 |
+
3
|
118 |
+
|
119 |
+
Price
|
120 |
+
Accumulation
|
121 |
+
Pump
|
122 |
+
Dump
|
123 |
+
TimeWhile the method of conducting a P&D may vary, two indicators that can identify them are sharp
|
124 |
+
changes in price and volume [19]. A P&D will cause a significant price increase within a short
|
125 |
+
amount of time, larger than the fluctuations that the stock typically experiences; followed by a
|
126 |
+
decrease once the dump phase has begun. The volume also increases as the stock gains interest
|
127 |
+
among investors during and after the dissemination phase. However, the volume will typically not
|
128 |
+
immediately experience as sharp a decline as the price when the operators begin to dump their
|
129 |
+
shares because of the reluctance of investors to believe that the price is illusory.
|
130 |
+
If the profile of a P&D manipulation can be detected in the market, then the post that putatively
|
131 |
+
caused it can be straightforwardly labelled and its language patterns investigated. (Of course, it is
|
132 |
+
possible that some of the apparent connections are spurious, but it is relatively unlikely that a post
|
133 |
+
touting a particular stock will be disseminated exactly when the stock’s price and volume begin a
|
134 |
+
sharp rise).
|
135 |
+
Labelling comments is more complex, since the comments may agree with the original post, or
|
136 |
+
disagree. Only the language of those that agree can contribute to predicting a P&D event.
|
137 |
+
3.1
|
138 |
+
Data Sources
|
139 |
+
Two different data sources were utilized. The first is the popular online website Reddit, where users
|
140 |
+
discuss the stock market. The second is Yahoo Finance, a financial market website that provides
|
141 |
+
historical data about companies.
|
142 |
+
Reddit contains forums referred to as subreddits, each dedicated to the discussion of a specific
|
143 |
+
topic. Popular forums for the discussions of stocks are r/pennystocks, r/wallstreetbets, r/stocks,
|
144 |
+
r/RobinHoodPennyStocks, r/TheWallStreet. We use r/pennystocks and r/RobinHoodPennyStocks,
|
145 |
+
Yahoo Finance is a website provided by Yahoo for investors to access financial news, market
|
146 |
+
data, and basic financial tools. Given a stock symbol or company name, it provides the relevant
|
147 |
+
market data.
|
148 |
+
Classification techniques such as Extreme Gradient Boosting (XGBoost), Random Forests, Sup-
|
149 |
+
port Vector Machine (SVM), and Artificial Neural Networks (ANNs) were used to learn predictive
|
150 |
+
models, and then to identify which attributes (i.e. words) are most predictive. Figure 2 shows the
|
151 |
+
experimental workflow.
|
152 |
+
Figure 2: Experiment workflow
|
153 |
+
Data from Reddit and Yahoo Finance were collected daily for the period October 1, 2019, to
|
154 |
+
June 28, 2020. A breakdown of the data is shown in Table 1. The majority of the data is retrieved
|
155 |
+
4
|
156 |
+
|
157 |
+
Redldit
|
158 |
+
Yahoo!
|
159 |
+
Finance
|
160 |
+
Anomaly
|
161 |
+
Detection
|
162 |
+
Text
|
163 |
+
Labelling
|
164 |
+
Model
|
165 |
+
Model
|
166 |
+
Data
|
167 |
+
Preprocessing
|
168 |
+
Training
|
169 |
+
Testing
|
170 |
+
Historical Data
|
171 |
+
Agreement
|
172 |
+
Model
|
173 |
+
Data Retriever
|
174 |
+
Data Preparation
|
175 |
+
Dataset
|
176 |
+
Modelling
|
177 |
+
Model
|
178 |
+
Comparison/
|
179 |
+
EvaluationSubreddit
|
180 |
+
Number of Posts
|
181 |
+
Number of Comments
|
182 |
+
Total
|
183 |
+
r/pennystocks
|
184 |
+
12,049
|
185 |
+
234,149
|
186 |
+
246,198
|
187 |
+
r/RobinHoodPennyStocks
|
188 |
+
6,506
|
189 |
+
78,429
|
190 |
+
84,935
|
191 |
+
Total
|
192 |
+
18,555
|
193 |
+
312,578
|
194 |
+
331,133
|
195 |
+
Table 1: Breakdown of records collected from subreddits
|
196 |
+
Figure 3: Data Collection Volumes
|
197 |
+
from r/pennystocks, with about a third from r/RobinHoodPennyStocks. The number of comments
|
198 |
+
is much larger than the number of posts, with posts making up only about 5% of the texts.
|
199 |
+
As shown in Figure 3, there was a sharp increase in the number of submissions over the period
|
200 |
+
of data collection:
|
201 |
+
• r/pennystocks - 139,000 Members ⇒ 257,000 Members
|
202 |
+
• r/RobinHoodPennyStocks - 52,000 Members ⇒ 133,0000 Members
|
203 |
+
This seems to reflect an increase in amateur stock market investing because of the covid-19 pan-
|
204 |
+
demic, and a corresponding increase in manipulation. i.e, as manipulators look to take advantage of
|
205 |
+
new, naive investors during the pandemic. Alerts and press releases by the SEC and the Canadian
|
206 |
+
Securities Administrators warned new investors to be vigilant about the increasing number of P&D
|
207 |
+
schemes that have occurred around that time [9, 28, 29].
|
208 |
+
The median number of words per post or comment was 22, and the total number of distinct
|
209 |
+
words was 4,862.
|
210 |
+
Replacing stock symbols by the market sector to which each business belongs allows us to see
|
211 |
+
which sectors are discussed the most, and which are the targets of P&D. Figure 4 shows that
|
212 |
+
healthcare stocks are the most mentioned, followed by technology stocks. The pandemic clearly
|
213 |
+
had an effect on both attention to markets and manipulations. Temporal trends in the healthcare
|
214 |
+
5
|
215 |
+
|
216 |
+
10000
|
217 |
+
8000
|
218 |
+
Number of Records
|
219 |
+
6000
|
220 |
+
40.00
|
221 |
+
2000
|
222 |
+
DatesFigure 4: Histogram of market sectors discussed within subreddits
|
223 |
+
sector, Figure 5 , show an increase in online activity at the beginning of the pandemic, and then a
|
224 |
+
further increase in the middle of 2020. Figure 6 shows that P&D manipulations also increased in
|
225 |
+
2020.
|
226 |
+
Table 2 shows the information collected for each post and comment.
|
227 |
+
Data from Yahoo Finance was scraped using the yfinance tool [2]. Stock symbols were extracted
|
228 |
+
from Reddit posts. This step is non-trivial and required regular expression extraction, and look ups
|
229 |
+
against the publicly traded exchanges. Posts which mentioned more than one stock were discarded,
|
230 |
+
partly because of the complexity of deciding which stock may be being touted, and partly because
|
231 |
+
P&D posts typically focus on one particular stock they are pumping. If a stock symbol was found,
|
232 |
+
yfinance was used to collect the financial information described in Table 3.
|
233 |
+
As shown in Figure 7, the daily Open, High, Low, Close, and Volume (OHLCV) data was
|
234 |
+
collected over nine business days surrounding an event. Data was collected over five days before each
|
235 |
+
post event to establish a baseline for price and volume. Penny stocks almost always shows minor
|
236 |
+
variation in price and volume so this baseline is typically quite flat. The remaining four days contain
|
237 |
+
the pump event (sharp increase) followed by a decrease in price and a slower decrease in volume.
|
238 |
+
6
|
239 |
+
|
240 |
+
00008
|
241 |
+
70000
|
242 |
+
60000
|
243 |
+
of Records
|
244 |
+
50000
|
245 |
+
40000
|
246 |
+
30000
|
247 |
+
20000
|
248 |
+
10000
|
249 |
+
SectorConglomerates
|
250 |
+
SectorServices
|
251 |
+
SectorUtilities
|
252 |
+
SectorConsumerDefensive
|
253 |
+
SectorBasicMaterials
|
254 |
+
SectorRealEstate
|
255 |
+
SectorFinancialServices
|
256 |
+
SectorEnergy
|
257 |
+
Sectorlndustrials
|
258 |
+
SectorCommunicationServices
|
259 |
+
SectorUnknown
|
260 |
+
SectorTechnology
|
261 |
+
SectorHealthcare
|
262 |
+
SectorsFigure 5: Trend of posts and comments that discussed healthcare stocks
|
263 |
+
Feature
|
264 |
+
Description
|
265 |
+
Post Title
|
266 |
+
Title of the post.
|
267 |
+
Post ID
|
268 |
+
Unique identification code for post.
|
269 |
+
Post Author
|
270 |
+
Author of the post.
|
271 |
+
Post Created
|
272 |
+
Unix Timestamp of when post was submitted.
|
273 |
+
Post Body
|
274 |
+
Text of the post.
|
275 |
+
Comment ID
|
276 |
+
Unique identification code for comment.
|
277 |
+
Comment Author
|
278 |
+
Author of the comment.
|
279 |
+
Comment Created
|
280 |
+
Unix Timestamp of when comment was submit-
|
281 |
+
ted.
|
282 |
+
Comment Body
|
283 |
+
Text of the comment.
|
284 |
+
Table 2: Features of collected Reddit data
|
285 |
+
Sabherwal et al. [27] studied the effects of online message boards on market manipulation and
|
286 |
+
found that dumps typically occur within four days and this is plausible because the manipulators
|
287 |
+
want to sell as soon as the price reaches a peak.
|
288 |
+
Texts from subreddits were preprocessed using the following steps: remove URLs, expand con-
|
289 |
+
tractions, remove HTML Tags, remove punctuation, remove extra whitespaces, remove numbers,
|
290 |
+
lemmatization, and remove stopwords.
|
291 |
+
Stock symbols within the text were replaced by dummy stock names representing the market
|
292 |
+
sector associated with each business. This is required because the name of the particular stock
|
293 |
+
being pumped and dumped in one case has nothing to do with the name of the stock being used
|
294 |
+
in another case – but there might be correspondences within sectors. Here is an example:
|
295 |
+
7
|
296 |
+
|
297 |
+
4000
|
298 |
+
3500
|
299 |
+
3000
|
300 |
+
of Records
|
301 |
+
25:00
|
302 |
+
Yumber
|
303 |
+
2000
|
304 |
+
15:00
|
305 |
+
1000
|
306 |
+
500
|
307 |
+
DatesFigure 6: Trend of posts that have been labelled as P&D
|
308 |
+
Feature
|
309 |
+
Description
|
310 |
+
Open
|
311 |
+
Opening price of the stock for the given period.
|
312 |
+
High
|
313 |
+
Highest price for the stock within the given pe-
|
314 |
+
riod.
|
315 |
+
Low
|
316 |
+
Lowest price for the stock within the given pe-
|
317 |
+
riod.
|
318 |
+
Close
|
319 |
+
Closing price of the stock for the given period.
|
320 |
+
Volume
|
321 |
+
Total number of shares traded within the given
|
322 |
+
period.
|
323 |
+
Market Sector
|
324 |
+
Associated industry that the company is in.
|
325 |
+
Market Capitalization
|
326 |
+
Total market value of the company’s outstand-
|
327 |
+
ing shares.
|
328 |
+
Table 3: Features of Yahoo! Finance data
|
329 |
+
• “AYTU perfect time to buy” ⇒ “SectorHealthcare perfect time to buy”
|
330 |
+
3.2
|
331 |
+
Data Labelling
|
332 |
+
To label each post, stock data surrounding the day in which the post was submitted to Reddit
|
333 |
+
were analyzed. If the market data exhibited that pattern associated with P&D (a notable rise from
|
334 |
+
the time of the post, followed by a sharp drop) then the post was labelled accordingly. A rise was
|
335 |
+
detected by calculating the average price and volume in the five-day window before the post. The
|
336 |
+
8
|
337 |
+
|
338 |
+
120
|
339 |
+
100
|
340 |
+
Posts
|
341 |
+
Number of i
|
342 |
+
60
|
343 |
+
40
|
344 |
+
20
|
345 |
+
DatesFigure 7: Time window used to collect market data.
|
346 |
+
daily average price (DAP) of the values was first calculated for each of the five days.
|
347 |
+
DAP(Xt) = 1
|
348 |
+
4(Xtopen + Xthigh + Xtlow + Xtclose)
|
349 |
+
(1)
|
350 |
+
and then the baseline average price (BAP) was calculated by
|
351 |
+
BAP(Xest) = 1
|
352 |
+
5 ·
|
353 |
+
T1
|
354 |
+
�
|
355 |
+
t=T0
|
356 |
+
DAP(Xt)
|
357 |
+
(2)
|
358 |
+
The baseline average volume (BAV) was calculated by taking the average of the volume values
|
359 |
+
over the estimation window.
|
360 |
+
BAV (Xest) = 1
|
361 |
+
5 ·
|
362 |
+
T1
|
363 |
+
�
|
364 |
+
t=T0
|
365 |
+
Xtvolume
|
366 |
+
(3)
|
367 |
+
A threshold was set at two standard deviations above the average price within the five-day
|
368 |
+
estimation window. Price increases above this threshold were considered to be pump events. A
|
369 |
+
similar threshold was used to define a volume anomaly. Events were considered to be the result of
|
370 |
+
P&D if they exceeded the threshold for both price and volume. Figure 8 shows a comparison of
|
371 |
+
the stock behaviours labelled using this approach.
|
372 |
+
A sudden price rise or volume increase might coincide with a post, but is not necessarily caused
|
373 |
+
by it. The rising region of each stock trend of a potential P&D event was min-max normalised,
|
374 |
+
9
|
375 |
+
|
376 |
+
Reddit Post Date
|
377 |
+
Price
|
378 |
+
Event
|
379 |
+
To
|
380 |
+
T2
|
381 |
+
Volume
|
382 |
+
27
|
383 |
+
29
|
384 |
+
May
|
385 |
+
5
|
386 |
+
11
|
387 |
+
Estimation
|
388 |
+
Event
|
389 |
+
Window (5 Days)
|
390 |
+
Window (4 Days)Figure 8: Comparison of stock behaviours that have been labelled using anomaly detection
|
391 |
+
and its slope calculated. Steep price increases are more likely to arise from genuine information
|
392 |
+
and less likely to have resulted from a single manipulation post, so the median slope across the
|
393 |
+
entire dataset was calculated, and only slopes below the median were considered as potential P&D
|
394 |
+
events. Figure 9 shows the distribution of stock price trend slopes from the entire the dataset. The
|
395 |
+
median value is 0.18.
|
396 |
+
3.3
|
397 |
+
Agreement Model
|
398 |
+
The comments associated with the P&D post cannot all be labelled as examples of P&D language,
|
399 |
+
since not all of them will be supportive of the post they are responding to. Manipulators, of course,
|
400 |
+
will post comments in support of the post, either from the same identity or from others.
|
401 |
+
We developed an agreement model, using ideas from stance detection. This was done using
|
402 |
+
Empath to generate a lexicon of agreement, seeding it with the words: bought, agree, positive,
|
403 |
+
increasing, good, and now. Empath returned the words listed in Table 4. Posts touting stocks
|
404 |
+
also use a specialised vocabulary, shown in these examples.
|
405 |
+
• “probably go to shoot up tomorrow”
|
406 |
+
10
|
407 |
+
|
408 |
+
TRNX2020-04-16
|
409 |
+
CCO2020-03-31
|
410 |
+
USWS2020-06-07
|
411 |
+
GNUS2020-06-09
|
412 |
+
Stockbehaviours
|
413 |
+
Stockbehaviours
|
414 |
+
labelledasP&D
|
415 |
+
labelledasnotP&DFigure 9: Distribution of stock price trend slopes
|
416 |
+
only
|
417 |
+
done
|
418 |
+
better
|
419 |
+
true
|
420 |
+
knew
|
421 |
+
besides
|
422 |
+
like
|
423 |
+
maybe
|
424 |
+
wanted
|
425 |
+
liked
|
426 |
+
also
|
427 |
+
important
|
428 |
+
buying
|
429 |
+
understand
|
430 |
+
good
|
431 |
+
understood
|
432 |
+
needed
|
433 |
+
work
|
434 |
+
because
|
435 |
+
successful
|
436 |
+
knowing
|
437 |
+
grateful
|
438 |
+
plus
|
439 |
+
much
|
440 |
+
reasonable
|
441 |
+
should
|
442 |
+
give
|
443 |
+
happy
|
444 |
+
course
|
445 |
+
glad
|
446 |
+
well
|
447 |
+
considering
|
448 |
+
anyway
|
449 |
+
agree
|
450 |
+
meaning
|
451 |
+
great
|
452 |
+
probably
|
453 |
+
sure
|
454 |
+
thought
|
455 |
+
guaranteed
|
456 |
+
more
|
457 |
+
honestly
|
458 |
+
positive
|
459 |
+
thankful
|
460 |
+
actually
|
461 |
+
agreed
|
462 |
+
special
|
463 |
+
doubt
|
464 |
+
guess
|
465 |
+
though
|
466 |
+
bet
|
467 |
+
buy
|
468 |
+
surpass
|
469 |
+
worth
|
470 |
+
suppose
|
471 |
+
although
|
472 |
+
especially
|
473 |
+
definitely
|
474 |
+
certain
|
475 |
+
figured
|
476 |
+
given
|
477 |
+
means
|
478 |
+
Table 4: List of generated agreement words from Empath
|
479 |
+
• “this bad boy just rocket”
|
480 |
+
• “i will see you on the moon”
|
481 |
+
An extended lexicon was determined manually by inspecting posts associated with manipulation.
|
482 |
+
Table 5 contains the list of words that were chosen using this approach.
|
483 |
+
Comments were labelled as associated with pumping if they contained two or more of the
|
484 |
+
11
|
485 |
+
|
486 |
+
1200
|
487 |
+
1000
|
488 |
+
800
|
489 |
+
Number of Posts
|
490 |
+
600
|
491 |
+
400
|
492 |
+
200moon
|
493 |
+
fast
|
494 |
+
massive
|
495 |
+
rich
|
496 |
+
surprise
|
497 |
+
rocket
|
498 |
+
profit
|
499 |
+
top
|
500 |
+
easy
|
501 |
+
move
|
502 |
+
pump
|
503 |
+
rally
|
504 |
+
peak
|
505 |
+
early
|
506 |
+
load
|
507 |
+
soar
|
508 |
+
climb
|
509 |
+
worth
|
510 |
+
shoot
|
511 |
+
quick
|
512 |
+
jump
|
513 |
+
rise
|
514 |
+
sale
|
515 |
+
money
|
516 |
+
burst
|
517 |
+
pop
|
518 |
+
high
|
519 |
+
gain
|
520 |
+
breakout
|
521 |
+
drive
|
522 |
+
hype
|
523 |
+
spike
|
524 |
+
run
|
525 |
+
cash
|
526 |
+
nice
|
527 |
+
fly
|
528 |
+
go
|
529 |
+
up
|
530 |
+
hit
|
531 |
+
bank
|
532 |
+
awesome
|
533 |
+
confident
|
534 |
+
surpass
|
535 |
+
more
|
536 |
+
zoom
|
537 |
+
big
|
538 |
+
great
|
539 |
+
potential
|
540 |
+
advantage
|
541 |
+
Table 5: List of custom words used in the Agreement Model
|
542 |
+
agreement words, or if they were (visibly) authored by the original poster. The following are some
|
543 |
+
examples of comments that were labelled as not P&D related based on the agreement model:
|
544 |
+
• “it be the american dream to fall for snake oil salesman and then lose everything it be a story
|
545 |
+
as old as humanity”
|
546 |
+
• “clearly a pump and dump scheme”
|
547 |
+
• “do not touch it if the chart look like a hockey stick”
|
548 |
+
This labelling of comments is limited by the completeness of the agreement lexicon, and also does
|
549 |
+
not account for negations.
|
550 |
+
P&D posts and comments are relatively rare and so the dataset is naturally imbalanced. Tech-
|
551 |
+
niques such as SMOTE [3] and ADASYN [17] were tried but proved ineffective. Instead, where
|
552 |
+
predictors allowed it, class weight parameters were set to penalise mistakes in the minority class.
|
553 |
+
3.4
|
554 |
+
Modelling
|
555 |
+
The following predictors were used:
|
556 |
+
• Extreme Gradient Boosting (XGBoost)
|
557 |
+
• Random Forest (RF)
|
558 |
+
• Support Vector Machine (SVM)
|
559 |
+
• Artificial Neural Networks
|
560 |
+
– Multilayer Perceptron (MLP)
|
561 |
+
– Convolutional Neural Network (CNN)
|
562 |
+
– Bidirectional Long Short Term Memory (BiLSTM)
|
563 |
+
In each case the standard performance measures (accuracy, precision, recall, F1-Score, confusion
|
564 |
+
matrix) were calculated, as well as the Shapley values which rank words by their importance to the
|
565 |
+
predictions.
|
566 |
+
12
|
567 |
+
|
568 |
+
Record Type
|
569 |
+
P&D
|
570 |
+
Not P&D
|
571 |
+
Total
|
572 |
+
Posts
|
573 |
+
3,006
|
574 |
+
15,549
|
575 |
+
18,555
|
576 |
+
Comment
|
577 |
+
26,727
|
578 |
+
285,851
|
579 |
+
312,578
|
580 |
+
Total
|
581 |
+
29,733
|
582 |
+
312,142
|
583 |
+
331,133
|
584 |
+
Table 6: Dataset class distribution
|
585 |
+
Model
|
586 |
+
TP
|
587 |
+
FP
|
588 |
+
TN
|
589 |
+
FN
|
590 |
+
Accuracy
|
591 |
+
Precision
|
592 |
+
Recall
|
593 |
+
F1-Score
|
594 |
+
XGBoost Posts
|
595 |
+
1728
|
596 |
+
6615
|
597 |
+
8934
|
598 |
+
1278
|
599 |
+
57.46 (±3.73)
|
600 |
+
20.71 (±0.48)
|
601 |
+
57.49 (±0.68)
|
602 |
+
30.45 (±2.25)
|
603 |
+
XGBoost Posts and Comments
|
604 |
+
2007
|
605 |
+
7646
|
606 |
+
7903
|
607 |
+
999
|
608 |
+
53.41 (±1.42)
|
609 |
+
20.79 (±0.85)
|
610 |
+
66.77 (±1.58)
|
611 |
+
31.71 (±0.96)
|
612 |
+
RF Posts
|
613 |
+
271
|
614 |
+
646
|
615 |
+
14903
|
616 |
+
2735
|
617 |
+
81.78 (±0.51)
|
618 |
+
29.55 (±1.40)
|
619 |
+
9.01 (±0.52)
|
620 |
+
13.81 (±0.78)
|
621 |
+
RF Posts and Comments
|
622 |
+
414
|
623 |
+
211
|
624 |
+
15338
|
625 |
+
2592
|
626 |
+
84.89 (±0.69)
|
627 |
+
66.24 (±1.69)
|
628 |
+
13.77 (±0.47)
|
629 |
+
22.80 (±0.75)
|
630 |
+
SVM Posts
|
631 |
+
1752
|
632 |
+
5263
|
633 |
+
10286
|
634 |
+
1254
|
635 |
+
64.88 (±1.14)
|
636 |
+
24.98 (±0.76)
|
637 |
+
58.28 (±1.05)
|
638 |
+
34.97 (±1.16)
|
639 |
+
SVM Posts and Comments
|
640 |
+
2125
|
641 |
+
4559
|
642 |
+
10990
|
643 |
+
881
|
644 |
+
70.6 (±0.49)
|
645 |
+
31.79 (±0.43)
|
646 |
+
70.69 (±0.56)
|
647 |
+
43.86 (±0.57)
|
648 |
+
MLP Posts
|
649 |
+
2382
|
650 |
+
1718
|
651 |
+
13831
|
652 |
+
624
|
653 |
+
87.38 (±6.66)
|
654 |
+
58.10 (±11.65)
|
655 |
+
79.24 (±12.76)
|
656 |
+
67.04 (±12.12)
|
657 |
+
MLP Posts and Comments
|
658 |
+
2103
|
659 |
+
2602
|
660 |
+
12947
|
661 |
+
903
|
662 |
+
81.11 (±3.71)
|
663 |
+
44.70 (±4.28)
|
664 |
+
69.96 (±3.80)
|
665 |
+
54.55 (±4.36)
|
666 |
+
CNN Posts
|
667 |
+
2373
|
668 |
+
1709
|
669 |
+
13840
|
670 |
+
633
|
671 |
+
87.38 (±7.04)
|
672 |
+
58.13 (±12.02)
|
673 |
+
78.94 (±12.76)
|
674 |
+
66.96 (±12.37)
|
675 |
+
CNN Posts and Comments
|
676 |
+
2304
|
677 |
+
2068
|
678 |
+
13481
|
679 |
+
702
|
680 |
+
85.07 (±1.25)
|
681 |
+
52.70 (±2.33)
|
682 |
+
76.65 (±3.45)
|
683 |
+
62.46 (±2.64)
|
684 |
+
biLSTM Posts
|
685 |
+
2297
|
686 |
+
2495
|
687 |
+
13054
|
688 |
+
709
|
689 |
+
82.73 (±8.11)
|
690 |
+
47.93 (±9.92)
|
691 |
+
76.41 (±10.94)
|
692 |
+
58.91 (±10.82)
|
693 |
+
biLSTM Posts and Comments
|
694 |
+
2288
|
695 |
+
2370
|
696 |
+
13179
|
697 |
+
718
|
698 |
+
83.36 (±2.27)
|
699 |
+
49.12 (±3.25)
|
700 |
+
76.11 (±3.86)
|
701 |
+
59.71 (±3.54)
|
702 |
+
Table 7: Summary of model performance
|
703 |
+
4
|
704 |
+
Results
|
705 |
+
Table 6 shows the class distribution for the dataset. Less than 9% of the records are labelled as
|
706 |
+
being P&D. This is typical of datasets where fraud is present; indeed it is striking that the rate of
|
707 |
+
fraud is this high.
|
708 |
+
The results of each of the predictive model are reported in Table 7 using 5-fold cross validation
|
709 |
+
and upweighting the fraud class when the model permits it.
|
710 |
+
The neural network models perform well as expected.
|
711 |
+
Models such as XGBoost, Random
|
712 |
+
Forests, and SVM had disappointing performance, and a heterogeneous stacked classifier combining
|
713 |
+
their predictions did not improve on the performance of the individual predictors, suggesting that
|
714 |
+
they make their errors on the same records.
|
715 |
+
At first glance, the ANN models using posts perform better than those using posts and com-
|
716 |
+
ments. However, the standard deviations of the performance numbers show that the inclusion of
|
717 |
+
comments provides stability for correctly identifying P&D posts. The best performing model over-
|
718 |
+
all is CNN, especially with comments included. Its precision is relatively low; of all the records that
|
719 |
+
the model predicts to be P&D, only 52.7% are actually correct. If we look at the rate at which each
|
720 |
+
class is predicted to be positive, a better outlook of the model is provided. Given a positive P&D
|
721 |
+
text, the model has a 76.65% chance of classifying it correctly, whereas, if it is given a negative
|
722 |
+
text, it has a 13.3% chance of classifying it incorrectly as positive. It is perhaps a little surprising
|
723 |
+
that biLSTM did not perform best since they are typically strong predictors for natural language
|
724 |
+
problems.
|
725 |
+
The SHAP Explainers produce diagrams that rank the attributes by their impact on outcomes.
|
726 |
+
Figure 10 shows the diagram for the CNN predictor for posts and comments and the 30 most
|
727 |
+
impactful words. Although the influence of any single word is inevitably weak, there are visible
|
728 |
+
red dots to the right for many of these words, indicating that higher frequencies of these words are
|
729 |
+
associated with P&D events. The names of the popular sectors are indicator of P&Ds, as are words
|
730 |
+
13
|
731 |
+
|
732 |
+
Predicted Label
|
733 |
+
Actual Label
|
734 |
+
Misclassified Post
|
735 |
+
P&D
|
736 |
+
Not P&D
|
737 |
+
sectorunknown about to soar
|
738 |
+
P&D
|
739 |
+
Not P&D
|
740 |
+
sectorunknown fitness equipment maker owner
|
741 |
+
of bow flex completely sell out of most retail
|
742 |
+
store how be this look just buy in share
|
743 |
+
P&D
|
744 |
+
Not P&D
|
745 |
+
quick all in sectorcommunicationservices pump
|
746 |
+
my first time actually do something right the
|
747 |
+
lambos go to be green for gain
|
748 |
+
P&D
|
749 |
+
Not P&D
|
750 |
+
blast off look like gold and oil will be big player
|
751 |
+
this i also suggest look at sectortechnology
|
752 |
+
P&D
|
753 |
+
Not P&D
|
754 |
+
sectorenergy drop time to buy it be drop below
|
755 |
+
which be its day low be it a good time to buy
|
756 |
+
Not P&D
|
757 |
+
P&D
|
758 |
+
sectortechnology release patent news on thermal
|
759 |
+
tech could be a mark sympathy play bust out
|
760 |
+
over
|
761 |
+
Not P&D
|
762 |
+
P&D
|
763 |
+
sectorhealthcare do anyone understand why sec-
|
764 |
+
torhealthcare shoot up soo much i be not able
|
765 |
+
to find any real catalyst
|
766 |
+
Not P&D
|
767 |
+
P&D
|
768 |
+
sectorhealthcare on the move this have potential
|
769 |
+
reach today
|
770 |
+
Not P&D
|
771 |
+
P&D
|
772 |
+
sectorhealthcare to the moon
|
773 |
+
Not P&D
|
774 |
+
P&D
|
775 |
+
any thought on when to sell sectorenergy bought
|
776 |
+
in late i be up after hour should i wait til tomor-
|
777 |
+
row or sell as soon as possible in the am
|
778 |
+
Table 8: Examples of misclassified posts from CNN model
|
779 |
+
from the agreement model such as “buy” and “go”. Across the best performing models, the same
|
780 |
+
set of words emerge as the most impactful features (not shown).
|
781 |
+
Misclassifications by the model have different impacts depending on how and where it is used.
|
782 |
+
For an ordinary investor, a false positive (a post predicted to be a P&D when it isn’t) means a
|
783 |
+
missed opportunity for profit, but a false negative means a financial loss. For a regulatory body, a
|
784 |
+
false positive is problematic, but a false negative less so. Table 8 shows some of the examples of
|
785 |
+
misclassifications by the CNN model.
|
786 |
+
Some false positives, predicted to be P&D from the text, but without a corresponding market
|
787 |
+
movement may be instances where the post failed to attract enough attention to cause a measurable
|
788 |
+
market movement, or was so blatant that it was not credible to typical investors.
|
789 |
+
Some false
|
790 |
+
negatives may be because the posts were too short to contain the required two words, because the
|
791 |
+
pumping took place on another platform or because a market movement happened to match the
|
792 |
+
timing of the post.
|
793 |
+
14
|
794 |
+
|
795 |
+
5
|
796 |
+
Related work
|
797 |
+
The application of data analytics for detecting market manipulation is a relatively new in the
|
798 |
+
field of finance. Most research has focused on detecting trade-based manipulation because it is
|
799 |
+
most common [32]. Huang and Chang found that of the manipulation cases prosecuted in Taiwan
|
800 |
+
from 1991 to 2010, 96.61% were trade-based, and only 3.39% were information-based [18]. Some
|
801 |
+
examples detecting trade-based manipulation are: Ogut et al. [38] in the emerging Istanbul Stock
|
802 |
+
Exchange, Wang et al. [32] for prosecuted manipulation cases reported by the China Securities
|
803 |
+
Regulatory Commission, Cao et al. [7] using real trading data from four popular NASDAQ stocks
|
804 |
+
with synthetic cases of manipulation (spoofing and quote stuffing), Cao et al. [36] using seven
|
805 |
+
popular NASDAQ and LSE stocks data injecting ten simulated stock price manipulations, Diaz et
|
806 |
+
al. [12] using manipulation cases pursued by the U.S. Securities and Exchange Commission (SEC)
|
807 |
+
in 2003, and Golomohammadi et al. [16] trying to detect three groups of manipulation schemes:
|
808 |
+
marking the close, wash trades, and cornering the market.
|
809 |
+
For information-based manipulation, Victor and Hagemann [31] looked at 149 confirmed P&D
|
810 |
+
schemes coordinated through Telegram chats and pumped via Twitter. Using XGBoost, they built
|
811 |
+
a model that achieved a sensitivity of 85% and specificity of 99%. They concluded that P&Ds were
|
812 |
+
frequent among cryptocurrencies that had a market capitalization of $50 million or below and often
|
813 |
+
involved trading volumes of several hundred thousand dollars within a short time-frame.
|
814 |
+
Mirtaheri et al. [23] looked specifically at forecasting P&Ds by combining the information from
|
815 |
+
Twitter and Telegram. They manually labelled known P&D operation messages on Telegram, and
|
816 |
+
then used SVMs with a stochastic gradient descent optimizer to label the remaining messages as
|
817 |
+
P&D or not. They used Random Forests to detect whether a manipulation event was going to take
|
818 |
+
place within the market. Their results showed that they were able to detect, with reasonable accu-
|
819 |
+
racy, whether there is an unfolding manipulation scheme occurring on Telegram. Their proposed
|
820 |
+
model was able to achieve an accuracy of 87% and an F1-Score of 90%.
|
821 |
+
Some partially automated tools have also been developed.
|
822 |
+
These flag suspicious activities
|
823 |
+
that can then by investigated by regulators.
|
824 |
+
Delort et al.
|
825 |
+
[11] used Naive Bayes classifiers to
|
826 |
+
examine collected messages from HotCopper, an Australian stock message board. They successfully
|
827 |
+
identified messages of concern, but the number of false positives was too high to use the model
|
828 |
+
in an automated way. Owda et al. [25] compared messages to lexicon templates of known illegal
|
829 |
+
financial activities (e.g. Pump and Dump, Insider Information). They found that, of the 3000
|
830 |
+
comments that were collected on a daily basis, 0.2% were deemed suspicious.
|
831 |
+
6
|
832 |
+
Conclusion
|
833 |
+
The intersection of social media with low-cost trading platforms and naive investors has made
|
834 |
+
market manipulation an attractive strategy.
|
835 |
+
Pump&dump is particularly simple to implement
|
836 |
+
since it requires only the dissemination of fictional information about the future prospects for a
|
837 |
+
stock. This is particular easy for penny stocks where validating information is difficult for ordinary
|
838 |
+
investors, and where relatively small purchase volumes can cause large price movements.
|
839 |
+
We investigate protecting investors, and assisting regulators, by building predictive models that
|
840 |
+
label social media posts (and the responses they elicit) as potential drivers of P&D events. We
|
841 |
+
do this by collecting posts and comments, developing a model for a P&D event based on patterns
|
842 |
+
of price and volume changes, using the match between posts and P&D events to label posts, and
|
843 |
+
15
|
844 |
+
|
845 |
+
extending this labelling to comments using an agreement model. Natural language predictors then
|
846 |
+
learn the language patterns associated with P&D manipulations, so that new manipulations can
|
847 |
+
be detected before they affect the market.
|
848 |
+
Data is imbalanced, since manipulations are rare, but our best predictive model achieves an
|
849 |
+
F1-score of 62% and an accuracy of 85%. Improvements in performance are limited by potential
|
850 |
+
coincidences between a post and a price and volume change that mimics a P&D, posts that fail to
|
851 |
+
reach a sufficient audience to cause the desired buying behaviour, and natural language issues that
|
852 |
+
arise from informal and short texts, and a specialised vocabulary used in stock discussion forums.
|
853 |
+
References
|
854 |
+
[1] R.K. Aggarwal and Guojun Wu.
|
855 |
+
Stock Market Manipulations.
|
856 |
+
The Journal of Business,
|
857 |
+
79(4):1915–1953, July 2006.
|
858 |
+
[2] Ran Aroussi.
|
859 |
+
yfinance.
|
860 |
+
https://aroussi.com/post/python-yahoo-finance, Accessed:
|
861 |
+
2021-09-02.
|
862 |
+
[3] Kevin W. Bowyer, Nitesh V. Chawla, Lawrence O. Hall, and W. Philip Kegelmeyer. SMOTE:
|
863 |
+
Synthetic Minority Over-sampling Technique. CoRR, abs/1106.1813, 2011.
|
864 |
+
[4] Jason Brownlee.
|
865 |
+
A Gentle Introduction to Long Short-Term Memory Networks by the
|
866 |
+
Experts, Feb 2020. https://machinelearningmastery.com/gentle-introduction-long-
|
867 |
+
short-term-memory-networks-experts/, Accessed: 2021-09-17.
|
868 |
+
[5] Jason Brownlee.
|
869 |
+
A Gentle Introduction to XGBoost for Applied Machine Learning, Apr
|
870 |
+
2020.
|
871 |
+
https://machinelearningmastery.com/gentle-introduction-xgboost-applied-
|
872 |
+
machine-learning/, Accessed: 2021-09-15.
|
873 |
+
[6] Jason Brownlee. How to Develop a Bidirectional LSTM For Sequence Classification in Python
|
874 |
+
with Keras, Aug 2020. https://machinelearningmastery.com/develop-bidirectional-
|
875 |
+
lstm-sequence-classification-python-keras/, Accessed: 2021-09-18.
|
876 |
+
[7] Yi Cao, Yuhua Li, Sonya Coleman, Ammar Belatreche, and T M McGinnity. Detecting Price
|
877 |
+
Manipulation in the Financial Market.
|
878 |
+
In Proceedings of the IEEE/IAFE Computational
|
879 |
+
Intelligence for Financial Engineering (CIFEr), page 8, March 2014.
|
880 |
+
[8] Carole Comerton-Forde and T¯alis J. Putni¸nˇs.
|
881 |
+
Stock Price Manipulation: Prevalence and
|
882 |
+
Determinants. Review of Finance, 18(1):23–66, 03 2013.
|
883 |
+
[9] Canadian securities regulators warn public of coronavirus-related investment scams, Mar 2020.
|
884 |
+
https://www.securities-administrators.ca/aboutcsa.aspx?id=1878, Accessed:
|
885 |
+
2021-
|
886 |
+
09-06.
|
887 |
+
[10] James Dacombe.
|
888 |
+
An introduction to Artificial Neural Networks (with example), Oct
|
889 |
+
2017.
|
890 |
+
https://medium.com/@jamesdacombe/an-introduction-to-artificial-neural-
|
891 |
+
networks-with-example-ad459bb6941b, Accessed: 2021-09-16.
|
892 |
+
[11] Jean-Yves Delort, Bavani Arunasalam, and Cecile Paris.
|
893 |
+
Automatic moderation of online
|
894 |
+
discussion sites. International Journal of Electronic Commerce, 15(3):9–30, 2011.
|
895 |
+
16
|
896 |
+
|
897 |
+
[12] David Diaz, Babis Theodoulidis, and Pedro Sampaio. Analysis of stock market manipulations
|
898 |
+
using knowledge discovery techniques applied to intraday trade prices. Expert Systems with
|
899 |
+
Applications, 38(10):12757–12771, September 2011.
|
900 |
+
[13] Ethan Fast, Binbin Chen, and Michael S. Bernstein. Empath: Understanding Topic Signals in
|
901 |
+
Large-Scale Text. In Proceedings of the 2016 CHI Conference on Human Factors in Computing
|
902 |
+
Systems, pages 4647–4657, San Jose California USA, May 2016. ACM.
|
903 |
+
[14] Rohith Gandhi.
|
904 |
+
Support Vector Machine - Introduction to Machine Learning Algorithms,
|
905 |
+
Jul 2018.
|
906 |
+
https://towardsdatascience.com/support-vector-machine-introduction-
|
907 |
+
to-machine-learning-algorithms-934a444fca47, Accessed: 2021-09-15.
|
908 |
+
[15] Bilal Ghanem, Paolo Rosso, and Francisco Rangel.
|
909 |
+
Stance detection in fake news a com-
|
910 |
+
bined feature representation. In Proceedings of the First Workshop on Fact Extraction and
|
911 |
+
VERification (FEVER), pages 66–71, Brussels, Belgium, November 2018. Association for Com-
|
912 |
+
putational Linguistics.
|
913 |
+
[16] Koosha Golmohammadi, Osmar R. Zaiane, and David Diaz. Detecting stock market manipu-
|
914 |
+
lation using supervised learning algorithms. In 2014 International Conference on Data Science
|
915 |
+
and Advanced Analytics (DSAA), pages 435–441, Shanghai, China, October 2014. IEEE.
|
916 |
+
[17] Haibo He, Yang Bai, E. A. Garcia, and Shutao Li. ADASYN: Adaptive synthetic sampling
|
917 |
+
approach for imbalanced learning. In 2008 IEEE International Joint Conference on Neural
|
918 |
+
Networks (IEEE World Congress on Computational Intelligence), pages 1322–1328, 2008.
|
919 |
+
[18] Yu Chuan Huang and Yao Jen Cheng. Stock manipulation and its effects: pump and dump
|
920 |
+
versus stabilization. Review of Quantitative Finance and Accounting, 44(4):791–815, May 2015.
|
921 |
+
[19] Josh Kamps and Bennett Kleinberg. To the moon: defining and detecting cryptocurrency
|
922 |
+
pump and dumps. Crime Science, 7(1):18, December 2018.
|
923 |
+
[20] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):436–444,
|
924 |
+
May 2015.
|
925 |
+
[21] Yingjie Li and Cornelia Caragea. Multi-task stance detection with sentiment and stance lexi-
|
926 |
+
cons. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Pro-
|
927 |
+
cessing and the 9th International Joint Conference on Natural Language Processing (EMNLP-
|
928 |
+
IJCNLP), pages 6299–6305, Hong Kong, China, November 2019. Association for Computa-
|
929 |
+
tional Linguistics.
|
930 |
+
[22] Scott M Lundberg and Su-In Lee. A Unified Approach to Interpreting Model Predictions. In
|
931 |
+
I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett,
|
932 |
+
editors, Advances in Neural Information Processing Systems 30, pages 4765–4774. Curran
|
933 |
+
Associates, Inc., 2017.
|
934 |
+
[23] Mehrnoosh Mirtaheri, Sami Abu-El-Haija, Fred Morstatter, Greg Ver Steeg, and Aram Gal-
|
935 |
+
styan. Identifying and Analyzing Cryptocurrency Manipulations in Social Media. preprint,
|
936 |
+
Open Science Framework, February 2019.
|
937 |
+
17
|
938 |
+
|
939 |
+
[24] Chris B. Murphy.
|
940 |
+
Penny Stock, Aug 2020.
|
941 |
+
https://www.investopedia.com/terms/p/
|
942 |
+
pennystock.asp, Accessed: 2021-09-02.
|
943 |
+
[25] Majdi Owda, Pei Shyuan Lee, and Keeley Crockett. Financial Discussion Boards Irregulari-
|
944 |
+
ties Detection System (FDBs-IDS) using information extraction. In 2017 Intelligent Systems
|
945 |
+
Conference (IntelliSys), pages 1078–1082, London, September 2017. IEEE.
|
946 |
+
[26] Ashwin Rajadesingan and Huan Liu. Identifying users with opposing opinions in Twitter de-
|
947 |
+
bates. In William G. Kennedy, Nitin Agarwal, and Shanchieh Jay Yang, editors, Social Com-
|
948 |
+
puting, Behavioral-Cultural Modeling and Prediction, pages 153–160, Cham, 2014. Springer
|
949 |
+
International Publishing.
|
950 |
+
[27] Sanjiv Sabherwal, Salil K. Sarkar, and Ying Zhang. Do Internet Stock Message Boards In-
|
951 |
+
fluence Trading? Evidence from Heavily Discussed Stocks with No Fundamental News: Do
|
952 |
+
Internet Stock Message Boards Influence Trading? Journal of Business Finance & Accounting,
|
953 |
+
38(9-10):1209–1237, November 2011.
|
954 |
+
[28] Investor Alerts and Bulletins:
|
955 |
+
Frauds Targeting Main Street Investors – Investor Alert,
|
956 |
+
Apr 2020. https://www.sec.gov/oiea/investor-alerts-and-bulletins/ia_frauds, Ac-
|
957 |
+
cessed: 2020-09-06.
|
958 |
+
[29] Press Release: SEC Charges Microcap Fraud Scheme Participants Attempting to Capitalize on
|
959 |
+
the COVID-19 Pandemic, Jun 2020. https://www.sec.gov/news/press-release/2020-131,
|
960 |
+
Accessed: 2020-09-06.
|
961 |
+
[30] Matt Thomas, Bo Pang, and Lillian Lee. Get out the vote: Determining support or oppo-
|
962 |
+
sition from congressional floor-debate transcripts. In Proceedings of the 2006 Conference on
|
963 |
+
Empirical Methods in Natural Language Processing, pages 327–335, Sydney, Australia, July
|
964 |
+
2006. Association for Computational Linguistics.
|
965 |
+
[31] Friedhelm Victor and Tanja Hagemann. Cryptocurrency Pump and Dump Schemes: Quantifi-
|
966 |
+
cation and Detection. In 2019 International Conference on Data Mining Workshops (ICDMW),
|
967 |
+
pages 244–251, Beijing, China, November 2019. IEEE.
|
968 |
+
[32] Qili Wang, Wei Xu, Xinting Huang, and Kunlin Yang. Enhancing intraday stock price manip-
|
969 |
+
ulation detection by leveraging recurrent neural networks with ensemble learning. Neurocom-
|
970 |
+
puting, 347:46–58, June 2019.
|
971 |
+
[33] Cody Marie Wild. One Feature Attribution Method to (Supposedly) Rule Them All: Shapley
|
972 |
+
Values, Jan 2018.
|
973 |
+
[34] Thomas Wood.
|
974 |
+
Random Forests, Sep 2020.
|
975 |
+
https://deepai.org/machine-learning-
|
976 |
+
glossary-and-terms/random-forest, Accessed: 2021-09-16.
|
977 |
+
[35] XGBoost
|
978 |
+
Algorithm:
|
979 |
+
XGBoost
|
980 |
+
In
|
981 |
+
Machine
|
982 |
+
Learning,
|
983 |
+
May
|
984 |
+
2020.
|
985 |
+
https://www.
|
986 |
+
analyticsvidhya.com/blog/2018/09/an-end-to-end-guide-to-understand-the-math-
|
987 |
+
behind-xgboost/, Accessed: 2021-09-15.
|
988 |
+
[36] Yi Cao, Yuhua Li, Sonya Coleman, Ammar Belatreche, and Thomas Martin McGinnity. Adap-
|
989 |
+
tive Hidden Markov Model With Anomaly States for Price Manipulation Detection. IEEE
|
990 |
+
Transactions on Neural Networks and Learning Systems, 26(2):318–330, February 2015.
|
991 |
+
18
|
992 |
+
|
993 |
+
[37] Tony Yiu. Understanding Random Forest, Aug 2019. https://towardsdatascience.com/
|
994 |
+
understanding-random-forest-58381e0602d2, Accessed: 2021-09-16.
|
995 |
+
[38] Hulisi ¨O˘g¨ut, M. Mete Do˘ganay, and Ramazan Akta¸s. Detecting stock-price manipulation in an
|
996 |
+
emerging market: The case of Turkey. Expert Systems with Applications, 36(9):11944–11949,
|
997 |
+
November 2009.
|
998 |
+
19
|
999 |
+
|
1000 |
+
Figure 10: CNN SHAP Summary Plot for posts and comments
|
1001 |
+
20
|
1002 |
+
|
1003 |
+
High
|
1004 |
+
buy
|
1005 |
+
sectorhealthcare
|
1006 |
+
stock
|
1007 |
+
get
|
1008 |
+
one
|
1009 |
+
sectorindustrials
|
1010 |
+
go
|
1011 |
+
look
|
1012 |
+
poob
|
1013 |
+
share
|
1014 |
+
sell
|
1015 |
+
sectortechnology
|
1016 |
+
price
|
1017 |
+
sectorconsumercyclical
|
1018 |
+
Feature value
|
1019 |
+
day
|
1020 |
+
megathread
|
1021 |
+
would
|
1022 |
+
company
|
1023 |
+
like
|
1024 |
+
make
|
1025 |
+
sectorcommunicationservices
|
1026 |
+
news
|
1027 |
+
see
|
1028 |
+
hold
|
1029 |
+
today
|
1030 |
+
post
|
1031 |
+
week
|
1032 |
+
market
|
1033 |
+
sectorunknown
|
1034 |
+
think
|
1035 |
+
0.2
|
1036 |
+
0.1
|
1037 |
+
0.0
|
1038 |
+
0.1
|
1039 |
+
0.2
|
1040 |
+
0.3
|
1041 |
+
0.4
|
1042 |
+
0.5
|
1043 |
+
LOW
|
1044 |
+
SHAP value (impact on model output)
|
-tE4T4oBgHgl3EQf4A1b/content/tmp_files/2301.05310v1.pdf.txt
ADDED
@@ -0,0 +1,1583 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Optimization of Hybrid Power Plants:
|
2 |
+
When Is a Detailed Electrolyzer Model Necessary?
|
3 |
+
Manuel Tobias Baumhof, Enrica Raheli, Andrea Gloppen Johnsen, and Jalal Kazempour
|
4 |
+
Department of Wind and Energy Systems, Technical University of Denmark, Kgs. Lyngby, Denmark
|
5 |
+
{mtba, enrah, anglopj, jalal}@dtu.dk
|
6 |
+
Abstract—Hybrid power plants comprising renewable power
|
7 |
+
sources and electrolyzers are envisioned to play a key role in
|
8 |
+
accelerating the transition towards decarbonization. It is common
|
9 |
+
in the current literature to use simplified operational models for
|
10 |
+
electrolyzers. It is still an open question whether this is a good
|
11 |
+
practice, and if not, when a more detailed operational model is
|
12 |
+
necessary. This paper answers it by assessing the impact of adding
|
13 |
+
different levels of electrolyzer details, i.e., physics and operational
|
14 |
+
constraints, to the optimal dispatch problem of a hybrid power
|
15 |
+
plant in the day-ahead time stage. Our focus lies on the number
|
16 |
+
of operating states (on, off, standby) as well as the number
|
17 |
+
of linearization segments used for approximating the non-linear
|
18 |
+
hydrogen production curve. For that, we develop several mixed-
|
19 |
+
integer linear models, each representing a different level of
|
20 |
+
operational details. We conduct a thorough comparative ex-post
|
21 |
+
performance analysis under different price conditions, wind farm
|
22 |
+
capacities, and minimum hydrogen demand requirements, and
|
23 |
+
discuss under which operational circumstances a detailed model
|
24 |
+
is necessary. In particular, we provide a case under which a
|
25 |
+
simplified model, compared to a detailed one, results in a decrease
|
26 |
+
in profit of 1.8% and hydrogen production of 13.5% over a year.
|
27 |
+
The key lesson learned is that a detailed model potentially earns
|
28 |
+
a higher profit in circumstances under which the electrolyzer
|
29 |
+
operates with partial loading. This could be the case for a certain
|
30 |
+
range of electricity and hydrogen prices, or limited wind power
|
31 |
+
availability. The detailed model also provides a better estimation
|
32 |
+
of true hydrogen production, facilitating the logistics required.
|
33 |
+
Index Terms—hybrid power plants, electrolyzer, hydrogen,
|
34 |
+
mixed-integer linear programming
|
35 |
+
I. INTRODUCTION
|
36 |
+
A. Background
|
37 |
+
In order to limit global warming to a maximum of 1.5 °C,
|
38 |
+
greenhouse gas emissions must be reduced to net zero by 2050,
|
39 |
+
as called for in the European Green Deal 2019 [1]. Renewable
|
40 |
+
hydrogen produced through electrolysis could aid in two
|
41 |
+
major challenges on the path towards the net zero goal. First,
|
42 |
+
electrolyzers can act as flexible loads and therefore potential
|
43 |
+
frequency restoration ancillary service providers, contributing
|
44 |
+
to maintaining the power balance in power systems with
|
45 |
+
increased penetration of renewable energy sources. Second,
|
46 |
+
renewable hydrogen can be further synthesized into other
|
47 |
+
green fuels, eventually enabling decarbonization in the hard-
|
48 |
+
to-abate sectors, such as heavy transport and industry.
|
49 |
+
Hybrid power plants comprising of renewable power sources
|
50 |
+
(wind and/or solar) and electrolyzers are the key components
|
51 |
+
to accelerate the current energy transition through hydrogen
|
52 |
+
[2]. Nonetheless, uncertainties in terms of the cost-benefit of
|
53 |
+
electrolyzers in the long run have challenged the widespread
|
54 |
+
investment in said technologies and thereby large-scale pro-
|
55 |
+
duction of renewable-based green hydrogen [3]. In Denmark,
|
56 |
+
there is currently a special focus on green hydrogen at the
|
57 |
+
governmental level and also, among the regulator, system
|
58 |
+
operator, and many industry stakeholders, envisioning a large
|
59 |
+
deployment of electrolyzers and other power-to-X facilities in
|
60 |
+
the coming years. In 2021 the Danish government published
|
61 |
+
a strategy for the national power-to-X development, aiming to
|
62 |
+
build 4 to 6 GW of electrolysis capacity by 2030, doubling the
|
63 |
+
current Danish peak demand [4]. This emerging trend is not
|
64 |
+
limited to Denmark, and many other countries both in Europe
|
65 |
+
and globally see hydrogen as a key solution for the realization
|
66 |
+
of green societies of the future [2], [5].
|
67 |
+
B. Aim and Literature Review
|
68 |
+
It is a common practice in the current literature to use a
|
69 |
+
simplified operational model for electrolyzers e.g., by using
|
70 |
+
a constant power-to-hydrogen conversion ratio irrespective of
|
71 |
+
whether the electrolyzer operates in full capacity or not [6]–
|
72 |
+
[9]. In addition, some papers do not consider operational states
|
73 |
+
of the electrolyzer [6], [9]. This paper challenges these simpli-
|
74 |
+
fication practices. While a simplified model works satisfacto-
|
75 |
+
rily under certain operational circumstances, there are several
|
76 |
+
other circumstances under which a simplified one yields a
|
77 |
+
sub-optimal operation of electrolyzers, underestimating their
|
78 |
+
value. This paper answers when a detailed operational model
|
79 |
+
should be applied, and to what extent the profit and hydrogen
|
80 |
+
production can be increased by using a detailed model. We will
|
81 |
+
also discuss to what extent a detailed model brings additional
|
82 |
+
computational burden.
|
83 |
+
In general, two main physical aspects of electrolyzers need
|
84 |
+
to be modeled for operation in the day-ahead time stage:
|
85 |
+
1) Electrolyzer efficiency: The power-to-hydrogen conver-
|
86 |
+
sion efficiency is a function of the power consumption
|
87 |
+
of the electrolyzer. To accurately model the hydrogen
|
88 |
+
production of the electrolyzer, the varying efficiency
|
89 |
+
should be captured, which introduces non-linearities to
|
90 |
+
the model. The simple models usually use a constant
|
91 |
+
efficiency, while more accurate modeling incorporates
|
92 |
+
the non-linearities, which can be later linearized.
|
93 |
+
2) Number of operating states: Proper operational modeling
|
94 |
+
of electrolyzers may require introducing three states,
|
95 |
+
namely on, off, and standby, to ensure no hydrogen pro-
|
96 |
+
duction below a given minimum allowed partial loading,
|
97 |
+
for which additional binary variables are needed. Many
|
98 |
+
1
|
99 |
+
arXiv:2301.05310v1 [math.OC] 12 Jan 2023
|
100 |
+
|
101 |
+
papers in the literature do not even model states, thus
|
102 |
+
assuming the electrolyzer is always on, or model two
|
103 |
+
states only, i.e., on and off, similar to conventional power
|
104 |
+
generators1.
|
105 |
+
Various studies have incorporated different levels of opera-
|
106 |
+
tional details of the electrolyzer into their optimization prob-
|
107 |
+
lems. In [7] and [8], a constant efficiency is applied but two
|
108 |
+
and three states are modeled, respectively, by adding binary
|
109 |
+
variables. In [10], three states are modeled, while assuming a
|
110 |
+
linear hydrogen production curve, despite showing that the
|
111 |
+
production curve is not well approximated by a first-order
|
112 |
+
interpolation. A hybrid power plant including an electrolyzer
|
113 |
+
is modeled in [11], where the non-linear hydrogen production
|
114 |
+
is linearized between two points, with a single binary variable
|
115 |
+
representing the on/off state of the electrolyzer. In [12] a
|
116 |
+
quadratic production curve is applied and the resulting non-
|
117 |
+
linear program is eventually solved by a heuristic. In [13],
|
118 |
+
three states are included, and differently from the other papers,
|
119 |
+
the operating temperature is considered as a variable, provid-
|
120 |
+
ing an extra degree of freedom in the electrolyzer operation.
|
121 |
+
This model allows to take into account the temperature impact
|
122 |
+
on the conversion efficiency and the quality of the generated
|
123 |
+
heat. The non-linear hydrogen production is then linearized
|
124 |
+
around a fixed reference operating point to formulate the
|
125 |
+
problem as a mixed-integer linear program (MILP).
|
126 |
+
C. Contributions and Paper Organization
|
127 |
+
To the best of our knowledge, there is a lack of a com-
|
128 |
+
prehensive analysis in the current literature, identifying the
|
129 |
+
operational circumstances under which a simple model ends
|
130 |
+
up in a sub-optimal operation of electrolyzers, resulting in a
|
131 |
+
reduced profit and hydrogen production2. This paper bridges
|
132 |
+
such a gap through the following contributions:
|
133 |
+
• To embed constraints describing the physics of electrolyz-
|
134 |
+
ers while keeping the final model as a MILP,
|
135 |
+
• To thoroughly investigate ex-post the impact of the in-
|
136 |
+
clusion of different operational details on the final profit
|
137 |
+
of the hybrid power plant and the amount of hydrogen
|
138 |
+
produced,
|
139 |
+
• and finally, to provide a set of recommendations in
|
140 |
+
terms of including operational details of electrolyzers,
|
141 |
+
depending on the application, the range of electricity
|
142 |
+
prices, and the hydrogen price.
|
143 |
+
Without loss of generality, this paper focuses on alkaline
|
144 |
+
electrolyzers, as they are currently the most mature tech-
|
145 |
+
nology [14]. The proposed model can be extended to other
|
146 |
+
low-temperature electrolyzers, such as polymer electrolyte
|
147 |
+
membrane (PEM). More operational characteristics may be
|
148 |
+
necessary for modeling solid-oxide electrolyzers (SOEC).
|
149 |
+
1We will discuss later in Section IV that under some operational conditions,
|
150 |
+
a two-state model including on and standby states works well too. In contrast,
|
151 |
+
the two-state model on-off is not satisfactory neither in terms of dispatch
|
152 |
+
decisions nor the computational performance.
|
153 |
+
2Reference [13] provides a similar analysis, however, the Faraday efficiency
|
154 |
+
is assumed to be one. The consequences of this assumption will be further
|
155 |
+
discussed in Section II-B.
|
156 |
+
The rest of the paper is organized as follows. Section II
|
157 |
+
describes the electrolyzer physics, focusing on the operating
|
158 |
+
states and the hydrogen production curve. Section III provides
|
159 |
+
the proposed MILP, representing all three states of the elec-
|
160 |
+
trolyzer. Section IV discusses the impact of the electrolyzer
|
161 |
+
modeling choices by means of a test case and a thorough
|
162 |
+
sensitivity analysis. Section V concludes the paper. Finally,
|
163 |
+
Appendices A and B provide two MILPs (simpler than the
|
164 |
+
one proposed in Section III), both representing two states of
|
165 |
+
the electrolyzer only, where one is a model with on-off states,
|
166 |
+
and the other one is a model with on-standby states.
|
167 |
+
II. ELECTROLYZER PHYSICS
|
168 |
+
The core of the renewable-hydrogen hybrid power plant is
|
169 |
+
the electrolyzer, where water is decomposed into hydrogen
|
170 |
+
and oxygen by means of electrical power. The physics and
|
171 |
+
operating characteristics of alkaline electrolyzers are described
|
172 |
+
in this section and will be formulated as a set of mixed-integer
|
173 |
+
linear constraints in Section III.
|
174 |
+
A. States
|
175 |
+
To describe and model the real operation of an alkaline
|
176 |
+
electrolyzer, it is necessary to distinguish three different states:
|
177 |
+
1) On state: the electrolyzer operates within its feasible
|
178 |
+
load range, consuming power and producing hydrogen with a
|
179 |
+
conversion efficiency that depends on the partial load, which
|
180 |
+
will be explained in Section II-B. The minimum operating
|
181 |
+
power for alkaline electrolyzers is around 15-20% of the
|
182 |
+
nominal power, below which the electrolyzer must go into
|
183 |
+
standby or off.
|
184 |
+
2) Standby state: the electrolyzer does not produce any
|
185 |
+
hydrogen but consumes the power needed to maintain the
|
186 |
+
system temperature and pressure so that it can rapidly resume
|
187 |
+
production. The value of the standby power consumption is
|
188 |
+
not usually disclosed by manufacturers, but values between
|
189 |
+
1-5% of the electrolyzer full load capacity have been adopted
|
190 |
+
in the literature [7], [8], [10]. The time needed to switch from
|
191 |
+
standby to on, i.e., a warm start-up is of the order of 30 seconds
|
192 |
+
[8].
|
193 |
+
3) Off state: the electrolyzer is shut down completely and
|
194 |
+
does not consume any power nor produce any hydrogen. How-
|
195 |
+
ever, to switch back to on, a significant amount of electricity
|
196 |
+
is needed, corresponding to a cold start-up cost. Moreover,
|
197 |
+
at least 20 minutes are necessary before resuming hydrogen
|
198 |
+
production [8]. Apart from the introduced cold start-up cost
|
199 |
+
and start-up time, the frequent shut down of the electrolyzer
|
200 |
+
may have a negative impact on the device degradation and
|
201 |
+
lifetime [15].
|
202 |
+
B. Efficiency and Production Curve
|
203 |
+
The conversion efficiency of electricity into hydrogen is not
|
204 |
+
constant but depends on the partial load, i.e., the ratio between
|
205 |
+
power consumption at a specific time and the nominal power
|
206 |
+
of the electrolyzer. The variation of the efficiency based on the
|
207 |
+
operating set-point is mainly due to two phenomena: (i) the
|
208 |
+
current-voltage relationship, also called the polarization curve,
|
209 |
+
2
|
210 |
+
|
211 |
+
10
|
212 |
+
20
|
213 |
+
30
|
214 |
+
40
|
215 |
+
50
|
216 |
+
Power [MW]
|
217 |
+
17.5
|
218 |
+
18.0
|
219 |
+
18.5
|
220 |
+
19.0
|
221 |
+
19.5
|
222 |
+
Efficiency [kg/MWh]
|
223 |
+
(a)
|
224 |
+
10
|
225 |
+
20
|
226 |
+
30
|
227 |
+
40
|
228 |
+
50
|
229 |
+
Power [MW]
|
230 |
+
200
|
231 |
+
400
|
232 |
+
600
|
233 |
+
800
|
234 |
+
Hydrogen [kg/h]
|
235 |
+
(b)
|
236 |
+
Non-linear curve
|
237 |
+
Approximated curve
|
238 |
+
pe *
|
239 |
+
h*
|
240 |
+
hr
|
241 |
+
} h
|
242 |
+
Fig. 1. Plot (a): the efficiency curve, and plot (b): the hydrogen production
|
243 |
+
curve of a 52.25-MW alkaline electrolyzer, as a function of the electric power
|
244 |
+
consumption, working at 90 °C and 30 bar. The black curves represent the
|
245 |
+
original non-linear curves. Approximated by two segments, the red curve in
|
246 |
+
plot (b) is the piecewise linearized hydrogen production curve. The non-linear
|
247 |
+
efficiency curve corresponding to this piecewise linearization is represented
|
248 |
+
by the red curve in plot (a). In our formulation, we will only use the red
|
249 |
+
piecewise linear production curve in plot (b). The inner plot of (b) shows
|
250 |
+
the hydrogen production discrepancy ∆h between original and approximated
|
251 |
+
curves, for a given power consumption level.
|
252 |
+
and (ii) the Faraday efficiency. We explain both phenomena in
|
253 |
+
the following.
|
254 |
+
The current-voltage relationship describes the voltage in-
|
255 |
+
crease (also called over-voltage or over-potential) with increas-
|
256 |
+
ing current density, due to different losses, as explained in [16]
|
257 |
+
and [13]. Ulleberg [17] introduced a widely adopted empirical
|
258 |
+
formulation that describes the relationships between voltage,
|
259 |
+
current density, and electrolyzer operating temperature. To fur-
|
260 |
+
ther take into account the operating pressure, this formulation
|
261 |
+
was modified by Sanchez et al. [18]. For a given temperature
|
262 |
+
and pressure, this can be formulated as
|
263 |
+
U cell(i) = U rev + K1i + K2log(K3i + 1),
|
264 |
+
(1)
|
265 |
+
where U cell(i) is the cell voltage as a function of the current
|
266 |
+
density i. In addition, U rev is the open-circuit voltage (i.e.,
|
267 |
+
voltage corresponding to current density equal to zero). The
|
268 |
+
parameters K1, K2, K3 are constants obtained from experi-
|
269 |
+
mental data and can be found in [18]. Voltage U rev can be
|
270 |
+
calculated for a specific operating temperature according to
|
271 |
+
an empirical equation that can be found in [18]. The power
|
272 |
+
consumed by the electrolyzer pe(i) can be calculated as
|
273 |
+
pe(i) = U cell(i)iA,
|
274 |
+
(2)
|
275 |
+
where A is the total area of the cells composing the elec-
|
276 |
+
trolyzer. The Faraday law calculates the hydrogen production
|
277 |
+
h(i) of the electrolyzer as
|
278 |
+
h(i) = 3600 · ηF(i)M H2iA
|
279 |
+
2F
|
280 |
+
,
|
281 |
+
(3)
|
282 |
+
where h(i) is the hydrogen production rate in kg/h, M H2 is the
|
283 |
+
molar mass of hydrogen in kg/mol, F is the Faraday constant,
|
284 |
+
and ηF(i) is the Faraday efficiency as a function of current
|
285 |
+
density. The latter is defined as the ratio between the actual and
|
286 |
+
the theoretical maximum amount of hydrogen produced. The
|
287 |
+
difference between actual and theoretical output is explained
|
288 |
+
in [17], and it increases significantly when the electrolyzer
|
289 |
+
is working at low-current densities. In [18], an empirical
|
290 |
+
expression that captures the relationship between the Faraday
|
291 |
+
efficiency and the current density at a given temperature is
|
292 |
+
provided: ηF(i) is close to one for higher current densities, and
|
293 |
+
it drops to zero when reducing the current. The electrolyzer
|
294 |
+
efficiency is defined as
|
295 |
+
η(i) = h(i)
|
296 |
+
pe(i),
|
297 |
+
(4)
|
298 |
+
where generally η(i) is expressed in kg/MWh. For different
|
299 |
+
values of i, the black curve in Figure 1(a) shows efficiency η(i)
|
300 |
+
versus power consumption pe(i). In addition, the black curve
|
301 |
+
in Figure 1(b) shows the hydorgen production h(i) versus
|
302 |
+
power consumption pe(i). For notational clarity, we drop (i)
|
303 |
+
in the rest of the paper. The black curves in Figure 1 show that
|
304 |
+
the model is non-linear. The efficiency has a peak at around
|
305 |
+
30% of the load. This characteristic peak in the efficiency
|
306 |
+
curve is not captured when a constant conversion efficiency is
|
307 |
+
used, as done in [6], [8], [10], or when the Faraday efficiency
|
308 |
+
is assumed to be equal to one in the entire feasible operating
|
309 |
+
range, as done in [13].
|
310 |
+
To keep the final problem a MILP, but describe the hydrogen
|
311 |
+
production with more details, we use a piecewise linearization
|
312 |
+
of the hydrogen production curve as shown by the red curve in
|
313 |
+
Figure 1(b), for two linearization segments. For each segment
|
314 |
+
s ∈ S, the As (slope) and Bs (intercept) coefficients of the
|
315 |
+
line can be calculated such that the approximated hydrogen
|
316 |
+
production is Aspe + Bs. Later we will define a binary
|
317 |
+
variable indicating which segment is active. The proposed
|
318 |
+
approximation is exact only at the segment endpoints (i.e.,
|
319 |
+
linearization points), otherwise, it is an underestimation of
|
320 |
+
the original non-linear curve. For example, the optimal power
|
321 |
+
set-point pe∗ in the inset of Figure 1(b) corresponds to the
|
322 |
+
hydrogen production h∗ according to the proposed piecewise
|
323 |
+
linear model with two segments3. However, the actual hydro-
|
324 |
+
gen realization based on the electrolyzer physics is hr. The
|
325 |
+
hydrogen production difference ∆h is reduced by increasing
|
326 |
+
the number of segments, and the effect of the hydrogen surplus
|
327 |
+
obtained when choosing only one segment, as done in [10], is
|
328 |
+
discussed in Section IV.
|
329 |
+
According to this piecewise linear formulation for the
|
330 |
+
hydrogen production curve, the efficiency η for segment s
|
331 |
+
can be calculated based on (4), resulting in η = As + Bs
|
332 |
+
pe .
|
333 |
+
This is depicted by the red dotted curve in Figure 1(a), given
|
334 |
+
two linearization segments used. Note that it does not present
|
335 |
+
a linear behavior. However, this non-linear efficiency curve
|
336 |
+
does not appear in our optimization problem. The hydrogen
|
337 |
+
production curve is used instead, which is linearized through
|
338 |
+
segments, as illustrated by the red dotted curve in Figure 1(b).
|
339 |
+
III. PROBLEM FORMULATION
|
340 |
+
We consider a hybrid power plant, as depicted in Figure 2,
|
341 |
+
consisting of a wind farm, an electrolyzer, a hydrogen com-
|
342 |
+
pressor, and a hydrogen storage. The generated wind power
|
343 |
+
can be either sold to the grid at the electricity market price,
|
344 |
+
3Symbol ∗ refers to the optimal value.
|
345 |
+
3
|
346 |
+
|
347 |
+
Wind farm
|
348 |
+
Grid
|
349 |
+
Electrolyzer
|
350 |
+
Compressor
|
351 |
+
Hydrogen
|
352 |
+
storage
|
353 |
+
Hydrogen
|
354 |
+
demand
|
355 |
+
Electricity
|
356 |
+
Hydrogen
|
357 |
+
Fig. 2. Schematic representation of a hybrid power plant.
|
358 |
+
or consumed by the electrolyzer to produce 100% renewable-
|
359 |
+
based green hydrogen. The hydrogen produced can either be
|
360 |
+
directly delivered to the demand or temporarily stored in an on-
|
361 |
+
site hydrogen storage, with an associated cost for compressing
|
362 |
+
the gas. The dashed blue line in Figure 2 represents the option
|
363 |
+
to buy electricity from the grid only to supply the electrolyzer’s
|
364 |
+
standby power when there is no wind power.
|
365 |
+
The hydrogen price is assumed to be a single-value constant,
|
366 |
+
and the hybrid power plant serves a minimum daily hydrogen
|
367 |
+
demand. We assume the plant has perfect foresight of future
|
368 |
+
wind power production and electricity price. Given the 1-hour
|
369 |
+
time resolution in our model, we neglect the ramping limitation
|
370 |
+
which are typically around ±20% of the nominal power per
|
371 |
+
second [10], as well as the warm and cold start-up times of
|
372 |
+
the electrolyzer.
|
373 |
+
For the optimal operation of the hybrid power plant, we
|
374 |
+
develop a complete MILP in Section III-A accounting for
|
375 |
+
three states of the electrolyzer and then provide two simplified
|
376 |
+
counterparts in Section III-B, each with two states of the
|
377 |
+
electrolyzer.
|
378 |
+
Notation: All parameters are upper-case or Greek letters,
|
379 |
+
whereas all variables are lower-case letters. All binary vari-
|
380 |
+
ables are noted by z.
|
381 |
+
A. Three-state Model
|
382 |
+
The most complete MILP includes the objective function
|
383 |
+
(6) constrained by (7)-(29).
|
384 |
+
1) Objective function: Over the set of hours t ∈ T , the
|
385 |
+
objective function (6) maximizes the total profit of the hybrid
|
386 |
+
power plant as
|
387 |
+
max
|
388 |
+
x
|
389 |
+
�
|
390 |
+
t∈T
|
391 |
+
ptλDA
|
392 |
+
t
|
393 |
+
+ dtλh − pin
|
394 |
+
t λin
|
395 |
+
t − zsu
|
396 |
+
t λsu,
|
397 |
+
(6)
|
398 |
+
where the variable set x will be defined later. The first term
|
399 |
+
corresponds to selling power pt to the grid at the day-ahead
|
400 |
+
electricity market price λDA
|
401 |
+
t
|
402 |
+
. The second term pertains to
|
403 |
+
delivered hydrogen dt at a fixed price λh. The third term
|
404 |
+
represents the cost for purchasing standby power pin
|
405 |
+
t to support
|
406 |
+
the electrolyzer’s standby state in case the wind power is
|
407 |
+
insufficient. The corresponding price is λin
|
408 |
+
t
|
409 |
+
= λDA
|
410 |
+
t
|
411 |
+
+ λTSO,
|
412 |
+
where λTSO is the grid tariff imposed by the Transmission
|
413 |
+
System Operator (TSO). Finally, the fourth term corresponds
|
414 |
+
to the cold start-up cost of the electrolyzer, where the binary
|
415 |
+
variable zsu
|
416 |
+
t
|
417 |
+
indicates the start-up at hour t, associated with
|
418 |
+
the cost per startup λsu.
|
419 |
+
2) Power balance: In every hour t, the power pt sold in the
|
420 |
+
day-ahead market is equal to the wind farm power production
|
421 |
+
P w
|
422 |
+
t plus power pin
|
423 |
+
t bought from the grid to support the standby
|
424 |
+
state of the electrolyzer, subtracted by the power consumption
|
425 |
+
pe
|
426 |
+
t of the electrolyzer and the power consumption pc
|
427 |
+
t of the
|
428 |
+
compressor, such that
|
429 |
+
pt = P w
|
430 |
+
t + pin
|
431 |
+
t − pe
|
432 |
+
t − pc
|
433 |
+
t
|
434 |
+
∀ t ∈ T .
|
435 |
+
(7)
|
436 |
+
3) Limit on pin
|
437 |
+
t : The input power pin
|
438 |
+
t
|
439 |
+
is limited by the
|
440 |
+
standby state consumption of the electrolyzer, implying that
|
441 |
+
power cannot be bought from the grid to produce hydrogen:
|
442 |
+
pin
|
443 |
+
t ≤ P sbzsb
|
444 |
+
t
|
445 |
+
∀ t ∈ T ,
|
446 |
+
(8)
|
447 |
+
where the parameter P sb is the standby consumption, and the
|
448 |
+
binary variable zsb
|
449 |
+
t
|
450 |
+
indicates whether the electrolyzer is in the
|
451 |
+
standby mode in hour t.
|
452 |
+
4) Electrolyzer operational states: Constraint (9) ensures
|
453 |
+
that the electrolyzer can take only one out of three states at
|
454 |
+
any hour t, namely online, standby, or off:
|
455 |
+
zon
|
456 |
+
t
|
457 |
+
+ zoff
|
458 |
+
t
|
459 |
+
+ zsb
|
460 |
+
t
|
461 |
+
= 1
|
462 |
+
∀ t ∈ T ,
|
463 |
+
(9)
|
464 |
+
where similar to zsb
|
465 |
+
t , binary variables zon
|
466 |
+
t
|
467 |
+
and zoff
|
468 |
+
t
|
469 |
+
indicate
|
470 |
+
whether in hour t the electrolyzer is on and off, respectively.
|
471 |
+
The states are activated based on the electricity consumption of
|
472 |
+
the electrolyzer. In the online state, the electricity consumption
|
473 |
+
pe
|
474 |
+
t of the electrolyzer can neither exceed the capacity Ce nor
|
475 |
+
go below a minimum load limit P min. In the standby state, the
|
476 |
+
electricity consumption must be equal to the standby power
|
477 |
+
consumption P sb. These constraints are enforced by
|
478 |
+
pe
|
479 |
+
t ≤ Cezon
|
480 |
+
t
|
481 |
+
+ P sbzsb
|
482 |
+
t
|
483 |
+
∀ t ∈ T
|
484 |
+
(10)
|
485 |
+
pe
|
486 |
+
t ≥ P minzon
|
487 |
+
t
|
488 |
+
+ P sbzsb
|
489 |
+
t
|
490 |
+
∀ t ∈ T .
|
491 |
+
(11)
|
492 |
+
To represent the cold start-up of the electrolyzer, the binary
|
493 |
+
variable zsu
|
494 |
+
t
|
495 |
+
is defined, taking the value 1 in the case of
|
496 |
+
a transition from off to on state in hour t, as enforces by
|
497 |
+
constraints (12) and (13). Further, constraint (14) ensures
|
498 |
+
that the transition from an off-state to a standby-state is not
|
499 |
+
allowed, to avoid bypassing of the start-up cost.
|
500 |
+
zsu
|
501 |
+
t
|
502 |
+
≥ zon
|
503 |
+
t
|
504 |
+
− zon
|
505 |
+
t−1 − zsb
|
506 |
+
t−1
|
507 |
+
∀ t ∈ T \1,
|
508 |
+
(12)
|
509 |
+
zsu
|
510 |
+
t=1 = 0,
|
511 |
+
(13)
|
512 |
+
zoff
|
513 |
+
t−1 + zsb
|
514 |
+
t
|
515 |
+
≤ 1
|
516 |
+
∀ t ∈ T \1.
|
517 |
+
(14)
|
518 |
+
5) Electrolyzer hydrogen production: The hydrogen pro-
|
519 |
+
duction ht is a function of the electricity consumption of the
|
520 |
+
electrolyzer. As explained in Section II-B, for each segment
|
521 |
+
s ∈ S, a linear function of the segment power consumption
|
522 |
+
ˆpe
|
523 |
+
ts with slope As and intercept Bs is defined, such that
|
524 |
+
ht =
|
525 |
+
�
|
526 |
+
s∈S
|
527 |
+
(Asˆpe
|
528 |
+
ts + Bszh
|
529 |
+
ts)
|
530 |
+
∀ t ∈ T ,
|
531 |
+
(15)
|
532 |
+
where the binary variable zh
|
533 |
+
ts defines which segment s is active
|
534 |
+
in hour t. Each segment is valid within a pre-defined interval
|
535 |
+
of upper P s and lower P s power consumption levels, i.e.,
|
536 |
+
P szh
|
537 |
+
ts ≤ ˆpe
|
538 |
+
ts ≤ P szh
|
539 |
+
ts
|
540 |
+
∀ t ∈ T , s ∈ S.
|
541 |
+
(16)
|
542 |
+
4
|
543 |
+
|
544 |
+
VectorStock
|
545 |
+
VectorStock.com/24756804shutterstock.com • 1658641081Constraint (17) ensures that hydrogen production happens
|
546 |
+
in the online state only, while one segment only can be active
|
547 |
+
at any hour t. In addition, (18) computes the total power
|
548 |
+
consumption of the electrolyzer:
|
549 |
+
zon
|
550 |
+
t
|
551 |
+
=
|
552 |
+
�
|
553 |
+
s∈S
|
554 |
+
zh
|
555 |
+
t,s
|
556 |
+
∀ t ∈ T
|
557 |
+
(17)
|
558 |
+
pe
|
559 |
+
t =
|
560 |
+
�
|
561 |
+
s∈S
|
562 |
+
ˆpe
|
563 |
+
ts + P sbzsb
|
564 |
+
t
|
565 |
+
∀ t ∈ T .
|
566 |
+
(18)
|
567 |
+
6) Hydrogen storage: Constraints (19)-(25) represent the
|
568 |
+
storage operation:
|
569 |
+
ht = hd
|
570 |
+
t + sin
|
571 |
+
t
|
572 |
+
∀ t ∈ T ,
|
573 |
+
(19)
|
574 |
+
dt = hd
|
575 |
+
t + sout
|
576 |
+
t
|
577 |
+
∀ t ∈ T ,
|
578 |
+
(20)
|
579 |
+
sout
|
580 |
+
t
|
581 |
+
≤ Sout
|
582 |
+
∀ t ∈ T ,
|
583 |
+
(21)
|
584 |
+
pc
|
585 |
+
t = Kcsin
|
586 |
+
t
|
587 |
+
∀ t ∈ T ,
|
588 |
+
(22)
|
589 |
+
st=1 = Sini + sin
|
590 |
+
t=1 − sout
|
591 |
+
t=1
|
592 |
+
(23)
|
593 |
+
st = st−1 + sin
|
594 |
+
t − sout
|
595 |
+
t
|
596 |
+
∀ t ∈ T \1,
|
597 |
+
(24)
|
598 |
+
st ≤ Cs
|
599 |
+
∀ t ∈ T .
|
600 |
+
(25)
|
601 |
+
The hydrogen produced ht can either go directly to the demand
|
602 |
+
hd
|
603 |
+
t or be injected into the hydrogen storage sin
|
604 |
+
t , as enforced
|
605 |
+
by (19). The total hydrogen dt delivered to the demand is
|
606 |
+
equal to the sum of hydrogen directly from the electrolyzer
|
607 |
+
and that from the storage sout
|
608 |
+
t
|
609 |
+
, as per (20). The storage
|
610 |
+
output of every hour is limited by the output flow capacity
|
611 |
+
Sout in (21). Further, the compressor consumes power pc to
|
612 |
+
compress the hydrogen injected into the storage. Assuming
|
613 |
+
adiabatic compression, the compression coefficient Kc can be
|
614 |
+
calculated, as proposed by [13]. The power consumption for
|
615 |
+
compression is then (22). The state of charge of the hydrogen
|
616 |
+
storage in the initial and following hours is calculated by
|
617 |
+
(23) and (24), where Sini is the hydrogen initially stored in
|
618 |
+
the storage at the beginning of time horizon T . The storage
|
619 |
+
hydrogen mass capacity Cs is enforced by (25). Note that we
|
620 |
+
do not impose any constraint for the energy stored at the end
|
621 |
+
of time horizon T . Therefore, pursuing profit maximization in
|
622 |
+
this time horizon, the hybrid power plant will leave the storage
|
623 |
+
empty in the last hour4.
|
624 |
+
7) Hydrogen demand: Imagine within the underlying time
|
625 |
+
horizon T , which could be, for example, a year, there are N
|
626 |
+
number of time subsets, e.g., 365 days, indexed by n, such
|
627 |
+
that there is a minimum hydrogen demand for each n:
|
628 |
+
�
|
629 |
+
t∈Hn
|
630 |
+
dt ≥ Dmin
|
631 |
+
n
|
632 |
+
∀ n ∈ {1, ..., N},
|
633 |
+
(26)
|
634 |
+
where Hn is the set of hours within time subset n.
|
635 |
+
8) Variable declaration: Constraint (27) declares the non-
|
636 |
+
negativity conditions:
|
637 |
+
dt, ht, hd
|
638 |
+
t , pt, pc
|
639 |
+
t, pin
|
640 |
+
t , ˆpe
|
641 |
+
ts, st, sin
|
642 |
+
t , sout
|
643 |
+
t
|
644 |
+
∈ R+.
|
645 |
+
(27)
|
646 |
+
4One can enforce a constraint on the minimum stored hydrogen at the end
|
647 |
+
of the time horizon, or add a value for this stored energy to the objective
|
648 |
+
function.
|
649 |
+
Constraint (28) lists binary variables:
|
650 |
+
zsu
|
651 |
+
t , zh
|
652 |
+
ts, zon
|
653 |
+
t , zoff
|
654 |
+
t , zsb
|
655 |
+
t
|
656 |
+
∈ {0, 1}.
|
657 |
+
(28)
|
658 |
+
Therefore, the total number of binary variables is |T |(4 +
|
659 |
+
|S|) binaries, where |T | and |S|, respectively, are the number
|
660 |
+
of hours and the number of segments used to linearize the
|
661 |
+
hydrogen production curve. Finally, the variable set x is
|
662 |
+
defined as
|
663 |
+
x = {dt, ht, hd
|
664 |
+
t , pt, pc
|
665 |
+
t, pin
|
666 |
+
t , ˆpe
|
667 |
+
ts,
|
668 |
+
sin
|
669 |
+
t , st, sout
|
670 |
+
t
|
671 |
+
, zsu
|
672 |
+
t , zh
|
673 |
+
ts, zon
|
674 |
+
t , zoff
|
675 |
+
t , zsb
|
676 |
+
t }.
|
677 |
+
(29)
|
678 |
+
Accordingly, in addition to |T |(4+|S|) number of binary vari-
|
679 |
+
ables, we have |T |(9 + |S|) number of continuous variables.
|
680 |
+
B. Two-state Models
|
681 |
+
The optimal operation problem (6)-(29) of the hybrid power
|
682 |
+
plant accounting for three states of the electrolyzer can be
|
683 |
+
simplified if two states only are considered, either on-off states
|
684 |
+
or on-standby states. Both result in MILPs.
|
685 |
+
In the latter, i.e., the MILP with on-off states, one binary
|
686 |
+
variable (instead of three) per hour t is sufficient, such that it
|
687 |
+
indicates whether the electrolyzer in the given hour is on or
|
688 |
+
off. The resulting MILP is provided in Appendix A. The total
|
689 |
+
number of binary variables in this MILP is |T |(2 + |S|).
|
690 |
+
Similarly, a single binary variable per hour t is enough
|
691 |
+
in the MILP with on-standby states, indicating whether the
|
692 |
+
electrolyzer is online or in standby mode. Also, the start-up
|
693 |
+
binary variable is not needed. The corresponding MILP is
|
694 |
+
given in Appendix B, where among three MILPs, we need
|
695 |
+
the lowest number of binary variables, i.e., |T |(1 + |S|).
|
696 |
+
IV. NUMERICAL STUDY
|
697 |
+
We apply the proposed MILPs of Section III to a case study
|
698 |
+
and investigate how the optimal operation of the hybrid power
|
699 |
+
and the resulting profit change by adding more operational
|
700 |
+
details of the electrolyzer. All source codes and input data are
|
701 |
+
publicly shared5. We consider several options for the number
|
702 |
+
of linearization segments, i.e., |S|, used to approximate the
|
703 |
+
hydrogen production curve of the electrolyzer, including 1, 2,
|
704 |
+
4, 8, and 12 segments. Also, we consider three options for
|
705 |
+
the number of electrolyzer states: three states on-off-standby
|
706 |
+
(OOS), two states on-standby (OS), and two states on-off
|
707 |
+
(OO). In the rest of this section, we will refer to various
|
708 |
+
models as, for example, OOS-12, implying we consider three
|
709 |
+
states (OOS) with 12 segments. Finally, we conduct a sensitiv-
|
710 |
+
ity analysis to explore the impact of various input parameters,
|
711 |
+
such as wind farm capacity, hydrogen demand, and hydrogen
|
712 |
+
price, on the operation of the hybrid power plant.
|
713 |
+
A. Case Study
|
714 |
+
We consider a hybrid power plant whose structure equals
|
715 |
+
the one in Figure 2, and its input data is provided in Table I.
|
716 |
+
The capacity of the wind farm is 104.5 MW, corresponding to
|
717 |
+
11 V164-9.5 MW™ Vestas turbines, located in Køge Bay,
|
718 |
+
5GitHub: https://github.com/mtba-dtu/detailed-electrolyzer-model
|
719 |
+
5
|
720 |
+
|
721 |
+
TABLE I
|
722 |
+
INPUT DATA FOR THE CASE STUDY
|
723 |
+
Wind farm
|
724 |
+
Capacity
|
725 |
+
Cw
|
726 |
+
104.5
|
727 |
+
MW
|
728 |
+
Electrolyzer
|
729 |
+
Capacity
|
730 |
+
Ce
|
731 |
+
50%
|
732 |
+
of Cw
|
733 |
+
Standby load
|
734 |
+
P sb
|
735 |
+
1%
|
736 |
+
of Ce
|
737 |
+
Minimum load
|
738 |
+
P min
|
739 |
+
15%
|
740 |
+
of Ce
|
741 |
+
Pressure
|
742 |
+
30
|
743 |
+
bar
|
744 |
+
Temperature
|
745 |
+
90
|
746 |
+
°C
|
747 |
+
Max. current density
|
748 |
+
5,000
|
749 |
+
A/m2
|
750 |
+
Start-up cost
|
751 |
+
λsu
|
752 |
+
2,612.50
|
753 |
+
C [10]
|
754 |
+
TSO tariff
|
755 |
+
λTSO
|
756 |
+
15.06
|
757 |
+
C/MWh
|
758 |
+
Storage
|
759 |
+
Capacity
|
760 |
+
Cs
|
761 |
+
22,000
|
762 |
+
kg
|
763 |
+
Maximum output
|
764 |
+
Sout
|
765 |
+
912.13
|
766 |
+
kg/h
|
767 |
+
Compressor
|
768 |
+
Inlet temperature
|
769 |
+
40
|
770 |
+
°C
|
771 |
+
Inlet pressure
|
772 |
+
30
|
773 |
+
bar
|
774 |
+
Outlet pressure
|
775 |
+
200
|
776 |
+
bar
|
777 |
+
Mechanical efficiency
|
778 |
+
75%
|
779 |
+
Hydrogen
|
780 |
+
Price
|
781 |
+
λh
|
782 |
+
2.10
|
783 |
+
C/kg
|
784 |
+
Minimum demand
|
785 |
+
Dmin
|
786 |
+
n
|
787 |
+
3,667
|
788 |
+
kg/day
|
789 |
+
Denmark. The electrolyzer capacity is set to 50% of the
|
790 |
+
wind farm capacity, amounting to 52.25 MW. The modeling
|
791 |
+
horizon spans one year with an hourly temporal resolution.
|
792 |
+
We apply hourly electricity price data for 2019, as price data
|
793 |
+
for the following years might be distorted by macroeconomic
|
794 |
+
impacts, such as COVID-19. Day-ahead electricity prices for
|
795 |
+
the East Denmark area (DK2) are obtained from ENTSO-e
|
796 |
+
Transparency platform [19] and hourly historical wind capac-
|
797 |
+
ity factors at the given location for 2019 are retrieved from
|
798 |
+
the Renewable.ninja web platform [20]. The average yearly
|
799 |
+
capacity factor for the selected location is 43.7%. The hybrid
|
800 |
+
power plant is only allowed to buy power from the grid to
|
801 |
+
keep the electrolyzer in standby mode, in case the wind power
|
802 |
+
is insufficient. In that case, the electricity is bought at the
|
803 |
+
hourly day-ahead market price plus the grid tariff of the TSO.
|
804 |
+
Since the wind farm is located in DK2, the consumption tariff
|
805 |
+
imposed by the Danish TSO, Energinet, is applied [21]. The
|
806 |
+
minimum daily demand can be met by the full-load operation
|
807 |
+
of the electrolyzer for around four hours. The hydrogen storage
|
808 |
+
is scaled to store all hydrogen produced if the electrolyzer
|
809 |
+
operates at full capacity for 24 consecutive hours.
|
810 |
+
B. Impacts of the Number of Segments
|
811 |
+
Let us consider the OOS case with three states, for which
|
812 |
+
we solve the proposed MILP (6)-(29). We start with OOS-1,
|
813 |
+
where |S| = 1. This means the original non-linear hydrogen
|
814 |
+
production curve, depicted in Figure 1(b), is approximated by
|
815 |
+
a single linear curve. Here, the minimum power consumption
|
816 |
+
P min and the capacity Ce of the electrolyzer are taken as
|
817 |
+
two endpoints. By moving to OOS-2, where the number of
|
818 |
+
segments |S| is 2, we consider an additional point P η,max,
|
819 |
+
which refers to the power consumption level corresponding to
|
820 |
+
the peak in the efficiency curve in Figure 1(a). By increasing
|
821 |
+
|S| to 4, and then to 8, the mean load value between existing
|
822 |
+
points is added, splitting one segment into two. The same
|
823 |
+
procedure but only on the right side of P η,max is applied
|
824 |
+
when we move from OOS-8 to OOS-12, as this side covers
|
825 |
+
1
|
826 |
+
6
|
827 |
+
12
|
828 |
+
18
|
829 |
+
24
|
830 |
+
0
|
831 |
+
20
|
832 |
+
40
|
833 |
+
60
|
834 |
+
Electrolyzer power [MW]
|
835 |
+
(a)
|
836 |
+
1
|
837 |
+
6
|
838 |
+
12
|
839 |
+
18
|
840 |
+
24
|
841 |
+
Time [h]
|
842 |
+
(b)
|
843 |
+
1
|
844 |
+
6
|
845 |
+
12
|
846 |
+
18
|
847 |
+
24
|
848 |
+
(c)
|
849 |
+
Ce
|
850 |
+
P , max
|
851 |
+
Pmin
|
852 |
+
Psb
|
853 |
+
pe
|
854 |
+
t
|
855 |
+
DA
|
856 |
+
t
|
857 |
+
25
|
858 |
+
32
|
859 |
+
38
|
860 |
+
45
|
861 |
+
Day-ahead price [ /MWh]
|
862 |
+
Fig. 3.
|
863 |
+
The power consumption schedule of the electrolyzer (pe
|
864 |
+
t) in an
|
865 |
+
example high-wind day when its hydrogen production curve is linearized
|
866 |
+
by (a) 1, (b) 4, and (c) 12 segments. These three plots, from left to right,
|
867 |
+
correspond to cases OOS-1, OOS-4, and OOS-12, respectively.
|
868 |
+
over around 70% of the feasible operating range. With the
|
869 |
+
adoption of this procedure, all cases from OOS-2 to OOS-12
|
870 |
+
include the point P η,max. In addition, points are not removed
|
871 |
+
when refining the discretization. By adding more segments, the
|
872 |
+
hydrogen production curve and thus the electrolyzer efficiency
|
873 |
+
with partial loading is more accurately represented.
|
874 |
+
The increase in the number of segments |S| enables the
|
875 |
+
electrolyzer to consume power more flexibly, as depicted in
|
876 |
+
Figure 3, where the optimal power consumption schedule of
|
877 |
+
the electrolyzer for one example day of the year is shown
|
878 |
+
for three different numbers of segments (1, 4, and 12). It is
|
879 |
+
observed that when the optimal power consumption of the
|
880 |
+
electrolyzer is not constrained by wind production shortage,
|
881 |
+
as on the chosen day, the optimal consumption level is always
|
882 |
+
one of the piecewise linearization points. There are instances,
|
883 |
+
e.g., hour 5 in Figure 3, where OOS-1 goes into the standby
|
884 |
+
state as the day-ahead price is too high for profitable hydrogen
|
885 |
+
production. In contrast, OOS-4 and OOS-12 continue the
|
886 |
+
operation in the on state, but at the power consumption level
|
887 |
+
corresponding to the maximum efficiency, where hydrogen
|
888 |
+
production is still profitable.
|
889 |
+
The number of segments |S| plays an important role in the
|
890 |
+
optimal dispatch decision when the day-ahead price lies within
|
891 |
+
a specific price range. The upper bound of this price range
|
892 |
+
corresponds to the highest price for which the production of
|
893 |
+
hydrogen is still profitable. The lower bound is the price below
|
894 |
+
which the optimal dispatch decision is always the maximum
|
895 |
+
electrolyzer consumption. Figure 4 shows the distribution of
|
896 |
+
the day-ahead price λDA
|
897 |
+
t
|
898 |
+
over 8,760 hours of year 2019 in
|
899 |
+
DK2 with the bounds of the price range of interest are marked
|
900 |
+
by the red and green dotted lines. The upper bound is found
|
901 |
+
as the day-ahead price for which the hydrogen production is
|
902 |
+
only feasible at the maximum efficiency, denoted by α in the
|
903 |
+
inner plot of Figure 4. The lower bound corresponds to the
|
904 |
+
efficiency at the full load, denoted by β. If the day-ahead price
|
905 |
+
of a given hour lies outside of this range, the dispatch decision
|
906 |
+
for any number of segments would be the same; produce at
|
907 |
+
the maximum possible load or cease the production, and there
|
908 |
+
would be no added value of a detailed production curve 6.
|
909 |
+
This will be further investigated in Section IV-F.
|
910 |
+
6These two price thresholds are calculated by multiplying the hydrogen
|
911 |
+
price and the efficiency at points β and α, respectively.
|
912 |
+
6
|
913 |
+
|
914 |
+
25
|
915 |
+
30
|
916 |
+
35
|
917 |
+
40
|
918 |
+
45
|
919 |
+
50
|
920 |
+
55
|
921 |
+
Day-ahead price [ /MWh]
|
922 |
+
0
|
923 |
+
50
|
924 |
+
100
|
925 |
+
150
|
926 |
+
200
|
927 |
+
250
|
928 |
+
300
|
929 |
+
350
|
930 |
+
Frequency
|
931 |
+
Price
|
932 |
+
Price mean
|
933 |
+
Power [%]
|
934 |
+
Efficiency
|
935 |
+
[kg/MWh]
|
936 |
+
Fig. 4. Histogram of the day-ahead electricity price over 8,760 hours of year
|
937 |
+
2019 in DK2. Prices λα and λβ correspond to electricity prices for which
|
938 |
+
the electrolyzer operates at points α and β, indicated in the inner plot.
|
939 |
+
C. Impacts of the States
|
940 |
+
We consider three cases OOS, OO, and OS, each for both
|
941 |
+
1 and 12 segments. Recall that their corresponding MILPs
|
942 |
+
are different7. Comparing the results of MILPs with the same
|
943 |
+
number of segments, we observe OS and OOS perform almost
|
944 |
+
equally, as observed in Figure 5. The reason for this is the low
|
945 |
+
frequency of consecutive hours of too high day-ahead prices,
|
946 |
+
where a complete shut-off would be preferred over the standby
|
947 |
+
state. Over 8,760 hours, OOS-1 starts up only 2 times, with a
|
948 |
+
total of 286 hours offline. The difference in results obtained for
|
949 |
+
OS and OOS increases if a higher standby power consumption
|
950 |
+
or lower cold start-up cost for the electrolyzer is assumed,
|
951 |
+
which would lead to more frequent shut-offs. On the contrary,
|
952 |
+
OO earns the lowest profit, mainly due to the high start-up
|
953 |
+
cost, which decreases the operational flexibility as even a short
|
954 |
+
pause in production incurs a high cost.
|
955 |
+
D. Ex-post Performance Analysis
|
956 |
+
Recall that three MILPs solve the problem based on the
|
957 |
+
linearized hydrogen curve. Through the following ex-post
|
958 |
+
performance analysis, it is seen that this leads to both sub-
|
959 |
+
optimal dispatch decisions and an underestimation of the true
|
960 |
+
amount of hydrogen produced. We have already observed in
|
961 |
+
Figure 1(b) that the linearized red curve is below the original
|
962 |
+
black non-linear hydrogen production curve, implying that the
|
963 |
+
hydrogen production might be underestimated. This means that
|
964 |
+
we can expect to produce more hydrogen than what MILPs
|
965 |
+
calculate. Such a difference is expected to be reduced by
|
966 |
+
using more segments |S| to approximate the original non-
|
967 |
+
linear hydrogen production curve.
|
968 |
+
Pursuing a fair comparison among models, we conduct an
|
969 |
+
ex-post performance analysis. Once the MILPs are solved and
|
970 |
+
the optimal power consumption pe∗
|
971 |
+
t
|
972 |
+
of the electrolyzer ob-
|
973 |
+
tained, we re-calculate the true amount of hydrogen produced
|
974 |
+
based on the original non-linear hydrogen production curve.
|
975 |
+
Note that we do not re-optimize the problem8. We refer to
|
976 |
+
the amount of extra hydrogen and its corresponding profit as
|
977 |
+
7While we solve the proposed MILP (6)-(29) for OOS, the MILPs
|
978 |
+
presented in Appendixes A and B are solved for OO and OS, respectively.
|
979 |
+
8To avoid re-optimization, we assume the extra hydrogen is directly sold to
|
980 |
+
the demand and is not stored in the hydrogen storage. Otherwise, one needs to
|
981 |
+
re-optimize a posteriori to optimize the operation of storage and compressor.
|
982 |
+
12
|
983 |
+
8
|
984 |
+
4
|
985 |
+
2
|
986 |
+
1
|
987 |
+
Number of segments
|
988 |
+
97
|
989 |
+
98
|
990 |
+
99
|
991 |
+
100
|
992 |
+
Profit [%]
|
993 |
+
OOS
|
994 |
+
OS
|
995 |
+
OO
|
996 |
+
States
|
997 |
+
15.8
|
998 |
+
15.9
|
999 |
+
16.1
|
1000 |
+
16.2
|
1001 |
+
Profit [million ]
|
1002 |
+
OOS
|
1003 |
+
Realized surplus
|
1004 |
+
1 seg.
|
1005 |
+
12 seg.
|
1006 |
+
Fig. 5.
|
1007 |
+
Estimated and realized surplus profit. The first five bars from the
|
1008 |
+
left correspond to OOS-1 to OOS-12. The next six bars show the results for
|
1009 |
+
OO-1, OO-12, OS-1, OS-12, OOS-1, and OOS-12, respectively. The right
|
1010 |
+
vertical axis is the profit in million C, whereas the left vertical axis is the
|
1011 |
+
relative profit in % in comparison to the highest profit achieved by OOS-12.
|
1012 |
+
12
|
1013 |
+
8
|
1014 |
+
4
|
1015 |
+
2
|
1016 |
+
1
|
1017 |
+
Number of segments
|
1018 |
+
80
|
1019 |
+
85
|
1020 |
+
90
|
1021 |
+
95
|
1022 |
+
100
|
1023 |
+
H2 production [%]
|
1024 |
+
OOS
|
1025 |
+
OS
|
1026 |
+
OO
|
1027 |
+
States
|
1028 |
+
2.3
|
1029 |
+
2.5
|
1030 |
+
2.6
|
1031 |
+
2.8
|
1032 |
+
2.9
|
1033 |
+
H2 production [thousand tons]
|
1034 |
+
OOS
|
1035 |
+
Realized surplus
|
1036 |
+
1 seg.
|
1037 |
+
12 seg.
|
1038 |
+
Fig. 6. Estimated and realized surplus hydrogen produced. The first five bars
|
1039 |
+
from the left correspond to OOS-1 to OOS-12. The next six bars show the
|
1040 |
+
results for OO-1, OO-12, OS-1, OS-12, OOS-1, and OOS-12, respectively.
|
1041 |
+
“realized surplus”. We assume that all extra hydrogen is sold
|
1042 |
+
at the same constant price, i.e., C2.10/kg.
|
1043 |
+
Figure 5 provides the estimated and realized surplus profit
|
1044 |
+
among different cases. The estimated profit (gray area) is
|
1045 |
+
the optimal value obtained for the objective function of the
|
1046 |
+
corresponding MILP, while the realized profit (dark area),
|
1047 |
+
calculated ex-post, takes into account the profit of selling extra
|
1048 |
+
hydrogen. Similarly, Figure 6 shows the total estimated and
|
1049 |
+
realized surplus hydrogen produced. Note that the compressor
|
1050 |
+
would need to consume more power (around 1 MWh/ton) due
|
1051 |
+
to extra hydrogen. We draw two conclusions from Figures 5
|
1052 |
+
and 6:
|
1053 |
+
(1) Realized surplus: This surplus for profit and hydrogen
|
1054 |
+
production is reduced by increasing the number of segments,
|
1055 |
+
due to the improved approximation of the original non-linear
|
1056 |
+
curve. The realized surplus profit decreases from C71,199
|
1057 |
+
(0.44%) for OOS-1 to C602 (below 0.01%) for OOS-12.
|
1058 |
+
Similarly, the hydrogen production surplus is significantly
|
1059 |
+
decreased, yielding a realized surplus of ∼ 34 tons (1.27%) for
|
1060 |
+
OOS-1 and only 0.3 tons (0.01%) for OOS-12. By choosing
|
1061 |
+
a low number of segments, the hydrogen production is under-
|
1062 |
+
estimated which may lead to logistic issues and inefficiencies
|
1063 |
+
in the real-life operation of the hybrid power plant.
|
1064 |
+
(2) Ex-post profit and hydrogen production: Adding more
|
1065 |
+
electrolyzer details (segments or/and states) always leads to
|
1066 |
+
an increase in the ex-post profit. To compare various models,
|
1067 |
+
7
|
1068 |
+
|
1069 |
+
TABLE II
|
1070 |
+
COMPUTATIONAL ASPECTS
|
1071 |
+
Case
|
1072 |
+
Computational time [s]
|
1073 |
+
No. of binary variables
|
1074 |
+
OS-1
|
1075 |
+
1.4
|
1076 |
+
2×8760
|
1077 |
+
OS-12
|
1078 |
+
12.7
|
1079 |
+
13×8760
|
1080 |
+
OOS-1
|
1081 |
+
137.8
|
1082 |
+
5×8760
|
1083 |
+
OOS-2
|
1084 |
+
135.8
|
1085 |
+
6×8760
|
1086 |
+
OOS-4
|
1087 |
+
236.3
|
1088 |
+
8×8760
|
1089 |
+
OOS-8
|
1090 |
+
350.3
|
1091 |
+
12×8760
|
1092 |
+
OOS-12
|
1093 |
+
473.7
|
1094 |
+
16×8760
|
1095 |
+
OO-1
|
1096 |
+
767.1
|
1097 |
+
3×8760
|
1098 |
+
OO-12
|
1099 |
+
1,763.1
|
1100 |
+
14×8760
|
1101 |
+
OOS-12 is taken as a benchmark, as it leads to the highest
|
1102 |
+
profit. First, the impact of the number of segments is examined,
|
1103 |
+
while keeping the number of states fixed and equal to 3. The
|
1104 |
+
ex-post profit reduction applying 1 instead of 12 segments is
|
1105 |
+
0.72%, corresponding to around 117.6 kC for the entire hybrid
|
1106 |
+
power plant. The ex-post hydrogen production is increased by
|
1107 |
+
8.32%, corresponding to around 241 tons. This percentage
|
1108 |
+
deviation is notably higher in part because the increase in
|
1109 |
+
hydrogen profit is dampened by the reduction in electric-
|
1110 |
+
ity profit (3.86% electricity profit increase for 1 segment
|
1111 |
+
compared to 12 segments). For OOS-1, the profit share of
|
1112 |
+
selling hydrogen is much lower than the profit share of selling
|
1113 |
+
electricity (around 34%). By introducing more segments, the
|
1114 |
+
contribution of hydrogen sales is increased to 38% at the
|
1115 |
+
expense of electricity sales. More profit and different business
|
1116 |
+
models are therefore unlocked by including more electrolyzer
|
1117 |
+
details in the MILP formulation. Figures 5 and 6 show that the
|
1118 |
+
errors are considerably reduced by implementing 4 segments
|
1119 |
+
instead of 1. Second, we assess the impact of the states on the
|
1120 |
+
ex-post profit and hydrogen production. While OS performs
|
1121 |
+
just as well as OOS as described in Section IV-C, OO with 12
|
1122 |
+
segments results in a 1.22% lower ex-post profit, and in a 4%
|
1123 |
+
lower hydrogen production. For OO-1, a profit reduction of
|
1124 |
+
around 1.8% and a reduced hydrogen production of 13.5% are
|
1125 |
+
observed, compared to the benchmark. Finally, we observe that
|
1126 |
+
neglecting the standby state in the model formulation leads to
|
1127 |
+
the worst outcome in terms of profit and hydrogen production
|
1128 |
+
potential.
|
1129 |
+
E. Computational Analysis
|
1130 |
+
All MILPs have been solved using the Gurobi solver in Julia
|
1131 |
+
on a MacBook Pro M1 2020 with 16 GB RAM. The optimality
|
1132 |
+
gap is fixed to 0.01% when we solve every MILP. The
|
1133 |
+
increase in the number of linearization segments |S| leads to an
|
1134 |
+
increase in computational time due to introducing more binary
|
1135 |
+
variables. For OOS, the computational time is increased from
|
1136 |
+
138 seconds for 1 segment to 474 seconds for 12 segments,
|
1137 |
+
as reported in Table II. Removing the off state significantly
|
1138 |
+
reduces the computational time, with OS-1 being by far the
|
1139 |
+
fastest MILP to be solved (1.4 seconds). The OO models
|
1140 |
+
require the highest computational time, although they embody
|
1141 |
+
fewer binary variables than their OS and OOS counterparts.
|
1142 |
+
We hypothesize the reason is that the start-up cost constraints
|
1143 |
+
with inter-temporal nature are more often active when the
|
1144 |
+
option of standby state is not present. Therefore, we do
|
1145 |
+
not recommend using OO as its corresponding profit is the
|
1146 |
+
lowest among all cases (Figure 5), and it is being solved
|
1147 |
+
comparatively slower. Further, if computational efficiency is
|
1148 |
+
crucial, it may be beneficial to neglect the off state and run
|
1149 |
+
the OS model for improved computational performances. In
|
1150 |
+
general, the computational time increases with the number
|
1151 |
+
of segments but is deemed reasonable for the OS and OOS
|
1152 |
+
models, considering that our optimization problem is run over
|
1153 |
+
8,760 hours. As operational problems are typically solved
|
1154 |
+
for a shorter time horizon, e.g., 24 hours for day-ahead
|
1155 |
+
scheduling, the computational cost of adding more details to
|
1156 |
+
the electrolyzer would be minimal.
|
1157 |
+
F. Sensitivity Analysis with Respect to Input Data
|
1158 |
+
In the previous sections, we have shown that adopting a
|
1159 |
+
simplified electrolyzer model can lead to an underestimation
|
1160 |
+
of the profit and hydrogen production for the hybrid power
|
1161 |
+
plant. We have also shown that the benefit of added details is
|
1162 |
+
case-specific, and depends on the input parameters. We now
|
1163 |
+
aim at assessing the impact of input parameters and system
|
1164 |
+
configuration on these results, through a sensitivity analysis.
|
1165 |
+
In particular, we will focus on wind over electrolyzer capacity
|
1166 |
+
ratio, hydrogen demand over electrolyzer capacity ratio, and
|
1167 |
+
the hydrogen price. The sensitivity analysis is performed on
|
1168 |
+
the OOS-1 and OOS-12 models.
|
1169 |
+
1) Wind size: Recall from Table I that the wind farm
|
1170 |
+
capacity is 2 times that of the electrolyzer. To assess the impact
|
1171 |
+
of the wind-to-electrolyzer capacity ratio, two additional cases
|
1172 |
+
are considered, under which such a ratio is 1, 2 (reference),
|
1173 |
+
and 8. When this ratio is reduced from 2 to 1, the number
|
1174 |
+
of hours where the power input to the electrolyzer is limited
|
1175 |
+
by the wind availability is increased from 5,326 to all hours.
|
1176 |
+
Conversely, when the ratio is increased from 2 to 8, the number
|
1177 |
+
of power-limited hours is reduced to 1,236. We observe that
|
1178 |
+
the realized surplus for hydrogen production increases with
|
1179 |
+
the number of hours with limited wind power. The reason for
|
1180 |
+
this is that the piecewise approximation is exact only on the
|
1181 |
+
linearization points, and the limited wind availability forces
|
1182 |
+
the electrolyzer to operate out of those points. Conversely,
|
1183 |
+
when the number of wind power-limited hours is reduced,
|
1184 |
+
the electrolyzer operates more often on the linearization
|
1185 |
+
points, where the approximation is exact. It follows that the
|
1186 |
+
underestimation of hydrogen production is greater the more
|
1187 |
+
the electrolyzer is limited from operating at the linearization
|
1188 |
+
points. With a wind-to-electrolyzer ratio of 1, the difference
|
1189 |
+
in ex-post hydrogen production between 1 and 12 segments
|
1190 |
+
is 13%, which is reduced to 3% when the ratio increases to
|
1191 |
+
8. Therefore, incorporating electrolyzer details is crucial for
|
1192 |
+
hybrid power plants where the wind-to-electrolyzer capacity
|
1193 |
+
ratio is small.
|
1194 |
+
2) Hydrogen demand size: To investigate the sensitivity of
|
1195 |
+
optimization outcomes with respect to the hydrogen demand,
|
1196 |
+
the minimum daily demand is doubled, corresponding to
|
1197 |
+
around 8 full-load hours of hydrogen production. We observe
|
1198 |
+
that the impact of adding more segments to the electrolyzer
|
1199 |
+
8
|
1200 |
+
|
1201 |
+
production curve diminishes when the demand constraint is
|
1202 |
+
tighter, i.e., with a higher minimum daily demand. For the case
|
1203 |
+
with the reference demand, the difference between the ex-post
|
1204 |
+
profit for OOS-12 and OOS-1 is 8%. This difference, when the
|
1205 |
+
hydrogen demand is doubled, is reduced to 2%. The increase
|
1206 |
+
in demand forces the electrolyzer to operate more frequently
|
1207 |
+
at its maximum load, where both OOS-1 and OOS-12 share
|
1208 |
+
the same linearization point and efficiency.
|
1209 |
+
3) Hydrogen price: To explore the impact of the hydrogen
|
1210 |
+
price, we increase it from C2.10/kg to C5.00/kg. As already
|
1211 |
+
discussed in Section IV-B, adding more segments impact
|
1212 |
+
the optimal solution and profit as long as the electricity
|
1213 |
+
price in the given hour is in the range [λβ, λα], shown in
|
1214 |
+
Figure 4. Since λα and λβ are proportional to the hydrogen
|
1215 |
+
price, by increasing the hydrogen price, the range [λβ, λα] is
|
1216 |
+
widened and moved towards higher electricity prices, where
|
1217 |
+
the frequency of occurrence is reduced. When the MILP is
|
1218 |
+
solved with the hydrogen price of C5/kg, it is more frequently
|
1219 |
+
optimal to operate the electrolyzer at full load (39% of the
|
1220 |
+
time, compared to 11% for the case with the hydrogen price of
|
1221 |
+
C2.1/kg) and the linearization segments are utilized less. This
|
1222 |
+
also results in a significantly decreased computational time
|
1223 |
+
(below 20 seconds for OOS-12). The profit contribution from
|
1224 |
+
the hydrogen sale is increased significantly to 92%. The ex-
|
1225 |
+
post profit and hydrogen production difference between OOS-
|
1226 |
+
1 and OOS-12 are reduced to 0.01% and 0.03%, respectively
|
1227 |
+
(they are 0.72% and 8.32% for the C2.1/kg case).
|
1228 |
+
The modeling of segments is relevant if higher hydrogen
|
1229 |
+
prices are coupled with also higher electricity prices. In
|
1230 |
+
this way, the electricity price range [λβ, λα] would still be
|
1231 |
+
overlapping with the majority of day-ahead price occurrences.
|
1232 |
+
For example, we test an artificial case where the day-ahead
|
1233 |
+
electricity price time series was multiplied by a constant factor
|
1234 |
+
to increase the mean price to around C90/MWh (similar to
|
1235 |
+
the mean value for 2021 in DK2). In this case, with the
|
1236 |
+
hydrogen price of C5/kg, similar results to the 2019 test case
|
1237 |
+
with the hydrogen price of C2.1/kg were obtained in terms of
|
1238 |
+
the impact of the number of segments. For a given hydrogen
|
1239 |
+
price and efficiency curve, checking if the price range [λβ, λα]
|
1240 |
+
overlaps with the expected electricity price is therefore crucial
|
1241 |
+
to assess a priori the impact of choosing a simplified model
|
1242 |
+
for the production curve (e.g., 1 linearization segment only)
|
1243 |
+
and support the modeling choices.
|
1244 |
+
V. DISCUSSION AND CONCLUSION
|
1245 |
+
Several studies have focused on the optimal dispatch of
|
1246 |
+
hybrid renewable-hydrogen power plants assuming simplified
|
1247 |
+
models for the electrolyzer component. This paper investigates
|
1248 |
+
the impact of choosing different levels of operational details
|
1249 |
+
for the electrolyzer model on the dispatch decisions, profit, the
|
1250 |
+
amount of hydrogen produced, and computational time. The
|
1251 |
+
impact of two modeling choices is considered: the operating
|
1252 |
+
states (on, off, standby), and the number of segments used
|
1253 |
+
to linearize the hydrogen production curve. The problems are
|
1254 |
+
formulated as MILPs, where the number of binary variables
|
1255 |
+
depends on the number of states and segments.
|
1256 |
+
For fixed states, adding more linearization segments for
|
1257 |
+
approximating the hydrogen production curve results in a
|
1258 |
+
higher profit, and a reduced surplus in the ex-post profit
|
1259 |
+
calculation, meaning that the model is able to estimate the
|
1260 |
+
actual cost and revenue streams more accurately. Moreover,
|
1261 |
+
a better estimation of the produced hydrogen is achieved.
|
1262 |
+
In fact, the linearization results in an underestimation of the
|
1263 |
+
produced hydrogen, but the underestimation is reduced by
|
1264 |
+
increasing the number of segments. Apart from introducing
|
1265 |
+
errors in the actual realized profit, thus potentially impacting
|
1266 |
+
the investment decisions in these types of technologies, the
|
1267 |
+
systematic underestimation of the hydrogen produced by the
|
1268 |
+
electrolyzer might introduce logistical inefficiencies, e.g., truck
|
1269 |
+
scheduling, and storage discharging/filling.
|
1270 |
+
The impact of adding more piecewise segments to the
|
1271 |
+
hydrogen production curve depends on the distribution of day-
|
1272 |
+
ahead electricity prices in the given time horizon. The model
|
1273 |
+
formulations with 1 and 12 segments take significantly dif-
|
1274 |
+
ferent dispatch decisions when the day-ahead electricity price
|
1275 |
+
is within a certain range, which depends on the electrolyzer
|
1276 |
+
efficiency (minimum and maximum) and the hydrogen price.
|
1277 |
+
Out of this day-ahead electricity price range, the model with 1
|
1278 |
+
and 12 segments takes the same dispatch decisions. Therefore,
|
1279 |
+
the value of adding more details to the hydrogen production
|
1280 |
+
curve could differ by varying input data and case studies. It
|
1281 |
+
is observed that this value decreases when the electrolyzer
|
1282 |
+
operates less at partial loading, e.g. when the input power is
|
1283 |
+
less limited by available wind power or with high-demand
|
1284 |
+
constraints. In this paper, revenues from other than the day-
|
1285 |
+
ahead market are not considered but this may also impact the
|
1286 |
+
dispatch strategy and therefore benefit from more segments.
|
1287 |
+
Choosing to represent only on and off states leads to the
|
1288 |
+
highest profit underestimation and worst ex-post performance
|
1289 |
+
while modeling only on and standby states lead to similar
|
1290 |
+
profit and dispatch decisions to the three-state model. This
|
1291 |
+
result is, however, significantly affected by the assumption
|
1292 |
+
made on the standby power consumption of the electrolyzer
|
1293 |
+
and its start-up cost. These parameters are highly uncertain
|
1294 |
+
due to the lack of data on large-scale electrolyzers.
|
1295 |
+
In conclusion, adopting more simplified models for the
|
1296 |
+
electrolyzer always leads to a reduced profit and sub-optimal
|
1297 |
+
scheduling. However, the impact of adding more details may
|
1298 |
+
vary depending on the case study considered and especially
|
1299 |
+
the range of day-ahead electricity prices, hydrogen price, wind
|
1300 |
+
power production compared to the electrolyzer installed capac-
|
1301 |
+
ity, standby power consumption, and start-up cost. Among all
|
1302 |
+
considered models, the most complete one (three states with
|
1303 |
+
12 segments) was solved for a 1-year horizon in less than
|
1304 |
+
10 minutes. The increase in computational time by adding
|
1305 |
+
more details would be marginal if a day-ahead scheduling
|
1306 |
+
problem is considered instead. Moreover, reducing the three-
|
1307 |
+
state model to two states only is not always faster, as it was
|
1308 |
+
observed that the two-state on-off model with 12 segments
|
1309 |
+
was the longest to solve among all the cases considered. A
|
1310 |
+
more detailed representation of the electrolyzers should be
|
1311 |
+
preferred for operational problems. For investment problems,
|
1312 |
+
9
|
1313 |
+
|
1314 |
+
we hypothesize that it may be adequate to adopt a more
|
1315 |
+
simplified model of the electrolyzer, but this should be further
|
1316 |
+
assessed and it was out of the scope of the current paper.
|
1317 |
+
Further research should be conducted to assess the impact of
|
1318 |
+
modeling choices when additional revenue streams are consid-
|
1319 |
+
ered, such as flexibility provisions in ancillary service markets,
|
1320 |
+
which may impact the dispatch decisions of the hybrid power
|
1321 |
+
plant. Additionally, as there is a high uncertainty related to the
|
1322 |
+
start-up and standby costs, the sensitivity of these parameters
|
1323 |
+
on the impact of added details should be assessed further.
|
1324 |
+
Moreover, the level of detail needed for investment problems
|
1325 |
+
should be further investigated. The modeling of electrolyzer
|
1326 |
+
cell degradation over time should be investigated and included
|
1327 |
+
in the model with additional constraints. Finally, uncertainties
|
1328 |
+
in wind power supply and electricity prices should be included.
|
1329 |
+
ACKNOWLEDGEMENT
|
1330 |
+
This research was supported by the Energy Cluster Den-
|
1331 |
+
mark through the “Sustainable P2X Business Model” project,
|
1332 |
+
and by the Danish Energy Development Programme (EUDP)
|
1333 |
+
through the HOMEY project (64021-7010). We would like to
|
1334 |
+
thank Jens Jakob Sørensen (Ørsted), Alexander Holm Kiilerich
|
1335 |
+
(Ørsted), Roar Hestbek Nicolaisen (Hybrid Greentech), Yan-
|
1336 |
+
nick Werner (DTU), and Matˇej Novotn´y for collaborations,
|
1337 |
+
thoughtful discussions, and constructive feedback.
|
1338 |
+
APPENDIX
|
1339 |
+
A. The simplified MILP with On-Off States
|
1340 |
+
This appendix provides the MILP (A.30a), where the on
|
1341 |
+
and off states of the electrolyzer are only modeled. This is a
|
1342 |
+
simplified model compared to the one proposed in Section III
|
1343 |
+
with three states of the electrolyzer.
|
1344 |
+
max
|
1345 |
+
Ω
|
1346 |
+
�
|
1347 |
+
t∈T
|
1348 |
+
ptλDA
|
1349 |
+
t
|
1350 |
+
+ dtλh − zsu
|
1351 |
+
t λsu
|
1352 |
+
(A.30a)
|
1353 |
+
s.t.
|
1354 |
+
pt = P w
|
1355 |
+
t − pe
|
1356 |
+
t − pc
|
1357 |
+
t
|
1358 |
+
∀ t ∈ T ,
|
1359 |
+
(A.30b)
|
1360 |
+
pe
|
1361 |
+
t ≤ Cezoo
|
1362 |
+
t
|
1363 |
+
∀ t ∈ T ,
|
1364 |
+
(A.30c)
|
1365 |
+
pe
|
1366 |
+
t ≥ P minzoo
|
1367 |
+
t
|
1368 |
+
∀ t ∈ T ,
|
1369 |
+
(A.30d)
|
1370 |
+
zsu
|
1371 |
+
t
|
1372 |
+
≥ zoo
|
1373 |
+
t
|
1374 |
+
− zoo
|
1375 |
+
t−1
|
1376 |
+
∀ t ∈ T \1,
|
1377 |
+
(A.30e)
|
1378 |
+
zoo
|
1379 |
+
t
|
1380 |
+
=
|
1381 |
+
�
|
1382 |
+
s∈S
|
1383 |
+
zh
|
1384 |
+
t,s
|
1385 |
+
∀ t ∈ T ,
|
1386 |
+
(A.30f)
|
1387 |
+
pe
|
1388 |
+
t =
|
1389 |
+
�
|
1390 |
+
s∈S
|
1391 |
+
ˆpe
|
1392 |
+
ts
|
1393 |
+
∀ t ∈ T ,
|
1394 |
+
(A.30g)
|
1395 |
+
(13), (15) − (16), (19) − (26),
|
1396 |
+
(A.30h)
|
1397 |
+
dt, ht, hd
|
1398 |
+
t , pt, pc
|
1399 |
+
t, ˆpe
|
1400 |
+
ts, st, sin
|
1401 |
+
t , sout
|
1402 |
+
t
|
1403 |
+
∈ R+,
|
1404 |
+
(A.30i)
|
1405 |
+
zsu
|
1406 |
+
t , zh
|
1407 |
+
ts, zoo
|
1408 |
+
t
|
1409 |
+
∈ {0, 1},
|
1410 |
+
(A.30j)
|
1411 |
+
Ω = {dt, ht, hd
|
1412 |
+
t , pt, pc
|
1413 |
+
t, ˆpe
|
1414 |
+
ts, sin
|
1415 |
+
t , sout
|
1416 |
+
t
|
1417 |
+
, zsu
|
1418 |
+
t , zh
|
1419 |
+
ts, zoo
|
1420 |
+
t }.
|
1421 |
+
(A.30k)
|
1422 |
+
B. The simplified MILP with On-Standby States
|
1423 |
+
This appendix presents the simplified MILP (A.31), taking
|
1424 |
+
into account on and standby states of the electrolyzer.
|
1425 |
+
max
|
1426 |
+
Γ
|
1427 |
+
�
|
1428 |
+
t∈T
|
1429 |
+
ptλDA
|
1430 |
+
t
|
1431 |
+
+ dtλh − pin
|
1432 |
+
t λin
|
1433 |
+
t
|
1434 |
+
(A.31a)
|
1435 |
+
s.t.
|
1436 |
+
pin
|
1437 |
+
t ≤ P sb(1 − zos
|
1438 |
+
t )
|
1439 |
+
∀ t ∈ T ,
|
1440 |
+
(A.31b)
|
1441 |
+
pe
|
1442 |
+
t ≤ Cezos
|
1443 |
+
t + P sb(1 − zos
|
1444 |
+
t )
|
1445 |
+
∀ t ∈ T ,
|
1446 |
+
(A.31c)
|
1447 |
+
pe
|
1448 |
+
t ≥ P minzos
|
1449 |
+
t + P sb(1 − zos
|
1450 |
+
t )
|
1451 |
+
∀ t ∈ T ,
|
1452 |
+
(A.31d)
|
1453 |
+
zos
|
1454 |
+
t =
|
1455 |
+
�
|
1456 |
+
s∈S
|
1457 |
+
zh
|
1458 |
+
t,s
|
1459 |
+
∀ t ∈ T ,
|
1460 |
+
(A.31e)
|
1461 |
+
pe
|
1462 |
+
t =
|
1463 |
+
�
|
1464 |
+
s∈S
|
1465 |
+
ˆpe
|
1466 |
+
ts + P sb(1 − zos
|
1467 |
+
t )
|
1468 |
+
∀ t ∈ T ,
|
1469 |
+
(A.31f)
|
1470 |
+
(7), (15) − (16), (19) − (26),
|
1471 |
+
(A.31g)
|
1472 |
+
dt, ht, hd
|
1473 |
+
t , pt, pc
|
1474 |
+
t, pin
|
1475 |
+
t , ˆpe
|
1476 |
+
ts, st, sin
|
1477 |
+
t , sout
|
1478 |
+
t
|
1479 |
+
∈ R+,
|
1480 |
+
(A.31h)
|
1481 |
+
zh
|
1482 |
+
ts, zos
|
1483 |
+
t ∈ {0, 1},
|
1484 |
+
(A.31i)
|
1485 |
+
Γ = {dt, ht, hd
|
1486 |
+
t , pt, pc
|
1487 |
+
t, pin
|
1488 |
+
t , ˆpe
|
1489 |
+
ts, sin
|
1490 |
+
t , st, sout
|
1491 |
+
t
|
1492 |
+
, zsu
|
1493 |
+
t , zos
|
1494 |
+
t }.
|
1495 |
+
(A.31j)
|
1496 |
+
REFERENCES
|
1497 |
+
[1] European
|
1498 |
+
Commission,
|
1499 |
+
“A
|
1500 |
+
European
|
1501 |
+
green
|
1502 |
+
deal,”
|
1503 |
+
2019.
|
1504 |
+
https://commission.europa.eu/strategy-and-policy/priorities-2019-
|
1505 |
+
2024/european-green-deal en.
|
1506 |
+
[2] European Comission, “A hydrogen strategy for a climate-neutral
|
1507 |
+
Europe,”
|
1508 |
+
2020.
|
1509 |
+
https://energy.ec.europa.eu/system/files/2020-07/
|
1510 |
+
hydrogen strategy 0.pdf.
|
1511 |
+
[3] International
|
1512 |
+
Energy
|
1513 |
+
Agency,
|
1514 |
+
“Global
|
1515 |
+
hydrogen
|
1516 |
+
review,”
|
1517 |
+
2022.
|
1518 |
+
https://iea.blob.core.windows.net/assets/c5bc75b1-9e4d-460d-9056-
|
1519 |
+
6e8e626a11c4/GlobalHydrogenReview2022.pdf.
|
1520 |
+
[4] Danish Ministry of Climate, Energy and Utilities, “The goverment’s
|
1521 |
+
strategy for power-to-x,” 2021.
|
1522 |
+
https://ens.dk/sites/ens.dk/files/ptx/
|
1523 |
+
strategy ptx.pdf.
|
1524 |
+
[5] K.
|
1525 |
+
Raj,
|
1526 |
+
P.
|
1527 |
+
Lakhina,
|
1528 |
+
and
|
1529 |
+
C.
|
1530 |
+
Stranger,
|
1531 |
+
“Harnessing
|
1532 |
+
green
|
1533 |
+
hydrogen opportunities for deep decarbonisation in India,” 2022.
|
1534 |
+
https://www.niti.gov.in/sites/default/files/2022-06/Harnessing Green
|
1535 |
+
Hydrogen V21 DIGITAL 29062022.pdf.
|
1536 |
+
[6] S. Clegg and P. Mancarella, “Integrated modeling and assessment of
|
1537 |
+
the operational impact of power-to-gas (P2G) on electrical and gas
|
1538 |
+
transmission networks,” IEEE Trans. Sustain. Energy, vol. 6, no. 4,
|
1539 |
+
pp. 1234–1244, 2015.
|
1540 |
+
[7] G. Matute, J. Yusta, and L. Correas, “Techno-economic modelling of
|
1541 |
+
water electrolysers in the range of several MW to provide grid services
|
1542 |
+
while generating hydrogen for different applications,” Int. J. Hydrog.
|
1543 |
+
Energy, vol. 44, no. 33, pp. 17431–17442, 2019.
|
1544 |
+
[8] G. Matute, J. Yusta, J. Beyza, and L. Correas, “Multi-state techno-
|
1545 |
+
economic model for optimal dispatch of grid connected hydrogen
|
1546 |
+
electrolysis systems operating under dynamic conditions,” Int. J. Hydrog.
|
1547 |
+
Energy, vol. 46, no. 2, pp. 1449–1460, 2021.
|
1548 |
+
[9] M. Roach and L. Meeus, “The welfare and price effects of sector
|
1549 |
+
coupling with power-to-gas,” Energy Econ., vol. 86, p. 104708, 2020.
|
1550 |
+
[10] C. Varela, M. Mostafa, and E. Zondervan, “Modeling alkaline water
|
1551 |
+
electrolysis for power-to-x applications: A scheduling approach,” Int. J.
|
1552 |
+
Hydrog. Energy, vol. 46, no. 14, pp. 9303–9313, 2021.
|
1553 |
+
[11] I. Pavi´c, N. ˇCovi´c, and H. Pandˇzi´c, “PV-battery-hydrogen plant: Cutting
|
1554 |
+
green hydrogen costs through multi-market positioning,” Appl. Energy,
|
1555 |
+
vol. 328, p. 120103, 2022.
|
1556 |
+
[12] S. S. Beerb¨uhl et al., “Combined scheduling and capacity planning of
|
1557 |
+
electricity-based ammonia production to integrate renewable energies,”
|
1558 |
+
Eur. J. Oper. Res., vol. 241, no. 3, pp. 851–862, 2015.
|
1559 |
+
[13] Y. Zheng et al., “Optimal day-ahead dispatch of an alkaline electrolyser
|
1560 |
+
system concerning thermal–electric properties and state-transitional dy-
|
1561 |
+
namics,” Appl. Energy, vol. 307, p. 118091, 2022.
|
1562 |
+
[14] M. G¨otz et al., “Renewable power-to-gas: A technological and economic
|
1563 |
+
review,” Renew. Energy, vol. 85, pp. 1371–1390, 2016.
|
1564 |
+
[15] A. Urs´ua et al., “Integration of commercial alkaline water electrolysers
|
1565 |
+
with renewable energies: Limitations and improvements,” Int. J. Hydrog.
|
1566 |
+
Energy, vol. 41, no. 30, pp. 12852–12861, 2016.
|
1567 |
+
[16] M. S´anchez et al., “Aspen plus model of an alkaline electrolysis
|
1568 |
+
system for hydrogen production,” Int. J. Hydrog. Energy, vol. 45, no. 7,
|
1569 |
+
pp. 3916–3929, 2020.
|
1570 |
+
[17] O. Ulleberg, “Modeling of advanced alkaline electrolyzers: A system
|
1571 |
+
simulation approach,” Int. J. Hydrog. Energy, vol. 28, no. 1, 2003.
|
1572 |
+
[18] M. Sanchez et al., “Semi-empirical model and experimental validation
|
1573 |
+
for the performance evaluation of a 15 kW alkaline water electrolyzer,”
|
1574 |
+
Int. J. Hydrog. Energy, vol. 43, no. 45, pp. 20332–20345, 2018.
|
1575 |
+
[19] ENTSO-e, “Transparency platform, day-ahead prices,” 2022.
|
1576 |
+
https://
|
1577 |
+
transparency.entsoe.eu/dashboard/show.
|
1578 |
+
[20] I. Staffell and S. Pfenninger, “Using bias-corrected reanalysis to simulate
|
1579 |
+
current and future wind power output,” Energy, vol. 114, 2016.
|
1580 |
+
[21] Energinet, “Aktuelle tariffer,” 2022. https://energinet.dk/El/Elmarkedet/
|
1581 |
+
Tariffer/Aktuelle-tariffer/.
|
1582 |
+
10
|
1583 |
+
|
-tE4T4oBgHgl3EQf4A1b/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
.gitattributes
CHANGED
@@ -2979,3 +2979,58 @@ O9FJT4oBgHgl3EQf1S22/content/2301.11651v1.pdf filter=lfs diff=lfs merge=lfs -tex
|
|
2979 |
utAzT4oBgHgl3EQf6_5m/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2980 |
ZdFLT4oBgHgl3EQfWC9a/content/2301.12055v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2981 |
YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2979 |
utAzT4oBgHgl3EQf6_5m/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2980 |
ZdFLT4oBgHgl3EQfWC9a/content/2301.12055v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2981 |
YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2982 |
+
3dAzT4oBgHgl3EQf9P73/content/2301.01918v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2983 |
+
d9E0T4oBgHgl3EQf5gJF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2984 |
+
ZtE2T4oBgHgl3EQfZgcV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2985 |
+
BdE2T4oBgHgl3EQfngiP/content/2301.04009v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2986 |
+
U9AzT4oBgHgl3EQf1P4j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2987 |
+
O9FJT4oBgHgl3EQf1S22/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2988 |
+
f9E4T4oBgHgl3EQfRgxA/content/2301.04990v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2989 |
+
XdE4T4oBgHgl3EQfNgwX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2990 |
+
j9E2T4oBgHgl3EQfIQbC/content/2301.03679v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2991 |
+
j9E2T4oBgHgl3EQfIQbC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2992 |
+
YtE5T4oBgHgl3EQfCw7_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2993 |
+
XdE4T4oBgHgl3EQfNgwX/content/2301.04956v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2994 |
+
8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2995 |
+
z9AzT4oBgHgl3EQfefx7/content/2301.01437v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2996 |
+
odE3T4oBgHgl3EQfLQlL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2997 |
+
ltE1T4oBgHgl3EQfgwTU/content/2301.03234v1.pdf filter=lfs diff=lfs merge=lfs -text
|
2998 |
+
nNFPT4oBgHgl3EQf5TUv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
2999 |
+
ItFKT4oBgHgl3EQfdy7h/content/2301.11822v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3000 |
+
RtFKT4oBgHgl3EQfiy45/content/2301.11843v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3001 |
+
ZtE2T4oBgHgl3EQfZgcV/content/2301.03864v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3002 |
+
YNE4T4oBgHgl3EQfNwyH/content/2301.04959v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3003 |
+
8dA0T4oBgHgl3EQfOv8t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3004 |
+
z9AzT4oBgHgl3EQfefx7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3005 |
+
g9E3T4oBgHgl3EQfgApS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3006 |
+
YNE4T4oBgHgl3EQfNwyH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3007 |
+
xNE3T4oBgHgl3EQf_QuN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3008 |
+
VdE4T4oBgHgl3EQfnQ2t/content/2301.05175v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3009 |
+
UdE_T4oBgHgl3EQfxBzD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3010 |
+
rtE1T4oBgHgl3EQf3AU7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3011 |
+
ItFKT4oBgHgl3EQfdy7h/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3012 |
+
pdFPT4oBgHgl3EQf7jXR/content/2301.13205v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3013 |
+
B9E3T4oBgHgl3EQfUAr7/content/2301.04448v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3014 |
+
S9E2T4oBgHgl3EQfWwd9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3015 |
+
g9E3T4oBgHgl3EQfgApS/content/2301.04557v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3016 |
+
gNE4T4oBgHgl3EQfRgzC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3017 |
+
VNE4T4oBgHgl3EQfnQ0i/content/2301.05174v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3018 |
+
gNE4T4oBgHgl3EQfRgzC/content/2301.04991v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3019 |
+
UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3020 |
+
NNAyT4oBgHgl3EQfgvgA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3021 |
+
RtFKT4oBgHgl3EQfiy45/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3022 |
+
E9A0T4oBgHgl3EQfBP8f/content/2301.01972v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3023 |
+
cNE4T4oBgHgl3EQfow2y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3024 |
+
mdE1T4oBgHgl3EQfOAP6/content/2301.03011v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3025 |
+
ItE3T4oBgHgl3EQfXAqD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3026 |
+
fNE_T4oBgHgl3EQf2BxV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3027 |
+
BdE2T4oBgHgl3EQfngiP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3028 |
+
B9E3T4oBgHgl3EQfUAr7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3029 |
+
G9E4T4oBgHgl3EQfgQ3v/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3030 |
+
2dE1T4oBgHgl3EQf5gVO/content/2301.03512v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3031 |
+
tNE1T4oBgHgl3EQf3gVt/content/2301.03490v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3032 |
+
ldE3T4oBgHgl3EQf6Atx/content/2301.04786v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3033 |
+
G9E4T4oBgHgl3EQfgQ3v/content/2301.05116v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3034 |
+
LNFAT4oBgHgl3EQfwR78/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
3035 |
+
qdE2T4oBgHgl3EQf0gjz/content/2301.04143v1.pdf filter=lfs diff=lfs merge=lfs -text
|
3036 |
+
pdE1T4oBgHgl3EQfiQRF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
0dFIT4oBgHgl3EQf3CsM/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:de92654797d6bad5785afece94be41b543b9b0a7ae96d76d96b2a30e3676f79e
|
3 |
+
size 188351
|
2dE1T4oBgHgl3EQf5gVO/content/2301.03512v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:984cc6af9079b21a398145816cd6b0e6366debcf3689167143c3b524189a99b7
|
3 |
+
size 2375058
|
2dE1T4oBgHgl3EQf5gVO/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:eb6a96ab6e8ae5ec437cb71dc04d0230ebedf1ce118400a415475e58767bd8d8
|
3 |
+
size 132704
|
3dAzT4oBgHgl3EQf9P73/content/2301.01918v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c09c42c8be1a10d08f155336ab9cce9de6bb5d0f85a192ddca02ac61d16ebfcb
|
3 |
+
size 7457723
|
4tE4T4oBgHgl3EQfBAt_/content/tmp_files/2301.04848v1.pdf.txt
ADDED
@@ -0,0 +1,2047 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.04848v1 [math.FA] 12 Jan 2023
|
2 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES DISTRIBUTIONS
|
3 |
+
OF FEICHTINGER OPERATORS
|
4 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
5 |
+
Abstract. We investigate the τ-quantizations and Cohen’s class distributions
|
6 |
+
of a suitable class of trace-class operators, called Feichtinger’s operators, and
|
7 |
+
show that it is a convenient substitute for the class of Schwartz operators. Many
|
8 |
+
well-known concepts and results for functions in time-frequency analysis have an
|
9 |
+
operator-analog in our setting, e.g. that Cohen’s classes are convolutions of Wigner
|
10 |
+
functions with distributions or characterization of the class of Schwartz operators
|
11 |
+
as an intersection of weighted variants of the class of Feichtinger operators.
|
12 |
+
Contents
|
13 |
+
1.
|
14 |
+
Introduction
|
15 |
+
1
|
16 |
+
2.
|
17 |
+
Preliminaries
|
18 |
+
3
|
19 |
+
2.1.
|
20 |
+
A family of time-frequency representations
|
21 |
+
3
|
22 |
+
2.2.
|
23 |
+
Basics of QHA and novel tools
|
24 |
+
5
|
25 |
+
2.3.
|
26 |
+
τ-quantization of functions
|
27 |
+
6
|
28 |
+
3.
|
29 |
+
Feichtinger operators
|
30 |
+
7
|
31 |
+
3.1.
|
32 |
+
τ-quantization of operators
|
33 |
+
9
|
34 |
+
3.2.
|
35 |
+
A convenient environment for QHA
|
36 |
+
13
|
37 |
+
3.3.
|
38 |
+
τ-Cohen’s class of operators
|
39 |
+
23
|
40 |
+
4.
|
41 |
+
A characterization of Schwartz operators
|
42 |
+
28
|
43 |
+
Acknowledgments
|
44 |
+
30
|
45 |
+
References
|
46 |
+
30
|
47 |
+
1. Introduction
|
48 |
+
There is a vast literature on the boundedness of pseudodifferential operators
|
49 |
+
for certain classes of symbols in various quantization schemes along the lines of
|
50 |
+
H¨ormander classes or alternatively using Sj¨ostrand’s class or Shubin’s classes, e.g.
|
51 |
+
2010 Mathematics Subject Classification. 42B35;46E35;47G30;47B10.
|
52 |
+
Key
|
53 |
+
words
|
54 |
+
and
|
55 |
+
phrases. Cohen’s
|
56 |
+
class,
|
57 |
+
τ-quantization,
|
58 |
+
Feichtinger’s
|
59 |
+
algebra,
|
60 |
+
Wigner
|
61 |
+
distribution.
|
62 |
+
1
|
63 |
+
|
64 |
+
2
|
65 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
66 |
+
[1, 3, 4, 11, 22]. In the present work, we put our focus on Shubin’s τ-quantization
|
67 |
+
and the associated time-frequency representations, the τ-Cohen classes.
|
68 |
+
Our approach to this circle of ideas is based on the framework of quantum har-
|
69 |
+
monic analysis with the goal to lift the well-known results concerning functions to
|
70 |
+
an appropriate class of functions, which we call Feichtinger operators, S0, and which
|
71 |
+
is the operator analog of the well-known Feichtinger algebra S0.
|
72 |
+
We also discuss the relation between Feichtinger operators S0 and the class of
|
73 |
+
Schwartz operators introduced by Keyl, Kiukas and Werner in [14]. There the idea
|
74 |
+
is put forward that one should look for analogs of function spaces in the setting of
|
75 |
+
classes of operators, which has been realized in the case of Sobolev spaces in [15]
|
76 |
+
and for modulation spaces in [6].
|
77 |
+
For τ ∈ [0, 1] the τ-quantization of a symbol a ∈ S′(R2d), the space of tempered
|
78 |
+
distributions, is given by
|
79 |
+
(1)
|
80 |
+
Opτ(a)f(t) :=
|
81 |
+
�
|
82 |
+
R2d e2πi(t−y)ξa((1 − τ)t + τy, ξ)f(y) dydξ f ∈ S(Rd),
|
83 |
+
where the operator Opτ(a) is understood to be defined in the weak sense. A well-
|
84 |
+
known fact is that one can relate ⟨Opτ(a)f, g⟩ to a time-frequency representation,
|
85 |
+
Wτ(f, g), the cross-τ-Wigner distribution of f and g:
|
86 |
+
⟨Opτ(a)f, g⟩ = ⟨a, Wτ(g, f)⟩,
|
87 |
+
for all
|
88 |
+
f, g ∈ S(Rd).
|
89 |
+
Given an operator S, we denote by aS
|
90 |
+
τ its τ-symbol, i.e. the tempered distribution
|
91 |
+
such that Opτ
|
92 |
+
�
|
93 |
+
aS
|
94 |
+
τ
|
95 |
+
�
|
96 |
+
= S and Opτ is called the τ-Shubin quantization. For f, g ∈
|
97 |
+
L2(Rd) we denote the rank-one operator by f ⊗ g and note that af⊗g
|
98 |
+
τ
|
99 |
+
= Wτ(g, f),
|
100 |
+
i.e. there is an intrinsic relation between quantization schemes and time-frequency
|
101 |
+
representations.
|
102 |
+
We show that for well-behaved operators, e.g. trace class operators or Feichtinger
|
103 |
+
operators, this relation might be extended to operators.
|
104 |
+
Recall that Wigner in
|
105 |
+
his ground-breaking work on quasi-probability distributions introduced the cross-
|
106 |
+
Wigner distribution for certain classes of operators [24], which was later extended
|
107 |
+
to more general classes of operators by Moyal in [19].
|
108 |
+
Let S be a continuous operator between the Feichtinger algebra S0 and its contin-
|
109 |
+
uous dual space S′
|
110 |
+
0. We denote by KS the kernel of S, which exists by Feichtinger’s
|
111 |
+
kernel theorem and is a mild distribution on R2d.
|
112 |
+
We define Feichtinger operators, S0, to be the following class of continuous and
|
113 |
+
linear operators S0 := S : S′
|
114 |
+
0(Rd) → S0(Rd) that map norm bounded w-∗ convergent
|
115 |
+
sequences in S′
|
116 |
+
0 into norm convergent sequences in S0. In [10] it was shown that
|
117 |
+
these are precisely the linear continuous operators from S′
|
118 |
+
0 to S0 that have a kernel
|
119 |
+
in Feichtinger’s algebra, the so-called inner kernel theorem.
|
120 |
+
One of our main tools is that Feichtinger operators have a nice spectral decomposi-
|
121 |
+
tion. If S is in S0, then there exist two (non-unique) sequences {fn}n, {gn}n ⊆ S0(Rd)
|
122 |
+
|
123 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
124 |
+
3
|
125 |
+
such that
|
126 |
+
S =
|
127 |
+
∞
|
128 |
+
�
|
129 |
+
n=1
|
130 |
+
fn ⊗ gn,
|
131 |
+
∞
|
132 |
+
�
|
133 |
+
n=1
|
134 |
+
∥fn∥S0 ∥gn∥S0 < ∞,
|
135 |
+
KS =
|
136 |
+
∞
|
137 |
+
�
|
138 |
+
n=1
|
139 |
+
Kfn⊗gn.
|
140 |
+
Hence, Feichtinger operators are trace class operators and we can compute their trace
|
141 |
+
as follows tr(S) =
|
142 |
+
�
|
143 |
+
Rd KS(x, x) dx. In [7] operators having such a decomposition
|
144 |
+
have been studied and called Feichtinger states in case tr(S) = 1, but there the link
|
145 |
+
between these operators and the work [10] was not established, which is one of our
|
146 |
+
main observations.
|
147 |
+
Then the τ-Wigner distribution of S is defined in the following way
|
148 |
+
(2)
|
149 |
+
WτS(x, ω) :=
|
150 |
+
�
|
151 |
+
Rd e−2πitωKS(x + τt, x − (1 − τ)t) dt.
|
152 |
+
Our key observation is the following identity:
|
153 |
+
⟨a,WτS⟩ = tr(Opτ(a)S∗) =: ⟨Opτ(a),S⟩,
|
154 |
+
for S in S0 or J 1, and WτS is the τ-Wigner distribution of S. Consequently, we
|
155 |
+
interpret WτS as the τ-quantization of an operator in S0 or J 1.
|
156 |
+
Note, that if S is the rank-one operator f ⊗ g this becomes the aforementioned
|
157 |
+
relation between the τ-Wigner distribution and the Shubin τ-transform.
|
158 |
+
Based on this framework we deduce operator analogs of well-known results on
|
159 |
+
τ-Wigner distributions and τ-Shubin quantization, which indicates that this is a
|
160 |
+
very convenient setting for this type of investigation. In addition, we extend the
|
161 |
+
Cohen class of an operator, introduced in [17], to the τ-setting and show that it
|
162 |
+
can be written as the convolution of the Wigner distribution of an operator with a
|
163 |
+
distribution as in the function setting.
|
164 |
+
We close our discussion with the introduction of weighted versions of S0 and prove
|
165 |
+
that the intersection of all these is the class of Schwartz operators in [14]. As in the
|
166 |
+
case of functions, we hope that this global description of the Schwartz operators will
|
167 |
+
also turn out to be useful in subsequent studies and it also hints at operator analogs
|
168 |
+
of Gelfand-Shilov classes or other classes of test functions and the corresponding
|
169 |
+
class of ultradistributions.
|
170 |
+
2. Preliminaries
|
171 |
+
In this paper, the parameter τ always belongs to [0, 1], even when not specified.
|
172 |
+
2.1. A family of time-frequency representations. For x, ω ∈ Rd we define the
|
173 |
+
translation and modulation operator by
|
174 |
+
Txf(t) := f(t − x),
|
175 |
+
Mωf(t) := e2πiωtf(t),
|
176 |
+
∀t ∈ Rd,
|
177 |
+
respectively. Their composition is denoted by π(x, ω) := MωTx.
|
178 |
+
|
179 |
+
4
|
180 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
181 |
+
Given τ ∈ [0, 1], the τ-time-frequency shift (τ-TFS) at (x, ω) ∈ R2d is defined to
|
182 |
+
be
|
183 |
+
(3)
|
184 |
+
πτ(x, ω) := e−2πiτxωMωTx = M(1−τ)ωTxMτω.
|
185 |
+
For τ = 0 we recover the usual time-frequency shifts π0 = π. The following relations
|
186 |
+
are consequences of elementary computations, which are left to the reader:
|
187 |
+
πτ(x, ω)πτ(x′, ω′) = e−2πi[(1−τ)xω′−τx′ω]πτ(x + x′, ω + ω′),
|
188 |
+
πτ(x, ω)πτ(x′, ω′) = e−2πi[xω′−x′ω]πτ(x′, ω′)πτ(x, ω),
|
189 |
+
πτ(x, ω)∗ = π1−τ(−x, −ω) = e−2πi(1−τ)xωπ(−x, −ω).
|
190 |
+
In the present paper the symbol ⟨·,·⟩ either denotes the inner product in L2(Rd)
|
191 |
+
or a duality pairing between a Banach space X and its dual space X′, which is
|
192 |
+
compatible with the latter, i.e. ⟨·,·⟩ is assumed to be linear in the first argument
|
193 |
+
and conjugate-linear in the second one. In particular, the dual pairs considered in
|
194 |
+
this work are (L2, L2), (S′
|
195 |
+
0, S0), (S′
|
196 |
+
0, S0), respectively.
|
197 |
+
Above, S0 is the Feichtinger algebra (24), for the definitions of S0 and S′
|
198 |
+
0 see the
|
199 |
+
equations (25),(26) and (28). We introduce for f, g ∈ L2(Rd), or for any suitable
|
200 |
+
dual pair, the τ-short-time Fourier transform (τ-STFT) of f w.r.t g:
|
201 |
+
(4)
|
202 |
+
V τ
|
203 |
+
g f(x, ω) := ⟨f, πτ(x, ω)g⟩,
|
204 |
+
∀x, ω ∈ Rd.
|
205 |
+
As can be easily verified, the mapping
|
206 |
+
πτ : R2d → U(L2(Rd)),
|
207 |
+
where U(L2(Rd)) denotes the unitary operators on L2(Rd), is a projective represen-
|
208 |
+
tation of R2d for any τ. Consequently, V τ is the wavelet transform associated to πτ,
|
209 |
+
thus V τ
|
210 |
+
g f is a continuous function.
|
211 |
+
Remark 2.1. For τ = 0 we obtain the usual STFT V 0
|
212 |
+
g f = Vgf and we have
|
213 |
+
(5)
|
214 |
+
V τ
|
215 |
+
g f(x, ω) = e2πiτxωVgf(x, ω).
|
216 |
+
By the preceding identity, we have that V
|
217 |
+
1
|
218 |
+
2
|
219 |
+
g f is the cross-ambiguity function of f and
|
220 |
+
g:
|
221 |
+
(6)
|
222 |
+
V
|
223 |
+
1
|
224 |
+
2
|
225 |
+
g f(x, ω) = A(f, g)(x, ω).
|
226 |
+
We recall another frequently used time-frequency representation, the so-called
|
227 |
+
cross-τ-Wigner distribution of f and g in L2(Rd) defined by
|
228 |
+
(7)
|
229 |
+
Wτ(f, g)(x, ω) :=
|
230 |
+
�
|
231 |
+
Rd e−2πitωf(x + τt)g(x − (1 − τ)t) dt.
|
232 |
+
We aim to extend the definition of Wτ from functions to operators, see (15).
|
233 |
+
|
234 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
235 |
+
5
|
236 |
+
2.2. Basics of QHA and novel tools. In this subsection we introduce the ba-
|
237 |
+
sic definitions of quantum harmonic analysis (QHA) following the seminal work of
|
238 |
+
Werner [23].
|
239 |
+
For z ∈ R2d and A ∈ B(L2(Rd)) the translation of the operator A by z is
|
240 |
+
(8)
|
241 |
+
αz(A) := π(z)Aπ(z)∗,
|
242 |
+
which satisfies αzαz′ = αz+z′. By the parity operator, we mean
|
243 |
+
(9)
|
244 |
+
Pf(t) := ˇf(t) := f(−t),
|
245 |
+
for any f ∈ L2(Rd), which induces an involution of A ∈ B(L2(Rd)):
|
246 |
+
(10)
|
247 |
+
ˇA := PAP.
|
248 |
+
We denote by J 1 the space of all trace class operators on L2(Rd). Given a ∈ L1(R2d)
|
249 |
+
and S ∈ J 1. The convolution between a and S is the operator
|
250 |
+
(11)
|
251 |
+
a ⋆ S := S ⋆ a :=
|
252 |
+
�
|
253 |
+
R2d a(z)αz(S) dz,
|
254 |
+
were the integral may be interpreted in the weak sense. For operators S, T ∈ J 1,
|
255 |
+
their convolution is the function defined for every z ∈ R2d as
|
256 |
+
(12)
|
257 |
+
S ⋆ T(z) := tr
|
258 |
+
�
|
259 |
+
Sαz( ˇT)
|
260 |
+
�
|
261 |
+
.
|
262 |
+
In this paper, we reserve the symbol ⊗ for rank-one operators.
|
263 |
+
Namely, given
|
264 |
+
f, g ∈ L2(Rd):
|
265 |
+
(13)
|
266 |
+
(f ⊗ g)ψ := ⟨ψ, g⟩f,
|
267 |
+
∀ψ ∈ L2(Rd).
|
268 |
+
The kernel of an operator S will always be denoted by KS. Evidently, the kernel of
|
269 |
+
the operator f ⊗ g is the tensor product of functions f(x)g(y):
|
270 |
+
(f ⊗ g)ψ(t) = ⟨ψ, g⟩f(t) =
|
271 |
+
�
|
272 |
+
Rd f(t)g(x)ψ(x) dx.
|
273 |
+
In the sequel we denote the tensor product of two functions by f(x)g(y), we shall
|
274 |
+
adopt the notation
|
275 |
+
(14)
|
276 |
+
Kf⊗g(x, y) = f(x)g(y).
|
277 |
+
We now interpret (7) as the cross-τ-Wigner distribution of the rank-one operator
|
278 |
+
f ⊗ g.
|
279 |
+
Hence, it is natural to define the τ-Wigner distribution of an operator S with kernel
|
280 |
+
KS in the following way:
|
281 |
+
(15)
|
282 |
+
WτS(x, ω) :=
|
283 |
+
�
|
284 |
+
Rd e−2πitωKS(x + τt, x − (1 − τ)t) dt.
|
285 |
+
For S ∈ J 1 and τ ∈ [0, 1], we define the Fourier-τ-Wigner transform of S to be:
|
286 |
+
(16)
|
287 |
+
FWτS(z) := tr (πτ(z)∗S) ,
|
288 |
+
∀z ∈ R2d.
|
289 |
+
|
290 |
+
6
|
291 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
292 |
+
For τ = 1/2 we recover the usual Fourier-Wigner transform [23].
|
293 |
+
The τ-spreading representation of S ∈ B(L2) is the decomposition
|
294 |
+
(17)
|
295 |
+
S =
|
296 |
+
�
|
297 |
+
R2d h(z)πτ(z) dz,
|
298 |
+
where the integral is understood in the weak sense. The function h is called the
|
299 |
+
τ-spreading function of S.
|
300 |
+
In the following, we shall consider the τ-spreading representation as a quantization
|
301 |
+
scheme that assigns to a function an operator. Namely, h ∈ L1(R2d) gets associated
|
302 |
+
to the operator
|
303 |
+
(18)
|
304 |
+
SRτ(h) :=
|
305 |
+
�
|
306 |
+
R2d h(z)πτ(z) dz.
|
307 |
+
Let Fσ denote the symplectic Fourier transform. In the following lemma we collect
|
308 |
+
a number of important relations between these notions. The proofs are elementary
|
309 |
+
computations and based on the spectral decomposition of the trace class operators
|
310 |
+
S and T ([21]), which we leave to the interested reader.
|
311 |
+
Lemma 2.2. Let f, g, ∈ L2(Rd), S, T ∈ J 1, a ∈ L1(R2d) and τ ∈ [0, 1]. Then:
|
312 |
+
(i) Fσ(Wτ(f ⊗ g)) = V τ
|
313 |
+
g f;
|
314 |
+
(ii) FWτ(f ⊗ g) = V τ
|
315 |
+
g f;
|
316 |
+
(iii) WτS = FσFWτS;
|
317 |
+
(iv) FWτS(x, ω) = e−2πi(1/2−τ)xωFW1/2S(x, ω);
|
318 |
+
(v) Fσ(S ⋆ T) = FWτS · FW1−τT = FW1−τS · FWτT;
|
319 |
+
(vi) FWτ(a ⋆ S) = Fσa · FWτS;
|
320 |
+
(vii) FWτS is the τ-spreading function of S, i.e. S =
|
321 |
+
�
|
322 |
+
R2d FWτS(z)πτ(z) dz.
|
323 |
+
We notice that if we consider the rank-one operator S = f ⊗g, then the assertions
|
324 |
+
(iii) and (ii) of the previous lemma imply
|
325 |
+
(19)
|
326 |
+
Wτ(f, g) = Wτ(f ⊗ g) = FσV τ
|
327 |
+
g f.
|
328 |
+
2.3. τ-quantization of functions. The τ-quantization of a symbol a ∈ S′(R2d),
|
329 |
+
the space of tempered distributions, is formally given by
|
330 |
+
(20)
|
331 |
+
Opτ(a)f(t) :=
|
332 |
+
�
|
333 |
+
R2d e2πi(t−y)ξa((1 − τ)t + τy, ξ)f(y) dydξ,
|
334 |
+
where f ∈ S(Rd). Opτ(a) may be described rigorously in the weak sense:
|
335 |
+
⟨Opτ(a)f, g⟩ = ⟨a, Wτ(g, f)⟩,
|
336 |
+
∀f, g, ∈ S(Rd).
|
337 |
+
Given an operator S, we denote by aS
|
338 |
+
τ its τ-symbol, i.e. the tempered distribution
|
339 |
+
such that
|
340 |
+
Opτ
|
341 |
+
�
|
342 |
+
aS
|
343 |
+
τ
|
344 |
+
�
|
345 |
+
= S.
|
346 |
+
|
347 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
348 |
+
7
|
349 |
+
Remark 2.3. Under suitable assumptions, for example a ∈ L1(R2d), straightforward
|
350 |
+
calculations give
|
351 |
+
Opτ(a) =
|
352 |
+
�
|
353 |
+
R2d Fσa(z)πτ(z) dz,
|
354 |
+
and since also FWτ Opτ(a) is the τ-spreading function of Opτ(a), we have
|
355 |
+
(21)
|
356 |
+
a = FσFWτ Opτ(a).
|
357 |
+
Hence, for S ∈ J 1
|
358 |
+
(22)
|
359 |
+
aS
|
360 |
+
τ = FσFWτS = WτS.
|
361 |
+
Given a ∈ S′
|
362 |
+
0(R2d) and f, g ∈ S0(Rd), we recall the definition of cross-τ-Cohen’s
|
363 |
+
class representation of f and g, with kernel a:
|
364 |
+
(23)
|
365 |
+
Qτ
|
366 |
+
a(f, g) := a ∗ Wτ(f, g).
|
367 |
+
3. Feichtinger operators
|
368 |
+
In this section we summarize some important results concerning a class of op-
|
369 |
+
erators studied in [10]. For such operators, introduced below, we adopt the name
|
370 |
+
“Feichtinger operators” for reasons which will become evident later.
|
371 |
+
We recall that the Feichtinger algebra over Rd [9] is the Banach space
|
372 |
+
(24)
|
373 |
+
S0(Rd) := {f ∈ L2(Rd) | Vgf ∈ L1(R2d)},
|
374 |
+
for some g ∈ L2(Rd) ∖ {0}, endowed with the norm
|
375 |
+
∥f∥S0 := ∥Vgf∥L1 =
|
376 |
+
�
|
377 |
+
R2d |Vgf(x, ω)| dxdω.
|
378 |
+
We refer the reader to [13] for a detailed survey on S0(Rd). In this work, S′
|
379 |
+
0(Rd)
|
380 |
+
denotes the conjugate-dual of S0(Rd).
|
381 |
+
Definition 3.1. The set of Feichtinger operators is defined to be
|
382 |
+
S0 :={S : S′
|
383 |
+
0(Rd) → S0(Rd) | S is linear, continuous and
|
384 |
+
maps norm bounded w-∗ convergent sequences in S′
|
385 |
+
0
|
386 |
+
(25)
|
387 |
+
into norm convergent sequences in S0}.
|
388 |
+
We adopt the following notation:
|
389 |
+
(26)
|
390 |
+
S′
|
391 |
+
0 := B(S0(Rd), S′
|
392 |
+
0(Rd))
|
393 |
+
and state the so called Outer Kernel Theorem [10, Theorem 1.1]:
|
394 |
+
Theorem 3.2. The Banach space S′
|
395 |
+
0 is isomorphic to S′
|
396 |
+
0(R2d) via the map T �→ KT,
|
397 |
+
where the relation between T and its kernel KT is given by
|
398 |
+
⟨Tf,g⟩ = ⟨KT,Kg⊗f⟩,
|
399 |
+
∀ f, g, ∈ S0(Rd).
|
400 |
+
|
401 |
+
8
|
402 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
403 |
+
The following statement goes under the name of Inner Kernel Theorem.
|
404 |
+
We
|
405 |
+
present it in our setting. To this end, we introduce the following notation: given
|
406 |
+
σ, ν ∈ S′
|
407 |
+
0(Rd), we denote by ν �⊗σ the unique element of S′
|
408 |
+
0(R2d) such that
|
409 |
+
⟨ν �⊗σ,Kψ⊗ϕ⟩ = ⟨ν,ψ⟩⟨σ,ϕ⟩,
|
410 |
+
∀ ψ, ϕ ∈ S0(Rd).
|
411 |
+
We refer the reader to [10, Theorem 1.3], Lemma 3.1 and Corollary 3.10, too.
|
412 |
+
Theorem 3.3. The space of Feichtinger operators S0 is a Banach space if endowed
|
413 |
+
with the norm of B(S′
|
414 |
+
0, S0) and it is naturally isomorphic as Banach space to S0(R2d)
|
415 |
+
through the map T �→ KT, where the relation between T and its kernel KT is given
|
416 |
+
by
|
417 |
+
⟨ν,Tσ⟩ = ⟨ν �⊗σ,KT⟩,
|
418 |
+
∀ σ, ν, ∈ S′
|
419 |
+
0(Rd).
|
420 |
+
Moreover, S0 is Banach algebra under composition. If S, T ∈ S0, then
|
421 |
+
(27)
|
422 |
+
KS◦T(y, u) =
|
423 |
+
�
|
424 |
+
Rd KT(y, t)KS(t, u) dt.
|
425 |
+
By the above theorems 3.2 and 3.3, S′
|
426 |
+
0 is the (conjugate) topological dual of S0
|
427 |
+
and the duality is given by
|
428 |
+
(28)
|
429 |
+
⟨T,S⟩ = ⟨KT,KS⟩.
|
430 |
+
Lemma 3.4. Suppose S ∈ S0. Then there exist two non-unique sequences {fn}n, {gn}n ⊆
|
431 |
+
S0(Rd) such that
|
432 |
+
S =
|
433 |
+
∞
|
434 |
+
�
|
435 |
+
n=1
|
436 |
+
fn ⊗ gn,
|
437 |
+
∞
|
438 |
+
�
|
439 |
+
n=1
|
440 |
+
∥fn∥S0 ∥gn∥S0 < +∞,
|
441 |
+
KS =
|
442 |
+
∞
|
443 |
+
�
|
444 |
+
n=1
|
445 |
+
Kfn⊗gn.
|
446 |
+
Moreover,
|
447 |
+
S0 ֒→ J 1
|
448 |
+
with
|
449 |
+
tr(S) =
|
450 |
+
�
|
451 |
+
Rd KS(x, x) dx.
|
452 |
+
Proof. We just have to prove the continuous inclusion of Feichtinger operators into
|
453 |
+
J 1, all the remaining statements can be found in [10], see in particular Corollary
|
454 |
+
3.15 and Remark 9. The claim follows from an elementary computation:
|
455 |
+
∥S∥J 1 = |tr(A)| ≤
|
456 |
+
�
|
457 |
+
Rd
|
458 |
+
∞
|
459 |
+
�
|
460 |
+
n=1
|
461 |
+
|fn(x)gn(x)| dx =
|
462 |
+
∞
|
463 |
+
�
|
464 |
+
n=1
|
465 |
+
�
|
466 |
+
Rd |fn(x)gn(x)| dx
|
467 |
+
≤
|
468 |
+
∞
|
469 |
+
�
|
470 |
+
n=1
|
471 |
+
∥fn∥L2 ∥gn∥L2 ≲
|
472 |
+
∞
|
473 |
+
�
|
474 |
+
n=1
|
475 |
+
∥fn∥S0 ∥gn∥S0 < ∞.
|
476 |
+
Since S0(R2d) = S0(Rd)ˆ⊗S0(Rd), see e.g. [10, Lemma 2.1], we get
|
477 |
+
∥S∥J 1 ≲ ∥KS∥S0 ≍ ∥S∥S0 ,
|
478 |
+
|
479 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
480 |
+
9
|
481 |
+
which gives the desired assertion.
|
482 |
+
□
|
483 |
+
The preceding result and the observations in [10, p. 4] yield
|
484 |
+
(29)
|
485 |
+
S0 ֒→ J 1 ֒→ J 2 ֒→ B(L2(Rd)) ֒→ S′
|
486 |
+
0.
|
487 |
+
The fact that all Feichtinger operators are trace class implies the validity of Lemma
|
488 |
+
2.2.
|
489 |
+
3.1. τ-quantization of operators. The following remark is the key insight for the
|
490 |
+
subsequent results concerning Opτ and Wτ.
|
491 |
+
Remark 3.5. Let us consider f, g ∈ L2(Rd) such that f ̸= 0, a ∈ L2(R2d) and {fj}j
|
492 |
+
o.n.b. for L2 with f1 = f. Then we compute as follows:
|
493 |
+
⟨Opτ(a)f, g⟩ = ⟨Opτ(a)f,
|
494 |
+
∞
|
495 |
+
�
|
496 |
+
j=1
|
497 |
+
⟨g, fj⟩fj⟩ =
|
498 |
+
∞
|
499 |
+
�
|
500 |
+
j=1
|
501 |
+
⟨Opτ(a) (⟨fj, g⟩f) , fj⟩
|
502 |
+
=
|
503 |
+
∞
|
504 |
+
�
|
505 |
+
j=1
|
506 |
+
⟨Opτ(a)(f ⊗ g)fj, fj⟩ = tr (Opτ(a)(f ⊗ g)) .
|
507 |
+
Taking into account the weak definition of Opτ(a) and (15) we can write
|
508 |
+
(30)
|
509 |
+
⟨Opτ(a)f, g⟩ = ⟨a, Wτ((f ⊗ g)∗)⟩ = tr (Opτ(a)(f ⊗ g)) = ⟨Opτ(a), (f ⊗ g)∗⟩(J 1,J ∞).
|
510 |
+
By computations similar to the ones above for S ∈ J 1 with the spectral decomposition
|
511 |
+
�∞
|
512 |
+
k=1 λkfk ⊗ gk after extending {fk}k to an orthonormal basis of L2(Rd) implies
|
513 |
+
(31)
|
514 |
+
⟨a, WτS⟩ = tr (Opτ(a)S∗) = ⟨Opτ(a), S⟩(J 1,J ∞).
|
515 |
+
Theorem 3.6. For every τ ∈ [0, 1] the following mappings are linear and continu-
|
516 |
+
ous:
|
517 |
+
Opτ : L2(R2d) → J ∞,
|
518 |
+
Wτ : J 1 → L2(R2d).
|
519 |
+
Moreover, Opτ is the Banach space adjoint of Wτ: Opτ = W ∗
|
520 |
+
τ .
|
521 |
+
Proof. The boundedness of Opτ is evident; the proof of the continuity of Wτ follows
|
522 |
+
by a similar reasoning as the proof of the subsequent Theorem 3.7. The last claim
|
523 |
+
is just (31).
|
524 |
+
□
|
525 |
+
Theorem 3.7. For every τ ∈ [0, 1] the following mappings are linear and continu-
|
526 |
+
ous:
|
527 |
+
Opτ : S′
|
528 |
+
0(R2d) → S′
|
529 |
+
0,
|
530 |
+
Wτ : S0 → S0(R2d).
|
531 |
+
Moreover, Opτ is the Banach space adjoint of Wτ: Opτ = W ∗
|
532 |
+
τ , i.e.
|
533 |
+
for every
|
534 |
+
a ∈ S′
|
535 |
+
0(R2d) and S ∈ S0
|
536 |
+
(32)
|
537 |
+
⟨a,WτS⟩ = ⟨Opτ(a),S⟩.
|
538 |
+
|
539 |
+
10
|
540 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
541 |
+
Proof. The boundedness and linearity of Opτ follow from the definitions. By using
|
542 |
+
the formal representation of Opτ(a) we can derive an expression for its kernel:
|
543 |
+
(33)
|
544 |
+
KOpτ (a)(t, x) =
|
545 |
+
�
|
546 |
+
Rd e2πi(t−x)ωa((1 − τ)t + τx, ω) dω.
|
547 |
+
Let us consider first f, g ∈ S0. Then a standard argument, see e.g. [5, Proposition
|
548 |
+
1.3.25], gives that
|
549 |
+
Wτ(f ⊗ g) = Wτ(f, g) ∈ S0(R2d)
|
550 |
+
with
|
551 |
+
∥Wτ(f ⊗ g)∥S0 ≲ ∥f∥S0 ∥g∥S0 .
|
552 |
+
Since Lemma 2.2 holds for S0, we write Wτ = FσFWτ and use the spectral decom-
|
553 |
+
position for S of the form �∞
|
554 |
+
n=1 fn ⊗ gn as shown in Lemma 3.4. Now, we compute:
|
555 |
+
FWτS(z) = tr(πτ(z)∗S) = tr(
|
556 |
+
∞
|
557 |
+
�
|
558 |
+
n=1
|
559 |
+
πτ(z)∗(fn ⊗ gn))
|
560 |
+
=
|
561 |
+
∞
|
562 |
+
�
|
563 |
+
n=1
|
564 |
+
⟨πτ(z)∗fn, gn⟩ =
|
565 |
+
∞
|
566 |
+
�
|
567 |
+
n=1
|
568 |
+
V τ
|
569 |
+
gnfn(z).
|
570 |
+
(34)
|
571 |
+
Taking a suitable window for the norm on S0(R2d) [13, Theorem 5.3] we have
|
572 |
+
∥FWτS∥S0 ≤
|
573 |
+
∞
|
574 |
+
�
|
575 |
+
n=1
|
576 |
+
��V τ
|
577 |
+
gnfn
|
578 |
+
��
|
579 |
+
S0 =
|
580 |
+
∞
|
581 |
+
�
|
582 |
+
n=1
|
583 |
+
∥fn∥S0 ∥gn∥S0 < +∞.
|
584 |
+
Consequently,
|
585 |
+
∥FWτS∥S0 ≤ inf{
|
586 |
+
∞
|
587 |
+
�
|
588 |
+
n=1
|
589 |
+
∥fn∥S0 ∥gn∥S0 , S =
|
590 |
+
∞
|
591 |
+
�
|
592 |
+
n=1
|
593 |
+
fn ⊗ gn}
|
594 |
+
≤ inf{
|
595 |
+
∞
|
596 |
+
�
|
597 |
+
n=1
|
598 |
+
∥fn∥S0 ∥gn∥S0 , KS =
|
599 |
+
∞
|
600 |
+
�
|
601 |
+
n=1
|
602 |
+
Kfn⊗gn}
|
603 |
+
= ∥KS∥S0 ≍ ∥S∥S0 .
|
604 |
+
We proved the boundedness of FWτ : S0 → S0(R2d), the continuity of the symplectic
|
605 |
+
Fourier transform Fσ : S0(R2d) → S0(R2d) is well-known, and thus the continuity of
|
606 |
+
|
607 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
608 |
+
11
|
609 |
+
Wτ : S0 → S0(R2d) follows. Concerning the last claim, we proceed as follows:
|
610 |
+
⟨Opτ(a),S⟩ = ⟨KOpτ (a),KS⟩ = ⟨KOpτ (a),
|
611 |
+
∞
|
612 |
+
�
|
613 |
+
n=1
|
614 |
+
Kf⊗gn⟩
|
615 |
+
=
|
616 |
+
∞
|
617 |
+
�
|
618 |
+
n=1
|
619 |
+
⟨KOpτ (a),Kf⊗gn⟩ =
|
620 |
+
∞
|
621 |
+
�
|
622 |
+
n=1
|
623 |
+
⟨Opτ(a)gn,fn⟩
|
624 |
+
=
|
625 |
+
∞
|
626 |
+
�
|
627 |
+
n=1
|
628 |
+
⟨a,Wτ(fn ⊗ gn)⟩ = ⟨a,
|
629 |
+
∞
|
630 |
+
�
|
631 |
+
n=1
|
632 |
+
Wτ(fn ⊗ gn)⟩
|
633 |
+
= ⟨a,WτS⟩,
|
634 |
+
which concludes the proof.
|
635 |
+
□
|
636 |
+
On account of Theorem 3.6 and 3.7, it seems reasonable to interpret WτS as the
|
637 |
+
τ-quantization of an operator in S0 or J 1.
|
638 |
+
Corollary 3.8.
|
639 |
+
(i) For every τ ∈ [0, 1] the mapping Wτ : S0 → S0(R2d) is a
|
640 |
+
topological isomorphism with inverse given by Opτ : S0(R2d) → S0;
|
641 |
+
(ii) A linear and continuous operator S : S0(Rd) → S′
|
642 |
+
0(Rd) belongs to S0 if and
|
643 |
+
only if WτS ∈ S0(R2d) for some (and hence any) τ ∈ [0, 1].
|
644 |
+
Proof. (i) We observed in (22) that WτS is just the τ-symbol aS
|
645 |
+
τ of a trace class
|
646 |
+
operator S, in particular this holds for S ∈ S0. Therefore,
|
647 |
+
Opτ ◦WτS = Opτ(aS
|
648 |
+
τ ) = S.
|
649 |
+
We now show that if we start with a ∈ S0(R2d), then Opτ(a) belongs to S0. From
|
650 |
+
(33), we have that the kernel of Opτ(a) can be written as
|
651 |
+
KOpτ (a)(t, x) =
|
652 |
+
�
|
653 |
+
Rd e2πi(t−x)ωa((1 − τ)t + τx, ω) dω = ΨτF −1
|
654 |
+
2 a(t, x),
|
655 |
+
where F −1
|
656 |
+
2
|
657 |
+
is the inverse of the partial Fourier transform with respect to the second
|
658 |
+
variable; Ψτ is the change of variables induced by the matrix
|
659 |
+
(35)
|
660 |
+
�
|
661 |
+
1 − τ
|
662 |
+
τ
|
663 |
+
1
|
664 |
+
−1
|
665 |
+
�
|
666 |
+
,
|
667 |
+
ΨτF(t, x) := F((1 − τ)t + τx, t − x).
|
668 |
+
From the assumption a in the Feichtinger algebra S0(R2d) we have F −1
|
669 |
+
2 a ∈ S0(R2d),
|
670 |
+
thus ΨτF −1
|
671 |
+
2 a is in S0(R2d), i.e. Opτ(a) is an element of S0. The fact that Opτ is
|
672 |
+
continuous from S0(R2d) into S0 is evident from the applications of F −1
|
673 |
+
2
|
674 |
+
and Ψτ.
|
675 |
+
Hence we have shown that
|
676 |
+
Wτ ◦ Opτ(a) = aOpτ (a)
|
677 |
+
τ
|
678 |
+
= a.
|
679 |
+
(ii) The claim is a straightforward consequence of (i).
|
680 |
+
□
|
681 |
+
|
682 |
+
12
|
683 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
684 |
+
Corollary 3.9.
|
685 |
+
(i) For every τ ∈ [0, 1] FWτ : S0 → S0(R2d) is a topological
|
686 |
+
isomorphisms with inverse given by the τ-spreading representation
|
687 |
+
(36)
|
688 |
+
SRτ : S0(R2d) → S0 , a �→
|
689 |
+
�
|
690 |
+
R2d a(z)πτ(z) dz;
|
691 |
+
(ii) Let us define
|
692 |
+
(37)
|
693 |
+
SRτ : S′
|
694 |
+
0(R2d) → S′
|
695 |
+
0 a �→
|
696 |
+
�
|
697 |
+
R2d a(z)πτ(z) dz,
|
698 |
+
where the integral has to be understood weakly as follows:
|
699 |
+
⟨SRτ(a)f,g⟩ := ⟨a,V τ
|
700 |
+
f g⟩,
|
701 |
+
a ∈ S′
|
702 |
+
0(R2d), f, g ∈ S0(Rd).
|
703 |
+
Then SRτ as in (37) is well-defined, linear, continuous, extends (36) and it
|
704 |
+
is the Banach space adjoint of FWτ in (i):
|
705 |
+
(38)
|
706 |
+
SRτ = F ∗
|
707 |
+
Wτ,
|
708 |
+
in the sense that for every a ∈ S′
|
709 |
+
0(R2d) and S ∈ S0
|
710 |
+
⟨a,FWτS⟩ = ⟨SRτ(a),S⟩ = ⟨KSRτ (a),KS⟩;
|
711 |
+
(iii) Every function F ∈ S0(R2d) admits an expansion of the following type:
|
712 |
+
F =
|
713 |
+
∞
|
714 |
+
�
|
715 |
+
n=1
|
716 |
+
V τ
|
717 |
+
gnfn,
|
718 |
+
for some sequences {fn}n, {gn}n ⊆ S0(Rd) such that �∞
|
719 |
+
n=1 ∥fn∥S0 ∥gn∥S0 <
|
720 |
+
∞.
|
721 |
+
Proof. (i) First we notice that if we start with a ∈ S0(R2d), then SRτ(a) is the
|
722 |
+
Feichtinger operator with kernel
|
723 |
+
KSRτ (a)(y, u) =
|
724 |
+
�
|
725 |
+
Rd a(y − u, ω)e2πiyω dω = F −1
|
726 |
+
2 [a(y − u, ·)](y).
|
727 |
+
Clearly SRτ is continuous from S0(R2d) into S0.
|
728 |
+
Since we have Wτ = FσFWτ and Fσ is an automorphism of S0(R2d), we can write
|
729 |
+
FWτ = FσWτ and which is an isomorphism due to Corollary 3.8. To prove that SRτ
|
730 |
+
|
731 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
732 |
+
13
|
733 |
+
is the inverse of FWτ we use (34), take S = �∞
|
734 |
+
n=1 fn ⊗ gn ∈ S0 and ψ, ϕ ∈ S0(Rd):
|
735 |
+
⟨(SRτ ◦ FWτS)ψ,ϕ⟩ =
|
736 |
+
�
|
737 |
+
R2d FWτS(z)⟨πτ(z)ψ,ϕ⟩ dz
|
738 |
+
=
|
739 |
+
∞
|
740 |
+
�
|
741 |
+
n=1
|
742 |
+
�
|
743 |
+
R2d V τ
|
744 |
+
gnfn(z)V τ
|
745 |
+
ψ ϕ(z) dz
|
746 |
+
=
|
747 |
+
∞
|
748 |
+
�
|
749 |
+
n=1
|
750 |
+
⟨fn,ϕ⟩⟨gn,ψ⟩
|
751 |
+
= ⟨
|
752 |
+
∞
|
753 |
+
�
|
754 |
+
n=1
|
755 |
+
⟨ψ,gn⟩fn,ϕ⟩
|
756 |
+
= ⟨
|
757 |
+
∞
|
758 |
+
�
|
759 |
+
n=1
|
760 |
+
(fn ⊗ gn)ψ,ϕ⟩
|
761 |
+
= ⟨Sψ,ϕ⟩,
|
762 |
+
in the third equality we used Moyal’s identity. For the composition FWτ ◦SRτ, notice
|
763 |
+
that this is the identity on S0(R2d) due lo Lemma 2.2 (vii).
|
764 |
+
(ii) Well-posedness, linearity and continuity of SRτ from S′
|
765 |
+
0(R2d) into S′
|
766 |
+
0 are stan-
|
767 |
+
dard. Trivially (37) extends (36). To see that SRτ is the Banach space adjoint of
|
768 |
+
FWτ from S0 into S0(R2d), take a ∈ S′
|
769 |
+
0(R2d) and S ∈ S0. In the following calcula-
|
770 |
+
tions we use: the prior stated (34), the representation for Feichtinger operators and
|
771 |
+
their kernel given in Lemma 3.4, the Outer and Inner Kernel Theorems:
|
772 |
+
⟨a,FWτS⟩ =
|
773 |
+
∞
|
774 |
+
�
|
775 |
+
n=1
|
776 |
+
⟨a,V τ
|
777 |
+
gnfn⟩ =
|
778 |
+
∞
|
779 |
+
�
|
780 |
+
n=1
|
781 |
+
⟨SRτ(a)gn,fn⟩
|
782 |
+
=
|
783 |
+
∞
|
784 |
+
�
|
785 |
+
n=1
|
786 |
+
⟨KSRτ (a),Kfn⊗gn⟩ = ⟨KSRτ (a),KS⟩
|
787 |
+
= ⟨SRτ(a),S⟩.
|
788 |
+
(iii) The last claim is a direct consequence of the computations in (34) and the
|
789 |
+
surjectivity of FWτ.
|
790 |
+
□
|
791 |
+
3.2. A convenient environment for QHA. In Section 2 we introduced convo-
|
792 |
+
lutions between a function and an operator and two operators. Keyl, Kiukas and
|
793 |
+
Werner [14] showed that such convolutions make sense for wider classes of (gen-
|
794 |
+
eralized) functions and operators. We summarize here the main results; in what
|
795 |
+
follows S denotes the set of pseudo-differential operators with Weyl symbol in the
|
796 |
+
Schwartz class S(R2d) and S′ those pseudo-differential operators with Weyl symbol
|
797 |
+
in S′(R2d). On account of the Schwartz Kernel Theorem we can identify S′ with
|
798 |
+
the continuous and linear operators from S(Rd) into S′(Rd).
|
799 |
+
|
800 |
+
14
|
801 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
802 |
+
Proposition 3.10.
|
803 |
+
(i) Suppose S, T ∈ S, A ∈ S′, b ∈ S(R2d) and a ∈ S′(R2d).
|
804 |
+
Then the following convolutions are well-defined and they extend the ones
|
805 |
+
defined in Subsection 2.2:
|
806 |
+
S ⋆ T ∈ S(R2d),
|
807 |
+
S ⋆ A ��� S′(R2d),
|
808 |
+
b ⋆ S ∈ S,
|
809 |
+
a ⋆ S, b ⋆ A ∈ S′;
|
810 |
+
(ii) The Fourier-Wigner transform can be extended to a topological isomorphism
|
811 |
+
FW1/2 : S′ → S′(R2d);
|
812 |
+
(iii) We have Fσ(S ⋆ T) = FW1/2S · FW1/2T and FW1/2(b ⋆ S) = Fσb · FW1/2S
|
813 |
+
whenever S, T and b are such that the convolutions are defined as in part (i);
|
814 |
+
(iv) The Weyl symbol of A ∈ S′ is given by FσFW1/2A.
|
815 |
+
The authors of [14] proved that the class of so-called Schwartz operators S has
|
816 |
+
the structure of a Fr´echet space. We propose that the Banach space of Feichtinger
|
817 |
+
operators S0 is an alternative to S that is a much bigger class of “nice” operators.
|
818 |
+
We start with some preliminaries on S0 and S0.
|
819 |
+
Lemma 3.11. Given f ∈ S′
|
820 |
+
0(Rd), there exists a sequence {fn}n ⊆ S0(Rd) which
|
821 |
+
w-∗ converges to f and it is bounded by ∥f∥S′
|
822 |
+
0, i.e.
|
823 |
+
lim
|
824 |
+
n→+∞⟨fn, g⟩ = ⟨f,g⟩
|
825 |
+
∀ g ∈ S0(Rd),
|
826 |
+
sup
|
827 |
+
n ∥fn∥S0 ≤ ∥f∥S′
|
828 |
+
0 .
|
829 |
+
Proof. Let us fix f ∈ S′
|
830 |
+
0(Rd) ∖ {0} and set R := ∥f∥S′
|
831 |
+
0. By [13, Proposition 6.15],
|
832 |
+
there exists a net {fα}α∈A ⊆ S0(Rd) which converges w-∗ to f in S′
|
833 |
+
0 and such that
|
834 |
+
∥fα∥S′
|
835 |
+
0 ≤ R for every α ∈ A. Set
|
836 |
+
BR :=
|
837 |
+
�
|
838 |
+
f ∈ S′
|
839 |
+
0(Rd) | ∥f∥S′
|
840 |
+
0 ≤ R
|
841 |
+
�
|
842 |
+
and
|
843 |
+
ER := S0(Rd) ∩ BR,
|
844 |
+
where S0 is identified with its natural embedding in S′
|
845 |
+
0, i.e.
|
846 |
+
ER ⊆ BR ⊆ ER
|
847 |
+
w−∗.
|
848 |
+
ER
|
849 |
+
w−∗ is bounded in S′
|
850 |
+
0(Rd).
|
851 |
+
In fact, if f0 ∈ ER
|
852 |
+
w−∗, then there exists a net {fα}α∈A ⊆ ER that it converges w-∗
|
853 |
+
to f0. Hence, we obtain
|
854 |
+
∥f0∥S′
|
855 |
+
0 ≤ lim inf
|
856 |
+
α∈A
|
857 |
+
∥fα∥S′
|
858 |
+
0 = lim
|
859 |
+
α∈A inf{∥fβ∥S′
|
860 |
+
0 | α ⪯ β} ≤ lim
|
861 |
+
α∈A R = R.
|
862 |
+
In particular, this shows that ER
|
863 |
+
w−∗ ⊆ BR and we get
|
864 |
+
ER
|
865 |
+
w−∗ = BR.
|
866 |
+
Since S0 separable, and the relative w-∗ topology on BR is induced by a metric by
|
867 |
+
[18, Therem 2.6.23]. Hence the topological w-∗ closure of ER equals its sequential
|
868 |
+
w-∗ closure. Consequently, there exists a sequence {fn}n ⊆ ER which converges w-∗
|
869 |
+
to f in S′
|
870 |
+
0(Rd).
|
871 |
+
□
|
872 |
+
|
873 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
874 |
+
15
|
875 |
+
Remark 3.12. The above lemma holds also for any LCA second countable group G
|
876 |
+
replacing Rd, see [8, Theorem 2] for the separability of S0(G).
|
877 |
+
Lemma 3.13. For any S ∈ S′
|
878 |
+
0, there exists a sequence {Sn}n ⊆ S0 such that
|
879 |
+
(i) ∥Sn∥S′
|
880 |
+
0 ≲ ∥S∥S′
|
881 |
+
0;
|
882 |
+
(ii) limn→+∞ |⟨(S − Sn)f,g⟩| = 0 for all f, g ∈ S0(Rd).
|
883 |
+
Proof. This is a straightforward application of the Kernel Theorems 3.2 and 3.2 and
|
884 |
+
of Lemma 3.11.
|
885 |
+
□
|
886 |
+
Convergence as in item (ii) of the above lemma will be also denoted by
|
887 |
+
Sn
|
888 |
+
w−∗
|
889 |
+
−→
|
890 |
+
n
|
891 |
+
S
|
892 |
+
in
|
893 |
+
S′
|
894 |
+
0
|
895 |
+
or
|
896 |
+
S = w- ∗ -limn Sn
|
897 |
+
in
|
898 |
+
S′
|
899 |
+
0.
|
900 |
+
Lemma 3.14. Let S : S0 → S′
|
901 |
+
0 be in S0. Then the Banach space adjoint S∗: S′
|
902 |
+
0 →
|
903 |
+
S0 is in S0 with kernel
|
904 |
+
(39)
|
905 |
+
KS∗(y, u) = KS(u, y).
|
906 |
+
Proof. We take f, g ∈ S0(Rd), then
|
907 |
+
⟨Sf,g⟩ =
|
908 |
+
�
|
909 |
+
R2d KT(y, u)g(y)f(u) dydu
|
910 |
+
=
|
911 |
+
�
|
912 |
+
Rd f(u)
|
913 |
+
�
|
914 |
+
Rd KS(y, u)g(y) dy du
|
915 |
+
= ⟨f,S∗g⟩.
|
916 |
+
Hence, S∗g(y) =
|
917 |
+
�
|
918 |
+
Rd KS(u, y)g(u) du, i.e. KS∗(y, u) = KS(u, y) which is an element
|
919 |
+
of S0(R2d).
|
920 |
+
□
|
921 |
+
Corollary 3.15. S0 is a Banach ∗-algebra.
|
922 |
+
We notice that (S∗)ˇ= ( ˇS)∗, so that from now on we shall simply write ˇS∗ when
|
923 |
+
necessary.
|
924 |
+
Lemma 3.16.
|
925 |
+
(i) The following applications are surjective isometries:
|
926 |
+
(i − a) αz : S0 → S0, for any z = (x, ω) ∈ R2d, and
|
927 |
+
(40)
|
928 |
+
KαzS(y, u) = e2πi(y−u)ωKS(y − x, u − x);
|
929 |
+
(i − b) ˇ·: S0 → S0 and
|
930 |
+
(41)
|
931 |
+
K ˇS(y, u) = KS(−y − u);
|
932 |
+
(i − c) αz : S′
|
933 |
+
0 → S′
|
934 |
+
0, for any z ∈ R2d;
|
935 |
+
(i − d) ˇ·: S′
|
936 |
+
0 → S′
|
937 |
+
0;
|
938 |
+
(ii) Let S, T ∈ S0 and b ∈ S0(R2d). Then
|
939 |
+
S ⋆ T ∈ S0(R2d),
|
940 |
+
b ⋆ S ∈ S0;
|
941 |
+
|
942 |
+
16
|
943 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
944 |
+
(iii) The kernel of the mixed-state localization operator b ⋆ S is given by
|
945 |
+
(42)
|
946 |
+
Kb⋆S(y, u) =
|
947 |
+
�
|
948 |
+
Rd b(x, ω)e2πi(y−u)ωKS(y − x, u − x) dxdω;
|
949 |
+
for very z = (x, ω) ∈ R2d the kernel of Sαz ˇT is
|
950 |
+
(43)
|
951 |
+
KSαz ˇT(y, u) =
|
952 |
+
�
|
953 |
+
Rd e2πi(y−t)ωKT(x − y, x − t)KS(t, u) dt.
|
954 |
+
Proof. (i) We leave the elementary computations to the interest reader, and note that
|
955 |
+
in order to prove αzS, ˇS ∈ S0 the result [10, Corollary 3.3] is useful. A continuous
|
956 |
+
and linear operator S : S0 → S′
|
957 |
+
0 is a Feichtinger operator if and only if
|
958 |
+
�
|
959 |
+
R2d
|
960 |
+
�
|
961 |
+
R2d |⟨Sπ(z)g1,π(w)g2⟩| dzdw
|
962 |
+
is finite for any g1, g2 ∈ S0(Rd).
|
963 |
+
(ii) We first address the convolution between two Feichtinger operators. By item
|
964 |
+
(i) and the fact that S0 is a Banach algebra under composition, we have that Sαz ˇT
|
965 |
+
is in S0 for any z = (x, ω) ∈ R2d. We have by [10, Corollary 3.15]:
|
966 |
+
S ⋆ T(z) = tr(Sαz ˇT) =
|
967 |
+
�
|
968 |
+
Rd KSαz ˇT(y, y) dy =
|
969 |
+
�
|
970 |
+
R2d Kαz ˇT(y, t)KS(t, y) dtdy
|
971 |
+
=
|
972 |
+
�
|
973 |
+
R2d e2πi(y−t)ωKT(x − y, x − t)KS(t, y) dtdy
|
974 |
+
=
|
975 |
+
�
|
976 |
+
Rd
|
977 |
+
��
|
978 |
+
Rd KT(x − y, x − t)KS(t, y)e−2πitω dt
|
979 |
+
�
|
980 |
+
e2πiyω dy
|
981 |
+
= F −1
|
982 |
+
2 F1
|
983 |
+
�
|
984 |
+
ΦT(x,x)KT · KS
|
985 |
+
�
|
986 |
+
(ω, ω),
|
987 |
+
where ΦF(t, y) := F(−y, −t), F1 and F2 are the partial Fourier transforms with re-
|
988 |
+
spect to the first and second variable, respectively. Consider now f, g, h, l ∈ S0(Rd),
|
989 |
+
it is useful to compute the following where P is the parity operator:
|
990 |
+
F −1
|
991 |
+
2 F1
|
992 |
+
�
|
993 |
+
ΦT(x,x)Kh⊗l · Kf⊗g
|
994 |
+
�
|
995 |
+
(ω, ω) =
|
996 |
+
�
|
997 |
+
Rd
|
998 |
+
��
|
999 |
+
Rd h(x − y)l(x − t)f(t)g(y)e−2πitω dt
|
1000 |
+
�
|
1001 |
+
e2πiyω dy
|
1002 |
+
=
|
1003 |
+
�
|
1004 |
+
Rd f(t)e−2πitωl(x − t) dt ·
|
1005 |
+
�
|
1006 |
+
Rd g(y)e2πiyωh(x − y) dy
|
1007 |
+
= VP lf(−x, ω) · VP hg(−x, ω).
|
1008 |
+
Hence F −1
|
1009 |
+
2 F1
|
1010 |
+
�
|
1011 |
+
ΦT(x,x)Kh⊗l · Kf⊗g
|
1012 |
+
�
|
1013 |
+
(ω, ω) is in S0(R2d) as a function of (x, ω). We
|
1014 |
+
consider now two representations S = �∞
|
1015 |
+
n=1 fn ⊗ gn and T = �∞
|
1016 |
+
n=1 hn ⊗ ln, see
|
1017 |
+
|
1018 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
1019 |
+
17
|
1020 |
+
Lemma 3.4, so that
|
1021 |
+
KS =
|
1022 |
+
∞
|
1023 |
+
�
|
1024 |
+
n=1
|
1025 |
+
Kfn⊗gn,
|
1026 |
+
KT =
|
1027 |
+
∞
|
1028 |
+
�
|
1029 |
+
n=1
|
1030 |
+
Khn⊗ln.
|
1031 |
+
It follows that we can write
|
1032 |
+
S ⋆ T(z) = F −1
|
1033 |
+
2 F1
|
1034 |
+
�
|
1035 |
+
ΦT(x,x)
|
1036 |
+
∞
|
1037 |
+
�
|
1038 |
+
M
|
1039 |
+
Khm⊗lm ·
|
1040 |
+
∞
|
1041 |
+
�
|
1042 |
+
n=1
|
1043 |
+
Kfn⊗gn
|
1044 |
+
�
|
1045 |
+
(ω, ω)
|
1046 |
+
=
|
1047 |
+
∞
|
1048 |
+
�
|
1049 |
+
m=1
|
1050 |
+
∞
|
1051 |
+
�
|
1052 |
+
n=1
|
1053 |
+
F −1
|
1054 |
+
2 F1
|
1055 |
+
�
|
1056 |
+
ΦT(x,x)Khm⊗lm · Kfn⊗gn
|
1057 |
+
�
|
1058 |
+
(ω, ω)
|
1059 |
+
=
|
1060 |
+
∞
|
1061 |
+
�
|
1062 |
+
m=1
|
1063 |
+
∞
|
1064 |
+
�
|
1065 |
+
n=1
|
1066 |
+
VP lmfn(−x, ω) · VP hmgn(−x, ω) ∈ S0(R2d),
|
1067 |
+
the convergence is guaranteed by Lemma 3.4.
|
1068 |
+
Concerning b⋆S, the following estimate for any f, g ∈ S0(Rd) proves that b⋆S ∈ S′
|
1069 |
+
0:
|
1070 |
+
|⟨(b ⋆ S)f,g⟩| ≤
|
1071 |
+
�
|
1072 |
+
R2d |b(z)| |⟨Sπ(z)∗f,π(z)∗g⟩| dz ≲ ∥b∥L1 ∥S∥S′
|
1073 |
+
0 ∥f∥S0 ∥g∥S0 .
|
1074 |
+
We exploit [10, Theorem 3.2 (ii)] to show that b ⋆ S is in S0. For g1, g2 ∈ S0(Rd) we
|
1075 |
+
have
|
1076 |
+
�
|
1077 |
+
R2d
|
1078 |
+
�
|
1079 |
+
R2d |⟨(b ⋆ S)π(w)g1,π(u)g2⟩| dwdu ≤
|
1080 |
+
�
|
1081 |
+
R2d
|
1082 |
+
�
|
1083 |
+
R2d
|
1084 |
+
�
|
1085 |
+
R2d |b(z)|
|
1086 |
+
× |⟨Sπ(w − z)g1,π(u − z)g2⟩| dzdwdu
|
1087 |
+
=
|
1088 |
+
�
|
1089 |
+
R2d
|
1090 |
+
�
|
1091 |
+
R2d |⟨Sπ(w′)g1,π(u′)g2⟩| dw′du′ ·
|
1092 |
+
�
|
1093 |
+
R2d |b(z)| dz < +∞.
|
1094 |
+
(iii) We compute explicitly the kernel of the operator given by the convolution b⋆S:
|
1095 |
+
⟨(b ⋆ S)f,g⟩ =
|
1096 |
+
�
|
1097 |
+
R2d b(x, ω)
|
1098 |
+
�
|
1099 |
+
R2d KS(y, u)π(−z)g(y)π(−z)f(u) dydu dxdω
|
1100 |
+
=
|
1101 |
+
�
|
1102 |
+
R2d
|
1103 |
+
�
|
1104 |
+
R2d b(x, ω)e2πi(y−u)ωKS(y, u)g(y + x)f(u + x) dxdω dydu,
|
1105 |
+
for z = (x, ω) ∈ R2d. The change of variables y′ = y + u, u′ = u + x gives the desired
|
1106 |
+
result.
|
1107 |
+
The last claim is just a direct application of (40), (41) and the Banach
|
1108 |
+
algebra property for S0 [10, Lemma 3.10].
|
1109 |
+
□
|
1110 |
+
Corollary 3.17. Let S, T ∈ S0 with spectral decompositions S = �∞
|
1111 |
+
n=1 fn ⊗ gn and
|
1112 |
+
T = �∞
|
1113 |
+
n=1 hn⊗ln, where {fn}n, {gn}n, {hn}n, {ln}n ⊆ S0(Rd) with �∞
|
1114 |
+
n=1 ∥fn∥S0 ∥gn∥S0 <
|
1115 |
+
|
1116 |
+
18
|
1117 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
1118 |
+
+∞, �∞
|
1119 |
+
n=1 ∥hn∥S0 ∥ln∥S0 < +∞. Then, with the notations introduced in the proof
|
1120 |
+
of Lemma 3.16, for every z = (x, ω) ∈ R2d:
|
1121 |
+
S ⋆ T(z) = F −1
|
1122 |
+
2 F1
|
1123 |
+
�
|
1124 |
+
ΦT(x,x)KT · KS
|
1125 |
+
�
|
1126 |
+
(ω, ω)
|
1127 |
+
=
|
1128 |
+
∞
|
1129 |
+
�
|
1130 |
+
m=1
|
1131 |
+
∞
|
1132 |
+
�
|
1133 |
+
n=1
|
1134 |
+
VP lmfn(−x, ω) · VP hmgn(−x, ω).
|
1135 |
+
(44)
|
1136 |
+
Definition 3.18. Let A ∈ S′
|
1137 |
+
0, a ∈ S′
|
1138 |
+
0(R2d), S ∈ S0 and b ∈ S0(R2d). Consider any
|
1139 |
+
sequences {An}n ⊆ S0 and {an}n ⊆ S0(R2d) such that
|
1140 |
+
An
|
1141 |
+
w−∗
|
1142 |
+
−→
|
1143 |
+
n
|
1144 |
+
A
|
1145 |
+
in
|
1146 |
+
S′
|
1147 |
+
0
|
1148 |
+
and
|
1149 |
+
an
|
1150 |
+
w−∗
|
1151 |
+
−→
|
1152 |
+
n
|
1153 |
+
a
|
1154 |
+
in
|
1155 |
+
S′
|
1156 |
+
0(R2d).
|
1157 |
+
Then we define:
|
1158 |
+
S ⋆ A := w- ∗ -limn S ⋆ An
|
1159 |
+
in
|
1160 |
+
S′
|
1161 |
+
0(R2d);
|
1162 |
+
(45)
|
1163 |
+
a ⋆ S := S ⋆ a := w- ∗ -limn an ⋆ S
|
1164 |
+
in
|
1165 |
+
S′
|
1166 |
+
0;
|
1167 |
+
(46)
|
1168 |
+
b ⋆ A := A ⋆ b := w- ∗ -limn b ⋆ An
|
1169 |
+
in
|
1170 |
+
S′
|
1171 |
+
0.
|
1172 |
+
(47)
|
1173 |
+
Remark 3.19. The reader may find it useful to keep in mind the following simple
|
1174 |
+
identities, which will be used in the proof of the subsequent proposition. Consider
|
1175 |
+
S ∈ S0, ψ, ϕ, f, g ∈ S0(Rd) and z ∈ R2d:
|
1176 |
+
αz(ψ ⊗ ϕ) = π(z)ψ ⊗ π(z)ϕ;
|
1177 |
+
(ψ ⊗ ϕ)(Kf⊗g) = ⟨f, ϕ⟩(ψ ⊗ g);
|
1178 |
+
(ψ ⊗ ϕ) ⋆ ˇS(z) = ⟨π(z)Sπ(z)∗ψ,ϕ⟩.
|
1179 |
+
Proposition 3.20. The convolutions introduced in Definition 3.18:
|
1180 |
+
(i) They do not depend on the sequences chosen; moreover, taking A, a, S, b as
|
1181 |
+
in Definition 3.18:
|
1182 |
+
⟨S ⋆ A,b⟩ = ⟨KA,Kb⋆ ˇS∗⟩;
|
1183 |
+
(48)
|
1184 |
+
⟨(a ⋆ S)f,g⟩ = ⟨a,(g ⊗ f) ⋆ ˇS∗⟩;
|
1185 |
+
(49)
|
1186 |
+
⟨(b ⋆ A)f,g⟩ = ⟨KA,Kb∗⋆(g⊗f)⟩,
|
1187 |
+
(50)
|
1188 |
+
where b∗(z) := b(−z);
|
1189 |
+
(ii) These extend the definitions given in Subsection 2.2;
|
1190 |
+
(iii) They are commutative;
|
1191 |
+
|
1192 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
1193 |
+
19
|
1194 |
+
(iv) Moreover, they are associative. In particular, if z ∈ R2d, T, Q ∈ S0, σ ∈
|
1195 |
+
S0(R2d) and A, a, S, b as in Definition 3.18 then:
|
1196 |
+
(S ⋆ (T ⋆ b))(z) = ((S ⋆ T) ∗ b)(z);
|
1197 |
+
(51)
|
1198 |
+
S ⋆ (T ⋆ Q) = (S ⋆ T) ⋆ Q;
|
1199 |
+
(52)
|
1200 |
+
(S ⋆ b) ⋆ σ = S ⋆ (b ∗ σ);
|
1201 |
+
(53)
|
1202 |
+
S ⋆ (T ⋆ a) = (S ⋆ T) ∗ a;
|
1203 |
+
(54)
|
1204 |
+
A ⋆ (T ⋆ b) = (A ⋆ T) ⋆ b;
|
1205 |
+
(55)
|
1206 |
+
S ⋆ (T ⋆ A) = (S ⋆ T) ⋆ A;
|
1207 |
+
(56)
|
1208 |
+
in the above identities ∗ denotes the usual convolution between two functions
|
1209 |
+
or a function and a distribution.
|
1210 |
+
Proof. (i) It suffices to show (48), (49) and (50), since the other assertions in (i) are
|
1211 |
+
evident.
|
1212 |
+
We start with(48).
|
1213 |
+
Let b ∈ S0(R2d) and z = (x, ω) ∈ R2d, in the subsequent
|
1214 |
+
computations we use Lemma 3.14 and 3.16:
|
1215 |
+
⟨S ⋆ A,b⟩ = lim
|
1216 |
+
n→+∞⟨S ⋆ An,b⟩ = lim
|
1217 |
+
n→+∞
|
1218 |
+
�
|
1219 |
+
R2d tr(Sαz ˇAn)b(z) dz
|
1220 |
+
= lim
|
1221 |
+
n→+∞
|
1222 |
+
�
|
1223 |
+
R2d
|
1224 |
+
�
|
1225 |
+
Rd KSαz ˇ
|
1226 |
+
An(y, y) dyb(z)dz
|
1227 |
+
= lim
|
1228 |
+
n→+∞
|
1229 |
+
�
|
1230 |
+
R2d
|
1231 |
+
�
|
1232 |
+
Rd
|
1233 |
+
�
|
1234 |
+
Rd e2πi(y−t)ωKAn(x − y, x − t)KS(t, y) dtdy b(z) dz
|
1235 |
+
= lim
|
1236 |
+
n→+∞
|
1237 |
+
�
|
1238 |
+
R2d
|
1239 |
+
�
|
1240 |
+
Rd
|
1241 |
+
�
|
1242 |
+
Rd e2πi(t′−y′)ωKAn(y′, t′)KS(x − t′, x − y′) dt′dy′ b(z) dz
|
1243 |
+
= lim
|
1244 |
+
n→+∞
|
1245 |
+
�
|
1246 |
+
Rd
|
1247 |
+
�
|
1248 |
+
Rd KAn(y′, t���)
|
1249 |
+
��
|
1250 |
+
R2d KS(x − t′, x − y′)e2πi(y′−t′)ωb(z) dz
|
1251 |
+
�
|
1252 |
+
dy′dt′
|
1253 |
+
= lim
|
1254 |
+
n→+∞
|
1255 |
+
�
|
1256 |
+
Rd
|
1257 |
+
�
|
1258 |
+
Rd KAn(y′, t′)
|
1259 |
+
��
|
1260 |
+
R2d K ˇS(t′ − x, y′ − x)e2πi(y′−t′)ωb(z) dz
|
1261 |
+
�
|
1262 |
+
dy′dt′
|
1263 |
+
= lim
|
1264 |
+
n→+∞
|
1265 |
+
�
|
1266 |
+
Rd
|
1267 |
+
�
|
1268 |
+
Rd KAn(y′, t′)
|
1269 |
+
��
|
1270 |
+
R2d K ˇS∗(y′ − x, t′ − x)e2πi(y′−t′)ωb(z) dz
|
1271 |
+
�
|
1272 |
+
dy′dt′
|
1273 |
+
= lim
|
1274 |
+
n→+∞
|
1275 |
+
�
|
1276 |
+
Rd
|
1277 |
+
�
|
1278 |
+
Rd KAn(y′, t′)Kb⋆ ˇS∗(y′, t′) dy′dt′.
|
1279 |
+
|
1280 |
+
20
|
1281 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
1282 |
+
About (49), we take f, g ∈ S0(Rd) and compute directly keeping in mind Remark
|
1283 |
+
3.19:
|
1284 |
+
⟨(a ⋆ S)f,g⟩ =
|
1285 |
+
lim
|
1286 |
+
n→+∞
|
1287 |
+
�
|
1288 |
+
R2d an(z)⟨π(z)Sπ(z)∗f,g⟩ dz
|
1289 |
+
=
|
1290 |
+
lim
|
1291 |
+
n→+∞
|
1292 |
+
�
|
1293 |
+
R2d an(z)⟨π(z)S∗π(z)∗g,f⟩ dz
|
1294 |
+
=
|
1295 |
+
lim
|
1296 |
+
n→+∞
|
1297 |
+
�
|
1298 |
+
R2d an(z)(g ⊗ f) ⋆ ˇS∗(z) dz.
|
1299 |
+
Let us address (50):
|
1300 |
+
⟨(b ⋆ A)f,g⟩ =
|
1301 |
+
lim
|
1302 |
+
n→+∞⟨Kb⋆An,Kg⊗f⟩
|
1303 |
+
=
|
1304 |
+
lim
|
1305 |
+
n→+∞
|
1306 |
+
�
|
1307 |
+
R2d
|
1308 |
+
� �
|
1309 |
+
R2d b(x, ω)e2πi(y−u)ωKAn(y − x, u − x) dxdω
|
1310 |
+
�
|
1311 |
+
× g(y)f(u) dydu
|
1312 |
+
=
|
1313 |
+
lim
|
1314 |
+
n→+∞
|
1315 |
+
�
|
1316 |
+
R2d KAn(y′, u′)
|
1317 |
+
� �
|
1318 |
+
R2d b(x, ω)e−2πi(y′−u′)ω
|
1319 |
+
× g(y′ + x)f(u′ + x) dxdω
|
1320 |
+
�
|
1321 |
+
dy′du′
|
1322 |
+
=
|
1323 |
+
lim
|
1324 |
+
n→+∞
|
1325 |
+
�
|
1326 |
+
R2d KAn(y′, u′)
|
1327 |
+
� �
|
1328 |
+
R2d b∗(x′, ω′)e2πi(y′−u′)ω′
|
1329 |
+
× g(y′ − x′)f(u′ + x′) dx′dω′
|
1330 |
+
�
|
1331 |
+
dy′du′
|
1332 |
+
=
|
1333 |
+
lim
|
1334 |
+
n→+∞
|
1335 |
+
�
|
1336 |
+
R2d KAn(y′, u′)Kb∗⋆(g⊗f)(y′, u′) dy′du′,
|
1337 |
+
where for sake of brevity we set b∗(z) := b(−z).
|
1338 |
+
(ii) and (iii) are trivial.
|
1339 |
+
(iv) We prove just (51), (52) and (53). The remaining identities can be derived in
|
1340 |
+
a similar manner.
|
1341 |
+
|
1342 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
1343 |
+
21
|
1344 |
+
In order to show (51) we compute for z ∈ R2d:
|
1345 |
+
(S ⋆ (T ⋆ b))(z) = tr
|
1346 |
+
�
|
1347 |
+
S ◦ αz
|
1348 |
+
���
|
1349 |
+
R2d b(z)αwT dw
|
1350 |
+
�
|
1351 |
+
ˇ
|
1352 |
+
��
|
1353 |
+
= tr
|
1354 |
+
�
|
1355 |
+
S ◦
|
1356 |
+
��
|
1357 |
+
R2d b(w)αz ((αwT)ˇ) dw
|
1358 |
+
��
|
1359 |
+
= tr
|
1360 |
+
�
|
1361 |
+
S ◦
|
1362 |
+
�
|
1363 |
+
R2d b(w)αzα−w ˇT dw
|
1364 |
+
�
|
1365 |
+
= tr
|
1366 |
+
�
|
1367 |
+
S ◦
|
1368 |
+
�
|
1369 |
+
R2d b(−w′)αw′αz ˇT dw′
|
1370 |
+
�
|
1371 |
+
=
|
1372 |
+
�
|
1373 |
+
R2d b(−w′) tr
|
1374 |
+
�
|
1375 |
+
Sαw′+z ˇT
|
1376 |
+
�
|
1377 |
+
dw′,
|
1378 |
+
where the last equality is due, e.g., to [20, Proposition 2.9]. we can the rephrase the
|
1379 |
+
last right-side term as
|
1380 |
+
�
|
1381 |
+
R2d b(z − w′′) tr
|
1382 |
+
�
|
1383 |
+
Sαw′′ ˇT
|
1384 |
+
�
|
1385 |
+
dw′′ =
|
1386 |
+
�
|
1387 |
+
R2d b(z − w′′)(S ⋆ T)(w′′) dw′′
|
1388 |
+
= ((S ⋆ T) ∗ b)(z).
|
1389 |
+
For the proof of (52), the following property of the trace is useful:
|
1390 |
+
�
|
1391 |
+
R2d tr(SαwT) dw = tr(S) tr(T),
|
1392 |
+
where S, T ∈ J 1. Take now f, g ∈ S0(Rd):
|
1393 |
+
⟨(S ⋆ (T ⋆ Q))f,g⟩ =
|
1394 |
+
�
|
1395 |
+
R2d tr(Tαz ˇQ)⟨αzSf,g⟩ dz
|
1396 |
+
=
|
1397 |
+
�
|
1398 |
+
R2d tr(Qαz ˇT) tr((αzS)(f ⊗ g)) dz
|
1399 |
+
=
|
1400 |
+
�
|
1401 |
+
R2d
|
1402 |
+
�
|
1403 |
+
R2d tr(Q(αz ˇT)αw((αzS)(f ⊗ g))) dwdz
|
1404 |
+
=
|
1405 |
+
�
|
1406 |
+
R2d
|
1407 |
+
�
|
1408 |
+
R2d tr((f ⊗ g)(αwQ)αz((αw ˇT)S)) dzdw
|
1409 |
+
=
|
1410 |
+
�
|
1411 |
+
R2d tr(Sαw ˇT) tr((αwQ)(f ⊗ g)) dw
|
1412 |
+
= ⟨((S ⋆ T) ⋆ Q)f,g⟩.
|
1413 |
+
|
1414 |
+
22
|
1415 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
1416 |
+
Also the last identity (53) may be deduced by a direct computation. For f, g ∈
|
1417 |
+
S0(Rd) we have
|
1418 |
+
⟨((S ⋆ b) ⋆ σ)f,g⟩ =
|
1419 |
+
�
|
1420 |
+
R2d σ(z)⟨αz(S ⋆ b)f,g⟩ dz
|
1421 |
+
=
|
1422 |
+
�
|
1423 |
+
R2d σ(z)
|
1424 |
+
�
|
1425 |
+
R2d b(w)⟨(αwS)π(z)∗f,π(z)∗g⟩ dwdz
|
1426 |
+
=
|
1427 |
+
�
|
1428 |
+
R2d
|
1429 |
+
�
|
1430 |
+
R2d σ(z)b(w)⟨(αw+zS)f,g⟩ dwdz
|
1431 |
+
=
|
1432 |
+
�
|
1433 |
+
R2d
|
1434 |
+
�
|
1435 |
+
R2d σ(z)b(w) tr((αw+zS)(f ⊗ g)) dwdz
|
1436 |
+
=
|
1437 |
+
�
|
1438 |
+
R2d b(w)
|
1439 |
+
�
|
1440 |
+
R2d σ(z′ − w) tr((αz′S)(f ⊗ g)) dz′dw
|
1441 |
+
=
|
1442 |
+
�
|
1443 |
+
R2d(
|
1444 |
+
�
|
1445 |
+
R2d b(w)σ(z′ − w) dz′) tr((αz′S)(f ⊗ g)) dw
|
1446 |
+
=
|
1447 |
+
�
|
1448 |
+
R2d b ∗ σ(z′)⟨(αz′S)f,g⟩ dz′
|
1449 |
+
= ⟨(S ⋆ (b ∗ σ))f,g⟩.
|
1450 |
+
This concludes the proof.
|
1451 |
+
□
|
1452 |
+
Corollary 3.21. The mappings FWτ and Wτ defined on S0 can be extended to
|
1453 |
+
topological isomorphisms
|
1454 |
+
FWτ : S′
|
1455 |
+
0 → S′
|
1456 |
+
0(R2d)
|
1457 |
+
and
|
1458 |
+
Wτ : S′
|
1459 |
+
0 → S′
|
1460 |
+
0(R2d)
|
1461 |
+
by duality:
|
1462 |
+
(57)
|
1463 |
+
⟨FWτS,a⟩ := ⟨S,SRτa⟩,
|
1464 |
+
⟨WτS,a⟩ := ⟨S, Opτ a⟩,
|
1465 |
+
where S ∈ S′
|
1466 |
+
0 and a ∈ S0(R2d). The inverses are given by
|
1467 |
+
SRτ : S′
|
1468 |
+
0(R2d) → S′
|
1469 |
+
0
|
1470 |
+
and
|
1471 |
+
Opτ : S′
|
1472 |
+
0(R2d) → S′
|
1473 |
+
0,
|
1474 |
+
respectively.
|
1475 |
+
Proof. The definitions in (57) rely on the fact that Opτ = W ∗
|
1476 |
+
τ and SRτ = F ∗
|
1477 |
+
Wτ, see
|
1478 |
+
Theorem 3.7 and Corollary 3.9. It is straightforward to see that if S ∈ S′
|
1479 |
+
0, then
|
1480 |
+
FWτS and WτS defined as in (57) are in S′
|
1481 |
+
0(R2d). Also linearity and boundedness
|
1482 |
+
of FWτ : S′
|
1483 |
+
0 → S′
|
1484 |
+
0(R2d) and Wτ : S′
|
1485 |
+
0 → S′
|
1486 |
+
0(R2d) are easy to verify as well as the fact
|
1487 |
+
that they extend FWτ : S0 → S0(R2d) and Wτ : S0 → S0(R2d).
|
1488 |
+
We show that Wτ is an isomorphisms with inverse Opτ, then FWτ is treated in
|
1489 |
+
the same way.
|
1490 |
+
Wτ is injective because Opτ : S0(R2d) → S0 is an isomorphism.
|
1491 |
+
Fix now a ∈ S′
|
1492 |
+
0(R2d), there exists a sequence {an}n ⊆ S0(R2d) such that an
|
1493 |
+
w−∗
|
1494 |
+
−→
|
1495 |
+
n
|
1496 |
+
|
1497 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
1498 |
+
23
|
1499 |
+
a
|
1500 |
+
in
|
1501 |
+
S′
|
1502 |
+
0(R2d). Since Wτ is an isomorphism between S0 and S0(R2d), there exists
|
1503 |
+
{An}n ⊆ S0 such that an = WτAn. We see that there is A ∈ S′
|
1504 |
+
0 such that An
|
1505 |
+
w−∗
|
1506 |
+
−→
|
1507 |
+
n
|
1508 |
+
A
|
1509 |
+
in
|
1510 |
+
S′
|
1511 |
+
0, in fact taking b ∈ S0(R2d)
|
1512 |
+
⟨a,b⟩ =
|
1513 |
+
lim
|
1514 |
+
n→+∞⟨WτAn,b⟩ = lim
|
1515 |
+
n→+∞⟨An, Opτ b⟩.
|
1516 |
+
Hence a = WτA, which proves that Wτ is onto. We show now that Wτ ◦ Opτ is the
|
1517 |
+
identity on S′
|
1518 |
+
0(R2d), take a ∈ S′
|
1519 |
+
0(R2d) and b ∈ S0(R2d):
|
1520 |
+
⟨Wτ ◦ Opτ a,b⟩ = ⟨Opτ a, Opτ b⟩ = ⟨a,Wτ ◦ Opτ b⟩ = ⟨a,b⟩.
|
1521 |
+
The first identity is just (57), the second one is (32) and the last one is (i) of
|
1522 |
+
Corollary 3.8. For the other direction, take S ∈ S′
|
1523 |
+
0 and T ∈ S0:
|
1524 |
+
⟨Opτ ◦WτS,T⟩ = ⟨WτS,WτT⟩ = ⟨S, Opτ ◦WτT⟩ = ⟨S,T⟩.
|
1525 |
+
The first identity is (32), the second one is (57) and the last one is (i) of Corollary
|
1526 |
+
3.8.
|
1527 |
+
□
|
1528 |
+
3.3. τ-Cohen’s class of operators. In the present subsection we define Qτ
|
1529 |
+
a(S)
|
1530 |
+
and recall the definition of Qτ
|
1531 |
+
S(f) from [17]. We shall see that Qτ
|
1532 |
+
a(S) relates to
|
1533 |
+
well-known objects and observe that it coincides with the τ-symbol of the mixed-
|
1534 |
+
state localization operator a ⋆ S. We continue with some statements concerning the
|
1535 |
+
interplay between the Gabor matrix of an operator Gϕ
|
1536 |
+
T, the τ-Cohen’s class, the
|
1537 |
+
trace and the τ-Wigner distribution.
|
1538 |
+
Definition 3.22. For a ∈ S′
|
1539 |
+
0(R2d) we define the τ-Cohen’s class distribution, with
|
1540 |
+
kernel a, of an operator S ∈ S0 as
|
1541 |
+
(58)
|
1542 |
+
Qτ
|
1543 |
+
a(S) := a ∗ WτS.
|
1544 |
+
Of course, the rank-one case f ⊗ g reduces to the definition given in (23). We
|
1545 |
+
recall also the definition given in [17] of Cohen’s class distribution of a function
|
1546 |
+
f ∈ S0(Rd) w.r.t. the operator S ∈ S′
|
1547 |
+
0 by
|
1548 |
+
(59)
|
1549 |
+
QSf := (f ⊗ f) ⋆ ˇS.
|
1550 |
+
It can be easily seen that for every z ∈ R2d
|
1551 |
+
QSf(z) = (f ⊗ f) ⋆ ˇS(z) = ⟨(αzS)f, f, ⟩.
|
1552 |
+
Remark 3.23. If a ∈ S′
|
1553 |
+
0(R2d) and S ∈ S0, then we see that the τ-Cohen’s class rep-
|
1554 |
+
resentation of S w.r.t. a is just the τ-symbol of the mixed-state localization operator
|
1555 |
+
a ⋆ S:
|
1556 |
+
aa⋆S
|
1557 |
+
τ
|
1558 |
+
= Wτ(a ⋆ S) = a ∗ WτS = Qτ
|
1559 |
+
a(S).
|
1560 |
+
|
1561 |
+
24
|
1562 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
1563 |
+
Lemma 3.24. Let S ∈ S0 have the spectral decomposition �∞
|
1564 |
+
n=1 fn⊗gn, for f, ϕ, ψ ∈
|
1565 |
+
S0(Rd) and {hn}n ⊆ S0(Rd) with
|
1566 |
+
∞
|
1567 |
+
�
|
1568 |
+
n=1
|
1569 |
+
∥hn∥2
|
1570 |
+
S0 < +∞.
|
1571 |
+
. Then for every z ∈ R2d:
|
1572 |
+
Qτ
|
1573 |
+
W1−τ ( ˇψ, ˇϕ)(S)(z) =
|
1574 |
+
∞
|
1575 |
+
�
|
1576 |
+
n=1
|
1577 |
+
Vϕfn(z)Vψgn(z);
|
1578 |
+
(60)
|
1579 |
+
Qτ
|
1580 |
+
W1−τ ( ˇϕ, ˇϕ)(
|
1581 |
+
∞
|
1582 |
+
�
|
1583 |
+
n=1
|
1584 |
+
hn ⊗ hn)(z) =
|
1585 |
+
∞
|
1586 |
+
�
|
1587 |
+
n=1
|
1588 |
+
|Vϕhn(z)|2 .
|
1589 |
+
(61)
|
1590 |
+
Proof. Clearly, it suffices to prove the first identity. We show first that for f, g ∈
|
1591 |
+
S0(Rd)
|
1592 |
+
(62)
|
1593 |
+
Qτ
|
1594 |
+
a(f, g) = (f ⊗ g) ⋆ Op1-τ(a).
|
1595 |
+
In fact, applying Fσ to the right-hand side first we get
|
1596 |
+
Fσ((f ⊗ g) ⋆ Op1-τ(a)) = FWτ(f ⊗ g) · FW1−τ Op1-τ(a) = V τ
|
1597 |
+
g f · Fσa.
|
1598 |
+
We apply Fσ a second time:
|
1599 |
+
(f ⊗ g) ⋆ Op1-τ(a) = FσV τ
|
1600 |
+
g f ∗ FσFσa = Wτ(f, g) ∗ a.
|
1601 |
+
We can now proceed as follows:
|
1602 |
+
Qτ
|
1603 |
+
W1−τ ( ˇψ, ˇϕ)(S) = W1−τ( ˇψ, ˇϕ) ∗ Wτ(
|
1604 |
+
∞
|
1605 |
+
�
|
1606 |
+
n=1
|
1607 |
+
fn ⊗ gn) =
|
1608 |
+
∞
|
1609 |
+
�
|
1610 |
+
n=1
|
1611 |
+
W1−τ( ˇψ, ˇϕ) ∗ Wτ(fn, gn)
|
1612 |
+
=
|
1613 |
+
∞
|
1614 |
+
�
|
1615 |
+
n=1
|
1616 |
+
(fn ⊗ gn) ⋆ Op1-τ(W1−τ( ˇψ, ˇϕ)) =
|
1617 |
+
∞
|
1618 |
+
�
|
1619 |
+
n=1
|
1620 |
+
(fn ⊗ gn) ⋆ ( ˇψ ⊗ ˇϕ)
|
1621 |
+
=
|
1622 |
+
∞
|
1623 |
+
�
|
1624 |
+
n=1
|
1625 |
+
Vϕfn(z)Vψgn(z),
|
1626 |
+
where the last equality is due to [17].
|
1627 |
+
□
|
1628 |
+
We call a bounded operator T on L2(Rd) positive, denoted by T ≥ 0, if
|
1629 |
+
⟨Tf, f⟩ ≥ 0,
|
1630 |
+
∀ f ∈ L2(Rd).
|
1631 |
+
An operator T ∈ J 1 and T ≥ 0 is also called a state in quantum mechanics.
|
1632 |
+
Let us take T ∈ S′
|
1633 |
+
0 and ϕ ∈ S, then the Gabor matrix of T (w.r.t. ϕ) is defined as
|
1634 |
+
(63)
|
1635 |
+
Gϕ
|
1636 |
+
T(z, w) := ⟨Tπ(w)ϕ, π(z)ϕ⟩,
|
1637 |
+
z = (x, ω), w = (u, v) ∈ R2d.
|
1638 |
+
|
1639 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
1640 |
+
25
|
1641 |
+
We notice that the Gabor matrix of an operator does not depend on τ, in the sense
|
1642 |
+
that
|
1643 |
+
Gϕ
|
1644 |
+
T(z, w) = ⟨Tπ(w)ϕ, π(z)ϕ⟩ = ⟨Tπτ(w)ϕ, πτ(z)ϕ⟩,
|
1645 |
+
∀ τ ∈ [0, 1].
|
1646 |
+
Remark 3.25. We point out that the diagonal of the Gabor matrix of T, w.r.t. ϕ,
|
1647 |
+
is the Cohen’s class representation of ϕ w.r.t. T up to a reflection:
|
1648 |
+
(64)
|
1649 |
+
Gϕ
|
1650 |
+
T(−z, −z) = QTϕ(z).
|
1651 |
+
In fact
|
1652 |
+
Gϕ
|
1653 |
+
T(−z, −z) = ⟨Tπ(−z)ϕ, π(−z)ϕ⟩ = ⟨Tπ(z)∗ϕ, π(z)∗ϕ⟩
|
1654 |
+
= ⟨(αzT)ϕ, ϕ, ⟩ = QT ϕ(z).
|
1655 |
+
Let F and H be functions of (z, w) ∈ R4d and let Θ be a real 4d × 4d matrix.
|
1656 |
+
Then the twisted convolution induced by Θ is defined as
|
1657 |
+
(65)
|
1658 |
+
F ♮Θ H(z, w) :=
|
1659 |
+
�
|
1660 |
+
R2d
|
1661 |
+
�
|
1662 |
+
R2d F(z′, w′)H(z − z′, w − w′)e2πi(z,w)Θ(z′,w′) dz′dw′.
|
1663 |
+
Lemma 3.26. Let T, S ∈ J 1, T, S ≥ 0. Then for every τ ∈ [0, 1] we have
|
1664 |
+
(66)
|
1665 |
+
tr(TS) =
|
1666 |
+
�
|
1667 |
+
R2d WτT(z)WτS(z) dz.
|
1668 |
+
Proof. Since T and S are trace-class and positive, they can be described as
|
1669 |
+
T =
|
1670 |
+
∞
|
1671 |
+
�
|
1672 |
+
n=1
|
1673 |
+
λnfn ⊗ fn,
|
1674 |
+
S =
|
1675 |
+
∞
|
1676 |
+
�
|
1677 |
+
n=1
|
1678 |
+
µngn ⊗ gn
|
1679 |
+
for some orthonormal sets {fn}n and {gn}n in L2 and λn, µn ≥ 0. Let {en}n be an
|
1680 |
+
o.n.b. for L2(Rd):
|
1681 |
+
tr(TS) =
|
1682 |
+
∞
|
1683 |
+
�
|
1684 |
+
n=1
|
1685 |
+
⟨TSen, en⟩ =
|
1686 |
+
∞
|
1687 |
+
�
|
1688 |
+
i,j
|
1689 |
+
λjµi |⟨fj, gi⟩|2 .
|
1690 |
+
On the other hand,
|
1691 |
+
�
|
1692 |
+
R2d WτT(z)WτS(z) dz =
|
1693 |
+
∞
|
1694 |
+
�
|
1695 |
+
i,j
|
1696 |
+
λjµi
|
1697 |
+
�
|
1698 |
+
R2d Wτfj(z)Wτgi(z) dz =
|
1699 |
+
∞
|
1700 |
+
�
|
1701 |
+
i,j
|
1702 |
+
λjµi |⟨fj, gi⟩|2 ,
|
1703 |
+
where the last equality is due to Moyal’s identity. This concludes the proof.
|
1704 |
+
□
|
1705 |
+
Remark 3.27. Since we assume S ≥ 0, S is self-adjoint and for τ = 1/2 we have
|
1706 |
+
that W1/2S is real-valued. In fact, using the representation given in the proof of
|
1707 |
+
Lemma 3.26:
|
1708 |
+
W1/2S =
|
1709 |
+
∞
|
1710 |
+
�
|
1711 |
+
n=1
|
1712 |
+
µnW1/2gn
|
1713 |
+
|
1714 |
+
26
|
1715 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
1716 |
+
with every W1/2gn real-valued and µn ≥ 0. Hence, for τ = 1/2 we recover [12,
|
1717 |
+
Lemma 2.7].
|
1718 |
+
Lemma 3.28. Let T ∈ J 1 and consider ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1. Then
|
1719 |
+
(67)
|
1720 |
+
tr T =
|
1721 |
+
�
|
1722 |
+
R2d⟨(αzT)ϕ, ϕ⟩ dz =
|
1723 |
+
�
|
1724 |
+
R2d QT ϕ(z) dz =
|
1725 |
+
�
|
1726 |
+
R2d Gϕ
|
1727 |
+
T(z, z) dz.
|
1728 |
+
Proof. The proof follows from a direct computation using the representations pre-
|
1729 |
+
sented in the proof of Lemma 3.26 and Moyal’s identity involving the function ϕ:
|
1730 |
+
⟨fj, gi⟩ = ⟨Vϕfj, Vϕgi⟩,
|
1731 |
+
we leave details to the interested reader.
|
1732 |
+
□
|
1733 |
+
Lemma 3.29. Let T ∈ J 1, T ≥ 0 and let ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1. Then
|
1734 |
+
for every z ∈ R2d:
|
1735 |
+
(68)
|
1736 |
+
QTϕ(z) =
|
1737 |
+
�
|
1738 |
+
R2d WτT(w)Wτϕ(z + w) dw = WτT ∗ (Wτϕ)∗(z),
|
1739 |
+
where (Wτϕ)∗(w) = Wτϕ(−w).
|
1740 |
+
Proof. We compute directly
|
1741 |
+
QT ϕ(z) = ⟨π(z)Tπ(z)∗ϕ, ϕ⟩ = tr(T(π(z)∗ϕ ⊗ π(z)∗ϕ))
|
1742 |
+
=
|
1743 |
+
�
|
1744 |
+
R2d WτT(w)Wτ(π(z)∗ϕ ⊗ π(z)∗ϕ)(w) dw,
|
1745 |
+
the last equation holds because of Lemma 3.26. An elementary calculation gives
|
1746 |
+
Wτ(π(z)∗ϕ ⊗ π(z)∗ϕ)(w) = Wτϕ(z + w),
|
1747 |
+
which is also known as covariance property and this concludes the proof.
|
1748 |
+
□
|
1749 |
+
Lemma 3.30. Let T ∈ J 1, T ≥ 0 and consider ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1.
|
1750 |
+
Then for every z, w ∈ R2d:
|
1751 |
+
|Gϕ
|
1752 |
+
T(z, w)|2 ≤ QTϕ(−z)QT ϕ(−w).
|
1753 |
+
Proof. The claim follows from the Cauchy-Schwarz inequality for the inner product
|
1754 |
+
induced by the positive operator T and Remark 3.25.
|
1755 |
+
□
|
1756 |
+
Lemma 3.31. Let 0d and Id denote the zero and identity d×d matrices, respectively.
|
1757 |
+
Let us define
|
1758 |
+
Θ :=
|
1759 |
+
|
1760 |
+
|
1761 |
+
0d
|
1762 |
+
0d
|
1763 |
+
0d
|
1764 |
+
0d
|
1765 |
+
Id
|
1766 |
+
0d
|
1767 |
+
0d
|
1768 |
+
0d
|
1769 |
+
0d
|
1770 |
+
0d
|
1771 |
+
0d
|
1772 |
+
0d
|
1773 |
+
0d
|
1774 |
+
0d
|
1775 |
+
−Id
|
1776 |
+
0d
|
1777 |
+
|
1778 |
+
.
|
1779 |
+
|
1780 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
1781 |
+
27
|
1782 |
+
Let T ∈ J 1 and consider ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1. For z = (x, ω), w =
|
1783 |
+
(u, v) ∈ R2d we have
|
1784 |
+
Gϕ
|
1785 |
+
T(z, w) = Gϕ
|
1786 |
+
T ♮Θ(Gϕ
|
1787 |
+
ϕ⊗ϕ)∗(z, w)
|
1788 |
+
(69)
|
1789 |
+
=
|
1790 |
+
�
|
1791 |
+
R2d
|
1792 |
+
�
|
1793 |
+
R2d Gϕ
|
1794 |
+
T(z′, w′)(Gϕ
|
1795 |
+
ϕ⊗ϕ)∗(z − z′, w − w′)e2πi(ωx′−u′v) dz′dw′,
|
1796 |
+
where z′ = (x′, ω′), w′ = (u′, v′) ∈ R2d.
|
1797 |
+
Proof. We apply twice Moyal’s identity:
|
1798 |
+
Gϕ
|
1799 |
+
T(z, w) =
|
1800 |
+
�
|
1801 |
+
R2d Vϕ[Tπ(w)ϕ](z′)Vϕ[π(z)ϕ](z′) dz′
|
1802 |
+
=
|
1803 |
+
�
|
1804 |
+
R2d
|
1805 |
+
�
|
1806 |
+
R2d Vϕ[π(w)ϕ](w′)Vϕ[T ∗π(z′)ϕ](w′)⟨π(z′)ϕ, π(z)ϕ⟩ dz′dw′
|
1807 |
+
=
|
1808 |
+
�
|
1809 |
+
R2d
|
1810 |
+
�
|
1811 |
+
R2d Gϕ
|
1812 |
+
T(z′, w′)⟨π(w)ϕ, π(w′)ϕ⟩⟨π(z′)ϕ, π(z)ϕ⟩ dz′dw′.
|
1813 |
+
It is then a direct, although tedious, calculation to show that
|
1814 |
+
⟨π(z)ϕ, π(z′)ϕ⟩⟨π(w′)ϕ, π(w)ϕ⟩ = (Gϕ
|
1815 |
+
ϕ⊗ϕ)∗(z − z′, w − w′)e2πi(ωx′−u′v).
|
1816 |
+
This concludes the proof.
|
1817 |
+
□
|
1818 |
+
Lemma 3.32. Let T ∈ J 1, T ≥ 0 and consider ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1.
|
1819 |
+
Then for any τ ∈ [0, 1]:
|
1820 |
+
(70)
|
1821 |
+
WτT(z) =
|
1822 |
+
�
|
1823 |
+
R2d
|
1824 |
+
�
|
1825 |
+
R2d e−2πi[(ωx′−ω′x)+( 1
|
1826 |
+
2− 3
|
1827 |
+
4 τ)x′ω′+x′v]Gϕ
|
1828 |
+
T
|
1829 |
+
�z′
|
1830 |
+
2 − w, −z′
|
1831 |
+
2 − w
|
1832 |
+
�
|
1833 |
+
dwdz′,
|
1834 |
+
where z = (x, ω), z′ = (x′, ω′), w = (u, v) ∈ R2d.
|
1835 |
+
Proof. We start rephrasing the τ-Wigner distribution of T:
|
1836 |
+
WτT(z) = FσFWτT(z) =
|
1837 |
+
�
|
1838 |
+
R2d e−2πi(ωx′−ω′x) tr(πτ(z′)∗T) dz′.
|
1839 |
+
Recalling the properties for πτ, see Section 2, we see that
|
1840 |
+
πτ(z′/2 + z′/2) = e2πi[(1−τ) x′ω′
|
1841 |
+
4
|
1842 |
+
−τ x′ω′
|
1843 |
+
4
|
1844 |
+
]πτ(z′/2)πτ(z′/2)
|
1845 |
+
= e
|
1846 |
+
π
|
1847 |
+
2 i(1−2τ)x′ω′πτ(z′/2)πτ(z′/2).
|
1848 |
+
|
1849 |
+
28
|
1850 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
1851 |
+
Taking the adjoint we get πτ(z′)∗ = e− π
|
1852 |
+
2 i(1−2τ)x′ω′πτ(z′/2)∗πτ(z′/2)∗ and we write
|
1853 |
+
using Lemma 3.28:
|
1854 |
+
tr(πτ(z′)∗T) = e− π
|
1855 |
+
2 i(1−2τ)x′ω′ tr(πτ(z′/2)∗Tπτ(z′/2)∗)
|
1856 |
+
= e− π
|
1857 |
+
2 i(1−2τ)x′ω′ �
|
1858 |
+
R2d⟨Tπτ(z′/2)∗πτ(w)∗ϕ, πτ(z′/2)πτ(w)∗ϕ⟩ dw
|
1859 |
+
= e− π
|
1860 |
+
2 i(1−2τ)x′ω′e− π
|
1861 |
+
2 i(1−τ)x′ω′
|
1862 |
+
×
|
1863 |
+
�
|
1864 |
+
R2d⟨Tπτ(−z′/2)πτ(−w)ϕ, πτ(z′/2)πτ(−w)ϕ⟩ dw
|
1865 |
+
= e− π
|
1866 |
+
2 i(2−3τ)x′ω′ �
|
1867 |
+
R2d⟨Tπ(−z′/2)π(−w)ϕ, π(z′/2)π(−w)ϕ⟩ dw
|
1868 |
+
= e− π
|
1869 |
+
2 i(2−3τ)x′ω′ �
|
1870 |
+
R2d e−2πix′v⟨Tπ(−z′/2 − w)ϕ, π(z′/2 − w)ϕ⟩ dw.
|
1871 |
+
This concludes the argument.
|
1872 |
+
□
|
1873 |
+
4. A characterization of Schwartz operators
|
1874 |
+
In this section we introduce weighted versions of S0 and give an alternative de-
|
1875 |
+
scription of the class S. We use the polynomial weight
|
1876 |
+
(71)
|
1877 |
+
vs(z) := (1 + |z|2)
|
1878 |
+
s
|
1879 |
+
2,
|
1880 |
+
z ∈ R2d,
|
1881 |
+
where s ≥ 0. In order to avoid an extremely cumbersome notation, just for the
|
1882 |
+
weight functions vs we shall use the following:
|
1883 |
+
vs ⊗ vs(z, w) := Kvs⊗vs = vs(z)vs(w),
|
1884 |
+
∀z, w ∈ R2d.
|
1885 |
+
Definition 4.1. For s ≥ 0 we define the weighted class of Feichtinger operators as
|
1886 |
+
(72)
|
1887 |
+
M1
|
1888 |
+
s := {S : S′
|
1889 |
+
0(Rd) → S0(Rd) | S is linear, continuous with kernel KS ∈ M1
|
1890 |
+
vs⊗vs(R2d)}.
|
1891 |
+
For S in M1
|
1892 |
+
s we define the mapping
|
1893 |
+
(73)
|
1894 |
+
∥S∥M1s := ∥KS∥M1
|
1895 |
+
vs⊗vs .
|
1896 |
+
Remark 4.2.
|
1897 |
+
(i) For s = 0 we recover the Feichtinger operators S0;
|
1898 |
+
(ii) The mapping defined in (73) is a norm on M1
|
1899 |
+
s and it is easy to see that
|
1900 |
+
(M1
|
1901 |
+
s, ∥·∥M1s) is a Banach space and the following continuous inclusion holds
|
1902 |
+
true for every s ≥ 0:
|
1903 |
+
(74)
|
1904 |
+
M1
|
1905 |
+
s ֒→ S0.
|
1906 |
+
Lemma 4.3. For any S ∈ M1
|
1907 |
+
s there exist {fn}n, {gn}n ⊆ M1
|
1908 |
+
vs⊗vs(R2d) such that
|
1909 |
+
S =
|
1910 |
+
∞
|
1911 |
+
�
|
1912 |
+
n=1
|
1913 |
+
fn ⊗ gn,
|
1914 |
+
∞
|
1915 |
+
�
|
1916 |
+
n=1
|
1917 |
+
∥fn∥M1vs ∥gn∥M1vs ≤ +∞,
|
1918 |
+
KS =
|
1919 |
+
∞
|
1920 |
+
�
|
1921 |
+
n=1
|
1922 |
+
Kfn⊗gn.
|
1923 |
+
|
1924 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
1925 |
+
29
|
1926 |
+
Proof. The proof follows from the fact that
|
1927 |
+
M1
|
1928 |
+
vs⊗vs(R2d) = M1
|
1929 |
+
vs(Rd)ˆ⊗M1
|
1930 |
+
vs(Rd).
|
1931 |
+
See also the proof of Lemma 3.4.
|
1932 |
+
□
|
1933 |
+
Theorem 4.4. For every τ ∈ [0, 1] the mapping Wτ : M1
|
1934 |
+
s → M1
|
1935 |
+
vs⊗vs(R2d) is a topo-
|
1936 |
+
logical isomorphism with inverse given by Opτ : M1
|
1937 |
+
vs⊗vs(R2d) → M1
|
1938 |
+
s.
|
1939 |
+
Proof. The proof follows the same pattern as the ones of Theorem 3.7 and Corollary
|
1940 |
+
3.8.
|
1941 |
+
□
|
1942 |
+
Corollary 4.5. An operator S belongs to M1
|
1943 |
+
s if and only if for some (hence every)
|
1944 |
+
τ ∈ [0, 1] WτS ∈ M1
|
1945 |
+
vs⊗vs(R2d).
|
1946 |
+
Theorem 4.6. The following is true:
|
1947 |
+
(75)
|
1948 |
+
S =
|
1949 |
+
�
|
1950 |
+
s≥0
|
1951 |
+
M1
|
1952 |
+
s.
|
1953 |
+
Proof. By Corollary 4.5, S belongs to the set on the right-hand side if and only if
|
1954 |
+
WτS ∈
|
1955 |
+
�
|
1956 |
+
s≥0
|
1957 |
+
M1
|
1958 |
+
vs⊗vs(R2d) = S(R2d).
|
1959 |
+
The claim follows since W1/2S is the Weyl symbol of S, i.e. aS
|
1960 |
+
1/2 = W1/2S.
|
1961 |
+
□
|
1962 |
+
We recall that a function F on R2d is called rapidly decaying if for every multiindex
|
1963 |
+
α, β ∈ Nd
|
1964 |
+
0 we have
|
1965 |
+
sup
|
1966 |
+
x,ω∈Rd
|
1967 |
+
��xαωβF(x, ω)
|
1968 |
+
�� < +∞,
|
1969 |
+
where, if x = (x1, . . . , xd) and α = (α1, . . . , αd), xα stands for xα1
|
1970 |
+
1 · . . . · xαd
|
1971 |
+
d .
|
1972 |
+
In [12, Theorem 1.1] a sufficient condition is given for a positive trace-class op-
|
1973 |
+
erator to be in S.
|
1974 |
+
Namely, if T ∈ B(L2), T ≥ 0, is such that WτT exists for
|
1975 |
+
some τ ∈ [0, 1] and it is rapidly decreasing, then T ∈ S and WτT exists for every
|
1976 |
+
τ ∈ [0, 1]. In this spirit, we provide the following sufficient condition for a generic
|
1977 |
+
S ∈ B(L2). Observe that we do not not require S to be positive.
|
1978 |
+
Corollary 4.7. Let S ∈ B(L2) and assume that for some τ ∈ [0, 1] WτS exists.
|
1979 |
+
Suppose also that, w.r.t. some non-zero window in L2(R2d), the STFT of WτS is
|
1980 |
+
rapidly decaying. Then WτS exists for every τ ∈ [0, 1] and S is in S.
|
1981 |
+
Proof. Let us pick G ∈ L2(R2d) ∖ {0}. If VGWτS is rapidly decaying then S ∈ M1
|
1982 |
+
s
|
1983 |
+
for every s ≥ 0. The claim follows from Theorem 4.6.
|
1984 |
+
□
|
1985 |
+
|
1986 |
+
30
|
1987 |
+
FEDERICO BASTIANONI AND FRANZ LUEF
|
1988 |
+
Acknowledgments
|
1989 |
+
The first author would like to thank Eduard Ortega for the financial support to
|
1990 |
+
visit Trondheim which led to this work.
|
1991 |
+
References
|
1992 |
+
[1] F. Bastianoni, E. Cordero and F. Nicola. Decay and smoothness for eigenfunctions of local-
|
1993 |
+
ization operators. J. Math. Anal. Appl. 492, 124480, 2020.
|
1994 |
+
[2] O. Christensen. An introduction to frames and Riesz bases. Applied and Numerical Harmonic
|
1995 |
+
Analysis, Birkh¨auser Basel, Second Edition, 2016.
|
1996 |
+
[3] E. Cordero and K. Gr¨ochenig. Time-frequency analysis of localization operators. J. Funct.
|
1997 |
+
Anal., 205(1):107–131, 2003.
|
1998 |
+
[4] E. Cordero and F. Nicola. Sharp integral bounds for Wigner distributions. Int. Math. Res.
|
1999 |
+
Not. IMRN, (6):1779–1807, 2018.
|
2000 |
+
[5] E. Cordero and L. Rodino. Time-Frequency analysis of operators. De Gruyter Studies in
|
2001 |
+
Mathematics 75, Berlin/Boston, 2020.
|
2002 |
+
[6] M. D¨orfler, F. Luef, H. McNulty and E. Skrettingland. Time-Frequency Analysis and Coorbit
|
2003 |
+
Spaces of Operators. arXiv preprint arXiv:2210.04844, 2022.
|
2004 |
+
[7] C. de Gosson and M. de Gosson. On the Non-Uniqueness of Statistical Ensembles Defining a
|
2005 |
+
Density Operator and a Class of Mixed Quantum States with Integrable Wigner Distribution.
|
2006 |
+
Quantum Reports, 3(3):473-81, 2021.
|
2007 |
+
[8] J. De Vries. The local weight of an effective locally compact transformation group and the
|
2008 |
+
dimension og L2(G). Colloq. Math. 39(2): 319–3323, 1978.
|
2009 |
+
[9] H. G. Feichtinger. On a new Segal algebra. Monatshefte f¨ur Mathematik 92, 269–289, 1981.
|
2010 |
+
[10] H. G. Feichtinger and M. S. Jakobsen. The inner kernel theorem for a certain Segal algebra.
|
2011 |
+
Monatsh. Math., 2022.
|
2012 |
+
[11] K. Gr¨ochenig and T. Strohmer. Pseudodifferential operators on locally compact abelian groups
|
2013 |
+
and Sj¨ostrand’s symbol class. Journal f¨ur die reine und angewandte Mathematik, 2007(613),
|
2014 |
+
121–146, 2007.
|
2015 |
+
[12] F. Hern´andez and C. J. Riedel. Rapidly decaying Wigner functions are Schwartz functions. J.
|
2016 |
+
Math. Phys. 63, 022104, 2022.
|
2017 |
+
[13] M. S. Jakobsen. On a (no longer) new Segal algebra: a review of the Feichtinger algebra. J.
|
2018 |
+
Fourier Anal. Appl., 24:1579–1660, 2018.
|
2019 |
+
[14] M. Keyl, J. Kiukas and R. Werner. Schwartz operators. Rev. Math. Phys. 28(3), 1630001, 60,
|
2020 |
+
2016.
|
2021 |
+
[15] L. Lafleche. On Quantum Sobolev Inequalities. arXiv preprint arXiv:2210.03013, 2022.
|
2022 |
+
[16] F. Luef and E. Skrettingland. On accumulated Cohen’s class distributions and mixed-state
|
2023 |
+
localization operators. Constr. Approx. 52, 31–64, 2020.
|
2024 |
+
[17] F. Luef and E. Skrettingland. Mixed-state localization operators: Cohen’s class and trace class
|
2025 |
+
operators. J. Fourier Anal. Appl., 25(4):2064–2108, 2019.
|
2026 |
+
[18] R. Megginson. An Introduction to Banach Space Theory. Graduate Texts in Mathematics,
|
2027 |
+
vol.183, pp. xx+596. Springer, New York, 1998.
|
2028 |
+
[19] J. E. Moyal. Quantum mechanics as a statistical theory. Proc. Cambridge Phil. Soc., 45:99–
|
2029 |
+
124, 1949.
|
2030 |
+
[20] E. Skrettingland. Convolutions for Localization Operators. Master Thesis, NTNU, 2017.
|
2031 |
+
[21] B. Simon. Trace Ideal and Their Applications. Cambridge University Press, Cambridge, 1979.
|
2032 |
+
|
2033 |
+
τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
|
2034 |
+
31
|
2035 |
+
[22] J. Toft. Continuity and compactness for pseudo-differential operators with symbols in quasi-
|
2036 |
+
Banach spaces or H¨ormander classes. Anal. Appl. (Singap.), 15(3):353–389, 2017.
|
2037 |
+
[23] R. F. Werner. Quantum harmonic analysis on phase space. J. Math. Phys. 25(5), 1404–1411,
|
2038 |
+
1984.
|
2039 |
+
[24] E. P. Wigner. On the quantum correction for thermodynamic equilibrium. Phys. Rev. 40,
|
2040 |
+
749–759, 1932.
|
2041 |
+
Dipartimento di Scienze Matematiche, Politecnico di Torino, corso Duca degli
|
2042 |
+
Abruzzi 24, 10129 Torino, Italy
|
2043 |
+
Email address: [email protected]
|
2044 |
+
Department of Mathematics, NTNU Norwegian University of Science and Tech-
|
2045 |
+
nology, NO-7491 Trondheim, Norway
|
2046 |
+
Email address: [email protected]
|
2047 |
+
|
4tE4T4oBgHgl3EQfBAt_/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
5dE3T4oBgHgl3EQfpQo9/content/tmp_files/2301.04640v1.pdf.txt
ADDED
@@ -0,0 +1,825 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.04640v1 [math.GM] 2 Jan 2023
|
2 |
+
Properties of the multi-index special function W(¯α,¯ν)(z)
|
3 |
+
R. Drogheia
|
4 |
+
aLiceo Scientifico Francesco Severi, Viale Europa,36, 03100 Frosinone (FR), ITALY
|
5 |
+
ABSTRACT
|
6 |
+
In this paper, we investigate some properties related to a multi-index special func-
|
7 |
+
tion W(¯α,¯ν) that arose from an eigenvalue problem for a multi-order fractional hyper-
|
8 |
+
Bessel operator, involving Caputo fractional derivatives. We show that for particular
|
9 |
+
values of the parameters involved in this special function W(¯α,¯ν), this leads to the
|
10 |
+
hyper-Bessel function of Delerue. The Laplace transform of the W(¯α,¯ν) is discussed
|
11 |
+
obtaining, in particular cases, the well-known functional relation between hyper-
|
12 |
+
Bessel function and multi-index Mittag-Leffler function, or, quite simply, between
|
13 |
+
classical Wright and Mittag-Leffler functions. Moreover, it is shown that the multi-
|
14 |
+
index special function satisfies the recurrence relation involving fractional deriva-
|
15 |
+
tives. In a particular case, we derive, to the best of our knowledge, a new differential
|
16 |
+
recurrence relation for the Mittag-Leffler function. We also provide derivatives of the
|
17 |
+
3-parameters function Wα,β,ν with respect to parameters, leading to infinite power
|
18 |
+
series with coefficients being quotients of digamma and gamma functions.
|
19 |
+
KEYWORDS
|
20 |
+
Special Function of Fractional Calculus; hyper-Bessel type operators; Wright and
|
21 |
+
Mittag-Leffler functions; Caputo derivatives; recurrence relations of special
|
22 |
+
functions; hyper-Bessel functions
|
23 |
+
1. Introduction
|
24 |
+
Nowadays, the interest in fractional differential equations is increasing because these
|
25 |
+
are becoming more adequate than those of integer order to investigate various problems
|
26 |
+
in different fields of physics, engineering and economics [1], [2], [3]. They have indeed
|
27 |
+
the fundamental characteristic to describe memory and heredity properties of many
|
28 |
+
materials. Some of them have been introduced within the framework of partition theory
|
29 |
+
in solving number theory problems. This is the case of the Wright function, introduced
|
30 |
+
by E. M. Wright in his articles on the asymptotic partition formulae[4], [5], [6] and [7],
|
31 |
+
[8], [9].
|
32 |
+
Recently, many authors are dealing with multi-indices special functions (SF) of
|
33 |
+
fractional calculus (FC) appearing in solution of differential equations and systems of
|
34 |
+
fractional multi-order type (e.g. hyper-Bessel and quasi-Bessel operators) [10], [11].
|
35 |
+
Among them, the most general functions we just want to refer to are the Fox H-
|
36 |
+
function and the Wright generalized hypergeometric function [12]. Indeed, one gets the
|
37 |
+
classical SF setting their parameters with integer values.
|
38 |
+
In the previous paper [13] the author investigated a hyper-Bessel-type operator in-
|
39 |
+
volving Caputo derivatives. Solving the eigenvalue problem associated with this frac-
|
40 |
+
tional operator, the author introduced a function, written in series expansion, that in
|
41 |
+
specific cases is possible to refer to the well-known special function of the fractional
|
42 |
+
CONTACT R. Droghei. Email: [email protected]
|
43 |
+
|
44 |
+
calculus. According to the information we have, this special function was not studied
|
45 |
+
by now. But as seen, it is reduced in particular cases to some known special func-
|
46 |
+
tions, which on their side are cases of the Bessel and hyper-Bessel functions and more
|
47 |
+
generally, of the multi-index Mittag-Leffer functions.
|
48 |
+
This multi-index special function, called in the previous paper m-p generalized
|
49 |
+
Wright function, plays an important role in nonlinear fractional differential equations,
|
50 |
+
and in their isochronous ω-modified version[13],[14]. It is also a natural generalization
|
51 |
+
of the applications of the Laguerre derivatives and the Laguerre-type exponentials [15],
|
52 |
+
[16], [17], [18]. In this survey article, firstly, we want to examine several properties as-
|
53 |
+
sociated with the multi-index special function investigated in [13].
|
54 |
+
The outline of this work is as follows. In Section 2, we recall the definition of the
|
55 |
+
multi-index function W(¯α,¯ν) introduced in [13] and its connection with the Hyper -
|
56 |
+
Bessel function. Moreover, the simpler function in the only 3-parameters case Wα,β,ν
|
57 |
+
is described. In Section 3 we computed the Laplace Transform of the function W(¯α,¯ν)
|
58 |
+
and, using it, we derived some new functional relations between this function and
|
59 |
+
other known special functions. The main result of this work is described in Section 4.
|
60 |
+
Here we showed the recurrence relations of the function Wα,β,ν obtaining, we suppose,
|
61 |
+
new differential recurrence relation for the Mittag-Leffler function. In Section 5 we
|
62 |
+
investigated the derivatives of Wα,β,ν with respect to the parameters.
|
63 |
+
2. Multi-index special function W(¯α,¯ν)(z)
|
64 |
+
The multi-index special function W(¯α,¯ν)(z) investigated in [13], is defined by series
|
65 |
+
representation as a function of the complex variable z and parameters αj, j = 1, ..., n+
|
66 |
+
1 and νj, j = 1, ..., n:
|
67 |
+
W(¯α,¯ν)(z) =
|
68 |
+
∞
|
69 |
+
�
|
70 |
+
k=0
|
71 |
+
k
|
72 |
+
�
|
73 |
+
i=1
|
74 |
+
n
|
75 |
+
�
|
76 |
+
j=1
|
77 |
+
Γ(αn+1i + aj)
|
78 |
+
Γ(αn+1i + bj) ·
|
79 |
+
zk
|
80 |
+
Γ(αn+1k + bn+1)
|
81 |
+
.
|
82 |
+
(1)
|
83 |
+
where
|
84 |
+
aj = 1 +
|
85 |
+
j
|
86 |
+
�
|
87 |
+
m=1
|
88 |
+
(νm−1 − αm) ;
|
89 |
+
bj = 1 +
|
90 |
+
j
|
91 |
+
�
|
92 |
+
m=1
|
93 |
+
(νm−1 − αm−1) .
|
94 |
+
(2)
|
95 |
+
and the relation aj = bj − αj with j = 1..n + 1.
|
96 |
+
The W(¯α,¯ν)(z) is an entire function for αj > 0, j = 1..n + 1; νj ∈ C, j = 1..n and
|
97 |
+
α0 = ν0 = 0.
|
98 |
+
Theorem 2.1. The multi-index special function W(¯α,¯ν)(λxαn+1) with λ ∈ R, x ≥
|
99 |
+
0, αj > 0, j = 1, ..., n + 1 and νj > 0, j = 1..n satisfy the following fractional differ-
|
100 |
+
ential equation involving fractional hyper-Bessel-type operator.[see [13] for the proof]
|
101 |
+
2
|
102 |
+
|
103 |
+
ˆD(¯α,¯ν)
|
104 |
+
nL
|
105 |
+
W(¯α,¯ν)(λxαn+1) = λW(¯α,¯ν)(λxαn+1);
|
106 |
+
(3)
|
107 |
+
where
|
108 |
+
ˆD(¯α,¯ν)
|
109 |
+
nL
|
110 |
+
= x
|
111 |
+
�n
|
112 |
+
s=1(αs−νs) dαn+1
|
113 |
+
dxαn+1 xνn dαn
|
114 |
+
dxαn xνn−1 dαn−1
|
115 |
+
dxαn−1 · · · xν1 dα1
|
116 |
+
dxα1 .
|
117 |
+
(4)
|
118 |
+
2.1. Hyper-Bessel function as a particular case
|
119 |
+
The hyper-Bessel function of Delerue (or a multi-index analogue of Bessel function) of
|
120 |
+
order d with indices µ1, ..., µd, introduced in 1953 by Delereu [19] as a generalization
|
121 |
+
of the Bessel function of the first type (see also [20]) is defined by
|
122 |
+
Jµd(z) = z−
|
123 |
+
µ1+...+µd
|
124 |
+
d+1
|
125 |
+
Jµd((d + 1)
|
126 |
+
d+1√z) =
|
127 |
+
�
|
128 |
+
k≥0
|
129 |
+
(−1)kzk
|
130 |
+
k! �d
|
131 |
+
j=1 Γ(k + µj + 1)
|
132 |
+
.
|
133 |
+
(5)
|
134 |
+
Setting αj = 1, j = 1, ..., n + 1 in the multi-index special function W(¯α,¯ν), we obtain
|
135 |
+
the relation
|
136 |
+
W(¯1,¯ν)(z) =
|
137 |
+
n
|
138 |
+
�
|
139 |
+
j=1
|
140 |
+
Γ(1 + aj)Jan(−z), .
|
141 |
+
(6)
|
142 |
+
with aj defined in (2). It is not surprising because the hyper-Bessel function satisfies the
|
143 |
+
so-called hyper-Bessel differential operators of higher order, introduced by Dimovski
|
144 |
+
and Kiryakova [21], [22], and obtained from (3) setting all parameters αj = 1 with
|
145 |
+
j = 1..n + 1, i.e. derivatives of integer order.
|
146 |
+
2.2. 3-parameters function Wα,β,ν
|
147 |
+
In this section we analyse the simpler case of (1) with n = 1, α2 = β, α1 = α and
|
148 |
+
ν1 = ν:
|
149 |
+
Wα,β,ν(xβ) =
|
150 |
+
∞
|
151 |
+
�
|
152 |
+
k=0
|
153 |
+
k
|
154 |
+
�
|
155 |
+
i=1
|
156 |
+
Γ(βi + 1 − α)
|
157 |
+
Γ(βi + 1)
|
158 |
+
xβk
|
159 |
+
Γ(βk + 1 − α + ν).
|
160 |
+
(7)
|
161 |
+
Proposition 2.2. Obviously, the above function (7) satisfies the following fractional
|
162 |
+
differential equation
|
163 |
+
ˆDα,β,νf(x) = xα−ν dβ
|
164 |
+
dxβ
|
165 |
+
�
|
166 |
+
xν dα
|
167 |
+
dxα f(x)
|
168 |
+
�
|
169 |
+
= f(x),
|
170 |
+
(8)
|
171 |
+
involving two fractional derivatives in the sense of Caputo of orders α, β ∈ (0, 1).
|
172 |
+
Where
|
173 |
+
f(x) = Wα,β,ν(xβ)
|
174 |
+
3
|
175 |
+
|
176 |
+
.
|
177 |
+
Remark 1. The Weinstein and Bessel-Clifford operators Setting α = β = 1
|
178 |
+
and ν = k, k ≥ 1 the operator ˆDα,β,ν becomes
|
179 |
+
ˆD1,1,k = xBk = x
|
180 |
+
� d2
|
181 |
+
dx2 + k
|
182 |
+
x
|
183 |
+
d
|
184 |
+
dx
|
185 |
+
�
|
186 |
+
= x−k+1 d
|
187 |
+
dxxk d
|
188 |
+
dx
|
189 |
+
where Bk is the well known Weinstein operator (or Bessel operator) from the so-
|
190 |
+
called Darboux-Weinstein relation [23], [24]. In [25] Hayek studied in details exactly
|
191 |
+
the operator ˆD1,1,k+1 calling its solution as Bessel-Clifford function of second order
|
192 |
+
Cν(x) = x− ν−1
|
193 |
+
2 Iν−1(2√x) =
|
194 |
+
1
|
195 |
+
Γ(ν+1) 0F1(ν + 1; −x), where Iν(x) is the modified Bessel
|
196 |
+
function of the first kind. Later, in [26] he introduced the two indices Bessel-Clifford
|
197 |
+
functions of the third order modifying the hyper-Bessel function J(2)
|
198 |
+
µ,ν(x):
|
199 |
+
Cµ,ν(x) = x− µ+ν
|
200 |
+
3 J(2)
|
201 |
+
µ,ν(3
|
202 |
+
3√x) =
|
203 |
+
1
|
204 |
+
Γ(µ + 1)Γ(ν + 1) 0
|
205 |
+
F2(µ + 1, ν + 1; −x);
|
206 |
+
(9)
|
207 |
+
satisfying the third-order Bessel-Clifford differential equation related to the operator
|
208 |
+
ˆBµ,ν = x−ν d
|
209 |
+
dxxµ−ν+1 d
|
210 |
+
dxxν+1 d
|
211 |
+
dx.
|
212 |
+
(10)
|
213 |
+
As it is simple to see, the two-parameter operator ˆBµ,ν is equivalent to the operator
|
214 |
+
(4), ˆD({α1,α2,α3},{ν1,ν2})
|
215 |
+
2L
|
216 |
+
with α1 = α2 = α3 = 1; ν1 = ν + 1 and ν2 = µ − ν + 1; and
|
217 |
+
then the Bessel-Clifford of the third order function (9) is equal to
|
218 |
+
Cµ,ν(x) =
|
219 |
+
1
|
220 |
+
Γ(ν + 1)W({1,1,1},{ν+1,µ−ν+1})(x).
|
221 |
+
These differential operators appear very often in the PDEs of mathematical physics
|
222 |
+
(especially in fluid mechanics, elasticity, and transonic flow), for instance in the gen-
|
223 |
+
eralized Bessel heat equation and other equations of generalized axially symmetric
|
224 |
+
potentials (GASP) theory [27].
|
225 |
+
2.2.1. Particular cases of Wα,β,ν
|
226 |
+
For α = 1, β = λ and ν = µ the function corresponds to the Classical Wright function
|
227 |
+
W1,λ,µ(xλ) = Wλ,µ
|
228 |
+
�xλ
|
229 |
+
λ
|
230 |
+
�
|
231 |
+
=
|
232 |
+
∞
|
233 |
+
�
|
234 |
+
k=0
|
235 |
+
�
|
236 |
+
xλ
|
237 |
+
λ
|
238 |
+
�k
|
239 |
+
k!Γ(λk + µ).
|
240 |
+
(11)
|
241 |
+
For α = 0, β → α, ν → β − 1 the function corresponds to the generalized Mittag-
|
242 |
+
Leffler function
|
243 |
+
W0,α,β−1(z) = Eα,β(z) =
|
244 |
+
∞
|
245 |
+
�
|
246 |
+
k=0
|
247 |
+
zk
|
248 |
+
Γ(αk + β).
|
249 |
+
(12)
|
250 |
+
4
|
251 |
+
|
252 |
+
In case of α = β = ν holds the relation
|
253 |
+
Wν,ν,ν(xν) = E1;ν,1(xν)
|
254 |
+
where Eα;ν,γ(x) = �∞
|
255 |
+
k=0
|
256 |
+
xk
|
257 |
+
Γα+1(νk+γ) is the α-Mittag-Leffler function.
|
258 |
+
In Addition, we present some examples of the 3-parameters function Wα,β,ν in the
|
259 |
+
following table, and in Figure 1 we represent the behavior of this function for different
|
260 |
+
values of the parameters α, β, ν;
|
261 |
+
Integer order derivatives
|
262 |
+
Fractional order derivatives
|
263 |
+
W0,1,0(x) = ex
|
264 |
+
W 1
|
265 |
+
2 , 1
|
266 |
+
2, 1
|
267 |
+
2 (√x) = +I0(2√x) + L0(2√x)
|
268 |
+
W0,1,n(x) = ex
|
269 |
+
xn − �n−1
|
270 |
+
i=0
|
271 |
+
xi−n
|
272 |
+
i!
|
273 |
+
with n ∈ N
|
274 |
+
W 1
|
275 |
+
2, 1
|
276 |
+
2, 3
|
277 |
+
2 (√x) = +I1(2√x) + L1(√x)
|
278 |
+
W1,1,0(x) = √xI1(2√x)
|
279 |
+
W 1
|
280 |
+
2, 1
|
281 |
+
2,1(√x) = sinh(2√x)+cosh(2√x)−1
|
282 |
+
√πx
|
283 |
+
W1,1,ν(x) = x− ν−1
|
284 |
+
2 Iν−1(2√x)
|
285 |
+
W 1
|
286 |
+
2, 1
|
287 |
+
2,2(√x) = (2√x−1)e2√x−2x+1
|
288 |
+
2x√πx
|
289 |
+
where Iα(x) = i−αJα(ix) = �∞
|
290 |
+
m=0
|
291 |
+
1
|
292 |
+
m!Γ(m+α+1)(x
|
293 |
+
2)2m+α is the modified Bessel func-
|
294 |
+
tion of the first kind and Lα(x) =
|
295 |
+
� x
|
296 |
+
2
|
297 |
+
�ν+1 �∞
|
298 |
+
m=0
|
299 |
+
( x
|
300 |
+
2)
|
301 |
+
2m
|
302 |
+
Γ(m+ 3
|
303 |
+
2)Γ(m+ν+ 3
|
304 |
+
2 ) is the modified Struve
|
305 |
+
function.
|
306 |
+
(a)
|
307 |
+
Plot
|
308 |
+
of
|
309 |
+
the
|
310 |
+
function
|
311 |
+
W0,1,ν(x)
|
312 |
+
for
|
313 |
+
ν
|
314 |
+
=
|
315 |
+
0; 0.25; 0.5; 0.75; 1; 1.25; 1.5; 1.75; 2.
|
316 |
+
(b)
|
317 |
+
Plot
|
318 |
+
of
|
319 |
+
the
|
320 |
+
function
|
321 |
+
W1,1,ν(x)
|
322 |
+
for
|
323 |
+
ν
|
324 |
+
=
|
325 |
+
0; 0.25; 0.5; 0.75; 1; 1.25; 1.5; 1.75; 2.
|
326 |
+
(c)
|
327 |
+
Plot
|
328 |
+
of
|
329 |
+
the
|
330 |
+
function
|
331 |
+
W 1
|
332 |
+
2 , 1
|
333 |
+
2 ,ν(√x)
|
334 |
+
for
|
335 |
+
ν
|
336 |
+
=
|
337 |
+
0; 0.25; 0.5; 0.75; 1; 1.25; 1.5; 1.75; 2.
|
338 |
+
(d)
|
339 |
+
Plot
|
340 |
+
of
|
341 |
+
the
|
342 |
+
function
|
343 |
+
W 1
|
344 |
+
2 ,1,ν(x)
|
345 |
+
for
|
346 |
+
ν
|
347 |
+
=
|
348 |
+
0; 0.25; 0.5; 0.75; 1; 1.25; 1.5; 1.75; 2.
|
349 |
+
Figure 1.
|
350 |
+
3. Laplace Transform
|
351 |
+
Let us compute the Laplace transform of the W(¯α,¯ν)(λx)
|
352 |
+
5
|
353 |
+
|
354 |
+
L
|
355 |
+
�
|
356 |
+
W(¯α,¯ν)(λxαn+1), s
|
357 |
+
�
|
358 |
+
=
|
359 |
+
� ∞
|
360 |
+
0
|
361 |
+
e−sx
|
362 |
+
∞
|
363 |
+
�
|
364 |
+
k=0
|
365 |
+
k
|
366 |
+
�
|
367 |
+
i=1
|
368 |
+
n
|
369 |
+
�
|
370 |
+
j=1
|
371 |
+
Γ(αn+1i + aj)
|
372 |
+
Γ(αn+1i + bj)
|
373 |
+
λkxαn+1k
|
374 |
+
Γ(αn+1k + bn+1)dx
|
375 |
+
=
|
376 |
+
∞
|
377 |
+
�
|
378 |
+
k=0
|
379 |
+
k
|
380 |
+
�
|
381 |
+
i=1
|
382 |
+
n
|
383 |
+
�
|
384 |
+
j=1
|
385 |
+
λkΓ(αn+1i + aj)
|
386 |
+
Γ(αn+1i + bj)Γ(αn+1k + bn+1)
|
387 |
+
� ∞
|
388 |
+
0
|
389 |
+
e−sxxαn+1kdx
|
390 |
+
=
|
391 |
+
1
|
392 |
+
s
|
393 |
+
∞
|
394 |
+
�
|
395 |
+
k=0
|
396 |
+
k
|
397 |
+
�
|
398 |
+
i=1
|
399 |
+
n
|
400 |
+
�
|
401 |
+
j=1
|
402 |
+
Γ(αn+1i + aj)Γ(αn+1k + 1)
|
403 |
+
Γ(αn+1i + bj)Γ(αn+1k + bn+1)
|
404 |
+
�
|
405 |
+
λ
|
406 |
+
sαn+1
|
407 |
+
�k
|
408 |
+
. (13)
|
409 |
+
th analytical properties of the W(¯α,¯ν) provides that the resulting Laplace transform
|
410 |
+
turns out to be an analytic function, vanishing at infinity and exhibiting an essential
|
411 |
+
singularity at s = 0.
|
412 |
+
Remark 2. In case we set αj = 1, j = 1, ..., n + 1, the multi-index special functions
|
413 |
+
W(¯α,¯ν) will be related to the hyper-Bessel functions as is showed in (6). After some
|
414 |
+
calculations, we obtain the following functional relation between the Laplace transform
|
415 |
+
of the Hyper-Bessel function and the multi-index Mittag-Leffler function. A more
|
416 |
+
general relation between these two functions can be found in the article of Kiryakova
|
417 |
+
and Luchko [28].
|
418 |
+
L
|
419 |
+
�
|
420 |
+
W(¯1,¯ν)(λx), s
|
421 |
+
�
|
422 |
+
=
|
423 |
+
n
|
424 |
+
�
|
425 |
+
j=1
|
426 |
+
Γ(1 + aj)1
|
427 |
+
s
|
428 |
+
∞
|
429 |
+
�
|
430 |
+
k=0
|
431 |
+
1
|
432 |
+
�n
|
433 |
+
j=1 Γ(k + aj+1 + 1)
|
434 |
+
�λ
|
435 |
+
s
|
436 |
+
�k
|
437 |
+
=
|
438 |
+
n
|
439 |
+
�
|
440 |
+
j=1
|
441 |
+
Γ(1 + aj)1
|
442 |
+
sE(n)
|
443 |
+
(1,1,...,1),(aj+1+1)
|
444 |
+
�λ
|
445 |
+
s
|
446 |
+
�
|
447 |
+
.
|
448 |
+
(14)
|
449 |
+
Remark 3. The Laplace transform of Wα,β,ν(x) can be obtained as a special case of
|
450 |
+
the (13) as follows:
|
451 |
+
L (Wα,β,ν(λxρ), s) = 1
|
452 |
+
s
|
453 |
+
∞
|
454 |
+
�
|
455 |
+
k=0
|
456 |
+
k
|
457 |
+
�
|
458 |
+
i=1
|
459 |
+
βΓ(βi + 1 − α)
|
460 |
+
Γ(βi + 1)
|
461 |
+
Γ(ρk + 1)
|
462 |
+
Γ(βk + 1 − α + ν)
|
463 |
+
� λ
|
464 |
+
sρ
|
465 |
+
�k
|
466 |
+
;
|
467 |
+
(15)
|
468 |
+
and, in the case of the parameter α = 1, we obtain the well-known Laplace transform
|
469 |
+
of the Wright function which can be expressed in terms of the two-parameter Mittag-
|
470 |
+
Leffler function.
|
471 |
+
L (W1,β,ν(λx), s) = L (Wβ,ν(λx), s) = 1
|
472 |
+
sEβ,ν
|
473 |
+
� λ
|
474 |
+
β s
|
475 |
+
�
|
476 |
+
.
|
477 |
+
(16)
|
478 |
+
•
|
479 |
+
6
|
480 |
+
|
481 |
+
4. Recurrence relations of Wα,β,ν
|
482 |
+
A recurrence relation is an equation that recursively defines a sequence of values; given
|
483 |
+
one or more initial terms, each further term of the sequence is defined as a function of
|
484 |
+
the previous terms. Differential recurrence relation of the generalized Wright function
|
485 |
+
can be used in the study of fractional differential equations, and it is obtained directly
|
486 |
+
from series representation.
|
487 |
+
xα+β dβ
|
488 |
+
dxβ
|
489 |
+
�
|
490 |
+
xν−α+βWα,β,ν+β(xβ)
|
491 |
+
�
|
492 |
+
− 2xν+βWα,β,ν(xβ) + xα+ν dα
|
493 |
+
dxα Wα,β,ν−β(xβ) = 0.
|
494 |
+
(17)
|
495 |
+
Remark 4. In case α = β = 1; ν = n + 1 with n ∈ N0 and
|
496 |
+
d
|
497 |
+
dxW1,1,n(x) = W1,1,n+1(x) = Cn(x);
|
498 |
+
we obtain the well known three-term recurrence relation for the Bessel-Clifford func-
|
499 |
+
tion Cn(x)
|
500 |
+
xCn+2(x) + (n + 1)Cn+1(x) = Cn(x).
|
501 |
+
(18)
|
502 |
+
Remark 5. Recurrence fractional derivatives relation for the Wright and
|
503 |
+
Mittag-Leffler functions. From the relation (11) between the generalized Wright
|
504 |
+
function and the classical Wright function the relation (17) becomes
|
505 |
+
dλ
|
506 |
+
dzλ
|
507 |
+
�
|
508 |
+
zλ+ν−1Wλ,λ+ν
|
509 |
+
�zλ
|
510 |
+
λ
|
511 |
+
��
|
512 |
+
= zν−1Wλ,ν
|
513 |
+
�zλ
|
514 |
+
λ
|
515 |
+
�
|
516 |
+
;
|
517 |
+
(19)
|
518 |
+
using the formula
|
519 |
+
d
|
520 |
+
dz Wλ,ν−λ
|
521 |
+
�zλ
|
522 |
+
λ
|
523 |
+
�
|
524 |
+
= zλ−1Wλ,ν
|
525 |
+
�zλ
|
526 |
+
λ
|
527 |
+
�
|
528 |
+
.
|
529 |
+
(20)
|
530 |
+
In case α = 0, and β → α, ν → β − 1 the generalized Wright function is related to
|
531 |
+
the Mittag-Leffler function by the following relation:
|
532 |
+
W0,α,β−1(z) = Eα,β(z).
|
533 |
+
(21)
|
534 |
+
In particular, from the recurrence relation (17), we obtain the new recurrence relation
|
535 |
+
involving fractional derivatives for M-L functions.
|
536 |
+
zα dα
|
537 |
+
dzα
|
538 |
+
�
|
539 |
+
zα+β−1Eα,α+β(zα)
|
540 |
+
�
|
541 |
+
− 2zα+β−1Eα,β(zα) + zβ−1Eα,β−α(zα) = 0.
|
542 |
+
(22)
|
543 |
+
7
|
544 |
+
|
545 |
+
5. Partial derivatives of Wα,β,ν with respect to the parameters
|
546 |
+
In this section, taking inspiration from the works of Apelblat and Mainardi [29], [30] we
|
547 |
+
analyse the derivatives of Wα,β,ν respect the three parameters included in the function.
|
548 |
+
We can treat parameters as variables and hence the derivatives with respect to them
|
549 |
+
can be obtained. These derivatives lead to infinite power series involving digamma (ψ)
|
550 |
+
and gamma functions.
|
551 |
+
∂
|
552 |
+
∂ν Wα,β,ν(z) = −
|
553 |
+
∞
|
554 |
+
�
|
555 |
+
k=0
|
556 |
+
k
|
557 |
+
�
|
558 |
+
i=1
|
559 |
+
Γ(βi + 1 − α)
|
560 |
+
Γ(βi + 1)
|
561 |
+
ψ(βk + 1 − α + ν)
|
562 |
+
Γ(βk + 1 − α + ν)zk;
|
563 |
+
(23)
|
564 |
+
∂
|
565 |
+
∂β Wα,β,ν(z) =
|
566 |
+
∞
|
567 |
+
�
|
568 |
+
k=0
|
569 |
+
k
|
570 |
+
�
|
571 |
+
i=1
|
572 |
+
Γ(βi + 1 − α)
|
573 |
+
Γ(βi + 1)
|
574 |
+
zk
|
575 |
+
Γ(βk + 1 − α + ν) ·
|
576 |
+
·
|
577 |
+
|
578 |
+
|
579 |
+
k
|
580 |
+
�
|
581 |
+
j=1
|
582 |
+
j [ψ(βj + 1 − α) − ψ(βj + 1)] − kψ(βk + 1 − α + ν)
|
583 |
+
|
584 |
+
;
|
585 |
+
(24)
|
586 |
+
∂
|
587 |
+
∂αWα,β,ν(z) =
|
588 |
+
∞
|
589 |
+
�
|
590 |
+
k=0
|
591 |
+
k
|
592 |
+
�
|
593 |
+
i=1
|
594 |
+
Γ(βi + 1 − α)
|
595 |
+
Γ(βi + 1)
|
596 |
+
zk
|
597 |
+
Γ(βk + 1 − α + ν)
|
598 |
+
|
599 |
+
−
|
600 |
+
k
|
601 |
+
�
|
602 |
+
j=1
|
603 |
+
ψ(βj + 1 − α) + ψ(βk + 1 − α + ν)
|
604 |
+
|
605 |
+
;
|
606 |
+
(25)
|
607 |
+
where ψ(z) = Γ′(z)
|
608 |
+
Γ(z) denotes the digamma function.
|
609 |
+
Remark 6. In the case α = 1 and considering the property of the digamma function
|
610 |
+
ψ(z+1) = ψ(z)+ 1
|
611 |
+
z; we obtain the formula (5) and (6) of the Apelblat-Mainardi article
|
612 |
+
([30]) for the classical Wright function
|
613 |
+
∂
|
614 |
+
∂β W1,β,ν(z) =
|
615 |
+
� ∂
|
616 |
+
∂β Wβ,ν
|
617 |
+
�
|
618 |
+
(βz) = −
|
619 |
+
∞
|
620 |
+
�
|
621 |
+
k=0
|
622 |
+
� ψ(βk + ν)
|
623 |
+
k!Γ(βk + ν)
|
624 |
+
�
|
625 |
+
kzk;
|
626 |
+
∂
|
627 |
+
∂ν W1,β,ν(z) =
|
628 |
+
� ∂
|
629 |
+
∂ν Wβ,ν
|
630 |
+
�
|
631 |
+
(βz) = −
|
632 |
+
∞
|
633 |
+
�
|
634 |
+
k=0
|
635 |
+
� ψ(βk + ν)
|
636 |
+
k!Γ(βk + ν)
|
637 |
+
�
|
638 |
+
zk.
|
639 |
+
By setting the parameters, α = 0, β → α and ν → β − 1, we obtain the formulas
|
640 |
+
(95) and (96) of the Apelblat paper ([29])
|
641 |
+
∂
|
642 |
+
∂αW0,α,β−1(z) = ∂
|
643 |
+
∂αEα,β(z) = −
|
644 |
+
∞
|
645 |
+
�
|
646 |
+
k=0
|
647 |
+
�kψ(αk + β)
|
648 |
+
Γ(αk + β)
|
649 |
+
�
|
650 |
+
zk;
|
651 |
+
∂
|
652 |
+
∂β W0,α,β−1(z) = ∂
|
653 |
+
∂β Eα,β(z) = −
|
654 |
+
∞
|
655 |
+
�
|
656 |
+
k=0
|
657 |
+
�ψ(αk + β)
|
658 |
+
Γ(αk + β)
|
659 |
+
�
|
660 |
+
zk.
|
661 |
+
8
|
662 |
+
|
663 |
+
6. Conclusion
|
664 |
+
The aim of this paper is to investigate several properties related to the multi-index
|
665 |
+
special function W(¯α,¯ν) and its 3-parameters version. An important result was finding
|
666 |
+
the connection between the W(¯α,¯ν) and the hyper-Bessel function of Delerue. Here we
|
667 |
+
analyzed the Laplace transform, recurrence relation and derivatives of the function
|
668 |
+
with respect to the parameters. In particular, we found new findings that, for special
|
669 |
+
values of the parameters, retrieve some well-known relations. Indeed, a simple func-
|
670 |
+
tional relation is obtained between the Laplace transform of the hyper-Bessel function
|
671 |
+
and the multi-index Mittag-Leffler.
|
672 |
+
Disclosure statement
|
673 |
+
No potential conflict of interest was reported by the author.
|
674 |
+
Acknowledgements
|
675 |
+
The author is grateful to Dr Roberto Garra for providing essential information, help
|
676 |
+
and advice.
|
677 |
+
References
|
678 |
+
[1] Podlubny I. Fractional Differential Equations. Academic Press, San Diego; 1999.
|
679 |
+
[2] Mainardi F. Fractional calculus and waves in linear viscoelasticity: an introduction to
|
680 |
+
mathematical models. World Scientific; 2010.
|
681 |
+
[3] Gorenflo R, Kilbas AA, Mainardi F, Rogosin SV. Mittag-Leffler functions, related topics
|
682 |
+
and applications (p. 540). New York, NY, USA: Springer; 2020.
|
683 |
+
[4] Wright E. M. Asymptotic partition formulae: I. plane partitions. The Quarterly Journal of
|
684 |
+
Mathematics, Volume os-2, Issue 1; 1931; p. 177–189. https://doi.org/10.1093/qmath/os-
|
685 |
+
2.1.177
|
686 |
+
[5] Wright E. M. Asymptotic partition formulae:(II) weighted partitions. Proceedings of the
|
687 |
+
London Mathematical Society, 2(1); 1934; p. 117-141. https://doi.org/10.1112/plms/s2-
|
688 |
+
36.1.117
|
689 |
+
[6] Wright E. M. Asymptotic partition formulae. III. Partitions intok-th powers. Acta Math-
|
690 |
+
ematica, 63(1); 1934; p.143-191. https://doi.org/10.1007/BF02547353
|
691 |
+
[7] Wright EM. On the coefficients of power series having exponential singularities. Journal
|
692 |
+
London Math. Soc. 8; 1933; p. 71–79.
|
693 |
+
[8] Wright EM. The asymptotic expansion of the generalized Bessel function. Proc. London
|
694 |
+
Math. Soc. (Ser. II) 38; 1935; p. 257–270.
|
695 |
+
[9] Wright EM. The asymptotic expansion of the generalized hypergeometric function. Jour-
|
696 |
+
nal London Math. Soc. 10; 1935; p. 287–293.
|
697 |
+
[10] Garra R, Polito F. On some operators involving Hadamard derivatives. Integral Trans-
|
698 |
+
forms and Special Functions; 2013. https://doi.org/10.1080/10652469.2012.756875.
|
699 |
+
[11] Dubovski PB, Slepoi JA. Construction and analysis of series solutions for frac-
|
700 |
+
tional
|
701 |
+
quasi-Bessel
|
702 |
+
equations.
|
703 |
+
Fract
|
704 |
+
Calc
|
705 |
+
Appl
|
706 |
+
Anal
|
707 |
+
25;
|
708 |
+
2022;
|
709 |
+
p.1229–1249.
|
710 |
+
https://doi.org/10.1007/s13540-022-00045-z
|
711 |
+
[12] Kiryakova V. Fractional calculus of some ”new” but not new special function: K-, multi-
|
712 |
+
index-, and S-analogues. AIP Conference Proceedings. 2172, 050008; 2019.
|
713 |
+
9
|
714 |
+
|
715 |
+
[13] Droghei R. On a Solution of a Fractional Hyper-Bessel Differential Equation by Means
|
716 |
+
of a Multi-Index Special Function. Fract Calc Appl Anal 24; 2021; p. 1559–1570.
|
717 |
+
https://doi.org/10.1515/fca-2021-0065
|
718 |
+
[14] Droghei R, Garra R. Isochronous fractional PDEs. Lecture Notes of TICMI 21; 2020; p.
|
719 |
+
43–51.
|
720 |
+
[15] Dattoli G, Ricci PE. Laguerre-type exponentials, and the relevant-circular and-hyperbolic
|
721 |
+
functions. Georgian Mathematical Journal, 10(3); 2003; p. 481-494.
|
722 |
+
[16] Bretti G, Ricci PE. Laguerre-type special functions and population dynamics. Applied
|
723 |
+
mathematics and computation, 187(1); 2007; p. 89-100.
|
724 |
+
[17] Ricci PE. Laguerre-Type Exponentials, Laguerre Derivatives and Applications. A Survey.
|
725 |
+
Mathematics 8, 2054; 2020.
|
726 |
+
[18] Garra R, Tomovski Z. Exact results on some nonlinear Laguerre-type diffusion equations.
|
727 |
+
Mathematical Modelling and Analysis, 26(1); 2021; p. 72-81.
|
728 |
+
[19] Delerue P., Sur le calcul symbolique `a n variables et fonctions hyperbesseliennes (II). Ann.
|
729 |
+
Soc. Sci. Brux. 3; 1953; p. 229–274.
|
730 |
+
[20] Kiryakova V. Generalized Fractional Calculus and Applications. Longman – J. Wiley,
|
731 |
+
Harlow, N. York; 1994.
|
732 |
+
[21] Dimowski I, Kiryakova V. Generalized Poisson transmutations and corresponding repre-
|
733 |
+
sentations of hyper-Bessel functions. C. R. Acad. Bulg. Sci. 39, N. 10; 1986; p. 20-32.
|
734 |
+
[22] Dimowski I, Kiryakova V. Generalized Poisson representations of hyper-geometric func-
|
735 |
+
tions pFq , p < q using fractional integrals. In: Proc.16th Spring Conf Union Bulg. Math.
|
736 |
+
Sofia; 1987; p. 205-212.
|
737 |
+
[23] Weinstein A. The generalized radiation problem and the Euler-Poisson-Darboux equation.
|
738 |
+
Summa Brazil Math. 3; 1955; p. 125-147.
|
739 |
+
[24] Kiryakova V, Hernandez-Suarez V. Bessel-Clifford third order differential operator and
|
740 |
+
corresponding Laplace type integral transform. Dissertationes Mathematicae 340; 1995);
|
741 |
+
p. 143-161.
|
742 |
+
[25] Hayek N. Estudio de la ecuaci`on diferencial xy′′ + (ν + 1)y′ + y = 0 y de sus aplicaciones.
|
743 |
+
Collect. Math. 18, No 1-2; 1967; p. 57-174.
|
744 |
+
[26] Hayek N. Funciones de Bessel-Cliff`ord de tercer orden. Actas XII Jornadas Luso-Esp. de
|
745 |
+
Mat. (Braga); 1987; p. 346-351.
|
746 |
+
[27] Weinstein A. Generalized axially symmetric potential theory. Bull.AMS 59, 20; 1955.
|
747 |
+
[28] Kiryakova V, Luchko Yu. The Multiindex MittagLeffler Functions and Their Applications
|
748 |
+
for Solving Fractional Order Problems in Applied Analysis. AIP Conf. Proc. 1301, 597;
|
749 |
+
2010; doi: 10.1063/1.3526661.
|
750 |
+
[29] Apelblat A. Differentiation of the Mittag-Leffler functions with respect to parameters in
|
751 |
+
the Laplace transform approach. Mathematics, 8(5), 657; 2020.
|
752 |
+
[30] Apelblat A, Mainardi F. Differentiation of the Wright functions with respect to parameters
|
753 |
+
and other results. arXiv e-prints, arXiv-2009; 2020.
|
754 |
+
Appendix A. Fractional calculus
|
755 |
+
In order to make the papar self-contained, we briefly recall main definitions and prop-
|
756 |
+
erties of fractional calculus operators.
|
757 |
+
Let γ ∈ R+. The Riemann-Liouville fractional integral is defined by
|
758 |
+
Jγ
|
759 |
+
x f(x) =
|
760 |
+
1
|
761 |
+
Γ(γ)
|
762 |
+
� x
|
763 |
+
0
|
764 |
+
(x − x′)γ−1f(x′)dx′,
|
765 |
+
(A1)
|
766 |
+
10
|
767 |
+
|
768 |
+
where
|
769 |
+
Γ(γ) =
|
770 |
+
� +∞
|
771 |
+
0
|
772 |
+
xγ−1e−xdx,
|
773 |
+
is the Euler Gamma function.
|
774 |
+
Note that, by definition, J0
|
775 |
+
xf(x) = f(x).
|
776 |
+
Moreover it satisfies the semigroup property, i.e. Jα
|
777 |
+
x Jβ
|
778 |
+
x f(x) = Jα+β
|
779 |
+
x
|
780 |
+
f(x).
|
781 |
+
There are different definitions of fractional derivative (see e.g. [1]). In this paper we
|
782 |
+
used the fractional derivatives in the sense of Caputo, that is
|
783 |
+
Dγ
|
784 |
+
xf(x) = Jm−γ
|
785 |
+
x
|
786 |
+
Dm
|
787 |
+
x f(x) =
|
788 |
+
1
|
789 |
+
Γ(m − γ)
|
790 |
+
� x
|
791 |
+
0
|
792 |
+
(x−x′)m−γ−1
|
793 |
+
dm
|
794 |
+
d(x′)m f(x′) dx′, γ ̸= m. (A2)
|
795 |
+
It is simple to prove the following properties of fractional derivatives and integrals
|
796 |
+
(see e.g. [1]) that will be used in the analysis:
|
797 |
+
Dγ
|
798 |
+
xJγ
|
799 |
+
x f(x) = f(x),
|
800 |
+
γ > 0,
|
801 |
+
(A3)
|
802 |
+
Jγ
|
803 |
+
x Dγ
|
804 |
+
xf(x) = f(x) −
|
805 |
+
m−1
|
806 |
+
�
|
807 |
+
k=0
|
808 |
+
f (k)(0)xk
|
809 |
+
k! ,
|
810 |
+
γ > 0, x > 0,
|
811 |
+
(A4)
|
812 |
+
Jγ
|
813 |
+
x xδ =
|
814 |
+
Γ(δ + 1)
|
815 |
+
Γ(δ + γ + 1)xδ+γ
|
816 |
+
γ > 0, δ > −1, t > 0,
|
817 |
+
(A5)
|
818 |
+
Dγ
|
819 |
+
xxδ =
|
820 |
+
Γ(δ + 1)
|
821 |
+
Γ(δ − γ + 1)xδ−γ
|
822 |
+
γ > 0, δ > −1, t > 0.
|
823 |
+
(A6)
|
824 |
+
11
|
825 |
+
|
5dE3T4oBgHgl3EQfpQo9/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,468 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf,len=467
|
2 |
+
page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
3 |
+
page_content='04640v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
4 |
+
page_content='GM] 2 Jan 2023 Properties of the multi-index special function W(¯α,¯ν)(z) R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
5 |
+
page_content=' Drogheia aLiceo Scientifico Francesco Severi, Viale Europa,36, 03100 Frosinone (FR), ITALY ABSTRACT In this paper, we investigate some properties related to a multi-index special func- tion W(¯α,¯ν) that arose from an eigenvalue problem for a multi-order fractional hyper- Bessel operator, involving Caputo fractional derivatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
6 |
+
page_content=' We show that for particular values of the parameters involved in this special function W(¯α,¯ν), this leads to the hyper-Bessel function of Delerue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
7 |
+
page_content=' The Laplace transform of the W(¯α,¯ν) is discussed obtaining, in particular cases, the well-known functional relation between hyper- Bessel function and multi-index Mittag-Leffler function, or, quite simply, between classical Wright and Mittag-Leffler functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
8 |
+
page_content=' Moreover, it is shown that the multi- index special function satisfies the recurrence relation involving fractional deriva- tives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
9 |
+
page_content=' In a particular case, we derive, to the best of our knowledge, a new differential recurrence relation for the Mittag-Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
10 |
+
page_content=' We also provide derivatives of the 3-parameters function Wα,β,ν with respect to parameters, leading to infinite power series with coefficients being quotients of digamma and gamma functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
11 |
+
page_content=' KEYWORDS Special Function of Fractional Calculus;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
12 |
+
page_content=' hyper-Bessel type operators;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
13 |
+
page_content=' Wright and Mittag-Leffler functions;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
14 |
+
page_content=' Caputo derivatives;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
15 |
+
page_content=' recurrence relations of special functions;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
16 |
+
page_content=' hyper-Bessel functions 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
17 |
+
page_content=' Introduction Nowadays, the interest in fractional differential equations is increasing because these are becoming more adequate than those of integer order to investigate various problems in different fields of physics, engineering and economics [1], [2], [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
18 |
+
page_content=' They have indeed the fundamental characteristic to describe memory and heredity properties of many materials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
19 |
+
page_content=' Some of them have been introduced within the framework of partition theory in solving number theory problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
20 |
+
page_content=' This is the case of the Wright function, introduced by E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
21 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
22 |
+
page_content=' Wright in his articles on the asymptotic partition formulae[4], [5], [6] and [7], [8], [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
23 |
+
page_content=' Recently, many authors are dealing with multi-indices special functions (SF) of fractional calculus (FC) appearing in solution of differential equations and systems of fractional multi-order type (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
24 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
25 |
+
page_content=' hyper-Bessel and quasi-Bessel operators) [10], [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
26 |
+
page_content=' Among them, the most general functions we just want to refer to are the Fox H- function and the Wright generalized hypergeometric function [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
27 |
+
page_content=' Indeed, one gets the classical SF setting their parameters with integer values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
28 |
+
page_content=' In the previous paper [13] the author investigated a hyper-Bessel-type operator in- volving Caputo derivatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
29 |
+
page_content=' Solving the eigenvalue problem associated with this frac- tional operator, the author introduced a function, written in series expansion, that in specific cases is possible to refer to the well-known special function of the fractional CONTACT R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
30 |
+
page_content=' Droghei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
31 |
+
page_content=' Email: riccardo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
32 |
+
page_content='droghei@francescoseveri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
33 |
+
page_content='org calculus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
34 |
+
page_content=' According to the information we have, this special function was not studied by now.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
35 |
+
page_content=' But as seen, it is reduced in particular cases to some known special func- tions, which on their side are cases of the Bessel and hyper-Bessel functions and more generally, of the multi-index Mittag-Leffer functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
36 |
+
page_content=' This multi-index special function, called in the previous paper m-p generalized Wright function, plays an important role in nonlinear fractional differential equations, and in their isochronous ω-modified version[13],[14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
37 |
+
page_content=' It is also a natural generalization of the applications of the Laguerre derivatives and the Laguerre-type exponentials [15], [16], [17], [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
38 |
+
page_content=' In this survey article, firstly, we want to examine several properties as- sociated with the multi-index special function investigated in [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
39 |
+
page_content=' The outline of this work is as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
40 |
+
page_content=' In Section 2, we recall the definition of the multi-index function W(¯α,¯ν) introduced in [13] and its connection with the Hyper - Bessel function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
41 |
+
page_content=' Moreover, the simpler function in the only 3-parameters case Wα,β,ν is described.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
42 |
+
page_content=' In Section 3 we computed the Laplace Transform of the function W(¯α,¯ν) and, using it, we derived some new functional relations between this function and other known special functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
43 |
+
page_content=' The main result of this work is described in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
44 |
+
page_content=' Here we showed the recurrence relations of the function Wα,β,ν obtaining, we suppose, new differential recurrence relation for the Mittag-Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
45 |
+
page_content=' In Section 5 we investigated the derivatives of Wα,β,ν with respect to the parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
46 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
47 |
+
page_content=' Multi-index special function W(¯α,¯ν)(z) The multi-index special function W(¯α,¯ν)(z) investigated in [13], is defined by series representation as a function of the complex variable z and parameters αj, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
48 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
49 |
+
page_content=', n+ 1 and νj, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
50 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
51 |
+
page_content=', n: W(¯α,¯ν)(z) = ∞ � k=0 k � i=1 n � j=1 Γ(αn+1i + aj) Γ(αn+1i + bj) · zk Γ(αn+1k + bn+1) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
52 |
+
page_content=' (1) where aj = 1 + j � m=1 (νm−1 − αm) ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
53 |
+
page_content=' bj = 1 + j � m=1 (νm−1 − αm−1) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
54 |
+
page_content=' (2) and the relation aj = bj − αj with j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
55 |
+
page_content='.n + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
56 |
+
page_content=' The W(¯α,¯ν)(z) is an entire function for αj > 0, j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
57 |
+
page_content='.n + 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
58 |
+
page_content=' νj ∈ C, j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
59 |
+
page_content='.n and α0 = ν0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
60 |
+
page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
61 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
62 |
+
page_content=' The multi-index special function W(¯α,¯ν)(λxαn+1) with λ ∈ R, x ≥ 0, αj > 0, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
63 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
64 |
+
page_content=', n + 1 and νj > 0, j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
65 |
+
page_content='.n satisfy the following fractional differ- ential equation involving fractional hyper-Bessel-type operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
66 |
+
page_content=' [see [13] for the proof] 2 ˆD(¯α,¯ν) nL W(¯α,¯ν)(λxαn+1) = λW(¯α,¯ν)(λxαn+1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
67 |
+
page_content=' (3) where ˆD(¯α,¯ν) nL = x �n s=1(αs−νs) dαn+1 dxαn+1 xνn dαn dxαn xνn−1 dαn−1 dxαn−1 · · · xν1 dα1 dxα1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
68 |
+
page_content=' (4) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
69 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
70 |
+
page_content=' Hyper-Bessel function as a particular case The hyper-Bessel function of Delerue (or a multi-index analogue of Bessel function) of order d with indices µ1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
71 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
72 |
+
page_content=', µd, introduced in 1953 by Delereu [19] as a generalization of the Bessel function of the first type (see also [20]) is defined by Jµd(z) = z− µ1+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
73 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
74 |
+
page_content='+µd d+1 Jµd((d + 1) d+1√z) = � k≥0 (−1)kzk k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
75 |
+
page_content=' �d j=1 Γ(k + µj + 1) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
76 |
+
page_content=' (5) Setting αj = 1, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
77 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
78 |
+
page_content=', n + 1 in the multi-index special function W(¯α,¯ν), we obtain the relation W(¯1,¯ν)(z) = n � j=1 Γ(1 + aj)Jan(−z), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
79 |
+
page_content=' (6) with aj defined in (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
80 |
+
page_content=' It is not surprising because the hyper-Bessel function satisfies the so-called hyper-Bessel differential operators of higher order, introduced by Dimovski and Kiryakova [21], [22], and obtained from (3) setting all parameters αj = 1 with j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
81 |
+
page_content='.n + 1, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
82 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
83 |
+
page_content=' derivatives of integer order.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
84 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
85 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
86 |
+
page_content=' 3-parameters function Wα,β,ν In this section we analyse the simpler case of (1) with n = 1, α2 = β, α1 = α and ν1 = ν: Wα,β,ν(xβ) = ∞ � k=0 k � i=1 Γ(βi + 1 − α) Γ(βi + 1) xβk Γ(βk + 1 − α + ν).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
87 |
+
page_content=' (7) Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
88 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
89 |
+
page_content=' Obviously, the above function (7) satisfies the following fractional differential equation ˆDα,β,νf(x) = xα−ν dβ dxβ � xν dα dxα f(x) � = f(x), (8) involving two fractional derivatives in the sense of Caputo of orders α, β ∈ (0, 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
90 |
+
page_content=' Where f(x) = Wα,β,ν(xβ) 3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
91 |
+
page_content=' Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
92 |
+
page_content=' The Weinstein and Bessel-Clifford operators Setting α = β = 1 and ν = k, k ≥ 1 the operator ˆDα,β,ν becomes ˆD1,1,k = xBk = x � d2 dx2 + k x d dx � = x−k+1 d dxxk d dx where Bk is the well known Weinstein operator (or Bessel operator) from the so- called Darboux-Weinstein relation [23], [24].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
93 |
+
page_content=' In [25] Hayek studied in details exactly the operator ˆD1,1,k+1 calling its solution as Bessel-Clifford function of second order Cν(x) = x− ν−1 2 Iν−1(2√x) = 1 Γ(ν+1) 0F1(ν + 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
94 |
+
page_content=' −x), where Iν(x) is the modified Bessel function of the first kind.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
95 |
+
page_content=' Later, in [26] he introduced the two indices Bessel-Clifford functions of the third order modifying the hyper-Bessel function J(2) µ,ν(x): Cµ,ν(x) = x− µ+ν 3 J(2) µ,ν(3 3√x) = 1 Γ(µ + 1)Γ(ν + 1) 0 F2(µ + 1, ν + 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
96 |
+
page_content=' −x);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
97 |
+
page_content=' (9) satisfying the third-order Bessel-Clifford differential equation related to the operator ˆBµ,ν = x−ν d dxxµ−ν+1 d dxxν+1 d dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
98 |
+
page_content=' (10) As it is simple to see, the two-parameter operator ˆBµ,ν is equivalent to the operator (4), ˆD({α1,α2,α3},{ν1,ν2}) 2L with α1 = α2 = α3 = 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
99 |
+
page_content=' ν1 = ν + 1 and ν2 = µ − ν + 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
100 |
+
page_content=' and then the Bessel-Clifford of the third order function (9) is equal to Cµ,ν(x) = 1 Γ(ν + 1)W({1,1,1},{ν+1,µ−ν+1})(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
101 |
+
page_content=' These differential operators appear very often in the PDEs of mathematical physics (especially in fluid mechanics, elasticity, and transonic flow), for instance in the gen- eralized Bessel heat equation and other equations of generalized axially symmetric potentials (GASP) theory [27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
102 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
103 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
104 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
105 |
+
page_content=' Particular cases of Wα,β,ν For α = 1, β = λ and ν = µ the function corresponds to the Classical Wright function W1,λ,µ(xλ) = Wλ,µ �xλ λ � = ∞ � k=0 � xλ λ �k k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
106 |
+
page_content='Γ(λk + µ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
107 |
+
page_content=' (11) For α = 0, β → α, ν → β − 1 the function corresponds to the generalized Mittag- Leffler function W0,α,β−1(z) = Eα,β(z) = ∞ � k=0 zk Γ(αk + β).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
108 |
+
page_content=' (12) 4 In case of α = β = ν holds the relation Wν,ν,ν(xν) = E1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
109 |
+
page_content='ν,1(xν) where Eα;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
110 |
+
page_content='ν,γ(x) = �∞ k=0 xk Γα+1(νk+γ) is the α-Mittag-Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
111 |
+
page_content=' In Addition, we present some examples of the 3-parameters function Wα,β,ν in the following table, and in Figure 1 we represent the behavior of this function for different values of the parameters α, β, ν;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
112 |
+
page_content=' Integer order derivatives Fractional order derivatives W0,1,0(x) = ex W 1 2 , 1 2, 1 2 (√x) = +I0(2√x) + L0(2√x) W0,1,n(x) = ex xn − �n−1 i=0 xi−n i!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
113 |
+
page_content=' with n ∈ N W 1 2, 1 2, 3 2 (√x) = +I1(2√x) + L1(√x) W1,1,0(x) = √xI1(2√x) W 1 2, 1 2,1(√x) = sinh(2√x)+cosh(2√x)−1 √πx W1,1,ν(x) = x− ν−1 2 Iν−1(2√x) W 1 2, 1 2,2(√x) = (2√x−1)e2√x−2x+1 2x√πx where Iα(x) = i−αJα(ix) = �∞ m=0 1 m!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
114 |
+
page_content='Γ(m+α+1)(x 2)2m+α is the modified Bessel func- tion of the first kind and Lα(x) = � x 2 �ν+1 �∞ m=0 ( x 2) 2m Γ(m+ 3 2)Γ(m+ν+ 3 2 ) is the modified Struve function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
115 |
+
page_content=' (a) Plot of the function W0,1,ν(x) for ν = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
116 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
117 |
+
page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
118 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
119 |
+
page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
120 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
121 |
+
page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
122 |
+
page_content=' 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
123 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
124 |
+
page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
125 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
126 |
+
page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
127 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
128 |
+
page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
129 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
130 |
+
page_content=' (b) Plot of the function W1,1,ν(x) for ν = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
131 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
132 |
+
page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
133 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
134 |
+
page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
135 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
136 |
+
page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
137 |
+
page_content=' 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
138 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
139 |
+
page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
140 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
141 |
+
page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
142 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
143 |
+
page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
144 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
145 |
+
page_content=' (c) Plot of the function W 1 2 , 1 2 ,ν(√x) for ν = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
146 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
147 |
+
page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
148 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
149 |
+
page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
150 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
151 |
+
page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
152 |
+
page_content=' 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
153 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
154 |
+
page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
155 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
156 |
+
page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
157 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
158 |
+
page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
159 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
160 |
+
page_content=' (d) Plot of the function W 1 2 ,1,ν(x) for ν = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
161 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
162 |
+
page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
163 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
164 |
+
page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
165 |
+
page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
166 |
+
page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
167 |
+
page_content=' 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
168 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
169 |
+
page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
170 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
171 |
+
page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
172 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
173 |
+
page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
174 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
175 |
+
page_content=' Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
176 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
177 |
+
page_content=' Laplace Transform Let us compute the Laplace transform of the W(¯α,¯ν)(λx) 5 L � W(¯α,¯ν)(λxαn+1), s � = � ∞ 0 e−sx ∞ � k=0 k � i=1 n � j=1 Γ(αn+1i + aj) Γ(αn+1i + bj) λkxαn+1k Γ(αn+1k + bn+1)dx = ∞ � k=0 k � i=1 n � j=1 λkΓ(αn+1i + aj) Γ(αn+1i + bj)Γ(αn+1k + bn+1) � ∞ 0 e−sxxαn+1kdx = 1 s ∞ � k=0 k � i=1 n � j=1 Γ(αn+1i + aj)Γ(αn+1k + 1) Γ(αn+1i + bj)Γ(αn+1k + bn+1) � λ sαn+1 �k .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
178 |
+
page_content=' (13) th analytical properties of the W(¯α,¯ν) provides that the resulting Laplace transform turns out to be an analytic function, vanishing at infinity and exhibiting an essential singularity at s = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
179 |
+
page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
180 |
+
page_content=' In case we set αj = 1, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
181 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
182 |
+
page_content=', n + 1, the multi-index special functions W(¯α,¯ν) will be related to the hyper-Bessel functions as is showed in (6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
183 |
+
page_content=' After some calculations, we obtain the following functional relation between the Laplace transform of the Hyper-Bessel function and the multi-index Mittag-Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
184 |
+
page_content=' A more general relation between these two functions can be found in the article of Kiryakova and Luchko [28].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
185 |
+
page_content=' L � W(¯1,¯ν)(λx), s � = n � j=1 Γ(1 + aj)1 s ∞ � k=0 1 �n j=1 Γ(k + aj+1 + 1) �λ s �k = n � j=1 Γ(1 + aj)1 sE(n) (1,1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
186 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
187 |
+
page_content=',1),(aj+1+1) �λ s � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
188 |
+
page_content=' (14) Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
189 |
+
page_content=' The Laplace transform of Wα,β,ν(x) can be obtained as a special case of the (13) as follows: L (Wα,β,ν(λxρ), s) = 1 s ∞ � k=0 k � i=1 βΓ(βi + 1 − α) Γ(βi + 1) Γ(ρk + 1) Γ(βk + 1 − α + ν) � λ sρ �k ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
190 |
+
page_content=' (15) and, in the case of the parameter α = 1, we obtain the well-known Laplace transform of the Wright function which can be expressed in terms of the two-parameter Mittag- Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
191 |
+
page_content=' L (W1,β,ν(λx), s) = L (Wβ,ν(λx), s) = 1 sEβ,ν � λ β s � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
192 |
+
page_content=' (16) 6 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
193 |
+
page_content=' Recurrence relations of Wα,β,ν A recurrence relation is an equation that recursively defines a sequence of values;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
194 |
+
page_content=' given one or more initial terms, each further term of the sequence is defined as a function of the previous terms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
195 |
+
page_content=' Differential recurrence relation of the generalized Wright function can be used in the study of fractional differential equations, and it is obtained directly from series representation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
196 |
+
page_content=' xα+β dβ dxβ � xν−α+βWα,β,ν+β(xβ) � − 2xν+βWα,β,ν(xβ) + xα+ν dα dxα Wα,β,ν−β(xβ) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
197 |
+
page_content=' (17) Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
198 |
+
page_content=' In case α = β = 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
199 |
+
page_content=' ν = n + 1 with n ∈ N0 and d dxW1,1,n(x) = W1,1,n+1(x) = Cn(x);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
200 |
+
page_content=' we obtain the well known three-term recurrence relation for the Bessel-Clifford func- tion Cn(x) xCn+2(x) + (n + 1)Cn+1(x) = Cn(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
201 |
+
page_content=' (18) Remark 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
202 |
+
page_content=' Recurrence fractional derivatives relation for the Wright and Mittag-Leffler functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
203 |
+
page_content=' From the relation (11) between the generalized Wright function and the classical Wright function the relation (17) becomes dλ dzλ � zλ+ν−1Wλ,λ+ν �zλ λ �� = zν−1Wλ,ν �zλ λ � ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
204 |
+
page_content=' (19) using the formula d dz Wλ,ν−λ �zλ λ � = zλ−1Wλ,ν �zλ λ � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
205 |
+
page_content=' (20) In case α = 0, and β → α, ν → β − 1 the generalized Wright function is related to the Mittag-Leffler function by the following relation: W0,α,β−1(z) = Eα,β(z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
206 |
+
page_content=' (21) In particular, from the recurrence relation (17), we obtain the new recurrence relation involving fractional derivatives for M-L functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
207 |
+
page_content=' zα dα dzα � zα+β−1Eα,α+β(zα) � − 2zα+β−1Eα,β(zα) + zβ−1Eα,β−α(zα) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
208 |
+
page_content=' (22) 7 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
209 |
+
page_content=' Partial derivatives of Wα,β,ν with respect to the parameters In this section, taking inspiration from the works of Apelblat and Mainardi [29], [30] we analyse the derivatives of Wα,β,ν respect the three parameters included in the function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
210 |
+
page_content=' We can treat parameters as variables and hence the derivatives with respect to them can be obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
211 |
+
page_content=' These derivatives lead to infinite power series involving digamma (ψ) and gamma functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
212 |
+
page_content=' ∂ ∂ν Wα,β,ν(z) = − ∞ � k=0 k � i=1 Γ(βi + 1 − α) Γ(βi + 1) ψ(βk + 1 − α + ν) Γ(βk + 1 − α + ν)zk;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
213 |
+
page_content=' (23) ∂ ∂β Wα,β,ν(z) = ∞ � k=0 k � i=1 Γ(βi + 1 − α) Γ(βi + 1) zk Γ(βk + 1 − α + ν) · \uf8ee \uf8f0 k � j=1 j [ψ(βj + 1 − α) − ψ(βj + 1)] − kψ(βk + 1 − α + ν) \uf8f9 \uf8fb ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
214 |
+
page_content=' (24) ∂ ∂αWα,β,ν(z) = ∞ � k=0 k � i=1 Γ(βi + 1 − α) Γ(βi + 1) zk Γ(βk + 1 − α + ν) \uf8ee \uf8f0− k � j=1 ψ(βj + 1 − α) + ψ(βk + 1 − α + ν) \uf8f9 \uf8fb ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
215 |
+
page_content=' (25) where ψ(z) = Γ′(z) Γ(z) denotes the digamma function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
216 |
+
page_content=' Remark 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
217 |
+
page_content=' In the case α = 1 and considering the property of the digamma function ψ(z+1) = ψ(z)+ 1 z;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
218 |
+
page_content=' we obtain the formula (5) and (6) of the Apelblat-Mainardi article ([30]) for the classical Wright function ∂ ∂β W1,β,ν(z) = � ∂ ∂β Wβ,ν � (βz) = − ∞ � k=0 � ψ(βk + ν) k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
219 |
+
page_content='Γ(βk + ν) � kzk;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
220 |
+
page_content=' ∂ ∂ν W1,β,ν(z) = � ∂ ∂ν Wβ,ν � (βz) = − ∞ � k=0 � ψ(βk + ν) k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
221 |
+
page_content='Γ(βk + ν) � zk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
222 |
+
page_content=' By setting the parameters, α = 0, β → α and ν → β − 1, we obtain the formulas (95) and (96) of the Apelblat paper ([29]) ∂ ∂αW0,α,β−1(z) = ∂ ∂αEα,β(z) = − ∞ � k=0 �kψ(αk + β) Γ(αk + β) � zk;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
223 |
+
page_content=' ∂ ∂β W0,α,β−1(z) = ∂ ∂β Eα,β(z) = − ∞ � k=0 �ψ(αk + β) Γ(αk + β) � zk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
224 |
+
page_content=' 8 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
225 |
+
page_content=' Conclusion The aim of this paper is to investigate several properties related to the multi-index special function W(¯α,¯ν) and its 3-parameters version.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
226 |
+
page_content=' An important result was finding the connection between the W(¯α,¯ν) and the hyper-Bessel function of Delerue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
227 |
+
page_content=' Here we analyzed the Laplace transform, recurrence relation and derivatives of the function with respect to the parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
228 |
+
page_content=' In particular, we found new findings that, for special values of the parameters, retrieve some well-known relations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
229 |
+
page_content=' Indeed, a simple func- tional relation is obtained between the Laplace transform of the hyper-Bessel function and the multi-index Mittag-Leffler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
230 |
+
page_content=' Disclosure statement No potential conflict of interest was reported by the author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
231 |
+
page_content=' Acknowledgements The author is grateful to Dr Roberto Garra for providing essential information, help and advice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
232 |
+
page_content=' References [1] Podlubny I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
233 |
+
page_content=' Fractional Differential Equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
234 |
+
page_content=' Academic Press, San Diego;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
235 |
+
page_content=' 1999.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
236 |
+
page_content=' [2] Mainardi F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
237 |
+
page_content=' Fractional calculus and waves in linear viscoelasticity: an introduction to mathematical models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
238 |
+
page_content=' World Scientific;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
239 |
+
page_content=' 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
240 |
+
page_content=' [3] Gorenflo R, Kilbas AA, Mainardi F, Rogosin SV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
241 |
+
page_content=' Mittag-Leffler functions, related topics and applications (p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
242 |
+
page_content=' 540).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
243 |
+
page_content=' New York, NY, USA: Springer;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
244 |
+
page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
245 |
+
page_content=' [4] Wright E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
246 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
247 |
+
page_content=' Asymptotic partition formulae: I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
248 |
+
page_content=' plane partitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
249 |
+
page_content=' The Quarterly Journal of Mathematics, Volume os-2, Issue 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
250 |
+
page_content=' 1931;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
251 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
252 |
+
page_content=' 177–189.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
253 |
+
page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
254 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
255 |
+
page_content='1093/qmath/os- 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
256 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
257 |
+
page_content='177 [5] Wright E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
258 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
259 |
+
page_content=' Asymptotic partition formulae:(II) weighted partitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
260 |
+
page_content=' Proceedings of the London Mathematical Society, 2(1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
261 |
+
page_content=' 1934;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
262 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
263 |
+
page_content=' 117-141.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
264 |
+
page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
265 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
266 |
+
page_content='1112/plms/s2- 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
267 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
268 |
+
page_content='117 [6] Wright E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
269 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
270 |
+
page_content=' Asymptotic partition formulae.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
271 |
+
page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
272 |
+
page_content=' Partitions intok-th powers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
273 |
+
page_content=' Acta Math- ematica, 63(1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
274 |
+
page_content=' 1934;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
275 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
276 |
+
page_content='143-191.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
277 |
+
page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
278 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
279 |
+
page_content='1007/BF02547353 [7] Wright EM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
280 |
+
page_content=' On the coefficients of power series having exponential singularities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
281 |
+
page_content=' Journal London Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
282 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
283 |
+
page_content=' 8;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
284 |
+
page_content=' 1933;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
285 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
286 |
+
page_content=' 71–79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
287 |
+
page_content=' [8] Wright EM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
288 |
+
page_content=' The asymptotic expansion of the generalized Bessel function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
289 |
+
page_content=' Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
290 |
+
page_content=' London Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
291 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
292 |
+
page_content=' (Ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
293 |
+
page_content=' II) 38;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
294 |
+
page_content=' 1935;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
295 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
296 |
+
page_content=' 257–270.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
297 |
+
page_content=' [9] Wright EM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
298 |
+
page_content=' The asymptotic expansion of the generalized hypergeometric function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
299 |
+
page_content=' Jour- nal London Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
300 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
301 |
+
page_content=' 10;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
302 |
+
page_content=' 1935;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
303 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
304 |
+
page_content=' 287–293.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
305 |
+
page_content=' [10] Garra R, Polito F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
306 |
+
page_content=' On some operators involving Hadamard derivatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
307 |
+
page_content=' Integral Trans- forms and Special Functions;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
308 |
+
page_content=' 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
309 |
+
page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
310 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
311 |
+
page_content='1080/10652469.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
312 |
+
page_content='2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
313 |
+
page_content='756875.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
314 |
+
page_content=' [11] Dubovski PB, Slepoi JA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
315 |
+
page_content=' Construction and analysis of series solutions for frac- tional quasi-Bessel equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
316 |
+
page_content=' Fract Calc Appl Anal 25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
317 |
+
page_content=' 2022;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
318 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
319 |
+
page_content='1229–1249.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
320 |
+
page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
321 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
322 |
+
page_content='1007/s13540-022-00045-z [12] Kiryakova V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
323 |
+
page_content=' Fractional calculus of some ”new” but not new special function: K-, multi- index-, and S-analogues.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
324 |
+
page_content=' AIP Conference Proceedings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
325 |
+
page_content=' 2172, 050008;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
326 |
+
page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
327 |
+
page_content=' 9 [13] Droghei R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
328 |
+
page_content=' On a Solution of a Fractional Hyper-Bessel Differential Equation by Means of a Multi-Index Special Function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
329 |
+
page_content=' Fract Calc Appl Anal 24;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
330 |
+
page_content=' 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
331 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
332 |
+
page_content=' 1559–1570.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
333 |
+
page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
334 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
335 |
+
page_content='1515/fca-2021-0065 [14] Droghei R, Garra R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
336 |
+
page_content=' Isochronous fractional PDEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
337 |
+
page_content=' Lecture Notes of TICMI 21;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
338 |
+
page_content=' 2020;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
339 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
340 |
+
page_content=' 43–51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
341 |
+
page_content=' [15] Dattoli G, Ricci PE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
342 |
+
page_content=' Laguerre-type exponentials, and the relevant-circular and-hyperbolic functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
343 |
+
page_content=' Georgian Mathematical Journal, 10(3);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
344 |
+
page_content=' 2003;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
345 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
346 |
+
page_content=' 481-494.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
347 |
+
page_content=' [16] Bretti G, Ricci PE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
348 |
+
page_content=' Laguerre-type special functions and population dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
349 |
+
page_content=' Applied mathematics and computation, 187(1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
350 |
+
page_content=' 2007;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
351 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
352 |
+
page_content=' 89-100.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
353 |
+
page_content=' [17] Ricci PE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
354 |
+
page_content=' Laguerre-Type Exponentials, Laguerre Derivatives and Applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
355 |
+
page_content=' A Survey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
356 |
+
page_content=' Mathematics 8, 2054;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
357 |
+
page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
358 |
+
page_content=' [18] Garra R, Tomovski Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
359 |
+
page_content=' Exact results on some nonlinear Laguerre-type diffusion equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
360 |
+
page_content=' Mathematical Modelling and Analysis, 26(1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
361 |
+
page_content=' 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
362 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
363 |
+
page_content=' 72-81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
364 |
+
page_content=' [19] Delerue P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
365 |
+
page_content=', Sur le calcul symbolique `a n variables et fonctions hyperbesseliennes (II).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
366 |
+
page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
367 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
368 |
+
page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
369 |
+
page_content=' Brux.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
370 |
+
page_content=' 3;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
371 |
+
page_content=' 1953;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
372 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
373 |
+
page_content=' 229–274.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
374 |
+
page_content=' [20] Kiryakova V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
375 |
+
page_content=' Generalized Fractional Calculus and Applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
376 |
+
page_content=' Longman – J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
377 |
+
page_content=' Wiley, Harlow, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
378 |
+
page_content=' York;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
379 |
+
page_content=' 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
380 |
+
page_content=' [21] Dimowski I, Kiryakova V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
381 |
+
page_content=' Generalized Poisson transmutations and corresponding repre- sentations of hyper-Bessel functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
382 |
+
page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
383 |
+
page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
384 |
+
page_content=' Acad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
385 |
+
page_content=' Bulg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
386 |
+
page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
387 |
+
page_content=' 39, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
388 |
+
page_content=' 10;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
389 |
+
page_content=' 1986;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
390 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
391 |
+
page_content=' 20-32.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
392 |
+
page_content=' [22] Dimowski I, Kiryakova V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
393 |
+
page_content=' Generalized Poisson representations of hyper-geometric func- tions pFq , p < q using fractional integrals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
394 |
+
page_content=' In: Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
395 |
+
page_content='16th Spring Conf Union Bulg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
396 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
397 |
+
page_content=' Sofia;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
398 |
+
page_content=' 1987;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
399 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
400 |
+
page_content=' 205-212.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
401 |
+
page_content=' [23] Weinstein A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
402 |
+
page_content=' The generalized radiation problem and the Euler-Poisson-Darboux equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
403 |
+
page_content=' Summa Brazil Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
404 |
+
page_content=' 3;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
405 |
+
page_content=' 1955;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
406 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
407 |
+
page_content=' 125-147.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
408 |
+
page_content=' [24] Kiryakova V, Hernandez-Suarez V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
409 |
+
page_content=' Bessel-Clifford third order differential operator and corresponding Laplace type integral transform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
410 |
+
page_content=' Dissertationes Mathematicae 340;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
411 |
+
page_content=' 1995);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
412 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
413 |
+
page_content=' 143-161.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
414 |
+
page_content=' [25] Hayek N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
415 |
+
page_content=' Estudio de la ecuaci`on diferencial xy′′ + (ν + 1)y′ + y = 0 y de sus aplicaciones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
416 |
+
page_content=' Collect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
417 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
418 |
+
page_content=' 18, No 1-2;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
419 |
+
page_content=' 1967;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
420 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
421 |
+
page_content=' 57-174.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
422 |
+
page_content=' [26] Hayek N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
423 |
+
page_content=' Funciones de Bessel-Cliff`ord de tercer orden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
424 |
+
page_content=' Actas XII Jornadas Luso-Esp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
425 |
+
page_content=' de Mat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
426 |
+
page_content=' (Braga);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
427 |
+
page_content=' 1987;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
428 |
+
page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
429 |
+
page_content=' 346-351.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
430 |
+
page_content=' [27] Weinstein A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
431 |
+
page_content=' Generalized axially symmetric potential theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
432 |
+
page_content=' Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
433 |
+
page_content='AMS 59, 20;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
434 |
+
page_content=' 1955.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
435 |
+
page_content=' [28] Kiryakova V, Luchko Yu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
436 |
+
page_content=' The Multiindex MittagLeffler Functions and Their Applications for Solving Fractional Order Problems in Applied Analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
437 |
+
page_content=' AIP Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
438 |
+
page_content=' Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
439 |
+
page_content=' 1301, 597;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
440 |
+
page_content=' 2010;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
441 |
+
page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
442 |
+
page_content='1063/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
443 |
+
page_content='3526661.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
444 |
+
page_content=' [29] Apelblat A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
445 |
+
page_content=' Differentiation of the Mittag-Leffler functions with respect to parameters in the Laplace transform approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
446 |
+
page_content=' Mathematics, 8(5), 657;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
447 |
+
page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
448 |
+
page_content=' [30] Apelblat A, Mainardi F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
449 |
+
page_content=' Differentiation of the Wright functions with respect to parameters and other results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
450 |
+
page_content=' arXiv e-prints, arXiv-2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
451 |
+
page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
452 |
+
page_content=' Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
453 |
+
page_content=' Fractional calculus In order to make the papar self-contained, we briefly recall main definitions and prop- erties of fractional calculus operators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
454 |
+
page_content=' Let γ ∈ R+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
455 |
+
page_content=' The Riemann-Liouville fractional integral is defined by Jγ x f(x) = 1 Γ(γ) � x 0 (x − x′)γ−1f(x′)dx′, (A1) 10 where Γ(γ) = � +∞ 0 xγ−1e−xdx, is the Euler Gamma function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
456 |
+
page_content=' Note that, by definition, J0 xf(x) = f(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
457 |
+
page_content=' Moreover it satisfies the semigroup property, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
458 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
459 |
+
page_content=' Jα x Jβ x f(x) = Jα+β x f(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
460 |
+
page_content=' There are different definitions of fractional derivative (see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
461 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
462 |
+
page_content=' [1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
463 |
+
page_content=' In this paper we used the fractional derivatives in the sense of Caputo, that is Dγ xf(x) = Jm−γ x Dm x f(x) = 1 Γ(m − γ) � x 0 (x−x′)m−γ−1 dm d(x′)m f(x′) dx′, γ ̸= m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
464 |
+
page_content=' (A2) It is simple to prove the following properties of fractional derivatives and integrals (see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
465 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
466 |
+
page_content=' [1]) that will be used in the analysis: Dγ xJγ x f(x) = f(x), γ > 0, (A3) Jγ x Dγ xf(x) = f(x) − m−1 � k=0 f (k)(0)xk k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
467 |
+
page_content=' , γ > 0, x > 0, (A4) Jγ x xδ = Γ(δ + 1) Γ(δ + γ + 1)xδ+γ γ > 0, δ > −1, t > 0, (A5) Dγ xxδ = Γ(δ + 1) Γ(δ − γ + 1)xδ−γ γ > 0, δ > −1, t > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
468 |
+
page_content=' (A6) 11' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
|
6NE1T4oBgHgl3EQf6wWy/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:44f211a650353713f58f7fb3cb1024df1c7003e0103338b20ca2b3dbb3541700
|
3 |
+
size 86430
|
8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:995d833071383db496ee808e9461cf00ef3c95923ea5e55dd29a051c1737879f
|
3 |
+
size 458539
|
8dA0T4oBgHgl3EQfOv8t/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d8e39dec4c3606eaa5c1072b2843a1034b4d3143aa972741fb6868d41e97c388
|
3 |
+
size 1769517
|
8dA0T4oBgHgl3EQfOv8t/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:30b9eaa69de47672ac7b7ec49aa4a9f359f67b0a187084d7efb39392265a1db1
|
3 |
+
size 65121
|
B9E3T4oBgHgl3EQfUAr7/content/2301.04448v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:397c458a1497a6f05b93cc3e810f32cad2c40cd4cd44215807dbe9efc6e1734a
|
3 |
+
size 231678
|
B9E3T4oBgHgl3EQfUAr7/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6f3189dd0bc48c61ff87087d92a7ccd6680b615f6830bbd1c230a5cc553c1173
|
3 |
+
size 2359341
|
B9E3T4oBgHgl3EQfUAr7/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b76e456c5ba66a3ce3950192d1474af41b1ae6c3f8d4abb4d198856f2d166816
|
3 |
+
size 97479
|
BdE2T4oBgHgl3EQfngiP/content/2301.04009v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:64cffba3b220ea00d2aa3f80f0d52f444578810856418cd1f957872d29a31aa0
|
3 |
+
size 308085
|
BdE2T4oBgHgl3EQfngiP/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b89014f96f2656cd52d730abc8a4a13afa154e6eebb20012c192be6ab52d9d08
|
3 |
+
size 4194349
|
BdE2T4oBgHgl3EQfngiP/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:451a22cad8f26e2bca5bade44e27ea3aa97a475b3cb360d0eee8a72621738be4
|
3 |
+
size 166867
|
CdAzT4oBgHgl3EQfiP0X/content/tmp_files/2301.01495v1.pdf.txt
ADDED
@@ -0,0 +1,1449 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Beckman Defense
|
2 |
+
A V Subramanyam
|
3 |
+
IIITD
|
4 | |
5 |
+
Abstract
|
6 |
+
Optimal transport (OT) based distributional robust
|
7 |
+
optimisation (DRO) has received some traction in
|
8 |
+
the recent past. However, it is at a nascent stage but
|
9 |
+
has a sound potential in robustifying the deep learn-
|
10 |
+
ing models. Interestingly, OT barycenters demon-
|
11 |
+
strate a good robustness against adversarial attacks.
|
12 |
+
Owing to the computationally expensive nature of
|
13 |
+
OT barycenters, they have not been investigated
|
14 |
+
under DRO framework.
|
15 |
+
In this work, we pro-
|
16 |
+
pose a new barycenter, namely Beckman barycen-
|
17 |
+
ter, which can be computed efficiently and used
|
18 |
+
for training the network to defend against adver-
|
19 |
+
sarial attacks in conjunction with adversarial train-
|
20 |
+
ing. We propose a novel formulation of Beckman
|
21 |
+
barycenter and analytically obtain the barycenter
|
22 |
+
using the marginals of the input image. We show
|
23 |
+
that the Beckman barycenter can be used to train
|
24 |
+
adversarially trained networks to improve the ro-
|
25 |
+
bustness. Our training is extremely efficient as it re-
|
26 |
+
quires only a single epoch of training. Elaborate ex-
|
27 |
+
periments on CIFAR-10, CIFAR-100 and Tiny Im-
|
28 |
+
ageNet demonstrate that training an adversarially
|
29 |
+
robust network with Beckman barycenter can sig-
|
30 |
+
nificantly increase the performance. Under auto at-
|
31 |
+
tack, we get a a maximum boost of 10% in CIFAR-
|
32 |
+
10, 8.34% in CIFAR-100 and 11.51% in Tiny Ima-
|
33 |
+
geNet. Our code is available at http://bitly.ws/yvgh.
|
34 |
+
1
|
35 |
+
Introduction
|
36 |
+
Optimal mass transport (OT), originally proposed by Monge
|
37 |
+
in his seminal work [Monge,
|
38 |
+
1781],
|
39 |
+
has gathered a
|
40 |
+
widespread interest in the field of learning representations.
|
41 |
+
The original deterministic OT problem was later relaxed by
|
42 |
+
Kantorovich [Kantorovich, 1942] and considered a proba-
|
43 |
+
bilistic transport problem. This formulation seeks solution
|
44 |
+
for the optimal transport plan which can transport mass be-
|
45 |
+
tween two measures by incurring the minimum cost and is
|
46 |
+
solved using a linear program. The modern day OT is also at-
|
47 |
+
tributed to the phenomenal work of Kantorovich. Following
|
48 |
+
the OT theory, barycenters in Wasserstein space was proposed
|
49 |
+
by Agueh and Carlier in their remarkable work [Agueh and
|
50 |
+
Carlier, 2011]. Further, using entropic regularization [Cuturi,
|
51 |
+
2013], a fast method of computing barycenters was proposed
|
52 |
+
by Cuturi and Doucet [Cuturi and Doucet, 2014]. Recent
|
53 |
+
works addresses the challenge of computational complexity
|
54 |
+
of barycenters using neural networks [Lacombe et al., 2021].
|
55 |
+
In this work, we investigate the barycenters towards robust
|
56 |
+
learning of deep learning models.
|
57 |
+
Deep learning systems have shown impressive perfor-
|
58 |
+
mance in various applications. However, these systems are
|
59 |
+
vulnerable to adversarial perturbations [Wong et al., 2020],
|
60 |
+
[Croce and Hein, 2020], [Xie et al., 2019].
|
61 |
+
In order to
|
62 |
+
counter these attacks, several defense mechanisms have also
|
63 |
+
been proposed.
|
64 |
+
In one of the early works, Szegedy et
|
65 |
+
al. [Szegedy et al., 2013] formulated the adversarial attack
|
66 |
+
as an optimization problem and obtained the adversarial sam-
|
67 |
+
ple using L-BFGS. Several adversarial attacks have been
|
68 |
+
proposed since Szegedy’ work [Goodfellow et al., 2014;
|
69 |
+
Kurakin et al., 2016]. On the other hand, strong defense mea-
|
70 |
+
sures have been studied in [Madry et al., 2017], [Theagarajan
|
71 |
+
et al., 2019], [Wong et al., 2020], [Rebuffi et al., 2021].
|
72 |
+
Rotated
|
73 |
+
samples of
|
74 |
+
Classical AT
|
75 |
+
Barycentric
|
76 |
+
Training
|
77 |
+
|
78 |
+
Barycenter of
|
79 |
+
adversarial sample
|
80 |
+
Inference
|
81 |
+
Figure 1: Illustration: Classical defense methods use Adversarial
|
82 |
+
Training (AT) as a major defense technique. Our method obtains
|
83 |
+
barycenter from rotated inputs and uses them for training the model
|
84 |
+
using a cross-entropy loss. During inference time also we compute
|
85 |
+
barycenter of the given sample. The dashed boundary of barycenter
|
86 |
+
indicates that the barycenter is close to input samples in terms of
|
87 |
+
appearance but there are some differences. In the computation of
|
88 |
+
barycenter of adversarial sample, the barycenter shows the changes
|
89 |
+
in same color as that of the background to imply that barycenter
|
90 |
+
suppresses the adversarial noise.
|
91 |
+
In the field of adversarial attacks and defense, lP space has
|
92 |
+
arXiv:2301.01495v1 [cs.LG] 4 Jan 2023
|
93 |
+
|
94 |
+
been extensively studied. However, only a few works investi-
|
95 |
+
gate attacks under OT framework [Wong et al., 2019], [Li et
|
96 |
+
al., 2021]. There are even fewer works which investigate ro-
|
97 |
+
bustness using OT theory [Kwon et al., 2020], [Subramanyam
|
98 |
+
and Raj, 2022]. Distinct from these works, we first intro-
|
99 |
+
duce Beckman barycenter, a concept analogous to Wasser-
|
100 |
+
stein barycenter. We use proximal operator methods to solve
|
101 |
+
for the barycenter. The barycenters obtained from the clean
|
102 |
+
samples are used to train a pretrained adversarially robust net-
|
103 |
+
work. We note that in the absence of adversarial samples in
|
104 |
+
the training, the model would give a better clean accuracy but
|
105 |
+
will suffer in terms of adversarial accuracy. Therefore, we
|
106 |
+
use a pre-trained adversarially robust network to overcome
|
107 |
+
this challenge. An abstract illustration of our method is given
|
108 |
+
in Figure 1.
|
109 |
+
Beckman barycenter is obtained from input marginals via
|
110 |
+
a non-linear interpolation. The input marginals are linearly
|
111 |
+
transformed versions of the input and thus interfere with the
|
112 |
+
adversarial noise. Using these marginals the barycenter gen-
|
113 |
+
erates a sample which is similar in appearance to the input
|
114 |
+
and is closer in terms of class label. Thus, the class label
|
115 |
+
is preserved when the input is a clean sample, whereas, the
|
116 |
+
adversarial noise gets suppressed when the input is an ad-
|
117 |
+
versarial sample. Further, the network needs to be trained
|
118 |
+
with barycenter of clean samples so as to correctly classify
|
119 |
+
them. However, this training is cheap as a single epoch is
|
120 |
+
sufficient. We prove our hypothesis using extensive qualita-
|
121 |
+
tive and quantitative experiments.
|
122 |
+
2
|
123 |
+
Related Works
|
124 |
+
Adversarial Attacks Given an adversarial sample x with la-
|
125 |
+
bel y, a target network f parameterized by θ, the adversary
|
126 |
+
tries to find xadv by adding an adversarial noise such that
|
127 |
+
the prediction fθ(xadv) ̸= fθ(x) = y. Some of the robust at-
|
128 |
+
tacks are iterative FGSM [Kurakin et al., 2016], PGD [Madry
|
129 |
+
et al., 2017], Carlini and Wagner attacks [Carlini and Wagner,
|
130 |
+
2017], Jacobian based attack [Papernot et al., 2016], physical
|
131 |
+
attack Athalye [Athalye et al., 2018], and Autoattack [Croce
|
132 |
+
and Hein, 2020]. These attacks are primarily focused in lp
|
133 |
+
domain.
|
134 |
+
Adversarial Defense In response to adversarial attacks, sev-
|
135 |
+
eral defenses been proposed. One of the best defense ap-
|
136 |
+
proach is adversarial training [Szegedy et al., 2013], [Good-
|
137 |
+
fellow et al., 2014], [Moosavi-Dezfooli et al., 2016]. Madry
|
138 |
+
et al. [Madry et al., 2017] formally studied adversarial train-
|
139 |
+
ing and proposed that such training allows network to de-
|
140 |
+
fend well against first order adversary. Adversarial logit pair-
|
141 |
+
ing uses a pair of logits from clean and adversarial examples
|
142 |
+
to defend against adversarial samples [Kannan et al., 2018].
|
143 |
+
TRADES [Zhang et al., 2019] prove the bounds based on
|
144 |
+
regularization term which minimizes the difference in pre-
|
145 |
+
diction between clean and adversarial examples. In [Wong et
|
146 |
+
al., 2020], authors proposed to effectively combine FGSM
|
147 |
+
and random initialization to demonstrate better adversarial
|
148 |
+
training. RST [Carmon et al., 2019] propose a self-training
|
149 |
+
technique using unlabelled samples to improve the robust-
|
150 |
+
ness. Observing the correlation between flatness of weight
|
151 |
+
loss landscape and adversarial robustness, Wu et al. proposed
|
152 |
+
adversarial weight perturbation (AWP) to regularize the flat-
|
153 |
+
ness of weight loss [Wu et al., 2020]. On similar lines, [Yu et
|
154 |
+
al., 2022] propose a criterion called Loss Stationary Condi-
|
155 |
+
tion (LSC) for constrained perturbation, which regulates the
|
156 |
+
weight perturbation to prevent overfitting. LBGAT [Cui et al.,
|
157 |
+
2021] constrains the logits of a robust model, trained with ad-
|
158 |
+
versarial examples, to be similar to the logits of a clean model
|
159 |
+
trained on natural data.
|
160 |
+
While adversarial training uses all the samples, many tech-
|
161 |
+
niques propose that naively using adversarial samples in ad-
|
162 |
+
versarial training is not efficient.
|
163 |
+
This primarily involves
|
164 |
+
training the model with a weak attack first, and then grad-
|
165 |
+
ually increasing the strength of the adversary - CAT [Cai et
|
166 |
+
al., 2018], DART [Wang et al., 2019a], MART [Wang et al.,
|
167 |
+
2019b], FAT [Zhang et al., 2020]. Aforementioned methods
|
168 |
+
rely on pre-determined attack parameters for adversarial sam-
|
169 |
+
ple generation. However, this restricts the model’s robust-
|
170 |
+
ness. To address this issue, LAS-AT [Jia et al., 2022] propose
|
171 |
+
a framework for adversarial training that introduces the no-
|
172 |
+
tion of learnable attack strategy. It is composed of two com-
|
173 |
+
ponents: a target network that uses adversarial examples for
|
174 |
+
training to improve robustness, and a strategy network that
|
175 |
+
produces attack strategies to control adversarial sample gen-
|
176 |
+
eration. In similar spirit, A2 [Xu et al., 2022] and [Cheng
|
177 |
+
et al., 2022] have also been proposed. A classical review of
|
178 |
+
defense methods can be obtained in [Bai et al., 2021].
|
179 |
+
In a parallel line of defense works, input purification has
|
180 |
+
also been explored. At the test time, these techniques try to
|
181 |
+
remove the adversarial noise [Shi et al., 2021], TRADESSSL
|
182 |
+
[Mao et al., 2021], HedgeRST [Wu et al., 2021]. Score based
|
183 |
+
generative models such as [Yoon et al., 2021] and [Nie et al.,
|
184 |
+
2022] have also been used to purify the images before sending
|
185 |
+
them for classification.
|
186 |
+
Our work is inspired from two different theories, namely,
|
187 |
+
OT barycenters and distributional robust optimization. We
|
188 |
+
discuss these theories in the following.
|
189 |
+
Wasserstein Barycenter In the following we discuss Wasser-
|
190 |
+
stein distance and barycenter. Given probability distributions,
|
191 |
+
µ1, µ2 ∈ Ω, the Wasserstein distance is defined as,
|
192 |
+
W(µ1, µ2) = inf
|
193 |
+
Ω×Ω c(x, y)π(x, y)dxdy,
|
194 |
+
(1)
|
195 |
+
s.t.
|
196 |
+
�
|
197 |
+
Ω
|
198 |
+
π(x, y)dx = µ1(x),
|
199 |
+
�
|
200 |
+
Ω
|
201 |
+
π(x, y)dy = µ2(y),
|
202 |
+
where the cost matrix c(x, y) = ∥x − y∥1 and π denotes the
|
203 |
+
transport plan. This is also known as Earth Mover’ Distance
|
204 |
+
(EMD). This form is also used to compute barycenter [Cuturi
|
205 |
+
and Peyr´e, 2016] wherein the summation of Wasserstein dis-
|
206 |
+
tance between the barycenter and each input marginal is con-
|
207 |
+
sidered. However, barycenters are costly to compute and the
|
208 |
+
best known complexity scales exponentially with the number
|
209 |
+
of marginals [Fan et al., 2022].
|
210 |
+
EMD can also be represented as dual of the dual of Eq 1
|
211 |
+
in variational form popularly introduced by Beckman [Beck-
|
212 |
+
|
213 |
+
mann, 1952], [Li et al., 2018], [Lee et al., 2020],
|
214 |
+
W(µ1, µ2) = inf
|
215 |
+
M
|
216 |
+
�
|
217 |
+
Ω
|
218 |
+
∥M∥
|
219 |
+
(2)
|
220 |
+
s.t. div(M) + µ1 − µ2 = 0
|
221 |
+
M.n = 0 ∀x ∈ ∂Ω; n is normal to ∂Ω
|
222 |
+
Under appropriate discretisation, M = (Mx, My), M ∈
|
223 |
+
Rn×2 is flux vector satisfying zero flux boundary conditions.
|
224 |
+
µ1, µ2 ∈ Rn, and,
|
225 |
+
div(M) = (Mx[i, j]−Mx[i−1, j])+(My[i, j]−My[i, j−1])
|
226 |
+
and the zero-flux boundary conditions mean that Mx[i, j] =
|
227 |
+
My[i, j] = 0 outside the boundary. Eq 2 is favorable com-
|
228 |
+
pared to Eq 1 as it reduces the complexity from O(n2) to
|
229 |
+
O(n) [Li et al., 2018]. Motivated by the recent developments
|
230 |
+
of OT barycenters, we make use of Eq 2 to propose Beckman
|
231 |
+
barycenter as they can be efficiently solved using well known
|
232 |
+
techniques like [Goldstein and Osher, 2009], [Chambolle and
|
233 |
+
Pock, 2011].
|
234 |
+
DRO One of the influential works in DRO was proposed by
|
235 |
+
Scarf [Scarf, 1957]. Following this work, significant research
|
236 |
+
has been done in this field [Ben-Tal et al., 2009], [Duchi et
|
237 |
+
al., 2021], [Staib and Jegelka, 2017]. DRO aims to address
|
238 |
+
the problem of uncertainty or shift in the data distribution that
|
239 |
+
can arise due to measurement errors and admits a solution
|
240 |
+
for the worst case scenario. Let L(θ, x) be the loss function
|
241 |
+
where θ are network parameters. Then, DRO solves for,
|
242 |
+
inf
|
243 |
+
θ sup
|
244 |
+
Q∈Q
|
245 |
+
EQL(θ, x)
|
246 |
+
(3)
|
247 |
+
Here, Q is the distribution against which DRO minimizes
|
248 |
+
the loss. For instance, Q can be considered as a distribu-
|
249 |
+
tion set which contains perturbations of input samples x.
|
250 |
+
Here we note that adversarial training can be considered to
|
251 |
+
be a specific instance of DRO wherein the distribution Q is
|
252 |
+
drawn from adversarial samples. In our case, we consider the
|
253 |
+
barycenters as the samples drawn from the distribution Q and
|
254 |
+
thus provide robustness against perturbed samples.
|
255 |
+
2.1
|
256 |
+
Proposed Algorithm
|
257 |
+
In this work, we propose a novel Beckman Barycenter for-
|
258 |
+
mulation and derive the barycenter analytically. We use the
|
259 |
+
barycenter to demonstrate that it can be applied for adversar-
|
260 |
+
ial defense. We first obtain the barycenter using the marginals
|
261 |
+
from the given input image and then train the network using
|
262 |
+
barycenter.
|
263 |
+
While OT barycenters are a good choice for the distri-
|
264 |
+
bution Q in Eq 3, computing OT barycenter suffers from
|
265 |
+
high complexity and exponentially increases with the number
|
266 |
+
marginals [Fan et al., 2022]. To counter this high complexity
|
267 |
+
challenge, we first discuss an analogous barycenter problem
|
268 |
+
by building upon the formulation given in Eq 2.
|
269 |
+
inf
|
270 |
+
M1,M2
|
271 |
+
r1,r2,µ
|
272 |
+
∥M1∥2,1 + ∥M2∥2,1 + α(∥r1∥1
|
273 |
+
(4)
|
274 |
+
+∥r2∥1) + β∥µ∥1
|
275 |
+
s.t. div(M1) + µ1 − µ = r1
|
276 |
+
div(M2) + µ2 − µ = r2
|
277 |
+
where, r1, r2, µ ∈ Rn. Our formulation is loosely inspired
|
278 |
+
from the Beckman OT formulation that are given in [Li et al.,
|
279 |
+
2018], [Lee et al., 2020]. There are notable changes in Eq 4
|
280 |
+
from Eq 2. First we solve for Beckman barycenter µ in ad-
|
281 |
+
dition to other variables. Similar to Wasserstein barycenter
|
282 |
+
which acts as a representative of marginals using Wasserstein
|
283 |
+
metric, the Beckman barycenter µ minimizes the flux with
|
284 |
+
respect to input marginals µ1 and µ2. In our experiments,
|
285 |
+
these marginals are obtained by rotating the input image with
|
286 |
+
±4◦. Second, the variables r1 and r2 allow the mass to be
|
287 |
+
created or destroyed [Lee et al., 2020] and the regularization
|
288 |
+
over r1, r2 and µ ensure that these variable do not take ar-
|
289 |
+
bitrarily large values. Third, Eq 4 can be easily converted to
|
290 |
+
Lagrange formulation and solved in linear time using primal-
|
291 |
+
dual method of Chambolle and Pock [Chambolle and Pock,
|
292 |
+
2011].
|
293 |
+
In order to make the objective strongly convex, we first
|
294 |
+
apply proximal operators. The l2 regularizer makes the ob-
|
295 |
+
jective strongly convex. Using the proximal operator,
|
296 |
+
inf
|
297 |
+
M1,M2,r1
|
298 |
+
r2,µ′
|
299 |
+
1,µ′
|
300 |
+
2,µ
|
301 |
+
∥M1∥2,1 + ∥M2∥2,1 + α(∥r1∥1 (5)
|
302 |
+
+∥r2∥1) + 1
|
303 |
+
2ρ(∥µ′
|
304 |
+
1 − µ1∥2 + ∥µ′
|
305 |
+
2 − µ2∥2) + β∥µ∥1
|
306 |
+
s.t. div(M1) + µ′
|
307 |
+
1 − µ = r1
|
308 |
+
div(M2) + µ′
|
309 |
+
2 − µ = r2
|
310 |
+
The Lagrangian of Eq 5 is given as,
|
311 |
+
inf
|
312 |
+
M1,M2,r1
|
313 |
+
r2,µ′
|
314 |
+
1,µ′
|
315 |
+
2,µ
|
316 |
+
∥M1∥2,1 + ∥M2∥2,1 + α(∥r1∥1 (6)
|
317 |
+
+∥r2∥1) + 1
|
318 |
+
2ρ(∥µ′
|
319 |
+
1 − µ1∥2 + ∥µ′
|
320 |
+
2 − µ2∥2) + β∥µ∥1
|
321 |
+
+
|
322 |
+
�
|
323 |
+
i
|
324 |
+
⟨λi, div(Mi) + µ′
|
325 |
+
i − µ − ri⟩
|
326 |
+
Eq 6 can be solved using first-order primal dual method of
|
327 |
+
Chambolle and Pock [Chambolle and Pock, 2011]1.
|
328 |
+
Mt+1
|
329 |
+
i
|
330 |
+
← arg min
|
331 |
+
Mi
|
332 |
+
∥Mi∥2,1 + ⟨λi, div(Mi) + µ′
|
333 |
+
i−
|
334 |
+
µ − ri⟩ + 1
|
335 |
+
2τ1
|
336 |
+
∥Mi − Mt
|
337 |
+
i∥2
|
338 |
+
∀i = {1, 2}
|
339 |
+
µ′
|
340 |
+
i
|
341 |
+
t+1 ← arg min
|
342 |
+
µ′
|
343 |
+
i
|
344 |
+
1
|
345 |
+
2τ1
|
346 |
+
(∥µ′
|
347 |
+
i − µi∥2) + ⟨λi, µ′
|
348 |
+
i⟩
|
349 |
+
+ 1
|
350 |
+
2τ1
|
351 |
+
∥µ′
|
352 |
+
i − µ′
|
353 |
+
i
|
354 |
+
t∥2
|
355 |
+
rt+1
|
356 |
+
i
|
357 |
+
← arg min
|
358 |
+
ri
|
359 |
+
α∥ri∥1 + ⟨λt
|
360 |
+
i, ri⟩ + 1
|
361 |
+
2τ1
|
362 |
+
∥ri − rt
|
363 |
+
i∥2
|
364 |
+
µt+1 ← arg min
|
365 |
+
µ
|
366 |
+
∥µ∥1 + ⟨λt
|
367 |
+
i, µ⟩ + 1
|
368 |
+
2τ1
|
369 |
+
∥µ − µt∥2
|
370 |
+
λt+1
|
371 |
+
i
|
372 |
+
← arg max
|
373 |
+
λi
|
374 |
+
⟨λi, κt+1⟩ − 1
|
375 |
+
2τ2
|
376 |
+
∥λi − λt
|
377 |
+
i∥2,
|
378 |
+
1We use similar notations to that of [Li et al., 2018], [Chambolle
|
379 |
+
and Pock, 2011] for consistency and simplicity.
|
380 |
+
|
381 |
+
where, κt+1 = 2(div(Mi)t+1+µ′
|
382 |
+
i
|
383 |
+
t+1−rt+1
|
384 |
+
i
|
385 |
+
)−(div(Mi)t+
|
386 |
+
µ′
|
387 |
+
i
|
388 |
+
t − rt
|
389 |
+
i)
|
390 |
+
We now discuss the solution of each individual optimiza-
|
391 |
+
tion.
|
392 |
+
Solving for Mi: The rows mij of Mi can be expressed
|
393 |
+
and solved using l21 norm shrinkage operator,
|
394 |
+
mt+1
|
395 |
+
ij
|
396 |
+
← shrinkl2
|
397 |
+
τ1(mt
|
398 |
+
ij − τ1div∗(λt
|
399 |
+
i)j)
|
400 |
+
(7)
|
401 |
+
Here,
|
402 |
+
div∗
|
403 |
+
denotes the adjoint of div operator,
|
404 |
+
and
|
405 |
+
shrinkl2
|
406 |
+
τ1η = max(∥η∥2 − τ1, 0) ⊙
|
407 |
+
η
|
408 |
+
(∥η∥2). “⊙” denotes the
|
409 |
+
Hadamard product.
|
410 |
+
Solving for µ′
|
411 |
+
i:
|
412 |
+
µ′
|
413 |
+
i
|
414 |
+
t+1 ← max{0,
|
415 |
+
ρτ1
|
416 |
+
1 + ρτ1
|
417 |
+
µ′
|
418 |
+
i +
|
419 |
+
1
|
420 |
+
1 + ρτ1
|
421 |
+
(µ′
|
422 |
+
i
|
423 |
+
t − τ1λt
|
424 |
+
i)}, (8)
|
425 |
+
Solving for ri: We use an l1 shrinkage operator.
|
426 |
+
rt+1
|
427 |
+
i
|
428 |
+
← shrinkl1
|
429 |
+
ατ1(rt
|
430 |
+
i + τ1λt
|
431 |
+
i)
|
432 |
+
(9)
|
433 |
+
Here, shrinkl1
|
434 |
+
ατ1(η) = sign(η) ⊙ max(∥η∥ − ατ1, 0).
|
435 |
+
Solving for barycenter µ:
|
436 |
+
µt+1 ← shrinkl1
|
437 |
+
βτ1(µt + τ1(λt
|
438 |
+
1 + λt
|
439 |
+
2))
|
440 |
+
(10)
|
441 |
+
Solving for λ:
|
442 |
+
λt+1
|
443 |
+
i
|
444 |
+
← λt
|
445 |
+
i + τ2κt+1
|
446 |
+
(11)
|
447 |
+
2.2
|
448 |
+
Toy example
|
449 |
+
We demonstrate the barycenter computation using a Gaussian
|
450 |
+
image in Figure 2. The barycenter of clean samples, sample
|
451 |
+
with random noise and adversarial sample are shown. As we
|
452 |
+
see, for the clean case the barycenter is very similar to that of
|
453 |
+
the original image. In the second column where random noise
|
454 |
+
is added, the barycenter reduces the noise.
|
455 |
+
Similar effect
|
456 |
+
is also seen for the case where adversarial noise is present.
|
457 |
+
This indicates that non-linear interpolation of Barycenter sup-
|
458 |
+
presses the adversarial noise.
|
459 |
+
(a) Clean
|
460 |
+
(b) Random
|
461 |
+
(c) Adversarial
|
462 |
+
Figure 2: Top: Clean image, noisy image, adversarial image. Bot-
|
463 |
+
tom: Barycenter of clean image, noisy image, adversarial image.
|
464 |
+
2.3
|
465 |
+
Training
|
466 |
+
Let a model be given by fθ, the barycenter of clean samples
|
467 |
+
be denoted by x and its labels as y. We then optimize the
|
468 |
+
following loss
|
469 |
+
arg min
|
470 |
+
θ
|
471 |
+
1
|
472 |
+
n
|
473 |
+
n
|
474 |
+
�
|
475 |
+
i=1
|
476 |
+
LCE(fθ(xi), yi)
|
477 |
+
where LCE is the cross-entropy loss. We would like to em-
|
478 |
+
phasize that we do not perform adversarial training. Instead
|
479 |
+
we use an adversarially pretrained model. Thus, fθ is an ad-
|
480 |
+
versarial robust model and our training further enhances the
|
481 |
+
robustness. We also note that this optimization falls under
|
482 |
+
DRO as the samples used are barycenters which belong to the
|
483 |
+
distribution Q.
|
484 |
+
2.4
|
485 |
+
Theoretical analysis
|
486 |
+
We first present a convergence analysis of Eq 6.
|
487 |
+
Theorem 1.
|
488 |
+
Let τ1τ2(λmax(∇2) + 3)
|
489 |
+
<
|
490 |
+
1, where
|
491 |
+
λmax(∇2) denotes the largest eigenvalue of discrete Lapla-
|
492 |
+
cian operator ∇2 = DD⊤, where D is the matrix repre-
|
493 |
+
senting div operator. Then, the iterations Mt
|
494 |
+
i, µ′
|
495 |
+
i
|
496 |
+
t
|
497 |
+
i, µt, rt
|
498 |
+
i, λt
|
499 |
+
converge to the saddle point solution of the Lagrangian
|
500 |
+
M∗
|
501 |
+
i , µ∗
|
502 |
+
i , µ∗, r∗
|
503 |
+
i , λ∗.
|
504 |
+
Proof: Let u = {M1, M2, µ2, µ2, µ, r}. Then, we write
|
505 |
+
Eq 6 as
|
506 |
+
L(u, λ) = G(u) + ⟨λ, ˜Kb⟩
|
507 |
+
where λ
|
508 |
+
=
|
509 |
+
[λ1; λ2],
|
510 |
+
K
|
511 |
+
=
|
512 |
+
[D, I, −I, −I],
|
513 |
+
˜K
|
514 |
+
=
|
515 |
+
[K, 0; 0, K], b = [b1; b2], b1 = [vec(M1); µ′
|
516 |
+
1; µ; r1]; b2 =
|
517 |
+
[vec(M2); µ′
|
518 |
+
2; µ; r2].
|
519 |
+
The function G
|
520 |
+
=
|
521 |
+
∥M1∥2,1 +
|
522 |
+
∥M2∥2,1 + α(∥r1∥1 + ∥r2∥1) +
|
523 |
+
1
|
524 |
+
2ρ(∥µ′
|
525 |
+
1 − µ1∥2 + ∥µ′
|
526 |
+
2 −
|
527 |
+
µ2∥2) + β∥µ∥1 is convex and ˜K is a linear operator. These
|
528 |
+
conditions satisfy Theorem 1 of [Chambolle and Pock, 2011].
|
529 |
+
If λmax(∇2) is the max eigenvalue of DD⊤, then the max
|
530 |
+
eigenvalue of [D, ±I][D, ±I]⊤ is λmax(∇2) + 1. Similarly,
|
531 |
+
for KK⊤, it is λmax(∇2) + 3. Since ˜K is obtained from
|
532 |
+
K by padding zeros only, ˜K has the same max eigenvalue
|
533 |
+
as that of K. Further, since ∥ ˜K ˜K⊤∥2
|
534 |
+
2 ≥ λmax( ˜K ˜K⊤) =
|
535 |
+
λmax(∇2) + 3, we can also write the convergence criteria as
|
536 |
+
τ1τ2∥ ˜K ˜K⊤∥2
|
537 |
+
2 < 1.
|
538 |
+
Since we solve for the Lagrangian dual function, we anal-
|
539 |
+
yse the primal dual gap which is given as [Jacobs et al., 2019]
|
540 |
+
G(u, λ) =
|
541 |
+
sup
|
542 |
+
∥λ′−λ0∥≤R1
|
543 |
+
L(u, λ′) −
|
544 |
+
inf
|
545 |
+
∥u′−u0∥≤R2L(u′, λ)
|
546 |
+
Theorem 2.
|
547 |
+
Suppose the step sizes τ1 and τ2 satisfy
|
548 |
+
τ1τ2∥ ˜K ˜K⊤∥2
|
549 |
+
2 < 1. Let uN =
|
550 |
+
1
|
551 |
+
N
|
552 |
+
�N
|
553 |
+
n=1 un and λN =
|
554 |
+
1
|
555 |
+
N
|
556 |
+
�N
|
557 |
+
n=1 λn, where un and λn are sequences generated from
|
558 |
+
Eqns 7 - 11. Then after N iterations, we have,
|
559 |
+
G(u, λ) ≤ sup
|
560 |
+
u,λ
|
561 |
+
1
|
562 |
+
2N
|
563 |
+
�
|
564 |
+
∥u − u0∥2
|
565 |
+
τ1
|
566 |
+
+ ∥λ − λ0∥2
|
567 |
+
τ2
|
568 |
+
�
|
569 |
+
This rate is similar to convergence rates in gradient descent
|
570 |
+
and shows that the gap converges with rate O(1/N). For
|
571 |
+
brevity, we omit the proof and it can be derived as an exten-
|
572 |
+
sion of Theorem 1 [Chambolle and Pock, 2011].
|
573 |
+
|
574 |
+
2.5
|
575 |
+
Mutual Information
|
576 |
+
In order to understand the underlying reason behind the per-
|
577 |
+
formance of our method, we provide more insights using
|
578 |
+
mutual information (MI). We first note that the MI between
|
579 |
+
two random variables is given by I(X, y) = H(P(y)) −
|
580 |
+
E
|
581 |
+
P (x)[H(P(y|X))]. In our case, we take the random variables
|
582 |
+
as model parameters θ and softmax output y. Then, given a
|
583 |
+
sample x and dataset D,
|
584 |
+
I(θ, y|D, x) = H(p(y|x, D)) −
|
585 |
+
E
|
586 |
+
p(θ|D)
|
587 |
+
H(p(y|x, θ)) (12)
|
588 |
+
Eq 12 measures the information shared between θ and y.
|
589 |
+
A tractable way of computing I(θ, y|D, x) is given in [Smith
|
590 |
+
and Gal, 2018], [Houlsby et al., 2011].
|
591 |
+
I(θ, y|D, x) = 1
|
592 |
+
C
|
593 |
+
C
|
594 |
+
�
|
595 |
+
j=1
|
596 |
+
1
|
597 |
+
n
|
598 |
+
n
|
599 |
+
�
|
600 |
+
i=1
|
601 |
+
(pij − ˆp)2
|
602 |
+
(13)
|
603 |
+
where, ˆp ∈ [0, 1]C is computed as the mean of all softmax
|
604 |
+
probabilities, C is the number of classes, pi ∈ [0, 1]C, pij ∈
|
605 |
+
[0, 1] denotes the softmax probability for a particular class j.
|
606 |
+
A higher I indicates that knowing θ (or y) gives a higher
|
607 |
+
information about y (or θ). In other words, the model will
|
608 |
+
perform better if the mutual information is high.
|
609 |
+
In addition, we also compute MI between the predictions
|
610 |
+
for the following two cases - (i) clean test set and adversarial
|
611 |
+
test set, and (ii) barycenter of clean test set and barycenter of
|
612 |
+
adversarial test set using [Ji et al., 2019]. Given a model f
|
613 |
+
paramterised by θ, clean sample xi and its adversarial coun-
|
614 |
+
terpart x′
|
615 |
+
i, the joint probability distribution between natural
|
616 |
+
and adversarial samples is given by the following C × C ma-
|
617 |
+
trix,
|
618 |
+
I(f(xi, θ), f(x′, θ)) =
|
619 |
+
C
|
620 |
+
�
|
621 |
+
y=1
|
622 |
+
C
|
623 |
+
�
|
624 |
+
y′=1
|
625 |
+
Pyy′ ln Pyy′
|
626 |
+
PyPy′
|
627 |
+
(14)
|
628 |
+
where, Pyy′ is given as,
|
629 |
+
Pyy′ = 1
|
630 |
+
n
|
631 |
+
n
|
632 |
+
�
|
633 |
+
i=1
|
634 |
+
f(xi, θ)f(x′
|
635 |
+
i, θ)⊤
|
636 |
+
(15)
|
637 |
+
and the marginals Py, Py′ are obtained by row and column
|
638 |
+
sum of Pyy′. A higher value of I(., .) indicates that know-
|
639 |
+
ing about clean samples gives a higher amount of information
|
640 |
+
about the adversarial samples.
|
641 |
+
3
|
642 |
+
Experiments
|
643 |
+
We present elaborate experimental results on CIFAR-10,
|
644 |
+
CIFAR-100 and Tiny ImageNet. We use strong baseline of
|
645 |
+
LAS [Jia et al., 2022]. We also show improvements over
|
646 |
+
other baselines - LBGAT [Cui et al., 2021], PGD-AT [Madry
|
647 |
+
et al., 2017], TRADES [Zhang et al., 2019], RST [Carmon
|
648 |
+
et al., 2019]. We compare against several popular adversarial
|
649 |
+
training models, MART [Wang et al., 2019b], AWP-A2 [Xu
|
650 |
+
et al., 2022], RST-RWT [Yu et al., 2022], TRADESAWP [Wu
|
651 |
+
et al., 2020], AWP [Wu et al., 2020], LASAT, LASTRADES,
|
652 |
+
LASAWP [Jia et al., 2022]. We also compare with adaptive test
|
653 |
+
time defenses HedgeRST [Wu et al., 2021] and TRADESSSL
|
654 |
+
[Mao et al., 2021]. In the Tables, we use “+B” to indicate the
|
655 |
+
results obtained using our approach.
|
656 |
+
3.1
|
657 |
+
Implementation details
|
658 |
+
In case of CIFAR10 and CIFAR100, WideResNet34-10 is
|
659 |
+
used and for Tiny ImageNet PreActResnet18 is used. Ad-
|
660 |
+
ditionally, we evaluate on CIFAR-10 with WideResNet28-
|
661 |
+
10, WideResNet32-10, WideResNet70-16 and on CIFAR-
|
662 |
+
100 with WideResNet34-20. We use these models for a fair
|
663 |
+
comparison with existing works as these models are widely
|
664 |
+
used for adversarial defense evaluation. We evaluate against
|
665 |
+
different attacks namely FGSM, PGD-10, PGD-20, CW, and
|
666 |
+
AA using l∞ attack with ϵ = 8/255. Our evaluation proto-
|
667 |
+
cols are similar to the protocols given in [Zhang et al., 2019],
|
668 |
+
[Jia et al., 2022]. We would like to emphasize that we use the
|
669 |
+
checkpoints from the baseline models and perform a single
|
670 |
+
epoch training using clean barycenters. Upon increasing the
|
671 |
+
number of epochs, the clean accuracy improves, however, the
|
672 |
+
adversarial accuracy becomes comparable to that of baseline
|
673 |
+
and further increasing epochs leads to subsequent drop in ac-
|
674 |
+
curacy against adversarial samples. We use SGD optimizer
|
675 |
+
with a learning rate of 1e-4, momentum = 0.9 without any
|
676 |
+
weight decay.
|
677 |
+
In order to compute the barycenter, we set ρ = 5e−1, τ1 =
|
678 |
+
1e − 1, τ2 = α = β = 1 and iterations is set to 200. While
|
679 |
+
one can also attack the barycenter, we give experiments for
|
680 |
+
the case where the clean image is attacked. This is because
|
681 |
+
the barycenter itself lies at an ϵ which is greater than attacker’
|
682 |
+
budget. Thus attacking barycenter has little incentive as in
|
683 |
+
that case the attacked image will lie at an ϵ outside the given
|
684 |
+
ϵ = 8/255 for the l∞ attack.
|
685 |
+
3.2
|
686 |
+
Comparison on CIFAR-10
|
687 |
+
In Table 1, we observe that clean performance is better
|
688 |
+
for the models trained with barycenters - TRADESAWP+B,
|
689 |
+
LBGAT+B, LASTRADES+B and RST+B. Amongst WRN-
|
690 |
+
28-10 models, RST has the best clean performance and our
|
691 |
+
method enhances it by 1%. In PGD-10, there is a rise of
|
692 |
+
2.57%. In case of AA, there is a boost of 6.49%.
|
693 |
+
In case of WRN-34-10, LASAT+B shows a huge boost
|
694 |
+
of 10% under AA. Further, LASAWP+B shows the best per-
|
695 |
+
formance under PGD-10, PGD-20 and CW attack amongst
|
696 |
+
WRN-34-10 models. Under AA it shows an improvement of
|
697 |
+
7.71%.
|
698 |
+
Comparison with Adversarial Purification models Our
|
699 |
+
RST+B model outperforms Hedge∗
|
700 |
+
RST under all the cases.
|
701 |
+
Against AA, our approach gives 3.1% higher accuracy
|
702 |
+
compared to Hedge∗
|
703 |
+
RST.
|
704 |
+
We also see that compared to
|
705 |
+
TRADESSSL, TRADESAWP has a better performance.
|
706 |
+
3.3
|
707 |
+
Comparison on CIFAR-100
|
708 |
+
In Table 2, we observe that our method gives a significant
|
709 |
+
boost under all the cases. In case of strong baseline LASAWP,
|
710 |
+
our method increases the performance by 0.85% under clean
|
711 |
+
accuracy. For PGD-20, there is a rise of 0.91%. In case of
|
712 |
+
CW, there is an increase of 18.35%. In other models such as
|
713 |
+
LBGAT, we see a rise of 5.4% in clean accuracy.
|
714 |
+
3.4
|
715 |
+
Comparison with Curriculum based AT
|
716 |
+
In Table 3, we compare against curriculum based AT meth-
|
717 |
+
ods like CAT [Cai et al., 2018], FAT [Zhang et al., 2020] and
|
718 |
+
|
719 |
+
Table 1: CIFAR-10.
|
720 |
+
∗ indicates that the model uses WRN-28-10.
|
721 |
+
Bold font is used to indicate the best performance amongst WRN-
|
722 |
+
34-10 and Red color font is used to indicate the best performance
|
723 |
+
amongst WRN-28-10.
|
724 |
+
Method
|
725 |
+
Clean
|
726 |
+
PGD10
|
727 |
+
PGD20
|
728 |
+
CW
|
729 |
+
AA
|
730 |
+
Adversarial Training
|
731 |
+
PGD-AT
|
732 |
+
85.17
|
733 |
+
56.07
|
734 |
+
55.08
|
735 |
+
53.91
|
736 |
+
51.69
|
737 |
+
TRADES
|
738 |
+
85.72
|
739 |
+
56.75
|
740 |
+
56.10
|
741 |
+
53.87
|
742 |
+
53.40
|
743 |
+
MART
|
744 |
+
84.17
|
745 |
+
58.98
|
746 |
+
58.56
|
747 |
+
54.58
|
748 |
+
51.10
|
749 |
+
AWP-A2
|
750 |
+
87.54
|
751 |
+
-
|
752 |
+
59.50
|
753 |
+
57.42
|
754 |
+
54.86
|
755 |
+
RST-RWT∗
|
756 |
+
88.87
|
757 |
+
-
|
758 |
+
64.11
|
759 |
+
62.03
|
760 |
+
60.36
|
761 |
+
Adversarial Purification
|
762 |
+
TRADESSSL
|
763 |
+
82.12
|
764 |
+
-
|
765 |
+
-
|
766 |
+
-
|
767 |
+
60.67
|
768 |
+
Hedge∗
|
769 |
+
RST
|
770 |
+
88.64
|
771 |
+
-
|
772 |
+
-
|
773 |
+
73.89
|
774 |
+
63.10
|
775 |
+
Adversarial and Barycentric Training
|
776 |
+
TRADESAWP
|
777 |
+
85.36
|
778 |
+
59.58
|
779 |
+
59.25
|
780 |
+
57.07
|
781 |
+
56.17
|
782 |
+
+B
|
783 |
+
87.32
|
784 |
+
62.60
|
785 |
+
62.32
|
786 |
+
75.85
|
787 |
+
65.32
|
788 |
+
LBGAT
|
789 |
+
88.22
|
790 |
+
56.25
|
791 |
+
54.60
|
792 |
+
54.29
|
793 |
+
52.23
|
794 |
+
+B
|
795 |
+
88.38
|
796 |
+
59.28
|
797 |
+
58.43
|
798 |
+
74.61
|
799 |
+
61.22
|
800 |
+
LASAT
|
801 |
+
86.23
|
802 |
+
57.11
|
803 |
+
56.41
|
804 |
+
55.54
|
805 |
+
53.58
|
806 |
+
+B
|
807 |
+
86.21
|
808 |
+
61.08
|
809 |
+
60.64
|
810 |
+
74.09
|
811 |
+
63.59
|
812 |
+
LASTRADES
|
813 |
+
85.24
|
814 |
+
57.66
|
815 |
+
57.07
|
816 |
+
55.45
|
817 |
+
54.15
|
818 |
+
+B
|
819 |
+
86.15
|
820 |
+
60.32
|
821 |
+
60.03
|
822 |
+
73.75
|
823 |
+
63.43
|
824 |
+
LASAWP
|
825 |
+
87.74
|
826 |
+
61.09
|
827 |
+
60.16
|
828 |
+
58.22
|
829 |
+
55.52
|
830 |
+
+B
|
831 |
+
87.45
|
832 |
+
63.66
|
833 |
+
61.16
|
834 |
+
74.81
|
835 |
+
63.23
|
836 |
+
RST∗
|
837 |
+
89.69
|
838 |
+
63.48
|
839 |
+
62.51
|
840 |
+
61.06
|
841 |
+
59.71
|
842 |
+
+B∗
|
843 |
+
90.68
|
844 |
+
65.12
|
845 |
+
64.38
|
846 |
+
77.08
|
847 |
+
66.20
|
848 |
+
DART [Wang et al., 2019a]. Under FGSM, PGD-20 and CW,
|
849 |
+
our model shows a huge improvement. In case of clean sam-
|
850 |
+
ples, we see that the accuracy of FAT+B compared to FAT is
|
851 |
+
less. This may be due to the fact that FAT employs curricu-
|
852 |
+
lum learning in the training whereas our method does not use
|
853 |
+
curriculum learning.
|
854 |
+
3.5
|
855 |
+
Comparison on Tiny ImageNet
|
856 |
+
We present the results in Table 4. In comparison to baselines,
|
857 |
+
our method shows significant improvement in all cases. For
|
858 |
+
LASAWP, our method improves the performance under clean
|
859 |
+
samples by 1.65%. In case of PGD-50, our method shows
|
860 |
+
a rise of 1.28%, and in case of CW attack, our method al-
|
861 |
+
most doubles the accuracy. Under AA, LASTRADES observes
|
862 |
+
a maximum performance rise by 11.51%.
|
863 |
+
3.6
|
864 |
+
Analysis using Deeper and Wider Models
|
865 |
+
We use WRN-70-16 and WRN-34-20 to analyse the effect
|
866 |
+
when the models get deeper and wider. In particular, for clean
|
867 |
+
samples, we can observe that the deeper and wider models
|
868 |
+
give a better boost. In CIFAR-10, WRN-70-16 gives 88.87%
|
869 |
+
for clean samples which is 3.21% better than LASAWP model’
|
870 |
+
85.66%. In contrast, for WRN-34-10, our method gives accu-
|
871 |
+
racy similar to that of LASAWP. In CIFAR-100, our method
|
872 |
+
boosts the performance by 8.34% under AA. In other cases
|
873 |
+
also we see that the barycenters improve the performance by
|
874 |
+
a significant margin.
|
875 |
+
Table 2: CIFAR-100 WRN-34-10.
|
876 |
+
Method
|
877 |
+
Clean
|
878 |
+
PGD-10
|
879 |
+
PGD-20
|
880 |
+
CW
|
881 |
+
PGD-AT
|
882 |
+
60.89
|
883 |
+
32.19
|
884 |
+
31.69
|
885 |
+
30.10
|
886 |
+
TRADES
|
887 |
+
58.61
|
888 |
+
29.20
|
889 |
+
28.66
|
890 |
+
27.05
|
891 |
+
TRADESAWP
|
892 |
+
60.17
|
893 |
+
33.81
|
894 |
+
33.6
|
895 |
+
57.07
|
896 |
+
+B
|
897 |
+
63.67
|
898 |
+
36.34
|
899 |
+
36.15
|
900 |
+
51.92
|
901 |
+
LBGAT
|
902 |
+
60.64
|
903 |
+
35.13
|
904 |
+
34.53
|
905 |
+
30.65
|
906 |
+
+B
|
907 |
+
66.04
|
908 |
+
36.29
|
909 |
+
36.01
|
910 |
+
52.92
|
911 |
+
LASAT
|
912 |
+
61.8
|
913 |
+
33.27
|
914 |
+
32.83
|
915 |
+
31.12
|
916 |
+
+B
|
917 |
+
62.45
|
918 |
+
36.60
|
919 |
+
36.17
|
920 |
+
49.60
|
921 |
+
LASTRADES
|
922 |
+
60.62
|
923 |
+
32.82
|
924 |
+
32.51
|
925 |
+
29.51
|
926 |
+
+B
|
927 |
+
62.58
|
928 |
+
35.22
|
929 |
+
34.96
|
930 |
+
50.99
|
931 |
+
LASAWP
|
932 |
+
64.89
|
933 |
+
37.11
|
934 |
+
36.36
|
935 |
+
33.92
|
936 |
+
+B
|
937 |
+
65.50
|
938 |
+
37.55
|
939 |
+
37.27
|
940 |
+
52.27
|
941 |
+
Table 3: CIFAR-10 WRN-32-10.
|
942 |
+
Method
|
943 |
+
Clean
|
944 |
+
FGSM
|
945 |
+
PGD-20
|
946 |
+
CW
|
947 |
+
CAT
|
948 |
+
77.43
|
949 |
+
57.17
|
950 |
+
46.06
|
951 |
+
42.48
|
952 |
+
DART
|
953 |
+
85.03
|
954 |
+
63.53
|
955 |
+
48.70
|
956 |
+
47.27
|
957 |
+
FAT
|
958 |
+
89.34
|
959 |
+
65.52
|
960 |
+
46.13
|
961 |
+
46.82
|
962 |
+
+B
|
963 |
+
84.59
|
964 |
+
69.98
|
965 |
+
57.02
|
966 |
+
71.36
|
967 |
+
3.7
|
968 |
+
TSNE
|
969 |
+
In Figure 3, we show the tsne plots for MNIST testset with
|
970 |
+
classes 0 and 1. Here, we use a weak MNIST model which
|
971 |
+
has only two dimensions before the classification layer. We
|
972 |
+
deliberately chose a weak model so that we can easily show
|
973 |
+
the effect in low dimensions. Though higher dmensions could
|
974 |
+
be taken, the effect cannot be easily seen due to a highly non-
|
975 |
+
linear transformation from high to low dimension of tsne. We
|
976 |
+
can see that the two clusters yellow and purple are well sepa-
|
977 |
+
rated for clean and barycenters of clean images. In case of ad-
|
978 |
+
versarial samples, the points overlap on each other. However,
|
979 |
+
when we take barycenter of adversarial samples, we again
|
980 |
+
see that the clusters are well separated, similar to the case of
|
981 |
+
clean images. Thus, it is evident that the barycenter nullifies
|
982 |
+
the effect of adversarial noise.
|
983 |
+
(a) Clean
|
984 |
+
(b) Barycenter
|
985 |
+
(c) Attacked
|
986 |
+
(d) Adv.+Bary.
|
987 |
+
Figure 3: Left to right: Plot of 2D features of Clean image, Barycen-
|
988 |
+
ter of clean image, Attacked image, Barycenter of adversarial image.
|
989 |
+
MNIST model obtains 51% accuracy and has only 2D feature vector
|
990 |
+
before the classification layer.
|
991 |
+
3.8
|
992 |
+
Mutual Information
|
993 |
+
In Table 6, we present the study of mutual information. We
|
994 |
+
use LASAT and LASTRADES on CIFAR-10. The MI is com-
|
995 |
+
puted using Eq 12 and Eq 14. Here we note that the MI for
|
996 |
+
LASAT+B is more for training set compared to that of LASAT.
|
997 |
+
|
998 |
+
Table 4: Tiny ImageNet PreActResNet18.
|
999 |
+
Method
|
1000 |
+
Clean
|
1001 |
+
PGD-50
|
1002 |
+
CW
|
1003 |
+
AA
|
1004 |
+
LASAT
|
1005 |
+
44.86
|
1006 |
+
22.16
|
1007 |
+
18.54
|
1008 |
+
16.74
|
1009 |
+
+B
|
1010 |
+
45.12
|
1011 |
+
24.54
|
1012 |
+
37.14
|
1013 |
+
27.78
|
1014 |
+
LASTRADES
|
1015 |
+
41.38
|
1016 |
+
18.36
|
1017 |
+
14.50
|
1018 |
+
14.08
|
1019 |
+
+B
|
1020 |
+
43.07
|
1021 |
+
19.25
|
1022 |
+
35.13
|
1023 |
+
25.59
|
1024 |
+
LASAWP
|
1025 |
+
45.26
|
1026 |
+
23.42
|
1027 |
+
19.88
|
1028 |
+
18.42
|
1029 |
+
+B
|
1030 |
+
46.91
|
1031 |
+
24.70
|
1032 |
+
37.93
|
1033 |
+
27.00
|
1034 |
+
Table 5: CIFAR-10 (C-10) WRN-70-16 and CIFAR-100 (C-100)
|
1035 |
+
WRN-34-20.
|
1036 |
+
Dataset
|
1037 |
+
Method
|
1038 |
+
Clean
|
1039 |
+
FGSM
|
1040 |
+
CW
|
1041 |
+
AA
|
1042 |
+
C-10
|
1043 |
+
LASAWP
|
1044 |
+
85.66
|
1045 |
+
70.25
|
1046 |
+
58.44
|
1047 |
+
57.61
|
1048 |
+
+B
|
1049 |
+
88.87
|
1050 |
+
74.04
|
1051 |
+
75.40
|
1052 |
+
62.54
|
1053 |
+
C-100
|
1054 |
+
LBGAT
|
1055 |
+
62.55
|
1056 |
+
43.16
|
1057 |
+
31.72
|
1058 |
+
31.92
|
1059 |
+
+B
|
1060 |
+
66.86
|
1061 |
+
50.92
|
1062 |
+
54.19
|
1063 |
+
40.26
|
1064 |
+
This indicates that the information available about the labels
|
1065 |
+
given the model parameters is high and in turn gives a better
|
1066 |
+
clean accuracy. In case of adversarial samples too, we see that
|
1067 |
+
the MI is higher for our case. This indicates that the model
|
1068 |
+
has better prediction for these samples. Further, the measure
|
1069 |
+
for test set is smaller compared to training set which is ex-
|
1070 |
+
pected as the model carries more information about train set
|
1071 |
+
compared to test set.
|
1072 |
+
Table 6: CIFAR-10 WRN-34-10.
|
1073 |
+
Method
|
1074 |
+
Train
|
1075 |
+
Test
|
1076 |
+
FGSM
|
1077 |
+
CW
|
1078 |
+
LASAT
|
1079 |
+
0.029
|
1080 |
+
0.026
|
1081 |
+
0.020
|
1082 |
+
0.019
|
1083 |
+
+B
|
1084 |
+
0.034
|
1085 |
+
0.029
|
1086 |
+
0.023
|
1087 |
+
0.022
|
1088 |
+
LASTRADES
|
1089 |
+
0.048
|
1090 |
+
0.040
|
1091 |
+
0.033
|
1092 |
+
0.032
|
1093 |
+
+B
|
1094 |
+
0.054
|
1095 |
+
0.045
|
1096 |
+
0.037
|
1097 |
+
0.036
|
1098 |
+
In Table 7, we present the results obtained using Eq 14. We
|
1099 |
+
observe that for the model trained with barycenter, the MI is
|
1100 |
+
higher between the barycenter of clean and adversarial sam-
|
1101 |
+
ples. Thus, the model does better on barycenter of adversarial
|
1102 |
+
samples compared to baseline LASAT and TRADESAWP. This
|
1103 |
+
is consistent across FGSM, PGD-10 and CW attacks.
|
1104 |
+
3.9
|
1105 |
+
Sensitivity to Barycenter Parameters
|
1106 |
+
In Figure 4, we demonstrate the sensitivity to different pa-
|
1107 |
+
rameters involved in the computation of barycenter. In the top
|
1108 |
+
row, we fix the number of iterations to 200 and τ1 = 1e − 1.
|
1109 |
+
Here we observe that increasing τ2 makes the barycenter
|
1110 |
+
brighter. In the second row, increasing τ1 makes the barycen-
|
1111 |
+
ter darker. Decreasing iterations has a similar effect in the last
|
1112 |
+
row. We see that unless there is a change of order of magni-
|
1113 |
+
tude, the appearance does not substantially change. Thus, our
|
1114 |
+
proposed Beckman barycenter is robust with respect to the
|
1115 |
+
parameter settings.
|
1116 |
+
4
|
1117 |
+
Conclusion
|
1118 |
+
In this work we introduce Beckman barycenter analogous to
|
1119 |
+
Wasserstein barycenter. We use the Beckman OT formula-
|
1120 |
+
Table 7: Mutial Information for CIFAR-10 WRN-34-10.
|
1121 |
+
Method
|
1122 |
+
FGSM
|
1123 |
+
PGD-10
|
1124 |
+
CW
|
1125 |
+
LASAT
|
1126 |
+
0.218
|
1127 |
+
0.198
|
1128 |
+
0.203
|
1129 |
+
+B
|
1130 |
+
0.275
|
1131 |
+
0.241
|
1132 |
+
0.264
|
1133 |
+
LASTRADES
|
1134 |
+
0.576
|
1135 |
+
0.554
|
1136 |
+
0.563
|
1137 |
+
+B
|
1138 |
+
0.629
|
1139 |
+
0.572
|
1140 |
+
0.618
|
1141 |
+
Figure 4: Top row: Blue boundary represent the given image.
|
1142 |
+
Barycenter for iterations = 200, τ1 = 1e − 1, τ2 = 1, 1e-1, 1e-2,
|
1143 |
+
1e-3. Second: barycenter for iterations = 200, τ1=1, 1e-1, 1e-2, 1e-
|
1144 |
+
3, τ2 = 1. Third: iterations = 200, 100, 50, 10, τ1=1e-1, τ2=1. The
|
1145 |
+
red boundary indicates the images obtained from default settings of
|
1146 |
+
the paramater which are used for all experiments.
|
1147 |
+
tion and analytically solve for the barycenter. Defining the
|
1148 |
+
baycenter using Beckman OT also has the advantage that the
|
1149 |
+
computational tools to obtain barycenter are well known and
|
1150 |
+
efficient. This overcomes the complexity in solving Wasser-
|
1151 |
+
stein barycenters. Further, we show that barycenter can be
|
1152 |
+
used for enhancing the performance of adversarially trained
|
1153 |
+
models. Our training is very efficient as we only need a sin-
|
1154 |
+
gle epoch. We theoretically show that our barycenters can
|
1155 |
+
help in defending against attacks. We perform rigorous qual-
|
1156 |
+
itative and quantitaive analysis to show the effectivenes of
|
1157 |
+
barycenter. Experimental analysis on CIFAR-10, CIFAR-100
|
1158 |
+
and Tiny ImageNet demonstrates state-of-art results against
|
1159 |
+
wide variety of attacks.
|
1160 |
+
References
|
1161 |
+
[Agueh and Carlier, 2011] Martial Agueh and Guillaume
|
1162 |
+
Carlier. Barycenters in the wasserstein space. SIAM Jour-
|
1163 |
+
nal on Mathematical Analysis, 43(2):904–924, 2011.
|
1164 |
+
[Athalye et al., 2018] Anish Athalye, Logan Engstrom, An-
|
1165 |
+
drew Ilyas, and Kevin Kwok. Synthesizing robust adver-
|
1166 |
+
sarial examples. In ICML, pages 284–293. PMLR, 2018.
|
1167 |
+
[Bai et al., 2021] Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen,
|
1168 |
+
and Qian Wang. Recent advances in adversarial training
|
1169 |
+
for adversarial robustness. In IJCAI, 2021.
|
1170 |
+
[Beckmann, 1952] Martin Beckmann. A continuous model
|
1171 |
+
of transportation. Econometrica: Journal of the Econo-
|
1172 |
+
metric Society, pages 643–660, 1952.
|
1173 |
+
|
1174 |
+
[Ben-Tal et al., 2009] Aharon Ben-Tal, Laurent El Ghaoui,
|
1175 |
+
and Arkadi Nemirovski. Robust optimization, volume 28.
|
1176 |
+
Princeton university press, 2009.
|
1177 |
+
[Cai et al., 2018] Qi-Zhi Cai, Min Du, Chang Liu, and Dawn
|
1178 |
+
Song.
|
1179 |
+
Curriculum adversarial training.
|
1180 |
+
arXiv preprint
|
1181 |
+
arXiv:1805.04807, 2018.
|
1182 |
+
[Carlini and Wagner, 2017] Nicholas
|
1183 |
+
Carlini
|
1184 |
+
and
|
1185 |
+
David
|
1186 |
+
Wagner.
|
1187 |
+
Towards evaluating the robustness of neural
|
1188 |
+
networks. In Symposium on security and privacy, pages
|
1189 |
+
39–57, 2017.
|
1190 |
+
[Carmon et al., 2019] Yair Carmon,
|
1191 |
+
Aditi Raghunathan,
|
1192 |
+
Ludwig Schmidt, John C Duchi, and Percy S Liang. Un-
|
1193 |
+
labeled data improves adversarial robustness.
|
1194 |
+
NeurIPS,
|
1195 |
+
2019.
|
1196 |
+
[Chambolle and Pock, 2011] Antonin
|
1197 |
+
Chambolle
|
1198 |
+
and
|
1199 |
+
Thomas Pock.
|
1200 |
+
A first-order primal-dual algorithm for
|
1201 |
+
convex problems with applications to imaging. Journal of
|
1202 |
+
mathematical imaging and vision, 40(1):120–145, 2011.
|
1203 |
+
[Cheng et al., 2022] Minhao Cheng, Qi Lei, Pin-Yu Chen,
|
1204 |
+
Inderjit Dhillon, and Cho-Jui Hsieh. Cat: Customized ad-
|
1205 |
+
versarial training for improved robustness. In IJCAI, 2022.
|
1206 |
+
[Croce and Hein, 2020] Francesco Croce and Matthias Hein.
|
1207 |
+
Reliable evaluation of adversarial robustness with an en-
|
1208 |
+
semble of diverse parameter-free attacks. In ICML, pages
|
1209 |
+
2206–2216. PMLR, 2020.
|
1210 |
+
[Cui et al., 2021] Jiequan Cui, Shu Liu, Liwei Wang, and Ji-
|
1211 |
+
aya Jia. Learnable boundary guided adversarial training.
|
1212 |
+
In ICCV, pages 15721–15730, 2021.
|
1213 |
+
[Cuturi and Doucet, 2014] Marco
|
1214 |
+
Cuturi
|
1215 |
+
and
|
1216 |
+
Arnaud
|
1217 |
+
Doucet. Fast computation of wasserstein barycenters. In
|
1218 |
+
ICML, pages 685–693. PMLR, 2014.
|
1219 |
+
[Cuturi and Peyr´e, 2016] Marco Cuturi and Gabriel Peyr´e. A
|
1220 |
+
smoothed dual approach for variational wasserstein prob-
|
1221 |
+
lems. SIAM Journal on Imaging Sciences, 9(1):320–343,
|
1222 |
+
2016.
|
1223 |
+
[Cuturi, 2013] Marco Cuturi.
|
1224 |
+
Sinkhorn distances: Light-
|
1225 |
+
speed computation of optimal transport.
|
1226 |
+
NeurIPS,
|
1227 |
+
26:2292–2300, 2013.
|
1228 |
+
[Duchi et al., 2021] John C Duchi, Peter W Glynn, and
|
1229 |
+
Hongseok Namkoong. Statistics of robust optimization:
|
1230 |
+
A generalized empirical likelihood approach. Mathemat-
|
1231 |
+
ics of Operations Research, 46(3):946–969, 2021.
|
1232 |
+
[Fan et al., 2022] Jiaojiao Fan, Isabel Haasler, Johan Karls-
|
1233 |
+
son, and Yongxin Chen. On the complexity of the optimal
|
1234 |
+
transport problem with graph-structured cost. In AISTATS,
|
1235 |
+
pages 9147–9165. PMLR, 2022.
|
1236 |
+
[Goldstein and Osher, 2009] Tom Goldstein and Stanley Os-
|
1237 |
+
her. The split bregman method for l1-regularized prob-
|
1238 |
+
lems. SIAM journal on imaging sciences, 2(2):323–343,
|
1239 |
+
2009.
|
1240 |
+
[Goodfellow et al., 2014] Ian
|
1241 |
+
J
|
1242 |
+
Goodfellow,
|
1243 |
+
Jonathon
|
1244 |
+
Shlens, and Christian Szegedy. Explaining and harnessing
|
1245 |
+
adversarial examples.
|
1246 |
+
arXiv preprint arXiv:1412.6572,
|
1247 |
+
2014.
|
1248 |
+
[Houlsby et al., 2011] Neil Houlsby, Ferenc Husz´ar, Zoubin
|
1249 |
+
Ghahramani, and M´at´e Lengyel. Bayesian active learning
|
1250 |
+
for classification and preference learning. arXiv preprint
|
1251 |
+
arXiv:1112.5745, 2011.
|
1252 |
+
[Jacobs et al., 2019] Matt Jacobs, Flavien L´eger, Wuchen Li,
|
1253 |
+
and Stanley Osher. Solving large-scale optimization prob-
|
1254 |
+
lems with a convergence rate independent of grid size.
|
1255 |
+
SIAM Journal on Numerical Analysis, 57(3):1100–1123,
|
1256 |
+
2019.
|
1257 |
+
[Ji et al., 2019] Xu Ji,
|
1258 |
+
Joao F Henriques,
|
1259 |
+
and Andrea
|
1260 |
+
Vedaldi. Invariant information clustering for unsupervised
|
1261 |
+
image classification and segmentation. In Proceedings of
|
1262 |
+
the IEEE/CVF International Conference on Computer Vi-
|
1263 |
+
sion, pages 9865–9874, 2019.
|
1264 |
+
[Jia et al., 2022] Xiaojun Jia, Yong Zhang, Baoyuan Wu,
|
1265 |
+
Ke Ma, Jue Wang, and Xiaochun Cao. Las-at: Adversar-
|
1266 |
+
ial training with learnable attack strategy. In CVPR, pages
|
1267 |
+
13398–13408, 2022.
|
1268 |
+
[Kannan et al., 2018] Harini Kannan, Alexey Kurakin, and
|
1269 |
+
Ian Goodfellow. Adversarial logit pairing. NIPS, 2018.
|
1270 |
+
[Kantorovich, 1942] L Kantorovich.
|
1271 |
+
On the transfer of
|
1272 |
+
masses (in russian).
|
1273 |
+
In Doklady Akademii Nauk, vol-
|
1274 |
+
ume 37, pages 227–229, 1942.
|
1275 |
+
[Kurakin et al., 2016] Alexey Kurakin, Ian Goodfellow, and
|
1276 |
+
Samy Bengio.
|
1277 |
+
Adversarial machine learning at scale.
|
1278 |
+
arXiv preprint arXiv:1611.01236, 2016.
|
1279 |
+
[Kwon et al., 2020] Yongchan
|
1280 |
+
Kwon,
|
1281 |
+
Wonyoung
|
1282 |
+
Kim,
|
1283 |
+
Joong-Ho Won, and Myunghee Cho Paik.
|
1284 |
+
Principled
|
1285 |
+
learning method for wasserstein distributionally robust
|
1286 |
+
optimization with local perturbations.
|
1287 |
+
In International
|
1288 |
+
Conference on Machine Learning, pages 5567–5576.
|
1289 |
+
PMLR, 2020.
|
1290 |
+
[Lacombe et al., 2021] Julien Lacombe, Julie Digne, Nico-
|
1291 |
+
las
|
1292 |
+
Courty,
|
1293 |
+
and
|
1294 |
+
Nicolas
|
1295 |
+
Bonneel.
|
1296 |
+
Learning
|
1297 |
+
to
|
1298 |
+
generate
|
1299 |
+
wasserstein
|
1300 |
+
barycenters.
|
1301 |
+
arXiv
|
1302 |
+
preprint
|
1303 |
+
arXiv:2102.12178, 2021.
|
1304 |
+
[Lee et al., 2020] John Lee,
|
1305 |
+
Nicholas P Bertrand,
|
1306 |
+
and
|
1307 |
+
Christopher J Rozell. Unbalanced optimal transport reg-
|
1308 |
+
ularization for imaging problems. IEEE Transactions on
|
1309 |
+
Computational Imaging, 6:1219–1232, 2020.
|
1310 |
+
[Li et al., 2018] Wuchen Li, Ernest K Ryu, Stanley Osher,
|
1311 |
+
Wotao Yin, and Wilfrid Gangbo. A parallel method for
|
1312 |
+
earth mover’s distance. Journal of Scientific Computing,
|
1313 |
+
75(1):182–197, 2018.
|
1314 |
+
[Li et al., 2021] Jincheng Li, Jiezhang Cao, Shuhai Zhang,
|
1315 |
+
Yanwu Xu, Jian Chen, and Mingkui Tan. Internal wasser-
|
1316 |
+
stein distance for adversarial attack and defense.
|
1317 |
+
arXiv
|
1318 |
+
preprint arXiv:2103.07598, 2021.
|
1319 |
+
[Madry et al., 2017] Aleksander
|
1320 |
+
Madry,
|
1321 |
+
Aleksandar
|
1322 |
+
Makelov,
|
1323 |
+
Ludwig
|
1324 |
+
Schmidt,
|
1325 |
+
Dimitris
|
1326 |
+
Tsipras,
|
1327 |
+
and
|
1328 |
+
Adrian Vladu.
|
1329 |
+
Towards deep learning models resistant
|
1330 |
+
to adversarial attacks. arXiv preprint arXiv:1706.06083,
|
1331 |
+
2017.
|
1332 |
+
[Mao et al., 2021] Chengzhi Mao, Mia Chiquier, Hao Wang,
|
1333 |
+
Junfeng Yang, and Carl Vondrick. Adversarial attacks are
|
1334 |
+
|
1335 |
+
reversible with natural supervision. In ICCV, pages 661–
|
1336 |
+
671, 2021.
|
1337 |
+
[Monge, 1781] Gaspard Monge. Memoir on the theory of
|
1338 |
+
cuttings and embankments.
|
1339 |
+
Histoire de l’Acad’e mie
|
1340 |
+
Royale des Sciences de Paris, 1781.
|
1341 |
+
[Moosavi-Dezfooli et al., 2016] Seyed-Mohsen
|
1342 |
+
Moosavi-
|
1343 |
+
Dezfooli, Alhussein Fawzi, and Pascal Frossard. Deep-
|
1344 |
+
fool: a simple and accurate method to fool deep neural
|
1345 |
+
networks. In CVPR, pages 2574–2582, 2016.
|
1346 |
+
[Nie et al., 2022] Weili Nie, Brandon Guo, Yujia Huang,
|
1347 |
+
Chaowei Xiao, Arash Vahdat, and Anima Anandkumar.
|
1348 |
+
Diffusion models for adversarial purification. ICML, 2022.
|
1349 |
+
[Papernot et al., 2016] Nicolas Papernot, Patrick McDaniel,
|
1350 |
+
Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Anan-
|
1351 |
+
thram Swami. The limitations of deep learning in adver-
|
1352 |
+
sarial settings. In European symposium on security and
|
1353 |
+
privacy, pages 372–387, 2016.
|
1354 |
+
[Rebuffi et al., 2021] Sylvestre-Alvise Rebuffi, Sven Gowal,
|
1355 |
+
Dan A Calian, Florian Stimberg, Olivia Wiles, and Timo-
|
1356 |
+
thy Mann. Fixing data augmentation to improve adversar-
|
1357 |
+
ial robustness. arXiv preprint arXiv:2103.01946, 2021.
|
1358 |
+
[Scarf, 1957] Herbert E Scarf. A min-max solution of an in-
|
1359 |
+
ventory problem. Rand Corporation Santa Monica, 1957.
|
1360 |
+
[Shi et al., 2021] Changhao Shi, Chester Holtz, and Gal
|
1361 |
+
Mishne.
|
1362 |
+
Online adversarial purification based on self-
|
1363 |
+
supervision. ICLR, 2021.
|
1364 |
+
[Smith and Gal, 2018] Lewis Smith and Yarin Gal. Under-
|
1365 |
+
standing measures of uncertainty for adversarial example
|
1366 |
+
detection. arXiv preprint arXiv:1803.08533, 2018.
|
1367 |
+
[Staib and Jegelka, 2017] Matthew
|
1368 |
+
Staib
|
1369 |
+
and
|
1370 |
+
Stefanie
|
1371 |
+
Jegelka.
|
1372 |
+
Distributionally robust deep learning as a
|
1373 |
+
generalization of adversarial training. In NIPS workshop
|
1374 |
+
on Machine Learning and Computer Security, volume 3,
|
1375 |
+
page 4, 2017.
|
1376 |
+
[Subramanyam and Raj, 2022] AV Subramanyam and Abhi-
|
1377 |
+
gyan Raj. Barycentric defense. In ICIP, pages 2276–2280,
|
1378 |
+
2022.
|
1379 |
+
[Szegedy et al., 2013] Christian
|
1380 |
+
Szegedy,
|
1381 |
+
Wojciech
|
1382 |
+
Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian
|
1383 |
+
Goodfellow, and Rob Fergus.
|
1384 |
+
Intriguing properties of
|
1385 |
+
neural networks. arXiv preprint arXiv:1312.6199, 2013.
|
1386 |
+
[Theagarajan et al., 2019] Rajkumar
|
1387 |
+
Theagarajan,
|
1388 |
+
Ming
|
1389 |
+
Chen, Bir Bhanu, and Jing Zhang. Shieldnets: Defending
|
1390 |
+
against adversarial attacks using probabilistic adversarial
|
1391 |
+
robustness. In CVPR, pages 6988–6996, 2019.
|
1392 |
+
[Wang et al., 2019a] Yisen Wang, Xingjun Ma, James Bai-
|
1393 |
+
ley, Jinfeng Yi, Bowen Zhou, and Quanquan Gu. On the
|
1394 |
+
convergence and robustness of adversarial training. In In-
|
1395 |
+
ternational Conference on Machine Learning, 2019.
|
1396 |
+
[Wang et al., 2019b] Yisen Wang, Difan Zou, Jinfeng Yi,
|
1397 |
+
James Bailey, Xingjun Ma, and Quanquan Gu. Improv-
|
1398 |
+
ing adversarial robustness requires revisiting misclassified
|
1399 |
+
examples. In International Conference on Learning Rep-
|
1400 |
+
resentations, 2019.
|
1401 |
+
[Wong et al., 2019] Eric Wong, Frank Schmidt, and Zico
|
1402 |
+
Kolter.
|
1403 |
+
Wasserstein adversarial examples via projected
|
1404 |
+
sinkhorn iterations. In ICML, pages 6808–6817. PMLR,
|
1405 |
+
2019.
|
1406 |
+
[Wong et al., 2020] Eric Wong, Leslie Rice, and J Zico
|
1407 |
+
Kolter. Fast is better than free: Revisiting adversarial train-
|
1408 |
+
ing. ICLR, 2020.
|
1409 |
+
[Wu et al., 2020] Dongxian Wu, Shu-Tao Xia, and Yisen
|
1410 |
+
Wang. Adversarial weight perturbation helps robust gen-
|
1411 |
+
eralization. NeurIPS, 33:2958–2969, 2020.
|
1412 |
+
[Wu et al., 2021] Boxi Wu, Heng Pan, Li Shen, Jindong Gu,
|
1413 |
+
Shuai Zhao, Zhifeng Li, Deng Cai, Xiaofei He, and Wei
|
1414 |
+
Liu.
|
1415 |
+
Attacking adversarial attacks as a defense.
|
1416 |
+
arXiv
|
1417 |
+
preprint arXiv:2106.04938, 2021.
|
1418 |
+
[Xie et al., 2019] Cihang Xie, Zhishuai Zhang, Yuyin Zhou,
|
1419 |
+
Song Bai, Jianyu Wang, Zhou Ren, and Alan L Yuille. Im-
|
1420 |
+
proving transferability of adversarial examples with input
|
1421 |
+
diversity. In CVPR, pages 2730–2739, 2019.
|
1422 |
+
[Xu et al., 2022] Zhuoer Xu,
|
1423 |
+
Guanghui Zhu,
|
1424 |
+
Changhua
|
1425 |
+
Meng, Shiwen Cui, Zhenzhe Ying, Weiqiang Wang, Ming
|
1426 |
+
Gu, and Yihua Huang.
|
1427 |
+
A2:
|
1428 |
+
Efficient automated at-
|
1429 |
+
tacker for boosting adversarial training.
|
1430 |
+
arXiv preprint
|
1431 |
+
arXiv:2210.03543, 2022.
|
1432 |
+
[Yoon et al., 2021] Jongmin Yoon, Sung Ju Hwang, and
|
1433 |
+
Juho Lee. Adversarial purification with score-based gen-
|
1434 |
+
erative models. In ICML, 2021.
|
1435 |
+
[Yu et al., 2022] Chaojian Yu, Bo Han, Mingming Gong,
|
1436 |
+
Li Shen, Shiming Ge, Bo Du, and Tongliang Liu.
|
1437 |
+
Ro-
|
1438 |
+
bust weight perturbation for adversarial training. In IJCAI,
|
1439 |
+
2022.
|
1440 |
+
[Zhang et al., 2019] Hongyang Zhang, Yaodong Yu, Jiantao
|
1441 |
+
Jiao, Eric Xing, Laurent El Ghaoui, and Michael Jordan.
|
1442 |
+
Theoretically principled trade-off between robustness and
|
1443 |
+
accuracy. In ICML, pages 7472–7482. PMLR, 2019.
|
1444 |
+
[Zhang et al., 2020] Jingfeng Zhang, Xilie Xu, Bo Han,
|
1445 |
+
Gang Niu, Lizhen Cui, Masashi Sugiyama, and Mohan
|
1446 |
+
Kankanhalli. Attacks which do not kill training make ad-
|
1447 |
+
versarial learning stronger. In ICML, pages 11278–11287.
|
1448 |
+
PMLR, 2020.
|
1449 |
+
|
CdAzT4oBgHgl3EQfiP0X/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
DtAyT4oBgHgl3EQf4vpJ/content/tmp_files/2301.00791v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
DtAyT4oBgHgl3EQf4vpJ/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
E9A0T4oBgHgl3EQfBP8f/content/2301.01972v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ed779c5f1201ab5dc1f5ef79f5414aea109e65fb685fe3da953681e08cda8b27
|
3 |
+
size 218371
|
E9A0T4oBgHgl3EQfBP8f/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bea68d1fa6fd371b2d805d2c609d95c11b2cccb0572fdff93f0039389033dcd7
|
3 |
+
size 248114
|
E9E5T4oBgHgl3EQfVA-E/content/tmp_files/2301.05548v1.pdf.txt
ADDED
@@ -0,0 +1,1854 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Prepared for submission to JINST
|
2 |
+
Improving primary-vertex reconstruction with a
|
3 |
+
minimum-cost lifted multicut graph partitioning algorithm
|
4 |
+
V. Kostyukhin,1 M. Keuper,2,3 I. Ibragimov,1 N. Owtscharenko,1 and M. Cristinziani1
|
5 |
+
1Center for Particle Physics Siegen, Department Physik, Universität Siegen
|
6 |
+
2Visual Computing, Department Elektrotechnik und Informatik, Universität Siegen
|
7 |
+
3Max Planck Institute for Informatics, Saarland Informatics Campus
|
8 |
+
Abstract: Particle physics experiments often require the simultaneous reconstruction of many
|
9 |
+
interaction vertices. Usually, this problem is solved by ad hoc heuristic algorithms. We propose
|
10 |
+
a universal approach to address the multiple vertex finding through a principled formulation as
|
11 |
+
a minimum-cost lifted multicut problem.
|
12 |
+
The suggested algorithm is tested in a typical LHC
|
13 |
+
environment with multiple proton–proton interaction vertices. Reconstruction errors caused by the
|
14 |
+
particle detectors complicate the solution and require the introduction of special metrics to assess
|
15 |
+
the vertex-finding performance. We demonstrate that the minimum-cost lifted multicut approach
|
16 |
+
outperforms heuristic algorithms and works well up to the highest vertex multiplicity expected at
|
17 |
+
the LHC.
|
18 |
+
Keywords: Vertexing algorithms; Pattern recognition, cluster finding, calibration and fitting
|
19 |
+
methods
|
20 |
+
arXiv:2301.05548v1 [hep-ex] 13 Jan 2023
|
21 |
+
|
22 |
+
Contents
|
23 |
+
1
|
24 |
+
Introduction
|
25 |
+
1
|
26 |
+
2
|
27 |
+
Minimum-cost multicuts and lifted multicut algorithm for cluster finding
|
28 |
+
3
|
29 |
+
3
|
30 |
+
Data simulation
|
31 |
+
5
|
32 |
+
4
|
33 |
+
Features of simulated data
|
34 |
+
6
|
35 |
+
5
|
36 |
+
Edge weights and constraints
|
37 |
+
6
|
38 |
+
6
|
39 |
+
Performance metrics
|
40 |
+
10
|
41 |
+
7
|
42 |
+
Results
|
43 |
+
12
|
44 |
+
8
|
45 |
+
Conclusion
|
46 |
+
19
|
47 |
+
A Non-clustered tracks and total reconstructed clusters
|
48 |
+
21
|
49 |
+
1
|
50 |
+
Introduction
|
51 |
+
In particle physics experiments, many problems require a precise reconstruction of vertices — points
|
52 |
+
in 3D space where particle interactions occur. Knowledge of the positions and features of such
|
53 |
+
vertices provides valuable information about the underlying physics of these interactions. There are
|
54 |
+
numerous examples: 𝐵 physics, heavy-flavour jet identification, primary event vertex reconstruction,
|
55 |
+
search for exotic particles as new physics manifestations, etc. Except for a few specifically designed
|
56 |
+
detectors (emulsions, Wilson chamber, etc.), rarely used in modern experiments, the vertices are
|
57 |
+
not directly detectable. The presence of vertices is usually inferred from 3D traces of charged stable
|
58 |
+
particles produced in the interaction. Various tracking detectors measure the curved trajectories of
|
59 |
+
these particles (tracks) in space. The trajectories can be extrapolated to a single 3D point, which
|
60 |
+
represents the interaction vertex position [1].
|
61 |
+
Despite the simplicity of the vertex reconstruction idea, its real-life exploitation encounters
|
62 |
+
problems. For example, at the Large Hadron Collider (LHC) at the end of Run 2, a typical recorded
|
63 |
+
event consisted of ∼80 primary proton–proton interactions, and numerous produced charged par-
|
64 |
+
ticles underwent further interactions leading to additional vertices, distributed in significant 3D
|
65 |
+
volumes. The expected number of proton–proton interactions in a single event at the LHC after
|
66 |
+
the planned high-luminosity upgrade (HL-LHC) may reach 200–300, resulting in a few thousand
|
67 |
+
reconstructed tracks. Therefore, prior to determining the vertex positions, one needs to determine
|
68 |
+
how many vertices are present in a given event and assign the reconstructed tracks to these assumed
|
69 |
+
vertices. The track measurement uncertainties, which may differ by a factor of 10 for different tracks
|
70 |
+
– 1 –
|
71 |
+
|
72 |
+
and often are comparable with the vertex–vertex distances, cause additional complications. These
|
73 |
+
uncertainties make an exact crossing of track pairs in 3D space impossible: even if two charged
|
74 |
+
particles are produced in the same interaction point, their reconstructed trajectories will only be
|
75 |
+
close to the true vertex position and to each other, up to the corresponding uncertainties.
|
76 |
+
The explicit reconstruction of multiple vertices in an event can be addressed in a graph-based
|
77 |
+
approach. In fact, all space trajectories of the particles produced in a single vertex should be pairwise
|
78 |
+
compatible, i.e. every pair of tracks should be close to each other in some volume around the true
|
79 |
+
vertex position. Therefore, a compatibility graph can be constructed where every node represents
|
80 |
+
a track. Two nodes are connected by an edge if and only if the distance of the corresponding
|
81 |
+
trajectories is very small. In the ideal case, every vertex is represented by a fully connected, isolated
|
82 |
+
subgraph in such a graph. In a realistic scenario, track measurement errors shuffle tracks among
|
83 |
+
different vertices, resulting in a large number of fake edges in the compatibility graph. Yet, it can
|
84 |
+
be tried to split the full graph into non-overlapping clusters by minimising the track–track distances
|
85 |
+
for all track pairs in a cluster. The obtained set of isolated clusters should be a good approximation
|
86 |
+
of the true vertices.
|
87 |
+
The present paper focuses on finding primary proton–proton interaction vertices at the LHC.
|
88 |
+
Subsequent decays of the particles produced in the detector volume and their interactions with
|
89 |
+
the detector material will not be considered here. To illustrate the primary-vertex reconstruction
|
90 |
+
problem, Figure 1 shows two zoomed-in regions of a typical LHC event with several pileup
|
91 |
+
interactions. The upper plot presents a region where a pileup interaction vertex is identified, which
|
92 |
+
has the largest sum of track transverse momenta.
|
93 |
+
The bottom plot presents a region where a
|
94 |
+
hard-scatter vertex, i.e. the point of interaction of interest, is identified. In both plots, the true
|
95 |
+
positions of interaction vertices are shown, together with charged particle trajectories displaced
|
96 |
+
due to reconstruction uncertainties. Several true interaction vertices in these plots do not have
|
97 |
+
associated tracks because all emanated particles in this interaction are outside of the tracking
|
98 |
+
detector’s sensitive volume, see Section 3 for the details. The overlap of the red (from hard-scatter
|
99 |
+
vertex), blue and grey (from nearby pileup vertices) tracks in the centre of the bottom plot on
|
100 |
+
Figure 1 is clearly visible.
|
101 |
+
Experiments at the LHC use heuristic algorithms [3–5] to reconstruct multiple proton–proton
|
102 |
+
interaction vertices. Several other approaches can be found in the literature, including medical
|
103 |
+
imaging-inspired algorithms [6] and the RAVE package [7] implementing the deterministic anneal-
|
104 |
+
ing algorithm [8].
|
105 |
+
This article presents an implementation of the Lifted Multicut Graph Partitioning algorithm
|
106 |
+
(LMC), which solves the inclusive vertex reconstruction problem described above.
|
107 |
+
Section 2
|
108 |
+
describes the LMC algorithm and details of its implementation for the vertex finding application.
|
109 |
+
Section 3 describes the simulated samples which are used to test the algorithm performance. In
|
110 |
+
Section 4, features of the simulated samples are discussed. Section 5 introduces edge cost functions
|
111 |
+
used in the graph partitioning. In Section 6, the metrics are introduced to estimate the algorithm
|
112 |
+
performance and to compare it with other existing approaches. Section 7 presents the performance
|
113 |
+
of the LMC approach in simulation. In Section 8, conclusions are made.
|
114 |
+
– 2 –
|
115 |
+
|
116 |
+
61
|
117 |
+
−
|
118 |
+
60
|
119 |
+
−
|
120 |
+
59
|
121 |
+
−
|
122 |
+
58
|
123 |
+
−
|
124 |
+
57
|
125 |
+
−
|
126 |
+
56
|
127 |
+
−
|
128 |
+
55
|
129 |
+
−
|
130 |
+
54
|
131 |
+
−
|
132 |
+
53
|
133 |
+
−
|
134 |
+
52
|
135 |
+
−
|
136 |
+
z [mm]
|
137 |
+
1
|
138 |
+
−
|
139 |
+
0.8
|
140 |
+
−
|
141 |
+
0.6
|
142 |
+
−
|
143 |
+
0.4
|
144 |
+
−
|
145 |
+
0.2
|
146 |
+
−
|
147 |
+
0
|
148 |
+
0.2
|
149 |
+
0.4
|
150 |
+
0.6
|
151 |
+
0.8
|
152 |
+
1
|
153 |
+
r [mm]
|
154 |
+
Reco z = -56.71 mm
|
155 |
+
Truth z = -2.59 mm
|
156 |
+
2
|
157 |
+
= 470.3 GeV
|
158 |
+
T
|
159 |
+
2
|
160 |
+
p
|
161 |
+
Σ
|
162 |
+
w
|
163 |
+
T
|
164 |
+
p
|
165 |
+
Σ
|
166 |
+
PU Vertex chosen by
|
167 |
+
Truth
|
168 |
+
Reco
|
169 |
+
HS tracks
|
170 |
+
PU tracks
|
171 |
+
HS jets
|
172 |
+
PU jets
|
173 |
+
truth PU vertex
|
174 |
+
truth HS vertex
|
175 |
+
cut
|
176 |
+
0
|
177 |
+
z
|
178 |
+
T
|
179 |
+
-p
|
180 |
+
η
|
181 |
+
Simulation Preliminary
|
182 |
+
ATLAS
|
183 |
+
7
|
184 |
+
−
|
185 |
+
6
|
186 |
+
−
|
187 |
+
5
|
188 |
+
−
|
189 |
+
4
|
190 |
+
−
|
191 |
+
3
|
192 |
+
−
|
193 |
+
2
|
194 |
+
−
|
195 |
+
1
|
196 |
+
−
|
197 |
+
0
|
198 |
+
1
|
199 |
+
2
|
200 |
+
z [mm]
|
201 |
+
1
|
202 |
+
−
|
203 |
+
0.8
|
204 |
+
−
|
205 |
+
0.6
|
206 |
+
−
|
207 |
+
0.4
|
208 |
+
−
|
209 |
+
0.2
|
210 |
+
−
|
211 |
+
0
|
212 |
+
0.2
|
213 |
+
0.4
|
214 |
+
0.6
|
215 |
+
0.8
|
216 |
+
1
|
217 |
+
r [mm]
|
218 |
+
Reco z = -2.60 mm
|
219 |
+
Truth z = -2.59 mm
|
220 |
+
2
|
221 |
+
= 121.2 GeV
|
222 |
+
T
|
223 |
+
2
|
224 |
+
p
|
225 |
+
Σ
|
226 |
+
Reconstructed Hard-Scatter Primary Vertex
|
227 |
+
Truth
|
228 |
+
Reco
|
229 |
+
HS tracks
|
230 |
+
PU tracks
|
231 |
+
HS jets
|
232 |
+
PU jets
|
233 |
+
truth PU vertex
|
234 |
+
truth HS vertex
|
235 |
+
cut
|
236 |
+
0
|
237 |
+
z
|
238 |
+
T
|
239 |
+
-p
|
240 |
+
η
|
241 |
+
Simulation Preliminary
|
242 |
+
ATLAS
|
243 |
+
Figure 1: Two regions of a typical LHC event in the ATLAS detector with many pileup interac-
|
244 |
+
tions [2]. True positions of the proton–proton interactions are shown, as well as the reconstructed
|
245 |
+
trajectories (tracks) of the produced particles scattered due to reconstruction uncertainties. Some
|
246 |
+
truth interaction vertices do not have associated tracks because all emanated particles are outside
|
247 |
+
of the sensitive detector phase space and not reconstructed. These pictures illustrate typical track
|
248 |
+
densities and overlap of the tracks produced in nearby interaction vertices. Both, tracks associated
|
249 |
+
with the hard-scattering (HS) and pileup (PU) are shown.
|
250 |
+
2
|
251 |
+
Minimum-cost multicuts and lifted multicut algorithm for cluster finding
|
252 |
+
We formulate the primary-vertex reconstruction problem as a minimum-cost lifted multicut problem.
|
253 |
+
This problem was originally proposed in Reference [9] in the context of image segmentation and
|
254 |
+
mesh decomposition. It is a generalization of the better-known minimum cost multicut problem,
|
255 |
+
also referred to as the weighted correlation clustering problem [10, 11]. The minimum cost multicut
|
256 |
+
problem is a grouping problem defined for a graph 𝐺 = (𝑉, 𝐸) and a cost function 𝑐 : 𝐸 → R
|
257 |
+
which assigns to all edges 𝑒 ∈ 𝐸 a real-valued cost or reward for being cut. Then, the minimum
|
258 |
+
– 3 –
|
259 |
+
|
260 |
+
cost multicut problem is to find a binary edge labelling 𝑦 according to
|
261 |
+
min
|
262 |
+
𝑦∈{0,1}𝐸
|
263 |
+
∑︁
|
264 |
+
𝑒∈𝐸
|
265 |
+
𝑐𝑒𝑦𝑒
|
266 |
+
(2.1)
|
267 |
+
subject to
|
268 |
+
∀𝐶 ∈ cycles(𝐺)
|
269 |
+
∀𝑒 ∈ 𝐶 : 𝑦𝑒 ≤
|
270 |
+
∑︁
|
271 |
+
𝑒∈𝐶\{𝑒}
|
272 |
+
𝑦𝑒 .
|
273 |
+
(2.2)
|
274 |
+
The constraints on the feasible set of labellings 𝑦 given in Equation (2.2) ensure that the solution
|
275 |
+
of the multicut problem relates one-to-one to the decompositions of graph 𝐺, by ensuring for every
|
276 |
+
cycle in 𝐺 that if an edge is cut within the cycle (𝑦𝑒 = 1), so needs to be at least one other. Trivial
|
277 |
+
optimal solutions are avoided by assigning positive (attractive) costs 𝑐𝑒 to edges between nodes
|
278 |
+
𝑣, 𝑤 ∈ 𝑉 that likely belong to the same component, while negative (repulsive) costs are assigned to
|
279 |
+
edges that likely belong to different components.
|
280 |
+
The minimum cost lifted multicut problem (LMC) generalizes over the problem defined in
|
281 |
+
Equation (2.1)–Equation (2.2) by adding a second set of edges that defines additional, potentially
|
282 |
+
long-range costs without altering the set of feasible solutions. It thus defines a second set of edges
|
283 |
+
𝐹 between the nodes 𝑉 of 𝐺, resulting in a lifted graph 𝐺′ = (𝑉, 𝐸 ∪ 𝐹), on which we can define
|
284 |
+
a cost function 𝑐′ : 𝐸 ∪ 𝐹 → R. Then, Equation (2.1) and Equation (2.2) are optimized over all
|
285 |
+
edges in 𝐸 ∪ 𝐹 and two additional sets of constraints are defined according to [9]
|
286 |
+
∀𝑣, 𝑤 ∈ 𝐹
|
287 |
+
∀𝑃 ∈ 𝑣, 𝑤 − paths(𝐺) : 𝑦𝑣𝑤 ≤
|
288 |
+
∑︁
|
289 |
+
𝑒∈𝑃
|
290 |
+
𝑦𝑒
|
291 |
+
(2.3)
|
292 |
+
∀𝑣, 𝑤 ∈ 𝐹
|
293 |
+
∀𝐶 ∈ 𝑣, 𝑤 − cuts(𝐺) : 1 − 𝑦𝑣𝑤 ≤
|
294 |
+
∑︁
|
295 |
+
𝑒∈𝐶
|
296 |
+
(1 − 𝑦𝑒)
|
297 |
+
(2.4)
|
298 |
+
to ensure that the feasible solutions to the LMC problem still relate one-to-one to the decompositions
|
299 |
+
of the original graph 𝐺.
|
300 |
+
For the vertex reconstruction problem, this formulation allows encoding Euclidean distance
|
301 |
+
constraints in the structure of graph 𝐺 (e.g. point observations that are spatially distant can not
|
302 |
+
originate from the same vertex), while the cost function can be naturally defined in the distance
|
303 |
+
significance space to take into account the measurement errors. The Euclidean distance and its
|
304 |
+
significance can be very different in case of significant reconstruction errors, the lifted multicut
|
305 |
+
formulation encodes both metrics in the same graph.
|
306 |
+
The minimum cost multicut problem is 𝑛𝑝-hard, and so is the minimum cost LMC problem
|
307 |
+
[12]. Yet, efficient heuristic solvers provide practically good solutions [9, 13–16]. Here, we resolve
|
308 |
+
to use the primal feasible heuristic KLj that has been proposed in Reference [9] and published in
|
309 |
+
an open-source library1. KLj is an iterative approach that produces a sequence of feasible solutions
|
310 |
+
whose cost decreases monotonically. It takes as input an initial edge labelling (for example, all
|
311 |
+
edge labels are initially set to 0), a lifted graph and costs defined on all edges. In every step, it
|
312 |
+
either moves nodes between two neighbouring components, moves nodes from one component into
|
313 |
+
a new component or joins two components such as to decrease the cost of the multicut maximally
|
314 |
+
according to Equation (2.1).
|
315 |
+
1https://github.com/bjoern-andres/graph
|
316 |
+
– 4 –
|
317 |
+
|
318 |
+
3
|
319 |
+
Data simulation
|
320 |
+
To estimate the clustering performance, we simulated data using DELPHES [17]. The framework
|
321 |
+
allows to perform a fast and realistic simulation of a general-purpose collider detector composed of
|
322 |
+
an inner tracker, electromagnetic and hadron calorimeters, and a muon system. For this study, we
|
323 |
+
added a detailed parameterisation of the ATLAS detector tracking resolution to the framework.
|
324 |
+
To simulate the pileup vertices and hard-scattering events, a sufficiently large amount of
|
325 |
+
minimum-bias interaction events was prepared, consisting of single, double, and non-diffractive
|
326 |
+
processes. These events have been generated using the Pythia 8 [18] event generator. As the main
|
327 |
+
source of hard-scattering interactions, 𝑡¯𝑡 events are used, also generated with Pythia 8. To simulate
|
328 |
+
an LHC collision event with full pileup, a single 𝑡¯𝑡 event is mixed with a number of minimum-
|
329 |
+
bias events, distributed according to a Poisson distribution with a mean corresponding to a chosen
|
330 |
+
luminosity. The interaction vertices are then distributed along the LHC beam trajectory inside the
|
331 |
+
detector, according to typical interaction region parameters for ATLAS, i.e. according to a Gaussian
|
332 |
+
with 𝜎𝑧 = 42 mm.
|
333 |
+
The acceptance of the ATLAS detector allows for reconstructing charged particle trajectories in
|
334 |
+
a limited phase space of 𝑝⊥ > 500 MeV and |𝜂| < 2.5. Some minimum-bias proton–proton interac-
|
335 |
+
tions produce only particles outside the sensitive phase space of the ATLAS detector, which makes
|
336 |
+
them unreconstructable. Positions of interactions with a single track in the ATLAS acceptance can
|
337 |
+
be reconstructed, but this vertex category is contaminated by tracks that are strongly displaced by
|
338 |
+
measurement errors. In the following, a reconstructable truth vertex refers to the true position of a
|
339 |
+
proton–proton interaction producing at least two tracks within the ATLAS detector acceptance.
|
340 |
+
All tracks produced in an event and falling into the sensitive ATLAS detector phase space
|
341 |
+
are smeared according to the parameterised ATLAS detector resolution.
|
342 |
+
Tracks with smeared
|
343 |
+
parameters are referred to as reconstructed tracks in the following. The set of reconstructed tracks
|
344 |
+
corresponding to a full pileup event is used as input for the performance estimation of the clustering
|
345 |
+
algorithms. DELPHES samples used in this paper have been prepared with different energies and
|
346 |
+
different pileup conditions (Table 1).
|
347 |
+
Energy
|
348 |
+
�
|
349 |
+
𝜇
|
350 |
+
�
|
351 |
+
Interaction region 𝜎��
|
352 |
+
�
|
353 |
+
𝑁event
|
354 |
+
trk
|
355 |
+
�
|
356 |
+
�
|
357 |
+
𝑁vrt
|
358 |
+
trk =0
|
359 |
+
�
|
360 |
+
�
|
361 |
+
𝑁vrt
|
362 |
+
trk =1
|
363 |
+
�
|
364 |
+
�
|
365 |
+
𝑁vrt
|
366 |
+
trk >1
|
367 |
+
�
|
368 |
+
13 TeV
|
369 |
+
63
|
370 |
+
35 mm
|
371 |
+
718
|
372 |
+
9
|
373 |
+
4
|
374 |
+
50
|
375 |
+
14 TeV 150
|
376 |
+
42 mm
|
377 |
+
1674
|
378 |
+
22
|
379 |
+
9
|
380 |
+
119
|
381 |
+
14 TeV 200
|
382 |
+
42 mm
|
383 |
+
2227
|
384 |
+
28
|
385 |
+
12
|
386 |
+
160
|
387 |
+
14 TeV 250
|
388 |
+
42 mm
|
389 |
+
2771
|
390 |
+
35
|
391 |
+
16
|
392 |
+
199
|
393 |
+
Table 1: The DELPHES samples used to estimate the LMC performance. Column 𝑁event
|
394 |
+
trk
|
395 |
+
reports
|
396 |
+
the total number of reconstructed tracks in simulated events. The last three columns show the
|
397 |
+
numbers of true vertices with 𝑁vrt
|
398 |
+
trk = 0, 1, > 1, correspondingly.
|
399 |
+
– 5 –
|
400 |
+
|
401 |
+
4
|
402 |
+
Features of simulated data
|
403 |
+
The number of truth tracks in the detector acceptance in the simulated vertices and the position
|
404 |
+
measurement errors of these tracks are shown in Figure 2. As can be seen in Figure 2a, in 14% of
|
405 |
+
the cases, the simulated vertices do not have tracks in the detector acceptance, and in 6.5% of the
|
406 |
+
cases, they have only one track. The number of tracks for all other vertices is widely spread up to
|
407 |
+
80.
|
408 |
+
0
|
409 |
+
20
|
410 |
+
40
|
411 |
+
60
|
412 |
+
80
|
413 |
+
Number of tracks in a truth vertex
|
414 |
+
0
|
415 |
+
0.02
|
416 |
+
0.04
|
417 |
+
0.06
|
418 |
+
0.08
|
419 |
+
0.1
|
420 |
+
0.12
|
421 |
+
0.14
|
422 |
+
Fraction
|
423 |
+
a)
|
424 |
+
0
|
425 |
+
0.5
|
426 |
+
1
|
427 |
+
1.5
|
428 |
+
2
|
429 |
+
Track measurement error
|
430 |
+
0
|
431 |
+
0.02
|
432 |
+
0.04
|
433 |
+
0.06
|
434 |
+
0.08
|
435 |
+
0.1
|
436 |
+
0.12
|
437 |
+
0.14
|
438 |
+
0.16
|
439 |
+
0.18
|
440 |
+
0.2
|
441 |
+
Fraction
|
442 |
+
b)
|
443 |
+
Figure 2: a) Number of tracks per simulated vertex and b) Track measurement errors of the
|
444 |
+
simulated tracks.
|
445 |
+
Track measurement errors are shown in Figure 2b. From the sizes of the luminous regions and
|
446 |
+
the number of vertices in Table 1 we can conclude that the track measurement errors are comparable
|
447 |
+
or larger than a typical vertex–vertex distance in the simulated data. Smearing of the track positions
|
448 |
+
due to measurement errors results in a significant overlap of the tracks from different truth vertices.
|
449 |
+
The fraction of cases when a track from one vertex is entirely surrounded by tracks from other
|
450 |
+
vertices for different pileup scenarios is shown in Table 2. An example of the track overlap can be
|
451 |
+
seen in the bottom panel of Figure 1. Another example is shown in Figure 3.
|
452 |
+
�
|
453 |
+
𝜇
|
454 |
+
�
|
455 |
+
63
|
456 |
+
150
|
457 |
+
200
|
458 |
+
250
|
459 |
+
Track overlap fraction 20% 41% 53% 66%
|
460 |
+
Table 2: Fraction of tracks, positioned in between tracks from other truth vertices due to measure-
|
461 |
+
ment errors, as a function of the pileup.
|
462 |
+
A priori, well-measured tracks with small errors should be easy to cluster according to the
|
463 |
+
truth, while poorly measured tracks with large errors can easily migrate from one cluster to another,
|
464 |
+
independently of their true origin. This random migration can be interpreted as noise, and thus, the
|
465 |
+
overall problem may be considered as clustering in the presence of significant noise.
|
466 |
+
5
|
467 |
+
Edge weights and constraints
|
468 |
+
To formulate the vertex finding problem in the presence of pileup as a minimum cost lifted multicut
|
469 |
+
(LMC) problem, a track-pair compatibility graph needs to be constructed. A node in this graph
|
470 |
+
– 6 –
|
471 |
+
|
472 |
+
4
|
473 |
+
6
|
474 |
+
8
|
475 |
+
10
|
476 |
+
12
|
477 |
+
Track and true vertex positions (mm)
|
478 |
+
1.5
|
479 |
+
−
|
480 |
+
1
|
481 |
+
−
|
482 |
+
0.5
|
483 |
+
−
|
484 |
+
0
|
485 |
+
0.5
|
486 |
+
1
|
487 |
+
1.5
|
488 |
+
Track error (mm)
|
489 |
+
Track positions linked to true vertices
|
490 |
+
True vertices
|
491 |
+
Figure 3: Example display of overlapping tracks from different vertices caused by measurement
|
492 |
+
errors (zoom of a simulated DELPHES event with 𝜇 = 150). The crosses at the ordinate value
|
493 |
+
of 0 represent the track positions, and the vertical error bars represent the corresponding position
|
494 |
+
measurement errors. Squares at ordinate values of 1.3 represent the truth vertex positions. The
|
495 |
+
connecting lines show the origin vertex for every track.
|
496 |
+
represents a track, and two nodes are connected by an edge if and only if they are close in space and
|
497 |
+
can be produced in the same vertex. The degree of track closeness, or equivalently the probability of
|
498 |
+
originating in the same vertex, is estimated during the graph construction and is expressed as a weight
|
499 |
+
assigned to the edge. The edge weights determine the efficiency of the clustering. Therefore, they
|
500 |
+
should incorporate enough information, and the weight assignment procedure should be carefully
|
501 |
+
designed. The following approaches are used in our study:
|
502 |
+
1. Probability density function (PDF) ratio of the track–track geometrical distance significance
|
503 |
+
based on measured uncertainties, 𝑆 =
|
504 |
+
√︃
|
505 |
+
(𝑧𝑖 − 𝑧 𝑗)2/(𝜎2
|
506 |
+
𝑖 + 𝜎2
|
507 |
+
𝑗 );
|
508 |
+
2. Multivariate binary classification with Boosted Decision Trees (BDT);
|
509 |
+
3. Logistic regression based on 𝑆.
|
510 |
+
The LMC formulation assumes that the correct edges (two tracks from the same vertex) receive
|
511 |
+
positive weights, while random (fake) edges receive negative weights. This can be achieved by
|
512 |
+
using a logarithm of the ratio of the probability density functions for the correct and fake edges
|
513 |
+
as the cost function of the problem log 𝑝true
|
514 |
+
𝑝fake . According to the Neyman–Pearson lemma, this is
|
515 |
+
the most efficient test statistic for the true/fake edge classification. An example of the track–track
|
516 |
+
distance significance distributions and their ratio are shown in Figure 4. As the PDF of the fake
|
517 |
+
edges is independent of the track–track distance significance, its overall normalisation depends on
|
518 |
+
the significance range used for the parameterisation. Thus, the exact values of the PDF ratio can
|
519 |
+
be scaled by the choice of the parametrisation range, which in principle, should not affect the LMC
|
520 |
+
– 7 –
|
521 |
+
|
522 |
+
clustering performance if the range is sufficiently large. Such a behaviour can be mimicked by a
|
523 |
+
global multiplier of the PDF ratio function. The influence of this multiplier on the clustering will
|
524 |
+
be studied in Section 7.3.
|
525 |
+
0
|
526 |
+
1
|
527 |
+
2
|
528 |
+
3
|
529 |
+
4
|
530 |
+
5
|
531 |
+
6
|
532 |
+
Track-track distance significance
|
533 |
+
0
|
534 |
+
0.002
|
535 |
+
0.004
|
536 |
+
0.006
|
537 |
+
0.008
|
538 |
+
0.01
|
539 |
+
0.012
|
540 |
+
0.014
|
541 |
+
0.016
|
542 |
+
0.018
|
543 |
+
0.02
|
544 |
+
0.022
|
545 |
+
0.024
|
546 |
+
True edges
|
547 |
+
0
|
548 |
+
1
|
549 |
+
2
|
550 |
+
3
|
551 |
+
4
|
552 |
+
5
|
553 |
+
6
|
554 |
+
Track-track distance significance
|
555 |
+
0
|
556 |
+
0.001
|
557 |
+
0.002
|
558 |
+
0.003
|
559 |
+
0.004
|
560 |
+
0.005
|
561 |
+
0.006
|
562 |
+
Fake edges
|
563 |
+
0
|
564 |
+
1
|
565 |
+
2
|
566 |
+
3
|
567 |
+
4
|
568 |
+
5
|
569 |
+
6
|
570 |
+
Track-track distance significance
|
571 |
+
0
|
572 |
+
0.5
|
573 |
+
1
|
574 |
+
1.5
|
575 |
+
2
|
576 |
+
2.5
|
577 |
+
3
|
578 |
+
3.5
|
579 |
+
4
|
580 |
+
4.5
|
581 |
+
5
|
582 |
+
Ratio True/Fake pdf's
|
583 |
+
Figure 4: Example track–track distance significance for true and fake edges and their ratio. The
|
584 |
+
significance distributions are normalized to one.
|
585 |
+
A better clustering performance could be achieved by encoding more information in the edge
|
586 |
+
weight calculation. To test this approach, we use a BDT classifier combining seven features, listed
|
587 |
+
in Table 3, to distinguish true edges from fake ones. The GradientBoost implementation (BDTG)
|
588 |
+
from the TMVA [19] package is used to train the classifier. An example of the trained classifier
|
589 |
+
response2 is shown in Figure 5. The output is negative for fake edges and positive for true ones,
|
590 |
+
exactly as required by the KLj algorithm, and therefore can be used directly as the edge weight.
|
591 |
+
n. Description
|
592 |
+
1
|
593 |
+
Squared significance 𝑆2 (or 𝜒2) of track–track distance along beamline
|
594 |
+
2
|
595 |
+
Average position of the track pair along beamline
|
596 |
+
3
|
597 |
+
Position uncertainty of track 1
|
598 |
+
4
|
599 |
+
Position uncertainty of track 2
|
600 |
+
5
|
601 |
+
Pseudorapidity 𝜂 of track 1
|
602 |
+
6
|
603 |
+
Pseudorapidity 𝜂 of track 2
|
604 |
+
7
|
605 |
+
Number of other tracks crossing the beamline between tracks 1 and 2
|
606 |
+
Table 3: Input features for the edge classification BDT.
|
607 |
+
Edge weights can also be assigned by using the logistic regression 𝑝 = 𝑒𝑧/(𝑒𝑧 + 1), where
|
608 |
+
𝑧 = 𝛽0 + �𝑛
|
609 |
+
𝑖=1 𝛽𝑖𝑥𝑖 and 𝑥𝑖 are explanatory variables. The negative inverse of the logistic function,
|
610 |
+
logit(𝑝) = log[𝑝/(1 − 𝑝)], provides the necessary edge weight behaviour. Edges that need to be
|
611 |
+
removed receive negative weights, and those that need to be preserved receive positive weights.
|
612 |
+
The intercept value 𝛽0 is defined by the ratio between the amount of true and fake edges used
|
613 |
+
for training, which can be linked to a prior probability of a given edge being true or fake. In the
|
614 |
+
2TMVA GradientBoost uses the binomial log-likelihood loss 𝐿(𝐹, 𝑦) = ln[1 + exp(−2𝐹(𝑥)𝑦)] with Gini Index
|
615 |
+
separation. We use the following training settings NTree=800, MaxDepth=10, MinNodeSize=1.5%, Shrinkage=0.07.
|
616 |
+
– 8 –
|
617 |
+
|
618 |
+
0.8
|
619 |
+
−
|
620 |
+
0.6
|
621 |
+
−
|
622 |
+
0.4
|
623 |
+
−
|
624 |
+
0.2
|
625 |
+
−
|
626 |
+
0
|
627 |
+
0.2
|
628 |
+
0.4
|
629 |
+
0.6
|
630 |
+
0.8
|
631 |
+
BDTG response
|
632 |
+
0
|
633 |
+
1
|
634 |
+
2
|
635 |
+
3
|
636 |
+
4
|
637 |
+
5
|
638 |
+
6
|
639 |
+
dx
|
640 |
+
/
|
641 |
+
|
642 |
+
(1/N) dN
|
643 |
+
Signal
|
644 |
+
Background
|
645 |
+
U/O-flow (S,B): (0.0, 0.0)% / (0.0, 0.0)%
|
646 |
+
TMVA response for classifier: BDTG
|
647 |
+
Figure 5: Example BDTG classification weight distributions for true and fake edges.
|
648 |
+
current problem, the prior probability depends on the true vertex density and cannot be defined
|
649 |
+
unambiguously, e.g. it depends on the range of the track–track distance significance 𝑆, see above.
|
650 |
+
Therefore, the value of the intercept 𝛽0 in this approach can be modified in some range to achieve
|
651 |
+
an over- or undersegmentation in order to validate its optimality. This will be further discussed in
|
652 |
+
Section 7.3. A one-dimensional regression is tested in this paper, using variable (1) from Table 3.
|
653 |
+
The logistic regression for the edge weight calculation is illustrated in Figure 6.
|
654 |
+
0
|
655 |
+
5
|
656 |
+
10
|
657 |
+
15
|
658 |
+
20
|
659 |
+
0.0
|
660 |
+
0.2
|
661 |
+
0.4
|
662 |
+
0.6
|
663 |
+
0.8
|
664 |
+
1.0
|
665 |
+
S2
|
666 |
+
True
|
667 |
+
Figure 6: Example one-variable logistic regression for true and fake edges using the squared
|
668 |
+
track–track distance significance 𝑆2.
|
669 |
+
The usage of the track–track distance significance for partitioning does not guarantee the com-
|
670 |
+
pactness of the obtained cluster in Cartesian space, which may be beneficial when the vertex density
|
671 |
+
is large. The compactness requirement can be imposed using the LMC constraint mechanism.
|
672 |
+
Some edges in the connectivity graph can be additionally labelled as “have to be cut”, based on a
|
673 |
+
priori information, different from the edge probability itself. To make clusters more compact, we
|
674 |
+
– 9 –
|
675 |
+
|
676 |
+
can constrain the edges to be cut if the corresponding Cartesian track–track distance is larger than
|
677 |
+
some scale. In the following, a rather weak requirement of |𝑧𝑖 − 𝑧 𝑗| < 1 mm will be used, which
|
678 |
+
removes tracks with very large errors, see Figure 2b. In addition to improving the quality of the
|
679 |
+
solution, the constraint limits the phase space of possible solutions, and this leads to a significant
|
680 |
+
algorithm speedup.
|
681 |
+
6
|
682 |
+
Performance metrics
|
683 |
+
For a quantitative assessment of the performance of the vertex-finding algorithm, one or several
|
684 |
+
metrics are to be established. To compare the performance of the clustering algorithms in, e.g.,
|
685 |
+
image segmentation problems, metrics are usually employed, which are based on the assignment
|
686 |
+
of graph nodes to clusters. One example of such a metric is the Variation of Information (VI)
|
687 |
+
proposed in Reference [20]. The VI metric calculates the degree of compatibility of a clustering 𝐶
|
688 |
+
with another clustering 𝐶′ as
|
689 |
+
𝑉𝐼(𝐶, 𝐶′) = 𝐻(𝐶) + 𝐻(𝐶′) − 2 · 𝐼(𝐶, 𝐶′)
|
690 |
+
(6.1)
|
691 |
+
with
|
692 |
+
𝐻(𝐶) = −
|
693 |
+
𝐾
|
694 |
+
∑︁
|
695 |
+
𝑘=1
|
696 |
+
𝑃(𝑘) · log(𝑃(𝑘)) and 𝐼(𝐶, 𝐶′) =
|
697 |
+
𝐾
|
698 |
+
∑︁
|
699 |
+
𝑘=1
|
700 |
+
𝐾 ′
|
701 |
+
∑︁
|
702 |
+
𝑘′=1
|
703 |
+
𝑃(𝑘, 𝑘′) · log
|
704 |
+
� 𝑃(𝑘, 𝑘′)
|
705 |
+
𝑃(𝑘)𝑃(𝑘′)
|
706 |
+
�
|
707 |
+
.
|
708 |
+
(6.2)
|
709 |
+
Here 𝑃(𝑘) = 𝑛𝑘/𝑁, 𝑃(𝑘, 𝑘′) = |𝐶𝑘 ∩ 𝐶′
|
710 |
+
𝑘′|/𝑁, 𝑛𝑘 is the number of nodes in the cluster 𝐶𝑘, 𝑁 is
|
711 |
+
the total number of nodes in the graph, and 𝐾 and 𝐾′ are the number of elements in 𝐶 and 𝐶′,
|
712 |
+
respectively. In our case, the VI metric can be used to compare the truth track-to-vertex assignment
|
713 |
+
with the obtained clustering solution. When the obtained set of clusters and the track-to-cluster
|
714 |
+
assignment reproduce the truth exactly, 𝑉𝐼 vanishes. Consequently, smaller VI values correspond
|
715 |
+
to more truth-like (and therefore better) clustering solutions.
|
716 |
+
Another track-to-cluster-based metric, which is investigated in the following, is the Silhou-
|
717 |
+
ette [21] score
|
718 |
+
𝑠(𝑖) =
|
719 |
+
𝑏(𝑖) − 𝑎(𝑖)
|
720 |
+
max{𝑎(𝑖), 𝑏(𝑖)}
|
721 |
+
(6.3)
|
722 |
+
with
|
723 |
+
𝑎(𝑖) =
|
724 |
+
1
|
725 |
+
𝑛𝑘 − 1
|
726 |
+
𝐶𝑘
|
727 |
+
∑︁
|
728 |
+
𝑗, 𝑖≠𝑗
|
729 |
+
𝑑(𝑖, 𝑗) and 𝑏(𝑖) =
|
730 |
+
min
|
731 |
+
𝐶𝑘′≠𝐶𝑘
|
732 |
+
1
|
733 |
+
𝑛 𝑗
|
734 |
+
𝐶𝑘′
|
735 |
+
∑︁
|
736 |
+
𝑗
|
737 |
+
𝑑(𝑖, 𝑗)
|
738 |
+
(6.4)
|
739 |
+
for node 𝑖 in cluster 𝐶𝑘. Here 𝑑(𝑖, 𝑗) is a distance between nodes 𝑖 and 𝑗. In this study, we use the
|
740 |
+
Cartesian distance between tracks and average over all tracks silhouette value
|
741 |
+
�
|
742 |
+
𝑠(𝑖)
|
743 |
+
�
|
744 |
+
as a quality
|
745 |
+
estimator of the clustering solution. The silhouette value is limited −1 < 𝑠(𝑖) < 1, larger values
|
746 |
+
corresponding to more compact clusters, better separated from each other.
|
747 |
+
Several other track-to-cluster-based metrics can be found in Reference [20]. These metrics are
|
748 |
+
expected to encounter problems in the present case due to the overlap of truth clusters, as explained
|
749 |
+
in Section 4. Tracks are assigned most probably to the wrong cluster by any partitioning algorithm
|
750 |
+
if placed in between tracks from other clusters by mismeasurement. This phenomenon inevitably
|
751 |
+
reduces the accuracy of any track-to-cluster-based metrics. Nevertheless, at least the clustering of
|
752 |
+
– 10 –
|
753 |
+
|
754 |
+
the well-measured tracks should reproduce the truth closely, which the track-to-cluster metrics can
|
755 |
+
still be sensitive to.
|
756 |
+
As the metric accuracy is compromised by the presence of tracks with large measurement
|
757 |
+
errors, it might be useful to downscale the contribution of such tracks to the metric. For the VI
|
758 |
+
metric this can be achieved by weighting every track with 𝜎−2 in the metric calculations, namely
|
759 |
+
𝑛𝑘 = �𝑘
|
760 |
+
𝑖=1
|
761 |
+
1
|
762 |
+
𝜎2
|
763 |
+
𝑖 , 𝑁 = �𝑁
|
764 |
+
𝑖=1
|
765 |
+
1
|
766 |
+
𝜎2
|
767 |
+
𝑖 , etc. For the Silhouette metric the Cartesian distance between two
|
768 |
+
tracks can be replaced by its significance 𝑑(𝑖, 𝑗) = 𝑆𝑖 𝑗. The weighted versions of the VI and
|
769 |
+
Silhouette metric will be used in the following, along with the original versions.
|
770 |
+
The number of reconstructed clusters and the weighted average positions of these clusters,
|
771 |
+
dominated by the well-measured tracks, are mostly decoupled from the details of the track-to-
|
772 |
+
cluster assignment. The number of clusters can be directly used as a metric (up to the possible
|
773 |
+
presence of fake clusters), but a Cartesian distance-based metric is not straightforward. One may
|
774 |
+
try to introduce such a metric exploiting the cluster–cluster resolution 𝑅𝑐𝑐, i.e. the minimal distance
|
775 |
+
between two reconstructed clusters, see Figure 7. The good, merged, bad cluster categories could
|
776 |
+
be defined based on whether the cluster–truth vertex distance is smaller or larger than 𝑅𝑐𝑐. Such
|
777 |
+
cluster categories could be used to compare various clustering solutions. But this categorisation
|
778 |
+
explicitly depends on 𝑅𝑐𝑐, which itself depends on the clustering algorithm. To avoid such circular
|
779 |
+
dependence, a scale-independent Cartesian distance-based metric is needed.
|
780 |
+
4
|
781 |
+
−
|
782 |
+
3
|
783 |
+
−
|
784 |
+
2
|
785 |
+
−
|
786 |
+
1
|
787 |
+
−
|
788 |
+
0
|
789 |
+
1
|
790 |
+
2
|
791 |
+
3
|
792 |
+
4
|
793 |
+
z[mm]
|
794 |
+
∆
|
795 |
+
|
796 |
+
0
|
797 |
+
20
|
798 |
+
40
|
799 |
+
60
|
800 |
+
80
|
801 |
+
100
|
802 |
+
120
|
803 |
+
140
|
804 |
+
160
|
805 |
+
180
|
806 |
+
Events / 0.1mm
|
807 |
+
=0.35mm
|
808 |
+
CC
|
809 |
+
R
|
810 |
+
Figure 7: Example of a fit to the cluster–cluster distance to determine the resolution. The used
|
811 |
+
fitting function is 𝑎/{1 + exp[𝑏 · (𝑅𝑐𝑐 − |𝑥|)]} + 𝑐 where a, b, c are free fitting parameters and 𝑅𝑐𝑐
|
812 |
+
is the cluster–cluster resolution, defined as the half-width at the half-depth of the dip in the centre
|
813 |
+
of the cluster–cluster weighted centre distances, averaged over all clusters.
|
814 |
+
To construct such a metric, we propose the following procedure. Every reconstructable truth
|
815 |
+
vertex is linked to the closest reconstructed cluster in the Cartesian space that has 2 or more assigned
|
816 |
+
tracks. Thus, a list of linked reconstructed clusters is obtained. Then, every reconstructed cluster is
|
817 |
+
classified depending on how many times it enters into this list. If a cluster enters this list only once,
|
818 |
+
there is just a single truth vertex referencing this cluster. Therefore it can be called unique, which
|
819 |
+
means that a truth vertex is unambiguously reconstructed as a cluster. If a cluster enters several
|
820 |
+
times into the list, it is referenced by several truth vertices, and therefore it combines tracks from
|
821 |
+
– 11 –
|
822 |
+
|
823 |
+
these vertices: this cluster can be called merged. Also, some clusters may not appear in this list
|
824 |
+
at all: such clusters are not referenced by any truth vertex and are thus fake. The total number of
|
825 |
+
obtained clusters and their classification as unique, merged, fake are scale-independent and can be
|
826 |
+
used as a metric to compare various clustering options.
|
827 |
+
7
|
828 |
+
Results
|
829 |
+
7.1
|
830 |
+
LHC Run-2 13 TeV data
|
831 |
+
First, the LMC clustering algorithm is tested with simulated DELPHES data at a collision energy of
|
832 |
+
13 TeV, with pileup
|
833 |
+
�
|
834 |
+
𝜇
|
835 |
+
�
|
836 |
+
= 63 and 𝜎𝑧 = 35 mm. These parameters are chosen to provide simulated
|
837 |
+
data close to the actual data collected by the ATLAS detector in Run 2. Edge-weight distributions
|
838 |
+
for various edge-labelling approaches on these data are shown in Figure 8. The performance of
|
839 |
+
the LMC algorithm on these data is shown in Table 4. The rows labelled “cnst” in these tables
|
840 |
+
provide performance estimation with the applied constraints |𝑧𝑖 − 𝑧 𝑗| < 1 mm, while the “base”
|
841 |
+
rows describe the baseline algorithm performance without constraints.
|
842 |
+
15
|
843 |
+
−
|
844 |
+
10
|
845 |
+
−
|
846 |
+
5
|
847 |
+
−
|
848 |
+
0
|
849 |
+
5
|
850 |
+
Edge weight
|
851 |
+
0
|
852 |
+
0.02
|
853 |
+
0.04
|
854 |
+
0.06
|
855 |
+
0.08
|
856 |
+
0.1
|
857 |
+
0.12
|
858 |
+
0.14
|
859 |
+
0.16
|
860 |
+
0.18
|
861 |
+
0.2
|
862 |
+
0.22
|
863 |
+
0.24
|
864 |
+
Density (arbitrary units)
|
865 |
+
PDF ratio
|
866 |
+
20
|
867 |
+
−
|
868 |
+
15
|
869 |
+
−
|
870 |
+
10
|
871 |
+
−
|
872 |
+
5
|
873 |
+
−
|
874 |
+
0
|
875 |
+
5
|
876 |
+
Edge weight
|
877 |
+
0
|
878 |
+
0.02
|
879 |
+
0.04
|
880 |
+
0.06
|
881 |
+
0.08
|
882 |
+
0.1
|
883 |
+
0.12
|
884 |
+
0.14
|
885 |
+
0.16
|
886 |
+
0.18
|
887 |
+
0.2
|
888 |
+
Density (arbitrary units)
|
889 |
+
Logistic regression 1var
|
890 |
+
1
|
891 |
+
−
|
892 |
+
0
|
893 |
+
1
|
894 |
+
2
|
895 |
+
Edge weight
|
896 |
+
0
|
897 |
+
0.02
|
898 |
+
0.04
|
899 |
+
0.06
|
900 |
+
0.08
|
901 |
+
0.1
|
902 |
+
0.12
|
903 |
+
0.14
|
904 |
+
Density (arbitrary units)
|
905 |
+
BDT
|
906 |
+
Figure 8: Typical edge weight distributions for various edge labelling options.
|
907 |
+
The column 𝑁wrong
|
908 |
+
trk
|
909 |
+
in Table 4 is the number of tracks assigned to one cluster but entirely
|
910 |
+
surrounded by tracks from other clusters. This number is an estimator for the degree of cluster
|
911 |
+
overlap in the obtained solution. The relevant truth data overlap for comparison can be found
|
912 |
+
in Table 1.
|
913 |
+
In addition, Table 9 in the Appendix gives the number of isolated nodes (tracks)
|
914 |
+
reported by the LMC clustering algorithm. These non-assigned tracks do not represent the one-
|
915 |
+
track truth vertices, considered non-reconstructable without a priori information, but rather reflect
|
916 |
+
the clustering problems.
|
917 |
+
The PDF ratio and the regression-based edge weight assignment result in approximately equal
|
918 |
+
clustering performance. The BDT-based edge weight assignment leads to a significantly worse
|
919 |
+
Silhouette metric value, a smaller value of the cluster overlap and a larger amount of fake clusters.
|
920 |
+
As expected, the weighted versions of the VI and Silhouette metrics have significantly better values
|
921 |
+
than the standard ones due to downscaling of the noise. Using constraints uniformly improves all
|
922 |
+
quality estimators and provides ∼ 30% CPU reduction.
|
923 |
+
In total, 70% of the reconstructable truth vertices are reconstructed as unique clusters, while
|
924 |
+
the remaining 30% (i.e. 15) truth vertices are squeezed into 7.5 merged vertices. The amount of
|
925 |
+
– 12 –
|
926 |
+
|
927 |
+
Edge weight
|
928 |
+
VI
|
929 |
+
VI
|
930 |
+
Silhouette
|
931 |
+
Silhouette
|
932 |
+
Unique
|
933 |
+
Merged
|
934 |
+
Fake 𝑁wrong
|
935 |
+
trk
|
936 |
+
CPU
|
937 |
+
weighted
|
938 |
+
weighted
|
939 |
+
PDF ratio
|
940 |
+
base 0.839
|
941 |
+
0.407
|
942 |
+
0.615
|
943 |
+
0.646
|
944 |
+
33.3
|
945 |
+
8.2
|
946 |
+
2.4
|
947 |
+
15%
|
948 |
+
0.25s
|
949 |
+
cnst
|
950 |
+
0.782
|
951 |
+
0.362
|
952 |
+
0.649
|
953 |
+
0.660
|
954 |
+
33.9
|
955 |
+
7.9
|
956 |
+
2.3
|
957 |
+
8%
|
958 |
+
0.18s
|
959 |
+
Regression
|
960 |
+
base 0.860
|
961 |
+
0.416
|
962 |
+
0.589
|
963 |
+
0.623
|
964 |
+
34.7
|
965 |
+
7.6
|
966 |
+
4.1
|
967 |
+
14%
|
968 |
+
0.27s
|
969 |
+
cnst
|
970 |
+
0.829
|
971 |
+
0.387
|
972 |
+
0.614
|
973 |
+
0.633
|
974 |
+
35.0
|
975 |
+
7.5
|
976 |
+
3.9
|
977 |
+
8%
|
978 |
+
0.18s
|
979 |
+
BDT
|
980 |
+
base 0.945
|
981 |
+
0.399
|
982 |
+
0.478
|
983 |
+
0.230
|
984 |
+
35.0
|
985 |
+
7.5
|
986 |
+
7.1
|
987 |
+
5%
|
988 |
+
0.23s
|
989 |
+
cnst
|
990 |
+
0.937
|
991 |
+
0.377
|
992 |
+
0.487
|
993 |
+
0.234
|
994 |
+
35.2
|
995 |
+
7.4
|
996 |
+
7.0
|
997 |
+
4%
|
998 |
+
0.14s
|
999 |
+
Table 4: LMC performance for the collision energy 13 TeV, pileup 63 and interaction region width
|
1000 |
+
𝜎𝑧 = 35 mm. These simulation parameters are chosen to match the full ATLAS simulation for Run
|
1001 |
+
2 results used for comparison. The column 𝑁wrong
|
1002 |
+
trk
|
1003 |
+
shows the fraction of tracks wrongly associated
|
1004 |
+
by the clustering algorithm, which shall be compared to the truth fraction of 20% (Table 2).
|
1005 |
+
fake clusters is in the range of 5–15%. The number of tracks in the different cluster categories is
|
1006 |
+
presented in Figure 9. The number of tracks in the unique clusters is close to the track amount in
|
1007 |
+
the truth vertices, see Figure 2, while the merged clusters contain much more tracks. Finally, fake
|
1008 |
+
clusters have a very small number of tracks.
|
1009 |
+
0
|
1010 |
+
10 20 30 40 50 60 70 80 90 100
|
1011 |
+
Number of tracks in cluster
|
1012 |
+
0
|
1013 |
+
0.02
|
1014 |
+
0.04
|
1015 |
+
0.06
|
1016 |
+
0.08
|
1017 |
+
0.1
|
1018 |
+
Density (arbitrary units)
|
1019 |
+
Unique vertices
|
1020 |
+
0
|
1021 |
+
10 20 30 40 50 60 70 80 90 100
|
1022 |
+
Number of tracks in cluster
|
1023 |
+
0
|
1024 |
+
0.005
|
1025 |
+
0.01
|
1026 |
+
0.015
|
1027 |
+
0.02
|
1028 |
+
0.025
|
1029 |
+
0.03
|
1030 |
+
0.035
|
1031 |
+
Density (arbitrary units)
|
1032 |
+
Merged vertices
|
1033 |
+
0
|
1034 |
+
10 20 30 40 50 60 70 80 90 100
|
1035 |
+
Number of tracks in cluster
|
1036 |
+
0
|
1037 |
+
0.1
|
1038 |
+
0.2
|
1039 |
+
0.3
|
1040 |
+
0.4
|
1041 |
+
0.5
|
1042 |
+
0.6
|
1043 |
+
0.7
|
1044 |
+
Density (arbitrary units)
|
1045 |
+
Fake vertices
|
1046 |
+
Figure 9: Number of tracks in a cluster for the unique, merged and fake cluster categories. The
|
1047 |
+
distributions are obtained for pileup
|
1048 |
+
�
|
1049 |
+
𝜇
|
1050 |
+
�
|
1051 |
+
= 63 data using a one-variable logistic regression for the
|
1052 |
+
edge weight assignment.
|
1053 |
+
7.2
|
1054 |
+
High-Luminosity LHC 14 TeV data
|
1055 |
+
The High Luminosity LHC (HL-LHC) project foresees a significant increase in interaction rates
|
1056 |
+
to collect significantly more data and thus increase the sensitivity for new physics. The exact
|
1057 |
+
parameters of the upgraded HL-LHC are not yet final; pileup values of 150, 200, and 250, and an
|
1058 |
+
interaction region width of 𝜎𝑧 = 42 mm are considered the most probable options. These options
|
1059 |
+
result in an increase in the density of pileup interaction vertices up to a factor of 4, as compared
|
1060 |
+
to the current LHC parameters. The degree of truth cluster overlap rises from 20% to 66%, see
|
1061 |
+
– 13 –
|
1062 |
+
|
1063 |
+
Table 1. It is interesting to check the performance of the LMC problem formulation in such extreme
|
1064 |
+
conditions.
|
1065 |
+
For this test, the same PDF ratio and logistic regression function are used for the edge weight
|
1066 |
+
calculation, while the BDT classification is retrained using 𝜇 = 150, 200, 250 data. Results for
|
1067 |
+
nominal PDF ratio and logistic regression-based edge weight calculation functions are shown in
|
1068 |
+
Tables 5, 6, and 7.
|
1069 |
+
Edge weight
|
1070 |
+
VI
|
1071 |
+
VI
|
1072 |
+
Silhouette
|
1073 |
+
Silhouette
|
1074 |
+
Unique
|
1075 |
+
Merged
|
1076 |
+
Fake 𝑁wrong
|
1077 |
+
trk
|
1078 |
+
CPU
|
1079 |
+
weighted
|
1080 |
+
weighted
|
1081 |
+
PDF ratio
|
1082 |
+
base 1.318
|
1083 |
+
0.690
|
1084 |
+
0.535
|
1085 |
+
0.577
|
1086 |
+
57.7
|
1087 |
+
27.4
|
1088 |
+
4.8
|
1089 |
+
28%
|
1090 |
+
1.1s
|
1091 |
+
cnst
|
1092 |
+
1.211
|
1093 |
+
0.612
|
1094 |
+
0.581
|
1095 |
+
0.609
|
1096 |
+
59.4
|
1097 |
+
26.9
|
1098 |
+
4.1
|
1099 |
+
14%
|
1100 |
+
0.42s
|
1101 |
+
Regression
|
1102 |
+
base 1.316
|
1103 |
+
0.682
|
1104 |
+
0.514
|
1105 |
+
0.559
|
1106 |
+
63.0
|
1107 |
+
25.6
|
1108 |
+
8.8
|
1109 |
+
26%
|
1110 |
+
0.73s
|
1111 |
+
cnst
|
1112 |
+
1.259
|
1113 |
+
0.634
|
1114 |
+
0.546
|
1115 |
+
0.582
|
1116 |
+
63.6
|
1117 |
+
25.4
|
1118 |
+
8.2
|
1119 |
+
14%
|
1120 |
+
0.50s
|
1121 |
+
BDT
|
1122 |
+
base 1.303
|
1123 |
+
0.658
|
1124 |
+
0.394
|
1125 |
+
0.146
|
1126 |
+
61.8
|
1127 |
+
25.9
|
1128 |
+
13
|
1129 |
+
9%
|
1130 |
+
0.96s
|
1131 |
+
cnst
|
1132 |
+
1.275
|
1133 |
+
0.616
|
1134 |
+
0.409
|
1135 |
+
0.155
|
1136 |
+
62.8
|
1137 |
+
25.6
|
1138 |
+
12
|
1139 |
+
7%
|
1140 |
+
0.43s
|
1141 |
+
Table 5: LMC performance for pileup 𝜇 = 150 in an HL-LHC environment with collision energy
|
1142 |
+
14 TeV and interaction region size 𝜎𝑧 = 42 mm. The column 𝑁wrong
|
1143 |
+
trk
|
1144 |
+
shows the fraction of the
|
1145 |
+
tracks, wrongly associated by the clustering algorithm, which can be compared to the true fraction
|
1146 |
+
41% (Table 2).
|
1147 |
+
Edge weight
|
1148 |
+
VI
|
1149 |
+
VI
|
1150 |
+
Silhouette
|
1151 |
+
Silhouette
|
1152 |
+
Unique
|
1153 |
+
Merged
|
1154 |
+
Fake 𝑁wrong
|
1155 |
+
trk
|
1156 |
+
CPU
|
1157 |
+
weighted
|
1158 |
+
weighted
|
1159 |
+
PDF ratio
|
1160 |
+
base 1.574
|
1161 |
+
0.852
|
1162 |
+
0.500
|
1163 |
+
0.546
|
1164 |
+
64.3
|
1165 |
+
40.3
|
1166 |
+
5.7
|
1167 |
+
36%
|
1168 |
+
2.3s
|
1169 |
+
cnst
|
1170 |
+
1.441
|
1171 |
+
0.756
|
1172 |
+
0.552
|
1173 |
+
0.586
|
1174 |
+
66.6
|
1175 |
+
39.8
|
1176 |
+
4.8
|
1177 |
+
18%
|
1178 |
+
0.69s
|
1179 |
+
Regression
|
1180 |
+
base 1.546
|
1181 |
+
0.825
|
1182 |
+
0.492
|
1183 |
+
0.539
|
1184 |
+
70.3
|
1185 |
+
38.6
|
1186 |
+
9.0
|
1187 |
+
32%
|
1188 |
+
2.4s
|
1189 |
+
cnst
|
1190 |
+
1.470
|
1191 |
+
0.765
|
1192 |
+
0.529
|
1193 |
+
0.568
|
1194 |
+
71.0
|
1195 |
+
38.4
|
1196 |
+
8.1
|
1197 |
+
18%
|
1198 |
+
0.69s
|
1199 |
+
BDT
|
1200 |
+
base 1.512
|
1201 |
+
0.805
|
1202 |
+
0.312
|
1203 |
+
0.040
|
1204 |
+
69.9
|
1205 |
+
38.6
|
1206 |
+
15.6
|
1207 |
+
13%
|
1208 |
+
1.8s
|
1209 |
+
cnst
|
1210 |
+
1.479
|
1211 |
+
0.755
|
1212 |
+
0.332
|
1213 |
+
0.051
|
1214 |
+
71.3
|
1215 |
+
38.2
|
1216 |
+
15.0
|
1217 |
+
7%
|
1218 |
+
0.66s
|
1219 |
+
Table 6: LMC performance for pileup 𝜇 = 200 in an HL-LHC environment with collision energy
|
1220 |
+
14 TeV and interaction region size 𝜎𝑧 = 42 mm. The column 𝑁wrong
|
1221 |
+
trk
|
1222 |
+
shows the fraction of the
|
1223 |
+
tracks, wrongly associated by the clustering algorithm, which can be compared to the true fraction
|
1224 |
+
53% (Table 2).
|
1225 |
+
Similarly to the 𝜇 = 63 results, the BDT-based edge weight assignment leads to a significantly
|
1226 |
+
worse Silhouette metric value, a much smaller value of the cluster overlap and a larger number of
|
1227 |
+
fake clusters, while the PDF ratio and regression-based edge weight calculation approaches provide
|
1228 |
+
similar performances. The weighted versions of the VI and Silhouette metrics have significantly
|
1229 |
+
better values than the standard ones due to downscaling of the noise.
|
1230 |
+
The use of constraints
|
1231 |
+
– 14 –
|
1232 |
+
|
1233 |
+
Edge weight
|
1234 |
+
VI
|
1235 |
+
VI
|
1236 |
+
Silhouette
|
1237 |
+
Silhouette
|
1238 |
+
Unique
|
1239 |
+
Merged
|
1240 |
+
Fake 𝑁wrong
|
1241 |
+
trk
|
1242 |
+
CPU
|
1243 |
+
weighted
|
1244 |
+
weighted
|
1245 |
+
PDF ratio
|
1246 |
+
base 1.782
|
1247 |
+
0.990
|
1248 |
+
0.477
|
1249 |
+
0.526
|
1250 |
+
68.7
|
1251 |
+
53.2
|
1252 |
+
6.4
|
1253 |
+
42%
|
1254 |
+
3.0s
|
1255 |
+
cnst
|
1256 |
+
1.638
|
1257 |
+
0.887
|
1258 |
+
0.531
|
1259 |
+
0.569
|
1260 |
+
71.0
|
1261 |
+
52.7
|
1262 |
+
5.3
|
1263 |
+
21%
|
1264 |
+
1.7s
|
1265 |
+
Regression
|
1266 |
+
base 1.753
|
1267 |
+
0.961
|
1268 |
+
0.467
|
1269 |
+
0.517
|
1270 |
+
77.1
|
1271 |
+
51.2
|
1272 |
+
11.
|
1273 |
+
38%
|
1274 |
+
3.2s
|
1275 |
+
cnst
|
1276 |
+
1.672
|
1277 |
+
0.895
|
1278 |
+
0.505
|
1279 |
+
0.547
|
1280 |
+
77.8
|
1281 |
+
51.1
|
1282 |
+
9.9
|
1283 |
+
21%
|
1284 |
+
1.7s
|
1285 |
+
BDT
|
1286 |
+
base 1.691
|
1287 |
+
0.941
|
1288 |
+
0.307
|
1289 |
+
0.040
|
1290 |
+
72.8
|
1291 |
+
52.4
|
1292 |
+
15.
|
1293 |
+
12%
|
1294 |
+
3.0s
|
1295 |
+
cnst
|
1296 |
+
1.651
|
1297 |
+
0.882
|
1298 |
+
0.330
|
1299 |
+
0.055
|
1300 |
+
74.5
|
1301 |
+
52.0
|
1302 |
+
14.
|
1303 |
+
9%
|
1304 |
+
1.2s
|
1305 |
+
Table 7: LMC performance for pileup 𝜇 = 250 in an HL-LHC environment with collision energy
|
1306 |
+
14 TeV and interaction region size 𝜎𝑧 = 42 mm. The column 𝑁wrong
|
1307 |
+
trk
|
1308 |
+
shows the fraction of the
|
1309 |
+
tracks, wrongly associated by the clustering algorithm, which can be compared to the true fraction
|
1310 |
+
66% (Table 2).
|
1311 |
+
significantly improves all quality estimators and provides ∼ 30% CPU reduction.
|
1312 |
+
The number of unambiguously reconstructed unique clusters is 53% (44%, 37%) out of the
|
1313 |
+
total amount of the reconstructable truth vertices for the pileup 𝜇 = 150 (200, 250). The remaining
|
1314 |
+
56 (90, 125) reconstructable truth vertices are clustered into 25 (40, 52) merged clusters. The
|
1315 |
+
correctness of representation of the initial truth vertices by merged clusters is not granted. Truth
|
1316 |
+
vertices with a large number of tracks might “absorb” vertices with a small number of tracks.
|
1317 |
+
7.3
|
1318 |
+
LMC performance adjustment
|
1319 |
+
As can be seen from Tables 4–7, different edge weight assignment approaches lead to non-coinciding
|
1320 |
+
clustering results. For a practical application of the LMC approach for primary vertex finding in
|
1321 |
+
the LHC experiments, it is important to verify whether a unique optimal clustering solution exists
|
1322 |
+
in this problem and, if so, whether the different LMC cost functions can be tuned to provide the
|
1323 |
+
same clustering. As explained in Section 5, parameters of the PDF ratio and regression function for
|
1324 |
+
the edge weights can be modified to enforce under- or over-segmentation.The PDF ratio function
|
1325 |
+
can be scaled up and down. In the logistic regression function, the intercept term can be shifted by
|
1326 |
+
a constant. The cost function modifications are tried on the 𝜇 = 150 data. The obtained clustering
|
1327 |
+
results are shown in Figure 10 and Figure 11.
|
1328 |
+
In the performed test, the exploited metrics change monotonically depending on the scale factor
|
1329 |
+
for the PDF ratio and the intercept shift for the linear regression function. It doesn’t seem possible
|
1330 |
+
to adjust the PDF ratio and logistic regression parameters so that both approaches provide exactly
|
1331 |
+
the same clustering performances in all used metrics. In addition, the BDTG-based Silhouette and
|
1332 |
+
Silhouette weighted metrics results (see Table 5) are not reproducible by any modification of the
|
1333 |
+
PDF ratio and logistic regression cost functions. However, the overall variations of the clustering
|
1334 |
+
results remain limited, which means that the LMC approach performance stays close to optimal in
|
1335 |
+
the full scanned parameter range.
|
1336 |
+
To conclude, the cost function modification test doesn’t demonstrate the presence of an evident
|
1337 |
+
unique globally optimal clustering solution for the problem in consideration. Three used edge
|
1338 |
+
– 15 –
|
1339 |
+
|
1340 |
+
0.8
|
1341 |
+
0.9
|
1342 |
+
1
|
1343 |
+
1.1
|
1344 |
+
PDF ratio scale
|
1345 |
+
0.4
|
1346 |
+
0.5
|
1347 |
+
0.6
|
1348 |
+
0.7
|
1349 |
+
0.8
|
1350 |
+
0.9
|
1351 |
+
1
|
1352 |
+
1.1
|
1353 |
+
1.2
|
1354 |
+
1.3
|
1355 |
+
1.4
|
1356 |
+
Metrics
|
1357 |
+
VI
|
1358 |
+
VI weighted
|
1359 |
+
Silhouette
|
1360 |
+
Silhouette weighted
|
1361 |
+
0.8
|
1362 |
+
0.9
|
1363 |
+
1
|
1364 |
+
1.1
|
1365 |
+
PDF ratio scale
|
1366 |
+
0
|
1367 |
+
20
|
1368 |
+
40
|
1369 |
+
60
|
1370 |
+
80
|
1371 |
+
100
|
1372 |
+
Clusters
|
1373 |
+
All
|
1374 |
+
Unique
|
1375 |
+
Merged
|
1376 |
+
Fake
|
1377 |
+
Resolution
|
1378 |
+
0
|
1379 |
+
0.2
|
1380 |
+
0.4
|
1381 |
+
Resolution (mm)
|
1382 |
+
Figure 10: PDF ratio cost-based clustering results as a function of the applied scaling.
|
1383 |
+
0.2
|
1384 |
+
−
|
1385 |
+
0
|
1386 |
+
0.2
|
1387 |
+
0.4
|
1388 |
+
Regression intercept shift
|
1389 |
+
0.4
|
1390 |
+
0.5
|
1391 |
+
0.6
|
1392 |
+
0.7
|
1393 |
+
0.8
|
1394 |
+
0.9
|
1395 |
+
1
|
1396 |
+
1.1
|
1397 |
+
1.2
|
1398 |
+
1.3
|
1399 |
+
1.4
|
1400 |
+
Metrics
|
1401 |
+
VI
|
1402 |
+
VI weighted
|
1403 |
+
Silhouette
|
1404 |
+
Silhouette weighted
|
1405 |
+
0.2
|
1406 |
+
−
|
1407 |
+
0
|
1408 |
+
0.2
|
1409 |
+
0.4
|
1410 |
+
Regression intercept shift
|
1411 |
+
0
|
1412 |
+
20
|
1413 |
+
40
|
1414 |
+
60
|
1415 |
+
80
|
1416 |
+
100
|
1417 |
+
Clusters
|
1418 |
+
All
|
1419 |
+
Unique
|
1420 |
+
Merged
|
1421 |
+
Fake
|
1422 |
+
Resolution
|
1423 |
+
0
|
1424 |
+
0.2
|
1425 |
+
0.4
|
1426 |
+
Resolution (mm)
|
1427 |
+
Figure 11: Logistic regression cost-based clustering results as a function of the logistic regression
|
1428 |
+
intercept term shift.
|
1429 |
+
weight assignment strategies provide different clustering results, which can be additionally changed
|
1430 |
+
by simple modification of the cost functions. Therefore, for a practical application as a primary
|
1431 |
+
vertex finder, an exact LMC formulation should be chosen based on desired physics requirements,
|
1432 |
+
e.g. minimal amount of fake vertices or best vertex–vertex resolution, disregarding the clustering
|
1433 |
+
metrics.
|
1434 |
+
7.4
|
1435 |
+
Influence of tracks with large measurement errors
|
1436 |
+
As the truth cluster overlap is caused by the track position mismeasurement, the overlap degree
|
1437 |
+
can be reduced by removing the badly measured tracks by cutting on the track measurement error
|
1438 |
+
shown in Figure 2b. A moderate decrease in the total amount of tracks due to this rejection should
|
1439 |
+
not significantly affect the overall clustering efficiency as the total amount of tracks per truth vertex
|
1440 |
+
is big enough, see Figure 2a. Reduction of the amount of the selected tracks and the degree of the
|
1441 |
+
truth cluster overlap due to strongly mismeasured track removal is shown in Table 8. The results
|
1442 |
+
– 16 –
|
1443 |
+
|
1444 |
+
Track error cut
|
1445 |
+
𝑁trk
|
1446 |
+
Truth overlap
|
1447 |
+
-
|
1448 |
+
1674
|
1449 |
+
41%
|
1450 |
+
0.8
|
1451 |
+
1540
|
1452 |
+
31%
|
1453 |
+
0.6
|
1454 |
+
1444
|
1455 |
+
27%
|
1456 |
+
0.4
|
1457 |
+
1283
|
1458 |
+
22%
|
1459 |
+
Table 8: Number of selected tracks and the truth degree of overlap as a function of the track error
|
1460 |
+
cut for 𝜇 = 150 data.
|
1461 |
+
of the clustering are shown in Figure 12 for the PDF ratio cost function and in Figure 13 for the
|
1462 |
+
nominal logistic regression cost function.
|
1463 |
+
0.5
|
1464 |
+
1
|
1465 |
+
1.5
|
1466 |
+
Track error cut(mm)
|
1467 |
+
0.4
|
1468 |
+
0.5
|
1469 |
+
0.6
|
1470 |
+
0.7
|
1471 |
+
0.8
|
1472 |
+
0.9
|
1473 |
+
1
|
1474 |
+
1.1
|
1475 |
+
1.2
|
1476 |
+
1.3
|
1477 |
+
1.4
|
1478 |
+
Metrics
|
1479 |
+
VI
|
1480 |
+
VI weighted
|
1481 |
+
Silhouette
|
1482 |
+
Silhouette weighted
|
1483 |
+
0.5
|
1484 |
+
1
|
1485 |
+
1.5
|
1486 |
+
Track error cut (mm)
|
1487 |
+
0
|
1488 |
+
20
|
1489 |
+
40
|
1490 |
+
60
|
1491 |
+
80
|
1492 |
+
100
|
1493 |
+
Clusters
|
1494 |
+
All
|
1495 |
+
Unique
|
1496 |
+
Merged
|
1497 |
+
Fake
|
1498 |
+
Figure 12: PDF ratio cost-based clustering results as a function of the applied track error cut for
|
1499 |
+
the 𝜇 = 150 data.
|
1500 |
+
0.5
|
1501 |
+
1
|
1502 |
+
1.5
|
1503 |
+
Track error cut(mm)
|
1504 |
+
0.4
|
1505 |
+
0.5
|
1506 |
+
0.6
|
1507 |
+
0.7
|
1508 |
+
0.8
|
1509 |
+
0.9
|
1510 |
+
1
|
1511 |
+
1.1
|
1512 |
+
1.2
|
1513 |
+
1.3
|
1514 |
+
1.4
|
1515 |
+
Metrics
|
1516 |
+
VI
|
1517 |
+
VI weighted
|
1518 |
+
Silhouette
|
1519 |
+
Silhouette weighted
|
1520 |
+
0.5
|
1521 |
+
1
|
1522 |
+
1.5
|
1523 |
+
Track error cut (mm)
|
1524 |
+
0
|
1525 |
+
20
|
1526 |
+
40
|
1527 |
+
60
|
1528 |
+
80
|
1529 |
+
100
|
1530 |
+
Clusters
|
1531 |
+
All
|
1532 |
+
Unique
|
1533 |
+
Merged
|
1534 |
+
Fake
|
1535 |
+
Figure 13: Logistic regression cost-based clustering results as a function of the applied track error
|
1536 |
+
cut for the 𝜇 = 150 data.
|
1537 |
+
– 17 –
|
1538 |
+
|
1539 |
+
The distance-based metric demonstrates very small changes in the clustering results in a
|
1540 |
+
wide range of the badly measured track admixture and, correspondingly, the initial degree of the
|
1541 |
+
vertex overlap. One may conclude that the amount of clusters identified by the LMC algorithm is
|
1542 |
+
largely defined by the tracks with small measurement errors and, therefore, is stable with respect
|
1543 |
+
to significant track noise admixture. Redistribution of the tracks with big errors over the obtained
|
1544 |
+
clusters doesn’t change their amount but evidently strongly affects all track counting-based clustering
|
1545 |
+
metrics. The track weighting does mitigate this effect for the VI metric, its weighted version is
|
1546 |
+
practically independent of the track noise admixture. Surprisingly, the Silhouette metric is only
|
1547 |
+
weakly sensitive to this noise.
|
1548 |
+
7.5
|
1549 |
+
Comparison with the existing approaches
|
1550 |
+
6
|
1551 |
+
−
|
1552 |
+
4
|
1553 |
+
−
|
1554 |
+
2
|
1555 |
+
−
|
1556 |
+
0
|
1557 |
+
2
|
1558 |
+
4
|
1559 |
+
6
|
1560 |
+
z [mm]
|
1561 |
+
∆
|
1562 |
+
arbitrary units
|
1563 |
+
|
1564 |
+
t
|
1565 |
+
AMVF, t
|
1566 |
+
|
1567 |
+
t
|
1568 |
+
IVF, t
|
1569 |
+
Preliminary
|
1570 |
+
Simulation
|
1571 |
+
ATLAS
|
1572 |
+
= 60
|
1573 |
+
〉
|
1574 |
+
µ
|
1575 |
+
〈
|
1576 |
+
= 13 TeV,
|
1577 |
+
s
|
1578 |
+
0
|
1579 |
+
10
|
1580 |
+
20
|
1581 |
+
30
|
1582 |
+
40
|
1583 |
+
50
|
1584 |
+
60
|
1585 |
+
70
|
1586 |
+
80
|
1587 |
+
interactions per bunch crossing
|
1588 |
+
pp
|
1589 |
+
Number of
|
1590 |
+
0
|
1591 |
+
10
|
1592 |
+
20
|
1593 |
+
30
|
1594 |
+
40
|
1595 |
+
50
|
1596 |
+
60
|
1597 |
+
Average number of reconstructed vertices
|
1598 |
+
100% interaction reconstruction efficiency
|
1599 |
+
Reconstruction acceptance
|
1600 |
+
t
|
1601 |
+
AMVF, t
|
1602 |
+
t
|
1603 |
+
IVF, t
|
1604 |
+
AMVF - MATCHED
|
1605 |
+
AMVF - MERGED
|
1606 |
+
AMVF - SPLIT
|
1607 |
+
AMVF - FAKE
|
1608 |
+
ATLAS Simulation Preliminary
|
1609 |
+
= 13 TeV
|
1610 |
+
s
|
1611 |
+
6
|
1612 |
+
−
|
1613 |
+
4
|
1614 |
+
−
|
1615 |
+
2
|
1616 |
+
−
|
1617 |
+
0
|
1618 |
+
2
|
1619 |
+
4
|
1620 |
+
6
|
1621 |
+
z[mm]
|
1622 |
+
∆
|
1623 |
+
|
1624 |
+
0
|
1625 |
+
200
|
1626 |
+
400
|
1627 |
+
600
|
1628 |
+
800
|
1629 |
+
1000
|
1630 |
+
1200
|
1631 |
+
1400
|
1632 |
+
Events / 0.02mm
|
1633 |
+
DELPHES simulation LMC Cluster-Cluster distance
|
1634 |
+
=0.37mm
|
1635 |
+
CC
|
1636 |
+
R
|
1637 |
+
0
|
1638 |
+
10
|
1639 |
+
20
|
1640 |
+
30
|
1641 |
+
40
|
1642 |
+
50
|
1643 |
+
60
|
1644 |
+
70
|
1645 |
+
80
|
1646 |
+
Number of pp interactions per bunch crossing
|
1647 |
+
0
|
1648 |
+
10
|
1649 |
+
20
|
1650 |
+
30
|
1651 |
+
40
|
1652 |
+
50
|
1653 |
+
60
|
1654 |
+
Average number of reconstructed clusters
|
1655 |
+
LMC All
|
1656 |
+
LMC Unique
|
1657 |
+
LMC Merged
|
1658 |
+
100% interaction reconstruction efficiency
|
1659 |
+
Reconstruction acceptance
|
1660 |
+
Figure 14: The vertex–vertex resolution and the number of reconstructed vertices as a function
|
1661 |
+
of the number of 𝑝𝑝 interactions for typical ATLAS data. The upper plots are obtained with the
|
1662 |
+
the ATLAS baseline AMVF [4] and IVF [3] algorithms. The bottom plots are obtained using the
|
1663 |
+
LMC algorithm with the PDF ratio-based edge weight assignment on DELPHES 𝜇 = 63 data.
|
1664 |
+
The DELPHES 𝜇 = 63 simulation is specially tuned to match the ATLAS data used in [4]. The
|
1665 |
+
cluster–cluster resolution for the LMC algorithm on the bottom left picture is obtained as described
|
1666 |
+
in Section 6.
|
1667 |
+
The ATLAS Collaboration used the IVF algorithm [3] to reconstruct the 𝑝𝑝 collision vertices
|
1668 |
+
in Run 1 and the AMVF algorithm [4] in Run 2 and Run 3. Essential characteristics of a primary-
|
1669 |
+
vertex reconstruction algorithm are the vertex–vertex resolution and the number of reconstructed
|
1670 |
+
– 18 –
|
1671 |
+
|
1672 |
+
vertices as a function of the number of 𝑝𝑝 interactions. The upper plots in Figure 14 present the
|
1673 |
+
corresponding distributions for typical ATLAS data for the AMVF and IVF algorithms. The bottom
|
1674 |
+
plots show the same distributions provided by the LMC algorithm using DELPHES data tuned to
|
1675 |
+
the same pileup conditions.
|
1676 |
+
Figure 14 clearly demonstrates that the LMC algorithm outperforms the ATLAS heuristic
|
1677 |
+
algorithms. It provides significantly better vertex–vertex resolution. This naturally leads to a larger
|
1678 |
+
amount of Unique/Matched vertices reconstructed by LMC, while the amount of Merged vertices
|
1679 |
+
remains practically the same. Routine application of the LMC for the primary vertex reconstruction
|
1680 |
+
can provide a significant gain in performance for LHC and future collider experiments.
|
1681 |
+
8
|
1682 |
+
Conclusion
|
1683 |
+
In this work, we have addressed a typical particle physics problem of reconstructing multiple
|
1684 |
+
interaction positions in a dense environment, where each interaction is represented by a cluster
|
1685 |
+
of tracks. Significant track reconstruction errors lead to a large overlap of truth track clusters,
|
1686 |
+
which makes their identification challenging. Heuristic algorithms are usually used to address this
|
1687 |
+
problem. In contrast, we propose to address this problem through a principled formulation as a
|
1688 |
+
minimum-cost lifted multicut problem. We construct several cost functions for the LMC from
|
1689 |
+
track–track distances and their significance. We study the performance of the LMC algorithm
|
1690 |
+
for different vertex densities, cost functions, constraint usage and varying degree of overlap. To
|
1691 |
+
address potential performance problems of existing track counting clustering metrics for strongly
|
1692 |
+
overlapped clusters, dedicated metrics are introduced.
|
1693 |
+
We demonstrate that the LMC approach outperforms the heuristic algorithms in the problem
|
1694 |
+
of vertex reconstruction in dense environments in terms of vertex–vertex resolution and vertex
|
1695 |
+
reconstruction efficiency. It works up to the highest vertex density expected at the HL-HLC project
|
1696 |
+
in spite of the strong truth cluster overlap reaching ∼ 60%. Variations of the LMC algorithm
|
1697 |
+
parameters and cost functions studied in this work resulted in relatively small variations of the
|
1698 |
+
obtained clustering solutions.
|
1699 |
+
Acknowledgments
|
1700 |
+
This work is supported by the German Science Foundation (DFG) through a research grant and a
|
1701 |
+
Heisenberg professorship under contracts CR-312/4-1 and CR-312/5-1.
|
1702 |
+
References
|
1703 |
+
[1] R. Frühwirth and A. Strandlie, Pattern Recognition, Tracking and Vertex Reconstruction in Particle
|
1704 |
+
Detectors. Springer, 2021, 10.1007/978-3-030-65771-0.
|
1705 |
+
[2] ATLAS Collaboration, “Primary Vertex Selection in VBF Higgs to Invisibles at 𝜇 = 200 with the
|
1706 |
+
ATLAS Experiment.” IDTR-2019-004, 2019.
|
1707 |
+
[3] ATLAS Collaboration, Reconstruction of primary vertices at the ATLAS experiment in Run 1
|
1708 |
+
proton–proton collisions at the LHC, Eur. Phys. J. C 77 (2017) 332.
|
1709 |
+
– 19 –
|
1710 |
+
|
1711 |
+
[4] ATLAS Collaboration, “Development of ATLAS primary vertex reconstruction for LHC Run 3.”
|
1712 |
+
ATL-PHYS-PUB-2019-015, 2019.
|
1713 |
+
[5] CMS Collaboration, Description and performance of track and primary-vertex reconstruction with
|
1714 |
+
the cms tracker, JINST 9 (2014) P10009.
|
1715 |
+
[6] S. Hageböck and E. von Toerne, Medical imaging inspired vertex reconstruction at LHC, Journal of
|
1716 |
+
Physics: Conference Series 396 (2012) 022021.
|
1717 |
+
[7] W. Waltenberger et al., Rave—a detector-independent vertex reconstruction toolkit, Nuclear
|
1718 |
+
Instruments and Methods in Physics Research A (2007) 549.
|
1719 |
+
[8] K. Rose, Deterministic annealing for clustering, compression, classification, regression and related
|
1720 |
+
optimisation problems, Proceedings of the IEEE 86 (1998) 2210.
|
1721 |
+
[9] M. Keuper, E. Levinkov, N. Bonneel, G. Lavoue, T. Brox and B. Andres, Efficient decomposition of
|
1722 |
+
image and mesh graphs by lifted multicuts, Proceedings of the IEEE International Conference on
|
1723 |
+
Computer Vision, ICCV (2015) .
|
1724 |
+
[10] E. D. Demaine, D. Emanuel, A. Fiat and N. Immorlica, Correlation clustering in general weighted
|
1725 |
+
graphs, Theoretical Computer Science 361 (2006) 172.
|
1726 |
+
[11] S. Chopra and M. R. Rao, The partition problem, Mathematical Programming 59 (1993) 87.
|
1727 |
+
[12] A. Horňáková, J.-H. Lange and B. Andres, Analysis and optimization of graph decompositions by
|
1728 |
+
lifted multicuts, Proceedings of the International Conference on Machine Learning, ICML (2017)
|
1729 |
+
[1503.03791].
|
1730 |
+
[13] T. Beier, T. Kroeger, J. Kappes, U. Köthe and F. Hamprecht, Cut, glue & cut: A fast, approximate
|
1731 |
+
solver for multicut partitioning, Proceedings of the IEEE Conference on Computer Vision and Pattern
|
1732 |
+
Recognition, CVPR (2014) .
|
1733 |
+
[14] J. H. Kappes, B. Andres, F. A. Hamprecht, C. Schnörr, S. Nowozin, D. Batra et al., A Comparative
|
1734 |
+
Study of Modern Inference Techniques for Structured Discrete Energy Minimization Problems,
|
1735 |
+
International Journal of Computer Vision 115 (2015) 155 [1404.0533].
|
1736 |
+
[15] T. Beier, B. Andres, U. Köthe and F. A. Hamprecht, An efficient fusion move algorithm for the
|
1737 |
+
minimum cost lifted multicut problem, Computer Vision – ECCV 2016. Lecture Notes in Computer
|
1738 |
+
Science (2016) .
|
1739 |
+
[16] A. Kardoost and M. Keuper, Solving minimum cost lifted multicut problems by node agglomeration,
|
1740 |
+
Computer Vision – ACCV 2018 (2019) .
|
1741 |
+
[17] DELPHES 3 collaboration, DELPHES 3: a modular framework for fast simulation of a generic
|
1742 |
+
collider experiment, JHEP 02 (2014) 057 [1307.6346].
|
1743 |
+
[18] C. Bierlich et al., A comprehensive guide to the physics and usage of PYTHIA 8.3, 2203.11601.
|
1744 |
+
[19] A. Hoecker et al., TMVA - Toolkit for Multivariate Data Analysis, physics/0703039.
|
1745 |
+
[20] M. Meilă, Comparing clusterings—an information based distance, Journal of Multivariate Analysis
|
1746 |
+
98 (2007) 873.
|
1747 |
+
[21] P. J. Rousseeuw, Silhouettes: A graphical aid to the interpretation and validation of cluster analysis,
|
1748 |
+
Journal of Computational and Applied Mathematics 20 (1987) 53.
|
1749 |
+
– 20 –
|
1750 |
+
|
1751 |
+
A
|
1752 |
+
Non-clustered tracks and total reconstructed clusters
|
1753 |
+
In this study, we use four simulated event samples representing realistic proton–proton interactions at
|
1754 |
+
the LHC with different energies and luminosities. The total amounts of interaction vertices with one
|
1755 |
+
reconstructed track and two and more tracks are shown in Table 9. Due to the track measurement
|
1756 |
+
errors, the one-track vertices are difficult to reconstruct correctly without a priori information.
|
1757 |
+
Finding two and more track vertices becomes problematic if the vertex–vertex distance is less than
|
1758 |
+
the typical track measurement error. Both problems are illustrated in Table 9, where the amounts
|
1759 |
+
of the one-track and multi-track clusters are given for every cost function and event sample.
|
1760 |
+
13 TeV
|
1761 |
+
14 TeV
|
1762 |
+
�
|
1763 |
+
𝜇
|
1764 |
+
�
|
1765 |
+
= 63
|
1766 |
+
�
|
1767 |
+
𝜇
|
1768 |
+
�
|
1769 |
+
= 150
|
1770 |
+
�
|
1771 |
+
𝜇
|
1772 |
+
�
|
1773 |
+
= 200
|
1774 |
+
�
|
1775 |
+
𝜇
|
1776 |
+
�
|
1777 |
+
= 250
|
1778 |
+
𝑁vrt
|
1779 |
+
ntrk=1
|
1780 |
+
𝑁vrt
|
1781 |
+
ntrk>1
|
1782 |
+
𝑁vrt
|
1783 |
+
ntrk=1
|
1784 |
+
𝑁vrt
|
1785 |
+
ntrk>1
|
1786 |
+
𝑁vrt
|
1787 |
+
ntrk=1
|
1788 |
+
𝑁vrt
|
1789 |
+
ntrk>1
|
1790 |
+
𝑁vrt
|
1791 |
+
ntrk=1
|
1792 |
+
𝑁vrt
|
1793 |
+
ntrk>1
|
1794 |
+
Truth
|
1795 |
+
4
|
1796 |
+
50
|
1797 |
+
9
|
1798 |
+
119
|
1799 |
+
12
|
1800 |
+
160
|
1801 |
+
16
|
1802 |
+
199
|
1803 |
+
𝑁cl
|
1804 |
+
ntrk = 1
|
1805 |
+
𝑁rec
|
1806 |
+
clust
|
1807 |
+
𝑁cl
|
1808 |
+
ntrk = 1
|
1809 |
+
𝑁rec
|
1810 |
+
clust
|
1811 |
+
𝑁cl
|
1812 |
+
ntrk = 1
|
1813 |
+
𝑁rec
|
1814 |
+
clust
|
1815 |
+
𝑁cl
|
1816 |
+
ntrk = 1
|
1817 |
+
𝑁rec
|
1818 |
+
clust
|
1819 |
+
PDF ratio
|
1820 |
+
11
|
1821 |
+
44
|
1822 |
+
19
|
1823 |
+
90
|
1824 |
+
23
|
1825 |
+
110
|
1826 |
+
25
|
1827 |
+
128
|
1828 |
+
Regression
|
1829 |
+
13
|
1830 |
+
46
|
1831 |
+
25
|
1832 |
+
97
|
1833 |
+
27
|
1834 |
+
118
|
1835 |
+
31
|
1836 |
+
139
|
1837 |
+
BDTG
|
1838 |
+
43
|
1839 |
+
50
|
1840 |
+
77
|
1841 |
+
101
|
1842 |
+
102
|
1843 |
+
124
|
1844 |
+
104
|
1845 |
+
140
|
1846 |
+
Table 9: Average numbers of non-clustered tracks and reconstructed clusters obtained by the
|
1847 |
+
LMC algorithm with different cost functions as compared to the truth numbers of single-track and
|
1848 |
+
multi-track vertices. Results are shown for all collision energies and pileup densities.
|
1849 |
+
The number of one-track clusters in each case is significantly larger than the truth amount of
|
1850 |
+
one-track interaction vertices, especially in the BDTG case. They should be thought of as non-
|
1851 |
+
clustered tracks, not as reconstructed one-track vertices. The fraction of multi-track clusters found
|
1852 |
+
decreases with the interaction vertex density, as expected.
|
1853 |
+
– 21 –
|
1854 |
+
|
E9E5T4oBgHgl3EQfVA-E/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
F9AyT4oBgHgl3EQfSveK/content/tmp_files/2301.00092v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
F9AyT4oBgHgl3EQfSveK/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
FtE0T4oBgHgl3EQfRAB3/content/tmp_files/2301.02201v1.pdf.txt
ADDED
@@ -0,0 +1,867 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Computer Anxiety: Supporting the Transition
|
2 |
+
from Desktop to Mobile
|
3 |
+
Thiago Donizetti dos Santos
|
4 |
+
Federal University of ABC (UFABC)
|
5 |
+
Santo André, SP, Brazil
|
6 | |
7 |
+
Vagner Figueredo de Santana
|
8 |
+
IBM Research
|
9 |
+
São Paulo, SP, Brazil
|
10 | |
11 |
+
ABSTRACT
|
12 |
+
Computer Anxiety is a phenomenon studied in multiple contexts
|
13 |
+
and, in the actual COVID-19 scenario, it is gaining more and more
|
14 |
+
importance as it impacts technology adoption and autonomy. Peo-
|
15 |
+
ple with Computer Anxiety (PwCA) might feel intimidated, afraid
|
16 |
+
of feeling embarrassed or scared of damaging computers, even
|
17 |
+
before the actual interaction. Thus, supporting the detection of
|
18 |
+
Computer Anxiety at scale has the potential to support the tech-
|
19 |
+
nology industry to cope with this challenge. This position paper
|
20 |
+
presents a user study involving 39 elderly participants in an inves-
|
21 |
+
tigation on the feasibility of using interaction events common to
|
22 |
+
desktop and smartphones to predict different levels of Computer
|
23 |
+
Anxiety. Moreover, it also proposes research directions about the
|
24 |
+
role of smartphones in the context of Computer Anxiety for elderly
|
25 |
+
people as a mean of supporting good first user experiences with
|
26 |
+
technology, meaningful daily use, privacy, and feeling safe even
|
27 |
+
when doing mistakes. We expect this position paper motivates prac-
|
28 |
+
titioners, designers, and developers to consider Computer Anxiety
|
29 |
+
as one of the existing barriers when creating mobile applications
|
30 |
+
for elderly people.
|
31 |
+
CCS CONCEPTS
|
32 |
+
• Human-centered computing → Field studies.
|
33 |
+
KEYWORDS
|
34 |
+
Computer Anxiety; Aging; Older Adults; Accessibility; Usability;
|
35 |
+
User Experience; smartphones; mobile
|
36 |
+
ACM Reference Format:
|
37 |
+
Thiago Donizetti dos Santos and Vagner Figueredo de Santana. 2021. Com-
|
38 |
+
puter Anxiety: Supporting the Transition from Desktop to Mobile. , 7 pages.
|
39 |
+
1
|
40 |
+
INTRODUCTION
|
41 |
+
The use of smartphones in daily activities is increasing in a fast pace.
|
42 |
+
The ownership of smartphones by adults, in US, grew from 35%
|
43 |
+
to 81% in the period between 2011 and 2019 [6]. Smartphones are
|
44 |
+
generally used to make and receive calls, to access the internet, to
|
45 |
+
text, to access social media and services (e.g., such as food delivery,
|
46 |
+
transport, and mobility). Bearing in mind the ownership of devices,
|
47 |
+
the rate of people owning smartphones drops from 96% (for the
|
48 |
+
Permission to make digital or hard copies of part or all of this work for personal or
|
49 |
+
classroom use is granted without fee provided that copies are not made or distributed
|
50 |
+
for profit or commercial advantage and that copies bear this notice and the full citation
|
51 |
+
on the first page. Copyrights for third-party components of this work must be honored.
|
52 |
+
For all other uses, contact the owner/author(s).
|
53 |
+
CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13,
|
54 |
+
2021, Yokohama, Japan
|
55 |
+
© 2021 Copyright held by the owner/author(s).
|
56 |
+
group aging between 18 and 29 years) to 53% (for the group aging
|
57 |
+
65+ years) [6]. This difference shows that elderly people are increas-
|
58 |
+
ingly using smartphones, but have not yet adopted this technology
|
59 |
+
in the same way as young adults, which may indicate the existence
|
60 |
+
of aspects impacting the adoption of smartphones by elderly users.
|
61 |
+
Since a variety of services and content are currently available
|
62 |
+
online, the difficulties faced by elderly people while using smart-
|
63 |
+
phones may impact their quality of life. Through the use of mobile
|
64 |
+
applications, one could order food, get a driver using a transport
|
65 |
+
app, travel alone using maps, communicate with family members
|
66 |
+
using instant messaging, learn new things on e-learning platforms
|
67 |
+
or just browse photos and other contents on the social media appli-
|
68 |
+
cations. Such services foment autonomy and help to avoid common
|
69 |
+
stereotypes of dependency and limitations.
|
70 |
+
One phenomenon that can help in the understanding of issues
|
71 |
+
faced by the elderly people when using new technologies is Com-
|
72 |
+
puter Anxiety (CA). CA can be defined in terms of affective factors
|
73 |
+
such as intimidation, fear, apprehension, hostility, and worries that
|
74 |
+
one will be embarrassed, will look stupid, or thinks she/he could
|
75 |
+
damage the computer [15]. Although generally related to the use of
|
76 |
+
computers, CA can also impact the use of other electronic devices
|
77 |
+
and previously was also called “Technophobia” [3]. CA is related
|
78 |
+
to technology acceptance [36] and it is generally related to biologi-
|
79 |
+
cal changes such as blood pressure, heart rate and electrodynamic
|
80 |
+
responses that occur while a person is using a device [30]. CA
|
81 |
+
symptoms can occur during the interaction with the system and
|
82 |
+
even before it, affecting the perceived ease of use and acting as a
|
83 |
+
barrier, impacting the system accessibility as well [35]. Although
|
84 |
+
CA can affect people of all ages, the literature shows that CA is
|
85 |
+
more present in older groups [7, 12, 35]. Adding this to the rela-
|
86 |
+
tionship between CA and technology acceptance, elderly people
|
87 |
+
may face problems to use mobile devices and, when they use it, CA
|
88 |
+
could make the system difficult to use, make them perform poorly
|
89 |
+
on tasks or fail to achieve their goals while using the device.
|
90 |
+
In this context, this position paper presents results from a user
|
91 |
+
study involving 39 elderly participants aiming at exploring the
|
92 |
+
feasibility of predicting CA from interaction events common to
|
93 |
+
desktop and smartphones, mapped here as a regression problem.
|
94 |
+
In addition, it also discusses the role of smartphones in supporting
|
95 |
+
people with CA (PwCA) in the process of learning how to use
|
96 |
+
technology, first experience, daily use, and autonomy. Thus, the
|
97 |
+
following research questions were defined to guide the study: (1)
|
98 |
+
Is it possible to predict different levels of CA using interaction events
|
99 |
+
common to desktop and smartphones? and (2) How can smartphones
|
100 |
+
be used to support the adoption of new technologies by PwCA? The
|
101 |
+
work is organized as follows: the section 2 presents the related
|
102 |
+
work, the section 3 details the user study, the section 4 shows the
|
103 |
+
arXiv:2301.02201v1 [cs.HC] 5 Jan 2023
|
104 |
+
|
105 |
+
CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
|
106 |
+
Thiago Donizetti dos Santos and Vagner Figueredo de Santana
|
107 |
+
results, section 5 discusses the role of smartphone for PwCA and
|
108 |
+
section 6 concludes.
|
109 |
+
2
|
110 |
+
RELATED WORK
|
111 |
+
CA is also called Computerphobia, Computer Apprehension, and
|
112 |
+
Technophobia in the literature [3]. Rosen et al. [32] pointed out the
|
113 |
+
following methods and questionnaires to measure CA:
|
114 |
+
• Computer Anxiety Index (CAIN) examines avoidance of,
|
115 |
+
caution with, negative attitudes toward, and disinterest in
|
116 |
+
computers [23].
|
117 |
+
• Computer Attitude Scale (CAS) assesses computer liking,
|
118 |
+
confidence, and anxiety through a Likert attitude-measurement
|
119 |
+
format [21].
|
120 |
+
• Attitudes Toward Computers Questionnaire (ATCQ) as-
|
121 |
+
sesses attitudes towards computer appreciation, usage, and
|
122 |
+
societal impact [31].
|
123 |
+
• Computer Anxiety Rating Scale (CARS) assesses behav-
|
124 |
+
ioral, cognitive, and affective components related to technol-
|
125 |
+
ogy use [15, 32].
|
126 |
+
• Mobile Computer Anxiety Scale (MCAS) assesses anxiety
|
127 |
+
regarding mobile computer using a 38-item Likert scale [39].
|
128 |
+
The literature presents multiple factors associated with CA. In
|
129 |
+
sum, PwCA usually have less experience in using computers, have
|
130 |
+
low Computer Self-efficacy (CSE)1, take too long to accomplish
|
131 |
+
tasks, perform worse when compared to other users, have negative
|
132 |
+
beliefs about computer/skills, or negative bodily sensations previ-
|
133 |
+
ous/during the interaction with a computer [35]. Earlier studies find
|
134 |
+
a strong relationship between age and CA levels, showing evidence
|
135 |
+
that CA is more present in groups with older people and that they
|
136 |
+
have more CA than younger ones [7, 12, 27]. This can be related
|
137 |
+
to the pace in which technology advances and to the fact that 48%
|
138 |
+
of older adults report that they usually need someone else to set
|
139 |
+
up a new electronic device or show them how to use it [5]. In this
|
140 |
+
scenario, mobile accessibility has potential to support PwCA in
|
141 |
+
increasing CSE, reducing negative beliefs and worries of using or
|
142 |
+
damaging the device in front of other people.
|
143 |
+
CA is also present in a few acceptance models. The Technology
|
144 |
+
Acceptance Model (TAM) is one example. It uses the CA as a compo-
|
145 |
+
nent that changes the perceived ease of use2. So, when considering
|
146 |
+
the adoption of new technology by elderly people, CA should be
|
147 |
+
taken into account, from design to personalization features.
|
148 |
+
The influence of CA was investigated in contexts such as accep-
|
149 |
+
tance of e-learning tools, e-gov, new technologies and health-care
|
150 |
+
systems [8, 14, 17, 18, 22, 29, 36]. These studies stated that:
|
151 |
+
• PwCA tend to prefer traditional classes instead of e-learning
|
152 |
+
systems and computer-based tests;
|
153 |
+
• PwCA usually perform worse on virtual classes when com-
|
154 |
+
pared to people without CA;
|
155 |
+
• PwCA have more difficulties in accepting new technologies;
|
156 |
+
• Older PwCA face difficulties using home telehealth services
|
157 |
+
and to learn how to use smartphones.
|
158 |
+
1Computer Self-efficacy (CSE) is the belief one has in his/her own abilities to perform
|
159 |
+
a task in the computer [9]
|
160 |
+
2Perceived ease of use is defined as the degree to which a person believes that using a
|
161 |
+
particular system would be free of effort [1]
|
162 |
+
Considering support offered to PwCA, the literature presents
|
163 |
+
that instructional/technical support reduce CA in the context of
|
164 |
+
e-learning systems [13, 24, 26]. Finally, smartphones have potential
|
165 |
+
to provide instructional support in a privacy respecting way, sup-
|
166 |
+
porting the user-technology dialog, reducing worriers associated
|
167 |
+
to trial and error inherent to learning.
|
168 |
+
3
|
169 |
+
METHOD
|
170 |
+
This section details how the user study was run, including its materi-
|
171 |
+
als, procedure, setup, experiment design, and data analysis planned.
|
172 |
+
The goal of the study was to collect data related to questionnaires
|
173 |
+
to identify different CA levels and collect detailed interaction data
|
174 |
+
while participants performed tasks on a website in order to detect
|
175 |
+
CA. Moreover, this study also aimed at exploring interaction data
|
176 |
+
common to desktop and smartphone and at understanding the role
|
177 |
+
of smartphone usage for PwCA. The types of data captured will be
|
178 |
+
detailed in the Data Analysis section. Before the main experiment,
|
179 |
+
a pilot was performed in order to assess the user study plan as
|
180 |
+
whole. The pilot included 4 elderly participants, recruited the same
|
181 |
+
way the participants of the main experiment (detailed in the next
|
182 |
+
section). The pilot achieved its goals in assessing protocol adopted,
|
183 |
+
duration, and data capture procedure. Next, we detail the method
|
184 |
+
followed in the main experiment.
|
185 |
+
3.1
|
186 |
+
Participants
|
187 |
+
Elderly people may face difficulties in staying up-to-date with tech-
|
188 |
+
nology and, since they have not used computers since childhood,
|
189 |
+
many of them face CA even when performing a simple task to
|
190 |
+
others age groups [35]. Hence, the target-audience considered in
|
191 |
+
this work is elderly people.
|
192 |
+
The participants of the experiment were recruited from a list
|
193 |
+
of registered people at the elderly center of the city of São Paulo,
|
194 |
+
Brazil, called Reference Centre for Citizenship of Elderly (CRECI@).
|
195 |
+
São Paulo is the biggest city in Latin America, with a population
|
196 |
+
of approximately 11.2 million people in the last census (2010) and
|
197 |
+
the current estimate is of 12.2 million people3; the population of
|
198 |
+
elderly people is approximately 11.9%4. Before recruiting partici-
|
199 |
+
pants, a partnership was signed and the proper process for ethics
|
200 |
+
committee was followed at the Federal University of ABC (process #
|
201 |
+
2.808.392 and CAEE: 94704418.8.0000.5594), detailing the materials,
|
202 |
+
procedure, questionnaires, data to be collected, and analysis to be
|
203 |
+
performed.
|
204 |
+
Moreover, only those who had never taken computer classes
|
205 |
+
offered by CRECI@ were invited as potential participants, since
|
206 |
+
results from the literature point that computer classes might reduce
|
207 |
+
CA [35], which could result in a bias.
|
208 |
+
3.2
|
209 |
+
Materials
|
210 |
+
Questionnaires about CA, use of smartphones and computers skills
|
211 |
+
were applied (Appendix A). In order to isolate CA from other co-
|
212 |
+
morbidities, questionnaires to assess cognitive abilities and levels
|
213 |
+
of depression were also applied. Only participants with low levels
|
214 |
+
of depression and those who do not present signals of dementia or
|
215 |
+
3https://cidades.ibge.gov.br/brasil/sp/sao-paulo/panorama
|
216 |
+
4http://produtos.seade.gov.br/produtos/retratosdesp/view/index.php?
|
217 |
+
temaId=1&indId=4&locId=3550308
|
218 |
+
|
219 |
+
Computer Anxiety: Supporting the Transition
|
220 |
+
from Desktop to Mobile
|
221 |
+
CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
|
222 |
+
cognitive deficits had their data considered in the analyses. These
|
223 |
+
two metrics were considered in the exclusion criteria, detailed in
|
224 |
+
the procedure. The questionnaires applied are listed below:
|
225 |
+
• Technology use and profile: Has questions about the par-
|
226 |
+
ticipant’s age, educational level, and frequency of use of
|
227 |
+
computers and smartphones. This questionnaire was applied
|
228 |
+
to give an overview of how participants use technology on
|
229 |
+
a daily basis (Appendix A).
|
230 |
+
• Mini Mental: A cognitive screening test used for adults and
|
231 |
+
the elderly to evaluate orientation, memory and attention,
|
232 |
+
naming ability, obedience to verbal and writing commands,
|
233 |
+
free writing of a sentence, and copying a complex drawing
|
234 |
+
(two intersecting polygons). It is currently the most used test
|
235 |
+
for this type of assessment in the world [25]. The rationale
|
236 |
+
for using Mini Mental was to identify comorbidity to CA.
|
237 |
+
• Geriatric Depression Scale (GDS): GDS is a scale with 30
|
238 |
+
yes/no questions used for screening depression in elderly
|
239 |
+
people [2, 40]. The rationale for using GDS was also to iden-
|
240 |
+
tify comorbidity to CA.
|
241 |
+
• Computer Anxiety Rating Scale (CARS): CARS has nine-
|
242 |
+
teen questions in a five points Likert scale ranging from
|
243 |
+
strongly disagree to strongly agree. It assesses the behavioral,
|
244 |
+
cognitive and affective components related to technology
|
245 |
+
use [15, 32]. The rationale for using CARS is that it is the
|
246 |
+
most referenced questionnaire for screening CA [35].
|
247 |
+
• Computer Self-Efficacy (CSE): CSE is a ten items scale used
|
248 |
+
to assess Computer Self-efficacy [9, 38]. The rationale for
|
249 |
+
using CSE was to cross check the results from this study
|
250 |
+
with results from the literature that show that CSE has a
|
251 |
+
strong but inverse relationship with CA.
|
252 |
+
• System Usability Scale (SUS): A five points Likert scale ques-
|
253 |
+
tionnaire with ten items. It is often used to assess the per-
|
254 |
+
ceived usability [4]. The rationale for using it was to compare
|
255 |
+
perceived usability of the website and the CARS values.
|
256 |
+
In order to capture the interaction data, the participants used a
|
257 |
+
desktop computer including a interaction logger and internet access.
|
258 |
+
The interaction logger used was the open source logger called User
|
259 |
+
Test Logger5. The User Test Logger captures all JavaScript events
|
260 |
+
such as mouse movements, clicks, keys pressed, etc., and generates
|
261 |
+
a raw log file where each line represents an event and information
|
262 |
+
about when, where, and what is related to the event triggered [34].
|
263 |
+
3.3
|
264 |
+
Procedure
|
265 |
+
The experiment was structured into three steps: pre-test, test, and
|
266 |
+
post-test. The steps are detailed next.
|
267 |
+
3.3.1
|
268 |
+
Pre-test. First, screening tests for cognitive deficit, depres-
|
269 |
+
sion, and literacy were applied to identify participants whose scores
|
270 |
+
fall outside the inclusion criteria. The Mini Mental presents a score
|
271 |
+
indicating good cognitive capacity relating the answer points ob-
|
272 |
+
tained and years of education of the participant as follows:
|
273 |
+
• No formal education: ≤ 21 points;
|
274 |
+
• 1 to 5 years of formal education: ≤ 24 points;
|
275 |
+
• 6 to 11 years of formal education: ≤ 26 points;
|
276 |
+
• 12+ years of formal education: ≤ 27 points
|
277 |
+
5https://github.com/IBM/user-test-logger
|
278 |
+
For GDS screening test, a score of four points or less on the scale
|
279 |
+
indicates low levels of depression. Hence, the exclusion criterion
|
280 |
+
was: 𝐺𝐷𝑆 ≥ 5 points. After the tests considered in the exclusion
|
281 |
+
criteria, CARS and CSE were applied.
|
282 |
+
3.3.2
|
283 |
+
Test. The tasks were performed individually on a computer
|
284 |
+
with the User Test Logger installed. First, each participant was asked
|
285 |
+
to access SESC homepage (Figure 1). The Social Service of Com-
|
286 |
+
merce (SESC) is a private entity maintained by the entrepreneurs of
|
287 |
+
the trade in goods, tourism, and services. SESC aims to provide the
|
288 |
+
welfare and quality of life to workers in this sector and their fami-
|
289 |
+
lies 6. SESC offers many activities for elderly people such as courses,
|
290 |
+
sports, art exhibition and culture-related events in multiple units in
|
291 |
+
the metropolitan area of São Paulo. The tasks were defined aiming
|
292 |
+
to encourage participants to search online for activities offered by
|
293 |
+
SESC and others services in the city, hoping to help them to see the
|
294 |
+
internet as a tool which they can use as a means of improving their
|
295 |
+
quality of life. The same way they do at CRECI@. In addition, the
|
296 |
+
tasks were structured to be as familiar and as close to real tasks as
|
297 |
+
possible. The tasks read out loud to participants were the following:
|
298 |
+
(1) Search for an event, class, or activity he/she might be inter-
|
299 |
+
ested;
|
300 |
+
(2) Find the address of the unit where the chosen activity/event
|
301 |
+
is offered;
|
302 |
+
(3) Find the route to the unit.
|
303 |
+
Figure 1: Homepage of the SESC’s website.
|
304 |
+
There was no maximum time limit for the tasks. Thus, the task
|
305 |
+
duration depended on participants saying whether they finished or
|
306 |
+
gave up on the task. Finally, Thinking-Aloud Protocol [20] was used
|
307 |
+
to understand the rationale of users while performing the tasks.
|
308 |
+
3.3.3
|
309 |
+
Post-test. In order to evaluate the perceived usability and
|
310 |
+
any relationship with CA levels, they were asked to answer the
|
311 |
+
SUS questionnaire.
|
312 |
+
3.4
|
313 |
+
Data analysis
|
314 |
+
According to the exclusion criteria defined, the data from partic-
|
315 |
+
ipants who did not score the points required by Mini Mental or
|
316 |
+
scored five or more points on GDS were removed from the data set
|
317 |
+
to be analyzed. The resulting data set combined data from the inter-
|
318 |
+
action logger, questionnaires, and thinking-aloud protocol. Since
|
319 |
+
the logged data were in raw format, all data captured were pro-
|
320 |
+
cessed in order to extract usage metrics. The following metrics were
|
321 |
+
considered having in mind they could also be applied in a mobile
|
322 |
+
interaction setting: time to perform the task, number of clicks and
|
323 |
+
double-clicks, click duration, typing velocity, and total time typing.
|
324 |
+
6https://www.sescsp.org.br/
|
325 |
+
|
326 |
+
3 Pagina Inicial - Sesc SP - Mozilla Firefox
|
327 |
+
Debugging with Firefox Developer T X
|
328 |
+
S Pagina Inicial - Sesc SP
|
329 |
+
+
|
330 |
+
@ https://www.sescsp.org.br
|
331 |
+
Q Pesquisar
|
332 |
+
国三不
|
333 |
+
Um Portal para cada um!
|
334 |
+
Login
|
335 |
+
Esqueci a senha I Cadastre-se
|
336 |
+
Para ver os destaques da programagao de acordo com seus interesses
|
337 |
+
fEntrar com Facebook
|
338 |
+
ou
|
339 |
+
email
|
340 |
+
senha
|
341 |
+
ok
|
342 |
+
online, cadastre-se aqui.
|
343 |
+
OPORTUNIDADES
|
344 |
+
+ CREDENCIAL PLENA
|
345 |
+
Meu perfil
|
346 |
+
Sesc
|
347 |
+
SAO PAULO
|
348 |
+
O que voce procura?
|
349 |
+
0000.
|
350 |
+
Projeto Sawe
|
351 |
+
Encontros no Sesc Ipiranga debatem a luta dos
|
352 |
+
indios pela defesa de seus territorios e os desafios de
|
353 |
+
construir o futuro mediante contextos impostos pela
|
354 |
+
sociedade nao indigenaCHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
|
355 |
+
Thiago Donizetti dos Santos and Vagner Figueredo de Santana
|
356 |
+
Finally, all metrics and the questionnaires scores were combined
|
357 |
+
in a single comma-separated-values (CSV) file used to perform
|
358 |
+
the data analysis. This CSV file is the main data source for the
|
359 |
+
regression analysis performed to predict CARS values based only
|
360 |
+
on interaction data, which could allow its use at scale.
|
361 |
+
4
|
362 |
+
RESULTS
|
363 |
+
The experiment included 39 participants, but data from 8 partici-
|
364 |
+
pants were not considered in the analysis due to exclusion crite-
|
365 |
+
ria. Thus, considering the data from the remaining 31 participants
|
366 |
+
(51.61% of males, 48.39% of females). The participants’ ages ranged
|
367 |
+
between 62 and 87 years (𝑥 = 72.84). Regarding the computer usage,
|
368 |
+
25.81% of the participants reported that they do not own a computer
|
369 |
+
and do not have frequent access to computers, while 12.90% do not
|
370 |
+
own a computer, but use it at lanhouses or those available in public
|
371 |
+
places; 61.29% reported owning computers. Regarding frequency
|
372 |
+
of use, 61.29% reported that rarely (less than once a month) use a
|
373 |
+
computer, 16.13% reported that use it sometimes (more than once
|
374 |
+
a month), 6.45% reported that usually (more than once a week)
|
375 |
+
use it, and 16.13% reported that always (everyday) use computers.
|
376 |
+
When considering ownership and use of smartphones, 87.10% of
|
377 |
+
the participants reported that they own smartphones and 48.39%
|
378 |
+
reported that they always use it. The education level of the par-
|
379 |
+
ticipants varies from 0 to 15 years of formal education (𝑥 = 10.42)
|
380 |
+
(Figure 2).
|
381 |
+
Figure 2: Distribution of years of formal education.
|
382 |
+
The obtained scores for CARS ranged from 20 to 59 (𝑥 = 42.19).
|
383 |
+
Based on [10], the maximum and minimum scores were used to
|
384 |
+
divide the data into 3 groups as follows: 𝐶𝐴𝑅𝑆_𝑟𝑎𝑛𝑔𝑒 : 59 − 20 = 39
|
385 |
+
and 𝐺𝑟𝑜𝑢𝑝_𝑟𝑎𝑛𝑔𝑒 : 𝐶𝐴𝑅𝑆_𝑟𝑎𝑛𝑔𝑒/3 = 13.
|
386 |
+
• No CA: CARS < 33 (6 participants);
|
387 |
+
• Moderate CA: 33 ≤ CARS < 46 (14 participants);
|
388 |
+
• High CA: CARS ≥ 46 (11 participants).
|
389 |
+
Considering the three CA groups, Figure 3 shows the presence of
|
390 |
+
CA considering the participants’ age. It can be seen that participants
|
391 |
+
in the no CA group are among the youngest. The age of these
|
392 |
+
participants ranged from 63 to 78 years old (𝑥 = 68.43, 𝜎 = 5.68).
|
393 |
+
The age of the participants in the moderate CA group ranged from
|
394 |
+
62 to 83 years old (𝑥 = 73.92, 𝜎 = 5.60). And, for the high CA group,
|
395 |
+
the age of the participants ranged from 63 to 87 (𝑥 = 74.36, 𝜎 = 6.77),
|
396 |
+
showing that high levels of CA are present over almost the entire
|
397 |
+
age range covered in the study. Mann-Whitney non-parametric test
|
398 |
+
shows that age was different between no CA and moderate CA
|
399 |
+
groups (p-value = 0.03); no significant difference was found in other
|
400 |
+
pairwise group comparisons.
|
401 |
+
Figure 3: Age distributions for different CA groups.
|
402 |
+
Bearing in mind the use of smartphones, Figure 4 shows smart-
|
403 |
+
phone ownership and different uses by different CA groups. It can
|
404 |
+
be seen that high CA group uses smartphones more for calls and less
|
405 |
+
for leisure and other communication activities (e.g., games, music,
|
406 |
+
video, instant messages, and social networks). On the other hand,
|
407 |
+
people in the no CA group use smartphone heavily to access social
|
408 |
+
network, instant messages, and internet. Analyzing the ownership
|
409 |
+
rate by CA groups, it can be seen that 73% of the participants with
|
410 |
+
high CA own smartphones, while the ownership is greater in the
|
411 |
+
moderate CA group (92%) and reaches 100% for the no CA group.
|
412 |
+
Similarly, considering the frequency of use of computers, people
|
413 |
+
who rarely use computers are the ones with greater CA levels. 82%
|
414 |
+
of the participants with high CA use it rarely, while it is 61.5% of
|
415 |
+
the participants of the moderate CA and 28% of the no CA group.
|
416 |
+
Figure 4: Smartphone ownership and use by CA groups.
|
417 |
+
Bearing in mind task completion, 23 (74.19%) participants found
|
418 |
+
an activity and completed the first task. Four participants found an
|
419 |
+
activity that was not of interest to them or was offered by a unit
|
420 |
+
far from their home, but they did not find another one after that.
|
421 |
+
The remaining four gave up without finding an activity. For the
|
422 |
+
Task 2, nine out of 23 (39.13%) participants found the address of
|
423 |
+
the unit where the selected activity is offered and 14 participants
|
424 |
+
found only the name of the unit. Regarding the Task 3, six out of
|
425 |
+
nine (66.67%) participants found the map available on the site, but
|
426 |
+
all of them failed to find the route to the unit. Only two out of
|
427 |
+
nine (22.22%) participants figured out how to put the starting point
|
428 |
+
address on the map-based UI. In sum, task completion dropped from
|
429 |
+
74.19% (task 1), to 39.13% (task 2), and to 0% (task 3); 22.22% (6.45%,
|
430 |
+
considering 31 participants) partially completed the last task. This
|
431 |
+
can be related to task difficulty, fatigue effects, and task dependence.
|
432 |
+
|
433 |
+
Education levels (in years)
|
434 |
+
12
|
435 |
+
participants
|
436 |
+
10
|
437 |
+
Number of
|
438 |
+
2
|
439 |
+
0
|
440 |
+
4
|
441 |
+
6
|
442 |
+
8
|
443 |
+
10
|
444 |
+
11
|
445 |
+
13
|
446 |
+
14
|
447 |
+
15
|
448 |
+
Education yearsAge vs. CARS groups
|
449 |
+
85
|
450 |
+
80
|
451 |
+
e
|
452 |
+
75
|
453 |
+
70
|
454 |
+
65
|
455 |
+
。
|
456 |
+
No CARS
|
457 |
+
Moderate CARS
|
458 |
+
High CARSSmartphone use x Computer Anxiety Leve
|
459 |
+
Music/Video
|
460 |
+
Message
|
461 |
+
Games
|
462 |
+
Call
|
463 |
+
Instant Message
|
464 |
+
Social networks
|
465 |
+
Internet
|
466 |
+
Smartphone ownership
|
467 |
+
0%
|
468 |
+
10%
|
469 |
+
20%
|
470 |
+
30%
|
471 |
+
40%
|
472 |
+
50%
|
473 |
+
60%
|
474 |
+
70%
|
475 |
+
80%
|
476 |
+
%06
|
477 |
+
100%
|
478 |
+
No CA
|
479 |
+
Moderate CA
|
480 |
+
High CAComputer Anxiety: Supporting the Transition
|
481 |
+
from Desktop to Mobile
|
482 |
+
CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
|
483 |
+
However, after triangulating these results with thinking-aloud data,
|
484 |
+
it was possible to identify that participants faced difficulties with
|
485 |
+
the map-based UI. For instance, participant 11 said: “It doesn’t say
|
486 |
+
where it is. I didn’t like SESC.”, participant 35 said: “Why don’t you
|
487 |
+
have the address on the about the unit page?” and participant 42
|
488 |
+
said: “It will take me a long time to find it (address)”. While using
|
489 |
+
the map, for instance, participant 22 said: “What should I do here?
|
490 |
+
I have never used it (map) before”; participants are numbered from
|
491 |
+
1-4 for the pilot and 5-43 for the experiment.
|
492 |
+
Table 1 summarizes the time taken by each group to complete
|
493 |
+
the tasks, showing the mean time and standard deviation by CA
|
494 |
+
group. It can be seen that the group of participants with high CA
|
495 |
+
had a mean shorter task time than the other groups in some tasks.
|
496 |
+
This might be related to the fact that PwCA usually gave up more
|
497 |
+
because they feel frustrated, lost, or think that they would not be
|
498 |
+
able to finish the task. This also shows the relationship between
|
499 |
+
high CA and low CSE, as identified in previous studies [35] and
|
500 |
+
[11]. This can be exemplified by the participants quotes as: “I think
|
501 |
+
I will have difficulty in this task”, “This is difficult”, “I’m lost, I don’t
|
502 |
+
know what to do”, and “I don’t know how to find it”.
|
503 |
+
Task 1 in sec.
|
504 |
+
Task 2 in sec.
|
505 |
+
Task 3 in sec.
|
506 |
+
Group
|
507 |
+
𝑥 (𝜎)
|
508 |
+
𝑥 (𝜎)
|
509 |
+
𝑥 (𝜎)
|
510 |
+
High CA
|
511 |
+
411.18 (230.72)
|
512 |
+
599.67 (220.30)
|
513 |
+
398.00 (262.19)
|
514 |
+
Mod. CA
|
515 |
+
647.90 (666.46)
|
516 |
+
450.13 (336.52)
|
517 |
+
560.50 (30.50)
|
518 |
+
No CA
|
519 |
+
525.14 (331.39)
|
520 |
+
587.00 (390.73)
|
521 |
+
399.67 (375.05)
|
522 |
+
Table 1: Average task time by group and standard deviations.
|
523 |
+
Although the interaction data was collected during the use of a
|
524 |
+
desktop computer, in this study we explore metrics which can be
|
525 |
+
captured in a mobile setting as well, namely: task time, numbers
|
526 |
+
of clicks and double clicks, mean click duration (interval between
|
527 |
+
pressing and releasing), typing velocity and total time typing. All
|
528 |
+
metrics were normalized for the regression analysis. Prior to fit-
|
529 |
+
ting the regression model, a random oversampling algorithm was
|
530 |
+
applied7 addressing the minority values and a train-test split of
|
531 |
+
80% / 20% was applied. Figure 5 shows Random Forest regression
|
532 |
+
predictions for CA values (y-axis) vs. CARS values in the test set
|
533 |
+
(x-axis). The obtained regressor has a mean squared error (MSE) of
|
534 |
+
22.21 and 𝑅2 = 0.84. The high MSE value is due to errors related to
|
535 |
+
predictions for lower CA scores. This pessimist prediction would
|
536 |
+
show that users need more support than they would actually need,
|
537 |
+
so such regressor might be useful for indicating when support for
|
538 |
+
PwCA could be applied.
|
539 |
+
5
|
540 |
+
DISCUSSION
|
541 |
+
Although there are few studies reporting no significant relationship
|
542 |
+
between age and CA [16, 19, 28], there are also evidences that older
|
543 |
+
people manifest more CA than younger ones [7, 12, 27, 33, 37].
|
544 |
+
Results suggest that younger participants were in the no CA group,
|
545 |
+
while the older were in the moderate CA group. For high CA group,
|
546 |
+
results suggest that there were participants with high CA almost
|
547 |
+
in the whole age range considered, but it still shows a greater
|
548 |
+
concentration among the older ones (median = 74 years, 𝑥 = 74.2,
|
549 |
+
7https://imbalanced-learn.org/stable/over_sampling.html
|
550 |
+
Figure 5: Regression test results of CARS scores prediction.
|
551 |
+
𝑠𝑖𝑔𝑚𝑎 = 7.12). These results are similar to other findings in the
|
552 |
+
literature, indicating that the CA is more present in the older groups.
|
553 |
+
Moreover, unlike [30], the results suggest that previous experience
|
554 |
+
may impact CA levels, since people who rarely use computers and
|
555 |
+
smartphones were the ones with greater CA levels.
|
556 |
+
The difficulty in adopting new technologies is suggested by re-
|
557 |
+
sults in Figure 4. Although there is a high rate of PwCA owning
|
558 |
+
smartphones, the most frequent reported use is making calls. Thus,
|
559 |
+
the participants use the smartphone, but they use the same way
|
560 |
+
they used to do with the old phones: making calls. Moreover, the no
|
561 |
+
CA group presented the same rate (57%) when using smartphones
|
562 |
+
to make calls, using instant message and social networks apps. In
|
563 |
+
contrast, moderate and high CA groups use more to make calls
|
564 |
+
than to any of the other functions analyzed. Also they use more
|
565 |
+
to make calls then the no CA group and presented a lower rate of
|
566 |
+
ownership of smartphones than the no CA group. The increasing
|
567 |
+
rate of smartphone ownership and the decreasing rate of use of
|
568 |
+
different smartphone functions show possible impacts of CA on
|
569 |
+
the behavior of the elderly regarding technology. The second most
|
570 |
+
frequent use is instant message apps, even though there is also a
|
571 |
+
difference between groups for this use. The use of this application
|
572 |
+
could be related to the presence of functions such as the ability to
|
573 |
+
make calls using the app or using voice messages. They reported to
|
574 |
+
be used to make calls and that the use of voice messages is easier for
|
575 |
+
them, since they generally have difficulties using the keyboard of
|
576 |
+
the smartphones to write and may have difficulty in reading due to
|
577 |
+
the size of the screen and letters. These findings suggest that high
|
578 |
+
levels of CA may affect people of all ages, but it is more present
|
579 |
+
among older ones due to factors such as lack of practice or lack of
|
580 |
+
knowledge about recent features that could improve UX.
|
581 |
+
The results regarding task completion and time taken to complete
|
582 |
+
tasks show how CA levels might affect task performance. Besides
|
583 |
+
the low task completion rate for the high CA group, this group
|
584 |
+
took less time trying to complete the Task 1, showing that PwCA
|
585 |
+
usually gave up more. The implications for HCI researchers in this
|
586 |
+
aspect are related to the design of shorter and simpler tasks and to
|
587 |
+
improve user experience, accessibility and usability, since high CA
|
588 |
+
levels impact negatively the perceived easy of use and CSE, as they
|
589 |
+
may feel frustrated or lost when facing problems to achieve their
|
590 |
+
goals during the interaction.
|
591 |
+
|
592 |
+
Random Forest Regression
|
593 |
+
50
|
594 |
+
30
|
595 |
+
区
|
596 |
+
21
|
597 |
+
31
|
598 |
+
50
|
599 |
+
CARSCHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
|
600 |
+
Thiago Donizetti dos Santos and Vagner Figueredo de Santana
|
601 |
+
CA is also related to specific situations since it tends to arise or
|
602 |
+
be stronger during the first use of a device [17]. Thus, in addition
|
603 |
+
to promoting the contact of the elderly with new technologies, it is
|
604 |
+
important to promote a good first experience. It means an experi-
|
605 |
+
ence free of effort, that helps the user to feel safe and unafraid of
|
606 |
+
making mistakes. A bad experience, during which the user feels lost
|
607 |
+
or makes mistakes, can reinforce the fears of PwCA. Consequently,
|
608 |
+
this can increase their CA levels, making them believe they are
|
609 |
+
unable to use it and prevent them from trying again.
|
610 |
+
The results of the Random Forest regression show that CA in-
|
611 |
+
fluences on how users interact with the system. Although the data
|
612 |
+
belongs to desktop computer interaction domain, the result sug-
|
613 |
+
gests that such approach should be explored in the mobile settings
|
614 |
+
as well, given that the interaction events selected are common to
|
615 |
+
desktop and smartphones. The prediction of higher CARS values
|
616 |
+
could trigger personalization features and additional support, for
|
617 |
+
instance. Smartphones have a myriad of sensors that could be used
|
618 |
+
for such personalization features and here we advocate the use of
|
619 |
+
the following metrics as a starting point: task time, numbers of
|
620 |
+
clicks and double clicks, mean click duration, typing velocity and
|
621 |
+
total time typing.
|
622 |
+
This paper defends the idea that the use of smartphones by the
|
623 |
+
elderly can bring benefits such as autonomy, access to content and
|
624 |
+
services and communication. However, CA may create barriers
|
625 |
+
which prevent elderly from enjoying these benefits. Therefore, we
|
626 |
+
argue that further studies are needed regarding the influences of
|
627 |
+
levels of CA in acceptance of smartphones and apps by the elderly
|
628 |
+
people. On his work about the development of a mobile computer
|
629 |
+
anxiety scale (MCAS), [39] argues that MCAS is related to three
|
630 |
+
distinct components: (1) traditional CA construct; (2) Internet anxi-
|
631 |
+
ety construct and (3) special factors making up the mobile anxiety
|
632 |
+
construct (e.g., equipment limitation). The limitations of mobile
|
633 |
+
equipment listed by [39] and that elderly people report as being
|
634 |
+
problematic for them are: small screens and small multi-function
|
635 |
+
key pads; lower display resolution; unfriendly user-interfaces; and
|
636 |
+
graphical limitations. Thus, these limitations should be considered
|
637 |
+
when developing new technologies for elderly people as well. Fur-
|
638 |
+
thermore, the importance of the first experience is found in the
|
639 |
+
literature and reported in the interviews conducted in this study.
|
640 |
+
They reported having purchased or been presented with a new
|
641 |
+
smartphone and feeling lost or afraid to use it. So, it is important
|
642 |
+
that the device has a simple, accessible and usable interface. Another
|
643 |
+
common factor reported, is the fear of making mistakes, looking
|
644 |
+
stupid or breaking the device. In this sense, it is important that the
|
645 |
+
system provides a safe environment, which asks for confirmation
|
646 |
+
for important (dangerous) actions. And, in case the user makes a
|
647 |
+
mistake, the system must provide ways to recover from the error,
|
648 |
+
returning to the previous state without difficulty.
|
649 |
+
In Brazil, families often have a computer to be shared by family
|
650 |
+
members. It can make elderly people afraid of breaking what be-
|
651 |
+
longs to the family or afraid of losing some important data if they
|
652 |
+
do something wrong. The smartphone, on the other hand, is seen
|
653 |
+
as an personal device. According to the participants’ reports, this
|
654 |
+
brings greater freedom to learn how to use through trial and error.
|
655 |
+
Besides that, as it is mobile, it has the advantage that elderly people
|
656 |
+
can avoid to use it in front of other people. This can help dealing
|
657 |
+
with the fear of not knowing how to use it or making mistakes in
|
658 |
+
front of younger people.
|
659 |
+
Finally, we believe a research agenda about the role of smart-
|
660 |
+
phones for elderly people in the context of CA should address the
|
661 |
+
following research questions: (1) How to detect CA during the use
|
662 |
+
of mobile phones at scale? (2) How to provide (first) good user
|
663 |
+
experiences for this population? (3) How to create a secure envi-
|
664 |
+
ronment for PwCA to recover from mistakes? (4) How to combine
|
665 |
+
technology use with learning in order to increase CSE? (5) How
|
666 |
+
CA on the desktop relates to CA on smartphones?
|
667 |
+
6
|
668 |
+
CONCLUSION
|
669 |
+
This position paper discussed how elderly people use smartphones
|
670 |
+
in a specific region of São Paulo, Brazil, and shows how CA is
|
671 |
+
present in this sample of the population. Our findings suggest
|
672 |
+
that higher CA levels are prevalent on higher age and CA impacts
|
673 |
+
how users interact with technologies. In addition, results indicate
|
674 |
+
that the behavior of elderly users when performing tasks can be
|
675 |
+
negatively impacted not only because of age-related factors, but
|
676 |
+
also by the CA levels. The results indicating the preference of some
|
677 |
+
applications over others by elderly people indicate the need for
|
678 |
+
further studies on why some technologies still present barriers
|
679 |
+
for PwCA. Moreover, the shorter task time obtained by the high
|
680 |
+
CA group and the fact that they usually gave up when feel lost
|
681 |
+
shows the importance of shorter and simpler tasks. The differences
|
682 |
+
between groups regarding ownership of smartphones show that
|
683 |
+
CA may impact on the technology adoption. In addition, the results
|
684 |
+
showing the preference for known functions can be important to
|
685 |
+
designers and developers to consider when developing new systems,
|
686 |
+
since the inclusion of functions considered easy to use may increase
|
687 |
+
the system adoption and improve user experience by reducing
|
688 |
+
frustration.
|
689 |
+
Finally, tackling technology adoption by elderly people may im-
|
690 |
+
prove their quality of life, since the use of smartphones and the
|
691 |
+
wide variety of applications and services may help they achieve
|
692 |
+
independence, make their lives more comfortable, promoting their
|
693 |
+
better participation in the community and allowing access to the
|
694 |
+
most diverse online content. The presented user test shows that
|
695 |
+
metrics such as task time, number of clicks, click duration, typing
|
696 |
+
speed and total time typing can support the prediction of different
|
697 |
+
CARS scores (𝑅2=0.84). In the current context of the COVID-19 pan-
|
698 |
+
demics, promoting autonomy, communication and leisure activities
|
699 |
+
became core goals for any technology and here we emphasize that
|
700 |
+
by understanding CA and considering it in design and development
|
701 |
+
phases mobile apps have the potential to change the live of PwCA.
|
702 |
+
ACKNOWLEDGMENTS
|
703 |
+
We thank the CRECI@ for all the support. This study was financed
|
704 |
+
in part by the Coordenação de Aperfeiçoamento de Pessoal de Nível
|
705 |
+
Superior - Brasil (CAPES) - Finance Code 001.
|
706 |
+
REFERENCES
|
707 |
+
[1] Fazil Abdullah, Rupert Ward, and Ejaz Ahmed. 2016. Investigating the influence
|
708 |
+
of the most commonly used external variables of TAM on students’ Perceived
|
709 |
+
Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios. Computers in
|
710 |
+
Human Behavior 63 (2016), 75–90.
|
711 |
+
[2] Osvaldo P. Almeida and Shirley A. Almeida. 1999. Confiabilidade da versão
|
712 |
+
brasileira da Escala de Depressão em Geriatria (GDS) versão reduzida. Arquivos
|
713 |
+
|
714 |
+
Computer Anxiety: Supporting the Transition
|
715 |
+
from Desktop to Mobile
|
716 |
+
CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
|
717 |
+
de Neuro-Psiquiatria 57 (06 1999), 421 – 426. http://www.scielo.br/scielo.php?
|
718 |
+
script=sci_arttext&pid=S0004-282X1999000300013&nrm=iso
|
719 |
+
[3] Mustafa Baloğlu and Vildan Çevik. 2008. Multivariate effects of gender, ownership,
|
720 |
+
and the frequency of use on computer anxiety among high school students.
|
721 |
+
Computers in Human Behavior 24, 6 (2008), 2639–2648.
|
722 |
+
[4] John Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation
|
723 |
+
in industry 189, 194 (1996), 4–7.
|
724 |
+
[5] Pew Research Center. 2017. Tech Adoption Climbs Among Older Adults. http://
|
725 |
+
www.pewinternet.org/2017/05/17/tech-adoption-climbs-among-older-adults/
|
726 |
+
[6] Pew Research Center. 2019. Mobile Fact Sheet. https://www.pewresearch.org/
|
727 |
+
internet/fact-sheet/mobile/
|
728 |
+
[7] Jyh-Rong Chou and Hung-Cheng Tsai. 2009. On-line learning performance and
|
729 |
+
computer anxiety measure for unemployed adult novices using a grey relation
|
730 |
+
entropy method. Information Processing & Management 45, 2 (2009), 200–215.
|
731 |
+
[8] Miha Cimperman, Maja M. Brenčič, and Peter Trkman. 2016. Analyzing older
|
732 |
+
users’ home telehealth services acceptance behavior-applying an Extended
|
733 |
+
UTAUT model. International journal of medical informatics 90 (2016), 22–31.
|
734 |
+
[9] Deborah R. Compeau and Christopher A. Higgins. 1995. Computer self-efficacy:
|
735 |
+
Development of a measure and initial test. MIS quarterly (1995), 189–211.
|
736 |
+
[10] Elizabeth D. Cooper-Gaiter. 2015. Computer anxiety and computer self-efficacy
|
737 |
+
of older adults. (2015).
|
738 |
+
[11] Thiago Donizetti dos Santos and Vagner Figueredo de Santana. 2019. A Computer
|
739 |
+
Anxiety Model for Elderly Users Interacting with the Web. In Proceedings of the
|
740 |
+
16th Web For All 2019 Personalization - Personalizing the Web (San Francisco, CA,
|
741 |
+
USA) (W4A ’19). Association for Computing Machinery, New York, NY, USA,
|
742 |
+
Article 32, 10 pages. https://doi.org/10.1145/3315002.3317565
|
743 |
+
[12] Mireia Fernández-Ardèvol and Loredana Ivan. 2015. Why age is not that impor-
|
744 |
+
tant? An ageing perspective on computer anxiety. In International Conference on
|
745 |
+
Human Aspects of IT for the Aged Population. Springer, 189–200.
|
746 |
+
[13] Saurabh Gupta. 2017. Reducing computer anxiety in self-paced technology
|
747 |
+
training. Advances in Teaching and Learning Technologies (2017).
|
748 |
+
[14] Rugayah Hashim, Hashim Ahmad, and Che Abdullah. 2010. Paradox of e-learning
|
749 |
+
for distance education students at UiTM Shah Alam. In Distance Learning and
|
750 |
+
Education (ICDLE), 2010 4th International Conference on. IEEE, 105–107.
|
751 |
+
[15] Robert K. Heinssen, Carol R. Glass, and Luanne A. Knight. 1987. Assessing
|
752 |
+
computer anxiety: Development and validation of the computer anxiety rating
|
753 |
+
scale. Computers in human behavior 3, 1 (1987), 49–59.
|
754 |
+
[16] Fabian Herrmann, Iris Niedermann, Matthias Peissner, Katja Henke, and Anja
|
755 |
+
Naumann. 2007. Users interact differently: Towards a usability-oriented user
|
756 |
+
taxonomy. Jacko, Julie A.(Pub.) Human-Computer Interaction. Interaction design
|
757 |
+
and usability. Berlin: Springer (Lecture notes in computer science, 4550) (2007),
|
758 |
+
812–817.
|
759 |
+
[17] Loredana Ivan and Ioana Schiau. 2016. Experiencing Computer Anxiety Later
|
760 |
+
in Life: The Role of Stereotype Threat. In International Conference on Human
|
761 |
+
Aspects of IT for the Aged Population. Springer, 339–349.
|
762 |
+
[18] Ashok Jashapara and Wei-Chun Tai. 2006. Understanding the complexity of
|
763 |
+
human characteristics on e-learning systems: an integrated study of dynamic
|
764 |
+
individual differences on user perceptions of ease of use. Knowledge Management
|
765 |
+
Research & Practice 4, 3 (2006), 227–239.
|
766 |
+
[19] Stella Korobili, Aspasia Togia, and Afrodite Malliari. 2010. Computer anxiety
|
767 |
+
and attitudes among undergraduate students in Greece. Computers in Human
|
768 |
+
Behavior 26, 3 (2010), 399–405.
|
769 |
+
[20] Clayton Lewis. 1982. Using the" thinking-aloud" method in cognitive interface
|
770 |
+
design. IBM TJ Watson Research Center Yorktown Heights, NY.
|
771 |
+
[21] Brenda H. Loyd and Clarice Gressard. 1984. Reliability and factorial validity of
|
772 |
+
computer attitude scales. Educational and psychological measurement 44, 2 (1984),
|
773 |
+
501–505.
|
774 |
+
[22] Ruth H. Maki, William S. Maki, Michele Patterson, and P. David Whittaker.
|
775 |
+
2000. Evaluation of a Web-based introductory psychology course: I. Learning
|
776 |
+
and satisfaction in on-line versus lecture courses. Behavior Research Methods,
|
777 |
+
Instruments, & Computers 32, 2 (01 Jun 2000), 230–239. https://doi.org/10.3758/
|
778 |
+
BF03207788
|
779 |
+
[23] Matthew M. Maurer and Michael R. Simonson. 1984. Development and validation
|
780 |
+
of a measure of computer anxiety. (1984).
|
781 |
+
[24] Ram Mehar and Avneet Kaur. 2017. Effect of Web Based Instructional Strategy
|
782 |
+
on Achievement in Computer Science in Relation to Computer Anxiety. Asian
|
783 |
+
Journal of Research in Social Sciences and Humanities 7, 6 (2017), 202–216.
|
784 |
+
[25] Denise M. de Melo and Altemir J. G. Barbosa. 2015. O uso do Mini-Exame
|
785 |
+
do Estado Mental em pesquisas com idosos no Brasil: uma revisão sistemática.
|
786 |
+
Ciência e Saúde Coletiva 20 (12 2015), 3865 – 3876. http://www.scielo.br/scielo.
|
787 |
+
php?script=sci_arttext&pid=S1413-81232015001203865&nrm=iso
|
788 |
+
[26] Zacchaeus O Omogbadegun. 2019. Technical Support: Towards Mitigating Effects
|
789 |
+
of Computer Anxiety on Acceptance of E-Assessment Amongst University Stu-
|
790 |
+
dents in Sub Saharan African Countries. In ICT Unbounded, Social Impact of Bright
|
791 |
+
ICT Adoption: IFIP WG 8.6 International Conference on Transfer and Diffusion of
|
792 |
+
IT, TDIT 2019, Accra, Ghana, June 21–22, 2019, Proceedings, Vol. 558. Springer, 48.
|
793 |
+
[27] Saroj Parasuraman and Magid Igbaria. 1990. An examination of gender differences
|
794 |
+
in the determinants of computer anxiety and attitudes toward microcomputers
|
795 |
+
among managers. International Journal of Man-Machine Studies 32, 3 (1990),
|
796 |
+
327–340.
|
797 |
+
[28] Satyanarayana Parayitam, Kiran J Desai, Mayur S Desai, and Mary K Eason. 2010.
|
798 |
+
Computer attitude as a moderator in the relationship between computer anxiety,
|
799 |
+
satisfaction, and stress. Computers in Human Behavior 26, 3 (2010), 345–352.
|
800 |
+
[29] Chee W. Phang, Juliana Sutanto, Atreyi Kankanhalli, Yan Li, Bernard C. Tan,
|
801 |
+
and Hock-Hai Teo. 2006. Senior citizens’ acceptance of information systems: A
|
802 |
+
study in the context of e-government services. IEEE Transactions on Engineering
|
803 |
+
Management 53, 4 (2006), 555–569.
|
804 |
+
[30] William G. Powers et al. 1973. The Effects of Prior Computer Exposure On
|
805 |
+
Man-Machine Computer Anxiety. (1973).
|
806 |
+
[31] Annalyse C. Raub. 1981. Correlates of computer anxiety in college students.
|
807 |
+
(1981).
|
808 |
+
[32] Larry D. Rosen, Deborah C. Sears, and Michelle M. Weil. 1987. Computerphobia.
|
809 |
+
Behavior Research Methods 19, 2 (1987), 167–179.
|
810 |
+
[33] Glenn Russell and Graham Bradley. 1997. Teachers’ computer anxiety: Implica-
|
811 |
+
tions for professional development. Education and information Technologies 2, 1
|
812 |
+
(1997), 17–30.
|
813 |
+
[34] Vagner F. de Santana and Felipe E. Silva. 2018. User Test Logger: An Open Source
|
814 |
+
Browser Plugin for Logging and Reporting Local User Studies. Proceedings of
|
815 |
+
HCI International 2019 (2018).
|
816 |
+
[35] Thiago D. dos Santos and Vagner F. de Santana. 2018. Computer Anxiety and
|
817 |
+
Interaction: A Systematic Review. In Proceedings of the Internet of Accessible
|
818 |
+
Things. ACM, 18.
|
819 |
+
[36] Maimunah M. Shah, Roshidi Hassan, and Roslani Embi. 2012. Technology ac-
|
820 |
+
ceptance and computer anxiety. In 2012 International Conference on Innovation
|
821 |
+
Management and Technology Research. 306–309. https://doi.org/10.1109/ICIMTR.
|
822 |
+
2012.6236408
|
823 |
+
[37] Linn Anette Solberg. 1998. Variables which affect the ability to cope with changes
|
824 |
+
in IT. In Computer Human Interaction Conference, 1998. Proceedings. 1998 Aus-
|
825 |
+
tralasian. IEEE, 300–301.
|
826 |
+
[38] Jason B. Thatcher, J. Christopher Zimmer, Michael J. Gundlach, and D. Harrison
|
827 |
+
McKnight. 2008. Internal and External Dimensions of Computer Self-Efficacy:
|
828 |
+
An Empirical Examination. IEEE Transactions on Engineering Management 55, 4
|
829 |
+
(Nov 2008), 628–644. https://doi.org/10.1109/TEM.2008.927825
|
830 |
+
[39] Yi-Shun Wang. 2007. Development and validation of a mobile computer anxiety
|
831 |
+
scale. British Journal of Educational Technology 38, 6 (2007), 990–1009.
|
832 |
+
[40] Jerome A. Yesavage, Terence L. Brink, Terence L. Rose, Owen Lum, Virginia
|
833 |
+
Huang, Michael Adey, and Von O. Leirer. 1982. Development and validation of a
|
834 |
+
geriatric depression screening scale: a preliminary report. Journal of psychiatric
|
835 |
+
research 17, 1 (1982), 37–49.
|
836 |
+
A
|
837 |
+
TECHNOLOGY USE AND PROFILE
|
838 |
+
(1) Do you have a computer available at home? If not, do you use
|
839 |
+
a computer somewhere else (e.g., at work or in the lanhouse)?
|
840 |
+
(2) How often do you use a computer?
|
841 |
+
A: [ ] Rarely
|
842 |
+
[ ] Sometimes
|
843 |
+
[ ] Usually
|
844 |
+
[ ] Always
|
845 |
+
(3) What do you usually do on computer?
|
846 |
+
(4) Do you own a smartphone?
|
847 |
+
(5) How often do you use smartphones?
|
848 |
+
A: [ ] Rarely
|
849 |
+
[ ] Sometimes
|
850 |
+
[ ] Usually
|
851 |
+
[ ] Always
|
852 |
+
(6) What do you usually do on smartphone?
|
853 |
+
Internet: [ ] Yes
|
854 |
+
[ ] No
|
855 |
+
Social networks: [ ] Yes
|
856 |
+
[ ] No
|
857 |
+
Instant Message: [ ] Yes
|
858 |
+
[ ] No
|
859 |
+
Call: [ ] Yes
|
860 |
+
[ ] No
|
861 |
+
Games: [ ] Yes
|
862 |
+
[ ] No
|
863 |
+
Message: [ ] Yes
|
864 |
+
[ ] No
|
865 |
+
Music / Video: [ ] Yes
|
866 |
+
[ ] No
|
867 |
+
|
FtE0T4oBgHgl3EQfRAB3/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
G9E2T4oBgHgl3EQfTge-/content/tmp_files/2301.03804v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
G9E2T4oBgHgl3EQfTge-/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
G9E4T4oBgHgl3EQfgQ3v/content/2301.05116v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6d6baa967408a67190b405e63c743bba26d076ab7726b82fe4d0bb9f71037207
|
3 |
+
size 8901643
|
G9E4T4oBgHgl3EQfgQ3v/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4dc9f5a8818c856bae3a8ac02b6391c54717077b4fd4d90e17abda674391a3ff
|
3 |
+
size 18153517
|
HtE1T4oBgHgl3EQfXwQA/content/tmp_files/2301.03129v1.pdf.txt
ADDED
@@ -0,0 +1,1705 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Positivity-preserving entropy filtering for the ideal
|
2 |
+
magnetohydrodynamics equations
|
3 |
+
T. Dzanica,∗, F. D. Witherdena
|
4 |
+
aDepartment of Ocean Engineering, Texas A&M University, College Station, TX 77843
|
5 |
+
A R T I C L E I N F O
|
6 |
+
Keywords:
|
7 |
+
Discontinuous spectral element
|
8 |
+
Ideal magnetohydrodynamics
|
9 |
+
Shock capturing
|
10 |
+
Positivity-preserving
|
11 |
+
Entropy filtering
|
12 |
+
A B S T R A C T
|
13 |
+
In this work, we present a positivity-preserving adaptive filtering approach for discontinuous
|
14 |
+
spectral element approximations of the ideal magnetohydrodynamics equations. This approach
|
15 |
+
combines the entropy filtering method (Dzanic and Witherden, J. Comput. Phys., 468, 2022) for
|
16 |
+
shock capturing in gas dynamics along with the eight-wave method for enforcing a divergence-
|
17 |
+
free magnetic field. Due to the inclusion of non-conservative source terms, an operator-splitting
|
18 |
+
approach is introduced to guarantee that the positivity and entropy constraints remain satisfied
|
19 |
+
by the discrete solution. Furthermore, a computationally efficient algorithm for solving the op-
|
20 |
+
timization process for this nonlinear filtering approach is presented. The resulting scheme can
|
21 |
+
robustly resolve strong discontinuities on general unstructured grids without tunable parameters
|
22 |
+
while recovering high-order accuracy for smooth solutions. The efficacy of the scheme is shown
|
23 |
+
in numerical experiments on various problems including extremely magnetized blast waves and
|
24 |
+
three-dimensional magnetohydrodynamic instabilities.
|
25 |
+
1. Introduction
|
26 |
+
The transport and interaction of a non-resistive conducting fluid and its electromagnetic field remain extensively
|
27 |
+
investigated phenomena as they are instrumental in various applications ranging from the study of astrophysical accre-
|
28 |
+
tion disks [1] and supernova remnants [2] to magnetic confinement fusion [3] and plasma physics [4]. These strongly
|
29 |
+
nonlinear effects are governed by the equations of ideal magnetohydrodynamics (MHD), which are composed of a
|
30 |
+
combination of the Euler equations of gas dynamics and Maxwell’s equations of electromagnetism. From this formu-
|
31 |
+
lation, a strong coupling between the magnetic field and the conducting fluid can be observed, where the magnetic
|
32 |
+
field induces a current in the fluid which, in turn, gives rise to a second, induced magnetic field. This interaction
|
33 |
+
can introduce multi-scale, multi-physics behavior in the system, such that magnetohydrodynamic flows can become
|
34 |
+
exceedingly complex.
|
35 |
+
As a result of this complexity, the robust and accurate numerical approximation of ideal MHD can present many
|
36 |
+
challenges. Since hyperbolic systems are known to produce discontinuities even with smooth initial conditions [5],
|
37 |
+
the numerical scheme must be able to robustly resolve these discontinuities which, in the case of MHD, come in the
|
38 |
+
form of hydrodynamic and magnetic shocks and contact waves. Furthermore, the approximation of the ideal MHD
|
39 |
+
equations also requires an intrinsic constraint on the solution in the form of a solenoidal magnetic field which may
|
40 |
+
not be satisfied by the scheme even if the magnetic field is initially solenoidal. Without a mechanism to enforce
|
41 |
+
this constraint, unphysical dynamics can arise in the solution which can lead to numerical instabilities. The standard
|
42 |
+
numerical schemes for approximating MHD flows are finite difference and finite volume methods, whose properties
|
43 |
+
and robustness are well-established in the literature [6–11]. However, they possess certain drawbacks in that they
|
44 |
+
are either difficult to extend to complex domains with unstructured grids or cannot recover high-order accuracy in a
|
45 |
+
computationally efficient manner.
|
46 |
+
A particular class of schemes which have more recently grown in popularity are high-order discontinuous spec-
|
47 |
+
tral element methods (DSEM) as they possess the geometric flexibility of finite volume methods while retaining the
|
48 |
+
arbitrarily high-order accuracy and efficiency of spectral methods. As such, they provide a promising avenue for
|
49 |
+
significantly decreasing the computational cost and expanding the viability of simulating complex MHD problems.
|
50 |
+
However, due to the presence of discontinuities in MHD, DSEM approximations of these systems may introduce spu-
|
51 |
+
rious oscillations in the solution in the form of Gibbs phenomena. Without proper treatment, these oscillations can
|
52 |
+
∗Corresponding author
|
53 |
+
[email protected] (T. Dzanic)
|
54 |
+
ORCID(s): 0000-0003-3791-1134 (T. Dzanic); 0000-0003-2343-412X (F.D. Witherden)
|
55 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
56 |
+
Page 1 of 22
|
57 |
+
arXiv:2301.03129v1 [math.NA] 9 Jan 2023
|
58 |
+
|
59 |
+
aPositivity-preserving entropy filtering for the ideal MHD equations
|
60 |
+
result in unphysical predictions or the failure of the numerical scheme altogether. To extend to use of DSEM to MHD,
|
61 |
+
various numerical stabilization techniques have been proposed, ranging from artificial viscosity methods [12, 13] to
|
62 |
+
limiting-type approaches [14, 15]. While these various methods may be sufficient to stabilize the solution in many
|
63 |
+
cases, they may not guarantee that the solution will abide by physical constraints, may require problem-dependent tun-
|
64 |
+
able parameters, can be computationally inefficient for general unstructured grids, or may be excessively dissipative in
|
65 |
+
smooth regions of the flow.
|
66 |
+
There is significant interest in the design of numerical schemes that are “provably robust” in the sense that they
|
67 |
+
can guarantee that the solution will abide by certain physical constraints even in the presence of features such as
|
68 |
+
discontinuities, the quintessential examples being positivity-preserving schemes for gas dynamics which guarantee the
|
69 |
+
positivity of the density and internal energy/pressure. For DSEM, this property is typically achieved through some
|
70 |
+
form of nonlinear limiting or filtering [14, 16–18]. However, designing schemes that possess this property without
|
71 |
+
sacrificing the computational efficiency of DSEM for general unstructured grids and their advantageous scale-resolving
|
72 |
+
properties in smooth flow regions can be challenging. In the context of MHD, this becomes even more difficult due
|
73 |
+
to the additional complexity of the governing equations as well as the incorporation of differential constraints, namely
|
74 |
+
solenoidal magnetic fields. As such, there is a need for numerical stabilization techniques for DSEM approximations
|
75 |
+
of the ideal MHD equations that retain as many of these desirable properties as possible, namely that they:
|
76 |
+
1. Guarantee that physical constraints of the solution are satisfied.
|
77 |
+
2. Are compatible with numerical techniques for enforcing intrinsic constraints such as a solenoidal magnetic field.
|
78 |
+
3. Do not require problem-dependent tunable parameters.
|
79 |
+
4. Do not appreciably degrade the ability of the underlying DSEM to resolve smooth portions of the flow.
|
80 |
+
5. Can be easily and efficiently implemented on general unstructured grids.
|
81 |
+
In this work, we propose a nonlinear adaptive filtering approach as a numerical stabilization technique for DSEM
|
82 |
+
approximations of the ideal MHD equations to address these points. The proposed technique can be considered as an
|
83 |
+
extension of the entropy filtering approach originally introduced by the authors for shock capturing in gas dynamics to
|
84 |
+
the ideal MHD system [17]. This technique relies on using the solution’s ability to preserve convex invariants of the
|
85 |
+
system, namely positivity of the density and pressure and a discrete local minimum entropy principle, to compute the
|
86 |
+
necessary filter strength to ensure a well-behaved solution in the vicinity of discontinuities. Extending this approach to
|
87 |
+
the ideal MHD system presents several challenges, primarily stemming from the treatment of the divergence-free con-
|
88 |
+
straint on the magnetic field. We utilize the eight-wave method of Powell et al. [7] which introduces non-conservative
|
89 |
+
source terms in the equation proportional to the divergence of the magnetic field. As these non-conservative terms
|
90 |
+
can conflict with the necessary assumptions of the entropy filtering approach, we present a modified set of conditions
|
91 |
+
and introduce an operator splitting approach to the system which allows the filtering method to retain its positivity-
|
92 |
+
preserving properties. Furthermore, as the original approach for performing the optimization process necessary in the
|
93 |
+
adaptive filtering framework as presented in Dzanic and Witherden [17] was found to be quite computationally expen-
|
94 |
+
sive, we develop a highly-efficient numerical approach which drastically reduces the overall computational cost. The
|
95 |
+
resulting approach can robustly resolve strong hydrodynamic and magnetic discontinuities in the flow without appre-
|
96 |
+
ciably degrading the accuracy of the underlying DSEM for smooth flows, does not require problem-dependent tunable
|
97 |
+
parameters, and can be easily extended to unstructured grids with relatively low computational cost. The efficacy of
|
98 |
+
the proposed method is demonstrated in a variety of numerical experiments including smooth transport, extremely
|
99 |
+
magnetized blast waves, and three-dimensional magnetohydrodynamic instabilities computing using high-order ap-
|
100 |
+
proximations on both structured and unstructured grids.
|
101 |
+
The organization of this work is as follows. We present some preliminaries regarding DSEM approximations and
|
102 |
+
the ideal MHD equations in Section 2. The entropy filtering approach for ideal MHD is then introduced in Section 3,
|
103 |
+
and its numerical implementation and computational optimizations are presented in Section 4. Results for various test
|
104 |
+
cases are then shown in Section 5, and conclusions are drawn in Section 6.
|
105 |
+
2. Preliminaries
|
106 |
+
2.1. Ideal magnetohydrodynamics
|
107 |
+
The governing equations for the evolution of an ideal magnetohydrodynamic fluid can be given in the form of a
|
108 |
+
hyperbolic conservation law as
|
109 |
+
휕푡퐮 + 훁⋅퐅 (퐮) = 퐒푩(퐮),
|
110 |
+
(1)
|
111 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
112 |
+
Page 2 of 22
|
113 |
+
|
114 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
115 |
+
where 퐮 = 퐮(퐱, 푡) ∈ ℝ푚 is the solution of some number of field variables 푚 defined over a 푑-dimensional spatial
|
116 |
+
domain 퐱 ∈ ℝ푑 and time 푡, 퐅(퐮) ∈ ℝ푚×푑, and 퐒퐁(퐮) is an additional source term to be defined in Section 2.3 whose
|
117 |
+
purpose is to ensure a solenoidal magnetic field. The solution and flux are given as
|
118 |
+
퐮 =
|
119 |
+
⎡
|
120 |
+
⎢
|
121 |
+
⎢
|
122 |
+
⎢⎣
|
123 |
+
휌
|
124 |
+
흆풗
|
125 |
+
푩
|
126 |
+
퐸
|
127 |
+
⎤
|
128 |
+
⎥
|
129 |
+
⎥
|
130 |
+
⎥⎦
|
131 |
+
and
|
132 |
+
퐅 =
|
133 |
+
⎡
|
134 |
+
⎢
|
135 |
+
⎢
|
136 |
+
⎢
|
137 |
+
⎢
|
138 |
+
⎢⎣
|
139 |
+
흆풗
|
140 |
+
흆풗 ⊗ 퐯 + 퐈
|
141 |
+
(
|
142 |
+
푃 + 1
|
143 |
+
2퐁⋅퐁
|
144 |
+
)
|
145 |
+
− 퐁 ⊗ 퐁
|
146 |
+
풗 ⊗ 퐁 − 퐁 ⊗ 풗
|
147 |
+
(
|
148 |
+
퐸 + 푃 + 1
|
149 |
+
2퐁⋅퐁
|
150 |
+
)
|
151 |
+
퐯 − 퐁(퐯⋅퐁)
|
152 |
+
⎤
|
153 |
+
⎥
|
154 |
+
⎥
|
155 |
+
⎥
|
156 |
+
⎥
|
157 |
+
⎥⎦
|
158 |
+
,
|
159 |
+
(2)
|
160 |
+
where 휌 is the density, 흆풗 is the momentum, 퐸 is the total energy, 푃 = (훾 − 1)
|
161 |
+
(
|
162 |
+
퐸 − 1
|
163 |
+
2휌퐯⋅퐯 − 1
|
164 |
+
2퐁⋅퐁
|
165 |
+
)
|
166 |
+
is the pressure,
|
167 |
+
퐁 is the magnetic field, and 훾 is the specific heat ratio. Furthermore, the symbol 퐈 denotes the identity matrix in ℝ푑×푑
|
168 |
+
and 퐯 = 흆풗∕휌 denotes the velocity. The solution can be more conveniently expressed in terms of a vector of primitive
|
169 |
+
variables as 퐪 = [휌, 퐯, 퐁, 푃]푇 , and auxiliary quantities representing the magnetic pressure and plasma-beta can be
|
170 |
+
defined as 푃푏 = 1
|
171 |
+
2(훾 − 1)퐁⋅퐁 and 훽 = 2푃∕(퐁⋅퐁), respectively.
|
172 |
+
Due to the lack of magnetic monopoles, the MHD equations have an intrinsic constraint on the solution in the form
|
173 |
+
of a solenoidal magnetic field, i.e.,
|
174 |
+
훁⋅퐁 = 0.
|
175 |
+
(3)
|
176 |
+
Although this constraint must be satisfied analytically by the MHD equations, numerical approximations do not nec-
|
177 |
+
essarily satisfy it even if the magnetic field is initially solenoidal. If this constraint is not enforced by the scheme,
|
178 |
+
numerical instabilities may arise in addition to the non-physical nature of the approximation. Many approaches exist
|
179 |
+
to enforce this condition on the magnetic field, including the use of solenoidal basis functions [19], projection meth-
|
180 |
+
ods [20], constrained-transport schemes [6], divergence cleaning methods [21], and the eight-wave method [7]. An
|
181 |
+
overview of the salient techniques is presented in Wu and Shu [15].
|
182 |
+
The entropy solution of Eq. (1) satisfies an entropy inequality of the form
|
183 |
+
휕푡휎(퐮) + 훁⋅횺(퐮) ≥ 0,
|
184 |
+
(4)
|
185 |
+
where (휎, 횺) is any numerical entropy-flux pair [22] that satisfies the relation
|
186 |
+
휕퐮횺 = 휕퐮휎휕퐮퐅.
|
187 |
+
Note that this inequality may be negated depending on which notation is used for the numerical entropy. In Dao and
|
188 |
+
Nazarov [23], it was shown that the entropy solution (in a vanishing viscosity sense) of the ideal MHD system satisfies
|
189 |
+
a minimum entropy principle on the specific physical entropy 휎 = 푃휌−훾 in the form
|
190 |
+
휎 (퐮(퐱, 푡 + Δ푡)) ≥ min
|
191 |
+
퐱
|
192 |
+
휎 (퐮(퐱, 푡)) ,
|
193 |
+
(5)
|
194 |
+
where Δ푡 > 0. This property is identical to the minimum entropy principle in gas dynamics [24], and it should be
|
195 |
+
satisfied by the solution in both smooth regions and in the vicinity of discontinuities.
|
196 |
+
2.2. Discontinuous spectral element methods
|
197 |
+
For nodal discontinuous spectral element approximations of Eq. (1), including discontinuous Galerkin [25] and flux
|
198 |
+
reconstruction [26] schemes, the domain Ω is partitioned into 푁푒 elements Ω푘 such that Ω = ⋃
|
199 |
+
푁푒 Ω푘 and Ω푖 ∩Ω푗 = ∅
|
200 |
+
for 푖 ≠ 푗. With a slight abuse of notation, the solution 퐮(퐱) within each element Ω푘 is approximated in a nodal manner
|
201 |
+
as
|
202 |
+
퐮(퐱) =
|
203 |
+
∑
|
204 |
+
푖∈푆
|
205 |
+
퐮푖휙푖(퐱),
|
206 |
+
(6)
|
207 |
+
where 퐱푖 ∀ 푖 ∈ 푆 is a set of solution nodes, 휙푖(퐱) are their associated nodal basis functions that possess the property
|
208 |
+
휙푖(퐱푗) = 훿푖푗, and 푆 is the set of nodal indices for the stencil. For brevity, we utilize the notation that 퐮푖 = 퐮(퐱푖). The
|
209 |
+
order of the approximation of the solution is denoted as ℙ푝 for some order 푝, where 푝 is the maximal order of 퐮(퐱).
|
210 |
+
This approximation formally yields a convergence rate of at least 푝 + 1 [25].
|
211 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
212 |
+
Page 3 of 22
|
213 |
+
|
214 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
215 |
+
The flux is approximated via the contribution of an interior term, denoted by the subscript Ω푘, and an interface
|
216 |
+
term, denoted by the subscript 휕Ω푘, as
|
217 |
+
퐅(퐮) ≈ 퐅Ω푘(퐮) + 퐅휕Ω푘(퐮).
|
218 |
+
(7)
|
219 |
+
For the interior component, the flux is computed through a collocation approach as
|
220 |
+
퐅Ω푘(퐮) =
|
221 |
+
∑
|
222 |
+
푖∈푆
|
223 |
+
퐅(퐮푖)휙푖(퐱),
|
224 |
+
(8)
|
225 |
+
such that the interior contribution to the divergence of the flux can be computed as
|
226 |
+
훁⋅퐅Ω푘(퐮푖) =
|
227 |
+
∑
|
228 |
+
푗∈푆
|
229 |
+
퐜푖푗퐅(퐮푗),
|
230 |
+
where
|
231 |
+
퐜푖푗 = ∇휙푖(퐱푗).
|
232 |
+
(9)
|
233 |
+
The interface component of the flux is formed over a set of interface nodes 퐱푖 ∈ 휕Ω푘 ∀ 푖 ∈ 퐼, where 퐼 is a set of nodal
|
234 |
+
indices for the interface stencil. We assume that these interface nodes are a subset of the solution nodes (i.e., 퐼 ⊂ 푆)
|
235 |
+
to avoid issues regarding interpolation for discontinuous solutions. At each interface node, there exist two values of
|
236 |
+
the solution, 퐮−
|
237 |
+
푖 and 퐮+
|
238 |
+
푖 , representing the solution evaluated from the element of interest and the interface-adjacent
|
239 |
+
element, respectively. The interface flux term can then be computed as
|
240 |
+
퐅휕Ω푘(��푖) =
|
241 |
+
∑
|
242 |
+
푗∈퐼
|
243 |
+
퐅(퐮−
|
244 |
+
푗 , 퐮+
|
245 |
+
푗 , 퐧푗)휙푗(퐱),
|
246 |
+
(10)
|
247 |
+
where 퐅(퐮−
|
248 |
+
푖 , 퐮+
|
249 |
+
푖 , 퐧푖) are the common interface flux values dependent on the interior and exterior values of the solution
|
250 |
+
and their associated normal vectors 퐧푖 and 휙푖(퐱) are the interface bases. The common interface flux is generally
|
251 |
+
computed using an approximate Riemann solver such as that of Rusanov [27]. The interface bases are dependent on
|
252 |
+
the choice of spatial discretization, e.g., for flux reconstruction schemes, these terms can be given as
|
253 |
+
휙푖(퐱) = 퐧푖⋅퐡푖(퐱) − 휙푖(퐱).
|
254 |
+
(11)
|
255 |
+
Here, 퐡푖 are a set of correction functions [28, 29] that posses the properties that
|
256 |
+
퐧푖⋅퐡푗(퐱푖) = 훿푖푗
|
257 |
+
and
|
258 |
+
∑
|
259 |
+
푖∈퐼
|
260 |
+
퐡푖(퐱) ∈ RT푝,
|
261 |
+
(12)
|
262 |
+
where RT푝 is the Raviart–Thomas space [30] of order 푝. In this work, the flux reconstruction scheme with the equivalent
|
263 |
+
discontinuous Galerkin correction functions [26] is used which recovers the nodal discontinuous Galerkin method [25].
|
264 |
+
The interface contribution to the divergence of the flux can then be given as
|
265 |
+
훁⋅퐅휕Ω푘(퐮푖) =
|
266 |
+
∑
|
267 |
+
푗∈퐼
|
268 |
+
퐜푖푗퐅(퐮−
|
269 |
+
푗 , 퐮+
|
270 |
+
푗 , 퐧푗),
|
271 |
+
where
|
272 |
+
퐜푖푗 = ∇휙푖(퐱푗).
|
273 |
+
(13)
|
274 |
+
The semi-discrete form of Eq. (1) can then be given as
|
275 |
+
휕푡퐮푖 = −
|
276 |
+
(
|
277 |
+
퐅휕Ω푘(퐮푖) + 훁⋅퐅휕Ω푘(퐮푖)
|
278 |
+
)
|
279 |
+
+ 퐒퐁(퐮푖).
|
280 |
+
(14)
|
281 |
+
We assume that the spatial scheme satisfies the relation
|
282 |
+
휕푡퐮 = − ∫휕Ω푘
|
283 |
+
퐅 (퐱) ⋅ 퐧(퐱) d퐱 ≈ −
|
284 |
+
∑
|
285 |
+
푗∈퐼
|
286 |
+
푚푗퐅(퐮−
|
287 |
+
푗 , 퐮+
|
288 |
+
푗 , 퐧푗)
|
289 |
+
(15)
|
290 |
+
where 푚푗 is the associated quadrature weight for 퐱푗 and 퐮 is the element-wise mean defined as
|
291 |
+
퐮 = 1
|
292 |
+
푉푘 ∫Ω푘
|
293 |
+
퐮(퐱) d퐱
|
294 |
+
and
|
295 |
+
푉푘 = ∫Ω푘
|
296 |
+
d퐱.
|
297 |
+
(16)
|
298 |
+
This assumption is appropriate for nodal discontinuous Galerkin schemes given appropriate quadrature and flux recon-
|
299 |
+
struction schemes utilizing the equivalent discontinuous Galerkin correction functions.
|
300 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
301 |
+
Page 4 of 22
|
302 |
+
|
303 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
304 |
+
2.3. Eight-wave method
|
305 |
+
A common method for enforcing a divergence-free magnetic field is to utilize the eight-wave method of Powell
|
306 |
+
et al. [7]. This approach relies on an additional wave structure of the Riemann problem in MHD that arises when the
|
307 |
+
magnetic field is not exactly solenoidal, and it can be utilized to force the magnetic field to a solenoidal state via a
|
308 |
+
source term, given as
|
309 |
+
퐒푩(퐮) = −
|
310 |
+
⎡
|
311 |
+
⎢
|
312 |
+
⎢
|
313 |
+
⎢⎣
|
314 |
+
0
|
315 |
+
푩
|
316 |
+
풖
|
317 |
+
풖⋅푩
|
318 |
+
⎤
|
319 |
+
⎥
|
320 |
+
⎥
|
321 |
+
⎥⎦
|
322 |
+
훁⋅푩.
|
323 |
+
(17)
|
324 |
+
With the inclusion of this source term, the divergence of the magnetic field is typically suppressed to the order of mag-
|
325 |
+
nitude of the approximation error [15]. As such, due to the simplicity of implementation and applicability to general
|
326 |
+
unstructured grids, it remains a routine approach for robustly enforcing the divergence-free constraint on the solenoidal
|
327 |
+
field. In addition, only this modified form of the ideal MHD equations is symmetrizable and Galilean invariant when
|
328 |
+
the magnetic field is not exactly solenoidal [15]. However, as this form is non-conservative, it occasionally can cause
|
329 |
+
inaccurate predictions around discontinuities in the flow (see Tóth [31]).
|
330 |
+
The use of Powell’s method requires some clarification about the choice of the formulation for computing the
|
331 |
+
divergence of the magnetic field. In the context of DSEM, there exist two formulations, a local divergence, consisting
|
332 |
+
of just the interior component as
|
333 |
+
훁⋅푩퐿(퐮푖) =
|
334 |
+
∑
|
335 |
+
푗∈푆
|
336 |
+
퐜푖푗푩푗,
|
337 |
+
(18)
|
338 |
+
and a global divergence, consisting of both the interior component and the interface contribution as
|
339 |
+
훁⋅푩퐺(퐮푖) =
|
340 |
+
∑
|
341 |
+
푗∈푆
|
342 |
+
퐜푖푗푩푗 +
|
343 |
+
∑
|
344 |
+
푗∈퐼
|
345 |
+
퐜푖푗푩푗,
|
346 |
+
(19)
|
347 |
+
where 푩푗 is a common interface value for the magnetic field, typically taken as the centered average of the interior and
|
348 |
+
exterior values. Whereas the divergence-free constraint can be imposed on the local divergence through straightforward
|
349 |
+
approaches such as projection to solenoidal bases, enforcing this constraint on the global divergence is typically more
|
350 |
+
difficult as its domain of influence is not strictly contained within the element. It can be argued that the global approach
|
351 |
+
is the “correct” choice as it is the one for which the space of the divergence is consistent with the space of the solution,
|
352 |
+
but in practice, the local approach is typically sufficient. In this work, the global approach is used as the complexity of
|
353 |
+
the two implementations is similar with Powell’s method.
|
354 |
+
3. Methodology
|
355 |
+
Due to the presence of discontinuities in MHD flows in the form of hydrodynamic and magnetic shocks, it is
|
356 |
+
necessary to apply some sort of a numerical stabilization procedure to ensure robustness of the DSEM approximation.
|
357 |
+
In Dzanic and Witherden [17], an adaptive filtering approach was introduced with goal of stabilizing the scheme by
|
358 |
+
discretely enforcing convex constraints on the solution, given in the form of
|
359 |
+
Γ(퐮푖) > 0 ∀ 푖 ∈ 푆,
|
360 |
+
(20)
|
361 |
+
where Γ(퐮) is some constraint functional. For a positivity-preserving scheme, these constraints are set as
|
362 |
+
Γ1(퐮) = 휌
|
363 |
+
and
|
364 |
+
Γ2(퐮) = 푃,
|
365 |
+
(21)
|
366 |
+
corresponding to constraints on the positivity of density and pressure.
|
367 |
+
While these constraints can ensure the positivity of these quantities, they are generally not restrictive enough to
|
368 |
+
ensure that the solution remains well-behaved in the vicinity of discontinuities. It is necessary to attempt to form
|
369 |
+
additional constraints on the solution that are restrictive enough to stabilize the solution in the vicinity of discontinuities
|
370 |
+
without degrading the accuracy of the scheme in regions where the solution is smooth. By utilizing the fact that the
|
371 |
+
minimum entropy principle presented in Section 2 should be satisfied by both smooth and discontinuous solutions, a
|
372 |
+
third constraint on the solution is enforced corresponding to a discrete form of a local minimum entropy principle as
|
373 |
+
Γ3(퐮) = 휎(퐮) − 휎min,
|
374 |
+
(22)
|
375 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
376 |
+
Page 5 of 22
|
377 |
+
|
378 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
379 |
+
where 휎(퐮) = 푃 휌−훾 is the specific physical entropy and 휎min is some local minimum entropy bound. This minimum
|
380 |
+
bound 휎min is computed in an element-wise manner as the discrete minima of the entropy functional across the element
|
381 |
+
and its face neighbors prior to each stage of a temporal integration scheme, resulting in the enforcement of a discrete
|
382 |
+
minimum entropy principle over the local domain of influence of the element (see Dzanic and Witherden [17], Section
|
383 |
+
2 and 3). It was found in the context of gas dynamics that enforcing this constraint ensured well-behaved solutions in
|
384 |
+
the vicinity of discontinuities while recovering high-order accuracy in smooth regions of the flow [17].
|
385 |
+
3.1. Adaptive filtering
|
386 |
+
The constraints are enforced by an adaptive filtering procedure, where the filtered solution ̃퐮 is given in terms of a
|
387 |
+
filter kernel 퐻 applied to the solution, i.e.,
|
388 |
+
̃퐮 = 퐻(퐮).
|
389 |
+
(23)
|
390 |
+
This filtering is performed in modal space given a modal decomposition of the solution in the form of
|
391 |
+
퐮(퐱) =
|
392 |
+
∑
|
393 |
+
푖∈푆
|
394 |
+
̂퐮푖휓푖(퐱),
|
395 |
+
(24)
|
396 |
+
where 휓푖(퐱) ∀ 푖 ∈ 푆 are a set of modal basis functions and ̂퐮푖 are their corresponding modes. We assume that this modal
|
397 |
+
decomposition is chosen with respect to the unit measure (e.g., Legendre polynomials, Koornwinder polynomials, etc.).
|
398 |
+
A discrete form of this change-of-basis operation can be given in terms of a Vandermonde matrix 퐕 as
|
399 |
+
̂퐮 = 퐕−1퐮.
|
400 |
+
(25)
|
401 |
+
The filter kernel ̂
|
402 |
+
퐻 is taken as a second-order exponential kernel in modal space, such that the filtered modal modes
|
403 |
+
can be computed as
|
404 |
+
̂
|
405 |
+
퐻푖(̂퐮푖) = ̂퐮 exp(−휁푝2
|
406 |
+
푖 ),
|
407 |
+
(26)
|
408 |
+
where 휁 is the filter strength and 푝푖 is the total order of the corresponding mode ̂퐮푖. It must be noted that the adaptive
|
409 |
+
filtering approach is not restricted to this choice of filter and can be applied to any conservative filtering operation of
|
410 |
+
one free variable that can recover both the unfiltered solution and the mean mode [17]. The filtering operation 퐻(퐮)
|
411 |
+
can be cast in terms of a matrix-vector operation as
|
412 |
+
̃퐮 = 퐻(퐮) = 퐕횲퐕−1퐮,
|
413 |
+
(27)
|
414 |
+
where 횲 is a diagonal matrix of 푝 + 1 unique values with its entries equal to 횲푖,푖 = exp(−휁푝2
|
415 |
+
푖 ).
|
416 |
+
The filter strength is computed via an element-wise nonlinear optimization process, taken as the minimum filter
|
417 |
+
strength necessary such that the constraints are satisfied, i.e.,
|
418 |
+
휁 = arg min
|
419 |
+
휁 ≥ 0
|
420 |
+
s.t. [Γ1
|
421 |
+
(̃퐮(퐱푖)) > 0, Γ2
|
422 |
+
(̃퐮(퐱푖)) > 0, Γ3
|
423 |
+
(̃퐮(퐱푖)) > 0 ∀ 푖 ∈ 푆] .
|
424 |
+
(28)
|
425 |
+
Existence of a solution of 휁 is guaranteed if the element-wise mean of the solution satisfies the constraints, an assump-
|
426 |
+
tion that will be explored in Section 3.2. As this optimization process is a function of a scalar free variable, its solution
|
427 |
+
can be obtained using any root-bracketing approach. Furthermore, as it is nonlinear and non-convex, convergence to
|
428 |
+
a local minima is sufficient in the case of multiple values of 휁 existing such that the constraints are satisfied exactly.
|
429 |
+
While this optimization problem seems computationally demanding due to the element-wise matrix-vector operations
|
430 |
+
necessary to compute the filtered solution each iteration of the solve, we present a numerical approach to solving
|
431 |
+
this problem in Section 4.1 that is much more computationally efficient than the original methodology in Dzanic and
|
432 |
+
Witherden [17].
|
433 |
+
3.2. Extensions to MHD
|
434 |
+
Extending the entropy filtering approach to the MHD system requires some modifications, with special care neces-
|
435 |
+
sary in regards to the treatment of the source terms. The adaptive filtering operation naturally relies on that assumption
|
436 |
+
that there exists a filter strength such that the constraints are satisfied, and it is trivial to show that a solution exists if the
|
437 |
+
element-wise mean satisfies the constraints [17]. The ability of discontinuous Galerkin-type approaches to preserve
|
438 |
+
convex invariants of hyperbolic systems on the element-wise mean is a well established in the literature, and the reader
|
439 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
440 |
+
Page 6 of 22
|
441 |
+
|
442 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
443 |
+
is referred to a variety of works which utilize this property [15–17, 32–35]. However, the inclusion of the source term
|
444 |
+
and the presence of entropy constraints introduces some caveats on this property of the scheme.
|
445 |
+
Let the set 퐺 represent the set of solutions which satisfy the constraints (i.e., Γ1(퐮) > 0, Γ2(퐮) > 0, Γ3(퐮) > 0), and
|
446 |
+
let the shorthand notation 퐮 ∈ 퐺 represent 퐮푖 ∈ 퐺 ∀ 푖 ∈ 푆. To ensure that the filter can recover a constraint-satisfying
|
447 |
+
solution, it is necessary for the temporal update of the element-wise mean to preserve these invariants, i.e., for some
|
448 |
+
time step 푛, if 퐮푛 ∈ 퐺, then 퐮푛+1 ∈ 퐺. For brevity, we consider a temporal update in the form of a forward Euler
|
449 |
+
approximation, given as
|
450 |
+
퐮푛+1 = 퐮푛 + Δ푡 [퐿1(퐮푛) + 퐿2(퐮푛)] ,
|
451 |
+
(29)
|
452 |
+
where
|
453 |
+
퐿1(퐮) = −훁⋅퐅(퐮)
|
454 |
+
and
|
455 |
+
퐿2(퐮) = 퐒퐁(퐮).
|
456 |
+
(30)
|
457 |
+
Without an exactly solenoidal magnetic field, the property 퐮푛+1 ∈ 퐺 is not necessarily satisfied in this form under the
|
458 |
+
standard assumptions posed in works such as Zhang and Shu [32] and the original presentation of entropy filtering
|
459 |
+
for gas dynamics in Dzanic and Witherden [17], e.g., appropriate Riemann solver, CFL condition, strong stability
|
460 |
+
preserving temporal integration. If we consider the set of solutions 퐺푃 which satisfy just the positivity constraints
|
461 |
+
(i.e., 퐮 ∈ 퐺푃 if Γ1(퐮) > 0, Γ2(퐮) > 0), then the work of Wu and Shu [15] showed that the property 퐮푛+1 ∈ 퐺푃 is
|
462 |
+
satisfied under a potentially more restrictive condition on the time step dependent on the discrete divergence of the
|
463 |
+
magnetic field (see Theorem 3.1 in Wu and Shu [15]). Furthermore, if we neglect the source term and consider an
|
464 |
+
intermediate temporal update as
|
465 |
+
퐮∗ = 퐮푛 + Δ푡퐿1(퐮푛),
|
466 |
+
(31)
|
467 |
+
then the work of Bouchut et al. [36] (paired with the equivalency of the element-wise mean and Godunov methods
|
468 |
+
presented in Zhang and Shu [32] and subsequent works) shows that this intermediate state satisfies the property 퐮∗ ∈ 퐺
|
469 |
+
under the standard assumptions.
|
470 |
+
These two observations motivate an operator splitting approach for the filter. Two separate filtering operations are
|
471 |
+
considered, a more restrictive filter which enforces both the positivity and entropy constraints, denoted by 퐻푒[퐮], and
|
472 |
+
a more relaxed filter that enforces only positivity constraints, denoted by 퐻푝[퐮]. As the assumption on the positivity
|
473 |
+
and entropy constraints on the element-wise mean are satisfied by the intermediate state, the more restrictive filter can
|
474 |
+
be applied, i.e.,
|
475 |
+
̃퐮∗ = 퐻푒
|
476 |
+
[퐮푛 + Δ푡퐿1(퐮푛)] .
|
477 |
+
(32)
|
478 |
+
Since the entropy constraints are the most restrictive constraint and the contribution of the source term is typically
|
479 |
+
minimal compared to the divergence of the flux (since it is proportional to 훁⋅퐁), this filtering operation can usually
|
480 |
+
mitigate the majority of the spurious oscillations in the vicinity of discontinuities. The contribution of the source term
|
481 |
+
is then added onto this filtered state, after which the positivity constraints are then enforced again on the temporal
|
482 |
+
update as
|
483 |
+
̃퐮푛+1 = 퐻푝
|
484 |
+
[̃퐮∗ + Δ푡퐿2(퐮푛)] .
|
485 |
+
(33)
|
486 |
+
A solution to this filtering optimization problem is also guaranteed to exist as the positivity of the element-wise mean
|
487 |
+
is guaranteed [15].
|
488 |
+
Several properties of this splitting approach must be noted. First, it is very rarely the case that the secondary filtering
|
489 |
+
operation is necessary – the entropy constraints on ̃퐮∗ are typically restrictive enough to where ̃퐮∗ + Δ푡퐿2(퐮푛) retains
|
490 |
+
its positivity-preserving properties, such that in most cases, the positivity constraints are typically just checked and no
|
491 |
+
filtering is needed. However, to ensure that the scheme remains provably positivity-preserving, this secondary filtering
|
492 |
+
operation must be included. Second, the splitting for the source term is calculated explicitly as 퐿2(퐮푛), not through
|
493 |
+
a Strang-type splitting approach [37] as 퐿2(퐮∗). While the latter may potentially better approximate the necessary
|
494 |
+
corrections to the solution for preserving a solenoidal magnetic field, these forms of splitting can introduce a limit on
|
495 |
+
the temporal accuracy of the scheme and therefore are avoided. Finally, unless the linear filtering kernel which recovers
|
496 |
+
the squeeze limiter of Zhang and Shu [32] is chosen (see Dzanic and Witherden [17], Remark 1), the divergence of
|
497 |
+
the filtered magnetic field is not guaranteed to be equal or lower than the unfiltered state. As this work pertains to a
|
498 |
+
nonlinear filter, it may introduce minor divergence errors similarly to any nonlinear limiting operation, but these are
|
499 |
+
mitigated via the source term at the next temporal update with the explicit splitting approach such that its effects were
|
500 |
+
found to be negligible.
|
501 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
502 |
+
Page 7 of 22
|
503 |
+
|
504 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
505 |
+
Extensions to higher-order strong stability preserving (SSP) schemes follow readily from this formulation, e.g., the
|
506 |
+
temporal update for a third-order, three-stage SSP Runge–Kutta scheme, neglecting the notatioñ⋅ for brevity, is given
|
507 |
+
as
|
508 |
+
퐮(1) = 퐻푝
|
509 |
+
[퐻푒
|
510 |
+
[퐮푛 + Δ푡퐿1(퐮푛)] + Δ푡퐿2(퐮푛)] ,
|
511 |
+
(34)
|
512 |
+
퐮(2) = 퐻푝
|
513 |
+
[
|
514 |
+
퐻푒
|
515 |
+
[3
|
516 |
+
4퐮푛 + 1
|
517 |
+
4퐮(1) + 1
|
518 |
+
4Δ푡퐿1(퐮(1))
|
519 |
+
]
|
520 |
+
+ 1
|
521 |
+
4Δ푡퐿2(퐮(1))
|
522 |
+
]
|
523 |
+
,
|
524 |
+
퐮푛+1 = 퐻푝
|
525 |
+
[
|
526 |
+
퐻푒
|
527 |
+
[1
|
528 |
+
3퐮푛 + 2
|
529 |
+
3퐮(2) + 2
|
530 |
+
3Δ푡퐿1(퐮(2))
|
531 |
+
]
|
532 |
+
+ 2
|
533 |
+
3Δ푡퐿2(퐮(2))
|
534 |
+
]
|
535 |
+
,
|
536 |
+
where the entropy constraints for 퐻푒 are computed from the previous temporal stage (see Dzanic and Witherden [17],
|
537 |
+
Appendix A).
|
538 |
+
4. Implementation
|
539 |
+
Ω푘
|
540 |
+
Figure 1:
|
541 |
+
Schematic of a two-dimensional ℙ2 triangular element Ω푘 showing interior solution points (red circles), interior
|
542 |
+
interface flux/solution points (red circles, blue outline), and exterior interface flux points (blue circles).
|
543 |
+
The governing equations and the adaptive filtering approach were implemented in PyFR [38], a high-order GPU-
|
544 |
+
accelerated unstructured flux reconstruction solver. The solution nodes were distributed along the Gauss–Legendre–
|
545 |
+
Lobatto quadrature points and 훼-optimized points [25] for tensor-product and simplex elements, respectively. An
|
546 |
+
example of the solution and flux point distributions for a two-dimensional ℙ2 triangular element is shown in Fig. 1.
|
547 |
+
Temporal integration was performed using a three-stage, third-order SSP Runge–Kutta scheme as presented in Eq. (34).
|
548 |
+
Unless otherwise stated, common interface fluxes were computed using the Harten-Lax-van Leer contact (HLLC)
|
549 |
+
Riemann solver of Li [39] and Gurski [40] with the Davis wavespeed estimate [41], although for most test cases, we
|
550 |
+
observed negligible differences in comparison to Rusanov-type [27] and Harten-Lax-van Leer (HLL) [42] Riemann
|
551 |
+
solvers. To avoid a vacuum state for the Riemann solver and apply a numerical tolerance to the entropy condition, the
|
552 |
+
constraints were instead implemented as
|
553 |
+
Γ1(퐮) = 휌 − 휖,
|
554 |
+
Γ2(퐮) = 푃 − 휖,
|
555 |
+
and
|
556 |
+
Γ3(퐮) = 휎 − 휎min − 휖,
|
557 |
+
where 휖 = 10−8 is a small constant taken as some arbitrary factor of the machine precision.
|
558 |
+
Boundary conditions were enforced in a weak sense through the imposition of an exterior ghost state to the inter-
|
559 |
+
face Riemann solver [43]. Three types of boundary conditions were considered in this work: 1) Dirichlet boundary
|
560 |
+
conditions, where the exterior state is explicitly defined; 2) Neumann boundary conditions, where the exterior state is
|
561 |
+
identical to the interior state; and 3) reflecting boundary conditions, where the exterior state is identical to the interior
|
562 |
+
state with the normal component of the velocity and magnetic field negated.
|
563 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
564 |
+
Page 8 of 22
|
565 |
+
|
566 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
567 |
+
4.1. Filter optimization
|
568 |
+
Each time the filtering operation is called, the constraints are first checked on the solution. If the solution satisfies
|
569 |
+
the constraints, no filtering is applied, otherwise the filter strength is computed using the Illinois root-bracketing ap-
|
570 |
+
proach [44] with a stopping tolerance of 10−8 and a maximum of 20 iterations. While the filter strength can be simply
|
571 |
+
iterated by repeatedly evaluating the element-wise filtered solution as per Eq. (27) and computing the minima of the
|
572 |
+
constraints, several optimizations can be performed to drastically decrease the computational cost of performing this
|
573 |
+
filtering operation.
|
574 |
+
First, instead of solving for 휁, it beneficial to solve for 푓 = exp(−휁) and utilize the relation
|
575 |
+
exp(−휁푝2
|
576 |
+
푖 ) = 푓 푝2
|
577 |
+
푖 .
|
578 |
+
This bounds the search space of the root-bracketing approach to 푓 ∈ [0, 1], and the evaluation of the filter coefficients
|
579 |
+
reduces to simple integer powers of the argument 푓. Then, to avoid the costly computation of the matrix-vector
|
580 |
+
product in Eq. (27) each iteration of the root-bracketing process, certain properties of the matrix 횲 can be exploited.
|
581 |
+
As previously mentioned, 횲 is a diagonal matrix of 푝 + 1 unique values with its entries equal to 횲푖,푖 = exp(−휁푝2
|
582 |
+
푖 ). If
|
583 |
+
we define a set of diagonal matrices 퐈(푘) for 0 ≤ 푘 ≤ 푝 as
|
584 |
+
퐈(푘)
|
585 |
+
푖,푖 =
|
586 |
+
{
|
587 |
+
1,
|
588 |
+
if푝푖 = 푘,
|
589 |
+
0,
|
590 |
+
else,
|
591 |
+
(35)
|
592 |
+
then the filtering operation can be equivalently represented as
|
593 |
+
̃퐮 =
|
594 |
+
푝
|
595 |
+
∑
|
596 |
+
푖=0
|
597 |
+
푓 푝2
|
598 |
+
푖 퐮(푘),
|
599 |
+
(36)
|
600 |
+
where
|
601 |
+
퐮(푘) = 퐕퐈(푘)퐕−1퐮.
|
602 |
+
(37)
|
603 |
+
Note that the values 퐮(푘) are independent of the value of 푓, such that these values can be pre-computed and the fil-
|
604 |
+
tered solution can be efficiently evaluated each iteration of the root-bracketing approach without having to repeatedly
|
605 |
+
compute the matrix-vector product 퐕횲퐕−1퐮.
|
606 |
+
This approach can be even further optimized by utilizing the fact that the nodal values of the solution can now
|
607 |
+
be decoupled, such that the root-bracketing process can be applied across each solution node sequentially which is
|
608 |
+
particularly beneficial for computing architectures where memory bandwidth is the bottleneck. In this sequential
|
609 |
+
approach, each solution node 퐱푗 for 푗 ∈ 푆 solves for a value of 푓푗 such that ̃퐮푗 satisfies the constraints. It is trivial to
|
610 |
+
show that if
|
611 |
+
푓 = min
|
612 |
+
푗∈푆 푓푗,
|
613 |
+
then ̃퐮 satisfies the constraints at all nodes. It is therefore advantageous to then use 푓푗 as the upper bound for the root-
|
614 |
+
bracketing process for the node 퐱푗+1 as the constraints can be checked for ̃퐮푗+1 using this upper bound and the root-
|
615 |
+
bracketing process for that node can be skipped if they are satisfied. As the proposed algorithm requires effectively only
|
616 |
+
one full evaluation of Eq. (27) irrespective of the number of iterations of the root-bracketing approach, the memory
|
617 |
+
bandwidth requirements are significantly decreased, such that the filtering process becomes only a relatively small
|
618 |
+
portion of the total compute time that is typically less than the cost of the evaluation of the divergence of the flux. An
|
619 |
+
example of the implementation of this approach is provided in the electronic supplementary material of this work, and
|
620 |
+
an evaluation of the efficiency improvements of this proposed algorithm in comparison to the original methodology in
|
621 |
+
Dzanic and Witherden [17] which utilizes repeated evaluations of Eq. (27) is presented in Section 5.
|
622 |
+
5. Results
|
623 |
+
5.1. Near-vacuum convecting vortex
|
624 |
+
To verify that the proposed scheme retains the high-order accuracy of the underlying DSEM for smooth solutions,
|
625 |
+
the rate of convergence was calculated for the smooth magnetized convecting vortex problem introduced by Christlieb
|
626 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
627 |
+
Page 9 of 22
|
628 |
+
|
629 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
630 |
+
et al. [45]. For this problem, the domain is taken as Ω = [−10, 10]2 with periodic boundary conditions discretized on
|
631 |
+
a structured quadrilateral mesh, and the initial conditions are given as
|
632 |
+
퐪(퐱, 0) =
|
633 |
+
⎡
|
634 |
+
⎢
|
635 |
+
⎢
|
636 |
+
⎢
|
637 |
+
⎢
|
638 |
+
⎢
|
639 |
+
⎢⎣
|
640 |
+
휌
|
641 |
+
푢
|
642 |
+
푣
|
643 |
+
퐵푥
|
644 |
+
퐵푦
|
645 |
+
푃
|
646 |
+
⎤
|
647 |
+
⎥
|
648 |
+
⎥
|
649 |
+
⎥
|
650 |
+
⎥
|
651 |
+
⎥
|
652 |
+
⎥⎦
|
653 |
+
=
|
654 |
+
⎡
|
655 |
+
⎢
|
656 |
+
⎢
|
657 |
+
⎢
|
658 |
+
⎢
|
659 |
+
⎢
|
660 |
+
⎢⎣
|
661 |
+
1
|
662 |
+
1 − 푦훿푢
|
663 |
+
1 + 푥훿푢
|
664 |
+
−푦훿퐵
|
665 |
+
푥훿퐵
|
666 |
+
1 + 훿푃
|
667 |
+
⎤
|
668 |
+
⎥
|
669 |
+
⎥
|
670 |
+
⎥
|
671 |
+
⎥
|
672 |
+
⎥
|
673 |
+
⎥⎦
|
674 |
+
(38)
|
675 |
+
where
|
676 |
+
훿푢 =
|
677 |
+
휇
|
678 |
+
√
|
679 |
+
2휋
|
680 |
+
휙(푟),
|
681 |
+
훿퐵 = 휇
|
682 |
+
2휋 휙(푟),
|
683 |
+
훿푃 = −휇2(1 + 푟2)
|
684 |
+
8휋2
|
685 |
+
휙(푟)2,
|
686 |
+
(39)
|
687 |
+
and
|
688 |
+
휙(푟) = exp(1 − 푟2),
|
689 |
+
푟 =
|
690 |
+
√
|
691 |
+
푥2 + 푦2.
|
692 |
+
(40)
|
693 |
+
The specific heat ratio was set as 훾 = 5∕3. These conditions give a non-isentropic nature to the flow field, which
|
694 |
+
allows for a proper assessment of the proposed entropy-based constraints for smooth flows where the filter should be
|
695 |
+
primarily inactive. To make this problem more numerically challenging, the parameter 휇 is chosen such as to give
|
696 |
+
a near-vacuum state for the pressure field [45]. This value was set as 휇 = 5.38948938512, which gives a minimum
|
697 |
+
pressure value in the domain of approximately 2휖 = 2⋅10−8.
|
698 |
+
The problem was solved until a non-dimensional time of 푡 = 0.05 using a fixed time step of Δ푡 = 1⋅10−4, after
|
699 |
+
which the 퐿1 norm of the magnetic field error was computed as
|
700 |
+
푒퐵 = 1
|
701 |
+
퐴 ∫Ω
|
702 |
+
||퐵푥 − 퐵exact
|
703 |
+
푥
|
704 |
+
|| + |||퐵푦 − 퐵exact
|
705 |
+
푦
|
706 |
+
||| d퐱,
|
707 |
+
(41)
|
708 |
+
where 퐴 = 202. The exact solution was computed through a translation of the initial conditions with a translation
|
709 |
+
velocity of [1, 1], and the integration was computed using a 9th order Gauss–Legendre quadrature rule. The error
|
710 |
+
with respect to the mesh resolution 푁푒 is shown for various approximation orders in Table 1 in addition to the rate of
|
711 |
+
convergence. High-order convergence, on the order of 푝 to 푝 + 1, was observed for all approximation orders between
|
712 |
+
ℙ2 and ℙ5. Furthermore, the ℙ2 results can be compared to the positivity-preserving third-order DG scheme in Wu and
|
713 |
+
Shu [15] (Table 2), which can be considered as a subset of the adaptive filtering approach without entropy constraints
|
714 |
+
(see Dzanic and Witherden [17], Remark 1). The proposed scheme gives marginally lower error even after removing
|
715 |
+
the 1∕퐴 normalization factor.
|
716 |
+
푁푒
|
717 |
+
ℙ2
|
718 |
+
ℙ3
|
719 |
+
ℙ4
|
720 |
+
ℙ5
|
721 |
+
202
|
722 |
+
2.29 × 10−4
|
723 |
+
3.07 × 10−5
|
724 |
+
3.30 × 10−6
|
725 |
+
4.04 × 10−7
|
726 |
+
252
|
727 |
+
1.18 × 10−4
|
728 |
+
1.17 × 10−5
|
729 |
+
1.37 × 10−6
|
730 |
+
9.36 × 10−8
|
731 |
+
332
|
732 |
+
5.39 × 10−5
|
733 |
+
4.07 × 10−6
|
734 |
+
3.39 × 10−7
|
735 |
+
2.44 × 10−8
|
736 |
+
402
|
737 |
+
3.04 × 10−5
|
738 |
+
2.02 × 10−6
|
739 |
+
1.44 × 10−7
|
740 |
+
9.55 × 10−9
|
741 |
+
502
|
742 |
+
1.59 × 10−5
|
743 |
+
8.72 × 10−7
|
744 |
+
5.02 × 10−8
|
745 |
+
2.92 × 10−9
|
746 |
+
672
|
747 |
+
6.92 × 10−6
|
748 |
+
2.99 × 10−7
|
749 |
+
1.31 × 10−8
|
750 |
+
6.51 × 10−10
|
751 |
+
RoC
|
752 |
+
2.89
|
753 |
+
3.80
|
754 |
+
4.62
|
755 |
+
5.23
|
756 |
+
Table 1:
|
757 |
+
Convergence of the 퐿1 norm of the magnetic field error at 푡 = 0.05 with respect to mesh resolution 푁푒 for the
|
758 |
+
near-vacuum convecting vortex problem with varying approximation order. Rate of convergence shown on bottom.
|
759 |
+
5.2. Brio–Wu shock tube
|
760 |
+
Extensions to flows with discontinuities was then performed through the shock tube problem of Brio and Wu [8]
|
761 |
+
which includes features of the Riemann problem such as shock waves, contact discontinuities, rarefaction waves, and
|
762 |
+
compound waves. For this problem, the domain is set as Ω = [0, 1] and the initial conditions are given by
|
763 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
764 |
+
Page 10 of 22
|
765 |
+
|
766 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
767 |
+
퐪(퐱, 0) =
|
768 |
+
⎡
|
769 |
+
⎢
|
770 |
+
⎢
|
771 |
+
⎢
|
772 |
+
⎢
|
773 |
+
⎢
|
774 |
+
⎢⎣
|
775 |
+
휌
|
776 |
+
푢
|
777 |
+
푣
|
778 |
+
퐵푥
|
779 |
+
퐵푦
|
780 |
+
푃
|
781 |
+
⎤
|
782 |
+
⎥
|
783 |
+
⎥
|
784 |
+
⎥
|
785 |
+
⎥
|
786 |
+
⎥
|
787 |
+
⎥⎦
|
788 |
+
=
|
789 |
+
{
|
790 |
+
퐪푙,
|
791 |
+
if 푥 ≤ 0.5,
|
792 |
+
퐪푟,
|
793 |
+
else,
|
794 |
+
where
|
795 |
+
퐪푙 =
|
796 |
+
⎡
|
797 |
+
⎢
|
798 |
+
⎢
|
799 |
+
⎢
|
800 |
+
⎢
|
801 |
+
⎢
|
802 |
+
⎢⎣
|
803 |
+
1
|
804 |
+
0
|
805 |
+
0
|
806 |
+
0.75
|
807 |
+
1
|
808 |
+
1
|
809 |
+
⎤
|
810 |
+
⎥
|
811 |
+
⎥
|
812 |
+
⎥
|
813 |
+
⎥
|
814 |
+
⎥
|
815 |
+
⎥⎦
|
816 |
+
and
|
817 |
+
퐪푟 =
|
818 |
+
⎡
|
819 |
+
⎢
|
820 |
+
⎢
|
821 |
+
⎢
|
822 |
+
⎢
|
823 |
+
⎢
|
824 |
+
⎢⎣
|
825 |
+
0.125
|
826 |
+
0
|
827 |
+
0
|
828 |
+
0.75
|
829 |
+
−1
|
830 |
+
0.1
|
831 |
+
⎤
|
832 |
+
⎥
|
833 |
+
⎥
|
834 |
+
⎥
|
835 |
+
⎥
|
836 |
+
⎥
|
837 |
+
⎥⎦
|
838 |
+
.
|
839 |
+
(42)
|
840 |
+
The specific heat ratio is set as 훾 = 2. The hydrodynamic components of this problem are identical to the Sod shock
|
841 |
+
tube [46]. Although this problem is one-dimensional, it was instead solved on a one element wide two-dimensional
|
842 |
+
mesh to facilitate the use of the vertical magnetic field component within the solver. Dirichlet boundary conditions were
|
843 |
+
applied on the left/right boundaries while periodic boundary conditions were applied along the top/bottom boundaries.
|
844 |
+
The problem was computed with a ℙ3 scheme using a coarser mesh of 200 elements and a finer mesh of 400
|
845 |
+
elements with time steps of Δ푡 = 2⋅10−4 and 1⋅10−4, respectively. A reference solution was also computed using a
|
846 |
+
highly-resolved ℙ0 scheme with 5⋅104 elements. The predicted density, pressure, and vertical magnetic field profiles
|
847 |
+
at 푡 = 0.1 are shown in Fig. 2 for both the coarse and fine mesh. For all fields, both rarefaction waves and the shock
|
848 |
+
were well-resolved, showing sub-element resolution without any noticeable spurious oscillations. Furthermore, similar
|
849 |
+
behavior was observed for the contact and compound wave in the pressure and magnetic fields. Some minor oscillations
|
850 |
+
were observed in the density profile in the region between the compound wave and contact discontinuity, although this
|
851 |
+
behavior is not uncommon for some numerical schemes. The predicted density profile in that region converged to the
|
852 |
+
reference results with increasing resolution, but minor undershoots in front of the contact discontinuity were observed.
|
853 |
+
0
|
854 |
+
0.2
|
855 |
+
0.4
|
856 |
+
0.6
|
857 |
+
0.8
|
858 |
+
1
|
859 |
+
0
|
860 |
+
0.2
|
861 |
+
0.4
|
862 |
+
0.6
|
863 |
+
0.8
|
864 |
+
1
|
865 |
+
푥
|
866 |
+
휌
|
867 |
+
Reference
|
868 |
+
푁푒 = 200
|
869 |
+
푁푒 = 400
|
870 |
+
(a) Density
|
871 |
+
0
|
872 |
+
0.2
|
873 |
+
0.4
|
874 |
+
0.6
|
875 |
+
0.8
|
876 |
+
1
|
877 |
+
0
|
878 |
+
0.2
|
879 |
+
0.4
|
880 |
+
0.6
|
881 |
+
0.8
|
882 |
+
1
|
883 |
+
푥
|
884 |
+
푃
|
885 |
+
(b) Pressure
|
886 |
+
0
|
887 |
+
0.2
|
888 |
+
0.4
|
889 |
+
0.6
|
890 |
+
0.8
|
891 |
+
1
|
892 |
+
−1
|
893 |
+
−0.5
|
894 |
+
0
|
895 |
+
0.5
|
896 |
+
1
|
897 |
+
푥
|
898 |
+
퐵푦
|
899 |
+
(c) Vertical magnetic field
|
900 |
+
Figure 2:
|
901 |
+
Density, pressure, and vertical magnetic field profiles for the Brio–Wu shock tube problem at 푡 = 0.1 computed
|
902 |
+
using a ℙ3 FR scheme with 200 and 400 elements.
|
903 |
+
5.3. Orszag–Tang vortex
|
904 |
+
Two-dimensional flows with more complex features were then considered through the canonical Orszag–Tang
|
905 |
+
vortex problem [47]. This case is a well-known model problem for evaluating a scheme’s ability to handle MHD
|
906 |
+
shocks and shock interactions as well as predicting transition to supersonic MHD turbulence. The domain is set as
|
907 |
+
Ω = [0, 1]2 with periodic boundary conditions, and the initial conditions are given as
|
908 |
+
퐪(퐱, 0) =
|
909 |
+
⎡
|
910 |
+
⎢
|
911 |
+
⎢
|
912 |
+
⎢
|
913 |
+
⎢
|
914 |
+
⎢
|
915 |
+
⎢⎣
|
916 |
+
휌
|
917 |
+
푢
|
918 |
+
푣
|
919 |
+
퐵푥
|
920 |
+
퐵푦
|
921 |
+
푃
|
922 |
+
⎤
|
923 |
+
⎥
|
924 |
+
⎥
|
925 |
+
⎥
|
926 |
+
⎥
|
927 |
+
⎥
|
928 |
+
⎥⎦
|
929 |
+
=
|
930 |
+
⎡
|
931 |
+
⎢
|
932 |
+
⎢
|
933 |
+
⎢
|
934 |
+
⎢
|
935 |
+
⎢
|
936 |
+
⎢⎣
|
937 |
+
25∕(36휋)
|
938 |
+
− sin(2휋푦)
|
939 |
+
sin(2휋푥)
|
940 |
+
sin(2휋푦)∕
|
941 |
+
√
|
942 |
+
4휋
|
943 |
+
− sin(4휋푥)∕
|
944 |
+
√
|
945 |
+
4휋
|
946 |
+
5∕(12휋)
|
947 |
+
⎤
|
948 |
+
⎥
|
949 |
+
⎥
|
950 |
+
⎥
|
951 |
+
⎥
|
952 |
+
⎥
|
953 |
+
⎥⎦
|
954 |
+
.
|
955 |
+
(43)
|
956 |
+
The specific heat ratio is set as 훾 = 5∕3. Uniform meshes of various resolution were generated, and the problem
|
957 |
+
was solved using a ℙ3 scheme. The contours of density at 푡 = 0.5 computed on meshes with 푁푒 = 642, 1282, and
|
958 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
959 |
+
Page 11 of 22
|
960 |
+
|
961 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
962 |
+
2562 elements are shown in Fig. 3, computed using time steps of Δ푡 = 4⋅10−4, 2⋅10−4, and 1⋅10−4, respectively. The
|
963 |
+
results show good prediction of the canonical flow field of the Orszag–Tang vortex, with better approximation of shock
|
964 |
+
structure and small-scale flow features with increasing resolution. Minor spurious oscillations were observed in the
|
965 |
+
density field at low resolutions, but these oscillations diminished with increasing mesh resolution, such that the flow
|
966 |
+
field at 푁푒 = 2562 was virtually oscillation-free.
|
967 |
+
(a) 푁푒 = 642
|
968 |
+
(b) 푁푒 = 1282
|
969 |
+
(c) 푁푒 = 2562
|
970 |
+
Figure 3:
|
971 |
+
Contours of density for the Orszag-Tang vortex at 푡 = 0.5 computed using a ℙ3 FR scheme with 642 (left),
|
972 |
+
1282 (middle), and 2562 (right) elements.
|
973 |
+
For a more quantitative comparison, the predicted pressure profile on the cross-section 푦 = 0.3125 at 푡 = 0.48 is
|
974 |
+
shown in Fig. 4 in comparison to the results of Jiang and Wu [48] obtained using a high-order weighted essentially
|
975 |
+
non-oscillator (WENO) scheme. It can be seen that similar observations can be made for the pressure field as with the
|
976 |
+
density field, with minor spurious oscillations at lower resolutions that diminish with increasing resolution. The overall
|
977 |
+
prediction of the pressure profile was in good agreement with the reference results at moderate and high resolutions,
|
978 |
+
and strong discontinuities in the pressure field were generally well resolved at the sub-element level even at lower
|
979 |
+
resolutions. At the highest resolution, there was very good agreement with the reference data with minor differences
|
980 |
+
in the prediction of the location of some small-scale flow features on the left-hand side of the cross-section. Overall,
|
981 |
+
the results showed good predictions of the various flow features of the Orszag–Tang vortex.
|
982 |
+
0.0
|
983 |
+
0.2
|
984 |
+
0.4
|
985 |
+
0.6
|
986 |
+
0.8
|
987 |
+
1.0
|
988 |
+
0.0
|
989 |
+
0.1
|
990 |
+
0.2
|
991 |
+
0.3
|
992 |
+
푥∕퐿
|
993 |
+
푝
|
994 |
+
Reference
|
995 |
+
푁푒 = 642
|
996 |
+
푁푒 = 1282
|
997 |
+
푁푒 = 2562
|
998 |
+
Figure 4:
|
999 |
+
Pressure profile of the Orszag-Tang vortex on the cross-section 푦∕퐿 = 0.3125 at 푡 = 0.48 computed using a ℙ3
|
1000 |
+
FR scheme with 642, 1282, and 2562 elements. Numerical results of Jiang and Wu [48] shown for reference.
|
1001 |
+
5.4. Shock cloud interaction
|
1002 |
+
The proposed scheme was then evaluated on the shock cloud interaction problem of Dai and Woodward [9], con-
|
1003 |
+
sisting of a high-density cloud interacting with an impinging shock wave which results in strong discontinuities and
|
1004 |
+
the development of small-scale flow instabilities. The problem setup as described by Balbás and Tadmor [11] is solved
|
1005 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1006 |
+
Page 12 of 22
|
1007 |
+
|
1008 |
+
0.4
|
1009 |
+
0.35
|
1010 |
+
0.3
|
1011 |
+
0.25
|
1012 |
+
0.2
|
1013 |
+
0.15
|
1014 |
+
0.1Positivity-preserving entropy filtering for the ideal MHD equations
|
1015 |
+
on the domain Ω = [0, 1]2 with the initial conditions given as
|
1016 |
+
퐪(퐱, 0) = [휌, 푢, 푣, 푤, 퐵푥, 퐵푦, 퐵푧, 푃]푇 =
|
1017 |
+
⎧
|
1018 |
+
⎪
|
1019 |
+
⎨
|
1020 |
+
⎪⎩
|
1021 |
+
퐪푐,
|
1022 |
+
if 푟′ ≤ 0.15,
|
1023 |
+
퐪푙,
|
1024 |
+
else if 푥 ≤ 0.6,
|
1025 |
+
퐪푟,
|
1026 |
+
else,
|
1027 |
+
(44)
|
1028 |
+
where the cloud state, left state, and right state are given as
|
1029 |
+
퐪푐 =
|
1030 |
+
⎡
|
1031 |
+
⎢
|
1032 |
+
⎢
|
1033 |
+
⎢
|
1034 |
+
⎢
|
1035 |
+
⎢
|
1036 |
+
⎢
|
1037 |
+
⎢
|
1038 |
+
⎢⎣
|
1039 |
+
10
|
1040 |
+
0
|
1041 |
+
0
|
1042 |
+
0
|
1043 |
+
2.1826182
|
1044 |
+
−2.1826182
|
1045 |
+
1
|
1046 |
+
167.345
|
1047 |
+
⎤
|
1048 |
+
⎥
|
1049 |
+
⎥
|
1050 |
+
⎥
|
1051 |
+
⎥
|
1052 |
+
⎥
|
1053 |
+
⎥
|
1054 |
+
⎥
|
1055 |
+
⎥⎦
|
1056 |
+
,
|
1057 |
+
퐪푙 =
|
1058 |
+
⎡
|
1059 |
+
⎢
|
1060 |
+
⎢
|
1061 |
+
⎢
|
1062 |
+
⎢
|
1063 |
+
⎢
|
1064 |
+
⎢
|
1065 |
+
⎢
|
1066 |
+
⎢⎣
|
1067 |
+
3.86859
|
1068 |
+
0
|
1069 |
+
0
|
1070 |
+
0
|
1071 |
+
2.1826182
|
1072 |
+
−2.1826182
|
1073 |
+
1
|
1074 |
+
167.345
|
1075 |
+
⎤
|
1076 |
+
⎥
|
1077 |
+
⎥
|
1078 |
+
⎥
|
1079 |
+
⎥
|
1080 |
+
⎥
|
1081 |
+
⎥
|
1082 |
+
⎥
|
1083 |
+
⎥⎦
|
1084 |
+
,
|
1085 |
+
and
|
1086 |
+
퐪푟 =
|
1087 |
+
⎡
|
1088 |
+
⎢
|
1089 |
+
⎢
|
1090 |
+
⎢
|
1091 |
+
⎢
|
1092 |
+
⎢
|
1093 |
+
⎢
|
1094 |
+
⎢
|
1095 |
+
⎢⎣
|
1096 |
+
1
|
1097 |
+
−11.2536
|
1098 |
+
0
|
1099 |
+
0
|
1100 |
+
0
|
1101 |
+
0.56418958
|
1102 |
+
0.56418958
|
1103 |
+
1
|
1104 |
+
⎤
|
1105 |
+
⎥
|
1106 |
+
⎥
|
1107 |
+
⎥
|
1108 |
+
⎥
|
1109 |
+
⎥
|
1110 |
+
⎥
|
1111 |
+
⎥
|
1112 |
+
⎥⎦
|
1113 |
+
,
|
1114 |
+
(45)
|
1115 |
+
respectively. The specific heat ratio is set as 훾 = 5∕3. The cloud is centered at [0.8, 0.5] with a radius of 0.15, such
|
1116 |
+
that
|
1117 |
+
푟′ =
|
1118 |
+
√
|
1119 |
+
(푥 − 0.8)2 + (푦 − 0.5)2.
|
1120 |
+
To facilitate the use of the three-dimensional magnetic field within the solver, the problem is solved on a one
|
1121 |
+
element deep three-dimensional mesh. Additionally, while the original problem setup uses a [0, 1]2 domain with
|
1122 |
+
Neumann boundary conditions on the top/bottom boundaries, we instead extend the domain to [0, 1] × [−0.5, 1.5] and
|
1123 |
+
apply periodic boundary conditions on the top/bottom boundaries. As these boundaries on the extended domain are
|
1124 |
+
outside of the domain of influence of the shock cloud interaction over the time range of the simulation, the effect of this
|
1125 |
+
modified setup on the flow field is negligible but it helps alleviate any issues arising from numerical errors compounding
|
1126 |
+
at free boundaries. The remaining left and right boundary conditions were set as Neumann and Dirichlet, respectively,
|
1127 |
+
while periodicity was enforced along the 푧 direction.
|
1128 |
+
(a) Density
|
1129 |
+
(b) Pressure
|
1130 |
+
(c) Magnetic pressure
|
1131 |
+
Figure 5:
|
1132 |
+
Contours of density (left), pressure (middle), and magnetic pressure (right) on the subregion [0, 1]2 for the
|
1133 |
+
shock cloud interaction problem at 푡 = 0.06 computed using a ℙ2 FR scheme with 4002 elements.
|
1134 |
+
To perform a comparison of the proposed approach to a third-order DG scheme augmented with a WENO limiter
|
1135 |
+
presented in Wu and Shu [15], an identical problem setup is used with a ℙ2 scheme on 4002 mesh (with respect to
|
1136 |
+
the original domain size Ω = [0, 1]2). The predicted contours of density, pressure, and magnetic pressure at 푡 = 0.06
|
1137 |
+
computed using a time step of Δ푡 = 4⋅10−6 are shown in Fig. 5. The results show good resolution of the strong
|
1138 |
+
discontinuities in the various fields without any observable spurious oscillations. Furthermore, small-scale features in
|
1139 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1140 |
+
Page 13 of 22
|
1141 |
+
|
1142 |
+
p
|
1143 |
+
2
|
1144 |
+
5
|
1145 |
+
10
|
1146 |
+
20
|
1147 |
+
40P
|
1148 |
+
100
|
1149 |
+
200
|
1150 |
+
300
|
1151 |
+
4000.2
|
1152 |
+
0.5
|
1153 |
+
2
|
1154 |
+
5
|
1155 |
+
10
|
1156 |
+
20
|
1157 |
+
50
|
1158 |
+
100Positivity-preserving entropy filtering for the ideal MHD equations
|
1159 |
+
the cloud region of the density and magnetic fields were not excessively dissipated, and the symmetry of the problem
|
1160 |
+
was well-preserved. A comparison to the method of Wu and Shu [15] (Fig. 1) is shown in Fig. 6. Note that some
|
1161 |
+
discrepancy in the color schemes between the two images may be present. The proposed scheme was roughly equally
|
1162 |
+
performative in terms of the resolution of discontinuities and marginally better at resolving small-scale flow features on
|
1163 |
+
the trailing side of the cloud. Without the positivity-preserving filtering approach, the scheme diverged due to negative
|
1164 |
+
pressure in the solution.
|
1165 |
+
(a) Entropy filter
|
1166 |
+
(b) DG with WENO limiter
|
1167 |
+
Figure 6:
|
1168 |
+
Comparison of the contours of density computed by the proposed entropy filtering approach (left) and the
|
1169 |
+
positivity-preserving DG scheme augmented with a WENO limiter of Wu and Shu [15] (right).
|
1170 |
+
5.5. Magnetized blast
|
1171 |
+
As a stress test for the positivity-preserving property of the proposed scheme for extreme flow conditions, a modified
|
1172 |
+
form of the magnetized blast wave problem of Zachary et al. [49] and Balsara and Spicer [10] was considered. In this
|
1173 |
+
problem, a blast wave is driven by a spherical overpressure region in the center of the domain surrounded by a low
|
1174 |
+
plasma-beta ambient state, resulting in strong magnetosonic shocks. The problem is solved on the periodic domain
|
1175 |
+
Ω = [−0.5, 0.5]2, and the initial conditions are given as
|
1176 |
+
퐪(퐱, 0) =
|
1177 |
+
⎡
|
1178 |
+
⎢
|
1179 |
+
⎢
|
1180 |
+
⎢
|
1181 |
+
⎢
|
1182 |
+
⎢
|
1183 |
+
⎢⎣
|
1184 |
+
휌
|
1185 |
+
푢
|
1186 |
+
푣
|
1187 |
+
퐵푥
|
1188 |
+
퐵푦
|
1189 |
+
푃
|
1190 |
+
⎤
|
1191 |
+
⎥
|
1192 |
+
⎥
|
1193 |
+
⎥
|
1194 |
+
⎥
|
1195 |
+
⎥
|
1196 |
+
⎥⎦
|
1197 |
+
=
|
1198 |
+
{
|
1199 |
+
퐪푒,
|
1200 |
+
if
|
1201 |
+
√
|
1202 |
+
푥2 + 푦2 ≤ 0.1,
|
1203 |
+
퐪푎,
|
1204 |
+
else,
|
1205 |
+
where
|
1206 |
+
퐪푒 =
|
1207 |
+
⎡
|
1208 |
+
⎢
|
1209 |
+
⎢
|
1210 |
+
⎢
|
1211 |
+
⎢
|
1212 |
+
⎢
|
1213 |
+
⎢⎣
|
1214 |
+
1
|
1215 |
+
0
|
1216 |
+
0
|
1217 |
+
퐵0
|
1218 |
+
0
|
1219 |
+
푃푒
|
1220 |
+
⎤
|
1221 |
+
⎥
|
1222 |
+
⎥
|
1223 |
+
⎥
|
1224 |
+
⎥
|
1225 |
+
⎥
|
1226 |
+
⎥⎦
|
1227 |
+
and
|
1228 |
+
퐪푎 =
|
1229 |
+
⎡
|
1230 |
+
⎢
|
1231 |
+
⎢
|
1232 |
+
⎢
|
1233 |
+
⎢
|
1234 |
+
⎢
|
1235 |
+
⎢⎣
|
1236 |
+
1
|
1237 |
+
0
|
1238 |
+
0
|
1239 |
+
퐵0
|
1240 |
+
0
|
1241 |
+
푃푎
|
1242 |
+
⎤
|
1243 |
+
⎥
|
1244 |
+
⎥
|
1245 |
+
⎥
|
1246 |
+
⎥
|
1247 |
+
⎥
|
1248 |
+
⎥⎦
|
1249 |
+
.
|
1250 |
+
(46)
|
1251 |
+
The specific heat ratio is set as 5∕3. While the original problem setup uses 푃푎 = 0.1, 푃푒 = 103, and 퐵0 = 100∕
|
1252 |
+
√
|
1253 |
+
4휋, we
|
1254 |
+
consider the much more extreme case presented in Wu and Shu [15] with 푃푎 = 0.1, 푃푒 = 104, and 퐵0 = 1000∕
|
1255 |
+
√
|
1256 |
+
4휋,
|
1257 |
+
resulting in a very large pressure ratio of 105 and a very small plasma-beta of 훽 ≈ 2.5⋅10−4. As these conditions are
|
1258 |
+
quite extreme, the scheme would diverge almost instantly in the absence of any positivity-preserving modifications.
|
1259 |
+
To verify that the proposed scheme can be easily extended to unstructured grids, the problem was solved on trian-
|
1260 |
+
gular meshes using a ℙ4 scheme. A coarse mesh and a fine mesh were generated, consisting of approximately 1.2⋅105
|
1261 |
+
elements with an average edge length of ℎ = 1∕200 and approximately 5⋅105 elements with an average edge length of
|
1262 |
+
ℎ = 1∕400, respectively. For this case, the HLL Riemann solver was used as it was found to be much better behaved
|
1263 |
+
in these extreme conditions than the HLLC Riemann solver, although both approaches were properly stabilized with
|
1264 |
+
the proposed entropy filtering method. The contours of density, velocity magnitude, pressure, and magnetic pressure
|
1265 |
+
at 푡 = 0.001 are shown in Fig. 7 and Fig. 8 for the coarse and fine meshes, respectively, computed using time steps of
|
1266 |
+
Δ푡 = 2⋅10−7 and Δ푡 = 1⋅10−7. Even with these extreme conditions on unstructured grids, the predicted solutions were
|
1267 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1268 |
+
Page 14 of 22
|
1269 |
+
|
1270 |
+
d
|
1271 |
+
0
|
1272 |
+
10
|
1273 |
+
20
|
1274 |
+
30
|
1275 |
+
40Positivity-preserving entropy filtering for the ideal MHD equations
|
1276 |
+
(a) Density
|
1277 |
+
(b) Velocity Magnitude
|
1278 |
+
(c) Pressure
|
1279 |
+
(d) Magnetic Pressure
|
1280 |
+
Figure 7:
|
1281 |
+
Contours of density (top left), velocity magnitude (top right), pressure (bottom left), and magnetic pressure
|
1282 |
+
(bottom right) for the magnetized blast problem at 푡 = 0.001 computed using a ℙ4 scheme on an unstructured mesh with
|
1283 |
+
an average edge length of ℎ = 1∕200.
|
1284 |
+
well-behaved, and both the coarse and fine meshes showed excellent resolution of the various discontinuities in the
|
1285 |
+
velocity, pressure, and magnetic fields with sub-element resolution and no observable spurious oscillations. Further-
|
1286 |
+
more, the numerical width of the discontinuities decreased appropriately with increasing resolution. For the density
|
1287 |
+
field, minor spurious oscillations were observed, primarily at lower resolution and somewhat indicative of mesh im-
|
1288 |
+
printing, but the strength and distribution of these oscillations decreased with the finer mesh. These observations are
|
1289 |
+
consistent with the case of the Brio–Wu shock tube where the density field was marginally less well-behaved than the
|
1290 |
+
other fields. However, the predicted fields were still very good given such extreme conditions and an unstructured
|
1291 |
+
mesh, indicating that the proposed approach remains robust and accurate for such flows.
|
1292 |
+
To demonstrate the sub-element shock-resolving ability of the entropy filtering approach on unstructured grids, an
|
1293 |
+
enlarged view of the contours of pressure with the mesh overlaid is shown for the two meshes in Fig. 9. It can be seen
|
1294 |
+
that the shock was resolved well within the element, with the majority of the feature resolved across 1-2 solution nodes.
|
1295 |
+
Furthermore, this behavior persisted when the mesh resolution was increased, such that the discrete shock thickness
|
1296 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1297 |
+
Page 15 of 22
|
1298 |
+
|
1299 |
+
3
|
1300 |
+
4
|
1301 |
+
5/vl
|
1302 |
+
O
|
1303 |
+
10
|
1304 |
+
20
|
1305 |
+
30
|
1306 |
+
40
|
1307 |
+
50P
|
1308 |
+
1000
|
1309 |
+
2000
|
1310 |
+
3000
|
1311 |
+
4000
|
1312 |
+
5000P
|
1313 |
+
23000
|
1314 |
+
24000
|
1315 |
+
25000
|
1316 |
+
26000
|
1317 |
+
27000
|
1318 |
+
28000Positivity-preserving entropy filtering for the ideal MHD equations
|
1319 |
+
(a) Density
|
1320 |
+
(b) Velocity Magnitude
|
1321 |
+
(c) Pressure
|
1322 |
+
(d) Magnetic Pressure
|
1323 |
+
Figure 8:
|
1324 |
+
Contours of density (top left), velocity magnitude (top right), pressure (bottom left), and magnetic pressure
|
1325 |
+
(bottom right) for the magnetized blast problem at 푡 = 0.001 computed using a ℙ4 scheme on an unstructured mesh with
|
1326 |
+
an average edge length of ℎ = 1∕400.
|
1327 |
+
decreased proportionally. Given the unstructured nature of the mesh and the resulting solution point distribution, the
|
1328 |
+
circular shape of the shock front was still well-represented, with even better approximation at higher mesh resolutions.
|
1329 |
+
These results indicate that the proposed approach can be extended to unstructured grids in a straightforward manner
|
1330 |
+
without appreciably sacrificing its efficiency or performance at resolving discontinuities.
|
1331 |
+
5.6. Three-dimensional Rayleigh–Taylor instability
|
1332 |
+
A final evaluation of the proposed approach and the extension to three-dimensional flows was performed through
|
1333 |
+
the simulation of a magnetized three-dimensional Rayleigh–Taylor instability. The problem consists of a denser gas
|
1334 |
+
resting on top of a lighter gas under the effect of a gravitational field initially in equilibrium with the pressure gradient.
|
1335 |
+
Instabilities arise in the form of “bubbles” of the lighter gas rising and “fingers” of the heavier gas descending, after
|
1336 |
+
which nonlinear momentum transport drives the flow to a turbulent mixing state. The problem is solved on the domain
|
1337 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1338 |
+
Page 16 of 22
|
1339 |
+
|
1340 |
+
3
|
1341 |
+
4
|
1342 |
+
5I
|
1343 |
+
/vl
|
1344 |
+
10
|
1345 |
+
20
|
1346 |
+
30
|
1347 |
+
40
|
1348 |
+
50P
|
1349 |
+
1000
|
1350 |
+
2000
|
1351 |
+
3000
|
1352 |
+
4000
|
1353 |
+
5000P
|
1354 |
+
23000
|
1355 |
+
24000
|
1356 |
+
25000
|
1357 |
+
26000
|
1358 |
+
27000
|
1359 |
+
28000Positivity-preserving entropy filtering for the ideal MHD equations
|
1360 |
+
(a) Coarse mesh
|
1361 |
+
(b) Fine mesh
|
1362 |
+
Figure 9:
|
1363 |
+
Enlarged view of contours of pressure with mesh overlay for the magnetized blast problem at 푡 = 0.001 computed
|
1364 |
+
using a ℙ4 scheme on the coarse mesh (left) and fine mesh (right). Contour scale identical to Fig. 7 and Fig. 8.
|
1365 |
+
[−퐿∕2, 퐿∕2]2 × [−퐿, 퐿], where 퐿 = 1, and the initial conditions are given as
|
1366 |
+
퐪(퐱, 0) = [휌, 푢, 푣, 푤, 퐵푥, 퐵푦, 퐵푧, 푃]푇 =
|
1367 |
+
{
|
1368 |
+
퐪푙,
|
1369 |
+
if 푧 ≤ 0,
|
1370 |
+
퐪ℎ,
|
1371 |
+
else,
|
1372 |
+
(47)
|
1373 |
+
where
|
1374 |
+
퐪푙 =
|
1375 |
+
⎡
|
1376 |
+
⎢
|
1377 |
+
⎢
|
1378 |
+
⎢
|
1379 |
+
⎢
|
1380 |
+
⎢
|
1381 |
+
⎢
|
1382 |
+
⎢
|
1383 |
+
⎢⎣
|
1384 |
+
휌푙
|
1385 |
+
0
|
1386 |
+
0
|
1387 |
+
푊 (푥, 푦, 푧)
|
1388 |
+
퐵0
|
1389 |
+
0
|
1390 |
+
0
|
1391 |
+
푃(푧)
|
1392 |
+
⎤
|
1393 |
+
⎥
|
1394 |
+
⎥
|
1395 |
+
⎥
|
1396 |
+
⎥
|
1397 |
+
⎥
|
1398 |
+
⎥
|
1399 |
+
⎥
|
1400 |
+
⎥⎦
|
1401 |
+
and
|
1402 |
+
퐪ℎ =
|
1403 |
+
⎡
|
1404 |
+
⎢
|
1405 |
+
⎢
|
1406 |
+
⎢
|
1407 |
+
⎢
|
1408 |
+
⎢
|
1409 |
+
⎢
|
1410 |
+
⎢
|
1411 |
+
⎢⎣
|
1412 |
+
휌ℎ
|
1413 |
+
0
|
1414 |
+
0
|
1415 |
+
푊 (푥, 푦, 푧)
|
1416 |
+
퐵0
|
1417 |
+
0
|
1418 |
+
0
|
1419 |
+
푃(푧)
|
1420 |
+
⎤
|
1421 |
+
⎥
|
1422 |
+
⎥
|
1423 |
+
⎥
|
1424 |
+
⎥
|
1425 |
+
⎥
|
1426 |
+
⎥
|
1427 |
+
⎥
|
1428 |
+
⎥⎦
|
1429 |
+
,
|
1430 |
+
(48)
|
1431 |
+
for some vertical velocity perturbation 푊 (푥, 푦, 푧) and initial pressure distribution 푃 (푧). Periodic boundary conditions
|
1432 |
+
are enforced along the transverse (푥, 푦) directions while reflecting boundary conditions are enforced along the top and
|
1433 |
+
bottom boundaries. A gravitational field is added to the problem, given in the form of a source term as
|
1434 |
+
퐒퐆 = −[0, 0, 0, 휌푔, 0, 0, 0, 휌푤푔],
|
1435 |
+
(49)
|
1436 |
+
where 푔 = 1. The treatment of this gravitational field in the context of the entropy filter is taken simply as an additional
|
1437 |
+
term in the source term of Powell’s method, and as it not stiff for this problem, it does not appreciably affect the time
|
1438 |
+
step restrictions of the scheme.
|
1439 |
+
The parameters for the problem are taken similarly to a scaled form of the setup in Stone and Gardiner [50]. The
|
1440 |
+
densities of the light and heavy gases are taken as 휌푙 = 1 and 휌ℎ = 3, respectively, yielding an Atwood number of 1∕2.
|
1441 |
+
To enforce equilibrium in the flow, the initial pressure field is taken as
|
1442 |
+
푃(푧) = 푃0 − 휌푔푧,
|
1443 |
+
(50)
|
1444 |
+
where 푃0 = 10∕훾 for a specific heat ratio 훾 = 5∕3. To seed instabilities in the flow, perturbations were added in the
|
1445 |
+
form of a vertical velocity field component as
|
1446 |
+
푊 (푥, 푦, 푧) = 퐴 cos
|
1447 |
+
( 휋푧
|
1448 |
+
2퐿
|
1449 |
+
)
|
1450 |
+
sin
|
1451 |
+
(4휋푥
|
1452 |
+
퐿
|
1453 |
+
)
|
1454 |
+
sin
|
1455 |
+
(4휋푦
|
1456 |
+
퐿
|
1457 |
+
)
|
1458 |
+
,
|
1459 |
+
(51)
|
1460 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1461 |
+
Page 17 of 22
|
1462 |
+
|
1463 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
1464 |
+
where 퐴 = 0.05. This differs from the work of Stone and Gardiner [50] in that the transverse distribution of the
|
1465 |
+
perturbations is taken as a single deterministic mode instead of randomly-generated noise. As such, the predicted flow
|
1466 |
+
fields are expected to differ during the linear growth regime of the instability.
|
1467 |
+
The addition of a magnetic field significantly impacts the behavior of the Rayleigh–Taylor instability as it induces
|
1468 |
+
a stabilizing effect on the flow. In fact, linear stability analysis presents a cutoff magnetic field value,
|
1469 |
+
퐵푐 =
|
1470 |
+
√
|
1471 |
+
(휌ℎ − 휌푙)푔퐿 =
|
1472 |
+
√
|
1473 |
+
2,
|
1474 |
+
(52)
|
1475 |
+
above which the instability is completely damped by the magnetic field [50]. We consider three variations of this flow,
|
1476 |
+
a hydrodynamic case where 퐵0 = 0, a weakly magnetized case where 퐵0 = 0.1퐵푐, and a strongly magnetized case
|
1477 |
+
where 퐵0 = 0.5퐵푐. The term strongly magnetized is relative in the sense that the plasma-beta is still quite high, but
|
1478 |
+
the magnetic field can suppress almost all potential instability modes along its orientation.
|
1479 |
+
These three flow conditions were computed using a ℙ3 scheme on a 푁푒 = 64 × 64 �� 128 mesh with a time step of
|
1480 |
+
Δ푡 = 2⋅10−5. The flow, visualized in the form of a volume rendering of the density field, at various times is shown in
|
1481 |
+
Fig. 10, Fig. 11, and Fig. 12 for the hydrodynamic, weakly magnetized, and strongly magnetized cases, respectively.
|
1482 |
+
For the hydrodynamic case, the canonical flow pattern of the Rayleigh–Taylor instability was observed, with rising
|
1483 |
+
bubbles and descending figures. At later times, these features transitioned to a turbulent mixing state. When a weak
|
1484 |
+
magnetic field was applied, a significant degree of anisotropy was imparted on the flow, seen in the form of distortions
|
1485 |
+
in the bubbles and fingers aligned with the orientation of the magnetic field. Furthermore, the slowed growth rate of
|
1486 |
+
the instabilities due to the stabilizing effect of this weak magnetic field could be observed. For the strongly magnetized
|
1487 |
+
case, the magnetic field effectively damped all instabilities along the orientation of the field, such that the resulting
|
1488 |
+
flow only varied perpendicular to the orientation of the field. Given a long enough simulation time, this flow would
|
1489 |
+
be expected to transition to a three-dimensional turbulent mixing state as nonlinear transport effects overcome the
|
1490 |
+
stabilizing nature of the magnetic field. For all cases, the flow was numerically well-behaved, indicating that the
|
1491 |
+
proposed approach can be effectively applied to three-dimensional flows in both the magnetized and hydrodynamic
|
1492 |
+
regimes.
|
1493 |
+
(a) 푡 = 2
|
1494 |
+
(b) 푡 = 3
|
1495 |
+
(c) 푡 = 4
|
1496 |
+
(d) 푡 = 5
|
1497 |
+
Figure 10:
|
1498 |
+
Volume rendering of the density field for the hydrodynamic (퐵0 = 0) Rayleigh–Taylor instability problem at
|
1499 |
+
varying times computed using a ℙ3 scheme on a 푁푒 = 64 × 64 × 128 mesh.
|
1500 |
+
To quantify the efficiency improvements of the proposed algorithm in comparison to the original approach in
|
1501 |
+
Dzanic and Witherden [17] which utilizes repeated evaluations of the matrix-vector product in Eq. (27), a runtime
|
1502 |
+
comparison between the two methods was performed for the case of 퐵0 = 0.1퐵푐. The cost was evaluated on 16
|
1503 |
+
NVIDIA V100 GPUs with respect to the wall-clock time elapsed until the simulation reached 푡 = 1, and the results
|
1504 |
+
are shown in Fig. 13. While the original approach required 61.4 GPU hours, the proposed approach required only
|
1505 |
+
25.3 GPU hours, a speedup factor of approximately 2.4 across the entire simulation time. Furthermore, this speedup
|
1506 |
+
is expected to increase with higher approximation orders due to the increased number of solution points per element.
|
1507 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1508 |
+
Page 18 of 22
|
1509 |
+
|
1510 |
+
2
|
1511 |
+
3
|
1512 |
+
dPositivity-preserving entropy filtering for the ideal MHD equations
|
1513 |
+
(a) 푡 = 2
|
1514 |
+
(b) 푡 = 3
|
1515 |
+
(c) 푡 = 4
|
1516 |
+
(d) 푡 = 5
|
1517 |
+
Figure 11:
|
1518 |
+
Volume rendering of the density field for the weakly magnetized (퐵0 = 0.1퐵푐) Rayleigh–Taylor instability
|
1519 |
+
problem at varying times computed using a ℙ3 scheme on a 푁푒 = 64 × 64 × 128 mesh.
|
1520 |
+
(a) 푡 = 2
|
1521 |
+
(b) 푡 = 3
|
1522 |
+
(c) 푡 = 4
|
1523 |
+
(d) 푡 = 5
|
1524 |
+
Figure 12:
|
1525 |
+
Volume rendering of the density field for the strongly magnetized (퐵0 = 0.5퐵푐) Rayleigh–Taylor instability
|
1526 |
+
problem at varying times computed using a ℙ3 scheme on a 푁푒 = 64 × 64 × 128 mesh.
|
1527 |
+
To confirm this, an identical comparison was performed using a ℙ4 approximation on a 푁푒 = 51 × 51 × 102 mesh,
|
1528 |
+
which results in approximately the same number of degrees of freedom. At this approximation order, the original
|
1529 |
+
approach required 257 GPU hours whereas the proposed approach required only 39.8 GPU hours, a speedup factor
|
1530 |
+
of approximately 6.5. These results indicate that the proposed algorithmic improvements both substantially decrease
|
1531 |
+
the overall computational cost of the entropy filtering approach and show much better scaling with respect to the
|
1532 |
+
approximation order.
|
1533 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1534 |
+
Page 19 of 22
|
1535 |
+
|
1536 |
+
2
|
1537 |
+
3
|
1538 |
+
d2
|
1539 |
+
3
|
1540 |
+
dPositivity-preserving entropy filtering for the ideal MHD equations
|
1541 |
+
ℙ3
|
1542 |
+
ℙ4
|
1543 |
+
0
|
1544 |
+
100
|
1545 |
+
200
|
1546 |
+
300
|
1547 |
+
25.3
|
1548 |
+
61.4
|
1549 |
+
39.8
|
1550 |
+
257
|
1551 |
+
GPU hours per characteristic time
|
1552 |
+
Proposed algorithm
|
1553 |
+
Original algorithm
|
1554 |
+
Figure 13:
|
1555 |
+
Comparison of the wall-clock time to reach 푡 = 1 for the weakly magnetized (퐵0 = 0.1퐵푐) Rayleigh–Taylor
|
1556 |
+
instability problem with a ℙ3 (left) and ℙ4 (right) scheme with the same number of degrees of freedom using the original
|
1557 |
+
algorithm of Dzanic and Witherden [17] and the proposed algorithm.
|
1558 |
+
6. Conclusions
|
1559 |
+
In this work, a positivity-preserving adaptive filtering approach was proposed for shock capturing in discontinuous
|
1560 |
+
spectral element approximations of the ideal magnetohydrodynamics equations. The proposed scheme can be consid-
|
1561 |
+
ered as an extension of the entropy filtering approach [17] introduced by the authors for the gas dynamics equations
|
1562 |
+
to the ideal magnetohydrodynamics system. By formulating convex invariants such as positivity of density and pres-
|
1563 |
+
sure and a local discrete minimum entropy principle as discrete constraints on the solution, the amount of filtering
|
1564 |
+
necessary to satisfy the constraints was computed as an element-wise scalar optimization problem. This approach was
|
1565 |
+
combined with the eight-wave method of Powell et al. [7] for enforcing a solenoidal magnetic field. As this method
|
1566 |
+
introduced non-conservative source terms to the system, an operator splitting approach was proposed and its effects
|
1567 |
+
on the assumptions necessitated by the adaptive filtering approach to guarantee the satisfaction of the constraints were
|
1568 |
+
analyzed. An improved algorithm for solving the optimization problem for the filter strength was also introduced which
|
1569 |
+
significantly improved the computational efficiency of the proposed method.
|
1570 |
+
The proposed scheme could robustly resolve strong discontinuities while recovering high-order accuracy in smooth
|
1571 |
+
regions of the flow and could be easily and efficiently implemented on general unstructured grids. The efficacy of the
|
1572 |
+
approach was shown in a variety of numerical experiments, ranging from simple transport and shock tubes to extremely
|
1573 |
+
magnetized blast waves and three-dimensional magnetohydrodynamic instabilities. Furthermore, the proposed algo-
|
1574 |
+
rithmic enhancements yielded significant improvements in the computational cost and showed much better scaling with
|
1575 |
+
respect to approximation order, reducing the total runtime of the simulations by a factor of 2.4 for ℙ3 approximations
|
1576 |
+
and 6.5 for ℙ4 approximations. Future improvements to the proposed scheme could focus on applying different filter
|
1577 |
+
kernels to various components on the solution, alternate methods for enforcing a divergence-free magnetic field, and
|
1578 |
+
anisotropic filtering approaches.
|
1579 |
+
Acknowledgements
|
1580 |
+
This work was supported in part by the U.S. Air Force Office of Scientific Research via grant FA9550-21-1-0190
|
1581 |
+
("Enabling next-generation heterogeneous computing for massively parallel high-order compressible CFD") of the
|
1582 |
+
Defense University Research Instrumentation Program (DURIP) under the direction of Dr. Fariba Fahroo.
|
1583 |
+
References
|
1584 |
+
[1] John F. Hawley. Global magnetohydrodynamical simulations of accretion tori. The Astrophysical Journal, 528(1):462–479, January 2000.
|
1585 |
+
doi: 10.1086/308180.
|
1586 |
+
[2] Alex S. Hill, M. Ryan Joung, Mordecai-Mark Mac Low, Robert A. Benjamin, L. Matthew Haffner, Christian Klingenberg, and Knut Waagan.
|
1587 |
+
Vertical structure of a supernova–driven turbulence, magnetized interstellar medium. The Astrophysical Journal, 750(2):104, April 2012. doi:
|
1588 |
+
10.1088/0004-637x/750/2/104.
|
1589 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1590 |
+
Page 20 of 22
|
1591 |
+
|
1592 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
1593 |
+
[3] A Fasoli, S Brunner, W A Cooper, J P Graves, P Ricci, O Sauter, and L Villard. Computational challenges in magnetic-confinement fusion
|
1594 |
+
physics. Nat. Phys., 12(5):411–423, May 2016. doi: 10.1038/nphys3744.
|
1595 |
+
[4] Xiang Zhai, Hui Li, Paul M. Bellan, and Shengtai Li. Three–dimensional MHD simulation of the Caletch plasma jet experiment: First results.
|
1596 |
+
The Astrophysical Journal, 791(1):40, July 2014. doi: 10.1088/0004-637x/791/1/40.
|
1597 |
+
[5] Eberhard Hopf. The partial differential equation 푢푡+푢푢푥 = 휇푥푥. Communications on Pure and Applied Mathematics, 3(3):201–230, September
|
1598 |
+
1950. doi: 10.1002/cpa.3160030302.
|
1599 |
+
[6] Charles R. Evans and John F. Hawley. Simulation of magnetohydrodynamic flows - A constrained transport method. The Astrophysical
|
1600 |
+
Journal, 332:659, September 1988. doi: 10.1086/166684.
|
1601 |
+
[7] Kenneth G. Powell, Philip L. Roe, Timur J. Linde, Tamas I. Gombosi, and Darren L. De Zeeuw. A solution-adaptive upwind scheme for ideal
|
1602 |
+
magnetohydrodynamics. Journal of Computational Physics, 154(2):284–309, September 1999. doi: 10.1006/jcph.1999.6299.
|
1603 |
+
[8] M Brio and C.C Wu. An upwind differencing scheme for the equations of ideal magnetohydrodynamics. Journal of Computational Physics,
|
1604 |
+
75(2):400–422, April 1988. doi: 10.1016/0021-9991(88)90120-9.
|
1605 |
+
[9] Wenlong Dai and Paul R. Woodward. A simple finite difference scheme for multidimensional magnetohydrodynamical equations. Journal of
|
1606 |
+
Computational Physics, 142(2):331–369, May 1998. doi: 10.1006/jcph.1998.5944.
|
1607 |
+
[10] Dinshaw S Balsara and Daniel S Spicer. A staggered mesh algorithm using high order Godunov fluxes to ensure solenoidal magnetic fields in
|
1608 |
+
magnetohydrodynamic simulations. Journal of Computational Physics, 149(2):270–292, March 1999. doi: 10.1006/jcph.1998.6153.
|
1609 |
+
[11] Jorge Balbás and Eitan Tadmor. Nonoscillatory central schemes for one- and two-dimensional magnetohydrodynamics equations. II: High-
|
1610 |
+
order semi-discrete schemes. SIAM Journal on Scientific Computing, 28(2):533–560, January 2006. doi: 10.1137/040610246.
|
1611 |
+
[12] C. Ciucă, P. Fernandez, A. Christophe, N.C. Nguyen, and J. Peraire. Implicit hybridized discontinuous Galerkin methods for compressible
|
1612 |
+
magnetohydrodynamics. Journal of Computational Physics: X, 5:100042, January 2020. doi: 10.1016/j.jcpx.2019.100042.
|
1613 |
+
[13] T. Dzanic, W. Trojak, and F.D. Witherden. Utilizing time-reversibility for shock capturing in nonlinear hyperbolic conservation laws. Com-
|
1614 |
+
puters & Fluids, 247:105652, October 2022. doi: 10.1016/j.compfluid.2022.105652.
|
1615 |
+
[14] Andrés M. Rueda-Ramírez, Will Pazner, and Gregor J. Gassner. Subcell limiting strategies for discontinuous Galerkin spectral element
|
1616 |
+
methods. Computers & Fluids, 247:105627, October 2022. doi: 10.1016/j.compfluid.2022.105627.
|
1617 |
+
[15] Kailiang Wu and Chi-Wang Shu. A provably positive discontinuous Galerkin method for multidimensional ideal magnetohydrodynamics.
|
1618 |
+
SIAM Journal on Scientific Computing, 40(5):B1302–B1329, January 2018. doi: 10.1137/18m1168042.
|
1619 |
+
[16] Xiangxiong Zhang and Chi-Wang Shu. On positivity-preserving high order discontinuous Galerkin schemes for compressible Euler equations
|
1620 |
+
on rectangular meshes. Journal of Computational Physics, 229(23):8917–8934, November 2011. doi: 10.1016/j.jcp.2010.08.016.
|
1621 |
+
[17] T. Dzanic and F.D. Witherden. Positivity-preserving entropy-based adaptive filtering for discontinuous spectral element methods. Journal of
|
1622 |
+
Computational Physics, 468:111501, November 2022. doi: 10.1016/j.jcp.2022.111501.
|
1623 |
+
[18] Yimin Lin, Jesse Chan, and Ignacio Tomas. A positivity preserving strategy for entropy stable discontinuous Galerkin discretizations of the
|
1624 |
+
compressible Euler and Navier-Stokes equations. Journal of Computational Physics, 475:111850, February 2023. doi: 10.1016/j.jcp.2022.
|
1625 |
+
111850.
|
1626 |
+
[19] Fengyan Li and Chi-Wang Shu. Locally divergence-free discontinuous Galerkin methods for MHD equations. Journal of Scientific Computing,
|
1627 |
+
22-23(1-3):413–442, June 2005. doi: 10.1007/s10915-004-4146-4.
|
1628 |
+
[20] J.U Brackbill and D.C Barnes. The effect of nonzero ∇ · B on the numerical solution of the magnetohydrodynamic equations. Journal of
|
1629 |
+
Computational Physics, 35(3):426–430, May 1980. doi: 10.1016/0021-9991(80)90079-0.
|
1630 |
+
[21] A. Dedner, F. Kemm, D. Kröner, C.-D. Munz, T. Schnitzer, and M. Wesenberg. Hyperbolic divergence cleaning for the MHD equations.
|
1631 |
+
Journal of Computational Physics, 175(2):645–673, January 2002. doi: 10.1006/jcph.2001.6961.
|
1632 |
+
[22] Ami Harten, Bjorn Engquist, Stanley Osher, and Sukumar R Chakravarthy. Uniformly high order accurate essentially non-oscillatory schemes,
|
1633 |
+
III. Journal of Computational Physics, 71(2):231–303, August 1987. doi: 10.1016/0021-9991(87)90031-3.
|
1634 |
+
[23] Tuan Anh Dao and Murtazo Nazarov. Monolithic parabolic regularization of the MHD equations and entropy principles. Computer Methods
|
1635 |
+
in Applied Mechanics and Engineering, 398:115269, August 2022. doi: 10.1016/j.cma.2022.115269.
|
1636 |
+
[24] Eitan Tadmor. A minimum entropy principle in the gas dynamics equations. Applied Numerical Mathematics, 2(3-5):211–219, October 1986.
|
1637 |
+
doi: 10.1016/0168-9274(86)90029-2.
|
1638 |
+
[25] Jan S. Hesthaven and Tim Warburton. Nodal Discontinuous Galerkin Methods. Springer New York, 2008. doi: 10.1007/978-0-387-72067-8.
|
1639 |
+
[26] H. T. Huynh. A flux reconstruction approach to high-order schemes including discontinuous Galerkin methods. In 18th AIAA Computational
|
1640 |
+
Fluid Dynamics Conference. American Institute of Aeronautics and Astronautics, June 2007. doi: 10.2514/6.2007-4079.
|
1641 |
+
[27] V.V Rusanov. The calculation of the interaction of non-stationary shock waves and obstacles. USSR Computational Mathematics and Math-
|
1642 |
+
ematical Physics, 1(2):304–320, January 1962. doi: 10.1016/0041-5553(62)90062-9.
|
1643 |
+
[28] P. Castonguay, P. E. Vincent, and A. Jameson. A new class of high-order energy stable flux reconstruction schemes for triangular elements.
|
1644 |
+
Journal of Scientific Computing, 51(1):224–256, June 2011. doi: 10.1007/s10915-011-9505-3.
|
1645 |
+
[29] W. Trojak and F.D. Witherden. A new family of weighted one-parameter flux reconstruction schemes. Computers & Fluids, 222:104918, May
|
1646 |
+
2021. doi: 10.1016/j.compfluid.2021.104918.
|
1647 |
+
[30] P. A. Raviart and J. M. Thomas. A mixed finite element method for 2-nd order elliptic problems. In Lecture Notes in Mathematics, pages
|
1648 |
+
292–315. Springer Berlin Heidelberg, 1977. doi: 10.1007/bfb0064470.
|
1649 |
+
[31] Gábor Tóth. The ∇·B=0 constraint in shock-capturing magnetohydrodynamics codes. Journal of Computational Physics, 161(2):605–652,
|
1650 |
+
July 2000. doi: 10.1006/jcph.2000.6519.
|
1651 |
+
[32] Xiangxiong Zhang and Chi-Wang Shu.
|
1652 |
+
On maximum-principle-satisfying high order schemes for scalar conservation laws.
|
1653 |
+
Journal of
|
1654 |
+
Computational Physics, 229(9):3091–3120, May 2010. doi: 10.1016/j.jcp.2009.12.030.
|
1655 |
+
[33] Xiangxiong Zhang, Yinhua Xia, and Chi-Wang Shu.
|
1656 |
+
Maximum-principle-satisfying and positivity-preserving high order discontinuous
|
1657 |
+
Galerkin schemes for conservation laws on triangular meshes.
|
1658 |
+
Journal of Scientific Computing, 50(1):29–62, February 2011.
|
1659 |
+
doi:
|
1660 |
+
10.1007/s10915-011-9472-8.
|
1661 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1662 |
+
Page 21 of 22
|
1663 |
+
|
1664 |
+
Positivity-preserving entropy filtering for the ideal MHD equations
|
1665 |
+
[34] Xiangxiong Zhang and Chi-Wang Shu. Positivity-preserving high order discontinuous Galerkin schemes for compressible Euler equations
|
1666 |
+
with source terms. Journal of Computational Physics, 230(4):1238–1248, February 2011. doi: 10.1016/j.jcp.2010.10.036.
|
1667 |
+
[35] Tianheng Chen and Chi-Wang Shu. Entropy stable high order discontinuous Galerkin methods with suitable quadrature rules for hyperbolic
|
1668 |
+
conservation laws. Journal of Computational Physics, 345:427–461, September 2017. doi: 10.1016/j.jcp.2017.05.025.
|
1669 |
+
[36] François Bouchut, Christian Klingenberg, and Knut Waagan. A multiwave approximate Riemann solver for ideal MHD based on relaxation.
|
1670 |
+
I: theoretical framework. Numerische Mathematik, 108(1):7–42, September 2007. doi: 10.1007/s00211-007-0108-8.
|
1671 |
+
[37] L. Demkowicz, J.T. Oden, and W. Rachowicz. A new finite element method for solving compressible Navier-Stokes equations based on an
|
1672 |
+
operator splitting method and h-p adaptivity. Computer Methods in Applied Mechanics and Engineering, 84(3):275–326, December 1990.
|
1673 |
+
doi: 10.1016/0045-7825(90)90081-v.
|
1674 |
+
[38] F.D. Witherden, A.M. Farrington, and P.E. Vincent. PyFR: An open source framework for solving advection–diffusion type problems on
|
1675 |
+
streaming architectures using the flux reconstruction approach. Computer Physics Communications, 185(11):3028–3040, November 2014.
|
1676 |
+
doi: 10.1016/j.cpc.2014.07.011.
|
1677 |
+
[39] Shengtai Li. An HLLC Riemann solver for magneto-hydrodynamics. Journal of Computational Physics, 203(1):344–357, February 2005.
|
1678 |
+
doi: 10.1016/j.jcp.2004.08.020.
|
1679 |
+
[40] K. F. Gurski. An HLLC-type approximate Riemann solver for ideal magnetohydrodynamics. SIAM Journal on Scientific Computing, 25(6):
|
1680 |
+
2165–2187, January 2004. doi: 10.1137/s1064827502407962.
|
1681 |
+
[41] S. F. Davis. Simplified second-order Godunov-type methods. SIAM Journal on Scientific and Statistical Computing, 9(3):445–473, May 1988.
|
1682 |
+
doi: 10.1137/0909030.
|
1683 |
+
[42] Amiram Harten, Peter D. Lax, and Bram van Leer. On upstream differencing and Godunov-type schemes for hyperbolic conservation laws.
|
1684 |
+
SIAM Review, 25(1):35–61, January 1983. doi: 10.1137/1025002.
|
1685 |
+
[43] Gianmarco Mengaldo, Daniele De Grazia, Freddie Witherden, Antony Farrington, Peter Vincent, Spencer Sherwin, and Joaquim Peiro. A
|
1686 |
+
guide to the implementation of boundary conditions in compact high-order methods for compressible aerodynamics. In 7th AIAA Theoretical
|
1687 |
+
Fluid Mechanics Conference. American Institute of Aeronautics and Astronautics, June 2014. doi: 10.2514/6.2014-2923.
|
1688 |
+
[44] M. Dowell and P. Jarratt. A modified regula falsi method for computing the root of an equation. BIT, 11(2):168–174, June 1971. doi:
|
1689 |
+
10.1007/bf01934364.
|
1690 |
+
[45] Andrew J. Christlieb, Yuan Liu, Qi Tang, and Zhengfu Xu. Positivity-preserving finite difference weighted ENO schemes with constrained
|
1691 |
+
transport for ideal magnetohydrodynamic equations. SIAM Journal on Scientific Computing, 37(4):A1825–A1845, January 2015. doi: 10.
|
1692 |
+
1137/140971208.
|
1693 |
+
[46] Gary A Sod. A survey of several finite difference methods for systems of nonlinear hyperbolic conservation laws. Journal of Computational
|
1694 |
+
Physics, 27(1):1–31, April 1978. doi: 10.1016/0021-9991(78)90023-2.
|
1695 |
+
[47] Steven A. Orszag and Cha-Mei Tang. Small-scale structure of two-dimensional magnetohydrodynamic turbulence. Journal of Fluid Mechan-
|
1696 |
+
ics, 90(1):129–143, January 1979. doi: 10.1017/s002211207900210x.
|
1697 |
+
[48] Guang-Shan Jiang and Cheng-Chin Wu. A high-order WENO finite difference scheme for the equations of ideal magnetohydrodynamics.
|
1698 |
+
Journal of Computational Physics, 150(2):561–594, April 1999. doi: 10.1006/jcph.1999.6207.
|
1699 |
+
[49] Andrew L. Zachary, Andrea Malagoli, and Phillip Colella. A higher-order Godunov method for multidimensional ideal magnetohydrodynam-
|
1700 |
+
ics. SIAM Journal on Scientific Computing, 15(2):263–284, March 1994. doi: 10.1137/0915019.
|
1701 |
+
[50] James M. Stone and Thomas Gardiner. Nonlinear evolution of the magnetohydrodynamic Rayleigh-Taylor instability. Physics of Fluids, 19
|
1702 |
+
(9):094104, September 2007. doi: 10.1063/1.2767666.
|
1703 |
+
T. Dzanic et al.: Preprint submitted to Elsevier
|
1704 |
+
Page 22 of 22
|
1705 |
+
|
HtE1T4oBgHgl3EQfXwQA/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
ItE3T4oBgHgl3EQfXAqD/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:abab2159b144ca7469f5cf3e1e359cd41a2ea74e114b13270e59b40f208677e3
|
3 |
+
size 5963821
|
ItFKT4oBgHgl3EQfdy7h/content/2301.11822v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8c43bdd29c32e69edb7e97f2930470d4e7eb906cdedcbb2e111fb4522d3c1425
|
3 |
+
size 221292
|
ItFKT4oBgHgl3EQfdy7h/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5a005be37bee953ade22f268c077252a8cdc4be03d7b2edce240d68ccccd7383
|
3 |
+
size 2555949
|
ItFKT4oBgHgl3EQfdy7h/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:447adb0fa9a607dd5750b1441e207e04cb7d0919365f29c43eb7796ef727a57d
|
3 |
+
size 88496
|
JdAyT4oBgHgl3EQf5_qu/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d26aae70ae23a18c30e9f341ea82034cde30ff7f40021fce1b697e0bbbd54ab1
|
3 |
+
size 101147
|
JtE0T4oBgHgl3EQfSADl/content/tmp_files/2301.02217v1.pdf.txt
ADDED
@@ -0,0 +1,1455 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
EgoDistill: Egocentric Head Motion Distillation
|
2 |
+
for Efficient Video Understanding
|
3 |
+
Shuhan Tan1
|
4 |
+
Tushar Nagarajan1
|
5 |
+
Kristen Grauman1,2
|
6 |
+
1The University of Texas at Austin
|
7 |
+
2FAIR, Meta AI
|
8 |
+
{shuhan,tushar.nagarajan,grauman}@cs.utexas.edu
|
9 |
+
Abstract
|
10 |
+
Recent advances in egocentric video understanding
|
11 |
+
models are promising, but their heavy computational ex-
|
12 |
+
pense is a barrier for many real-world applications. To ad-
|
13 |
+
dress this challenge, we propose EgoDistill, a distillation-
|
14 |
+
based approach that learns to reconstruct heavy egocen-
|
15 |
+
tric video clip features by combining the semantics from
|
16 |
+
a sparse set of video frames with the head motion from
|
17 |
+
lightweight IMU readings. We further devise a novel self-
|
18 |
+
supervised training strategy for IMU feature learning. Our
|
19 |
+
method leads to significant improvements in efficiency, re-
|
20 |
+
quiring 200× fewer GFLOPs than equivalent video models.
|
21 |
+
We demonstrate its effectiveness on the Ego4D and EPIC-
|
22 |
+
Kitchens datasets, where our method outperforms state-of-
|
23 |
+
the-art efficient video understanding methods.
|
24 |
+
1. Introduction
|
25 |
+
Recent advances in augmented and virtual reality
|
26 |
+
(AR/VR) technology have the potential to change the way
|
27 |
+
people interact with the digital world, much like the smart-
|
28 |
+
phone did in the previous decade.
|
29 |
+
A fundamental re-
|
30 |
+
quirement for AR/VR systems is the ability to recognize
|
31 |
+
user behavior from egocentric video captured from a head-
|
32 |
+
mounted camera.
|
33 |
+
Towards this goal, several egocentric
|
34 |
+
video datasets have been proposed in recent years, spurring
|
35 |
+
increasing attention of the research community [11,26,56].
|
36 |
+
Recent advances in egocentric action recognition, antic-
|
37 |
+
ipation, and retrieval focus on building powerful clip-based
|
38 |
+
video models that operate on video clips of a few seconds
|
39 |
+
at a time [12, 16, 18, 25, 43, 44, 54, 55]. Despite encourag-
|
40 |
+
ing performance, these models typically process densely-
|
41 |
+
sampled frames with temporally-aware operations, making
|
42 |
+
them computationally heavy. This makes them impractical
|
43 |
+
for AR/VR devices with constrained resources, or for real-
|
44 |
+
time video applications that require low latency. How to
|
45 |
+
efficiently perform egocentric video understanding is there-
|
46 |
+
fore an important, yet unsolved problem.
|
47 |
+
+
|
48 |
+
Camera motion (IMU)
|
49 |
+
Video Frame
|
50 |
+
EgoDistill
|
51 |
+
Figure 1. Illustration of EgoDistill. Given a single video frame
|
52 |
+
and camera motion from IMU, EgoDistill learns to reconstruct the
|
53 |
+
more expensive dense video clip feature. With its lightweight in-
|
54 |
+
put, EgoDistill significantly improves efficiency.
|
55 |
+
To address this issue, we take inspiration from how an-
|
56 |
+
imals perceive the world with ego-motion. Neuroscience
|
57 |
+
research has found that during active movement, the animal
|
58 |
+
visual cortex receives and utilizes head motion signals from
|
59 |
+
the motor cortex for visual processing [27,52,53]. This indi-
|
60 |
+
cates that head motion signals support an embodied agent’s
|
61 |
+
efficient understanding of the egocentric visual stream. In-
|
62 |
+
spired by this phenomenon, we explore the relationship be-
|
63 |
+
tween human head motion and egocentric video for efficient
|
64 |
+
video understanding. In practice, we consider head motion
|
65 |
+
signals captured by the inertial measurement unit (IMU) of
|
66 |
+
a head-mounted camera. IMU measures motion from an ac-
|
67 |
+
celerometer and gyroscope and is widely available on pop-
|
68 |
+
ular wearable devices. Prior work leverages IMU as an ex-
|
69 |
+
tra modality for human action recognition [13,68,69], (e.g.,
|
70 |
+
jumping, walking, standing) or as geometric cues for visual-
|
71 |
+
inertial odometry [7,20,71].
|
72 |
+
In contrast, we propose to achieve efficient video under-
|
73 |
+
standing by drawing on IMU as a substitute for dense video
|
74 |
+
frame observations. The intuition is as follows. A video
|
75 |
+
clip contains two things: semantic content (appearance of
|
76 |
+
objects, places, people) and dynamics (how the scene and
|
77 |
+
the camera move).
|
78 |
+
While densely sampled frames are
|
79 |
+
sure to capture both of the above—as done by current clip
|
80 |
+
arXiv:2301.02217v1 [cs.CV] 5 Jan 2023
|
81 |
+
|
82 |
+
models [16, 17, 54]—we hypothesize they are sometimes
|
83 |
+
overkill. For a short video clip, much of the semantic con-
|
84 |
+
tent is intelligible from even a single frame; meanwhile, the
|
85 |
+
head motion provides a good portion of the dynamics, im-
|
86 |
+
plicitly revealing how the visual appearance changes across
|
87 |
+
neighboring frames.
|
88 |
+
Building on this insight, we introduce EgoDistill, an ap-
|
89 |
+
proach that learns to reconstruct dense egocentric video
|
90 |
+
clip features using temporally sparse visual observations
|
91 |
+
(as few as one RGB frame) together with the head motion
|
92 |
+
from IMU. Specifically, EgoDistill employs a new form of
|
93 |
+
knowledge distillation from video models. During training,
|
94 |
+
we train a lightweight model that takes sparsely sampled
|
95 |
+
image(s) and IMU to approximate the video representation
|
96 |
+
extracted by a powerful but expensive video model. We fur-
|
97 |
+
ther improve the model with a novel self-supervised train-
|
98 |
+
ing stage for IMU feature learning. During inference, we
|
99 |
+
directly utilize the lightweight model for egocentric video
|
100 |
+
recognition, leading to much higher efficiency. Our model
|
101 |
+
is flexible to the target heavy video feature, as we demon-
|
102 |
+
strate with multiple current leading egocentric video mod-
|
103 |
+
els [16–18,54]. See Figure 1.
|
104 |
+
Importantly, EgoDistill offers a major efficiency gain:
|
105 |
+
processing low-dimensional IMU and a few frames is much
|
106 |
+
more efficient compared to processing a dense stack of
|
107 |
+
frames. In practice, EgoDistill uses 200× fewer GFLOPs
|
108 |
+
than the original video model.
|
109 |
+
We experiment on the largest available egocentric ac-
|
110 |
+
tion recognition datasets: Ego4D [26] and EPIC-Kitchens-
|
111 |
+
100 [11]. We show that IMU coupled with an image offers
|
112 |
+
better cross-modality knowledge distillation performance
|
113 |
+
than images alone or images with audio. For a typical 50-
|
114 |
+
minute egocentric video, EgoDistill reduces inference time
|
115 |
+
of the source video model from 25 minutes to 36 seconds.
|
116 |
+
Moreover, with only 1-4 frames, our lightweight distillation
|
117 |
+
model achieves a better accuracy-efficiency trade-off than
|
118 |
+
state-of-the-art models for adaptively sampling video con-
|
119 |
+
tent [50,65]. Notably, we surpass the accuracy of these fast
|
120 |
+
approaches by a large margin while requiring 4× to 8× less
|
121 |
+
computation.
|
122 |
+
2. Related Work
|
123 |
+
IMU for activity recognition. Recent work explores us-
|
124 |
+
ing the IMU sensor on mobile devices for human activ-
|
125 |
+
ity recognition of actions like walking, jumping, or sit-
|
126 |
+
ting [3,47,59–61]. Normally, these models take input from
|
127 |
+
IMU sensors mounted on human body joints [9, 42, 60],
|
128 |
+
waist-mounted [41] or in-pocket smartphones [33]. See [64]
|
129 |
+
for a survey. Abundant work in video recognition explores
|
130 |
+
ways to learn from RGB coupled with other modalities—
|
131 |
+
audio [1, 22, 38], optical flow [19, 57, 58] or both [32, 36,
|
132 |
+
51]—but comparatively fewer use IMU [48], and unlike our
|
133 |
+
work, they focus on third-person video [13, 68, 69] and do
|
134 |
+
not target at model efficiency. Our idea is for IMU to help
|
135 |
+
reconstruct more expensive video features, rather than sim-
|
136 |
+
ply fuse IMU with RGB for multi-modal recognition.
|
137 |
+
IMU for odometry. Inertial odometry aims to estimate the
|
138 |
+
position and orientation of the camera-wearer with readings
|
139 |
+
from the IMU sensor. Traditionally, methods rely on IMU
|
140 |
+
double integration [4] or enhancements thereof [5, 35, 40].
|
141 |
+
Recent data-driven methods automatically learn to per-
|
142 |
+
form inertial odometry with supervised [30, 70] or self-
|
143 |
+
supervised learning [7], or combine IMU and visual in-
|
144 |
+
put for more robust estimates with visual-inertial odome-
|
145 |
+
try [20, 71]. While IMU can convey geometric ego-motion
|
146 |
+
to our learned model, our goal is to produce efficient ego-
|
147 |
+
centric video features rather than to output odometry.
|
148 |
+
Visual feature learning with IMU. IMU is also used to
|
149 |
+
learn better vision features [14,15,34,63], e.g., to encourage
|
150 |
+
image features that are equivariant with ego-motion [34],
|
151 |
+
to predict an IMU-captured body part (leg, hand) [14, 15],
|
152 |
+
or to predict video-IMU correspondence [63], for applica-
|
153 |
+
tions like action recognition [15,63] and scene understand-
|
154 |
+
ing [14, 34]. While these results reinforce that IMU can
|
155 |
+
inject embodied motion into visual features, our idea to use
|
156 |
+
head motion to infer pretrained video features for speedy
|
157 |
+
video understanding is distinct.
|
158 |
+
Efficient video recognition. Being crucial for mobile ap-
|
159 |
+
plications, efficient video recognition has received increas-
|
160 |
+
ing attention in recent years. Several studies focus on de-
|
161 |
+
signing lightweight architectures [17, 30, 37, 62, 72] by re-
|
162 |
+
ducing 3D CNN operations across densely sampled frames.
|
163 |
+
Our idea is orthogonal to them as we focus on inputs with
|
164 |
+
sparsely-sampled frames. As we show in experiments, our
|
165 |
+
method is compatible with different video architectures.
|
166 |
+
Another line of research achieves efficiency by adap-
|
167 |
+
tively selecting video content to process.
|
168 |
+
Some reduce
|
169 |
+
temporal redundancy by adaptively selecting which video
|
170 |
+
clip [39], frames [24, 49], and/or feature channel [50] to
|
171 |
+
process and which to skip, while others reduce spatial re-
|
172 |
+
dundancy, efficient recognition by dynamically selecting
|
173 |
+
selecting for each frame a smaller but important region to
|
174 |
+
process [66,67]. Other work dynamically selects tokens in
|
175 |
+
video transformers among both the spatial and temporal di-
|
176 |
+
mensions [65]. Our idea is complementary: rather than dy-
|
177 |
+
namically subsample the available video content, we show
|
178 |
+
how to infer “full” video features for every clip using static
|
179 |
+
image(s) and motion data. Our results outperform state-of-
|
180 |
+
the-art sampling models (cf. Sec. 4). In addition, we fo-
|
181 |
+
cus on egocentric video, where head motion is particularly
|
182 |
+
meaningful for inferring unobserved visual content. To our
|
183 |
+
knowledge, ours is the first technique specifically aimed at
|
184 |
+
accelerating egocentric video processing.
|
185 |
+
Multimodal distillation. Knowledge distillation aims to
|
186 |
+
transfer knowledge learned by an expensive model to a
|
187 |
+
lightweight model [31]. Recent work explores multimodal
|
188 |
+
|
189 |
+
distillation, e.g., transferring from a RGB model to a flow or
|
190 |
+
depth model [23,28], from a 3D model to a 2D model [45],
|
191 |
+
or from a visual model to audio model [2,21]. The Listen-
|
192 |
+
ToLook model [22] incorporates both clip subsampling and
|
193 |
+
video-to-audio distillation for fast activity recognition in
|
194 |
+
third-person video. In contrast, we explore the relationship
|
195 |
+
between the camera-wearer’s head motion and RGB sig-
|
196 |
+
nals for egocentric video. Our experiments show EgoDis-
|
197 |
+
till’s advantage over ListenToLook in terms of the speed-
|
198 |
+
accuracy tradeoff on egocentric video datasets.
|
199 |
+
3. Approach
|
200 |
+
We introduce EgoDistill, which uses sparsely-sampled
|
201 |
+
frames and head motion from IMU to approximate the fea-
|
202 |
+
tures of heavy video models for efficient egocentric video
|
203 |
+
understanding.
|
204 |
+
We first introduce the egocentric action
|
205 |
+
recognition task (Sec. 3.1). Then, we introduce our pipeline
|
206 |
+
(Sec. 3.2), our distillation model and training objective
|
207 |
+
(Sec. 3.3), and our self-supervised IMU feature learning
|
208 |
+
(Sec. 3.4). Figure 2 overviews our approach.
|
209 |
+
3.1. Egocentric action recognition
|
210 |
+
Given a fixed-length video clip V ∈ RT ×H×W ×3 con-
|
211 |
+
sisting of T RGB frames of size H×W and a set of C action
|
212 |
+
classes, the task of action recognition is to output a score for
|
213 |
+
each action class, representing its likelihood. Typically, this
|
214 |
+
is done with a powerful but expensive video model Ω, that
|
215 |
+
directly operates on all the available frames to output the C
|
216 |
+
class logits Ω(V) ∈ RC. Ω is trained with standard classifi-
|
217 |
+
cation loss:
|
218 |
+
LACT =
|
219 |
+
�
|
220 |
+
Vi
|
221 |
+
LCE(ci, σ(Ω(Vi))),
|
222 |
+
(1)
|
223 |
+
where Vi is the i-th video clip in the dataset, ci is the
|
224 |
+
corresponding ground-truth action label, σ is the softmax
|
225 |
+
function, and LCE is cross-entropy loss.
|
226 |
+
Popular video
|
227 |
+
recognition models use clips that are typically �2 seconds
|
228 |
+
long [16, 18, 54]. For longer videos, scores are averaged
|
229 |
+
across all clips it contains to infer the video action label.
|
230 |
+
3.2. Efficient video inference with head motion
|
231 |
+
Processing the video clip V for action recognition is
|
232 |
+
computationally intensive; however, the computation cost
|
233 |
+
can be modulated depending on how frames from the clip
|
234 |
+
are used. On the one hand, clip-based models [16–18, 54]
|
235 |
+
process most (or all) frames in a video clip V to achieve
|
236 |
+
strong recognition performance, but come at a high com-
|
237 |
+
putational cost.
|
238 |
+
On the other hand, frame-level mod-
|
239 |
+
els [24, 49, 51, 67] only process one (or a small number)
|
240 |
+
of frames from V and are more efficient, but suffer a drop
|
241 |
+
in performance as a result. Our goal is to train a frame-
|
242 |
+
based model that can approximate heavy clip-based model
|
243 |
+
performance while maintaining high efficiency.
|
244 |
+
For this, we turn to head motion captured by IMU. Along
|
245 |
+
with RGB frames, each video clip is paired with IMU mea-
|
246 |
+
surements M that record the camera (head) motion during
|
247 |
+
the video. Specifically, the IMU readings are composed of
|
248 |
+
6-dimensional accelerometer and gyroscope measurements
|
249 |
+
in the xyz axes, which encode strong temporal motion in-
|
250 |
+
formation about camera pose changes (both translation and
|
251 |
+
rotation) across frames.
|
252 |
+
For short video clips, a set of sparsely sampled frames I
|
253 |
+
often already captures most appearance information. Com-
|
254 |
+
plementary to this, the IMU readings capture camera mo-
|
255 |
+
tion information (see below for discussion on scene mo-
|
256 |
+
tion). Moreover, IMU is very efficient to process due to its
|
257 |
+
low dimensionality. By processing inputs from these two
|
258 |
+
sources with a lightweight frame-based model, we can infer
|
259 |
+
the semantic and dynamic features of a heavier clip-based
|
260 |
+
video model.
|
261 |
+
Given I and M, we train an efficient lightweight model
|
262 |
+
Φ to approximate the output of video model Ω. Specifically,
|
263 |
+
we train our EgoDistill model Φ that achieves
|
264 |
+
Φ(I, M) ≈ Ω(V).
|
265 |
+
(2)
|
266 |
+
Such a lightweight model will be able to approximate the
|
267 |
+
result of the heavy video model, while being much more ef-
|
268 |
+
ficient. Our approach is agnostic to the specific video model
|
269 |
+
Ω; in experiments, we demonstrate its versatility for Mo-
|
270 |
+
tionFormer [54], MViT [16], SlowFast [18] and X3D [17].
|
271 |
+
In practice, we uniformly sample N frames1 from V to
|
272 |
+
obtain I. We can achieve a trade-off between efficiency and
|
273 |
+
performance by changing the number of frames N. In our
|
274 |
+
experiments we use very low values of N (1 to 4 frames).
|
275 |
+
In the next section, we discuss how we train Φ.
|
276 |
+
3.3. Video feature distillation with IMU
|
277 |
+
We achieve the objective in Equation 2 via knowledge
|
278 |
+
distillation [31], where we transfer knowledge learned by
|
279 |
+
the expensive teacher model Ω to a lightweight student
|
280 |
+
model Φ. Next we present the design of Φ and the train-
|
281 |
+
ing objectives, followed by our self-supervised IMU feature
|
282 |
+
pretraining stage in Sec. 3.4.
|
283 |
+
We design Φ to be a two-stream model. For a video clip
|
284 |
+
and associated IMU signal (I, M), we extract image fea-
|
285 |
+
tures zI = fI(I) and IMU features zM = fM(M) using
|
286 |
+
lightweight feature encoders fI, fM respectively. Then,
|
287 |
+
we fuse zI and zM with a fusion network Π to obtain the
|
288 |
+
fused VisIMU feature zφ = Π(zI, zM). Finally, a fully-
|
289 |
+
connected layer uses the fused feature to predict class logits
|
290 |
+
Φ(I, M) ∈ RC.
|
291 |
+
The fused feature zφ contains semantic information from
|
292 |
+
the image frame coupled with complementary motion infor-
|
293 |
+
1Other frame sampling heuristics (e.g., selecting from the start or center
|
294 |
+
of the video) performed equivalently or worse than uniform sampling.
|
295 |
+
|
296 |
+
Video clip
|
297 |
+
Video model
|
298 |
+
Frame
|
299 |
+
IMU
|
300 |
+
Image Encoder
|
301 |
+
IMU Encoder
|
302 |
+
Fusion Layer
|
303 |
+
FC-Softmax
|
304 |
+
FC-Softmax
|
305 |
+
Frame
|
306 |
+
IMU
|
307 |
+
Image Encoder
|
308 |
+
IMU Encoder
|
309 |
+
Frame
|
310 |
+
Image Encoder
|
311 |
+
IMU Predictor
|
312 |
+
Figure 2. EgoDistill architecture. Left: Self-supervised IMU feature learning. Given start and end frames of a clip, we train the IMU
|
313 |
+
encoder to anticipate visual changes. Right: Video feature distillation with IMU. Given image frame(s) and IMU, along with our pre-
|
314 |
+
trained IMU encoder, our method trains a lightweight model with knowledge distillation to reconstruct the features from a heavier video
|
315 |
+
model. When the input includes more than one image frame, the image encoder aggregates frame features temporally with a GRU.
|
316 |
+
mation from IMU, allowing us to accurately reconstruct the
|
317 |
+
video clip feature. See Figure 2.
|
318 |
+
We train Φ with a combination of three losses, as fol-
|
319 |
+
lows. First, we train Φ to approximate the original video
|
320 |
+
feature zV from the video model Ω:
|
321 |
+
L1 =
|
322 |
+
�
|
323 |
+
(zVi,zφi)
|
324 |
+
∥zVi − zφi∥1 .
|
325 |
+
(3)
|
326 |
+
This cross-modal loss encourages the fused feature zφ to
|
327 |
+
match the video feature, i.e., the combined features from
|
328 |
+
the different modalities should match in the feature space.
|
329 |
+
Training with L1 alone does not fully capture the clas-
|
330 |
+
sification output of Ω. Therefore, we also train Φ with a
|
331 |
+
knowledge distillation loss:
|
332 |
+
LKD =
|
333 |
+
�
|
334 |
+
(Vi,Ii,Mi)
|
335 |
+
DKL(σ(Ω(Vi)/τ), σ(Φ(Ii, Mi)/τ)),
|
336 |
+
(4)
|
337 |
+
where (Vi, Ii, Mi) represents the i-th clip in the dataset,
|
338 |
+
DKL measures KL-divergence between the class logits from
|
339 |
+
the teacher model Ω and student model Φ, and τ is a tem-
|
340 |
+
perature parameter. Intuitively, LKD casts the output of the
|
341 |
+
video teacher model as a soft target for training the student
|
342 |
+
model. In this way, the student model learns to better gen-
|
343 |
+
eralize by mimicking the output distribution of the heavy
|
344 |
+
video model.
|
345 |
+
Finally, to further encourage the features to preserve el-
|
346 |
+
ements useful for activity understanding, we also compute
|
347 |
+
an action classification loss:
|
348 |
+
LGT =
|
349 |
+
�
|
350 |
+
(Ii,Mi)
|
351 |
+
LCE(ci, σ(Φ(Ii, Mi))),
|
352 |
+
(5)
|
353 |
+
where ci is the ground-truth action label, following Equa-
|
354 |
+
tion 1. The final training loss is a combination of these three
|
355 |
+
loss functions:
|
356 |
+
L = αLKD + (1 − α)LGT + βL1,
|
357 |
+
(6)
|
358 |
+
where α controls the balance between knowledge distilla-
|
359 |
+
tion and activity training [31], and β controls the weight for
|
360 |
+
feature space matching.
|
361 |
+
Critically, processing a few image frame(s) and the low-
|
362 |
+
dimensional IMU readings is substantially faster than pro-
|
363 |
+
cessing the entire video. Once trained, our model can ap-
|
364 |
+
proximate the behavior of the source video model for recog-
|
365 |
+
nition tasks, with the key benefit of efficient egocentric
|
366 |
+
video recognition.
|
367 |
+
What kind of motion does our model preserve? Video
|
368 |
+
motion decomposes into scene motion (e.g., how the objects
|
369 |
+
and the camera wearer’s hands are moving on their own),
|
370 |
+
and camera motion (i.e., how the camera wearer is moving
|
371 |
+
their head). By itself, IMU would directly account only for
|
372 |
+
camera motion, not scene motion. However, by learning to
|
373 |
+
map from the RGB frame and IMU to the full video fea-
|
374 |
+
ture, we are able to encode predictable scene motions tied
|
375 |
+
to scene content, e.g., how does hand and object movement
|
376 |
+
in subsequent frames relate to the camera wearer’s head mo-
|
377 |
+
tion (see Figure 7). Moreover, our model is applied to rel-
|
378 |
+
atively short clips (1-2 seconds) in sequence, which means
|
379 |
+
the appearance content is regularly refreshed as we slide
|
380 |
+
down to process the longer video.
|
381 |
+
3.4. Self-supervised IMU feature learning
|
382 |
+
The success of EgoDistill depends on how well the IMU
|
383 |
+
feature encoder fM extracts useful camera motion informa-
|
384 |
+
tion and associates it with the visual appearance change in
|
385 |
+
the video clip. In this way EgoDistill can learn to antic-
|
386 |
+
ipate unseen visual changes in the video with I and M.
|
387 |
+
We design a self-supervised pretraining task to initialize the
|
388 |
+
weights of fM to achieve this.
|
389 |
+
|
390 |
+
Specifically, for each clip V, we obtain its first and last
|
391 |
+
frames (I0, IT ) as well as the IMU M. We first extract
|
392 |
+
visual features z0
|
393 |
+
I, zT
|
394 |
+
I and IMU feature zM with feature
|
395 |
+
extractors fI and fM mentioned above. Then, we train
|
396 |
+
a feature predictor h to predict the IMU feature ˆzM =
|
397 |
+
h(z0
|
398 |
+
I, zT
|
399 |
+
I ). By connecting ˆzM—which is a function of im-
|
400 |
+
age features only—with zM, we encourage fM to extract
|
401 |
+
useful camera motion features specifically associated with
|
402 |
+
the visual appearance changes. Note that those appearance
|
403 |
+
changes may include scene motion. Therefore, we include
|
404 |
+
an L1 loss to train fM, which encourages fM to extract mo-
|
405 |
+
tion features accounting for scene motion in the full video.
|
406 |
+
In sum, we train fM, h, and the fusion network Π using
|
407 |
+
L1 and NCE loss [29]: Lpretrain = LNCE + L1, where
|
408 |
+
LNCE =
|
409 |
+
�
|
410 |
+
i
|
411 |
+
− log
|
412 |
+
sim(ˆzMi, zMi)
|
413 |
+
�
|
414 |
+
j sim(ˆzMi, zMj).
|
415 |
+
(7)
|
416 |
+
We sample negative examples zMj from other instances
|
417 |
+
in the same mini-batch for j
|
418 |
+
̸=
|
419 |
+
i, and sim(q, k)
|
420 |
+
=
|
421 |
+
exp( q·k
|
422 |
+
|q||k|
|
423 |
+
1
|
424 |
+
τ ′ ) with temperature τ ′ = 0.12.
|
425 |
+
To summarize, prior to the main training stage of Equa-
|
426 |
+
tion 6, we pretrain the IMU feature extractor fM and fu-
|
427 |
+
sion network Π. As we will show below, both pretraining
|
428 |
+
losses result in IMU features that are consistent with visual
|
429 |
+
changes and lead to better finetuning performance.
|
430 |
+
4. Experiments
|
431 |
+
We evaluate our approach for resource-efficient action
|
432 |
+
recognition.
|
433 |
+
4.1. Experimental setup
|
434 |
+
Datasets.
|
435 |
+
We experiment on two large-scale egocen-
|
436 |
+
tric action recognition datasets.
|
437 |
+
Ego4D [26] contains
|
438 |
+
3,670 hours of egocentric videos of people performing di-
|
439 |
+
verse tasks (from cooking to farming) across the globe.
|
440 |
+
As action recognition is not part of the original Ego4D
|
441 |
+
benchmark, we construct this task with annotations from
|
442 |
+
the Hands+Objects temporal localization benchmark [26]
|
443 |
+
(see Supp. for details).
|
444 |
+
We include clips with paired
|
445 |
+
IMU and audio3, and consider classes with at least 2 la-
|
446 |
+
beled instances.
|
447 |
+
This results in a 94-class action recog-
|
448 |
+
nition dataset with 8.5k training videos and 3.6k evalua-
|
449 |
+
tion videos. EPIC-Kitchens [11] contains 100 hours of
|
450 |
+
egocentric videos capturing daily activities in kitchen en-
|
451 |
+
vironments. We use annotations from the action recogni-
|
452 |
+
tion benchmark. Similar to Ego4D, we select videos that
|
453 |
+
have paired IMU and audio data, and split the resulting data
|
454 |
+
by camera-wearer. This results in a 62-class action dataset
|
455 |
+
2We keep the ImageNet-pretrained fI model frozen, as finetuning it
|
456 |
+
leads to mode collapse.
|
457 |
+
3We require audio to compare with the audio-based baseline [22].
|
458 |
+
with 29k training videos and 6.2k evaluation videos. For
|
459 |
+
both datasets, we use “verb” labels as the target for action
|
460 |
+
recognition as they are well aligned to activity motions.
|
461 |
+
Evaluation metrics. To measure action recognition per-
|
462 |
+
formance, we report the per-video top-1 accuracy on the
|
463 |
+
validation set. We densely sample clips from each video
|
464 |
+
and average their predictions to compute accuracy.
|
465 |
+
To
|
466 |
+
benchmark efficiency, we measure computational cost with
|
467 |
+
FLOPs (floating-point operations) during inference.
|
468 |
+
Implementation details. In our main experiments, we
|
469 |
+
use MotionFormer [54] as the video teacher model Ω due
|
470 |
+
to its strong performance for egocentric video. For EPIC-
|
471 |
+
Kitchens, we use the authors’ provided checkpoint.
|
472 |
+
For
|
473 |
+
Ego4D, we finetune the above model for 50 epochs with
|
474 |
+
1e−4 learning rate and 64 batch size on the training set.
|
475 |
+
We use 16-frame input with sample rate 4. For the stu-
|
476 |
+
dent model Φ, we use a ResNet-18 as the image backbone
|
477 |
+
fI and a 1D Dilated CNN [6] for the IMU backbone fM.
|
478 |
+
The feature fusion module Π uses a concatenation operation
|
479 |
+
following a two-layer fully-connected layer with hidden di-
|
480 |
+
mension 1024. For each video clip, the input image(s) is
|
481 |
+
resized to 224 × 224, and the IMU is a 422 × 6 matrix
|
482 |
+
(around 2 seconds with 198Hz frequency), representing the
|
483 |
+
accelerometer and gyroscope readings along the xyz axes.
|
484 |
+
For the image input, we uniformly sample N frames from
|
485 |
+
the video clip. If N > 1, we use fI to sequentially gen-
|
486 |
+
erate features for each frame and aggregate them with a
|
487 |
+
GRU module [10]. For both datasets, we first pretrain the
|
488 |
+
model with the self-supervised objective (Section 3.4) for
|
489 |
+
50 epochs with AdamW [46] using batch size 64 and learn-
|
490 |
+
ing rate 1e−4. Then, we finetune all the models with the
|
491 |
+
same setting (Equation 6). We set α = 0.95 and β = 1.0
|
492 |
+
based on validation data. For Ego4D, we set τ = 10.0 and
|
493 |
+
train the model for 150 epochs. For EPIC-Kitchens, we set
|
494 |
+
τ = 1.0 and train for 50 epochs.
|
495 |
+
4.2. Baselines
|
496 |
+
We compare to the following methods:
|
497 |
+
• AdaFuse [50] trains a lightweight policy network to
|
498 |
+
adaptively compute (or skip) feature map channels for
|
499 |
+
each frame during inference. We use the AdaFuseTSN
|
500 |
+
R50
|
501 |
+
model with the provided hyper-parameters.
|
502 |
+
• STTS [65] trains a module to rank spatio-temporal
|
503 |
+
tokens derived from videos in a transformer-based
|
504 |
+
model, and selects only the top-K tokens to speed up
|
505 |
+
inference.
|
506 |
+
• ListenToLook [22]: uses the audio-based feature dis-
|
507 |
+
tillation module from [22] following the same audio
|
508 |
+
processing and model architecture.
|
509 |
+
These methods represent recent advances in efficient
|
510 |
+
video recognition models. AdaFuse represents state-of-the-
|
511 |
+
|
512 |
+
2
|
513 |
+
4
|
514 |
+
6
|
515 |
+
8
|
516 |
+
10
|
517 |
+
12
|
518 |
+
14
|
519 |
+
16
|
520 |
+
Inference cost per video clip (GFLOPs)
|
521 |
+
33
|
522 |
+
34
|
523 |
+
35
|
524 |
+
36
|
525 |
+
37
|
526 |
+
38
|
527 |
+
Ego4D accuracy (%)
|
528 |
+
Ego4D
|
529 |
+
2
|
530 |
+
4
|
531 |
+
6
|
532 |
+
8
|
533 |
+
10
|
534 |
+
12
|
535 |
+
14
|
536 |
+
16
|
537 |
+
Inference cost per video clip (GFLOPs)
|
538 |
+
30
|
539 |
+
35
|
540 |
+
40
|
541 |
+
45
|
542 |
+
50
|
543 |
+
EPIC-Kitchens accuracy (%)
|
544 |
+
EPIC-Kitchens
|
545 |
+
EgoDistill (ours)
|
546 |
+
AdaFuse [50]
|
547 |
+
STTS [65]
|
548 |
+
ListenToLook [22]
|
549 |
+
VisOnly-Distill
|
550 |
+
VisIMU
|
551 |
+
VisOnly
|
552 |
+
Figure 3. Accuracy vs. efficiency for action recognition on Ego4D (left) and EPIC-Kitchens (right). EgoDistill outperforms state-of-
|
553 |
+
the-art efficient video recognition methods that adaptively sample video content, while using 4× to 8× fewer GFLOPs.
|
554 |
+
LKD
|
555 |
+
L1
|
556 |
+
LGT
|
557 |
+
L1-pretrain
|
558 |
+
LNCE-pretrain
|
559 |
+
Ego4D
|
560 |
+
EPIC-Kitchens
|
561 |
+
✓
|
562 |
+
34.15
|
563 |
+
35.04
|
564 |
+
✓
|
565 |
+
✓
|
566 |
+
✓
|
567 |
+
✓
|
568 |
+
35.51
|
569 |
+
39.33
|
570 |
+
✓
|
571 |
+
✓
|
572 |
+
✓
|
573 |
+
✓
|
574 |
+
37.71
|
575 |
+
42.20
|
576 |
+
✓
|
577 |
+
✓
|
578 |
+
✓
|
579 |
+
✓
|
580 |
+
37.46
|
581 |
+
43.17
|
582 |
+
✓
|
583 |
+
✓
|
584 |
+
✓
|
585 |
+
36.99
|
586 |
+
41.21
|
587 |
+
✓
|
588 |
+
✓
|
589 |
+
✓
|
590 |
+
✓
|
591 |
+
37.26
|
592 |
+
42.30
|
593 |
+
✓
|
594 |
+
✓
|
595 |
+
✓
|
596 |
+
✓
|
597 |
+
37.49
|
598 |
+
43.51
|
599 |
+
✓
|
600 |
+
✓
|
601 |
+
✓
|
602 |
+
✓
|
603 |
+
✓
|
604 |
+
37.95
|
605 |
+
44.95
|
606 |
+
Table 1. Ablation study of model components. We compare the
|
607 |
+
accuracy of EgoDistill with different components under N = 1.
|
608 |
+
art approaches that achieve efficiency by reducing tempo-
|
609 |
+
ral redundancy in CNN models. STTS is one of the most
|
610 |
+
recent approaches that efficiently reduces both spatial and
|
611 |
+
temporal redundancy in ViT models, which achieves the
|
612 |
+
state-of-the-art on Kinectics-400 [8]. ListenToLook also re-
|
613 |
+
lies on distillation, but using audio rather than head motion.
|
614 |
+
For each model we generate multiple versions with differ-
|
615 |
+
ent computation budgets to plot accuracy vs. GFLOPs. We
|
616 |
+
train all AdaFuse and STTS models with 4 input frames to
|
617 |
+
align with the maximum frames used by our model.
|
618 |
+
For
|
619 |
+
AdaFuse, we use the only provided hyper-parameter in the
|
620 |
+
paper.4 For STTS, we use three provided variants: T0
|
621 |
+
0.5-
|
622 |
+
S4
|
623 |
+
0.7, T0
|
624 |
+
0.8-S4
|
625 |
+
0.9 and the full model without token selection.
|
626 |
+
For ListenToLook we adopt the same efficiency-accuracy
|
627 |
+
trade-off as our method, i.e., varying the number of input
|
628 |
+
frames.
|
629 |
+
In addition, we test variants of our method:
|
630 |
+
• VisOnly-Distill is our model without the IMU branch
|
631 |
+
and fusion layer but trained with the same loss func-
|
632 |
+
tion. Performance of this model reveals the role of
|
633 |
+
IMU in the process of distillation.
|
634 |
+
• VisIMU is our model trained with only LGT in Equa-
|
635 |
+
4Modifying hyper-parameters to control the accuracy-efficiency trade-
|
636 |
+
off results in unstable training and unreliable performance.
|
637 |
+
Source Model
|
638 |
+
Ego4D
|
639 |
+
EPIC-Kitchens
|
640 |
+
Video
|
641 |
+
EgoDistill
|
642 |
+
VisOnly-D
|
643 |
+
Video
|
644 |
+
EgoDistill
|
645 |
+
VisOnly-D
|
646 |
+
MFormer [54]
|
647 |
+
46.38
|
648 |
+
37.95
|
649 |
+
34.32
|
650 |
+
77.28
|
651 |
+
44.95
|
652 |
+
37.20
|
653 |
+
MViT [16]
|
654 |
+
40.32
|
655 |
+
36.46
|
656 |
+
33.40
|
657 |
+
53.38
|
658 |
+
36.90
|
659 |
+
31.22
|
660 |
+
SlowFast [18]
|
661 |
+
40.52
|
662 |
+
33.29
|
663 |
+
33.04
|
664 |
+
58.34
|
665 |
+
39.42
|
666 |
+
33.47
|
667 |
+
X3D [17]
|
668 |
+
37.56
|
669 |
+
33.57
|
670 |
+
32.90
|
671 |
+
52.28
|
672 |
+
36.34
|
673 |
+
31.71
|
674 |
+
Table 2. Versatility to model architectures. EgoDistill outper-
|
675 |
+
forms the baseline for multiple common architectures, showing
|
676 |
+
the generality of our idea. “Video” refers to the more expensive
|
677 |
+
source model. We show the model accuracy under N = 1.
|
678 |
+
tion 5. It shows the effectiveness of distillation from
|
679 |
+
the video model compared with directly training the
|
680 |
+
features with action labels.
|
681 |
+
• VisOnly is an image-only model trained with LGT,
|
682 |
+
which serves as the baseline.
|
683 |
+
4.3. Main Results
|
684 |
+
Importance of IMU-guided distillation.
|
685 |
+
Figure 3
|
686 |
+
shows the accuracy vs. efficiency curves. Methods towards
|
687 |
+
the top-left of the plot represent those with both high ac-
|
688 |
+
curacy and efficiency.
|
689 |
+
Our method achieves good accu-
|
690 |
+
racy with low computational cost. Specifically, on EPIC-
|
691 |
+
Kitchens, when N = 1, EgoDistill improves over VisOnly-
|
692 |
+
Distill by 8.4% with only a small increase in computa-
|
693 |
+
tion. This result shows the effectiveness of IMU for recon-
|
694 |
+
structing egocentric video features. Compared to VisIMU,
|
695 |
+
EgoDistill improves by 9.9%, showing the effectiveness of
|
696 |
+
knowledge distillation from the video model. Importantly,
|
697 |
+
this reveals that EgoDistill does not simply benefit from the
|
698 |
+
extra IMU context; our idea to approximate video features is
|
699 |
+
necessary for best results. We see similar results on Ego4D.
|
700 |
+
Comparison with the state of the art. Figure 3 also
|
701 |
+
shows that EgoDistill achieves better accuracy with less
|
702 |
+
computation than existing efficient video recognition mod-
|
703 |
+
els AdaFuse [50], STTS [65], and ListenToLook [22].
|
704 |
+
|
705 |
+
pack
|
706 |
+
sew
|
707 |
+
iron
|
708 |
+
spray
|
709 |
+
unscrew
|
710 |
+
paint
|
711 |
+
dip
|
712 |
+
water
|
713 |
+
play
|
714 |
+
file
|
715 |
+
hit
|
716 |
+
throw
|
717 |
+
inspect
|
718 |
+
pull
|
719 |
+
insert
|
720 |
+
clean
|
721 |
+
close
|
722 |
+
detach
|
723 |
+
smooth
|
724 |
+
cut
|
725 |
+
press
|
726 |
+
hang
|
727 |
+
shuffle
|
728 |
+
tighten
|
729 |
+
20
|
730 |
+
0
|
731 |
+
20
|
732 |
+
40
|
733 |
+
60
|
734 |
+
Accuracy improvement(%)
|
735 |
+
Ego4D
|
736 |
+
break
|
737 |
+
mix
|
738 |
+
drink
|
739 |
+
shake
|
740 |
+
dry
|
741 |
+
pour
|
742 |
+
close
|
743 |
+
wash
|
744 |
+
put
|
745 |
+
cut
|
746 |
+
turn-off
|
747 |
+
apply
|
748 |
+
open
|
749 |
+
peel
|
750 |
+
turn-on
|
751 |
+
throw
|
752 |
+
flip
|
753 |
+
scrub
|
754 |
+
insert
|
755 |
+
move
|
756 |
+
take
|
757 |
+
empty
|
758 |
+
fill
|
759 |
+
scoop
|
760 |
+
10
|
761 |
+
0
|
762 |
+
10
|
763 |
+
20
|
764 |
+
30
|
765 |
+
40
|
766 |
+
Accuracy improvement(%)
|
767 |
+
EPIC-Kitchens
|
768 |
+
Figure 4. Per-class accuracy improvement over VisOnly-Distill.
|
769 |
+
Best and worst performing classes are shown.
|
770 |
+
GFLOPs
|
771 |
+
Runtime (ms)
|
772 |
+
Parameters (M)
|
773 |
+
Video [54]
|
774 |
+
369.51
|
775 |
+
10.70
|
776 |
+
108.91
|
777 |
+
AdaFuse [50]
|
778 |
+
15.20
|
779 |
+
2.04
|
780 |
+
38.85
|
781 |
+
STTS [65]
|
782 |
+
7.19
|
783 |
+
1.63
|
784 |
+
36.63
|
785 |
+
ListenToLook [22]
|
786 |
+
3.10
|
787 |
+
0.43
|
788 |
+
25.53
|
789 |
+
EgoDistill
|
790 |
+
1.91
|
791 |
+
0.25
|
792 |
+
20.56
|
793 |
+
Table 3. Efficiency analysis. Our approach is the most efficient.
|
794 |
+
“Video” refers to the original (full-clip) feature. Lower is better.
|
795 |
+
With N = 4 frames, EgoDistill surpasses STTS by 7.4%
|
796 |
+
and AdaFuse by 4.2% on EPIC-Kitchens, with 2× fewer
|
797 |
+
GFLOPs, and surpasses both methods by 2.1% on Ego4D.
|
798 |
+
In addition, EgoDistill surpasses ListenToLook by 7.4%
|
799 |
+
and 2.9% on EPIC-Kitchens and Ego4D respectively, which
|
800 |
+
suggests that head motion is more informative than audio
|
801 |
+
for feature reconstruction in egocentric video.
|
802 |
+
4.4. Analysis
|
803 |
+
Model component ablations. Table 1 ablates different
|
804 |
+
design choices in our model, setting N = 1 for all exper-
|
805 |
+
iments. We observe that training EgoDistill without L1,
|
806 |
+
LKD or LGT deteriorates performance. Specifically, training
|
807 |
+
without LKD leads to the largest performance drop, which
|
808 |
+
indicates that knowledge distillation is an essential compo-
|
809 |
+
nent in our approach. Training without L1 also leads to a
|
810 |
+
significant performance drop, which shows the importance
|
811 |
+
of our idea to align features from the different modalities.
|
812 |
+
Further, our self-supervised pretraining stage is very effec-
|
813 |
+
tive at training the IMU extractor to encode useful motion
|
814 |
+
information that is consistent with visual feature change.
|
815 |
+
Finally, we compare with a model that simply does multi-
|
816 |
+
modal recognition with IMU (top row). The strong contrast
|
817 |
+
here indicates the importance of our idea to use IMU to pre-
|
818 |
+
dict video model features, as opposed to simply adding IMU
|
819 |
+
as an additional input modality.
|
820 |
+
Impact of teacher video model architecture. In our
|
821 |
+
main experiments we use MotionFormer [54] as the teacher
|
822 |
+
video model due to its strong performance on egocentric
|
823 |
+
video tasks.
|
824 |
+
To emphasize the generality of our idea,
|
825 |
+
we show the performance of EgoDistill with other video
|
826 |
+
teacher architectures in Table 2.
|
827 |
+
Similar to the Motion-
|
828 |
+
Former model, we train these models on each of the labeled
|
829 |
+
Figure 5. Best (top) and worst (bottom) reconstructed videos.
|
830 |
+
datasets, and then train our model using the resulting video
|
831 |
+
models as the teacher. As expected, better video teacher
|
832 |
+
models lead to better student model performance. More im-
|
833 |
+
portantly, we observe consistent improvement by EgoDis-
|
834 |
+
till over the VisOnly-Distill baseline on both datasets and
|
835 |
+
with different video teacher models, highlighting our idea’s
|
836 |
+
generality and versatility.
|
837 |
+
Where does our model work best/worst? In Figure 3
|
838 |
+
we saw that using IMU leads to an overall performance
|
839 |
+
improvement on action recognition, indicating better video
|
840 |
+
feature prediction capability. Next, we explore what kinds
|
841 |
+
of clips are better reconstructed using EgoDistill. Figure 4
|
842 |
+
shows the improvement of EgoDistill over the VisOnly-
|
843 |
+
Distill model on Ego4D and EPIC-Kitchens split by action
|
844 |
+
class. We observe that IMU is more useful for actions with
|
845 |
+
predictable head motion (e.g., break, cut, close), and is less
|
846 |
+
helpful for actions where head motion may be small or un-
|
847 |
+
related (e.g., empty, fill, press).
|
848 |
+
Figure 5 shows clip examples whose video features are
|
849 |
+
best and worst reconstructed. We observe that the best re-
|
850 |
+
constructed clips (top) contain moderate head motion that
|
851 |
+
is predictive of scene motion and action semantics. For ex-
|
852 |
+
ample, the camera wearer’s head moves slightly backwards
|
853 |
+
while opening the cabinet. On the other hand, more poorly
|
854 |
+
reconstructed clips tend to contain little head motion (third
|
855 |
+
row)—in which case IMU is redundant to the RGB frame—
|
856 |
+
or drastic head motion that is weakly correlated with the
|
857 |
+
camera wearer’s activity and introduces blur to the frame
|
858 |
+
(last row).
|
859 |
+
Efficiency analysis. To compare the efficiency of dif-
|
860 |
+
ferent models, aside from GFLOPs, we also compare their
|
861 |
+
inference run-time and number of parameters. For run-time,
|
862 |
+
we record the time spent to infer a single video clip’s label
|
863 |
+
with a single A40 GPU, and take the average time over the
|
864 |
+
full validation datasets of Ego4D and EPIC-Kitchens with
|
865 |
+
batch-size of 32. Table 3 shows the results. EgoDistill runs
|
866 |
+
much faster than the other methods. Notably, it reduces the
|
867 |
+
GFLOPs of MotionFormer by nearly 200×. Furthermore,
|
868 |
+
|
869 |
+
EgoDistill
|
870 |
+
EgoDistill
|
871 |
+
VisOnly-D
|
872 |
+
EgoDistill
|
873 |
+
EgoDistill
|
874 |
+
EgoDistill
|
875 |
+
VisOnly-D
|
876 |
+
EgoDistill
|
877 |
+
Figure 6. Retrieving video clips with EgoDistill. Given a query frame (bottom left) and a paired IMU segment (red camera frustums) ,
|
878 |
+
we retrieve the nearest clip in the video dataset according to EgoDistill and visualize its (unobserved) frames (strip to the right). Compared
|
879 |
+
to VisOnly-Distill, which outputs a single feature for a given input frame (bottom row), EgoDistill outputs a distinct feature by condi-
|
880 |
+
tioning on IMU, showing its ability to preserve both semantic and motion during reconstruction. For instance, in the top-right example,
|
881 |
+
EgoDistill retains the cabinet interaction semantics in the frame as well as the upward camera-motion in the IMU. Zoom in to view best.
|
882 |
+
close: 0.88
|
883 |
+
open: 0.01
|
884 |
+
close: 0.18
|
885 |
+
open: 0.34
|
886 |
+
GT: close
|
887 |
+
EgoDistill
|
888 |
+
VisOnly-D
|
889 |
+
put: 0.40
|
890 |
+
take: 0.10
|
891 |
+
put: 0.14
|
892 |
+
take: 0.44
|
893 |
+
GT: put
|
894 |
+
EgoDistill
|
895 |
+
VisOnly-D
|
896 |
+
Figure 7. Anticipating scene motion with EgoDistill. For each clip, we show the head motion and video frames. Note, only the center
|
897 |
+
frame (red border) is observed by the model. Action classification scores are shown on the right. EgoDistill can successfully anticipate
|
898 |
+
scene motion and disambiguate the action semantics in the input frame. For example, in the top center frame, the image alone cannot reveal
|
899 |
+
if the door is being opened or closed, whereas our feature, learned with head motion, recovers correlations with the scene motion (i.e., hand
|
900 |
+
motion and door motion) to disambiguate “close” from “open”. A similar effect for “put” vs. “take” is seen in the second example.
|
901 |
+
it runs 6.5× faster than STTS [65] while achieving 4.4%
|
902 |
+
higher accuracy on EPIC-Kitchens.
|
903 |
+
4.5. Qualitative Results
|
904 |
+
What do EgoDistill features capture? To explore this,
|
905 |
+
we pair a single input frame with different IMU clips as in-
|
906 |
+
puts to EgoDistill, then retrieve the nearest video clip for
|
907 |
+
each resulting anticipated video feature. Figure 6 illustrates
|
908 |
+
this. We see that EgoDistill outputs video features that all
|
909 |
+
involve interaction with the cabinet (right panel), and is able
|
910 |
+
to use different IMU inputs to retrieve different video clips
|
911 |
+
that show consistent camera motion. In contrast, VisOnly-
|
912 |
+
Distill only retains the semantic context to retrieve a single
|
913 |
+
clip. These results indicate that EgoDistill is able to approx-
|
914 |
+
imate video features that capture both semantic and motion
|
915 |
+
information. See Supp. for more (and animated) results.
|
916 |
+
Is there evidence EgoDistill captures scene motion?
|
917 |
+
Figure 7 shows how our features learned with head motion
|
918 |
+
can nonetheless expose certain scene motion cues. EgoDis-
|
919 |
+
till improves the accuracy over VisOnly-Distill on ambigu-
|
920 |
+
ous categories (like close and put) by a large margin (20.3%
|
921 |
+
and 10.4% on EPIC-Kitchens, 8.5% and 3.9% on Ego4D).
|
922 |
+
See caption for details.
|
923 |
+
5. Conclusion
|
924 |
+
We present EgoDistill, the first model to explore ego-
|
925 |
+
centric video feature approximation for fast recognition.
|
926 |
+
Experiments on action recognition on Ego4D and EPIC-
|
927 |
+
Kitchens demonstrate that our model achieves a good bal-
|
928 |
+
ance between accuracy and efficiency, outperforming state-
|
929 |
+
of-the-art efficient video understanding methods. Our ap-
|
930 |
+
proach has great potential to accelerate video understand-
|
931 |
+
ing for egocentric videos using a data stream that is already
|
932 |
+
ubiquitous in egocentric cameras. In the future, we plan to
|
933 |
+
investigate how to use head motion for long-term human
|
934 |
+
activity understanding with room context and visual corre-
|
935 |
+
spondence learning for multi-view videos.
|
936 |
+
|
937 |
+
References
|
938 |
+
[1] Relja Arandjelovi´c and Andrew Zisserman. Look, listen and
|
939 |
+
learn. 2017 IEEE International Conference on Computer Vi-
|
940 |
+
sion (ICCV), pages 609–617, 2017. 2
|
941 |
+
[2] Yusuf Aytar, Carl Vondrick, and Antonio Torralba. Sound-
|
942 |
+
net: Learning sound representations from unlabeled video.
|
943 |
+
In Proceedings of the 30th International Conference on
|
944 |
+
Neural Information Processing Systems, NIPS’16, page
|
945 |
+
892–900, Red Hook, NY, USA, 2016. Curran Associates Inc.
|
946 |
+
3
|
947 |
+
[3] Anna Borowska-Terka and Pawel Strumillo. Person inde-
|
948 |
+
pendent recognition of head gestures from parametrised and
|
949 |
+
raw signals recorded from inertial measurement unit. Ap-
|
950 |
+
plied Sciences, 10(12), 2020. 2
|
951 |
+
[4] John E. Bortz. A new mathematical formulation for strap-
|
952 |
+
down inertial navigation. IEEE Transactions on Aerospace
|
953 |
+
and Electronic Systems, AES-7:61–66, 1971. 2
|
954 |
+
[5] Agata Brajdic and Robert K. Harle. Walk detection and step
|
955 |
+
counting on unconstrained smartphones. Proceedings of the
|
956 |
+
2013 ACM international joint conference on Pervasive and
|
957 |
+
ubiquitous computing, 2013. 2
|
958 |
+
[6] M. Brossard, S. Bonnabel, and A. Barrau. Denoising imu
|
959 |
+
gyroscopes with deep learning for open-loop attitude esti-
|
960 |
+
mation. IEEE Robotics and Automation Letters, 5(3):4796–
|
961 |
+
4803, 2020. 5, 12
|
962 |
+
[7] Xiya Cao, Caifa Zhou, Dandan Zeng, and Yongliang Wang.
|
963 |
+
Rio: Rotation-equivariance supervised learning of robust in-
|
964 |
+
ertial odometry. In Proceedings of the IEEE/CVF Confer-
|
965 |
+
ence on Computer Vision and Pattern Recognition (CVPR),
|
966 |
+
pages 6614–6623, June 2022. 1, 2
|
967 |
+
[8] Joao Carreira and Andrew Zisserman.
|
968 |
+
Quo vadis, action
|
969 |
+
recognition? a new model and the kinetics dataset. In pro-
|
970 |
+
ceedings of the IEEE Conference on Computer Vision and
|
971 |
+
Pattern Recognition, pages 6299–6308, 2017. 6
|
972 |
+
[9] Chen Chen, Roozbeh Jafari, and Nasser Kehtarnavaz. Utd-
|
973 |
+
mhad: A multimodal dataset for human action recognition
|
974 |
+
utilizing a depth camera and a wearable inertial sensor. In
|
975 |
+
2015 IEEE International Conference on Image Processing
|
976 |
+
(ICIP), pages 168–172, 2015. 2
|
977 |
+
[10] Kyunghyun Cho, Bart van Merrienboer, C¸ aglar G¨ulc¸ehre,
|
978 |
+
Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and
|
979 |
+
Yoshua Bengio.
|
980 |
+
Learning phrase representations using
|
981 |
+
rnn encoder–decoder for statistical machine translation. In
|
982 |
+
EMNLP, 2014. 5
|
983 |
+
[11] Dima Damen, Hazel Doughty, Giovanni Maria Farinella,
|
984 |
+
, Antonino Furnari, Jian Ma, Evangelos Kazakos, Davide
|
985 |
+
Moltisanti, Jonathan Munro, Toby Perrett, Will Price, and
|
986 |
+
Michael Wray.
|
987 |
+
Rescaling egocentric vision: Collection,
|
988 |
+
pipeline and challenges for epic-kitchens-100. International
|
989 |
+
Journal of Computer Vision (IJCV), 130:33–55, 2022. 1, 2,
|
990 |
+
5, 12
|
991 |
+
[12] Samyak Datta, Sameer Dharur, Vincent Cartillier, Ruta
|
992 |
+
Desai, Mukul Khanna, Dhruv Batra, and Devi Parikh.
|
993 |
+
Episodic memory question answering.
|
994 |
+
In Proceedings of
|
995 |
+
the IEEE/CVF Conference on Computer Vision and Pattern
|
996 |
+
Recognition (CVPR), pages 19119–19128, June 2022. 1
|
997 |
+
[13] Alexander Diete, Timo Sztyler, and Heiner Stuckenschmidt.
|
998 |
+
Vision and acceleration modalities: Partners for recogniz-
|
999 |
+
ing complex activities. In 2019 IEEE International Confer-
|
1000 |
+
ence on Pervasive Computing and Communications Work-
|
1001 |
+
shops (PerCom Workshops), pages 101–106, 2019. 1, 2
|
1002 |
+
[14] Kiana Ehsani, Hessam Bagherinezhad, Joseph Redmon,
|
1003 |
+
Roozbeh Mottaghi, and Ali Farhadi. Who let the dogs out?
|
1004 |
+
modeling dog behavior from visual data. In CVPR, 2018. 2
|
1005 |
+
[15] Kiana Ehsani, Daniel Gordon, Thomas Nguyen, Roozbeh
|
1006 |
+
Mottaghi, and Ali Farhadi.
|
1007 |
+
Learning visual representa-
|
1008 |
+
tion from human interactions. International Conference on
|
1009 |
+
Learning Representations, 2021. 2
|
1010 |
+
[16] Haoqi Fan, Bo Xiong, Karttikeya Mangalam, Yanghao Li,
|
1011 |
+
Zhicheng Yan, Jitendra Malik, and Christoph Feichtenhofer.
|
1012 |
+
Multiscale vision transformers. In ICCV, 2021. 1, 2, 3, 6
|
1013 |
+
[17] Christoph Feichtenhofer. X3d: Expanding architectures for
|
1014 |
+
efficient video recognition. 2020 IEEE/CVF Conference on
|
1015 |
+
Computer Vision and Pattern Recognition (CVPR), pages
|
1016 |
+
200–210, 2020. 2, 3, 6
|
1017 |
+
[18] Christoph Feichtenhofer, Haoqi Fan, Jitendra Malik, and
|
1018 |
+
Kaiming He. Slowfast networks for video recognition. In
|
1019 |
+
2019 IEEE/CVF International Conference on Computer Vi-
|
1020 |
+
sion (ICCV), pages 6201–6210, 2019. 1, 2, 3, 6
|
1021 |
+
[19] Christoph Feichtenhofer, Axel Pinz, and Andrew Zisserman.
|
1022 |
+
Convolutional two-stream network fusion for video action
|
1023 |
+
recognition. 2016 IEEE Conference on Computer Vision and
|
1024 |
+
Pattern Recognition (CVPR), pages 1933–1941, 2016. 2
|
1025 |
+
[20] Christian Forster, Luca Carlone, Frank Dellaert, and Da-
|
1026 |
+
vide Scaramuzza. On-manifold preintegration for real-time
|
1027 |
+
visual–inertial odometry. IEEE Transactions on Robotics,
|
1028 |
+
33(1):1–21, 2017. 1, 2
|
1029 |
+
[21] C. Gan, H. Zhao, P. Chen, D. Cox, and A. Torralba. Self-
|
1030 |
+
supervised moving vehicle tracking with stereo sound. In
|
1031 |
+
2019 IEEE/CVF International Conference on Computer Vi-
|
1032 |
+
sion (ICCV), pages 7052–7061, Los Alamitos, CA, USA,
|
1033 |
+
nov 2019. IEEE Computer Society. 3
|
1034 |
+
[22] Ruohan Gao, Tae-Hyun Oh, Kristen Grauman, and Lorenzo
|
1035 |
+
Torresani. Listen to look: Action recognition by previewing
|
1036 |
+
audio. In Proceedings of the IEEE/CVF Conference on Com-
|
1037 |
+
puter Vision and Pattern Recognition, pages 10457–10467,
|
1038 |
+
2020. 2, 3, 5, 6, 7, 12
|
1039 |
+
[23] Nuno C. Garcia, Pietro Morerio, and Vittorio Murino.
|
1040 |
+
Modality distillation with multiple stream networks for ac-
|
1041 |
+
tion recognition. In The European Conference on Computer
|
1042 |
+
Vision (ECCV), September 2018. 3
|
1043 |
+
[24] Amir Ghodrati, Babak Ehteshami Bejnordi, and Amirhos-
|
1044 |
+
sein Habibian. Frameexit: Conditional early exiting for effi-
|
1045 |
+
cient video recognition. In Proceedings of the IEEE Confer-
|
1046 |
+
ence on Computer Vision and Pattern Recognition, 2021. 2,
|
1047 |
+
3
|
1048 |
+
[25] Rohit Girdhar, Mannat Singh, Nikhila Ravi, Laurens van der
|
1049 |
+
Maaten, Armand Joulin, and Ishan Misra. Omnivore: A Sin-
|
1050 |
+
gle Model for Many Visual Modalities. In CVPR, 2022. 1
|
1051 |
+
[26] Kristen
|
1052 |
+
Grauman,
|
1053 |
+
Andrew
|
1054 |
+
Westbury,
|
1055 |
+
Eugene
|
1056 |
+
Byrne,
|
1057 |
+
Zachary Chavis, Antonino Furnari, Rohit Girdhar, Jack-
|
1058 |
+
son Hamburger, Hao Jiang, Miao Liu, Xingyu Liu, Miguel
|
1059 |
+
Martin, Tushar Nagarajan, Ilija Radosavovic, Santhosh Ku-
|
1060 |
+
mar Ramakrishnan, Fiona Ryan, Jayant Sharma, Michael
|
1061 |
+
|
1062 |
+
Wray, Mengmeng Xu, Eric Zhongcong Xu, Chen Zhao,
|
1063 |
+
Siddhant Bansal, Dhruv Batra, Vincent Cartillier, Sean
|
1064 |
+
Crane, Tien Do, Morrie Doulaty, Akshay Erapalli, Christoph
|
1065 |
+
Feichtenhofer, Adriano Fragomeni, Qichen Fu, Christian
|
1066 |
+
Fuegen, Abrham Gebreselasie, Cristina Gonzalez, James
|
1067 |
+
Hillis, Xuhua Huang, Yifei Huang, Wenqi Jia, Weslie Khoo,
|
1068 |
+
Jachym Kolar, Satwik Kottur, Anurag Kumar, Federico Lan-
|
1069 |
+
dini, Chao Li, Yanghao Li, Zhenqiang Li, Karttikeya Man-
|
1070 |
+
galam, Raghava Modhugu, Jonathan Munro, Tullie Mur-
|
1071 |
+
rell, Takumi Nishiyasu, Will Price, Paola Ruiz Puentes,
|
1072 |
+
Merey Ramazanova, Leda Sari, Kiran Somasundaram, Au-
|
1073 |
+
drey Southerland, Yusuke Sugano, Ruijie Tao, Minh Vo,
|
1074 |
+
Yuchen Wang, Xindi Wu, Takuma Yagi, Yunyi Zhu, Pablo
|
1075 |
+
Arbelaez, David Crandall, Dima Damen, Giovanni Maria
|
1076 |
+
Farinella, Bernard Ghanem, Vamsi Krishna Ithapu, C. V.
|
1077 |
+
Jawahar, Hanbyul Joo, Kris Kitani, Haizhou Li, Richard
|
1078 |
+
Newcombe, Aude Oliva, Hyun Soo Park, James M. Rehg,
|
1079 |
+
Yoichi Sato, Jianbo Shi, Mike Zheng Shou, Antonio Tor-
|
1080 |
+
ralba, Lorenzo Torresani, Mingfei Yan, and Jitendra Ma-
|
1081 |
+
lik. Ego4d: Around the World in 3,000 Hours of Egocentric
|
1082 |
+
Video. In IEEE/CVF Computer Vision and Pattern Recogni-
|
1083 |
+
tion (CVPR), 2022. 1, 2, 5, 12
|
1084 |
+
[27] Grigori Guitchounts, Javier Mas´ıs, Steffen B.E. Wolff, and
|
1085 |
+
David Cox. Encoding of 3d head orienting movements in the
|
1086 |
+
primary visual cortex. Neuron, 108(3):512–525.e4, 2020. 1
|
1087 |
+
[28] Saurabh Gupta, Judy Hoffman, and Jitendra Malik. Cross
|
1088 |
+
modal distillation for supervision transfer.
|
1089 |
+
In 2016 IEEE
|
1090 |
+
Conference on Computer Vision and Pattern Recognition
|
1091 |
+
(CVPR), pages 2827–2836, 2016. 3
|
1092 |
+
[29] Michael Gutmann and Aapo Hyv¨arinen. Noise-contrastive
|
1093 |
+
estimation: A new estimation principle for unnormalized sta-
|
1094 |
+
tistical models. In Yee Whye Teh and Mike Titterington, edi-
|
1095 |
+
tors, Proceedings of the Thirteenth International Conference
|
1096 |
+
on Artificial Intelligence and Statistics, volume 9 of Proceed-
|
1097 |
+
ings of Machine Learning Research, pages 297–304, Chia
|
1098 |
+
Laguna Resort, Sardinia, Italy, 13–15 May 2010. PMLR. 5
|
1099 |
+
[30] Sachini Herath, Hang Yan, and Yasutaka Furukawa. Ronin:
|
1100 |
+
Robust neural inertial navigation in the wild: Benchmark,
|
1101 |
+
evaluations, & new methods. In 2020 IEEE International
|
1102 |
+
Conference on Robotics and Automation (ICRA), pages
|
1103 |
+
3146–3152, 2020. 2
|
1104 |
+
[31] Geoffrey E. Hinton, Oriol Vinyals, and Jeffrey Dean. Distill-
|
1105 |
+
ing the knowledge in a neural network. NIPS Deep Learning
|
1106 |
+
Workshop, abs/1503.02531, 2014. 2, 3, 4
|
1107 |
+
[32] Yu Huang, Chenzhuang Du, Zihui Xue, Xuanyao Chen,
|
1108 |
+
Hang Zhao, and Longbo Huang. What makes multi-modal
|
1109 |
+
learning better than single (provably). In A. Beygelzimer,
|
1110 |
+
Y. Dauphin, P. Liang, and J. Wortman Vaughan, editors, Ad-
|
1111 |
+
vances in Neural Information Processing Systems, 2021. 2
|
1112 |
+
[33] Andrey Ignatov. Real-time human activity recognition from
|
1113 |
+
accelerometer data using convolutional neural networks. Ap-
|
1114 |
+
plied Soft Computing, 62:915–922, 2018. 2
|
1115 |
+
[34] D. Jayaraman and K. Grauman. Learning image representa-
|
1116 |
+
tions tied to egomotion. In ICCV, 2015. 2
|
1117 |
+
[35] A.R. Jimenez, F. Seco, C. Prieto, and J. Guevara. A compar-
|
1118 |
+
ison of pedestrian dead-reckoning algorithms using a low-
|
1119 |
+
cost mems imu. In 2009 IEEE International Symposium on
|
1120 |
+
Intelligent Signal Processing, pages 37–42, 2009. 2
|
1121 |
+
[36] Evangelos Kazakos, Arsha Nagrani, Andrew Zisserman, and
|
1122 |
+
Dima Damen. Epic-fusion: Audio-visual temporal binding
|
1123 |
+
for egocentric action recognition.
|
1124 |
+
In IEEE/CVF Interna-
|
1125 |
+
tional Conference on Computer Vision (ICCV), 2019. 2
|
1126 |
+
[37] Dan Kondratyuk, Liangzhe Yuan, Yandong Li, Li Zhang,
|
1127 |
+
Mingxing
|
1128 |
+
Tan,
|
1129 |
+
Matthew
|
1130 |
+
Brown,
|
1131 |
+
and
|
1132 |
+
Boqing
|
1133 |
+
Gong.
|
1134 |
+
Movinets: Mobile video networks for efficient video recog-
|
1135 |
+
nition. In Proceedings of the IEEE/CVF Conference on Com-
|
1136 |
+
puter Vision and Pattern Recognition, pages 16020–16030,
|
1137 |
+
2021. 2
|
1138 |
+
[38] Bruno Korbar, Du Tran, and Lorenzo Torresani.
|
1139 |
+
Co-
|
1140 |
+
operative learning of audio and video models from self-
|
1141 |
+
supervised synchronization. In Proceedings of the 32nd In-
|
1142 |
+
ternational Conference on Neural Information Processing
|
1143 |
+
Systems, NIPS’18, page 7774–7785, Red Hook, NY, USA,
|
1144 |
+
2018. Curran Associates Inc. 2
|
1145 |
+
[39] Bruno Korbar, Du Tran, and Lorenzo Torresani. Scsampler:
|
1146 |
+
Sampling salient clips from video for efficient action recog-
|
1147 |
+
nition. 2019 IEEE/CVF International Conference on Com-
|
1148 |
+
puter Vision (ICCV), pages 6231–6241, 2019. 2
|
1149 |
+
[40] Masakatsu Kourogi and Takeshi Kurata. A method of pedes-
|
1150 |
+
trian dead reckoning for smartphones using frequency do-
|
1151 |
+
main analysis on patterns of acceleration and angular veloc-
|
1152 |
+
ity. pages 164–168, 05 2014. 2
|
1153 |
+
[41] Jennifer R. Kwapisz, Gary M. Weiss, and Samuel A.
|
1154 |
+
Moore. Activity recognition using cell phone accelerome-
|
1155 |
+
ters. SIGKDD Explor. Newsl., 12(2):74–82, mar 2011. 2
|
1156 |
+
[42] Heike Leutheuser, Dominik Schuldhaus, and Bjoern M. Es-
|
1157 |
+
kofier.
|
1158 |
+
Hierarchical, multi-sensor based classification of
|
1159 |
+
daily life activities: Comparison with state-of-the-art algo-
|
1160 |
+
rithms using a benchmark dataset. PLOS ONE, 8(10):1–11,
|
1161 |
+
10 2013. 2
|
1162 |
+
[43] Yiming Li, Ziang Cao, Andrew Liang, Benjamin Liang, Lu-
|
1163 |
+
oyao Chen, Hang Zhao, and Chen Feng. Egocentric predic-
|
1164 |
+
tion of action target in 3d. In Proceedings of the IEEE/CVF
|
1165 |
+
Conference on Computer Vision and Pattern Recognition
|
1166 |
+
(CVPR), June 2022. 1
|
1167 |
+
[44] Shaowei Liu, Subarna Tripathi, Somdeb Majumdar, and Xi-
|
1168 |
+
aolong Wang. Joint hand motion and interaction hotspots
|
1169 |
+
prediction from egocentric videos.
|
1170 |
+
In Proceedings of the
|
1171 |
+
IEEE/CVF Conference on Computer Vision and Pattern
|
1172 |
+
Recognition (CVPR), pages 3282–3292, June 2022. 1
|
1173 |
+
[45] Zhengzhe Liu, Xiaojuan Qi, and Chi-Wing Fu. 3d-to-2d dis-
|
1174 |
+
tillation for indoor scene parsing. 2021 IEEE/CVF Confer-
|
1175 |
+
ence on Computer Vision and Pattern Recognition (CVPR),
|
1176 |
+
pages 4462–4472, 2021. 3
|
1177 |
+
[46] Ilya Loshchilov and Frank Hutter. Fixing weight decay reg-
|
1178 |
+
ularization in adam, 2018. 5
|
1179 |
+
[47] Niall Lyons, Avik Santra, and Ashutosh Pandey. Improved
|
1180 |
+
deep representation learning for human activity recognition
|
1181 |
+
using imu sensors. In 2021 20th IEEE International Confer-
|
1182 |
+
ence on Machine Learning and Applications (ICMLA), pages
|
1183 |
+
326–332, 2021. 2
|
1184 |
+
[48] Sharmin Majumder and Nasser Kehtarnavaz. Vision and in-
|
1185 |
+
ertial sensing fusion for human action recognition: A review.
|
1186 |
+
IEEE Sensors Journal, 21(3):2454–2467, 2021. 2
|
1187 |
+
[49] Yue Meng, Chung-Ching Lin, Rameswar Panda, Prasanna
|
1188 |
+
Sattigeri, Leonid Karlinsky, Aude Oliva, Kate Saenko, and
|
1189 |
+
|
1190 |
+
Rogerio Feris. Ar-net: Adaptive frame resolution for effi-
|
1191 |
+
cient action recognition. arXiv preprint arXiv:2007.15796,
|
1192 |
+
2020. 2, 3
|
1193 |
+
[50] Yue Meng, Rameswar Panda, Chung-Ching Lin, Prasanna
|
1194 |
+
Sattigeri, Leonid Karlinsky, Kate Saenko, Aude Oliva, and
|
1195 |
+
Rogerio Feris. Adafuse: Adaptive temporal fusion network
|
1196 |
+
for efficient action recognition. In International Conference
|
1197 |
+
on Learning Representations, 2021. 2, 5, 6, 7
|
1198 |
+
[51] Rameswar Panda, Chun-Fu Chen, Quanfu Fan, Ximeng Sun,
|
1199 |
+
Kate Saenko, Aude Oliva, and Rogerio Feris.
|
1200 |
+
AdaMML:
|
1201 |
+
Adaptive Multi-Modal Learning for Efficient Video Recog-
|
1202 |
+
nition.
|
1203 |
+
In International Conference on Computer Vision
|
1204 |
+
(ICCV), 2021. 2, 3
|
1205 |
+
[52] Philip R.L. Parker, Morgan A. Brown, Matthew C. Smear,
|
1206 |
+
and Cristopher M. Niell. Movement-related signals in sen-
|
1207 |
+
sory areas: Roles in natural behavior.
|
1208 |
+
Trends in Neuro-
|
1209 |
+
sciences, 43(8):581–595, 2020. 1
|
1210 |
+
[53] Philip R. L. Parker, Elliott T. T. Abe, Emmalyn S. P. Leonard,
|
1211 |
+
Dylan M. Martins, and Cristopher M. Niell. Joint coding of
|
1212 |
+
visual input and eye/head position in v1 of freely moving
|
1213 |
+
mice. bioRxiv, 2022. 1
|
1214 |
+
[54] Mandela Patrick, Dylan Campbell, Yuki M. Asano, Is-
|
1215 |
+
han Misra Florian Metze, Christoph Feichtenhofer, Andrea
|
1216 |
+
Vedaldi, and Jo˜ao F. Henriques. Keeping your eye on the
|
1217 |
+
ball: Trajectory attention in video transformers. In Advances
|
1218 |
+
in Neural Information Processing Systems (NeurIPS), 2021.
|
1219 |
+
1, 2, 3, 5, 6, 7
|
1220 |
+
[55] Chiara Plizzari, Mirco Planamente, Gabriele Goletto, Marco
|
1221 |
+
Cannici, Emanuele Gusso, Matteo Matteucci, and Barbara
|
1222 |
+
Caputo.
|
1223 |
+
E2(go)motion: Motion augmented event stream
|
1224 |
+
for egocentric action recognition.
|
1225 |
+
In Proceedings of the
|
1226 |
+
IEEE/CVF Conference on Computer Vision and Pattern
|
1227 |
+
Recognition (CVPR), pages 19935–19947, June 2022. 1
|
1228 |
+
[56] Gunnar A Sigurdsson, Abhinav Gupta, Cordelia Schmid, Ali
|
1229 |
+
Farhadi, and Karteek Alahari. Charades-ego: A large-scale
|
1230 |
+
dataset of paired third and first person videos. arXiv preprint
|
1231 |
+
arXiv:1804.09626, 2018. 1
|
1232 |
+
[57] Karen Simonyan and Andrew Zisserman. Two-stream con-
|
1233 |
+
volutional networks for action recognition in videos. In Z.
|
1234 |
+
Ghahramani, M. Welling, C. Cortes, N. Lawrence, and K.Q.
|
1235 |
+
Weinberger, editors, Advances in Neural Information Pro-
|
1236 |
+
cessing Systems, volume 27. Curran Associates, Inc., 2014.
|
1237 |
+
2
|
1238 |
+
[58] Shuyang Sun, Zhanghui Kuang, Lu Sheng, Wanli Ouyang,
|
1239 |
+
and Wei Zhang.
|
1240 |
+
Optical flow guided feature: A fast and
|
1241 |
+
robust motion representation for video action recognition.
|
1242 |
+
In The IEEE Conference on Computer Vision and Pattern
|
1243 |
+
Recognition (CVPR), June 2018. 2
|
1244 |
+
[59] Yin Tang, Lei Zhang, Fuhong Min, and Jun He. Multi-scale
|
1245 |
+
deep feature learning for human activity recognition using
|
1246 |
+
wearable sensors. IEEE Transactions on Industrial Electron-
|
1247 |
+
ics, pages 1–1, 2022. 2
|
1248 |
+
[60] Wenjin Tao, Haodong Chen, Md. Moniruzzaman, Ming C.
|
1249 |
+
Leu, Zhaozheng Yi, and Ruwen Qin. Attention-based sen-
|
1250 |
+
sor fusion for human activity recognition using imu signals.
|
1251 |
+
ArXiv, abs/2112.11224, 2021. 2
|
1252 |
+
[61] Catherine Tong, Jinchen Ge, and Nicholas D Lane. Zero-shot
|
1253 |
+
learning for imu-based activity recognition using video em-
|
1254 |
+
beddings. Proceedings of the ACM on Interactive, Mobile,
|
1255 |
+
Wearable and Ubiquitous Technologies, 5(4):1–23, 2021. 2
|
1256 |
+
[62] Du Tran, Heng Wang, Lorenzo Torresani, Jamie Ray, Yann
|
1257 |
+
LeCun, and Manohar Paluri. A closer look at spatiotemporal
|
1258 |
+
convolutions for action recognition. 2018 IEEE/CVF Con-
|
1259 |
+
ference on Computer Vision and Pattern Recognition, pages
|
1260 |
+
6450–6459, 2018. 2
|
1261 |
+
[63] Satoshi Tsutsui, Ruta Desai, and Karl Ridgeway. How you
|
1262 |
+
move your head tells what you do: Self-supervised video
|
1263 |
+
representation learning with egocentric cameras and imu
|
1264 |
+
sensors. ICCV Workshop on Egocentric Perception, Inter-
|
1265 |
+
action and Computing (EPIC), 2021. 2
|
1266 |
+
[64] Jindong Wang, Yiqiang Chen, Shuji Hao, Xiaohui Peng, and
|
1267 |
+
Lisha Hu. Deep learning for sensor-based activity recogni-
|
1268 |
+
tion: A survey. Pattern Recognit. Lett., 119:3–11, 2019. 2
|
1269 |
+
[65] Junke Wang, Xitong Yang, Hengduo Li, Liu Li, Zuxuan
|
1270 |
+
Wu, and Yu-Gang Jiang. Efficient video transformers with
|
1271 |
+
spatial-temporal token selection. In ECCV, 2022. 2, 5, 6, 7,
|
1272 |
+
8
|
1273 |
+
[66] Yulin Wang, Zhaoxi Chen, Haojun Jiang, Shiji Song, Yizeng
|
1274 |
+
Han, and Gao Huang.
|
1275 |
+
Adaptive focus for efficient video
|
1276 |
+
recognition. In Proceedings of the IEEE/CVF International
|
1277 |
+
Conference on Computer Vision (ICCV), October 2021. 2
|
1278 |
+
[67] Yulin Wang, Yang Yue, Yuanze Lin, Haojun Jiang, Zihang
|
1279 |
+
Lai, Victor Kulikov, Nikita Orlov, Humphrey Shi, and Gao
|
1280 |
+
Huang.
|
1281 |
+
Adafocus v2: End-to-end training of spatial dy-
|
1282 |
+
namic networks for video recognition.
|
1283 |
+
In Proceedings of
|
1284 |
+
the IEEE/CVF Conference on Computer Vision and Pattern
|
1285 |
+
Recognition (CVPR), 2022. 2, 3
|
1286 |
+
[68] Haoran Wei, Pranav Chopada, and Nasser Kehtarnavaz. C-
|
1287 |
+
mhad: Continuous multimodal human action dataset of si-
|
1288 |
+
multaneous video and inertial sensing.
|
1289 |
+
Sensors, 20(10),
|
1290 |
+
2020. 1, 2
|
1291 |
+
[69] Haoran Wei and Nasser Kehtarnavaz. Simultaneous utiliza-
|
1292 |
+
tion of inertial and video sensing for action detection and
|
1293 |
+
recognition in continuous action streams.
|
1294 |
+
IEEE Sensors
|
1295 |
+
Journal, 20(11):6055–6063, 2020. 1, 2
|
1296 |
+
[70] Hang Yan, Qi Shan, and Yasutaka Furukawa. Ridi: Robust
|
1297 |
+
imu double integration. In ECCV, 2018. 2
|
1298 |
+
[71] Mingyu Yang, Yu Chen, and Hun-Seok Kim. Efficient deep
|
1299 |
+
visual and inertial odometry with adaptive visual modality
|
1300 |
+
selection. ArXiv, abs/2205.06187, 2022. 1, 2
|
1301 |
+
[72] Mohammadreza Zolfaghari, Kamaljeet Singh, and Thomas
|
1302 |
+
Brox. ECO: efficient convolutional network for online video
|
1303 |
+
understanding. In ECCV, 2018. 2
|
1304 |
+
|
1305 |
+
The supplementary materials of this work consist of:
|
1306 |
+
A. Supplementary video.
|
1307 |
+
B. Dataset details.
|
1308 |
+
C. Implementation details.
|
1309 |
+
D. Additional analysis of our model.
|
1310 |
+
A. Supplementary Video
|
1311 |
+
In our supplementary video, we have a brief introduction
|
1312 |
+
of our work. More importantly, we show animated videos
|
1313 |
+
of Best and Worse reconstructed clips (Figure 5), Retriev-
|
1314 |
+
ing video clips with EgoDistill (Figure 6), and Anticipating
|
1315 |
+
scene motion with EgoDistill (Figure 7).
|
1316 |
+
Animated version of these figures better show head mo-
|
1317 |
+
tion and video dynamics. We recommend viewing the sup-
|
1318 |
+
plementary video for better understanding of our method
|
1319 |
+
and results.
|
1320 |
+
B. Dataset Details.
|
1321 |
+
We use two datasets in our experiments: Ego4D [26] and
|
1322 |
+
EPIC-Kitchens-100 [11]. In this section we describe more
|
1323 |
+
details about how we create our training and evaluation data.
|
1324 |
+
1. Ego4D [26] contains 3,670 hours of egocentric videos
|
1325 |
+
of people performing diverse tasks (from cooking to
|
1326 |
+
farming) across the globe. As action recognition is not
|
1327 |
+
part of the original Ego4D benchmark, we construct
|
1328 |
+
this task with annotations from the Hands+Objects
|
1329 |
+
temporal localization benchmark [26].
|
1330 |
+
Specifically,
|
1331 |
+
for each hand-objects interaction temporal annotation,
|
1332 |
+
we take the video clip between the pre-frame and post-
|
1333 |
+
frame of the annotation as input, and use the annotated
|
1334 |
+
verb for this interaction as label.
|
1335 |
+
We include clips with paired IMU and audio, and con-
|
1336 |
+
sider classes with at least 2 labeled instances, resulting
|
1337 |
+
in 94 action categories with 12.1k videos in total. In
|
1338 |
+
average, each clip has 2.2 second duration. Then, we
|
1339 |
+
randomly split data from each category into training
|
1340 |
+
and evaluation sets with 70%:30% ratio. Finally, we
|
1341 |
+
obtain a 94-class action recognition dataset with 8.5k
|
1342 |
+
training videos and 3.6k evaluation videos.
|
1343 |
+
2. EPIC-Kitchens [11] contains 100 hours of egocen-
|
1344 |
+
tric videos capturing daily activities in kitchen environ-
|
1345 |
+
ments. We use annotations from the action recognition
|
1346 |
+
benchmark in our experiment.
|
1347 |
+
We select videos that have paired IMU and audio data,
|
1348 |
+
and split the resulting data by camera-wearer, ensuring
|
1349 |
+
non-overlapping splits following the original bench-
|
1350 |
+
mark setting. Specifically, we take videos captured by
|
1351 |
+
camera-wearer id starting with P30, P35, P37 as evalu-
|
1352 |
+
ation videos and use all the remaining videos as train-
|
1353 |
+
ing videos. This results in a 62-class action dataset
|
1354 |
+
with 29k training videos and 6.2k evaluation videos.
|
1355 |
+
C. Implementation Details.
|
1356 |
+
IMU input processing. For each input clip, IMU in-
|
1357 |
+
put is a 422 × 6 matrix (around 2 seconds with 198Hz
|
1358 |
+
frequency), representing the accelerometer and gyroscope
|
1359 |
+
readings along the xyz axes. We observe that the raw IMU
|
1360 |
+
input has significant drifting and bias issues. This induces
|
1361 |
+
inconsistent correspondence between camera motion and
|
1362 |
+
IMU reading across different clips and videos. Therefore,
|
1363 |
+
for IMU reading of each clip, on each dimension we sep-
|
1364 |
+
arately subtract raw readings by the mean values on the
|
1365 |
+
corresponding dimension. This operation normalizes IMU
|
1366 |
+
readings in each dimension to have zero average value. In
|
1367 |
+
this way, our model can only focus on the temporal motion
|
1368 |
+
patterns in each clip.
|
1369 |
+
Audio input processing. For ListenToLook [22], we
|
1370 |
+
process the audio input in the same way mentioned in the
|
1371 |
+
paper. Specifically, we subsample the audio at 16kHZ, and
|
1372 |
+
compute STFT using Hann window size of 400 and hop
|
1373 |
+
length of 160. Please refer to [22] for more details.
|
1374 |
+
Model architecture. For the image backbone, we use
|
1375 |
+
the ImageNet-pretrained ResNet-18 model. For the IMU
|
1376 |
+
backbone, we use a 5-layer 1D Dilated CNN, as found ef-
|
1377 |
+
fective for IMU data processing [6]. We use the same net-
|
1378 |
+
work setting (kernel dimension, dilation gap and channel
|
1379 |
+
dimension) as in prior work [6]. The feature fusion model
|
1380 |
+
consists of a concatenation operation following two fully-
|
1381 |
+
connected layers with hidden dimension of 1024.
|
1382 |
+
Each
|
1383 |
+
layer except for the output layer is followed by a ReLU ac-
|
1384 |
+
tivation. The output dimension is the same as the teacher
|
1385 |
+
video model’s feature dimension (768 in the case of Mo-
|
1386 |
+
tionFormer). When N > 1, we use a one-layer GRU mod-
|
1387 |
+
ule to aggregate extracted features for each frame. We use
|
1388 |
+
a single-directioal GRU with hidden dimension of 512.
|
1389 |
+
Model training.
|
1390 |
+
We train our models in two stages.
|
1391 |
+
In the self-supervised IMU feature learning stage, we train
|
1392 |
+
random initialized IMU encoder fM, IMU predictor h and
|
1393 |
+
the fusion network Π with LNCE. Here the image encoder
|
1394 |
+
fI is a fixed ImageNet pretrained model. On both datasets,
|
1395 |
+
we train the model for 50 epochs with AdamW and batch
|
1396 |
+
size 64. The initial training rate is 1e−4. We decay the
|
1397 |
+
training rate by 0.1 at epoch 30 and epoch 40. In the sec-
|
1398 |
+
ond video feature distillation stage, we initialize the model
|
1399 |
+
with parameters obtained in the last stage and finetune. On
|
1400 |
+
both datasets, we use AdamW with batch size 64 and ini-
|
1401 |
+
tial learning rate 1e−4. On Ego4D, we train for 150 epochs.
|
1402 |
+
We decay the training rate by 0.1 at epoch 90 and epoch
|
1403 |
+
120. On EPIC-Kitchens, we train for 50 epochs. We decay
|
1404 |
+
the training rate by 0.1 at epoch 30 and epoch 40.
|
1405 |
+
|
1406 |
+
Ego4D
|
1407 |
+
EPIC-Kitchens
|
1408 |
+
uniform
|
1409 |
+
38.46
|
1410 |
+
52.43
|
1411 |
+
random
|
1412 |
+
36.85
|
1413 |
+
48.48
|
1414 |
+
first
|
1415 |
+
38.68
|
1416 |
+
46.40
|
1417 |
+
last
|
1418 |
+
35.46
|
1419 |
+
41.72
|
1420 |
+
center
|
1421 |
+
37.04
|
1422 |
+
44.85
|
1423 |
+
Table 4. Effect of frame selection. We compare the accuracy of
|
1424 |
+
using different frame selection heuristics for EgoDistill when N =
|
1425 |
+
4. We observe that Uniform on average achieves better results.
|
1426 |
+
D. Analysis.
|
1427 |
+
Effect of frame selection.
|
1428 |
+
In Section 3.2, we men-
|
1429 |
+
tioned that we use uniform sampling to obtain the N frames
|
1430 |
+
from each video clip. In this section, we compare the per-
|
1431 |
+
formance of our work under uniform sampling with other
|
1432 |
+
heuristics. Specifically, we compare with random sampling,
|
1433 |
+
the first N frames, the last N frames and the center N
|
1434 |
+
frames. We show the results in Table 4 under N = 4. These
|
1435 |
+
results indicate that uniform sampling leads to the best per-
|
1436 |
+
formance on average. Intuitively, uniform sampling on av-
|
1437 |
+
erage leads to a broader coverage of both semantic contexts
|
1438 |
+
as well as scene motion.
|
1439 |
+
Why we set N to be small. In our experiments, we set
|
1440 |
+
N to be 1 to 4. Using larger N (e.g., 8 or 16) with densely
|
1441 |
+
sampled frames could lead to better results of all the meth-
|
1442 |
+
ods with more computational cost. Efficient video under-
|
1443 |
+
standing methods could benefit more as they have better
|
1444 |
+
temporal aggregation mechanisms given densely-sampled
|
1445 |
+
frames.
|
1446 |
+
However, the core purpose of our model is to
|
1447 |
+
deal with cases where we only use a few number of sam-
|
1448 |
+
ples. Therefore, our model is not comparable to video clip
|
1449 |
+
models under dense-frame setting. Furthermore, setting N
|
1450 |
+
to be a small number is very important in many applica-
|
1451 |
+
tions. As loading more image frames takes additional time
|
1452 |
+
and memory, applications with streaming videos or low-
|
1453 |
+
resource AR/VR devices will benefit from loading only a
|
1454 |
+
few frames.
|
1455 |
+
|
JtE0T4oBgHgl3EQfSADl/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
LNFAT4oBgHgl3EQfwR78/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:0b79941cd367839edebfdacf39db3bad54263e307320eeb40cd6e7cbce6de11e
|
3 |
+
size 12582957
|