jackkuo commited on
Commit
d4891f7
·
verified ·
1 Parent(s): 8bad820

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -NAzT4oBgHgl3EQfg_yi/content/tmp_files/2301.01478v1.pdf.txt +0 -0
  2. -NAzT4oBgHgl3EQfg_yi/content/tmp_files/load_file.txt +0 -0
  3. -NFIT4oBgHgl3EQf8ysQ/content/tmp_files/2301.11403v1.pdf.txt +1044 -0
  4. -tE4T4oBgHgl3EQf4A1b/content/tmp_files/2301.05310v1.pdf.txt +1583 -0
  5. -tE4T4oBgHgl3EQf4A1b/content/tmp_files/load_file.txt +0 -0
  6. .gitattributes +55 -0
  7. 0dFIT4oBgHgl3EQf3CsM/vector_store/index.pkl +3 -0
  8. 2dE1T4oBgHgl3EQf5gVO/content/2301.03512v1.pdf +3 -0
  9. 2dE1T4oBgHgl3EQf5gVO/vector_store/index.pkl +3 -0
  10. 3dAzT4oBgHgl3EQf9P73/content/2301.01918v1.pdf +3 -0
  11. 4tE4T4oBgHgl3EQfBAt_/content/tmp_files/2301.04848v1.pdf.txt +2047 -0
  12. 4tE4T4oBgHgl3EQfBAt_/content/tmp_files/load_file.txt +0 -0
  13. 5dE3T4oBgHgl3EQfpQo9/content/tmp_files/2301.04640v1.pdf.txt +825 -0
  14. 5dE3T4oBgHgl3EQfpQo9/content/tmp_files/load_file.txt +468 -0
  15. 6NE1T4oBgHgl3EQf6wWy/vector_store/index.pkl +3 -0
  16. 8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf +3 -0
  17. 8dA0T4oBgHgl3EQfOv8t/vector_store/index.faiss +3 -0
  18. 8dA0T4oBgHgl3EQfOv8t/vector_store/index.pkl +3 -0
  19. B9E3T4oBgHgl3EQfUAr7/content/2301.04448v1.pdf +3 -0
  20. B9E3T4oBgHgl3EQfUAr7/vector_store/index.faiss +3 -0
  21. B9E3T4oBgHgl3EQfUAr7/vector_store/index.pkl +3 -0
  22. BdE2T4oBgHgl3EQfngiP/content/2301.04009v1.pdf +3 -0
  23. BdE2T4oBgHgl3EQfngiP/vector_store/index.faiss +3 -0
  24. BdE2T4oBgHgl3EQfngiP/vector_store/index.pkl +3 -0
  25. CdAzT4oBgHgl3EQfiP0X/content/tmp_files/2301.01495v1.pdf.txt +1449 -0
  26. CdAzT4oBgHgl3EQfiP0X/content/tmp_files/load_file.txt +0 -0
  27. DtAyT4oBgHgl3EQf4vpJ/content/tmp_files/2301.00791v1.pdf.txt +0 -0
  28. DtAyT4oBgHgl3EQf4vpJ/content/tmp_files/load_file.txt +0 -0
  29. E9A0T4oBgHgl3EQfBP8f/content/2301.01972v1.pdf +3 -0
  30. E9A0T4oBgHgl3EQfBP8f/vector_store/index.pkl +3 -0
  31. E9E5T4oBgHgl3EQfVA-E/content/tmp_files/2301.05548v1.pdf.txt +1854 -0
  32. E9E5T4oBgHgl3EQfVA-E/content/tmp_files/load_file.txt +0 -0
  33. F9AyT4oBgHgl3EQfSveK/content/tmp_files/2301.00092v1.pdf.txt +0 -0
  34. F9AyT4oBgHgl3EQfSveK/content/tmp_files/load_file.txt +0 -0
  35. FtE0T4oBgHgl3EQfRAB3/content/tmp_files/2301.02201v1.pdf.txt +867 -0
  36. FtE0T4oBgHgl3EQfRAB3/content/tmp_files/load_file.txt +0 -0
  37. G9E2T4oBgHgl3EQfTge-/content/tmp_files/2301.03804v1.pdf.txt +0 -0
  38. G9E2T4oBgHgl3EQfTge-/content/tmp_files/load_file.txt +0 -0
  39. G9E4T4oBgHgl3EQfgQ3v/content/2301.05116v1.pdf +3 -0
  40. G9E4T4oBgHgl3EQfgQ3v/vector_store/index.faiss +3 -0
  41. HtE1T4oBgHgl3EQfXwQA/content/tmp_files/2301.03129v1.pdf.txt +1705 -0
  42. HtE1T4oBgHgl3EQfXwQA/content/tmp_files/load_file.txt +0 -0
  43. ItE3T4oBgHgl3EQfXAqD/vector_store/index.faiss +3 -0
  44. ItFKT4oBgHgl3EQfdy7h/content/2301.11822v1.pdf +3 -0
  45. ItFKT4oBgHgl3EQfdy7h/vector_store/index.faiss +3 -0
  46. ItFKT4oBgHgl3EQfdy7h/vector_store/index.pkl +3 -0
  47. JdAyT4oBgHgl3EQf5_qu/vector_store/index.pkl +3 -0
  48. JtE0T4oBgHgl3EQfSADl/content/tmp_files/2301.02217v1.pdf.txt +1455 -0
  49. JtE0T4oBgHgl3EQfSADl/content/tmp_files/load_file.txt +0 -0
  50. LNFAT4oBgHgl3EQfwR78/vector_store/index.faiss +3 -0
-NAzT4oBgHgl3EQfg_yi/content/tmp_files/2301.01478v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
-NAzT4oBgHgl3EQfg_yi/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-NFIT4oBgHgl3EQf8ysQ/content/tmp_files/2301.11403v1.pdf.txt ADDED
@@ -0,0 +1,1044 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Detecting Pump&Dump Stock Market Manipulation from Online
2
+ Forums
3
+ D. Nam
4
+ D.B. Skillicorn
5
+ School of Computing
6
+ Queen’s University
7
+ Kingston. Canada
8
9
+ Abstract
10
+ The intersection of social media, low-cost trading platforms, and naive investors has created an
11
+ ideal situation for information-based market manipulations, especially pump&dumps. Manipulators
12
+ accumulate small-cap stocks, disseminate false information on social media to inflate their price,
13
+ and sell at the peak.
14
+ We collect a dataset of stocks whose price and volume profiles have the
15
+ characteristic shape of a pump&dump, and social media posts for those same stocks that match the
16
+ timing of the initial price rises. From these we build predictive models for pump&dump events based
17
+ on the language used in the social media posts.
18
+ There are multiple difficulties: not every post will cause the intended market reaction, some
19
+ pump&dump events may be triggered by posts in other forums, and there may be accidental con-
20
+ fluences of post timing and market movements. Nevertheless, our best model achieves a prediction
21
+ accuracy of 85% and an F1-score of 62%. Such a tool can provide early warning to investors and
22
+ regulators that a pump&dump may be underway.
23
+ 1
24
+ Introduction
25
+ New financial products and technologies have allowed naive investors to easily enter financial mar-
26
+ kets.
27
+ This has increased the risk of manipulation, and detecting and investigating fraudulent
28
+ activities has become much more difficult. Many go undetected [8].
29
+ Social media has created new methods for manipulating markets. A scheme known as Pump
30
+ and Dump (P&D) is one popular mechanism. Fraudsters buy quantities of a stock, disseminate
31
+ false information about it to artificially raise its price, and then sell their purchased shares at the
32
+ higher price. Social media provides a channel for rapid dissemination and a pool of investors with
33
+ little knowledge or experience who may not detect that the information is false.
34
+ Conventional approaches to detecting manipulation look for known patterns, and for anomalous
35
+ activity such as exceeded thresholds for prices and trading volumes. Suspicious activities can be
36
+ detected using sets of rules and triggers that cause notifications of potential manipulation. However,
37
+ those methods struggle in the presence of behaviours that deviate from historical patterns [16].
38
+ Previous work has also focused on detecting manipulations so that regulators can penalise those
39
+ who carry them out. This does little to help investors, either to prevent their being deceived or
40
+ recovering their investments.
41
+ 1
42
+ arXiv:2301.11403v1 [cs.SI] 26 Jan 2023
43
+
44
+ Data-analytic techniques have the potential to detect false information as it being disseminated
45
+ [11, 25]. Natural language analytics can detect the posts in social media that are intended to pump
46
+ particular stocks, providing a real-time warning to potential investors. We investigate how well
47
+ P&D schemes can be detected in posts on social media, by matching the language patterns in the
48
+ posts to the pattern of stock price corresponding to a P&D manipulation.
49
+ A penny stock is a stock that is traded by a small public company for less than $5 per share
50
+ [24].
51
+ Many of these companies are known for their volatility due to their limited coverage by
52
+ analysts and interest from institutional buyers. Because of their low price, retail investors can buy
53
+ large quantities of these stocks without having to invest much money. This, however, makes their
54
+ prices volatile and so creates the potential for large returns on investments; but also leaves them
55
+ vulnerable to manipulation by malicious actors. One study found that 50% of manipulated stocks
56
+ are those with a small market capitalization [1].
57
+ It might be supposed that the connection between a social media post and a P&D event is too
58
+ tenuous to be detected – after all, not every post will have the desired effect, and a P&D might be
59
+ triggered by some less visible social media activity. We show that, at least for penny stocks, the
60
+ connection is reasonably detectable, and we achieve prediction accuracies (that a post is intended
61
+ to cause a P&D event) of 85%, with an F1 score of 67% (± 12 percentage points) from posts alone,
62
+ and 62% (± 3 percentage points) from posts and comments.
63
+ 2
64
+ Tools
65
+ Stance detection is a technique to determine the attitude or viewpoint of a text towards a target.
66
+ It aims to detect whether the author of the text is in support of or against a given entity [21].
67
+ Some applications of stance detection have been in political debates, fake news, and social media
68
+ [15, 26, 30].
69
+ Empath is a tool that was developed by Fast et al. [13] for researchers to generate and validate
70
+ new lexical categories on demand. It uses deep learning to establish connections between words
71
+ and phrases used in modern fiction. Given a small set of seed words that represents a category,
72
+ Empath can provide new related terms using its neural embeddings. It also employs the use of
73
+ crowd-sourcing to validate the terms that it considers are related. Along with the ability to create
74
+ new categories, Empath comes with 200 built-in, pre-validated categories for common topics (e.g.,
75
+ neglect, government, social media).
76
+ SHAP (SHapley Additive exPlanation) is a tool that was developed by Lundberg and Lee [22]
77
+ to determine the impact of each attribute on the output of a predictive model. It is based on
78
+ Shapley values, a concept from game theory that determines a fair way to distribute the payoff for
79
+ players that have worked in coalition towards an outcome [33].
80
+ Extreme Gradient Boosting is a decision-tree based ensemble algorithm that has become known
81
+ for its speed and performance [5]. Decision trees are built sequentially so that each one reduces
82
+ the errors of the previous one [35]. Random Forests is a decision-tree based ensemble algorithm
83
+ with each tree built from a subset of the rows and columns of the dataset [34]. This allows for
84
+ variation among the trees and results in lower correlation among their predictions [37]. Support
85
+ Vector Machines are a supervised learning algorithm that finds a hyperplane that best separates
86
+ the data points from two classes [14].
87
+ Artificial Neural Networks are computational networks that are inspired by the biological ner-
88
+ vous system [10]. ANNs excel at prediction for data where the amount of information in each
89
+ 2
90
+
91
+ Figure 1: Stages of Pump and Dump
92
+ attribute is small and there are non-linear interactions among them. Deep learning models are a
93
+ class of extensions to ANNs that have solved long standing prediction problems in image recogni-
94
+ tion and natural language [20]. Convolutional Neural Networks (CNNs) are a class of deep learning
95
+ networks that were designed initially to work with images but work surprisingly well with sequence
96
+ data such as texts as well. Long Short-Term Memory (LSTM) deep learning networks are a type of
97
+ recurrent neural network designed to handle the long-term dependencies present in sequence pre-
98
+ diction problems [4]. Understanding text often requires looking ahead (think of verbs in German)
99
+ and so processing text in both directions, using a biLSTM, provides better results for language [6].
100
+ 3
101
+ Experiments
102
+ Within a typical online forum, there are two different categories of texts. The first is a post, which
103
+ initiates a discussion.
104
+ The second is a set of comments responding to the post.
105
+ For example,
106
+ an individual may post saying that, in their opinion, a stock’s price is about to rise, with others
107
+ respond by sharing their opinions in the same thread. Responders may agree with the original post,
108
+ or disagree.
109
+ P&D is an information-based manipulation, artificially raising the price of a stock through the
110
+ dissemination of false information. As shown in Figure 1, this manipulation strategy involves three
111
+ different stages [19]. The operators of the scheme first purchase the stock that they are planning
112
+ to manipulate (Accumulation). Once they have acquired enough shares, they will disseminate false
113
+ information to make it appear more desirable, driving up the price (Pump). Once the price has
114
+ risen to the desired level of profit, the operators sell off their shares before anyone uncovers that
115
+ the information has no basis or the hype dies down (Dump).
116
+ To identify P&Ds within the market, patterns associated with the scheme must be established.
117
+ 3
118
+
119
+ Price
120
+ Accumulation
121
+ Pump
122
+ Dump
123
+ TimeWhile the method of conducting a P&D may vary, two indicators that can identify them are sharp
124
+ changes in price and volume [19]. A P&D will cause a significant price increase within a short
125
+ amount of time, larger than the fluctuations that the stock typically experiences; followed by a
126
+ decrease once the dump phase has begun. The volume also increases as the stock gains interest
127
+ among investors during and after the dissemination phase. However, the volume will typically not
128
+ immediately experience as sharp a decline as the price when the operators begin to dump their
129
+ shares because of the reluctance of investors to believe that the price is illusory.
130
+ If the profile of a P&D manipulation can be detected in the market, then the post that putatively
131
+ caused it can be straightforwardly labelled and its language patterns investigated. (Of course, it is
132
+ possible that some of the apparent connections are spurious, but it is relatively unlikely that a post
133
+ touting a particular stock will be disseminated exactly when the stock’s price and volume begin a
134
+ sharp rise).
135
+ Labelling comments is more complex, since the comments may agree with the original post, or
136
+ disagree. Only the language of those that agree can contribute to predicting a P&D event.
137
+ 3.1
138
+ Data Sources
139
+ Two different data sources were utilized. The first is the popular online website Reddit, where users
140
+ discuss the stock market. The second is Yahoo Finance, a financial market website that provides
141
+ historical data about companies.
142
+ Reddit contains forums referred to as subreddits, each dedicated to the discussion of a specific
143
+ topic. Popular forums for the discussions of stocks are r/pennystocks, r/wallstreetbets, r/stocks,
144
+ r/RobinHoodPennyStocks, r/TheWallStreet. We use r/pennystocks and r/RobinHoodPennyStocks,
145
+ Yahoo Finance is a website provided by Yahoo for investors to access financial news, market
146
+ data, and basic financial tools. Given a stock symbol or company name, it provides the relevant
147
+ market data.
148
+ Classification techniques such as Extreme Gradient Boosting (XGBoost), Random Forests, Sup-
149
+ port Vector Machine (SVM), and Artificial Neural Networks (ANNs) were used to learn predictive
150
+ models, and then to identify which attributes (i.e. words) are most predictive. Figure 2 shows the
151
+ experimental workflow.
152
+ Figure 2: Experiment workflow
153
+ Data from Reddit and Yahoo Finance were collected daily for the period October 1, 2019, to
154
+ June 28, 2020. A breakdown of the data is shown in Table 1. The majority of the data is retrieved
155
+ 4
156
+
157
+ Redldit
158
+ Yahoo!
159
+ Finance
160
+ Anomaly
161
+ Detection
162
+ Text
163
+ Labelling
164
+ Model
165
+ Model
166
+ Data
167
+ Preprocessing
168
+ Training
169
+ Testing
170
+ Historical Data
171
+ Agreement
172
+ Model
173
+ Data Retriever
174
+ Data Preparation
175
+ Dataset
176
+ Modelling
177
+ Model
178
+ Comparison/
179
+ EvaluationSubreddit
180
+ Number of Posts
181
+ Number of Comments
182
+ Total
183
+ r/pennystocks
184
+ 12,049
185
+ 234,149
186
+ 246,198
187
+ r/RobinHoodPennyStocks
188
+ 6,506
189
+ 78,429
190
+ 84,935
191
+ Total
192
+ 18,555
193
+ 312,578
194
+ 331,133
195
+ Table 1: Breakdown of records collected from subreddits
196
+ Figure 3: Data Collection Volumes
197
+ from r/pennystocks, with about a third from r/RobinHoodPennyStocks. The number of comments
198
+ is much larger than the number of posts, with posts making up only about 5% of the texts.
199
+ As shown in Figure 3, there was a sharp increase in the number of submissions over the period
200
+ of data collection:
201
+ • r/pennystocks - 139,000 Members ⇒ 257,000 Members
202
+ • r/RobinHoodPennyStocks - 52,000 Members ⇒ 133,0000 Members
203
+ This seems to reflect an increase in amateur stock market investing because of the covid-19 pan-
204
+ demic, and a corresponding increase in manipulation. i.e, as manipulators look to take advantage of
205
+ new, naive investors during the pandemic. Alerts and press releases by the SEC and the Canadian
206
+ Securities Administrators warned new investors to be vigilant about the increasing number of P&D
207
+ schemes that have occurred around that time [9, 28, 29].
208
+ The median number of words per post or comment was 22, and the total number of distinct
209
+ words was 4,862.
210
+ Replacing stock symbols by the market sector to which each business belongs allows us to see
211
+ which sectors are discussed the most, and which are the targets of P&D. Figure 4 shows that
212
+ healthcare stocks are the most mentioned, followed by technology stocks. The pandemic clearly
213
+ had an effect on both attention to markets and manipulations. Temporal trends in the healthcare
214
+ 5
215
+
216
+ 10000
217
+ 8000
218
+ Number of Records
219
+ 6000
220
+ 40.00
221
+ 2000
222
+ DatesFigure 4: Histogram of market sectors discussed within subreddits
223
+ sector, Figure 5 , show an increase in online activity at the beginning of the pandemic, and then a
224
+ further increase in the middle of 2020. Figure 6 shows that P&D manipulations also increased in
225
+ 2020.
226
+ Table 2 shows the information collected for each post and comment.
227
+ Data from Yahoo Finance was scraped using the yfinance tool [2]. Stock symbols were extracted
228
+ from Reddit posts. This step is non-trivial and required regular expression extraction, and look ups
229
+ against the publicly traded exchanges. Posts which mentioned more than one stock were discarded,
230
+ partly because of the complexity of deciding which stock may be being touted, and partly because
231
+ P&D posts typically focus on one particular stock they are pumping. If a stock symbol was found,
232
+ yfinance was used to collect the financial information described in Table 3.
233
+ As shown in Figure 7, the daily Open, High, Low, Close, and Volume (OHLCV) data was
234
+ collected over nine business days surrounding an event. Data was collected over five days before each
235
+ post event to establish a baseline for price and volume. Penny stocks almost always shows minor
236
+ variation in price and volume so this baseline is typically quite flat. The remaining four days contain
237
+ the pump event (sharp increase) followed by a decrease in price and a slower decrease in volume.
238
+ 6
239
+
240
+ 00008
241
+ 70000
242
+ 60000
243
+ of Records
244
+ 50000
245
+ 40000
246
+ 30000
247
+ 20000
248
+ 10000
249
+ SectorConglomerates
250
+ SectorServices
251
+ SectorUtilities
252
+ SectorConsumerDefensive
253
+ SectorBasicMaterials
254
+ SectorRealEstate
255
+ SectorFinancialServices
256
+ SectorEnergy
257
+ Sectorlndustrials
258
+ SectorCommunicationServices
259
+ SectorUnknown
260
+ SectorTechnology
261
+ SectorHealthcare
262
+ SectorsFigure 5: Trend of posts and comments that discussed healthcare stocks
263
+ Feature
264
+ Description
265
+ Post Title
266
+ Title of the post.
267
+ Post ID
268
+ Unique identification code for post.
269
+ Post Author
270
+ Author of the post.
271
+ Post Created
272
+ Unix Timestamp of when post was submitted.
273
+ Post Body
274
+ Text of the post.
275
+ Comment ID
276
+ Unique identification code for comment.
277
+ Comment Author
278
+ Author of the comment.
279
+ Comment Created
280
+ Unix Timestamp of when comment was submit-
281
+ ted.
282
+ Comment Body
283
+ Text of the comment.
284
+ Table 2: Features of collected Reddit data
285
+ Sabherwal et al. [27] studied the effects of online message boards on market manipulation and
286
+ found that dumps typically occur within four days and this is plausible because the manipulators
287
+ want to sell as soon as the price reaches a peak.
288
+ Texts from subreddits were preprocessed using the following steps: remove URLs, expand con-
289
+ tractions, remove HTML Tags, remove punctuation, remove extra whitespaces, remove numbers,
290
+ lemmatization, and remove stopwords.
291
+ Stock symbols within the text were replaced by dummy stock names representing the market
292
+ sector associated with each business. This is required because the name of the particular stock
293
+ being pumped and dumped in one case has nothing to do with the name of the stock being used
294
+ in another case – but there might be correspondences within sectors. Here is an example:
295
+ 7
296
+
297
+ 4000
298
+ 3500
299
+ 3000
300
+ of Records
301
+ 25:00
302
+ Yumber
303
+ 2000
304
+ 15:00
305
+ 1000
306
+ 500
307
+ DatesFigure 6: Trend of posts that have been labelled as P&D
308
+ Feature
309
+ Description
310
+ Open
311
+ Opening price of the stock for the given period.
312
+ High
313
+ Highest price for the stock within the given pe-
314
+ riod.
315
+ Low
316
+ Lowest price for the stock within the given pe-
317
+ riod.
318
+ Close
319
+ Closing price of the stock for the given period.
320
+ Volume
321
+ Total number of shares traded within the given
322
+ period.
323
+ Market Sector
324
+ Associated industry that the company is in.
325
+ Market Capitalization
326
+ Total market value of the company’s outstand-
327
+ ing shares.
328
+ Table 3: Features of Yahoo! Finance data
329
+ • “AYTU perfect time to buy” ⇒ “SectorHealthcare perfect time to buy”
330
+ 3.2
331
+ Data Labelling
332
+ To label each post, stock data surrounding the day in which the post was submitted to Reddit
333
+ were analyzed. If the market data exhibited that pattern associated with P&D (a notable rise from
334
+ the time of the post, followed by a sharp drop) then the post was labelled accordingly. A rise was
335
+ detected by calculating the average price and volume in the five-day window before the post. The
336
+ 8
337
+
338
+ 120
339
+ 100
340
+ Posts
341
+ Number of i
342
+ 60
343
+ 40
344
+ 20
345
+ DatesFigure 7: Time window used to collect market data.
346
+ daily average price (DAP) of the values was first calculated for each of the five days.
347
+ DAP(Xt) = 1
348
+ 4(Xtopen + Xthigh + Xtlow + Xtclose)
349
+ (1)
350
+ and then the baseline average price (BAP) was calculated by
351
+ BAP(Xest) = 1
352
+ 5 ·
353
+ T1
354
+
355
+ t=T0
356
+ DAP(Xt)
357
+ (2)
358
+ The baseline average volume (BAV) was calculated by taking the average of the volume values
359
+ over the estimation window.
360
+ BAV (Xest) = 1
361
+ 5 ·
362
+ T1
363
+
364
+ t=T0
365
+ Xtvolume
366
+ (3)
367
+ A threshold was set at two standard deviations above the average price within the five-day
368
+ estimation window. Price increases above this threshold were considered to be pump events. A
369
+ similar threshold was used to define a volume anomaly. Events were considered to be the result of
370
+ P&D if they exceeded the threshold for both price and volume. Figure 8 shows a comparison of
371
+ the stock behaviours labelled using this approach.
372
+ A sudden price rise or volume increase might coincide with a post, but is not necessarily caused
373
+ by it. The rising region of each stock trend of a potential P&D event was min-max normalised,
374
+ 9
375
+
376
+ Reddit Post Date
377
+ Price
378
+ Event
379
+ To
380
+ T2
381
+ Volume
382
+ 27
383
+ 29
384
+ May
385
+ 5
386
+ 11
387
+ Estimation
388
+ Event
389
+ Window (5 Days)
390
+ Window (4 Days)Figure 8: Comparison of stock behaviours that have been labelled using anomaly detection
391
+ and its slope calculated. Steep price increases are more likely to arise from genuine information
392
+ and less likely to have resulted from a single manipulation post, so the median slope across the
393
+ entire dataset was calculated, and only slopes below the median were considered as potential P&D
394
+ events. Figure 9 shows the distribution of stock price trend slopes from the entire the dataset. The
395
+ median value is 0.18.
396
+ 3.3
397
+ Agreement Model
398
+ The comments associated with the P&D post cannot all be labelled as examples of P&D language,
399
+ since not all of them will be supportive of the post they are responding to. Manipulators, of course,
400
+ will post comments in support of the post, either from the same identity or from others.
401
+ We developed an agreement model, using ideas from stance detection. This was done using
402
+ Empath to generate a lexicon of agreement, seeding it with the words: bought, agree, positive,
403
+ increasing, good, and now. Empath returned the words listed in Table 4. Posts touting stocks
404
+ also use a specialised vocabulary, shown in these examples.
405
+ • “probably go to shoot up tomorrow”
406
+ 10
407
+
408
+ TRNX2020-04-16
409
+ CCO2020-03-31
410
+ USWS2020-06-07
411
+ GNUS2020-06-09
412
+ Stockbehaviours
413
+ Stockbehaviours
414
+ labelledasP&D
415
+ labelledasnotP&DFigure 9: Distribution of stock price trend slopes
416
+ only
417
+ done
418
+ better
419
+ true
420
+ knew
421
+ besides
422
+ like
423
+ maybe
424
+ wanted
425
+ liked
426
+ also
427
+ important
428
+ buying
429
+ understand
430
+ good
431
+ understood
432
+ needed
433
+ work
434
+ because
435
+ successful
436
+ knowing
437
+ grateful
438
+ plus
439
+ much
440
+ reasonable
441
+ should
442
+ give
443
+ happy
444
+ course
445
+ glad
446
+ well
447
+ considering
448
+ anyway
449
+ agree
450
+ meaning
451
+ great
452
+ probably
453
+ sure
454
+ thought
455
+ guaranteed
456
+ more
457
+ honestly
458
+ positive
459
+ thankful
460
+ actually
461
+ agreed
462
+ special
463
+ doubt
464
+ guess
465
+ though
466
+ bet
467
+ buy
468
+ surpass
469
+ worth
470
+ suppose
471
+ although
472
+ especially
473
+ definitely
474
+ certain
475
+ figured
476
+ given
477
+ means
478
+ Table 4: List of generated agreement words from Empath
479
+ • “this bad boy just rocket”
480
+ • “i will see you on the moon”
481
+ An extended lexicon was determined manually by inspecting posts associated with manipulation.
482
+ Table 5 contains the list of words that were chosen using this approach.
483
+ Comments were labelled as associated with pumping if they contained two or more of the
484
+ 11
485
+
486
+ 1200
487
+ 1000
488
+ 800
489
+ Number of Posts
490
+ 600
491
+ 400
492
+ 200moon
493
+ fast
494
+ massive
495
+ rich
496
+ surprise
497
+ rocket
498
+ profit
499
+ top
500
+ easy
501
+ move
502
+ pump
503
+ rally
504
+ peak
505
+ early
506
+ load
507
+ soar
508
+ climb
509
+ worth
510
+ shoot
511
+ quick
512
+ jump
513
+ rise
514
+ sale
515
+ money
516
+ burst
517
+ pop
518
+ high
519
+ gain
520
+ breakout
521
+ drive
522
+ hype
523
+ spike
524
+ run
525
+ cash
526
+ nice
527
+ fly
528
+ go
529
+ up
530
+ hit
531
+ bank
532
+ awesome
533
+ confident
534
+ surpass
535
+ more
536
+ zoom
537
+ big
538
+ great
539
+ potential
540
+ advantage
541
+ Table 5: List of custom words used in the Agreement Model
542
+ agreement words, or if they were (visibly) authored by the original poster. The following are some
543
+ examples of comments that were labelled as not P&D related based on the agreement model:
544
+ • “it be the american dream to fall for snake oil salesman and then lose everything it be a story
545
+ as old as humanity”
546
+ • “clearly a pump and dump scheme”
547
+ • “do not touch it if the chart look like a hockey stick”
548
+ This labelling of comments is limited by the completeness of the agreement lexicon, and also does
549
+ not account for negations.
550
+ P&D posts and comments are relatively rare and so the dataset is naturally imbalanced. Tech-
551
+ niques such as SMOTE [3] and ADASYN [17] were tried but proved ineffective. Instead, where
552
+ predictors allowed it, class weight parameters were set to penalise mistakes in the minority class.
553
+ 3.4
554
+ Modelling
555
+ The following predictors were used:
556
+ • Extreme Gradient Boosting (XGBoost)
557
+ • Random Forest (RF)
558
+ • Support Vector Machine (SVM)
559
+ • Artificial Neural Networks
560
+ – Multilayer Perceptron (MLP)
561
+ – Convolutional Neural Network (CNN)
562
+ – Bidirectional Long Short Term Memory (BiLSTM)
563
+ In each case the standard performance measures (accuracy, precision, recall, F1-Score, confusion
564
+ matrix) were calculated, as well as the Shapley values which rank words by their importance to the
565
+ predictions.
566
+ 12
567
+
568
+ Record Type
569
+ P&D
570
+ Not P&D
571
+ Total
572
+ Posts
573
+ 3,006
574
+ 15,549
575
+ 18,555
576
+ Comment
577
+ 26,727
578
+ 285,851
579
+ 312,578
580
+ Total
581
+ 29,733
582
+ 312,142
583
+ 331,133
584
+ Table 6: Dataset class distribution
585
+ Model
586
+ TP
587
+ FP
588
+ TN
589
+ FN
590
+ Accuracy
591
+ Precision
592
+ Recall
593
+ F1-Score
594
+ XGBoost Posts
595
+ 1728
596
+ 6615
597
+ 8934
598
+ 1278
599
+ 57.46 (±3.73)
600
+ 20.71 (±0.48)
601
+ 57.49 (±0.68)
602
+ 30.45 (±2.25)
603
+ XGBoost Posts and Comments
604
+ 2007
605
+ 7646
606
+ 7903
607
+ 999
608
+ 53.41 (±1.42)
609
+ 20.79 (±0.85)
610
+ 66.77 (±1.58)
611
+ 31.71 (±0.96)
612
+ RF Posts
613
+ 271
614
+ 646
615
+ 14903
616
+ 2735
617
+ 81.78 (±0.51)
618
+ 29.55 (±1.40)
619
+ 9.01 (±0.52)
620
+ 13.81 (±0.78)
621
+ RF Posts and Comments
622
+ 414
623
+ 211
624
+ 15338
625
+ 2592
626
+ 84.89 (±0.69)
627
+ 66.24 (±1.69)
628
+ 13.77 (±0.47)
629
+ 22.80 (±0.75)
630
+ SVM Posts
631
+ 1752
632
+ 5263
633
+ 10286
634
+ 1254
635
+ 64.88 (±1.14)
636
+ 24.98 (±0.76)
637
+ 58.28 (±1.05)
638
+ 34.97 (±1.16)
639
+ SVM Posts and Comments
640
+ 2125
641
+ 4559
642
+ 10990
643
+ 881
644
+ 70.6 (±0.49)
645
+ 31.79 (±0.43)
646
+ 70.69 (±0.56)
647
+ 43.86 (±0.57)
648
+ MLP Posts
649
+ 2382
650
+ 1718
651
+ 13831
652
+ 624
653
+ 87.38 (±6.66)
654
+ 58.10 (±11.65)
655
+ 79.24 (±12.76)
656
+ 67.04 (±12.12)
657
+ MLP Posts and Comments
658
+ 2103
659
+ 2602
660
+ 12947
661
+ 903
662
+ 81.11 (±3.71)
663
+ 44.70 (±4.28)
664
+ 69.96 (±3.80)
665
+ 54.55 (±4.36)
666
+ CNN Posts
667
+ 2373
668
+ 1709
669
+ 13840
670
+ 633
671
+ 87.38 (±7.04)
672
+ 58.13 (±12.02)
673
+ 78.94 (±12.76)
674
+ 66.96 (±12.37)
675
+ CNN Posts and Comments
676
+ 2304
677
+ 2068
678
+ 13481
679
+ 702
680
+ 85.07 (±1.25)
681
+ 52.70 (±2.33)
682
+ 76.65 (±3.45)
683
+ 62.46 (±2.64)
684
+ biLSTM Posts
685
+ 2297
686
+ 2495
687
+ 13054
688
+ 709
689
+ 82.73 (±8.11)
690
+ 47.93 (±9.92)
691
+ 76.41 (±10.94)
692
+ 58.91 (±10.82)
693
+ biLSTM Posts and Comments
694
+ 2288
695
+ 2370
696
+ 13179
697
+ 718
698
+ 83.36 (±2.27)
699
+ 49.12 (±3.25)
700
+ 76.11 (±3.86)
701
+ 59.71 (±3.54)
702
+ Table 7: Summary of model performance
703
+ 4
704
+ Results
705
+ Table 6 shows the class distribution for the dataset. Less than 9% of the records are labelled as
706
+ being P&D. This is typical of datasets where fraud is present; indeed it is striking that the rate of
707
+ fraud is this high.
708
+ The results of each of the predictive model are reported in Table 7 using 5-fold cross validation
709
+ and upweighting the fraud class when the model permits it.
710
+ The neural network models perform well as expected.
711
+ Models such as XGBoost, Random
712
+ Forests, and SVM had disappointing performance, and a heterogeneous stacked classifier combining
713
+ their predictions did not improve on the performance of the individual predictors, suggesting that
714
+ they make their errors on the same records.
715
+ At first glance, the ANN models using posts perform better than those using posts and com-
716
+ ments. However, the standard deviations of the performance numbers show that the inclusion of
717
+ comments provides stability for correctly identifying P&D posts. The best performing model over-
718
+ all is CNN, especially with comments included. Its precision is relatively low; of all the records that
719
+ the model predicts to be P&D, only 52.7% are actually correct. If we look at the rate at which each
720
+ class is predicted to be positive, a better outlook of the model is provided. Given a positive P&D
721
+ text, the model has a 76.65% chance of classifying it correctly, whereas, if it is given a negative
722
+ text, it has a 13.3% chance of classifying it incorrectly as positive. It is perhaps a little surprising
723
+ that biLSTM did not perform best since they are typically strong predictors for natural language
724
+ problems.
725
+ The SHAP Explainers produce diagrams that rank the attributes by their impact on outcomes.
726
+ Figure 10 shows the diagram for the CNN predictor for posts and comments and the 30 most
727
+ impactful words. Although the influence of any single word is inevitably weak, there are visible
728
+ red dots to the right for many of these words, indicating that higher frequencies of these words are
729
+ associated with P&D events. The names of the popular sectors are indicator of P&Ds, as are words
730
+ 13
731
+
732
+ Predicted Label
733
+ Actual Label
734
+ Misclassified Post
735
+ P&D
736
+ Not P&D
737
+ sectorunknown about to soar
738
+ P&D
739
+ Not P&D
740
+ sectorunknown fitness equipment maker owner
741
+ of bow flex completely sell out of most retail
742
+ store how be this look just buy in share
743
+ P&D
744
+ Not P&D
745
+ quick all in sectorcommunicationservices pump
746
+ my first time actually do something right the
747
+ lambos go to be green for gain
748
+ P&D
749
+ Not P&D
750
+ blast off look like gold and oil will be big player
751
+ this i also suggest look at sectortechnology
752
+ P&D
753
+ Not P&D
754
+ sectorenergy drop time to buy it be drop below
755
+ which be its day low be it a good time to buy
756
+ Not P&D
757
+ P&D
758
+ sectortechnology release patent news on thermal
759
+ tech could be a mark sympathy play bust out
760
+ over
761
+ Not P&D
762
+ P&D
763
+ sectorhealthcare do anyone understand why sec-
764
+ torhealthcare shoot up soo much i be not able
765
+ to find any real catalyst
766
+ Not P&D
767
+ P&D
768
+ sectorhealthcare on the move this have potential
769
+ reach today
770
+ Not P&D
771
+ P&D
772
+ sectorhealthcare to the moon
773
+ Not P&D
774
+ P&D
775
+ any thought on when to sell sectorenergy bought
776
+ in late i be up after hour should i wait til tomor-
777
+ row or sell as soon as possible in the am
778
+ Table 8: Examples of misclassified posts from CNN model
779
+ from the agreement model such as “buy” and “go”. Across the best performing models, the same
780
+ set of words emerge as the most impactful features (not shown).
781
+ Misclassifications by the model have different impacts depending on how and where it is used.
782
+ For an ordinary investor, a false positive (a post predicted to be a P&D when it isn’t) means a
783
+ missed opportunity for profit, but a false negative means a financial loss. For a regulatory body, a
784
+ false positive is problematic, but a false negative less so. Table 8 shows some of the examples of
785
+ misclassifications by the CNN model.
786
+ Some false positives, predicted to be P&D from the text, but without a corresponding market
787
+ movement may be instances where the post failed to attract enough attention to cause a measurable
788
+ market movement, or was so blatant that it was not credible to typical investors.
789
+ Some false
790
+ negatives may be because the posts were too short to contain the required two words, because the
791
+ pumping took place on another platform or because a market movement happened to match the
792
+ timing of the post.
793
+ 14
794
+
795
+ 5
796
+ Related work
797
+ The application of data analytics for detecting market manipulation is a relatively new in the
798
+ field of finance. Most research has focused on detecting trade-based manipulation because it is
799
+ most common [32]. Huang and Chang found that of the manipulation cases prosecuted in Taiwan
800
+ from 1991 to 2010, 96.61% were trade-based, and only 3.39% were information-based [18]. Some
801
+ examples detecting trade-based manipulation are: Ogut et al. [38] in the emerging Istanbul Stock
802
+ Exchange, Wang et al. [32] for prosecuted manipulation cases reported by the China Securities
803
+ Regulatory Commission, Cao et al. [7] using real trading data from four popular NASDAQ stocks
804
+ with synthetic cases of manipulation (spoofing and quote stuffing), Cao et al. [36] using seven
805
+ popular NASDAQ and LSE stocks data injecting ten simulated stock price manipulations, Diaz et
806
+ al. [12] using manipulation cases pursued by the U.S. Securities and Exchange Commission (SEC)
807
+ in 2003, and Golomohammadi et al. [16] trying to detect three groups of manipulation schemes:
808
+ marking the close, wash trades, and cornering the market.
809
+ For information-based manipulation, Victor and Hagemann [31] looked at 149 confirmed P&D
810
+ schemes coordinated through Telegram chats and pumped via Twitter. Using XGBoost, they built
811
+ a model that achieved a sensitivity of 85% and specificity of 99%. They concluded that P&Ds were
812
+ frequent among cryptocurrencies that had a market capitalization of $50 million or below and often
813
+ involved trading volumes of several hundred thousand dollars within a short time-frame.
814
+ Mirtaheri et al. [23] looked specifically at forecasting P&Ds by combining the information from
815
+ Twitter and Telegram. They manually labelled known P&D operation messages on Telegram, and
816
+ then used SVMs with a stochastic gradient descent optimizer to label the remaining messages as
817
+ P&D or not. They used Random Forests to detect whether a manipulation event was going to take
818
+ place within the market. Their results showed that they were able to detect, with reasonable accu-
819
+ racy, whether there is an unfolding manipulation scheme occurring on Telegram. Their proposed
820
+ model was able to achieve an accuracy of 87% and an F1-Score of 90%.
821
+ Some partially automated tools have also been developed.
822
+ These flag suspicious activities
823
+ that can then by investigated by regulators.
824
+ Delort et al.
825
+ [11] used Naive Bayes classifiers to
826
+ examine collected messages from HotCopper, an Australian stock message board. They successfully
827
+ identified messages of concern, but the number of false positives was too high to use the model
828
+ in an automated way. Owda et al. [25] compared messages to lexicon templates of known illegal
829
+ financial activities (e.g. Pump and Dump, Insider Information). They found that, of the 3000
830
+ comments that were collected on a daily basis, 0.2% were deemed suspicious.
831
+ 6
832
+ Conclusion
833
+ The intersection of social media with low-cost trading platforms and naive investors has made
834
+ market manipulation an attractive strategy.
835
+ Pump&dump is particularly simple to implement
836
+ since it requires only the dissemination of fictional information about the future prospects for a
837
+ stock. This is particular easy for penny stocks where validating information is difficult for ordinary
838
+ investors, and where relatively small purchase volumes can cause large price movements.
839
+ We investigate protecting investors, and assisting regulators, by building predictive models that
840
+ label social media posts (and the responses they elicit) as potential drivers of P&D events. We
841
+ do this by collecting posts and comments, developing a model for a P&D event based on patterns
842
+ of price and volume changes, using the match between posts and P&D events to label posts, and
843
+ 15
844
+
845
+ extending this labelling to comments using an agreement model. Natural language predictors then
846
+ learn the language patterns associated with P&D manipulations, so that new manipulations can
847
+ be detected before they affect the market.
848
+ Data is imbalanced, since manipulations are rare, but our best predictive model achieves an
849
+ F1-score of 62% and an accuracy of 85%. Improvements in performance are limited by potential
850
+ coincidences between a post and a price and volume change that mimics a P&D, posts that fail to
851
+ reach a sufficient audience to cause the desired buying behaviour, and natural language issues that
852
+ arise from informal and short texts, and a specialised vocabulary used in stock discussion forums.
853
+ References
854
+ [1] R.K. Aggarwal and Guojun Wu.
855
+ Stock Market Manipulations.
856
+ The Journal of Business,
857
+ 79(4):1915–1953, July 2006.
858
+ [2] Ran Aroussi.
859
+ yfinance.
860
+ https://aroussi.com/post/python-yahoo-finance, Accessed:
861
+ 2021-09-02.
862
+ [3] Kevin W. Bowyer, Nitesh V. Chawla, Lawrence O. Hall, and W. Philip Kegelmeyer. SMOTE:
863
+ Synthetic Minority Over-sampling Technique. CoRR, abs/1106.1813, 2011.
864
+ [4] Jason Brownlee.
865
+ A Gentle Introduction to Long Short-Term Memory Networks by the
866
+ Experts, Feb 2020. https://machinelearningmastery.com/gentle-introduction-long-
867
+ short-term-memory-networks-experts/, Accessed: 2021-09-17.
868
+ [5] Jason Brownlee.
869
+ A Gentle Introduction to XGBoost for Applied Machine Learning, Apr
870
+ 2020.
871
+ https://machinelearningmastery.com/gentle-introduction-xgboost-applied-
872
+ machine-learning/, Accessed: 2021-09-15.
873
+ [6] Jason Brownlee. How to Develop a Bidirectional LSTM For Sequence Classification in Python
874
+ with Keras, Aug 2020. https://machinelearningmastery.com/develop-bidirectional-
875
+ lstm-sequence-classification-python-keras/, Accessed: 2021-09-18.
876
+ [7] Yi Cao, Yuhua Li, Sonya Coleman, Ammar Belatreche, and T M McGinnity. Detecting Price
877
+ Manipulation in the Financial Market.
878
+ In Proceedings of the IEEE/IAFE Computational
879
+ Intelligence for Financial Engineering (CIFEr), page 8, March 2014.
880
+ [8] Carole Comerton-Forde and T¯alis J. Putni¸nˇs.
881
+ Stock Price Manipulation: Prevalence and
882
+ Determinants. Review of Finance, 18(1):23–66, 03 2013.
883
+ [9] Canadian securities regulators warn public of coronavirus-related investment scams, Mar 2020.
884
+ https://www.securities-administrators.ca/aboutcsa.aspx?id=1878, Accessed:
885
+ 2021-
886
+ 09-06.
887
+ [10] James Dacombe.
888
+ An introduction to Artificial Neural Networks (with example), Oct
889
+ 2017.
890
+ https://medium.com/@jamesdacombe/an-introduction-to-artificial-neural-
891
+ networks-with-example-ad459bb6941b, Accessed: 2021-09-16.
892
+ [11] Jean-Yves Delort, Bavani Arunasalam, and Cecile Paris.
893
+ Automatic moderation of online
894
+ discussion sites. International Journal of Electronic Commerce, 15(3):9–30, 2011.
895
+ 16
896
+
897
+ [12] David Diaz, Babis Theodoulidis, and Pedro Sampaio. Analysis of stock market manipulations
898
+ using knowledge discovery techniques applied to intraday trade prices. Expert Systems with
899
+ Applications, 38(10):12757–12771, September 2011.
900
+ [13] Ethan Fast, Binbin Chen, and Michael S. Bernstein. Empath: Understanding Topic Signals in
901
+ Large-Scale Text. In Proceedings of the 2016 CHI Conference on Human Factors in Computing
902
+ Systems, pages 4647–4657, San Jose California USA, May 2016. ACM.
903
+ [14] Rohith Gandhi.
904
+ Support Vector Machine - Introduction to Machine Learning Algorithms,
905
+ Jul 2018.
906
+ https://towardsdatascience.com/support-vector-machine-introduction-
907
+ to-machine-learning-algorithms-934a444fca47, Accessed: 2021-09-15.
908
+ [15] Bilal Ghanem, Paolo Rosso, and Francisco Rangel.
909
+ Stance detection in fake news a com-
910
+ bined feature representation. In Proceedings of the First Workshop on Fact Extraction and
911
+ VERification (FEVER), pages 66–71, Brussels, Belgium, November 2018. Association for Com-
912
+ putational Linguistics.
913
+ [16] Koosha Golmohammadi, Osmar R. Zaiane, and David Diaz. Detecting stock market manipu-
914
+ lation using supervised learning algorithms. In 2014 International Conference on Data Science
915
+ and Advanced Analytics (DSAA), pages 435–441, Shanghai, China, October 2014. IEEE.
916
+ [17] Haibo He, Yang Bai, E. A. Garcia, and Shutao Li. ADASYN: Adaptive synthetic sampling
917
+ approach for imbalanced learning. In 2008 IEEE International Joint Conference on Neural
918
+ Networks (IEEE World Congress on Computational Intelligence), pages 1322–1328, 2008.
919
+ [18] Yu Chuan Huang and Yao Jen Cheng. Stock manipulation and its effects: pump and dump
920
+ versus stabilization. Review of Quantitative Finance and Accounting, 44(4):791–815, May 2015.
921
+ [19] Josh Kamps and Bennett Kleinberg. To the moon: defining and detecting cryptocurrency
922
+ pump and dumps. Crime Science, 7(1):18, December 2018.
923
+ [20] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553):436–444,
924
+ May 2015.
925
+ [21] Yingjie Li and Cornelia Caragea. Multi-task stance detection with sentiment and stance lexi-
926
+ cons. In Proceedings of the 2019 Conference on Empirical Methods in Natural Language Pro-
927
+ cessing and the 9th International Joint Conference on Natural Language Processing (EMNLP-
928
+ IJCNLP), pages 6299–6305, Hong Kong, China, November 2019. Association for Computa-
929
+ tional Linguistics.
930
+ [22] Scott M Lundberg and Su-In Lee. A Unified Approach to Interpreting Model Predictions. In
931
+ I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett,
932
+ editors, Advances in Neural Information Processing Systems 30, pages 4765–4774. Curran
933
+ Associates, Inc., 2017.
934
+ [23] Mehrnoosh Mirtaheri, Sami Abu-El-Haija, Fred Morstatter, Greg Ver Steeg, and Aram Gal-
935
+ styan. Identifying and Analyzing Cryptocurrency Manipulations in Social Media. preprint,
936
+ Open Science Framework, February 2019.
937
+ 17
938
+
939
+ [24] Chris B. Murphy.
940
+ Penny Stock, Aug 2020.
941
+ https://www.investopedia.com/terms/p/
942
+ pennystock.asp, Accessed: 2021-09-02.
943
+ [25] Majdi Owda, Pei Shyuan Lee, and Keeley Crockett. Financial Discussion Boards Irregulari-
944
+ ties Detection System (FDBs-IDS) using information extraction. In 2017 Intelligent Systems
945
+ Conference (IntelliSys), pages 1078–1082, London, September 2017. IEEE.
946
+ [26] Ashwin Rajadesingan and Huan Liu. Identifying users with opposing opinions in Twitter de-
947
+ bates. In William G. Kennedy, Nitin Agarwal, and Shanchieh Jay Yang, editors, Social Com-
948
+ puting, Behavioral-Cultural Modeling and Prediction, pages 153–160, Cham, 2014. Springer
949
+ International Publishing.
950
+ [27] Sanjiv Sabherwal, Salil K. Sarkar, and Ying Zhang. Do Internet Stock Message Boards In-
951
+ fluence Trading? Evidence from Heavily Discussed Stocks with No Fundamental News: Do
952
+ Internet Stock Message Boards Influence Trading? Journal of Business Finance & Accounting,
953
+ 38(9-10):1209–1237, November 2011.
954
+ [28] Investor Alerts and Bulletins:
955
+ Frauds Targeting Main Street Investors – Investor Alert,
956
+ Apr 2020. https://www.sec.gov/oiea/investor-alerts-and-bulletins/ia_frauds, Ac-
957
+ cessed: 2020-09-06.
958
+ [29] Press Release: SEC Charges Microcap Fraud Scheme Participants Attempting to Capitalize on
959
+ the COVID-19 Pandemic, Jun 2020. https://www.sec.gov/news/press-release/2020-131,
960
+ Accessed: 2020-09-06.
961
+ [30] Matt Thomas, Bo Pang, and Lillian Lee. Get out the vote: Determining support or oppo-
962
+ sition from congressional floor-debate transcripts. In Proceedings of the 2006 Conference on
963
+ Empirical Methods in Natural Language Processing, pages 327–335, Sydney, Australia, July
964
+ 2006. Association for Computational Linguistics.
965
+ [31] Friedhelm Victor and Tanja Hagemann. Cryptocurrency Pump and Dump Schemes: Quantifi-
966
+ cation and Detection. In 2019 International Conference on Data Mining Workshops (ICDMW),
967
+ pages 244–251, Beijing, China, November 2019. IEEE.
968
+ [32] Qili Wang, Wei Xu, Xinting Huang, and Kunlin Yang. Enhancing intraday stock price manip-
969
+ ulation detection by leveraging recurrent neural networks with ensemble learning. Neurocom-
970
+ puting, 347:46–58, June 2019.
971
+ [33] Cody Marie Wild. One Feature Attribution Method to (Supposedly) Rule Them All: Shapley
972
+ Values, Jan 2018.
973
+ [34] Thomas Wood.
974
+ Random Forests, Sep 2020.
975
+ https://deepai.org/machine-learning-
976
+ glossary-and-terms/random-forest, Accessed: 2021-09-16.
977
+ [35] XGBoost
978
+ Algorithm:
979
+ XGBoost
980
+ In
981
+ Machine
982
+ Learning,
983
+ May
984
+ 2020.
985
+ https://www.
986
+ analyticsvidhya.com/blog/2018/09/an-end-to-end-guide-to-understand-the-math-
987
+ behind-xgboost/, Accessed: 2021-09-15.
988
+ [36] Yi Cao, Yuhua Li, Sonya Coleman, Ammar Belatreche, and Thomas Martin McGinnity. Adap-
989
+ tive Hidden Markov Model With Anomaly States for Price Manipulation Detection. IEEE
990
+ Transactions on Neural Networks and Learning Systems, 26(2):318–330, February 2015.
991
+ 18
992
+
993
+ [37] Tony Yiu. Understanding Random Forest, Aug 2019. https://towardsdatascience.com/
994
+ understanding-random-forest-58381e0602d2, Accessed: 2021-09-16.
995
+ [38] Hulisi ¨O˘g¨ut, M. Mete Do˘ganay, and Ramazan Akta¸s. Detecting stock-price manipulation in an
996
+ emerging market: The case of Turkey. Expert Systems with Applications, 36(9):11944–11949,
997
+ November 2009.
998
+ 19
999
+
1000
+ Figure 10: CNN SHAP Summary Plot for posts and comments
1001
+ 20
1002
+
1003
+ High
1004
+ buy
1005
+ sectorhealthcare
1006
+ stock
1007
+ get
1008
+ one
1009
+ sectorindustrials
1010
+ go
1011
+ look
1012
+ poob
1013
+ share
1014
+ sell
1015
+ sectortechnology
1016
+ price
1017
+ sectorconsumercyclical
1018
+ Feature value
1019
+ day
1020
+ megathread
1021
+ would
1022
+ company
1023
+ like
1024
+ make
1025
+ sectorcommunicationservices
1026
+ news
1027
+ see
1028
+ hold
1029
+ today
1030
+ post
1031
+ week
1032
+ market
1033
+ sectorunknown
1034
+ think
1035
+ 0.2
1036
+ 0.1
1037
+ 0.0
1038
+ 0.1
1039
+ 0.2
1040
+ 0.3
1041
+ 0.4
1042
+ 0.5
1043
+ LOW
1044
+ SHAP value (impact on model output)
-tE4T4oBgHgl3EQf4A1b/content/tmp_files/2301.05310v1.pdf.txt ADDED
@@ -0,0 +1,1583 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Optimization of Hybrid Power Plants:
2
+ When Is a Detailed Electrolyzer Model Necessary?
3
+ Manuel Tobias Baumhof, Enrica Raheli, Andrea Gloppen Johnsen, and Jalal Kazempour
4
+ Department of Wind and Energy Systems, Technical University of Denmark, Kgs. Lyngby, Denmark
5
+ {mtba, enrah, anglopj, jalal}@dtu.dk
6
+ Abstract—Hybrid power plants comprising renewable power
7
+ sources and electrolyzers are envisioned to play a key role in
8
+ accelerating the transition towards decarbonization. It is common
9
+ in the current literature to use simplified operational models for
10
+ electrolyzers. It is still an open question whether this is a good
11
+ practice, and if not, when a more detailed operational model is
12
+ necessary. This paper answers it by assessing the impact of adding
13
+ different levels of electrolyzer details, i.e., physics and operational
14
+ constraints, to the optimal dispatch problem of a hybrid power
15
+ plant in the day-ahead time stage. Our focus lies on the number
16
+ of operating states (on, off, standby) as well as the number
17
+ of linearization segments used for approximating the non-linear
18
+ hydrogen production curve. For that, we develop several mixed-
19
+ integer linear models, each representing a different level of
20
+ operational details. We conduct a thorough comparative ex-post
21
+ performance analysis under different price conditions, wind farm
22
+ capacities, and minimum hydrogen demand requirements, and
23
+ discuss under which operational circumstances a detailed model
24
+ is necessary. In particular, we provide a case under which a
25
+ simplified model, compared to a detailed one, results in a decrease
26
+ in profit of 1.8% and hydrogen production of 13.5% over a year.
27
+ The key lesson learned is that a detailed model potentially earns
28
+ a higher profit in circumstances under which the electrolyzer
29
+ operates with partial loading. This could be the case for a certain
30
+ range of electricity and hydrogen prices, or limited wind power
31
+ availability. The detailed model also provides a better estimation
32
+ of true hydrogen production, facilitating the logistics required.
33
+ Index Terms—hybrid power plants, electrolyzer, hydrogen,
34
+ mixed-integer linear programming
35
+ I. INTRODUCTION
36
+ A. Background
37
+ In order to limit global warming to a maximum of 1.5 °C,
38
+ greenhouse gas emissions must be reduced to net zero by 2050,
39
+ as called for in the European Green Deal 2019 [1]. Renewable
40
+ hydrogen produced through electrolysis could aid in two
41
+ major challenges on the path towards the net zero goal. First,
42
+ electrolyzers can act as flexible loads and therefore potential
43
+ frequency restoration ancillary service providers, contributing
44
+ to maintaining the power balance in power systems with
45
+ increased penetration of renewable energy sources. Second,
46
+ renewable hydrogen can be further synthesized into other
47
+ green fuels, eventually enabling decarbonization in the hard-
48
+ to-abate sectors, such as heavy transport and industry.
49
+ Hybrid power plants comprising of renewable power sources
50
+ (wind and/or solar) and electrolyzers are the key components
51
+ to accelerate the current energy transition through hydrogen
52
+ [2]. Nonetheless, uncertainties in terms of the cost-benefit of
53
+ electrolyzers in the long run have challenged the widespread
54
+ investment in said technologies and thereby large-scale pro-
55
+ duction of renewable-based green hydrogen [3]. In Denmark,
56
+ there is currently a special focus on green hydrogen at the
57
+ governmental level and also, among the regulator, system
58
+ operator, and many industry stakeholders, envisioning a large
59
+ deployment of electrolyzers and other power-to-X facilities in
60
+ the coming years. In 2021 the Danish government published
61
+ a strategy for the national power-to-X development, aiming to
62
+ build 4 to 6 GW of electrolysis capacity by 2030, doubling the
63
+ current Danish peak demand [4]. This emerging trend is not
64
+ limited to Denmark, and many other countries both in Europe
65
+ and globally see hydrogen as a key solution for the realization
66
+ of green societies of the future [2], [5].
67
+ B. Aim and Literature Review
68
+ It is a common practice in the current literature to use a
69
+ simplified operational model for electrolyzers e.g., by using
70
+ a constant power-to-hydrogen conversion ratio irrespective of
71
+ whether the electrolyzer operates in full capacity or not [6]–
72
+ [9]. In addition, some papers do not consider operational states
73
+ of the electrolyzer [6], [9]. This paper challenges these simpli-
74
+ fication practices. While a simplified model works satisfacto-
75
+ rily under certain operational circumstances, there are several
76
+ other circumstances under which a simplified one yields a
77
+ sub-optimal operation of electrolyzers, underestimating their
78
+ value. This paper answers when a detailed operational model
79
+ should be applied, and to what extent the profit and hydrogen
80
+ production can be increased by using a detailed model. We will
81
+ also discuss to what extent a detailed model brings additional
82
+ computational burden.
83
+ In general, two main physical aspects of electrolyzers need
84
+ to be modeled for operation in the day-ahead time stage:
85
+ 1) Electrolyzer efficiency: The power-to-hydrogen conver-
86
+ sion efficiency is a function of the power consumption
87
+ of the electrolyzer. To accurately model the hydrogen
88
+ production of the electrolyzer, the varying efficiency
89
+ should be captured, which introduces non-linearities to
90
+ the model. The simple models usually use a constant
91
+ efficiency, while more accurate modeling incorporates
92
+ the non-linearities, which can be later linearized.
93
+ 2) Number of operating states: Proper operational modeling
94
+ of electrolyzers may require introducing three states,
95
+ namely on, off, and standby, to ensure no hydrogen pro-
96
+ duction below a given minimum allowed partial loading,
97
+ for which additional binary variables are needed. Many
98
+ 1
99
+ arXiv:2301.05310v1 [math.OC] 12 Jan 2023
100
+
101
+ papers in the literature do not even model states, thus
102
+ assuming the electrolyzer is always on, or model two
103
+ states only, i.e., on and off, similar to conventional power
104
+ generators1.
105
+ Various studies have incorporated different levels of opera-
106
+ tional details of the electrolyzer into their optimization prob-
107
+ lems. In [7] and [8], a constant efficiency is applied but two
108
+ and three states are modeled, respectively, by adding binary
109
+ variables. In [10], three states are modeled, while assuming a
110
+ linear hydrogen production curve, despite showing that the
111
+ production curve is not well approximated by a first-order
112
+ interpolation. A hybrid power plant including an electrolyzer
113
+ is modeled in [11], where the non-linear hydrogen production
114
+ is linearized between two points, with a single binary variable
115
+ representing the on/off state of the electrolyzer. In [12] a
116
+ quadratic production curve is applied and the resulting non-
117
+ linear program is eventually solved by a heuristic. In [13],
118
+ three states are included, and differently from the other papers,
119
+ the operating temperature is considered as a variable, provid-
120
+ ing an extra degree of freedom in the electrolyzer operation.
121
+ This model allows to take into account the temperature impact
122
+ on the conversion efficiency and the quality of the generated
123
+ heat. The non-linear hydrogen production is then linearized
124
+ around a fixed reference operating point to formulate the
125
+ problem as a mixed-integer linear program (MILP).
126
+ C. Contributions and Paper Organization
127
+ To the best of our knowledge, there is a lack of a com-
128
+ prehensive analysis in the current literature, identifying the
129
+ operational circumstances under which a simple model ends
130
+ up in a sub-optimal operation of electrolyzers, resulting in a
131
+ reduced profit and hydrogen production2. This paper bridges
132
+ such a gap through the following contributions:
133
+ • To embed constraints describing the physics of electrolyz-
134
+ ers while keeping the final model as a MILP,
135
+ • To thoroughly investigate ex-post the impact of the in-
136
+ clusion of different operational details on the final profit
137
+ of the hybrid power plant and the amount of hydrogen
138
+ produced,
139
+ • and finally, to provide a set of recommendations in
140
+ terms of including operational details of electrolyzers,
141
+ depending on the application, the range of electricity
142
+ prices, and the hydrogen price.
143
+ Without loss of generality, this paper focuses on alkaline
144
+ electrolyzers, as they are currently the most mature tech-
145
+ nology [14]. The proposed model can be extended to other
146
+ low-temperature electrolyzers, such as polymer electrolyte
147
+ membrane (PEM). More operational characteristics may be
148
+ necessary for modeling solid-oxide electrolyzers (SOEC).
149
+ 1We will discuss later in Section IV that under some operational conditions,
150
+ a two-state model including on and standby states works well too. In contrast,
151
+ the two-state model on-off is not satisfactory neither in terms of dispatch
152
+ decisions nor the computational performance.
153
+ 2Reference [13] provides a similar analysis, however, the Faraday efficiency
154
+ is assumed to be one. The consequences of this assumption will be further
155
+ discussed in Section II-B.
156
+ The rest of the paper is organized as follows. Section II
157
+ describes the electrolyzer physics, focusing on the operating
158
+ states and the hydrogen production curve. Section III provides
159
+ the proposed MILP, representing all three states of the elec-
160
+ trolyzer. Section IV discusses the impact of the electrolyzer
161
+ modeling choices by means of a test case and a thorough
162
+ sensitivity analysis. Section V concludes the paper. Finally,
163
+ Appendices A and B provide two MILPs (simpler than the
164
+ one proposed in Section III), both representing two states of
165
+ the electrolyzer only, where one is a model with on-off states,
166
+ and the other one is a model with on-standby states.
167
+ II. ELECTROLYZER PHYSICS
168
+ The core of the renewable-hydrogen hybrid power plant is
169
+ the electrolyzer, where water is decomposed into hydrogen
170
+ and oxygen by means of electrical power. The physics and
171
+ operating characteristics of alkaline electrolyzers are described
172
+ in this section and will be formulated as a set of mixed-integer
173
+ linear constraints in Section III.
174
+ A. States
175
+ To describe and model the real operation of an alkaline
176
+ electrolyzer, it is necessary to distinguish three different states:
177
+ 1) On state: the electrolyzer operates within its feasible
178
+ load range, consuming power and producing hydrogen with a
179
+ conversion efficiency that depends on the partial load, which
180
+ will be explained in Section II-B. The minimum operating
181
+ power for alkaline electrolyzers is around 15-20% of the
182
+ nominal power, below which the electrolyzer must go into
183
+ standby or off.
184
+ 2) Standby state: the electrolyzer does not produce any
185
+ hydrogen but consumes the power needed to maintain the
186
+ system temperature and pressure so that it can rapidly resume
187
+ production. The value of the standby power consumption is
188
+ not usually disclosed by manufacturers, but values between
189
+ 1-5% of the electrolyzer full load capacity have been adopted
190
+ in the literature [7], [8], [10]. The time needed to switch from
191
+ standby to on, i.e., a warm start-up is of the order of 30 seconds
192
+ [8].
193
+ 3) Off state: the electrolyzer is shut down completely and
194
+ does not consume any power nor produce any hydrogen. How-
195
+ ever, to switch back to on, a significant amount of electricity
196
+ is needed, corresponding to a cold start-up cost. Moreover,
197
+ at least 20 minutes are necessary before resuming hydrogen
198
+ production [8]. Apart from the introduced cold start-up cost
199
+ and start-up time, the frequent shut down of the electrolyzer
200
+ may have a negative impact on the device degradation and
201
+ lifetime [15].
202
+ B. Efficiency and Production Curve
203
+ The conversion efficiency of electricity into hydrogen is not
204
+ constant but depends on the partial load, i.e., the ratio between
205
+ power consumption at a specific time and the nominal power
206
+ of the electrolyzer. The variation of the efficiency based on the
207
+ operating set-point is mainly due to two phenomena: (i) the
208
+ current-voltage relationship, also called the polarization curve,
209
+ 2
210
+
211
+ 10
212
+ 20
213
+ 30
214
+ 40
215
+ 50
216
+ Power [MW]
217
+ 17.5
218
+ 18.0
219
+ 18.5
220
+ 19.0
221
+ 19.5
222
+ Efficiency [kg/MWh]
223
+ (a)
224
+ 10
225
+ 20
226
+ 30
227
+ 40
228
+ 50
229
+ Power [MW]
230
+ 200
231
+ 400
232
+ 600
233
+ 800
234
+ Hydrogen [kg/h]
235
+ (b)
236
+ Non-linear curve
237
+ Approximated curve
238
+ pe *
239
+ h*
240
+ hr
241
+ } h
242
+ Fig. 1. Plot (a): the efficiency curve, and plot (b): the hydrogen production
243
+ curve of a 52.25-MW alkaline electrolyzer, as a function of the electric power
244
+ consumption, working at 90 °C and 30 bar. The black curves represent the
245
+ original non-linear curves. Approximated by two segments, the red curve in
246
+ plot (b) is the piecewise linearized hydrogen production curve. The non-linear
247
+ efficiency curve corresponding to this piecewise linearization is represented
248
+ by the red curve in plot (a). In our formulation, we will only use the red
249
+ piecewise linear production curve in plot (b). The inner plot of (b) shows
250
+ the hydrogen production discrepancy ∆h between original and approximated
251
+ curves, for a given power consumption level.
252
+ and (ii) the Faraday efficiency. We explain both phenomena in
253
+ the following.
254
+ The current-voltage relationship describes the voltage in-
255
+ crease (also called over-voltage or over-potential) with increas-
256
+ ing current density, due to different losses, as explained in [16]
257
+ and [13]. Ulleberg [17] introduced a widely adopted empirical
258
+ formulation that describes the relationships between voltage,
259
+ current density, and electrolyzer operating temperature. To fur-
260
+ ther take into account the operating pressure, this formulation
261
+ was modified by Sanchez et al. [18]. For a given temperature
262
+ and pressure, this can be formulated as
263
+ U cell(i) = U rev + K1i + K2log(K3i + 1),
264
+ (1)
265
+ where U cell(i) is the cell voltage as a function of the current
266
+ density i. In addition, U rev is the open-circuit voltage (i.e.,
267
+ voltage corresponding to current density equal to zero). The
268
+ parameters K1, K2, K3 are constants obtained from experi-
269
+ mental data and can be found in [18]. Voltage U rev can be
270
+ calculated for a specific operating temperature according to
271
+ an empirical equation that can be found in [18]. The power
272
+ consumed by the electrolyzer pe(i) can be calculated as
273
+ pe(i) = U cell(i)iA,
274
+ (2)
275
+ where A is the total area of the cells composing the elec-
276
+ trolyzer. The Faraday law calculates the hydrogen production
277
+ h(i) of the electrolyzer as
278
+ h(i) = 3600 · ηF(i)M H2iA
279
+ 2F
280
+ ,
281
+ (3)
282
+ where h(i) is the hydrogen production rate in kg/h, M H2 is the
283
+ molar mass of hydrogen in kg/mol, F is the Faraday constant,
284
+ and ηF(i) is the Faraday efficiency as a function of current
285
+ density. The latter is defined as the ratio between the actual and
286
+ the theoretical maximum amount of hydrogen produced. The
287
+ difference between actual and theoretical output is explained
288
+ in [17], and it increases significantly when the electrolyzer
289
+ is working at low-current densities. In [18], an empirical
290
+ expression that captures the relationship between the Faraday
291
+ efficiency and the current density at a given temperature is
292
+ provided: ηF(i) is close to one for higher current densities, and
293
+ it drops to zero when reducing the current. The electrolyzer
294
+ efficiency is defined as
295
+ η(i) = h(i)
296
+ pe(i),
297
+ (4)
298
+ where generally η(i) is expressed in kg/MWh. For different
299
+ values of i, the black curve in Figure 1(a) shows efficiency η(i)
300
+ versus power consumption pe(i). In addition, the black curve
301
+ in Figure 1(b) shows the hydorgen production h(i) versus
302
+ power consumption pe(i). For notational clarity, we drop (i)
303
+ in the rest of the paper. The black curves in Figure 1 show that
304
+ the model is non-linear. The efficiency has a peak at around
305
+ 30% of the load. This characteristic peak in the efficiency
306
+ curve is not captured when a constant conversion efficiency is
307
+ used, as done in [6], [8], [10], or when the Faraday efficiency
308
+ is assumed to be equal to one in the entire feasible operating
309
+ range, as done in [13].
310
+ To keep the final problem a MILP, but describe the hydrogen
311
+ production with more details, we use a piecewise linearization
312
+ of the hydrogen production curve as shown by the red curve in
313
+ Figure 1(b), for two linearization segments. For each segment
314
+ s ∈ S, the As (slope) and Bs (intercept) coefficients of the
315
+ line can be calculated such that the approximated hydrogen
316
+ production is Aspe + Bs. Later we will define a binary
317
+ variable indicating which segment is active. The proposed
318
+ approximation is exact only at the segment endpoints (i.e.,
319
+ linearization points), otherwise, it is an underestimation of
320
+ the original non-linear curve. For example, the optimal power
321
+ set-point pe∗ in the inset of Figure 1(b) corresponds to the
322
+ hydrogen production h∗ according to the proposed piecewise
323
+ linear model with two segments3. However, the actual hydro-
324
+ gen realization based on the electrolyzer physics is hr. The
325
+ hydrogen production difference ∆h is reduced by increasing
326
+ the number of segments, and the effect of the hydrogen surplus
327
+ obtained when choosing only one segment, as done in [10], is
328
+ discussed in Section IV.
329
+ According to this piecewise linear formulation for the
330
+ hydrogen production curve, the efficiency η for segment s
331
+ can be calculated based on (4), resulting in η = As + Bs
332
+ pe .
333
+ This is depicted by the red dotted curve in Figure 1(a), given
334
+ two linearization segments used. Note that it does not present
335
+ a linear behavior. However, this non-linear efficiency curve
336
+ does not appear in our optimization problem. The hydrogen
337
+ production curve is used instead, which is linearized through
338
+ segments, as illustrated by the red dotted curve in Figure 1(b).
339
+ III. PROBLEM FORMULATION
340
+ We consider a hybrid power plant, as depicted in Figure 2,
341
+ consisting of a wind farm, an electrolyzer, a hydrogen com-
342
+ pressor, and a hydrogen storage. The generated wind power
343
+ can be either sold to the grid at the electricity market price,
344
+ 3Symbol ∗ refers to the optimal value.
345
+ 3
346
+
347
+ Wind farm
348
+ Grid
349
+ Electrolyzer
350
+ Compressor
351
+ Hydrogen
352
+ storage
353
+ Hydrogen
354
+ demand
355
+ Electricity
356
+ Hydrogen
357
+ Fig. 2. Schematic representation of a hybrid power plant.
358
+ or consumed by the electrolyzer to produce 100% renewable-
359
+ based green hydrogen. The hydrogen produced can either be
360
+ directly delivered to the demand or temporarily stored in an on-
361
+ site hydrogen storage, with an associated cost for compressing
362
+ the gas. The dashed blue line in Figure 2 represents the option
363
+ to buy electricity from the grid only to supply the electrolyzer’s
364
+ standby power when there is no wind power.
365
+ The hydrogen price is assumed to be a single-value constant,
366
+ and the hybrid power plant serves a minimum daily hydrogen
367
+ demand. We assume the plant has perfect foresight of future
368
+ wind power production and electricity price. Given the 1-hour
369
+ time resolution in our model, we neglect the ramping limitation
370
+ which are typically around ±20% of the nominal power per
371
+ second [10], as well as the warm and cold start-up times of
372
+ the electrolyzer.
373
+ For the optimal operation of the hybrid power plant, we
374
+ develop a complete MILP in Section III-A accounting for
375
+ three states of the electrolyzer and then provide two simplified
376
+ counterparts in Section III-B, each with two states of the
377
+ electrolyzer.
378
+ Notation: All parameters are upper-case or Greek letters,
379
+ whereas all variables are lower-case letters. All binary vari-
380
+ ables are noted by z.
381
+ A. Three-state Model
382
+ The most complete MILP includes the objective function
383
+ (6) constrained by (7)-(29).
384
+ 1) Objective function: Over the set of hours t ∈ T , the
385
+ objective function (6) maximizes the total profit of the hybrid
386
+ power plant as
387
+ max
388
+ x
389
+
390
+ t∈T
391
+ ptλDA
392
+ t
393
+ + dtλh − pin
394
+ t λin
395
+ t − zsu
396
+ t λsu,
397
+ (6)
398
+ where the variable set x will be defined later. The first term
399
+ corresponds to selling power pt to the grid at the day-ahead
400
+ electricity market price λDA
401
+ t
402
+ . The second term pertains to
403
+ delivered hydrogen dt at a fixed price λh. The third term
404
+ represents the cost for purchasing standby power pin
405
+ t to support
406
+ the electrolyzer’s standby state in case the wind power is
407
+ insufficient. The corresponding price is λin
408
+ t
409
+ = λDA
410
+ t
411
+ + λTSO,
412
+ where λTSO is the grid tariff imposed by the Transmission
413
+ System Operator (TSO). Finally, the fourth term corresponds
414
+ to the cold start-up cost of the electrolyzer, where the binary
415
+ variable zsu
416
+ t
417
+ indicates the start-up at hour t, associated with
418
+ the cost per startup λsu.
419
+ 2) Power balance: In every hour t, the power pt sold in the
420
+ day-ahead market is equal to the wind farm power production
421
+ P w
422
+ t plus power pin
423
+ t bought from the grid to support the standby
424
+ state of the electrolyzer, subtracted by the power consumption
425
+ pe
426
+ t of the electrolyzer and the power consumption pc
427
+ t of the
428
+ compressor, such that
429
+ pt = P w
430
+ t + pin
431
+ t − pe
432
+ t − pc
433
+ t
434
+ ∀ t ∈ T .
435
+ (7)
436
+ 3) Limit on pin
437
+ t : The input power pin
438
+ t
439
+ is limited by the
440
+ standby state consumption of the electrolyzer, implying that
441
+ power cannot be bought from the grid to produce hydrogen:
442
+ pin
443
+ t ≤ P sbzsb
444
+ t
445
+ ∀ t ∈ T ,
446
+ (8)
447
+ where the parameter P sb is the standby consumption, and the
448
+ binary variable zsb
449
+ t
450
+ indicates whether the electrolyzer is in the
451
+ standby mode in hour t.
452
+ 4) Electrolyzer operational states: Constraint (9) ensures
453
+ that the electrolyzer can take only one out of three states at
454
+ any hour t, namely online, standby, or off:
455
+ zon
456
+ t
457
+ + zoff
458
+ t
459
+ + zsb
460
+ t
461
+ = 1
462
+ ∀ t ∈ T ,
463
+ (9)
464
+ where similar to zsb
465
+ t , binary variables zon
466
+ t
467
+ and zoff
468
+ t
469
+ indicate
470
+ whether in hour t the electrolyzer is on and off, respectively.
471
+ The states are activated based on the electricity consumption of
472
+ the electrolyzer. In the online state, the electricity consumption
473
+ pe
474
+ t of the electrolyzer can neither exceed the capacity Ce nor
475
+ go below a minimum load limit P min. In the standby state, the
476
+ electricity consumption must be equal to the standby power
477
+ consumption P sb. These constraints are enforced by
478
+ pe
479
+ t ≤ Cezon
480
+ t
481
+ + P sbzsb
482
+ t
483
+ ∀ t ∈ T
484
+ (10)
485
+ pe
486
+ t ≥ P minzon
487
+ t
488
+ + P sbzsb
489
+ t
490
+ ∀ t ∈ T .
491
+ (11)
492
+ To represent the cold start-up of the electrolyzer, the binary
493
+ variable zsu
494
+ t
495
+ is defined, taking the value 1 in the case of
496
+ a transition from off to on state in hour t, as enforces by
497
+ constraints (12) and (13). Further, constraint (14) ensures
498
+ that the transition from an off-state to a standby-state is not
499
+ allowed, to avoid bypassing of the start-up cost.
500
+ zsu
501
+ t
502
+ ≥ zon
503
+ t
504
+ − zon
505
+ t−1 − zsb
506
+ t−1
507
+ ∀ t ∈ T \1,
508
+ (12)
509
+ zsu
510
+ t=1 = 0,
511
+ (13)
512
+ zoff
513
+ t−1 + zsb
514
+ t
515
+ ≤ 1
516
+ ∀ t ∈ T \1.
517
+ (14)
518
+ 5) Electrolyzer hydrogen production: The hydrogen pro-
519
+ duction ht is a function of the electricity consumption of the
520
+ electrolyzer. As explained in Section II-B, for each segment
521
+ s ∈ S, a linear function of the segment power consumption
522
+ ˆpe
523
+ ts with slope As and intercept Bs is defined, such that
524
+ ht =
525
+
526
+ s∈S
527
+ (Asˆpe
528
+ ts + Bszh
529
+ ts)
530
+ ∀ t ∈ T ,
531
+ (15)
532
+ where the binary variable zh
533
+ ts defines which segment s is active
534
+ in hour t. Each segment is valid within a pre-defined interval
535
+ of upper P s and lower P s power consumption levels, i.e.,
536
+ P szh
537
+ ts ≤ ˆpe
538
+ ts ≤ P szh
539
+ ts
540
+ ∀ t ∈ T , s ∈ S.
541
+ (16)
542
+ 4
543
+
544
+ VectorStock
545
+ VectorStock.com/24756804shutterstock.com • 1658641081Constraint (17) ensures that hydrogen production happens
546
+ in the online state only, while one segment only can be active
547
+ at any hour t. In addition, (18) computes the total power
548
+ consumption of the electrolyzer:
549
+ zon
550
+ t
551
+ =
552
+
553
+ s∈S
554
+ zh
555
+ t,s
556
+ ∀ t ∈ T
557
+ (17)
558
+ pe
559
+ t =
560
+
561
+ s∈S
562
+ ˆpe
563
+ ts + P sbzsb
564
+ t
565
+ ∀ t ∈ T .
566
+ (18)
567
+ 6) Hydrogen storage: Constraints (19)-(25) represent the
568
+ storage operation:
569
+ ht = hd
570
+ t + sin
571
+ t
572
+ ∀ t ∈ T ,
573
+ (19)
574
+ dt = hd
575
+ t + sout
576
+ t
577
+ ∀ t ∈ T ,
578
+ (20)
579
+ sout
580
+ t
581
+ ≤ Sout
582
+ ∀ t ∈ T ,
583
+ (21)
584
+ pc
585
+ t = Kcsin
586
+ t
587
+ ∀ t ∈ T ,
588
+ (22)
589
+ st=1 = Sini + sin
590
+ t=1 − sout
591
+ t=1
592
+ (23)
593
+ st = st−1 + sin
594
+ t − sout
595
+ t
596
+ ∀ t ∈ T \1,
597
+ (24)
598
+ st ≤ Cs
599
+ ∀ t ∈ T .
600
+ (25)
601
+ The hydrogen produced ht can either go directly to the demand
602
+ hd
603
+ t or be injected into the hydrogen storage sin
604
+ t , as enforced
605
+ by (19). The total hydrogen dt delivered to the demand is
606
+ equal to the sum of hydrogen directly from the electrolyzer
607
+ and that from the storage sout
608
+ t
609
+ , as per (20). The storage
610
+ output of every hour is limited by the output flow capacity
611
+ Sout in (21). Further, the compressor consumes power pc to
612
+ compress the hydrogen injected into the storage. Assuming
613
+ adiabatic compression, the compression coefficient Kc can be
614
+ calculated, as proposed by [13]. The power consumption for
615
+ compression is then (22). The state of charge of the hydrogen
616
+ storage in the initial and following hours is calculated by
617
+ (23) and (24), where Sini is the hydrogen initially stored in
618
+ the storage at the beginning of time horizon T . The storage
619
+ hydrogen mass capacity Cs is enforced by (25). Note that we
620
+ do not impose any constraint for the energy stored at the end
621
+ of time horizon T . Therefore, pursuing profit maximization in
622
+ this time horizon, the hybrid power plant will leave the storage
623
+ empty in the last hour4.
624
+ 7) Hydrogen demand: Imagine within the underlying time
625
+ horizon T , which could be, for example, a year, there are N
626
+ number of time subsets, e.g., 365 days, indexed by n, such
627
+ that there is a minimum hydrogen demand for each n:
628
+
629
+ t∈Hn
630
+ dt ≥ Dmin
631
+ n
632
+ ∀ n ∈ {1, ..., N},
633
+ (26)
634
+ where Hn is the set of hours within time subset n.
635
+ 8) Variable declaration: Constraint (27) declares the non-
636
+ negativity conditions:
637
+ dt, ht, hd
638
+ t , pt, pc
639
+ t, pin
640
+ t , ˆpe
641
+ ts, st, sin
642
+ t , sout
643
+ t
644
+ ∈ R+.
645
+ (27)
646
+ 4One can enforce a constraint on the minimum stored hydrogen at the end
647
+ of the time horizon, or add a value for this stored energy to the objective
648
+ function.
649
+ Constraint (28) lists binary variables:
650
+ zsu
651
+ t , zh
652
+ ts, zon
653
+ t , zoff
654
+ t , zsb
655
+ t
656
+ ∈ {0, 1}.
657
+ (28)
658
+ Therefore, the total number of binary variables is |T |(4 +
659
+ |S|) binaries, where |T | and |S|, respectively, are the number
660
+ of hours and the number of segments used to linearize the
661
+ hydrogen production curve. Finally, the variable set x is
662
+ defined as
663
+ x = {dt, ht, hd
664
+ t , pt, pc
665
+ t, pin
666
+ t , ˆpe
667
+ ts,
668
+ sin
669
+ t , st, sout
670
+ t
671
+ , zsu
672
+ t , zh
673
+ ts, zon
674
+ t , zoff
675
+ t , zsb
676
+ t }.
677
+ (29)
678
+ Accordingly, in addition to |T |(4+|S|) number of binary vari-
679
+ ables, we have |T |(9 + |S|) number of continuous variables.
680
+ B. Two-state Models
681
+ The optimal operation problem (6)-(29) of the hybrid power
682
+ plant accounting for three states of the electrolyzer can be
683
+ simplified if two states only are considered, either on-off states
684
+ or on-standby states. Both result in MILPs.
685
+ In the latter, i.e., the MILP with on-off states, one binary
686
+ variable (instead of three) per hour t is sufficient, such that it
687
+ indicates whether the electrolyzer in the given hour is on or
688
+ off. The resulting MILP is provided in Appendix A. The total
689
+ number of binary variables in this MILP is |T |(2 + |S|).
690
+ Similarly, a single binary variable per hour t is enough
691
+ in the MILP with on-standby states, indicating whether the
692
+ electrolyzer is online or in standby mode. Also, the start-up
693
+ binary variable is not needed. The corresponding MILP is
694
+ given in Appendix B, where among three MILPs, we need
695
+ the lowest number of binary variables, i.e., |T |(1 + |S|).
696
+ IV. NUMERICAL STUDY
697
+ We apply the proposed MILPs of Section III to a case study
698
+ and investigate how the optimal operation of the hybrid power
699
+ and the resulting profit change by adding more operational
700
+ details of the electrolyzer. All source codes and input data are
701
+ publicly shared5. We consider several options for the number
702
+ of linearization segments, i.e., |S|, used to approximate the
703
+ hydrogen production curve of the electrolyzer, including 1, 2,
704
+ 4, 8, and 12 segments. Also, we consider three options for
705
+ the number of electrolyzer states: three states on-off-standby
706
+ (OOS), two states on-standby (OS), and two states on-off
707
+ (OO). In the rest of this section, we will refer to various
708
+ models as, for example, OOS-12, implying we consider three
709
+ states (OOS) with 12 segments. Finally, we conduct a sensitiv-
710
+ ity analysis to explore the impact of various input parameters,
711
+ such as wind farm capacity, hydrogen demand, and hydrogen
712
+ price, on the operation of the hybrid power plant.
713
+ A. Case Study
714
+ We consider a hybrid power plant whose structure equals
715
+ the one in Figure 2, and its input data is provided in Table I.
716
+ The capacity of the wind farm is 104.5 MW, corresponding to
717
+ 11 V164-9.5 MW™ Vestas turbines, located in Køge Bay,
718
+ 5GitHub: https://github.com/mtba-dtu/detailed-electrolyzer-model
719
+ 5
720
+
721
+ TABLE I
722
+ INPUT DATA FOR THE CASE STUDY
723
+ Wind farm
724
+ Capacity
725
+ Cw
726
+ 104.5
727
+ MW
728
+ Electrolyzer
729
+ Capacity
730
+ Ce
731
+ 50%
732
+ of Cw
733
+ Standby load
734
+ P sb
735
+ 1%
736
+ of Ce
737
+ Minimum load
738
+ P min
739
+ 15%
740
+ of Ce
741
+ Pressure
742
+ 30
743
+ bar
744
+ Temperature
745
+ 90
746
+ °C
747
+ Max. current density
748
+ 5,000
749
+ A/m2
750
+ Start-up cost
751
+ λsu
752
+ 2,612.50
753
+ C [10]
754
+ TSO tariff
755
+ λTSO
756
+ 15.06
757
+ C/MWh
758
+ Storage
759
+ Capacity
760
+ Cs
761
+ 22,000
762
+ kg
763
+ Maximum output
764
+ Sout
765
+ 912.13
766
+ kg/h
767
+ Compressor
768
+ Inlet temperature
769
+ 40
770
+ °C
771
+ Inlet pressure
772
+ 30
773
+ bar
774
+ Outlet pressure
775
+ 200
776
+ bar
777
+ Mechanical efficiency
778
+ 75%
779
+ Hydrogen
780
+ Price
781
+ λh
782
+ 2.10
783
+ C/kg
784
+ Minimum demand
785
+ Dmin
786
+ n
787
+ 3,667
788
+ kg/day
789
+ Denmark. The electrolyzer capacity is set to 50% of the
790
+ wind farm capacity, amounting to 52.25 MW. The modeling
791
+ horizon spans one year with an hourly temporal resolution.
792
+ We apply hourly electricity price data for 2019, as price data
793
+ for the following years might be distorted by macroeconomic
794
+ impacts, such as COVID-19. Day-ahead electricity prices for
795
+ the East Denmark area (DK2) are obtained from ENTSO-e
796
+ Transparency platform [19] and hourly historical wind capac-
797
+ ity factors at the given location for 2019 are retrieved from
798
+ the Renewable.ninja web platform [20]. The average yearly
799
+ capacity factor for the selected location is 43.7%. The hybrid
800
+ power plant is only allowed to buy power from the grid to
801
+ keep the electrolyzer in standby mode, in case the wind power
802
+ is insufficient. In that case, the electricity is bought at the
803
+ hourly day-ahead market price plus the grid tariff of the TSO.
804
+ Since the wind farm is located in DK2, the consumption tariff
805
+ imposed by the Danish TSO, Energinet, is applied [21]. The
806
+ minimum daily demand can be met by the full-load operation
807
+ of the electrolyzer for around four hours. The hydrogen storage
808
+ is scaled to store all hydrogen produced if the electrolyzer
809
+ operates at full capacity for 24 consecutive hours.
810
+ B. Impacts of the Number of Segments
811
+ Let us consider the OOS case with three states, for which
812
+ we solve the proposed MILP (6)-(29). We start with OOS-1,
813
+ where |S| = 1. This means the original non-linear hydrogen
814
+ production curve, depicted in Figure 1(b), is approximated by
815
+ a single linear curve. Here, the minimum power consumption
816
+ P min and the capacity Ce of the electrolyzer are taken as
817
+ two endpoints. By moving to OOS-2, where the number of
818
+ segments |S| is 2, we consider an additional point P η,max,
819
+ which refers to the power consumption level corresponding to
820
+ the peak in the efficiency curve in Figure 1(a). By increasing
821
+ |S| to 4, and then to 8, the mean load value between existing
822
+ points is added, splitting one segment into two. The same
823
+ procedure but only on the right side of P η,max is applied
824
+ when we move from OOS-8 to OOS-12, as this side covers
825
+ 1
826
+ 6
827
+ 12
828
+ 18
829
+ 24
830
+ 0
831
+ 20
832
+ 40
833
+ 60
834
+ Electrolyzer power [MW]
835
+ (a)
836
+ 1
837
+ 6
838
+ 12
839
+ 18
840
+ 24
841
+ Time [h]
842
+ (b)
843
+ 1
844
+ 6
845
+ 12
846
+ 18
847
+ 24
848
+ (c)
849
+ Ce
850
+ P , max
851
+ Pmin
852
+ Psb
853
+ pe
854
+ t
855
+ DA
856
+ t
857
+ 25
858
+ 32
859
+ 38
860
+ 45
861
+ Day-ahead price [ /MWh]
862
+ Fig. 3.
863
+ The power consumption schedule of the electrolyzer (pe
864
+ t) in an
865
+ example high-wind day when its hydrogen production curve is linearized
866
+ by (a) 1, (b) 4, and (c) 12 segments. These three plots, from left to right,
867
+ correspond to cases OOS-1, OOS-4, and OOS-12, respectively.
868
+ over around 70% of the feasible operating range. With the
869
+ adoption of this procedure, all cases from OOS-2 to OOS-12
870
+ include the point P η,max. In addition, points are not removed
871
+ when refining the discretization. By adding more segments, the
872
+ hydrogen production curve and thus the electrolyzer efficiency
873
+ with partial loading is more accurately represented.
874
+ The increase in the number of segments |S| enables the
875
+ electrolyzer to consume power more flexibly, as depicted in
876
+ Figure 3, where the optimal power consumption schedule of
877
+ the electrolyzer for one example day of the year is shown
878
+ for three different numbers of segments (1, 4, and 12). It is
879
+ observed that when the optimal power consumption of the
880
+ electrolyzer is not constrained by wind production shortage,
881
+ as on the chosen day, the optimal consumption level is always
882
+ one of the piecewise linearization points. There are instances,
883
+ e.g., hour 5 in Figure 3, where OOS-1 goes into the standby
884
+ state as the day-ahead price is too high for profitable hydrogen
885
+ production. In contrast, OOS-4 and OOS-12 continue the
886
+ operation in the on state, but at the power consumption level
887
+ corresponding to the maximum efficiency, where hydrogen
888
+ production is still profitable.
889
+ The number of segments |S| plays an important role in the
890
+ optimal dispatch decision when the day-ahead price lies within
891
+ a specific price range. The upper bound of this price range
892
+ corresponds to the highest price for which the production of
893
+ hydrogen is still profitable. The lower bound is the price below
894
+ which the optimal dispatch decision is always the maximum
895
+ electrolyzer consumption. Figure 4 shows the distribution of
896
+ the day-ahead price λDA
897
+ t
898
+ over 8,760 hours of year 2019 in
899
+ DK2 with the bounds of the price range of interest are marked
900
+ by the red and green dotted lines. The upper bound is found
901
+ as the day-ahead price for which the hydrogen production is
902
+ only feasible at the maximum efficiency, denoted by α in the
903
+ inner plot of Figure 4. The lower bound corresponds to the
904
+ efficiency at the full load, denoted by β. If the day-ahead price
905
+ of a given hour lies outside of this range, the dispatch decision
906
+ for any number of segments would be the same; produce at
907
+ the maximum possible load or cease the production, and there
908
+ would be no added value of a detailed production curve 6.
909
+ This will be further investigated in Section IV-F.
910
+ 6These two price thresholds are calculated by multiplying the hydrogen
911
+ price and the efficiency at points β and α, respectively.
912
+ 6
913
+
914
+ 25
915
+ 30
916
+ 35
917
+ 40
918
+ 45
919
+ 50
920
+ 55
921
+ Day-ahead price [ /MWh]
922
+ 0
923
+ 50
924
+ 100
925
+ 150
926
+ 200
927
+ 250
928
+ 300
929
+ 350
930
+ Frequency
931
+ Price
932
+ Price mean
933
+ Power [%]
934
+ Efficiency
935
+ [kg/MWh]
936
+ Fig. 4. Histogram of the day-ahead electricity price over 8,760 hours of year
937
+ 2019 in DK2. Prices λα and λβ correspond to electricity prices for which
938
+ the electrolyzer operates at points α and β, indicated in the inner plot.
939
+ C. Impacts of the States
940
+ We consider three cases OOS, OO, and OS, each for both
941
+ 1 and 12 segments. Recall that their corresponding MILPs
942
+ are different7. Comparing the results of MILPs with the same
943
+ number of segments, we observe OS and OOS perform almost
944
+ equally, as observed in Figure 5. The reason for this is the low
945
+ frequency of consecutive hours of too high day-ahead prices,
946
+ where a complete shut-off would be preferred over the standby
947
+ state. Over 8,760 hours, OOS-1 starts up only 2 times, with a
948
+ total of 286 hours offline. The difference in results obtained for
949
+ OS and OOS increases if a higher standby power consumption
950
+ or lower cold start-up cost for the electrolyzer is assumed,
951
+ which would lead to more frequent shut-offs. On the contrary,
952
+ OO earns the lowest profit, mainly due to the high start-up
953
+ cost, which decreases the operational flexibility as even a short
954
+ pause in production incurs a high cost.
955
+ D. Ex-post Performance Analysis
956
+ Recall that three MILPs solve the problem based on the
957
+ linearized hydrogen curve. Through the following ex-post
958
+ performance analysis, it is seen that this leads to both sub-
959
+ optimal dispatch decisions and an underestimation of the true
960
+ amount of hydrogen produced. We have already observed in
961
+ Figure 1(b) that the linearized red curve is below the original
962
+ black non-linear hydrogen production curve, implying that the
963
+ hydrogen production might be underestimated. This means that
964
+ we can expect to produce more hydrogen than what MILPs
965
+ calculate. Such a difference is expected to be reduced by
966
+ using more segments |S| to approximate the original non-
967
+ linear hydrogen production curve.
968
+ Pursuing a fair comparison among models, we conduct an
969
+ ex-post performance analysis. Once the MILPs are solved and
970
+ the optimal power consumption pe∗
971
+ t
972
+ of the electrolyzer ob-
973
+ tained, we re-calculate the true amount of hydrogen produced
974
+ based on the original non-linear hydrogen production curve.
975
+ Note that we do not re-optimize the problem8. We refer to
976
+ the amount of extra hydrogen and its corresponding profit as
977
+ 7While we solve the proposed MILP (6)-(29) for OOS, the MILPs
978
+ presented in Appendixes A and B are solved for OO and OS, respectively.
979
+ 8To avoid re-optimization, we assume the extra hydrogen is directly sold to
980
+ the demand and is not stored in the hydrogen storage. Otherwise, one needs to
981
+ re-optimize a posteriori to optimize the operation of storage and compressor.
982
+ 12
983
+ 8
984
+ 4
985
+ 2
986
+ 1
987
+ Number of segments
988
+ 97
989
+ 98
990
+ 99
991
+ 100
992
+ Profit [%]
993
+ OOS
994
+ OS
995
+ OO
996
+ States
997
+ 15.8
998
+ 15.9
999
+ 16.1
1000
+ 16.2
1001
+ Profit [million ]
1002
+ OOS
1003
+ Realized surplus
1004
+ 1 seg.
1005
+ 12 seg.
1006
+ Fig. 5.
1007
+ Estimated and realized surplus profit. The first five bars from the
1008
+ left correspond to OOS-1 to OOS-12. The next six bars show the results for
1009
+ OO-1, OO-12, OS-1, OS-12, OOS-1, and OOS-12, respectively. The right
1010
+ vertical axis is the profit in million C, whereas the left vertical axis is the
1011
+ relative profit in % in comparison to the highest profit achieved by OOS-12.
1012
+ 12
1013
+ 8
1014
+ 4
1015
+ 2
1016
+ 1
1017
+ Number of segments
1018
+ 80
1019
+ 85
1020
+ 90
1021
+ 95
1022
+ 100
1023
+ H2 production [%]
1024
+ OOS
1025
+ OS
1026
+ OO
1027
+ States
1028
+ 2.3
1029
+ 2.5
1030
+ 2.6
1031
+ 2.8
1032
+ 2.9
1033
+ H2 production [thousand tons]
1034
+ OOS
1035
+ Realized surplus
1036
+ 1 seg.
1037
+ 12 seg.
1038
+ Fig. 6. Estimated and realized surplus hydrogen produced. The first five bars
1039
+ from the left correspond to OOS-1 to OOS-12. The next six bars show the
1040
+ results for OO-1, OO-12, OS-1, OS-12, OOS-1, and OOS-12, respectively.
1041
+ “realized surplus”. We assume that all extra hydrogen is sold
1042
+ at the same constant price, i.e., C2.10/kg.
1043
+ Figure 5 provides the estimated and realized surplus profit
1044
+ among different cases. The estimated profit (gray area) is
1045
+ the optimal value obtained for the objective function of the
1046
+ corresponding MILP, while the realized profit (dark area),
1047
+ calculated ex-post, takes into account the profit of selling extra
1048
+ hydrogen. Similarly, Figure 6 shows the total estimated and
1049
+ realized surplus hydrogen produced. Note that the compressor
1050
+ would need to consume more power (around 1 MWh/ton) due
1051
+ to extra hydrogen. We draw two conclusions from Figures 5
1052
+ and 6:
1053
+ (1) Realized surplus: This surplus for profit and hydrogen
1054
+ production is reduced by increasing the number of segments,
1055
+ due to the improved approximation of the original non-linear
1056
+ curve. The realized surplus profit decreases from C71,199
1057
+ (0.44%) for OOS-1 to C602 (below 0.01%) for OOS-12.
1058
+ Similarly, the hydrogen production surplus is significantly
1059
+ decreased, yielding a realized surplus of ∼ 34 tons (1.27%) for
1060
+ OOS-1 and only 0.3 tons (0.01%) for OOS-12. By choosing
1061
+ a low number of segments, the hydrogen production is under-
1062
+ estimated which may lead to logistic issues and inefficiencies
1063
+ in the real-life operation of the hybrid power plant.
1064
+ (2) Ex-post profit and hydrogen production: Adding more
1065
+ electrolyzer details (segments or/and states) always leads to
1066
+ an increase in the ex-post profit. To compare various models,
1067
+ 7
1068
+
1069
+ TABLE II
1070
+ COMPUTATIONAL ASPECTS
1071
+ Case
1072
+ Computational time [s]
1073
+ No. of binary variables
1074
+ OS-1
1075
+ 1.4
1076
+ 2×8760
1077
+ OS-12
1078
+ 12.7
1079
+ 13×8760
1080
+ OOS-1
1081
+ 137.8
1082
+ 5×8760
1083
+ OOS-2
1084
+ 135.8
1085
+ 6×8760
1086
+ OOS-4
1087
+ 236.3
1088
+ 8×8760
1089
+ OOS-8
1090
+ 350.3
1091
+ 12×8760
1092
+ OOS-12
1093
+ 473.7
1094
+ 16×8760
1095
+ OO-1
1096
+ 767.1
1097
+ 3×8760
1098
+ OO-12
1099
+ 1,763.1
1100
+ 14×8760
1101
+ OOS-12 is taken as a benchmark, as it leads to the highest
1102
+ profit. First, the impact of the number of segments is examined,
1103
+ while keeping the number of states fixed and equal to 3. The
1104
+ ex-post profit reduction applying 1 instead of 12 segments is
1105
+ 0.72%, corresponding to around 117.6 kC for the entire hybrid
1106
+ power plant. The ex-post hydrogen production is increased by
1107
+ 8.32%, corresponding to around 241 tons. This percentage
1108
+ deviation is notably higher in part because the increase in
1109
+ hydrogen profit is dampened by the reduction in electric-
1110
+ ity profit (3.86% electricity profit increase for 1 segment
1111
+ compared to 12 segments). For OOS-1, the profit share of
1112
+ selling hydrogen is much lower than the profit share of selling
1113
+ electricity (around 34%). By introducing more segments, the
1114
+ contribution of hydrogen sales is increased to 38% at the
1115
+ expense of electricity sales. More profit and different business
1116
+ models are therefore unlocked by including more electrolyzer
1117
+ details in the MILP formulation. Figures 5 and 6 show that the
1118
+ errors are considerably reduced by implementing 4 segments
1119
+ instead of 1. Second, we assess the impact of the states on the
1120
+ ex-post profit and hydrogen production. While OS performs
1121
+ just as well as OOS as described in Section IV-C, OO with 12
1122
+ segments results in a 1.22% lower ex-post profit, and in a 4%
1123
+ lower hydrogen production. For OO-1, a profit reduction of
1124
+ around 1.8% and a reduced hydrogen production of 13.5% are
1125
+ observed, compared to the benchmark. Finally, we observe that
1126
+ neglecting the standby state in the model formulation leads to
1127
+ the worst outcome in terms of profit and hydrogen production
1128
+ potential.
1129
+ E. Computational Analysis
1130
+ All MILPs have been solved using the Gurobi solver in Julia
1131
+ on a MacBook Pro M1 2020 with 16 GB RAM. The optimality
1132
+ gap is fixed to 0.01% when we solve every MILP. The
1133
+ increase in the number of linearization segments |S| leads to an
1134
+ increase in computational time due to introducing more binary
1135
+ variables. For OOS, the computational time is increased from
1136
+ 138 seconds for 1 segment to 474 seconds for 12 segments,
1137
+ as reported in Table II. Removing the off state significantly
1138
+ reduces the computational time, with OS-1 being by far the
1139
+ fastest MILP to be solved (1.4 seconds). The OO models
1140
+ require the highest computational time, although they embody
1141
+ fewer binary variables than their OS and OOS counterparts.
1142
+ We hypothesize the reason is that the start-up cost constraints
1143
+ with inter-temporal nature are more often active when the
1144
+ option of standby state is not present. Therefore, we do
1145
+ not recommend using OO as its corresponding profit is the
1146
+ lowest among all cases (Figure 5), and it is being solved
1147
+ comparatively slower. Further, if computational efficiency is
1148
+ crucial, it may be beneficial to neglect the off state and run
1149
+ the OS model for improved computational performances. In
1150
+ general, the computational time increases with the number
1151
+ of segments but is deemed reasonable for the OS and OOS
1152
+ models, considering that our optimization problem is run over
1153
+ 8,760 hours. As operational problems are typically solved
1154
+ for a shorter time horizon, e.g., 24 hours for day-ahead
1155
+ scheduling, the computational cost of adding more details to
1156
+ the electrolyzer would be minimal.
1157
+ F. Sensitivity Analysis with Respect to Input Data
1158
+ In the previous sections, we have shown that adopting a
1159
+ simplified electrolyzer model can lead to an underestimation
1160
+ of the profit and hydrogen production for the hybrid power
1161
+ plant. We have also shown that the benefit of added details is
1162
+ case-specific, and depends on the input parameters. We now
1163
+ aim at assessing the impact of input parameters and system
1164
+ configuration on these results, through a sensitivity analysis.
1165
+ In particular, we will focus on wind over electrolyzer capacity
1166
+ ratio, hydrogen demand over electrolyzer capacity ratio, and
1167
+ the hydrogen price. The sensitivity analysis is performed on
1168
+ the OOS-1 and OOS-12 models.
1169
+ 1) Wind size: Recall from Table I that the wind farm
1170
+ capacity is 2 times that of the electrolyzer. To assess the impact
1171
+ of the wind-to-electrolyzer capacity ratio, two additional cases
1172
+ are considered, under which such a ratio is 1, 2 (reference),
1173
+ and 8. When this ratio is reduced from 2 to 1, the number
1174
+ of hours where the power input to the electrolyzer is limited
1175
+ by the wind availability is increased from 5,326 to all hours.
1176
+ Conversely, when the ratio is increased from 2 to 8, the number
1177
+ of power-limited hours is reduced to 1,236. We observe that
1178
+ the realized surplus for hydrogen production increases with
1179
+ the number of hours with limited wind power. The reason for
1180
+ this is that the piecewise approximation is exact only on the
1181
+ linearization points, and the limited wind availability forces
1182
+ the electrolyzer to operate out of those points. Conversely,
1183
+ when the number of wind power-limited hours is reduced,
1184
+ the electrolyzer operates more often on the linearization
1185
+ points, where the approximation is exact. It follows that the
1186
+ underestimation of hydrogen production is greater the more
1187
+ the electrolyzer is limited from operating at the linearization
1188
+ points. With a wind-to-electrolyzer ratio of 1, the difference
1189
+ in ex-post hydrogen production between 1 and 12 segments
1190
+ is 13%, which is reduced to 3% when the ratio increases to
1191
+ 8. Therefore, incorporating electrolyzer details is crucial for
1192
+ hybrid power plants where the wind-to-electrolyzer capacity
1193
+ ratio is small.
1194
+ 2) Hydrogen demand size: To investigate the sensitivity of
1195
+ optimization outcomes with respect to the hydrogen demand,
1196
+ the minimum daily demand is doubled, corresponding to
1197
+ around 8 full-load hours of hydrogen production. We observe
1198
+ that the impact of adding more segments to the electrolyzer
1199
+ 8
1200
+
1201
+ production curve diminishes when the demand constraint is
1202
+ tighter, i.e., with a higher minimum daily demand. For the case
1203
+ with the reference demand, the difference between the ex-post
1204
+ profit for OOS-12 and OOS-1 is 8%. This difference, when the
1205
+ hydrogen demand is doubled, is reduced to 2%. The increase
1206
+ in demand forces the electrolyzer to operate more frequently
1207
+ at its maximum load, where both OOS-1 and OOS-12 share
1208
+ the same linearization point and efficiency.
1209
+ 3) Hydrogen price: To explore the impact of the hydrogen
1210
+ price, we increase it from C2.10/kg to C5.00/kg. As already
1211
+ discussed in Section IV-B, adding more segments impact
1212
+ the optimal solution and profit as long as the electricity
1213
+ price in the given hour is in the range [λβ, λα], shown in
1214
+ Figure 4. Since λα and λβ are proportional to the hydrogen
1215
+ price, by increasing the hydrogen price, the range [λβ, λα] is
1216
+ widened and moved towards higher electricity prices, where
1217
+ the frequency of occurrence is reduced. When the MILP is
1218
+ solved with the hydrogen price of C5/kg, it is more frequently
1219
+ optimal to operate the electrolyzer at full load (39% of the
1220
+ time, compared to 11% for the case with the hydrogen price of
1221
+ C2.1/kg) and the linearization segments are utilized less. This
1222
+ also results in a significantly decreased computational time
1223
+ (below 20 seconds for OOS-12). The profit contribution from
1224
+ the hydrogen sale is increased significantly to 92%. The ex-
1225
+ post profit and hydrogen production difference between OOS-
1226
+ 1 and OOS-12 are reduced to 0.01% and 0.03%, respectively
1227
+ (they are 0.72% and 8.32% for the C2.1/kg case).
1228
+ The modeling of segments is relevant if higher hydrogen
1229
+ prices are coupled with also higher electricity prices. In
1230
+ this way, the electricity price range [λβ, λα] would still be
1231
+ overlapping with the majority of day-ahead price occurrences.
1232
+ For example, we test an artificial case where the day-ahead
1233
+ electricity price time series was multiplied by a constant factor
1234
+ to increase the mean price to around C90/MWh (similar to
1235
+ the mean value for 2021 in DK2). In this case, with the
1236
+ hydrogen price of C5/kg, similar results to the 2019 test case
1237
+ with the hydrogen price of C2.1/kg were obtained in terms of
1238
+ the impact of the number of segments. For a given hydrogen
1239
+ price and efficiency curve, checking if the price range [λβ, λα]
1240
+ overlaps with the expected electricity price is therefore crucial
1241
+ to assess a priori the impact of choosing a simplified model
1242
+ for the production curve (e.g., 1 linearization segment only)
1243
+ and support the modeling choices.
1244
+ V. DISCUSSION AND CONCLUSION
1245
+ Several studies have focused on the optimal dispatch of
1246
+ hybrid renewable-hydrogen power plants assuming simplified
1247
+ models for the electrolyzer component. This paper investigates
1248
+ the impact of choosing different levels of operational details
1249
+ for the electrolyzer model on the dispatch decisions, profit, the
1250
+ amount of hydrogen produced, and computational time. The
1251
+ impact of two modeling choices is considered: the operating
1252
+ states (on, off, standby), and the number of segments used
1253
+ to linearize the hydrogen production curve. The problems are
1254
+ formulated as MILPs, where the number of binary variables
1255
+ depends on the number of states and segments.
1256
+ For fixed states, adding more linearization segments for
1257
+ approximating the hydrogen production curve results in a
1258
+ higher profit, and a reduced surplus in the ex-post profit
1259
+ calculation, meaning that the model is able to estimate the
1260
+ actual cost and revenue streams more accurately. Moreover,
1261
+ a better estimation of the produced hydrogen is achieved.
1262
+ In fact, the linearization results in an underestimation of the
1263
+ produced hydrogen, but the underestimation is reduced by
1264
+ increasing the number of segments. Apart from introducing
1265
+ errors in the actual realized profit, thus potentially impacting
1266
+ the investment decisions in these types of technologies, the
1267
+ systematic underestimation of the hydrogen produced by the
1268
+ electrolyzer might introduce logistical inefficiencies, e.g., truck
1269
+ scheduling, and storage discharging/filling.
1270
+ The impact of adding more piecewise segments to the
1271
+ hydrogen production curve depends on the distribution of day-
1272
+ ahead electricity prices in the given time horizon. The model
1273
+ formulations with 1 and 12 segments take significantly dif-
1274
+ ferent dispatch decisions when the day-ahead electricity price
1275
+ is within a certain range, which depends on the electrolyzer
1276
+ efficiency (minimum and maximum) and the hydrogen price.
1277
+ Out of this day-ahead electricity price range, the model with 1
1278
+ and 12 segments takes the same dispatch decisions. Therefore,
1279
+ the value of adding more details to the hydrogen production
1280
+ curve could differ by varying input data and case studies. It
1281
+ is observed that this value decreases when the electrolyzer
1282
+ operates less at partial loading, e.g. when the input power is
1283
+ less limited by available wind power or with high-demand
1284
+ constraints. In this paper, revenues from other than the day-
1285
+ ahead market are not considered but this may also impact the
1286
+ dispatch strategy and therefore benefit from more segments.
1287
+ Choosing to represent only on and off states leads to the
1288
+ highest profit underestimation and worst ex-post performance
1289
+ while modeling only on and standby states lead to similar
1290
+ profit and dispatch decisions to the three-state model. This
1291
+ result is, however, significantly affected by the assumption
1292
+ made on the standby power consumption of the electrolyzer
1293
+ and its start-up cost. These parameters are highly uncertain
1294
+ due to the lack of data on large-scale electrolyzers.
1295
+ In conclusion, adopting more simplified models for the
1296
+ electrolyzer always leads to a reduced profit and sub-optimal
1297
+ scheduling. However, the impact of adding more details may
1298
+ vary depending on the case study considered and especially
1299
+ the range of day-ahead electricity prices, hydrogen price, wind
1300
+ power production compared to the electrolyzer installed capac-
1301
+ ity, standby power consumption, and start-up cost. Among all
1302
+ considered models, the most complete one (three states with
1303
+ 12 segments) was solved for a 1-year horizon in less than
1304
+ 10 minutes. The increase in computational time by adding
1305
+ more details would be marginal if a day-ahead scheduling
1306
+ problem is considered instead. Moreover, reducing the three-
1307
+ state model to two states only is not always faster, as it was
1308
+ observed that the two-state on-off model with 12 segments
1309
+ was the longest to solve among all the cases considered. A
1310
+ more detailed representation of the electrolyzers should be
1311
+ preferred for operational problems. For investment problems,
1312
+ 9
1313
+
1314
+ we hypothesize that it may be adequate to adopt a more
1315
+ simplified model of the electrolyzer, but this should be further
1316
+ assessed and it was out of the scope of the current paper.
1317
+ Further research should be conducted to assess the impact of
1318
+ modeling choices when additional revenue streams are consid-
1319
+ ered, such as flexibility provisions in ancillary service markets,
1320
+ which may impact the dispatch decisions of the hybrid power
1321
+ plant. Additionally, as there is a high uncertainty related to the
1322
+ start-up and standby costs, the sensitivity of these parameters
1323
+ on the impact of added details should be assessed further.
1324
+ Moreover, the level of detail needed for investment problems
1325
+ should be further investigated. The modeling of electrolyzer
1326
+ cell degradation over time should be investigated and included
1327
+ in the model with additional constraints. Finally, uncertainties
1328
+ in wind power supply and electricity prices should be included.
1329
+ ACKNOWLEDGEMENT
1330
+ This research was supported by the Energy Cluster Den-
1331
+ mark through the “Sustainable P2X Business Model” project,
1332
+ and by the Danish Energy Development Programme (EUDP)
1333
+ through the HOMEY project (64021-7010). We would like to
1334
+ thank Jens Jakob Sørensen (Ørsted), Alexander Holm Kiilerich
1335
+ (Ørsted), Roar Hestbek Nicolaisen (Hybrid Greentech), Yan-
1336
+ nick Werner (DTU), and Matˇej Novotn´y for collaborations,
1337
+ thoughtful discussions, and constructive feedback.
1338
+ APPENDIX
1339
+ A. The simplified MILP with On-Off States
1340
+ This appendix provides the MILP (A.30a), where the on
1341
+ and off states of the electrolyzer are only modeled. This is a
1342
+ simplified model compared to the one proposed in Section III
1343
+ with three states of the electrolyzer.
1344
+ max
1345
+
1346
+
1347
+ t∈T
1348
+ ptλDA
1349
+ t
1350
+ + dtλh − zsu
1351
+ t λsu
1352
+ (A.30a)
1353
+ s.t.
1354
+ pt = P w
1355
+ t − pe
1356
+ t − pc
1357
+ t
1358
+ ∀ t ∈ T ,
1359
+ (A.30b)
1360
+ pe
1361
+ t ≤ Cezoo
1362
+ t
1363
+ ∀ t ∈ T ,
1364
+ (A.30c)
1365
+ pe
1366
+ t ≥ P minzoo
1367
+ t
1368
+ ∀ t ∈ T ,
1369
+ (A.30d)
1370
+ zsu
1371
+ t
1372
+ ≥ zoo
1373
+ t
1374
+ − zoo
1375
+ t−1
1376
+ ∀ t ∈ T \1,
1377
+ (A.30e)
1378
+ zoo
1379
+ t
1380
+ =
1381
+
1382
+ s∈S
1383
+ zh
1384
+ t,s
1385
+ ∀ t ∈ T ,
1386
+ (A.30f)
1387
+ pe
1388
+ t =
1389
+
1390
+ s∈S
1391
+ ˆpe
1392
+ ts
1393
+ ∀ t ∈ T ,
1394
+ (A.30g)
1395
+ (13), (15) − (16), (19) − (26),
1396
+ (A.30h)
1397
+ dt, ht, hd
1398
+ t , pt, pc
1399
+ t, ˆpe
1400
+ ts, st, sin
1401
+ t , sout
1402
+ t
1403
+ ∈ R+,
1404
+ (A.30i)
1405
+ zsu
1406
+ t , zh
1407
+ ts, zoo
1408
+ t
1409
+ ∈ {0, 1},
1410
+ (A.30j)
1411
+ Ω = {dt, ht, hd
1412
+ t , pt, pc
1413
+ t, ˆpe
1414
+ ts, sin
1415
+ t , sout
1416
+ t
1417
+ , zsu
1418
+ t , zh
1419
+ ts, zoo
1420
+ t }.
1421
+ (A.30k)
1422
+ B. The simplified MILP with On-Standby States
1423
+ This appendix presents the simplified MILP (A.31), taking
1424
+ into account on and standby states of the electrolyzer.
1425
+ max
1426
+ Γ
1427
+
1428
+ t∈T
1429
+ ptλDA
1430
+ t
1431
+ + dtλh − pin
1432
+ t λin
1433
+ t
1434
+ (A.31a)
1435
+ s.t.
1436
+ pin
1437
+ t ≤ P sb(1 − zos
1438
+ t )
1439
+ ∀ t ∈ T ,
1440
+ (A.31b)
1441
+ pe
1442
+ t ≤ Cezos
1443
+ t + P sb(1 − zos
1444
+ t )
1445
+ ∀ t ∈ T ,
1446
+ (A.31c)
1447
+ pe
1448
+ t ≥ P minzos
1449
+ t + P sb(1 − zos
1450
+ t )
1451
+ ∀ t ∈ T ,
1452
+ (A.31d)
1453
+ zos
1454
+ t =
1455
+
1456
+ s∈S
1457
+ zh
1458
+ t,s
1459
+ ∀ t ∈ T ,
1460
+ (A.31e)
1461
+ pe
1462
+ t =
1463
+
1464
+ s∈S
1465
+ ˆpe
1466
+ ts + P sb(1 − zos
1467
+ t )
1468
+ ∀ t ∈ T ,
1469
+ (A.31f)
1470
+ (7), (15) − (16), (19) − (26),
1471
+ (A.31g)
1472
+ dt, ht, hd
1473
+ t , pt, pc
1474
+ t, pin
1475
+ t , ˆpe
1476
+ ts, st, sin
1477
+ t , sout
1478
+ t
1479
+ ∈ R+,
1480
+ (A.31h)
1481
+ zh
1482
+ ts, zos
1483
+ t ∈ {0, 1},
1484
+ (A.31i)
1485
+ Γ = {dt, ht, hd
1486
+ t , pt, pc
1487
+ t, pin
1488
+ t , ˆpe
1489
+ ts, sin
1490
+ t , st, sout
1491
+ t
1492
+ , zsu
1493
+ t , zos
1494
+ t }.
1495
+ (A.31j)
1496
+ REFERENCES
1497
+ [1] European
1498
+ Commission,
1499
+ “A
1500
+ European
1501
+ green
1502
+ deal,”
1503
+ 2019.
1504
+ https://commission.europa.eu/strategy-and-policy/priorities-2019-
1505
+ 2024/european-green-deal en.
1506
+ [2] European Comission, “A hydrogen strategy for a climate-neutral
1507
+ Europe,”
1508
+ 2020.
1509
+ https://energy.ec.europa.eu/system/files/2020-07/
1510
+ hydrogen strategy 0.pdf.
1511
+ [3] International
1512
+ Energy
1513
+ Agency,
1514
+ “Global
1515
+ hydrogen
1516
+ review,”
1517
+ 2022.
1518
+ https://iea.blob.core.windows.net/assets/c5bc75b1-9e4d-460d-9056-
1519
+ 6e8e626a11c4/GlobalHydrogenReview2022.pdf.
1520
+ [4] Danish Ministry of Climate, Energy and Utilities, “The goverment’s
1521
+ strategy for power-to-x,” 2021.
1522
+ https://ens.dk/sites/ens.dk/files/ptx/
1523
+ strategy ptx.pdf.
1524
+ [5] K.
1525
+ Raj,
1526
+ P.
1527
+ Lakhina,
1528
+ and
1529
+ C.
1530
+ Stranger,
1531
+ “Harnessing
1532
+ green
1533
+ hydrogen opportunities for deep decarbonisation in India,” 2022.
1534
+ https://www.niti.gov.in/sites/default/files/2022-06/Harnessing Green
1535
+ Hydrogen V21 DIGITAL 29062022.pdf.
1536
+ [6] S. Clegg and P. Mancarella, “Integrated modeling and assessment of
1537
+ the operational impact of power-to-gas (P2G) on electrical and gas
1538
+ transmission networks,” IEEE Trans. Sustain. Energy, vol. 6, no. 4,
1539
+ pp. 1234–1244, 2015.
1540
+ [7] G. Matute, J. Yusta, and L. Correas, “Techno-economic modelling of
1541
+ water electrolysers in the range of several MW to provide grid services
1542
+ while generating hydrogen for different applications,” Int. J. Hydrog.
1543
+ Energy, vol. 44, no. 33, pp. 17431–17442, 2019.
1544
+ [8] G. Matute, J. Yusta, J. Beyza, and L. Correas, “Multi-state techno-
1545
+ economic model for optimal dispatch of grid connected hydrogen
1546
+ electrolysis systems operating under dynamic conditions,” Int. J. Hydrog.
1547
+ Energy, vol. 46, no. 2, pp. 1449–1460, 2021.
1548
+ [9] M. Roach and L. Meeus, “The welfare and price effects of sector
1549
+ coupling with power-to-gas,” Energy Econ., vol. 86, p. 104708, 2020.
1550
+ [10] C. Varela, M. Mostafa, and E. Zondervan, “Modeling alkaline water
1551
+ electrolysis for power-to-x applications: A scheduling approach,” Int. J.
1552
+ Hydrog. Energy, vol. 46, no. 14, pp. 9303–9313, 2021.
1553
+ [11] I. Pavi´c, N. ˇCovi´c, and H. Pandˇzi´c, “PV-battery-hydrogen plant: Cutting
1554
+ green hydrogen costs through multi-market positioning,” Appl. Energy,
1555
+ vol. 328, p. 120103, 2022.
1556
+ [12] S. S. Beerb¨uhl et al., “Combined scheduling and capacity planning of
1557
+ electricity-based ammonia production to integrate renewable energies,”
1558
+ Eur. J. Oper. Res., vol. 241, no. 3, pp. 851–862, 2015.
1559
+ [13] Y. Zheng et al., “Optimal day-ahead dispatch of an alkaline electrolyser
1560
+ system concerning thermal–electric properties and state-transitional dy-
1561
+ namics,” Appl. Energy, vol. 307, p. 118091, 2022.
1562
+ [14] M. G¨otz et al., “Renewable power-to-gas: A technological and economic
1563
+ review,” Renew. Energy, vol. 85, pp. 1371–1390, 2016.
1564
+ [15] A. Urs´ua et al., “Integration of commercial alkaline water electrolysers
1565
+ with renewable energies: Limitations and improvements,” Int. J. Hydrog.
1566
+ Energy, vol. 41, no. 30, pp. 12852–12861, 2016.
1567
+ [16] M. S´anchez et al., “Aspen plus model of an alkaline electrolysis
1568
+ system for hydrogen production,” Int. J. Hydrog. Energy, vol. 45, no. 7,
1569
+ pp. 3916–3929, 2020.
1570
+ [17] O. Ulleberg, “Modeling of advanced alkaline electrolyzers: A system
1571
+ simulation approach,” Int. J. Hydrog. Energy, vol. 28, no. 1, 2003.
1572
+ [18] M. Sanchez et al., “Semi-empirical model and experimental validation
1573
+ for the performance evaluation of a 15 kW alkaline water electrolyzer,”
1574
+ Int. J. Hydrog. Energy, vol. 43, no. 45, pp. 20332–20345, 2018.
1575
+ [19] ENTSO-e, “Transparency platform, day-ahead prices,” 2022.
1576
+ https://
1577
+ transparency.entsoe.eu/dashboard/show.
1578
+ [20] I. Staffell and S. Pfenninger, “Using bias-corrected reanalysis to simulate
1579
+ current and future wind power output,” Energy, vol. 114, 2016.
1580
+ [21] Energinet, “Aktuelle tariffer,” 2022. https://energinet.dk/El/Elmarkedet/
1581
+ Tariffer/Aktuelle-tariffer/.
1582
+ 10
1583
+
-tE4T4oBgHgl3EQf4A1b/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -2979,3 +2979,58 @@ O9FJT4oBgHgl3EQf1S22/content/2301.11651v1.pdf filter=lfs diff=lfs merge=lfs -tex
2979
  utAzT4oBgHgl3EQf6_5m/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2980
  ZdFLT4oBgHgl3EQfWC9a/content/2301.12055v1.pdf filter=lfs diff=lfs merge=lfs -text
2981
  YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2979
  utAzT4oBgHgl3EQf6_5m/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2980
  ZdFLT4oBgHgl3EQfWC9a/content/2301.12055v1.pdf filter=lfs diff=lfs merge=lfs -text
2981
  YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf filter=lfs diff=lfs merge=lfs -text
2982
+ 3dAzT4oBgHgl3EQf9P73/content/2301.01918v1.pdf filter=lfs diff=lfs merge=lfs -text
2983
+ d9E0T4oBgHgl3EQf5gJF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2984
+ ZtE2T4oBgHgl3EQfZgcV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2985
+ BdE2T4oBgHgl3EQfngiP/content/2301.04009v1.pdf filter=lfs diff=lfs merge=lfs -text
2986
+ U9AzT4oBgHgl3EQf1P4j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2987
+ O9FJT4oBgHgl3EQf1S22/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2988
+ f9E4T4oBgHgl3EQfRgxA/content/2301.04990v1.pdf filter=lfs diff=lfs merge=lfs -text
2989
+ XdE4T4oBgHgl3EQfNgwX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2990
+ j9E2T4oBgHgl3EQfIQbC/content/2301.03679v1.pdf filter=lfs diff=lfs merge=lfs -text
2991
+ j9E2T4oBgHgl3EQfIQbC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2992
+ YtE5T4oBgHgl3EQfCw7_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2993
+ XdE4T4oBgHgl3EQfNgwX/content/2301.04956v1.pdf filter=lfs diff=lfs merge=lfs -text
2994
+ 8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf filter=lfs diff=lfs merge=lfs -text
2995
+ z9AzT4oBgHgl3EQfefx7/content/2301.01437v1.pdf filter=lfs diff=lfs merge=lfs -text
2996
+ odE3T4oBgHgl3EQfLQlL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2997
+ ltE1T4oBgHgl3EQfgwTU/content/2301.03234v1.pdf filter=lfs diff=lfs merge=lfs -text
2998
+ nNFPT4oBgHgl3EQf5TUv/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2999
+ ItFKT4oBgHgl3EQfdy7h/content/2301.11822v1.pdf filter=lfs diff=lfs merge=lfs -text
3000
+ RtFKT4oBgHgl3EQfiy45/content/2301.11843v1.pdf filter=lfs diff=lfs merge=lfs -text
3001
+ ZtE2T4oBgHgl3EQfZgcV/content/2301.03864v1.pdf filter=lfs diff=lfs merge=lfs -text
3002
+ YNE4T4oBgHgl3EQfNwyH/content/2301.04959v1.pdf filter=lfs diff=lfs merge=lfs -text
3003
+ 8dA0T4oBgHgl3EQfOv8t/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3004
+ z9AzT4oBgHgl3EQfefx7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3005
+ g9E3T4oBgHgl3EQfgApS/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3006
+ YNE4T4oBgHgl3EQfNwyH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3007
+ xNE3T4oBgHgl3EQf_QuN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3008
+ VdE4T4oBgHgl3EQfnQ2t/content/2301.05175v1.pdf filter=lfs diff=lfs merge=lfs -text
3009
+ UdE_T4oBgHgl3EQfxBzD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3010
+ rtE1T4oBgHgl3EQf3AU7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3011
+ ItFKT4oBgHgl3EQfdy7h/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3012
+ pdFPT4oBgHgl3EQf7jXR/content/2301.13205v1.pdf filter=lfs diff=lfs merge=lfs -text
3013
+ B9E3T4oBgHgl3EQfUAr7/content/2301.04448v1.pdf filter=lfs diff=lfs merge=lfs -text
3014
+ S9E2T4oBgHgl3EQfWwd9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3015
+ g9E3T4oBgHgl3EQfgApS/content/2301.04557v1.pdf filter=lfs diff=lfs merge=lfs -text
3016
+ gNE4T4oBgHgl3EQfRgzC/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3017
+ VNE4T4oBgHgl3EQfnQ0i/content/2301.05174v1.pdf filter=lfs diff=lfs merge=lfs -text
3018
+ gNE4T4oBgHgl3EQfRgzC/content/2301.04991v1.pdf filter=lfs diff=lfs merge=lfs -text
3019
+ UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf filter=lfs diff=lfs merge=lfs -text
3020
+ NNAyT4oBgHgl3EQfgvgA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3021
+ RtFKT4oBgHgl3EQfiy45/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3022
+ E9A0T4oBgHgl3EQfBP8f/content/2301.01972v1.pdf filter=lfs diff=lfs merge=lfs -text
3023
+ cNE4T4oBgHgl3EQfow2y/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3024
+ mdE1T4oBgHgl3EQfOAP6/content/2301.03011v1.pdf filter=lfs diff=lfs merge=lfs -text
3025
+ ItE3T4oBgHgl3EQfXAqD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3026
+ fNE_T4oBgHgl3EQf2BxV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3027
+ BdE2T4oBgHgl3EQfngiP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3028
+ B9E3T4oBgHgl3EQfUAr7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3029
+ G9E4T4oBgHgl3EQfgQ3v/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3030
+ 2dE1T4oBgHgl3EQf5gVO/content/2301.03512v1.pdf filter=lfs diff=lfs merge=lfs -text
3031
+ tNE1T4oBgHgl3EQf3gVt/content/2301.03490v1.pdf filter=lfs diff=lfs merge=lfs -text
3032
+ ldE3T4oBgHgl3EQf6Atx/content/2301.04786v1.pdf filter=lfs diff=lfs merge=lfs -text
3033
+ G9E4T4oBgHgl3EQfgQ3v/content/2301.05116v1.pdf filter=lfs diff=lfs merge=lfs -text
3034
+ LNFAT4oBgHgl3EQfwR78/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
3035
+ qdE2T4oBgHgl3EQf0gjz/content/2301.04143v1.pdf filter=lfs diff=lfs merge=lfs -text
3036
+ pdE1T4oBgHgl3EQfiQRF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0dFIT4oBgHgl3EQf3CsM/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:de92654797d6bad5785afece94be41b543b9b0a7ae96d76d96b2a30e3676f79e
3
+ size 188351
2dE1T4oBgHgl3EQf5gVO/content/2301.03512v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:984cc6af9079b21a398145816cd6b0e6366debcf3689167143c3b524189a99b7
3
+ size 2375058
2dE1T4oBgHgl3EQf5gVO/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:eb6a96ab6e8ae5ec437cb71dc04d0230ebedf1ce118400a415475e58767bd8d8
3
+ size 132704
3dAzT4oBgHgl3EQf9P73/content/2301.01918v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c09c42c8be1a10d08f155336ab9cce9de6bb5d0f85a192ddca02ac61d16ebfcb
3
+ size 7457723
4tE4T4oBgHgl3EQfBAt_/content/tmp_files/2301.04848v1.pdf.txt ADDED
@@ -0,0 +1,2047 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04848v1 [math.FA] 12 Jan 2023
2
+ τ-QUANTIZATION AND τ-COHEN CLASSES DISTRIBUTIONS
3
+ OF FEICHTINGER OPERATORS
4
+ FEDERICO BASTIANONI AND FRANZ LUEF
5
+ Abstract. We investigate the τ-quantizations and Cohen’s class distributions
6
+ of a suitable class of trace-class operators, called Feichtinger’s operators, and
7
+ show that it is a convenient substitute for the class of Schwartz operators. Many
8
+ well-known concepts and results for functions in time-frequency analysis have an
9
+ operator-analog in our setting, e.g. that Cohen’s classes are convolutions of Wigner
10
+ functions with distributions or characterization of the class of Schwartz operators
11
+ as an intersection of weighted variants of the class of Feichtinger operators.
12
+ Contents
13
+ 1.
14
+ Introduction
15
+ 1
16
+ 2.
17
+ Preliminaries
18
+ 3
19
+ 2.1.
20
+ A family of time-frequency representations
21
+ 3
22
+ 2.2.
23
+ Basics of QHA and novel tools
24
+ 5
25
+ 2.3.
26
+ τ-quantization of functions
27
+ 6
28
+ 3.
29
+ Feichtinger operators
30
+ 7
31
+ 3.1.
32
+ τ-quantization of operators
33
+ 9
34
+ 3.2.
35
+ A convenient environment for QHA
36
+ 13
37
+ 3.3.
38
+ τ-Cohen’s class of operators
39
+ 23
40
+ 4.
41
+ A characterization of Schwartz operators
42
+ 28
43
+ Acknowledgments
44
+ 30
45
+ References
46
+ 30
47
+ 1. Introduction
48
+ There is a vast literature on the boundedness of pseudodifferential operators
49
+ for certain classes of symbols in various quantization schemes along the lines of
50
+ H¨ormander classes or alternatively using Sj¨ostrand’s class or Shubin’s classes, e.g.
51
+ 2010 Mathematics Subject Classification. 42B35;46E35;47G30;47B10.
52
+ Key
53
+ words
54
+ and
55
+ phrases. Cohen’s
56
+ class,
57
+ τ-quantization,
58
+ Feichtinger’s
59
+ algebra,
60
+ Wigner
61
+ distribution.
62
+ 1
63
+
64
+ 2
65
+ FEDERICO BASTIANONI AND FRANZ LUEF
66
+ [1, 3, 4, 11, 22]. In the present work, we put our focus on Shubin’s τ-quantization
67
+ and the associated time-frequency representations, the τ-Cohen classes.
68
+ Our approach to this circle of ideas is based on the framework of quantum har-
69
+ monic analysis with the goal to lift the well-known results concerning functions to
70
+ an appropriate class of functions, which we call Feichtinger operators, S0, and which
71
+ is the operator analog of the well-known Feichtinger algebra S0.
72
+ We also discuss the relation between Feichtinger operators S0 and the class of
73
+ Schwartz operators introduced by Keyl, Kiukas and Werner in [14]. There the idea
74
+ is put forward that one should look for analogs of function spaces in the setting of
75
+ classes of operators, which has been realized in the case of Sobolev spaces in [15]
76
+ and for modulation spaces in [6].
77
+ For τ ∈ [0, 1] the τ-quantization of a symbol a ∈ S′(R2d), the space of tempered
78
+ distributions, is given by
79
+ (1)
80
+ Opτ(a)f(t) :=
81
+
82
+ R2d e2πi(t−y)ξa((1 − τ)t + τy, ξ)f(y) dydξ f ∈ S(Rd),
83
+ where the operator Opτ(a) is understood to be defined in the weak sense. A well-
84
+ known fact is that one can relate ⟨Opτ(a)f, g⟩ to a time-frequency representation,
85
+ Wτ(f, g), the cross-τ-Wigner distribution of f and g:
86
+ ⟨Opτ(a)f, g⟩ = ⟨a, Wτ(g, f)⟩,
87
+ for all
88
+ f, g ∈ S(Rd).
89
+ Given an operator S, we denote by aS
90
+ τ its τ-symbol, i.e. the tempered distribution
91
+ such that Opτ
92
+
93
+ aS
94
+ τ
95
+
96
+ = S and Opτ is called the τ-Shubin quantization. For f, g ∈
97
+ L2(Rd) we denote the rank-one operator by f ⊗ g and note that af⊗g
98
+ τ
99
+ = Wτ(g, f),
100
+ i.e. there is an intrinsic relation between quantization schemes and time-frequency
101
+ representations.
102
+ We show that for well-behaved operators, e.g. trace class operators or Feichtinger
103
+ operators, this relation might be extended to operators.
104
+ Recall that Wigner in
105
+ his ground-breaking work on quasi-probability distributions introduced the cross-
106
+ Wigner distribution for certain classes of operators [24], which was later extended
107
+ to more general classes of operators by Moyal in [19].
108
+ Let S be a continuous operator between the Feichtinger algebra S0 and its contin-
109
+ uous dual space S′
110
+ 0. We denote by KS the kernel of S, which exists by Feichtinger’s
111
+ kernel theorem and is a mild distribution on R2d.
112
+ We define Feichtinger operators, S0, to be the following class of continuous and
113
+ linear operators S0 := S : S′
114
+ 0(Rd) → S0(Rd) that map norm bounded w-∗ convergent
115
+ sequences in S′
116
+ 0 into norm convergent sequences in S0. In [10] it was shown that
117
+ these are precisely the linear continuous operators from S′
118
+ 0 to S0 that have a kernel
119
+ in Feichtinger’s algebra, the so-called inner kernel theorem.
120
+ One of our main tools is that Feichtinger operators have a nice spectral decomposi-
121
+ tion. If S is in S0, then there exist two (non-unique) sequences {fn}n, {gn}n ⊆ S0(Rd)
122
+
123
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
124
+ 3
125
+ such that
126
+ S =
127
+
128
+
129
+ n=1
130
+ fn ⊗ gn,
131
+
132
+
133
+ n=1
134
+ ∥fn∥S0 ∥gn∥S0 < ∞,
135
+ KS =
136
+
137
+
138
+ n=1
139
+ Kfn⊗gn.
140
+ Hence, Feichtinger operators are trace class operators and we can compute their trace
141
+ as follows tr(S) =
142
+
143
+ Rd KS(x, x) dx. In [7] operators having such a decomposition
144
+ have been studied and called Feichtinger states in case tr(S) = 1, but there the link
145
+ between these operators and the work [10] was not established, which is one of our
146
+ main observations.
147
+ Then the τ-Wigner distribution of S is defined in the following way
148
+ (2)
149
+ WτS(x, ω) :=
150
+
151
+ Rd e−2πitωKS(x + τt, x − (1 − τ)t) dt.
152
+ Our key observation is the following identity:
153
+ ⟨a,WτS⟩ = tr(Opτ(a)S∗) =: ⟨Opτ(a),S⟩,
154
+ for S in S0 or J 1, and WτS is the τ-Wigner distribution of S. Consequently, we
155
+ interpret WτS as the τ-quantization of an operator in S0 or J 1.
156
+ Note, that if S is the rank-one operator f ⊗ g this becomes the aforementioned
157
+ relation between the τ-Wigner distribution and the Shubin τ-transform.
158
+ Based on this framework we deduce operator analogs of well-known results on
159
+ τ-Wigner distributions and τ-Shubin quantization, which indicates that this is a
160
+ very convenient setting for this type of investigation. In addition, we extend the
161
+ Cohen class of an operator, introduced in [17], to the τ-setting and show that it
162
+ can be written as the convolution of the Wigner distribution of an operator with a
163
+ distribution as in the function setting.
164
+ We close our discussion with the introduction of weighted versions of S0 and prove
165
+ that the intersection of all these is the class of Schwartz operators in [14]. As in the
166
+ case of functions, we hope that this global description of the Schwartz operators will
167
+ also turn out to be useful in subsequent studies and it also hints at operator analogs
168
+ of Gelfand-Shilov classes or other classes of test functions and the corresponding
169
+ class of ultradistributions.
170
+ 2. Preliminaries
171
+ In this paper, the parameter τ always belongs to [0, 1], even when not specified.
172
+ 2.1. A family of time-frequency representations. For x, ω ∈ Rd we define the
173
+ translation and modulation operator by
174
+ Txf(t) := f(t − x),
175
+ Mωf(t) := e2πiωtf(t),
176
+ ∀t ∈ Rd,
177
+ respectively. Their composition is denoted by π(x, ω) := MωTx.
178
+
179
+ 4
180
+ FEDERICO BASTIANONI AND FRANZ LUEF
181
+ Given τ ∈ [0, 1], the τ-time-frequency shift (τ-TFS) at (x, ω) ∈ R2d is defined to
182
+ be
183
+ (3)
184
+ πτ(x, ω) := e−2πiτxωMωTx = M(1−τ)ωTxMτω.
185
+ For τ = 0 we recover the usual time-frequency shifts π0 = π. The following relations
186
+ are consequences of elementary computations, which are left to the reader:
187
+ πτ(x, ω)πτ(x′, ω′) = e−2πi[(1−τ)xω′−τx′ω]πτ(x + x′, ω + ω′),
188
+ πτ(x, ω)πτ(x′, ω′) = e−2πi[xω′−x′ω]πτ(x′, ω′)πτ(x, ω),
189
+ πτ(x, ω)∗ = π1−τ(−x, −ω) = e−2πi(1−τ)xωπ(−x, −ω).
190
+ In the present paper the symbol ⟨·,·⟩ either denotes the inner product in L2(Rd)
191
+ or a duality pairing between a Banach space X and its dual space X′, which is
192
+ compatible with the latter, i.e. ⟨·,·⟩ is assumed to be linear in the first argument
193
+ and conjugate-linear in the second one. In particular, the dual pairs considered in
194
+ this work are (L2, L2), (S′
195
+ 0, S0), (S′
196
+ 0, S0), respectively.
197
+ Above, S0 is the Feichtinger algebra (24), for the definitions of S0 and S′
198
+ 0 see the
199
+ equations (25),(26) and (28). We introduce for f, g ∈ L2(Rd), or for any suitable
200
+ dual pair, the τ-short-time Fourier transform (τ-STFT) of f w.r.t g:
201
+ (4)
202
+ V τ
203
+ g f(x, ω) := ⟨f, πτ(x, ω)g⟩,
204
+ ∀x, ω ∈ Rd.
205
+ As can be easily verified, the mapping
206
+ πτ : R2d → U(L2(Rd)),
207
+ where U(L2(Rd)) denotes the unitary operators on L2(Rd), is a projective represen-
208
+ tation of R2d for any τ. Consequently, V τ is the wavelet transform associated to πτ,
209
+ thus V τ
210
+ g f is a continuous function.
211
+ Remark 2.1. For τ = 0 we obtain the usual STFT V 0
212
+ g f = Vgf and we have
213
+ (5)
214
+ V τ
215
+ g f(x, ω) = e2πiτxωVgf(x, ω).
216
+ By the preceding identity, we have that V
217
+ 1
218
+ 2
219
+ g f is the cross-ambiguity function of f and
220
+ g:
221
+ (6)
222
+ V
223
+ 1
224
+ 2
225
+ g f(x, ω) = A(f, g)(x, ω).
226
+ We recall another frequently used time-frequency representation, the so-called
227
+ cross-τ-Wigner distribution of f and g in L2(Rd) defined by
228
+ (7)
229
+ Wτ(f, g)(x, ω) :=
230
+
231
+ Rd e−2πitωf(x + τt)g(x − (1 − τ)t) dt.
232
+ We aim to extend the definition of Wτ from functions to operators, see (15).
233
+
234
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
235
+ 5
236
+ 2.2. Basics of QHA and novel tools. In this subsection we introduce the ba-
237
+ sic definitions of quantum harmonic analysis (QHA) following the seminal work of
238
+ Werner [23].
239
+ For z ∈ R2d and A ∈ B(L2(Rd)) the translation of the operator A by z is
240
+ (8)
241
+ αz(A) := π(z)Aπ(z)∗,
242
+ which satisfies αzαz′ = αz+z′. By the parity operator, we mean
243
+ (9)
244
+ Pf(t) := ˇf(t) := f(−t),
245
+ for any f ∈ L2(Rd), which induces an involution of A ∈ B(L2(Rd)):
246
+ (10)
247
+ ˇA := PAP.
248
+ We denote by J 1 the space of all trace class operators on L2(Rd). Given a ∈ L1(R2d)
249
+ and S ∈ J 1. The convolution between a and S is the operator
250
+ (11)
251
+ a ⋆ S := S ⋆ a :=
252
+
253
+ R2d a(z)αz(S) dz,
254
+ were the integral may be interpreted in the weak sense. For operators S, T ∈ J 1,
255
+ their convolution is the function defined for every z ∈ R2d as
256
+ (12)
257
+ S ⋆ T(z) := tr
258
+
259
+ Sαz( ˇT)
260
+
261
+ .
262
+ In this paper, we reserve the symbol ⊗ for rank-one operators.
263
+ Namely, given
264
+ f, g ∈ L2(Rd):
265
+ (13)
266
+ (f ⊗ g)ψ := ⟨ψ, g⟩f,
267
+ ∀ψ ∈ L2(Rd).
268
+ The kernel of an operator S will always be denoted by KS. Evidently, the kernel of
269
+ the operator f ⊗ g is the tensor product of functions f(x)g(y):
270
+ (f ⊗ g)ψ(t) = ⟨ψ, g⟩f(t) =
271
+
272
+ Rd f(t)g(x)ψ(x) dx.
273
+ In the sequel we denote the tensor product of two functions by f(x)g(y), we shall
274
+ adopt the notation
275
+ (14)
276
+ Kf⊗g(x, y) = f(x)g(y).
277
+ We now interpret (7) as the cross-τ-Wigner distribution of the rank-one operator
278
+ f ⊗ g.
279
+ Hence, it is natural to define the τ-Wigner distribution of an operator S with kernel
280
+ KS in the following way:
281
+ (15)
282
+ WτS(x, ω) :=
283
+
284
+ Rd e−2πitωKS(x + τt, x − (1 − τ)t) dt.
285
+ For S ∈ J 1 and τ ∈ [0, 1], we define the Fourier-τ-Wigner transform of S to be:
286
+ (16)
287
+ FWτS(z) := tr (πτ(z)∗S) ,
288
+ ∀z ∈ R2d.
289
+
290
+ 6
291
+ FEDERICO BASTIANONI AND FRANZ LUEF
292
+ For τ = 1/2 we recover the usual Fourier-Wigner transform [23].
293
+ The τ-spreading representation of S ∈ B(L2) is the decomposition
294
+ (17)
295
+ S =
296
+
297
+ R2d h(z)πτ(z) dz,
298
+ where the integral is understood in the weak sense. The function h is called the
299
+ τ-spreading function of S.
300
+ In the following, we shall consider the τ-spreading representation as a quantization
301
+ scheme that assigns to a function an operator. Namely, h ∈ L1(R2d) gets associated
302
+ to the operator
303
+ (18)
304
+ SRτ(h) :=
305
+
306
+ R2d h(z)πτ(z) dz.
307
+ Let Fσ denote the symplectic Fourier transform. In the following lemma we collect
308
+ a number of important relations between these notions. The proofs are elementary
309
+ computations and based on the spectral decomposition of the trace class operators
310
+ S and T ([21]), which we leave to the interested reader.
311
+ Lemma 2.2. Let f, g, ∈ L2(Rd), S, T ∈ J 1, a ∈ L1(R2d) and τ ∈ [0, 1]. Then:
312
+ (i) Fσ(Wτ(f ⊗ g)) = V τ
313
+ g f;
314
+ (ii) FWτ(f ⊗ g) = V τ
315
+ g f;
316
+ (iii) WτS = FσFWτS;
317
+ (iv) FWτS(x, ω) = e−2πi(1/2−τ)xωFW1/2S(x, ω);
318
+ (v) Fσ(S ⋆ T) = FWτS · FW1−τT = FW1−τS · FWτT;
319
+ (vi) FWτ(a ⋆ S) = Fσa · FWτS;
320
+ (vii) FWτS is the τ-spreading function of S, i.e. S =
321
+
322
+ R2d FWτS(z)πτ(z) dz.
323
+ We notice that if we consider the rank-one operator S = f ⊗g, then the assertions
324
+ (iii) and (ii) of the previous lemma imply
325
+ (19)
326
+ Wτ(f, g) = Wτ(f ⊗ g) = FσV τ
327
+ g f.
328
+ 2.3. τ-quantization of functions. The τ-quantization of a symbol a ∈ S′(R2d),
329
+ the space of tempered distributions, is formally given by
330
+ (20)
331
+ Opτ(a)f(t) :=
332
+
333
+ R2d e2πi(t−y)ξa((1 − τ)t + τy, ξ)f(y) dydξ,
334
+ where f ∈ S(Rd). Opτ(a) may be described rigorously in the weak sense:
335
+ ⟨Opτ(a)f, g⟩ = ⟨a, Wτ(g, f)⟩,
336
+ ∀f, g, ∈ S(Rd).
337
+ Given an operator S, we denote by aS
338
+ τ its τ-symbol, i.e. the tempered distribution
339
+ such that
340
+ Opτ
341
+
342
+ aS
343
+ τ
344
+
345
+ = S.
346
+
347
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
348
+ 7
349
+ Remark 2.3. Under suitable assumptions, for example a ∈ L1(R2d), straightforward
350
+ calculations give
351
+ Opτ(a) =
352
+
353
+ R2d Fσa(z)πτ(z) dz,
354
+ and since also FWτ Opτ(a) is the τ-spreading function of Opτ(a), we have
355
+ (21)
356
+ a = FσFWτ Opτ(a).
357
+ Hence, for S ∈ J 1
358
+ (22)
359
+ aS
360
+ τ = FσFWτS = WτS.
361
+ Given a ∈ S′
362
+ 0(R2d) and f, g ∈ S0(Rd), we recall the definition of cross-τ-Cohen’s
363
+ class representation of f and g, with kernel a:
364
+ (23)
365
+
366
+ a(f, g) := a ∗ Wτ(f, g).
367
+ 3. Feichtinger operators
368
+ In this section we summarize some important results concerning a class of op-
369
+ erators studied in [10]. For such operators, introduced below, we adopt the name
370
+ “Feichtinger operators” for reasons which will become evident later.
371
+ We recall that the Feichtinger algebra over Rd [9] is the Banach space
372
+ (24)
373
+ S0(Rd) := {f ∈ L2(Rd) | Vgf ∈ L1(R2d)},
374
+ for some g ∈ L2(Rd) ∖ {0}, endowed with the norm
375
+ ∥f∥S0 := ∥Vgf∥L1 =
376
+
377
+ R2d |Vgf(x, ω)| dxdω.
378
+ We refer the reader to [13] for a detailed survey on S0(Rd). In this work, S′
379
+ 0(Rd)
380
+ denotes the conjugate-dual of S0(Rd).
381
+ Definition 3.1. The set of Feichtinger operators is defined to be
382
+ S0 :={S : S′
383
+ 0(Rd) → S0(Rd) | S is linear, continuous and
384
+ maps norm bounded w-∗ convergent sequences in S′
385
+ 0
386
+ (25)
387
+ into norm convergent sequences in S0}.
388
+ We adopt the following notation:
389
+ (26)
390
+ S′
391
+ 0 := B(S0(Rd), S′
392
+ 0(Rd))
393
+ and state the so called Outer Kernel Theorem [10, Theorem 1.1]:
394
+ Theorem 3.2. The Banach space S′
395
+ 0 is isomorphic to S′
396
+ 0(R2d) via the map T �→ KT,
397
+ where the relation between T and its kernel KT is given by
398
+ ⟨Tf,g⟩ = ⟨KT,Kg⊗f⟩,
399
+ ∀ f, g, ∈ S0(Rd).
400
+
401
+ 8
402
+ FEDERICO BASTIANONI AND FRANZ LUEF
403
+ The following statement goes under the name of Inner Kernel Theorem.
404
+ We
405
+ present it in our setting. To this end, we introduce the following notation: given
406
+ σ, ν ∈ S′
407
+ 0(Rd), we denote by ν �⊗σ the unique element of S′
408
+ 0(R2d) such that
409
+ ⟨ν �⊗σ,Kψ⊗ϕ⟩ = ⟨ν,ψ⟩⟨σ,ϕ⟩,
410
+ ∀ ψ, ϕ ∈ S0(Rd).
411
+ We refer the reader to [10, Theorem 1.3], Lemma 3.1 and Corollary 3.10, too.
412
+ Theorem 3.3. The space of Feichtinger operators S0 is a Banach space if endowed
413
+ with the norm of B(S′
414
+ 0, S0) and it is naturally isomorphic as Banach space to S0(R2d)
415
+ through the map T �→ KT, where the relation between T and its kernel KT is given
416
+ by
417
+ ⟨ν,Tσ⟩ = ⟨ν �⊗σ,KT⟩,
418
+ ∀ σ, ν, ∈ S′
419
+ 0(Rd).
420
+ Moreover, S0 is Banach algebra under composition. If S, T ∈ S0, then
421
+ (27)
422
+ KS◦T(y, u) =
423
+
424
+ Rd KT(y, t)KS(t, u) dt.
425
+ By the above theorems 3.2 and 3.3, S′
426
+ 0 is the (conjugate) topological dual of S0
427
+ and the duality is given by
428
+ (28)
429
+ ⟨T,S⟩ = ⟨KT,KS⟩.
430
+ Lemma 3.4. Suppose S ∈ S0. Then there exist two non-unique sequences {fn}n, {gn}n ⊆
431
+ S0(Rd) such that
432
+ S =
433
+
434
+
435
+ n=1
436
+ fn ⊗ gn,
437
+
438
+
439
+ n=1
440
+ ∥fn∥S0 ∥gn∥S0 < +∞,
441
+ KS =
442
+
443
+
444
+ n=1
445
+ Kfn⊗gn.
446
+ Moreover,
447
+ S0 ֒→ J 1
448
+ with
449
+ tr(S) =
450
+
451
+ Rd KS(x, x) dx.
452
+ Proof. We just have to prove the continuous inclusion of Feichtinger operators into
453
+ J 1, all the remaining statements can be found in [10], see in particular Corollary
454
+ 3.15 and Remark 9. The claim follows from an elementary computation:
455
+ ∥S∥J 1 = |tr(A)| ≤
456
+
457
+ Rd
458
+
459
+
460
+ n=1
461
+ |fn(x)gn(x)| dx =
462
+
463
+
464
+ n=1
465
+
466
+ Rd |fn(x)gn(x)| dx
467
+
468
+
469
+
470
+ n=1
471
+ ∥fn∥L2 ∥gn∥L2 ≲
472
+
473
+
474
+ n=1
475
+ ∥fn∥S0 ∥gn∥S0 < ∞.
476
+ Since S0(R2d) = S0(Rd)ˆ⊗S0(Rd), see e.g. [10, Lemma 2.1], we get
477
+ ∥S∥J 1 ≲ ∥KS∥S0 ≍ ∥S∥S0 ,
478
+
479
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
480
+ 9
481
+ which gives the desired assertion.
482
+
483
+ The preceding result and the observations in [10, p. 4] yield
484
+ (29)
485
+ S0 ֒→ J 1 ֒→ J 2 ֒→ B(L2(Rd)) ֒→ S′
486
+ 0.
487
+ The fact that all Feichtinger operators are trace class implies the validity of Lemma
488
+ 2.2.
489
+ 3.1. τ-quantization of operators. The following remark is the key insight for the
490
+ subsequent results concerning Opτ and Wτ.
491
+ Remark 3.5. Let us consider f, g ∈ L2(Rd) such that f ̸= 0, a ∈ L2(R2d) and {fj}j
492
+ o.n.b. for L2 with f1 = f. Then we compute as follows:
493
+ ⟨Opτ(a)f, g⟩ = ⟨Opτ(a)f,
494
+
495
+
496
+ j=1
497
+ ⟨g, fj⟩fj⟩ =
498
+
499
+
500
+ j=1
501
+ ⟨Opτ(a) (⟨fj, g⟩f) , fj⟩
502
+ =
503
+
504
+
505
+ j=1
506
+ ⟨Opτ(a)(f ⊗ g)fj, fj⟩ = tr (Opτ(a)(f ⊗ g)) .
507
+ Taking into account the weak definition of Opτ(a) and (15) we can write
508
+ (30)
509
+ ⟨Opτ(a)f, g⟩ = ⟨a, Wτ((f ⊗ g)∗)⟩ = tr (Opτ(a)(f ⊗ g)) = ⟨Opτ(a), (f ⊗ g)∗⟩(J 1,J ∞).
510
+ By computations similar to the ones above for S ∈ J 1 with the spectral decomposition
511
+ �∞
512
+ k=1 λkfk ⊗ gk after extending {fk}k to an orthonormal basis of L2(Rd) implies
513
+ (31)
514
+ ⟨a, WτS⟩ = tr (Opτ(a)S∗) = ⟨Opτ(a), S⟩(J 1,J ∞).
515
+ Theorem 3.6. For every τ ∈ [0, 1] the following mappings are linear and continu-
516
+ ous:
517
+ Opτ : L2(R2d) → J ∞,
518
+ Wτ : J 1 → L2(R2d).
519
+ Moreover, Opτ is the Banach space adjoint of Wτ: Opτ = W ∗
520
+ τ .
521
+ Proof. The boundedness of Opτ is evident; the proof of the continuity of Wτ follows
522
+ by a similar reasoning as the proof of the subsequent Theorem 3.7. The last claim
523
+ is just (31).
524
+
525
+ Theorem 3.7. For every τ ∈ [0, 1] the following mappings are linear and continu-
526
+ ous:
527
+ Opτ : S′
528
+ 0(R2d) → S′
529
+ 0,
530
+ Wτ : S0 → S0(R2d).
531
+ Moreover, Opτ is the Banach space adjoint of Wτ: Opτ = W ∗
532
+ τ , i.e.
533
+ for every
534
+ a ∈ S′
535
+ 0(R2d) and S ∈ S0
536
+ (32)
537
+ ⟨a,WτS⟩ = ⟨Opτ(a),S⟩.
538
+
539
+ 10
540
+ FEDERICO BASTIANONI AND FRANZ LUEF
541
+ Proof. The boundedness and linearity of Opτ follow from the definitions. By using
542
+ the formal representation of Opτ(a) we can derive an expression for its kernel:
543
+ (33)
544
+ KOpτ (a)(t, x) =
545
+
546
+ Rd e2πi(t−x)ωa((1 − τ)t + τx, ω) dω.
547
+ Let us consider first f, g ∈ S0. Then a standard argument, see e.g. [5, Proposition
548
+ 1.3.25], gives that
549
+ Wτ(f ⊗ g) = Wτ(f, g) ∈ S0(R2d)
550
+ with
551
+ ∥Wτ(f ⊗ g)∥S0 ≲ ∥f∥S0 ∥g∥S0 .
552
+ Since Lemma 2.2 holds for S0, we write Wτ = FσFWτ and use the spectral decom-
553
+ position for S of the form �∞
554
+ n=1 fn ⊗ gn as shown in Lemma 3.4. Now, we compute:
555
+ FWτS(z) = tr(πτ(z)∗S) = tr(
556
+
557
+
558
+ n=1
559
+ πτ(z)∗(fn ⊗ gn))
560
+ =
561
+
562
+
563
+ n=1
564
+ ⟨πτ(z)∗fn, gn⟩ =
565
+
566
+
567
+ n=1
568
+ V τ
569
+ gnfn(z).
570
+ (34)
571
+ Taking a suitable window for the norm on S0(R2d) [13, Theorem 5.3] we have
572
+ ∥FWτS∥S0 ≤
573
+
574
+
575
+ n=1
576
+ ��V τ
577
+ gnfn
578
+ ��
579
+ S0 =
580
+
581
+
582
+ n=1
583
+ ∥fn∥S0 ∥gn∥S0 < +∞.
584
+ Consequently,
585
+ ∥FWτS∥S0 ≤ inf{
586
+
587
+
588
+ n=1
589
+ ∥fn∥S0 ∥gn∥S0 , S =
590
+
591
+
592
+ n=1
593
+ fn ⊗ gn}
594
+ ≤ inf{
595
+
596
+
597
+ n=1
598
+ ∥fn∥S0 ∥gn∥S0 , KS =
599
+
600
+
601
+ n=1
602
+ Kfn⊗gn}
603
+ = ∥KS∥S0 ≍ ∥S∥S0 .
604
+ We proved the boundedness of FWτ : S0 → S0(R2d), the continuity of the symplectic
605
+ Fourier transform Fσ : S0(R2d) → S0(R2d) is well-known, and thus the continuity of
606
+
607
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
608
+ 11
609
+ Wτ : S0 → S0(R2d) follows. Concerning the last claim, we proceed as follows:
610
+ ⟨Opτ(a),S⟩ = ⟨KOpτ (a),KS⟩ = ⟨KOpτ (a),
611
+
612
+
613
+ n=1
614
+ Kf⊗gn⟩
615
+ =
616
+
617
+
618
+ n=1
619
+ ⟨KOpτ (a),Kf⊗gn⟩ =
620
+
621
+
622
+ n=1
623
+ ⟨Opτ(a)gn,fn⟩
624
+ =
625
+
626
+
627
+ n=1
628
+ ⟨a,Wτ(fn ⊗ gn)⟩ = ⟨a,
629
+
630
+
631
+ n=1
632
+ Wτ(fn ⊗ gn)⟩
633
+ = ⟨a,WτS⟩,
634
+ which concludes the proof.
635
+
636
+ On account of Theorem 3.6 and 3.7, it seems reasonable to interpret WτS as the
637
+ τ-quantization of an operator in S0 or J 1.
638
+ Corollary 3.8.
639
+ (i) For every τ ∈ [0, 1] the mapping Wτ : S0 → S0(R2d) is a
640
+ topological isomorphism with inverse given by Opτ : S0(R2d) → S0;
641
+ (ii) A linear and continuous operator S : S0(Rd) → S′
642
+ 0(Rd) belongs to S0 if and
643
+ only if WτS ∈ S0(R2d) for some (and hence any) τ ∈ [0, 1].
644
+ Proof. (i) We observed in (22) that WτS is just the τ-symbol aS
645
+ τ of a trace class
646
+ operator S, in particular this holds for S ∈ S0. Therefore,
647
+ Opτ ◦WτS = Opτ(aS
648
+ τ ) = S.
649
+ We now show that if we start with a ∈ S0(R2d), then Opτ(a) belongs to S0. From
650
+ (33), we have that the kernel of Opτ(a) can be written as
651
+ KOpτ (a)(t, x) =
652
+
653
+ Rd e2πi(t−x)ωa((1 − τ)t + τx, ω) dω = ΨτF −1
654
+ 2 a(t, x),
655
+ where F −1
656
+ 2
657
+ is the inverse of the partial Fourier transform with respect to the second
658
+ variable; Ψτ is the change of variables induced by the matrix
659
+ (35)
660
+
661
+ 1 − τ
662
+ τ
663
+ 1
664
+ −1
665
+
666
+ ,
667
+ ΨτF(t, x) := F((1 − τ)t + τx, t − x).
668
+ From the assumption a in the Feichtinger algebra S0(R2d) we have F −1
669
+ 2 a ∈ S0(R2d),
670
+ thus ΨτF −1
671
+ 2 a is in S0(R2d), i.e. Opτ(a) is an element of S0. The fact that Opτ is
672
+ continuous from S0(R2d) into S0 is evident from the applications of F −1
673
+ 2
674
+ and Ψτ.
675
+ Hence we have shown that
676
+ Wτ ◦ Opτ(a) = aOpτ (a)
677
+ τ
678
+ = a.
679
+ (ii) The claim is a straightforward consequence of (i).
680
+
681
+
682
+ 12
683
+ FEDERICO BASTIANONI AND FRANZ LUEF
684
+ Corollary 3.9.
685
+ (i) For every τ ∈ [0, 1] FWτ : S0 → S0(R2d) is a topological
686
+ isomorphisms with inverse given by the τ-spreading representation
687
+ (36)
688
+ SRτ : S0(R2d) → S0 , a �→
689
+
690
+ R2d a(z)πτ(z) dz;
691
+ (ii) Let us define
692
+ (37)
693
+ SRτ : S′
694
+ 0(R2d) → S′
695
+ 0 a �→
696
+
697
+ R2d a(z)πτ(z) dz,
698
+ where the integral has to be understood weakly as follows:
699
+ ⟨SRτ(a)f,g⟩ := ⟨a,V τ
700
+ f g⟩,
701
+ a ∈ S′
702
+ 0(R2d), f, g ∈ S0(Rd).
703
+ Then SRτ as in (37) is well-defined, linear, continuous, extends (36) and it
704
+ is the Banach space adjoint of FWτ in (i):
705
+ (38)
706
+ SRτ = F ∗
707
+ Wτ,
708
+ in the sense that for every a ∈ S′
709
+ 0(R2d) and S ∈ S0
710
+ ⟨a,FWτS⟩ = ⟨SRτ(a),S⟩ = ⟨KSRτ (a),KS⟩;
711
+ (iii) Every function F ∈ S0(R2d) admits an expansion of the following type:
712
+ F =
713
+
714
+
715
+ n=1
716
+ V τ
717
+ gnfn,
718
+ for some sequences {fn}n, {gn}n ⊆ S0(Rd) such that �∞
719
+ n=1 ∥fn∥S0 ∥gn∥S0 <
720
+ ∞.
721
+ Proof. (i) First we notice that if we start with a ∈ S0(R2d), then SRτ(a) is the
722
+ Feichtinger operator with kernel
723
+ KSRτ (a)(y, u) =
724
+
725
+ Rd a(y − u, ω)e2πiyω dω = F −1
726
+ 2 [a(y − u, ·)](y).
727
+ Clearly SRτ is continuous from S0(R2d) into S0.
728
+ Since we have Wτ = FσFWτ and Fσ is an automorphism of S0(R2d), we can write
729
+ FWτ = FσWτ and which is an isomorphism due to Corollary 3.8. To prove that SRτ
730
+
731
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
732
+ 13
733
+ is the inverse of FWτ we use (34), take S = �∞
734
+ n=1 fn ⊗ gn ∈ S0 and ψ, ϕ ∈ S0(Rd):
735
+ ⟨(SRτ ◦ FWτS)ψ,ϕ⟩ =
736
+
737
+ R2d FWτS(z)⟨πτ(z)ψ,ϕ⟩ dz
738
+ =
739
+
740
+
741
+ n=1
742
+
743
+ R2d V τ
744
+ gnfn(z)V τ
745
+ ψ ϕ(z) dz
746
+ =
747
+
748
+
749
+ n=1
750
+ ⟨fn,ϕ⟩⟨gn,ψ⟩
751
+ = ⟨
752
+
753
+
754
+ n=1
755
+ ⟨ψ,gn⟩fn,ϕ⟩
756
+ = ⟨
757
+
758
+
759
+ n=1
760
+ (fn ⊗ gn)ψ,ϕ⟩
761
+ = ⟨Sψ,ϕ⟩,
762
+ in the third equality we used Moyal’s identity. For the composition FWτ ◦SRτ, notice
763
+ that this is the identity on S0(R2d) due lo Lemma 2.2 (vii).
764
+ (ii) Well-posedness, linearity and continuity of SRτ from S′
765
+ 0(R2d) into S′
766
+ 0 are stan-
767
+ dard. Trivially (37) extends (36). To see that SRτ is the Banach space adjoint of
768
+ FWτ from S0 into S0(R2d), take a ∈ S′
769
+ 0(R2d) and S ∈ S0. In the following calcula-
770
+ tions we use: the prior stated (34), the representation for Feichtinger operators and
771
+ their kernel given in Lemma 3.4, the Outer and Inner Kernel Theorems:
772
+ ⟨a,FWτS⟩ =
773
+
774
+
775
+ n=1
776
+ ⟨a,V τ
777
+ gnfn⟩ =
778
+
779
+
780
+ n=1
781
+ ⟨SRτ(a)gn,fn⟩
782
+ =
783
+
784
+
785
+ n=1
786
+ ⟨KSRτ (a),Kfn⊗gn⟩ = ⟨KSRτ (a),KS⟩
787
+ = ⟨SRτ(a),S⟩.
788
+ (iii) The last claim is a direct consequence of the computations in (34) and the
789
+ surjectivity of FWτ.
790
+
791
+ 3.2. A convenient environment for QHA. In Section 2 we introduced convo-
792
+ lutions between a function and an operator and two operators. Keyl, Kiukas and
793
+ Werner [14] showed that such convolutions make sense for wider classes of (gen-
794
+ eralized) functions and operators. We summarize here the main results; in what
795
+ follows S denotes the set of pseudo-differential operators with Weyl symbol in the
796
+ Schwartz class S(R2d) and S′ those pseudo-differential operators with Weyl symbol
797
+ in S′(R2d). On account of the Schwartz Kernel Theorem we can identify S′ with
798
+ the continuous and linear operators from S(Rd) into S′(Rd).
799
+
800
+ 14
801
+ FEDERICO BASTIANONI AND FRANZ LUEF
802
+ Proposition 3.10.
803
+ (i) Suppose S, T ∈ S, A ∈ S′, b ∈ S(R2d) and a ∈ S′(R2d).
804
+ Then the following convolutions are well-defined and they extend the ones
805
+ defined in Subsection 2.2:
806
+ S ⋆ T ∈ S(R2d),
807
+ S ⋆ A ��� S′(R2d),
808
+ b ⋆ S ∈ S,
809
+ a ⋆ S, b ⋆ A ∈ S′;
810
+ (ii) The Fourier-Wigner transform can be extended to a topological isomorphism
811
+ FW1/2 : S′ → S′(R2d);
812
+ (iii) We have Fσ(S ⋆ T) = FW1/2S · FW1/2T and FW1/2(b ⋆ S) = Fσb · FW1/2S
813
+ whenever S, T and b are such that the convolutions are defined as in part (i);
814
+ (iv) The Weyl symbol of A ∈ S′ is given by FσFW1/2A.
815
+ The authors of [14] proved that the class of so-called Schwartz operators S has
816
+ the structure of a Fr´echet space. We propose that the Banach space of Feichtinger
817
+ operators S0 is an alternative to S that is a much bigger class of “nice” operators.
818
+ We start with some preliminaries on S0 and S0.
819
+ Lemma 3.11. Given f ∈ S′
820
+ 0(Rd), there exists a sequence {fn}n ⊆ S0(Rd) which
821
+ w-∗ converges to f and it is bounded by ∥f∥S′
822
+ 0, i.e.
823
+ lim
824
+ n→+∞⟨fn, g⟩ = ⟨f,g⟩
825
+ ∀ g ∈ S0(Rd),
826
+ sup
827
+ n ∥fn∥S0 ≤ ∥f∥S′
828
+ 0 .
829
+ Proof. Let us fix f ∈ S′
830
+ 0(Rd) ∖ {0} and set R := ∥f∥S′
831
+ 0. By [13, Proposition 6.15],
832
+ there exists a net {fα}α∈A ⊆ S0(Rd) which converges w-∗ to f in S′
833
+ 0 and such that
834
+ ∥fα∥S′
835
+ 0 ≤ R for every α ∈ A. Set
836
+ BR :=
837
+
838
+ f ∈ S′
839
+ 0(Rd) | ∥f∥S′
840
+ 0 ≤ R
841
+
842
+ and
843
+ ER := S0(Rd) ∩ BR,
844
+ where S0 is identified with its natural embedding in S′
845
+ 0, i.e.
846
+ ER ⊆ BR ⊆ ER
847
+ w−∗.
848
+ ER
849
+ w−∗ is bounded in S′
850
+ 0(Rd).
851
+ In fact, if f0 ∈ ER
852
+ w−∗, then there exists a net {fα}α∈A ⊆ ER that it converges w-∗
853
+ to f0. Hence, we obtain
854
+ ∥f0∥S′
855
+ 0 ≤ lim inf
856
+ α∈A
857
+ ∥fα∥S′
858
+ 0 = lim
859
+ α∈A inf{∥fβ∥S′
860
+ 0 | α ⪯ β} ≤ lim
861
+ α∈A R = R.
862
+ In particular, this shows that ER
863
+ w−∗ ⊆ BR and we get
864
+ ER
865
+ w−∗ = BR.
866
+ Since S0 separable, and the relative w-∗ topology on BR is induced by a metric by
867
+ [18, Therem 2.6.23]. Hence the topological w-∗ closure of ER equals its sequential
868
+ w-∗ closure. Consequently, there exists a sequence {fn}n ⊆ ER which converges w-∗
869
+ to f in S′
870
+ 0(Rd).
871
+
872
+
873
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
874
+ 15
875
+ Remark 3.12. The above lemma holds also for any LCA second countable group G
876
+ replacing Rd, see [8, Theorem 2] for the separability of S0(G).
877
+ Lemma 3.13. For any S ∈ S′
878
+ 0, there exists a sequence {Sn}n ⊆ S0 such that
879
+ (i) ∥Sn∥S′
880
+ 0 ≲ ∥S∥S′
881
+ 0;
882
+ (ii) limn→+∞ |⟨(S − Sn)f,g⟩| = 0 for all f, g ∈ S0(Rd).
883
+ Proof. This is a straightforward application of the Kernel Theorems 3.2 and 3.2 and
884
+ of Lemma 3.11.
885
+
886
+ Convergence as in item (ii) of the above lemma will be also denoted by
887
+ Sn
888
+ w−∗
889
+ −→
890
+ n
891
+ S
892
+ in
893
+ S′
894
+ 0
895
+ or
896
+ S = w- ∗ -limn Sn
897
+ in
898
+ S′
899
+ 0.
900
+ Lemma 3.14. Let S : S0 → S′
901
+ 0 be in S0. Then the Banach space adjoint S∗: S′
902
+ 0 →
903
+ S0 is in S0 with kernel
904
+ (39)
905
+ KS∗(y, u) = KS(u, y).
906
+ Proof. We take f, g ∈ S0(Rd), then
907
+ ⟨Sf,g⟩ =
908
+
909
+ R2d KT(y, u)g(y)f(u) dydu
910
+ =
911
+
912
+ Rd f(u)
913
+
914
+ Rd KS(y, u)g(y) dy du
915
+ = ⟨f,S∗g⟩.
916
+ Hence, S∗g(y) =
917
+
918
+ Rd KS(u, y)g(u) du, i.e. KS∗(y, u) = KS(u, y) which is an element
919
+ of S0(R2d).
920
+
921
+ Corollary 3.15. S0 is a Banach ∗-algebra.
922
+ We notice that (S∗)ˇ= ( ˇS)∗, so that from now on we shall simply write ˇS∗ when
923
+ necessary.
924
+ Lemma 3.16.
925
+ (i) The following applications are surjective isometries:
926
+ (i − a) αz : S0 → S0, for any z = (x, ω) ∈ R2d, and
927
+ (40)
928
+ KαzS(y, u) = e2πi(y−u)ωKS(y − x, u − x);
929
+ (i − b) ˇ·: S0 → S0 and
930
+ (41)
931
+ K ˇS(y, u) = KS(−y − u);
932
+ (i − c) αz : S′
933
+ 0 → S′
934
+ 0, for any z ∈ R2d;
935
+ (i − d) ˇ·: S′
936
+ 0 → S′
937
+ 0;
938
+ (ii) Let S, T ∈ S0 and b ∈ S0(R2d). Then
939
+ S ⋆ T ∈ S0(R2d),
940
+ b ⋆ S ∈ S0;
941
+
942
+ 16
943
+ FEDERICO BASTIANONI AND FRANZ LUEF
944
+ (iii) The kernel of the mixed-state localization operator b ⋆ S is given by
945
+ (42)
946
+ Kb⋆S(y, u) =
947
+
948
+ Rd b(x, ω)e2πi(y−u)ωKS(y − x, u − x) dxdω;
949
+ for very z = (x, ω) ∈ R2d the kernel of Sαz ˇT is
950
+ (43)
951
+ KSαz ˇT(y, u) =
952
+
953
+ Rd e2πi(y−t)ωKT(x − y, x − t)KS(t, u) dt.
954
+ Proof. (i) We leave the elementary computations to the interest reader, and note that
955
+ in order to prove αzS, ˇS ∈ S0 the result [10, Corollary 3.3] is useful. A continuous
956
+ and linear operator S : S0 → S′
957
+ 0 is a Feichtinger operator if and only if
958
+
959
+ R2d
960
+
961
+ R2d |⟨Sπ(z)g1,π(w)g2⟩| dzdw
962
+ is finite for any g1, g2 ∈ S0(Rd).
963
+ (ii) We first address the convolution between two Feichtinger operators. By item
964
+ (i) and the fact that S0 is a Banach algebra under composition, we have that Sαz ˇT
965
+ is in S0 for any z = (x, ω) ∈ R2d. We have by [10, Corollary 3.15]:
966
+ S ⋆ T(z) = tr(Sαz ˇT) =
967
+
968
+ Rd KSαz ˇT(y, y) dy =
969
+
970
+ R2d Kαz ˇT(y, t)KS(t, y) dtdy
971
+ =
972
+
973
+ R2d e2πi(y−t)ωKT(x − y, x − t)KS(t, y) dtdy
974
+ =
975
+
976
+ Rd
977
+ ��
978
+ Rd KT(x − y, x − t)KS(t, y)e−2πitω dt
979
+
980
+ e2πiyω dy
981
+ = F −1
982
+ 2 F1
983
+
984
+ ΦT(x,x)KT · KS
985
+
986
+ (ω, ω),
987
+ where ΦF(t, y) := F(−y, −t), F1 and F2 are the partial Fourier transforms with re-
988
+ spect to the first and second variable, respectively. Consider now f, g, h, l ∈ S0(Rd),
989
+ it is useful to compute the following where P is the parity operator:
990
+ F −1
991
+ 2 F1
992
+
993
+ ΦT(x,x)Kh⊗l · Kf⊗g
994
+
995
+ (ω, ω) =
996
+
997
+ Rd
998
+ ��
999
+ Rd h(x − y)l(x − t)f(t)g(y)e−2πitω dt
1000
+
1001
+ e2πiyω dy
1002
+ =
1003
+
1004
+ Rd f(t)e−2πitωl(x − t) dt ·
1005
+
1006
+ Rd g(y)e2πiyωh(x − y) dy
1007
+ = VP lf(−x, ω) · VP hg(−x, ω).
1008
+ Hence F −1
1009
+ 2 F1
1010
+
1011
+ ΦT(x,x)Kh⊗l · Kf⊗g
1012
+
1013
+ (ω, ω) is in S0(R2d) as a function of (x, ω). We
1014
+ consider now two representations S = �∞
1015
+ n=1 fn ⊗ gn and T = �∞
1016
+ n=1 hn ⊗ ln, see
1017
+
1018
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
1019
+ 17
1020
+ Lemma 3.4, so that
1021
+ KS =
1022
+
1023
+
1024
+ n=1
1025
+ Kfn⊗gn,
1026
+ KT =
1027
+
1028
+
1029
+ n=1
1030
+ Khn⊗ln.
1031
+ It follows that we can write
1032
+ S ⋆ T(z) = F −1
1033
+ 2 F1
1034
+
1035
+ ΦT(x,x)
1036
+
1037
+
1038
+ M
1039
+ Khm⊗lm ·
1040
+
1041
+
1042
+ n=1
1043
+ Kfn⊗gn
1044
+
1045
+ (ω, ω)
1046
+ =
1047
+
1048
+
1049
+ m=1
1050
+
1051
+
1052
+ n=1
1053
+ F −1
1054
+ 2 F1
1055
+
1056
+ ΦT(x,x)Khm⊗lm · Kfn⊗gn
1057
+
1058
+ (ω, ω)
1059
+ =
1060
+
1061
+
1062
+ m=1
1063
+
1064
+
1065
+ n=1
1066
+ VP lmfn(−x, ω) · VP hmgn(−x, ω) ∈ S0(R2d),
1067
+ the convergence is guaranteed by Lemma 3.4.
1068
+ Concerning b⋆S, the following estimate for any f, g ∈ S0(Rd) proves that b⋆S ∈ S′
1069
+ 0:
1070
+ |⟨(b ⋆ S)f,g⟩| ≤
1071
+
1072
+ R2d |b(z)| |⟨Sπ(z)∗f,π(z)∗g⟩| dz ≲ ∥b∥L1 ∥S∥S′
1073
+ 0 ∥f∥S0 ∥g∥S0 .
1074
+ We exploit [10, Theorem 3.2 (ii)] to show that b ⋆ S is in S0. For g1, g2 ∈ S0(Rd) we
1075
+ have
1076
+
1077
+ R2d
1078
+
1079
+ R2d |⟨(b ⋆ S)π(w)g1,π(u)g2⟩| dwdu ≤
1080
+
1081
+ R2d
1082
+
1083
+ R2d
1084
+
1085
+ R2d |b(z)|
1086
+ × |⟨Sπ(w − z)g1,π(u − z)g2⟩| dzdwdu
1087
+ =
1088
+
1089
+ R2d
1090
+
1091
+ R2d |⟨Sπ(w′)g1,π(u′)g2⟩| dw′du′ ·
1092
+
1093
+ R2d |b(z)| dz < +∞.
1094
+ (iii) We compute explicitly the kernel of the operator given by the convolution b⋆S:
1095
+ ⟨(b ⋆ S)f,g⟩ =
1096
+
1097
+ R2d b(x, ω)
1098
+
1099
+ R2d KS(y, u)π(−z)g(y)π(−z)f(u) dydu dxdω
1100
+ =
1101
+
1102
+ R2d
1103
+
1104
+ R2d b(x, ω)e2πi(y−u)ωKS(y, u)g(y + x)f(u + x) dxdω dydu,
1105
+ for z = (x, ω) ∈ R2d. The change of variables y′ = y + u, u′ = u + x gives the desired
1106
+ result.
1107
+ The last claim is just a direct application of (40), (41) and the Banach
1108
+ algebra property for S0 [10, Lemma 3.10].
1109
+
1110
+ Corollary 3.17. Let S, T ∈ S0 with spectral decompositions S = �∞
1111
+ n=1 fn ⊗ gn and
1112
+ T = �∞
1113
+ n=1 hn⊗ln, where {fn}n, {gn}n, {hn}n, {ln}n ⊆ S0(Rd) with �∞
1114
+ n=1 ∥fn∥S0 ∥gn∥S0 <
1115
+
1116
+ 18
1117
+ FEDERICO BASTIANONI AND FRANZ LUEF
1118
+ +∞, �∞
1119
+ n=1 ∥hn∥S0 ∥ln∥S0 < +∞. Then, with the notations introduced in the proof
1120
+ of Lemma 3.16, for every z = (x, ω) ∈ R2d:
1121
+ S ⋆ T(z) = F −1
1122
+ 2 F1
1123
+
1124
+ ΦT(x,x)KT · KS
1125
+
1126
+ (ω, ω)
1127
+ =
1128
+
1129
+
1130
+ m=1
1131
+
1132
+
1133
+ n=1
1134
+ VP lmfn(−x, ω) · VP hmgn(−x, ω).
1135
+ (44)
1136
+ Definition 3.18. Let A ∈ S′
1137
+ 0, a ∈ S′
1138
+ 0(R2d), S ∈ S0 and b ∈ S0(R2d). Consider any
1139
+ sequences {An}n ⊆ S0 and {an}n ⊆ S0(R2d) such that
1140
+ An
1141
+ w−∗
1142
+ −→
1143
+ n
1144
+ A
1145
+ in
1146
+ S′
1147
+ 0
1148
+ and
1149
+ an
1150
+ w−∗
1151
+ −→
1152
+ n
1153
+ a
1154
+ in
1155
+ S′
1156
+ 0(R2d).
1157
+ Then we define:
1158
+ S ⋆ A := w- ∗ -limn S ⋆ An
1159
+ in
1160
+ S′
1161
+ 0(R2d);
1162
+ (45)
1163
+ a ⋆ S := S ⋆ a := w- ∗ -limn an ⋆ S
1164
+ in
1165
+ S′
1166
+ 0;
1167
+ (46)
1168
+ b ⋆ A := A ⋆ b := w- ∗ -limn b ⋆ An
1169
+ in
1170
+ S′
1171
+ 0.
1172
+ (47)
1173
+ Remark 3.19. The reader may find it useful to keep in mind the following simple
1174
+ identities, which will be used in the proof of the subsequent proposition. Consider
1175
+ S ∈ S0, ψ, ϕ, f, g ∈ S0(Rd) and z ∈ R2d:
1176
+ αz(ψ ⊗ ϕ) = π(z)ψ ⊗ π(z)ϕ;
1177
+ (ψ ⊗ ϕ)(Kf⊗g) = ⟨f, ϕ⟩(ψ ⊗ g);
1178
+ (ψ ⊗ ϕ) ⋆ ˇS(z) = ⟨π(z)Sπ(z)∗ψ,ϕ⟩.
1179
+ Proposition 3.20. The convolutions introduced in Definition 3.18:
1180
+ (i) They do not depend on the sequences chosen; moreover, taking A, a, S, b as
1181
+ in Definition 3.18:
1182
+ ⟨S ⋆ A,b⟩ = ⟨KA,Kb⋆ ˇS∗⟩;
1183
+ (48)
1184
+ ⟨(a ⋆ S)f,g⟩ = ⟨a,(g ⊗ f) ⋆ ˇS∗⟩;
1185
+ (49)
1186
+ ⟨(b ⋆ A)f,g⟩ = ⟨KA,Kb∗⋆(g⊗f)⟩,
1187
+ (50)
1188
+ where b∗(z) := b(−z);
1189
+ (ii) These extend the definitions given in Subsection 2.2;
1190
+ (iii) They are commutative;
1191
+
1192
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
1193
+ 19
1194
+ (iv) Moreover, they are associative. In particular, if z ∈ R2d, T, Q ∈ S0, σ ∈
1195
+ S0(R2d) and A, a, S, b as in Definition 3.18 then:
1196
+ (S ⋆ (T ⋆ b))(z) = ((S ⋆ T) ∗ b)(z);
1197
+ (51)
1198
+ S ⋆ (T ⋆ Q) = (S ⋆ T) ⋆ Q;
1199
+ (52)
1200
+ (S ⋆ b) ⋆ σ = S ⋆ (b ∗ σ);
1201
+ (53)
1202
+ S ⋆ (T ⋆ a) = (S ⋆ T) ∗ a;
1203
+ (54)
1204
+ A ⋆ (T ⋆ b) = (A ⋆ T) ⋆ b;
1205
+ (55)
1206
+ S ⋆ (T ⋆ A) = (S ⋆ T) ⋆ A;
1207
+ (56)
1208
+ in the above identities ∗ denotes the usual convolution between two functions
1209
+ or a function and a distribution.
1210
+ Proof. (i) It suffices to show (48), (49) and (50), since the other assertions in (i) are
1211
+ evident.
1212
+ We start with(48).
1213
+ Let b ∈ S0(R2d) and z = (x, ω) ∈ R2d, in the subsequent
1214
+ computations we use Lemma 3.14 and 3.16:
1215
+ ⟨S ⋆ A,b⟩ = lim
1216
+ n→+∞⟨S ⋆ An,b⟩ = lim
1217
+ n→+∞
1218
+
1219
+ R2d tr(Sαz ˇAn)b(z) dz
1220
+ = lim
1221
+ n→+∞
1222
+
1223
+ R2d
1224
+
1225
+ Rd KSαz ˇ
1226
+ An(y, y) dyb(z)dz
1227
+ = lim
1228
+ n→+∞
1229
+
1230
+ R2d
1231
+
1232
+ Rd
1233
+
1234
+ Rd e2πi(y−t)ωKAn(x − y, x − t)KS(t, y) dtdy b(z) dz
1235
+ = lim
1236
+ n→+∞
1237
+
1238
+ R2d
1239
+
1240
+ Rd
1241
+
1242
+ Rd e2πi(t′−y′)ωKAn(y′, t′)KS(x − t′, x − y′) dt′dy′ b(z) dz
1243
+ = lim
1244
+ n→+∞
1245
+
1246
+ Rd
1247
+
1248
+ Rd KAn(y′, t���)
1249
+ ��
1250
+ R2d KS(x − t′, x − y′)e2πi(y′−t′)ωb(z) dz
1251
+
1252
+ dy′dt′
1253
+ = lim
1254
+ n→+∞
1255
+
1256
+ Rd
1257
+
1258
+ Rd KAn(y′, t′)
1259
+ ��
1260
+ R2d K ˇS(t′ − x, y′ − x)e2πi(y′−t′)ωb(z) dz
1261
+
1262
+ dy′dt′
1263
+ = lim
1264
+ n→+∞
1265
+
1266
+ Rd
1267
+
1268
+ Rd KAn(y′, t′)
1269
+ ��
1270
+ R2d K ˇS∗(y′ − x, t′ − x)e2πi(y′−t′)ωb(z) dz
1271
+
1272
+ dy′dt′
1273
+ = lim
1274
+ n→+∞
1275
+
1276
+ Rd
1277
+
1278
+ Rd KAn(y′, t′)Kb⋆ ˇS∗(y′, t′) dy′dt′.
1279
+
1280
+ 20
1281
+ FEDERICO BASTIANONI AND FRANZ LUEF
1282
+ About (49), we take f, g ∈ S0(Rd) and compute directly keeping in mind Remark
1283
+ 3.19:
1284
+ ⟨(a ⋆ S)f,g⟩ =
1285
+ lim
1286
+ n→+∞
1287
+
1288
+ R2d an(z)⟨π(z)Sπ(z)∗f,g⟩ dz
1289
+ =
1290
+ lim
1291
+ n→+∞
1292
+
1293
+ R2d an(z)⟨π(z)S∗π(z)∗g,f⟩ dz
1294
+ =
1295
+ lim
1296
+ n→+∞
1297
+
1298
+ R2d an(z)(g ⊗ f) ⋆ ˇS∗(z) dz.
1299
+ Let us address (50):
1300
+ ⟨(b ⋆ A)f,g⟩ =
1301
+ lim
1302
+ n→+∞⟨Kb⋆An,Kg⊗f⟩
1303
+ =
1304
+ lim
1305
+ n→+∞
1306
+
1307
+ R2d
1308
+ � �
1309
+ R2d b(x, ω)e2πi(y−u)ωKAn(y − x, u − x) dxdω
1310
+
1311
+ × g(y)f(u) dydu
1312
+ =
1313
+ lim
1314
+ n→+∞
1315
+
1316
+ R2d KAn(y′, u′)
1317
+ � �
1318
+ R2d b(x, ω)e−2πi(y′−u′)ω
1319
+ × g(y′ + x)f(u′ + x) dxdω
1320
+
1321
+ dy′du′
1322
+ =
1323
+ lim
1324
+ n→+∞
1325
+
1326
+ R2d KAn(y′, u′)
1327
+ � �
1328
+ R2d b∗(x′, ω′)e2πi(y′−u′)ω′
1329
+ × g(y′ − x′)f(u′ + x′) dx′dω′
1330
+
1331
+ dy′du′
1332
+ =
1333
+ lim
1334
+ n→+∞
1335
+
1336
+ R2d KAn(y′, u′)Kb∗⋆(g⊗f)(y′, u′) dy′du′,
1337
+ where for sake of brevity we set b∗(z) := b(−z).
1338
+ (ii) and (iii) are trivial.
1339
+ (iv) We prove just (51), (52) and (53). The remaining identities can be derived in
1340
+ a similar manner.
1341
+
1342
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
1343
+ 21
1344
+ In order to show (51) we compute for z ∈ R2d:
1345
+ (S ⋆ (T ⋆ b))(z) = tr
1346
+
1347
+ S ◦ αz
1348
+ ���
1349
+ R2d b(z)αwT dw
1350
+
1351
+ ˇ
1352
+ ��
1353
+ = tr
1354
+
1355
+ S ◦
1356
+ ��
1357
+ R2d b(w)αz ((αwT)ˇ) dw
1358
+ ��
1359
+ = tr
1360
+
1361
+ S ◦
1362
+
1363
+ R2d b(w)αzα−w ˇT dw
1364
+
1365
+ = tr
1366
+
1367
+ S ◦
1368
+
1369
+ R2d b(−w′)αw′αz ˇT dw′
1370
+
1371
+ =
1372
+
1373
+ R2d b(−w′) tr
1374
+
1375
+ Sαw′+z ˇT
1376
+
1377
+ dw′,
1378
+ where the last equality is due, e.g., to [20, Proposition 2.9]. we can the rephrase the
1379
+ last right-side term as
1380
+
1381
+ R2d b(z − w′′) tr
1382
+
1383
+ Sαw′′ ˇT
1384
+
1385
+ dw′′ =
1386
+
1387
+ R2d b(z − w′′)(S ⋆ T)(w′′) dw′′
1388
+ = ((S ⋆ T) ∗ b)(z).
1389
+ For the proof of (52), the following property of the trace is useful:
1390
+
1391
+ R2d tr(SαwT) dw = tr(S) tr(T),
1392
+ where S, T ∈ J 1. Take now f, g ∈ S0(Rd):
1393
+ ⟨(S ⋆ (T ⋆ Q))f,g⟩ =
1394
+
1395
+ R2d tr(Tαz ˇQ)⟨αzSf,g⟩ dz
1396
+ =
1397
+
1398
+ R2d tr(Qαz ˇT) tr((αzS)(f ⊗ g)) dz
1399
+ =
1400
+
1401
+ R2d
1402
+
1403
+ R2d tr(Q(αz ˇT)αw((αzS)(f ⊗ g))) dwdz
1404
+ =
1405
+
1406
+ R2d
1407
+
1408
+ R2d tr((f ⊗ g)(αwQ)αz((αw ˇT)S)) dzdw
1409
+ =
1410
+
1411
+ R2d tr(Sαw ˇT) tr((αwQ)(f ⊗ g)) dw
1412
+ = ⟨((S ⋆ T) ⋆ Q)f,g⟩.
1413
+
1414
+ 22
1415
+ FEDERICO BASTIANONI AND FRANZ LUEF
1416
+ Also the last identity (53) may be deduced by a direct computation. For f, g ∈
1417
+ S0(Rd) we have
1418
+ ⟨((S ⋆ b) ⋆ σ)f,g⟩ =
1419
+
1420
+ R2d σ(z)⟨αz(S ⋆ b)f,g⟩ dz
1421
+ =
1422
+
1423
+ R2d σ(z)
1424
+
1425
+ R2d b(w)⟨(αwS)π(z)∗f,π(z)∗g⟩ dwdz
1426
+ =
1427
+
1428
+ R2d
1429
+
1430
+ R2d σ(z)b(w)⟨(αw+zS)f,g⟩ dwdz
1431
+ =
1432
+
1433
+ R2d
1434
+
1435
+ R2d σ(z)b(w) tr((αw+zS)(f ⊗ g)) dwdz
1436
+ =
1437
+
1438
+ R2d b(w)
1439
+
1440
+ R2d σ(z′ − w) tr((αz′S)(f ⊗ g)) dz′dw
1441
+ =
1442
+
1443
+ R2d(
1444
+
1445
+ R2d b(w)σ(z′ − w) dz′) tr((αz′S)(f ⊗ g)) dw
1446
+ =
1447
+
1448
+ R2d b ∗ σ(z′)⟨(αz′S)f,g⟩ dz′
1449
+ = ⟨(S ⋆ (b ∗ σ))f,g⟩.
1450
+ This concludes the proof.
1451
+
1452
+ Corollary 3.21. The mappings FWτ and Wτ defined on S0 can be extended to
1453
+ topological isomorphisms
1454
+ FWτ : S′
1455
+ 0 → S′
1456
+ 0(R2d)
1457
+ and
1458
+ Wτ : S′
1459
+ 0 → S′
1460
+ 0(R2d)
1461
+ by duality:
1462
+ (57)
1463
+ ⟨FWτS,a⟩ := ⟨S,SRτa⟩,
1464
+ ⟨WτS,a⟩ := ⟨S, Opτ a⟩,
1465
+ where S ∈ S′
1466
+ 0 and a ∈ S0(R2d). The inverses are given by
1467
+ SRτ : S′
1468
+ 0(R2d) → S′
1469
+ 0
1470
+ and
1471
+ Opτ : S′
1472
+ 0(R2d) → S′
1473
+ 0,
1474
+ respectively.
1475
+ Proof. The definitions in (57) rely on the fact that Opτ = W ∗
1476
+ τ and SRτ = F ∗
1477
+ Wτ, see
1478
+ Theorem 3.7 and Corollary 3.9. It is straightforward to see that if S ∈ S′
1479
+ 0, then
1480
+ FWτS and WτS defined as in (57) are in S′
1481
+ 0(R2d). Also linearity and boundedness
1482
+ of FWτ : S′
1483
+ 0 → S′
1484
+ 0(R2d) and Wτ : S′
1485
+ 0 → S′
1486
+ 0(R2d) are easy to verify as well as the fact
1487
+ that they extend FWτ : S0 → S0(R2d) and Wτ : S0 → S0(R2d).
1488
+ We show that Wτ is an isomorphisms with inverse Opτ, then FWτ is treated in
1489
+ the same way.
1490
+ Wτ is injective because Opτ : S0(R2d) → S0 is an isomorphism.
1491
+ Fix now a ∈ S′
1492
+ 0(R2d), there exists a sequence {an}n ⊆ S0(R2d) such that an
1493
+ w−∗
1494
+ −→
1495
+ n
1496
+
1497
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
1498
+ 23
1499
+ a
1500
+ in
1501
+ S′
1502
+ 0(R2d). Since Wτ is an isomorphism between S0 and S0(R2d), there exists
1503
+ {An}n ⊆ S0 such that an = WτAn. We see that there is A ∈ S′
1504
+ 0 such that An
1505
+ w−∗
1506
+ −→
1507
+ n
1508
+ A
1509
+ in
1510
+ S′
1511
+ 0, in fact taking b ∈ S0(R2d)
1512
+ ⟨a,b⟩ =
1513
+ lim
1514
+ n→+∞⟨WτAn,b⟩ = lim
1515
+ n→+∞⟨An, Opτ b⟩.
1516
+ Hence a = WτA, which proves that Wτ is onto. We show now that Wτ ◦ Opτ is the
1517
+ identity on S′
1518
+ 0(R2d), take a ∈ S′
1519
+ 0(R2d) and b ∈ S0(R2d):
1520
+ ⟨Wτ ◦ Opτ a,b⟩ = ⟨Opτ a, Opτ b⟩ = ⟨a,Wτ ◦ Opτ b⟩ = ⟨a,b⟩.
1521
+ The first identity is just (57), the second one is (32) and the last one is (i) of
1522
+ Corollary 3.8. For the other direction, take S ∈ S′
1523
+ 0 and T ∈ S0:
1524
+ ⟨Opτ ◦WτS,T⟩ = ⟨WτS,WτT⟩ = ⟨S, Opτ ◦WτT⟩ = ⟨S,T⟩.
1525
+ The first identity is (32), the second one is (57) and the last one is (i) of Corollary
1526
+ 3.8.
1527
+
1528
+ 3.3. τ-Cohen’s class of operators. In the present subsection we define Qτ
1529
+ a(S)
1530
+ and recall the definition of Qτ
1531
+ S(f) from [17]. We shall see that Qτ
1532
+ a(S) relates to
1533
+ well-known objects and observe that it coincides with the τ-symbol of the mixed-
1534
+ state localization operator a ⋆ S. We continue with some statements concerning the
1535
+ interplay between the Gabor matrix of an operator Gϕ
1536
+ T, the τ-Cohen’s class, the
1537
+ trace and the τ-Wigner distribution.
1538
+ Definition 3.22. For a ∈ S′
1539
+ 0(R2d) we define the τ-Cohen’s class distribution, with
1540
+ kernel a, of an operator S ∈ S0 as
1541
+ (58)
1542
+
1543
+ a(S) := a ∗ WτS.
1544
+ Of course, the rank-one case f ⊗ g reduces to the definition given in (23). We
1545
+ recall also the definition given in [17] of Cohen’s class distribution of a function
1546
+ f ∈ S0(Rd) w.r.t. the operator S ∈ S′
1547
+ 0 by
1548
+ (59)
1549
+ QSf := (f ⊗ f) ⋆ ˇS.
1550
+ It can be easily seen that for every z ∈ R2d
1551
+ QSf(z) = (f ⊗ f) ⋆ ˇS(z) = ⟨(αzS)f, f, ⟩.
1552
+ Remark 3.23. If a ∈ S′
1553
+ 0(R2d) and S ∈ S0, then we see that the τ-Cohen’s class rep-
1554
+ resentation of S w.r.t. a is just the τ-symbol of the mixed-state localization operator
1555
+ a ⋆ S:
1556
+ aa⋆S
1557
+ τ
1558
+ = Wτ(a ⋆ S) = a ∗ WτS = Qτ
1559
+ a(S).
1560
+
1561
+ 24
1562
+ FEDERICO BASTIANONI AND FRANZ LUEF
1563
+ Lemma 3.24. Let S ∈ S0 have the spectral decomposition �∞
1564
+ n=1 fn⊗gn, for f, ϕ, ψ ∈
1565
+ S0(Rd) and {hn}n ⊆ S0(Rd) with
1566
+
1567
+
1568
+ n=1
1569
+ ∥hn∥2
1570
+ S0 < +∞.
1571
+ . Then for every z ∈ R2d:
1572
+
1573
+ W1−τ ( ˇψ, ˇϕ)(S)(z) =
1574
+
1575
+
1576
+ n=1
1577
+ Vϕfn(z)Vψgn(z);
1578
+ (60)
1579
+
1580
+ W1−τ ( ˇϕ, ˇϕ)(
1581
+
1582
+
1583
+ n=1
1584
+ hn ⊗ hn)(z) =
1585
+
1586
+
1587
+ n=1
1588
+ |Vϕhn(z)|2 .
1589
+ (61)
1590
+ Proof. Clearly, it suffices to prove the first identity. We show first that for f, g ∈
1591
+ S0(Rd)
1592
+ (62)
1593
+
1594
+ a(f, g) = (f ⊗ g) ⋆ Op1-τ(a).
1595
+ In fact, applying Fσ to the right-hand side first we get
1596
+ Fσ((f ⊗ g) ⋆ Op1-τ(a)) = FWτ(f ⊗ g) · FW1−τ Op1-τ(a) = V τ
1597
+ g f · Fσa.
1598
+ We apply Fσ a second time:
1599
+ (f ⊗ g) ⋆ Op1-τ(a) = FσV τ
1600
+ g f ∗ FσFσa = Wτ(f, g) ∗ a.
1601
+ We can now proceed as follows:
1602
+
1603
+ W1−τ ( ˇψ, ˇϕ)(S) = W1−τ( ˇψ, ˇϕ) ∗ Wτ(
1604
+
1605
+
1606
+ n=1
1607
+ fn ⊗ gn) =
1608
+
1609
+
1610
+ n=1
1611
+ W1−τ( ˇψ, ˇϕ) ∗ Wτ(fn, gn)
1612
+ =
1613
+
1614
+
1615
+ n=1
1616
+ (fn ⊗ gn) ⋆ Op1-τ(W1−τ( ˇψ, ˇϕ)) =
1617
+
1618
+
1619
+ n=1
1620
+ (fn ⊗ gn) ⋆ ( ˇψ ⊗ ˇϕ)
1621
+ =
1622
+
1623
+
1624
+ n=1
1625
+ Vϕfn(z)Vψgn(z),
1626
+ where the last equality is due to [17].
1627
+
1628
+ We call a bounded operator T on L2(Rd) positive, denoted by T ≥ 0, if
1629
+ ⟨Tf, f⟩ ≥ 0,
1630
+ ∀ f ∈ L2(Rd).
1631
+ An operator T ∈ J 1 and T ≥ 0 is also called a state in quantum mechanics.
1632
+ Let us take T ∈ S′
1633
+ 0 and ϕ ∈ S, then the Gabor matrix of T (w.r.t. ϕ) is defined as
1634
+ (63)
1635
+
1636
+ T(z, w) := ⟨Tπ(w)ϕ, π(z)ϕ⟩,
1637
+ z = (x, ω), w = (u, v) ∈ R2d.
1638
+
1639
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
1640
+ 25
1641
+ We notice that the Gabor matrix of an operator does not depend on τ, in the sense
1642
+ that
1643
+
1644
+ T(z, w) = ⟨Tπ(w)ϕ, π(z)ϕ⟩ = ⟨Tπτ(w)ϕ, πτ(z)ϕ⟩,
1645
+ ∀ τ ∈ [0, 1].
1646
+ Remark 3.25. We point out that the diagonal of the Gabor matrix of T, w.r.t. ϕ,
1647
+ is the Cohen’s class representation of ϕ w.r.t. T up to a reflection:
1648
+ (64)
1649
+
1650
+ T(−z, −z) = QTϕ(z).
1651
+ In fact
1652
+
1653
+ T(−z, −z) = ⟨Tπ(−z)ϕ, π(−z)ϕ⟩ = ⟨Tπ(z)∗ϕ, π(z)∗ϕ⟩
1654
+ = ⟨(αzT)ϕ, ϕ, ⟩ = QT ϕ(z).
1655
+ Let F and H be functions of (z, w) ∈ R4d and let Θ be a real 4d × 4d matrix.
1656
+ Then the twisted convolution induced by Θ is defined as
1657
+ (65)
1658
+ F ♮Θ H(z, w) :=
1659
+
1660
+ R2d
1661
+
1662
+ R2d F(z′, w′)H(z − z′, w − w′)e2πi(z,w)Θ(z′,w′) dz′dw′.
1663
+ Lemma 3.26. Let T, S ∈ J 1, T, S ≥ 0. Then for every τ ∈ [0, 1] we have
1664
+ (66)
1665
+ tr(TS) =
1666
+
1667
+ R2d WτT(z)WτS(z) dz.
1668
+ Proof. Since T and S are trace-class and positive, they can be described as
1669
+ T =
1670
+
1671
+
1672
+ n=1
1673
+ λnfn ⊗ fn,
1674
+ S =
1675
+
1676
+
1677
+ n=1
1678
+ µngn ⊗ gn
1679
+ for some orthonormal sets {fn}n and {gn}n in L2 and λn, µn ≥ 0. Let {en}n be an
1680
+ o.n.b. for L2(Rd):
1681
+ tr(TS) =
1682
+
1683
+
1684
+ n=1
1685
+ ⟨TSen, en⟩ =
1686
+
1687
+
1688
+ i,j
1689
+ λjµi |⟨fj, gi⟩|2 .
1690
+ On the other hand,
1691
+
1692
+ R2d WτT(z)WτS(z) dz =
1693
+
1694
+
1695
+ i,j
1696
+ λjµi
1697
+
1698
+ R2d Wτfj(z)Wτgi(z) dz =
1699
+
1700
+
1701
+ i,j
1702
+ λjµi |⟨fj, gi⟩|2 ,
1703
+ where the last equality is due to Moyal’s identity. This concludes the proof.
1704
+
1705
+ Remark 3.27. Since we assume S ≥ 0, S is self-adjoint and for τ = 1/2 we have
1706
+ that W1/2S is real-valued. In fact, using the representation given in the proof of
1707
+ Lemma 3.26:
1708
+ W1/2S =
1709
+
1710
+
1711
+ n=1
1712
+ µnW1/2gn
1713
+
1714
+ 26
1715
+ FEDERICO BASTIANONI AND FRANZ LUEF
1716
+ with every W1/2gn real-valued and µn ≥ 0. Hence, for τ = 1/2 we recover [12,
1717
+ Lemma 2.7].
1718
+ Lemma 3.28. Let T ∈ J 1 and consider ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1. Then
1719
+ (67)
1720
+ tr T =
1721
+
1722
+ R2d⟨(αzT)ϕ, ϕ⟩ dz =
1723
+
1724
+ R2d QT ϕ(z) dz =
1725
+
1726
+ R2d Gϕ
1727
+ T(z, z) dz.
1728
+ Proof. The proof follows from a direct computation using the representations pre-
1729
+ sented in the proof of Lemma 3.26 and Moyal’s identity involving the function ϕ:
1730
+ ⟨fj, gi⟩ = ⟨Vϕfj, Vϕgi⟩,
1731
+ we leave details to the interested reader.
1732
+
1733
+ Lemma 3.29. Let T ∈ J 1, T ≥ 0 and let ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1. Then
1734
+ for every z ∈ R2d:
1735
+ (68)
1736
+ QTϕ(z) =
1737
+
1738
+ R2d WτT(w)Wτϕ(z + w) dw = WτT ∗ (Wτϕ)∗(z),
1739
+ where (Wτϕ)∗(w) = Wτϕ(−w).
1740
+ Proof. We compute directly
1741
+ QT ϕ(z) = ⟨π(z)Tπ(z)∗ϕ, ϕ⟩ = tr(T(π(z)∗ϕ ⊗ π(z)∗ϕ))
1742
+ =
1743
+
1744
+ R2d WτT(w)Wτ(π(z)∗ϕ ⊗ π(z)∗ϕ)(w) dw,
1745
+ the last equation holds because of Lemma 3.26. An elementary calculation gives
1746
+ Wτ(π(z)∗ϕ ⊗ π(z)∗ϕ)(w) = Wτϕ(z + w),
1747
+ which is also known as covariance property and this concludes the proof.
1748
+
1749
+ Lemma 3.30. Let T ∈ J 1, T ≥ 0 and consider ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1.
1750
+ Then for every z, w ∈ R2d:
1751
+ |Gϕ
1752
+ T(z, w)|2 ≤ QTϕ(−z)QT ϕ(−w).
1753
+ Proof. The claim follows from the Cauchy-Schwarz inequality for the inner product
1754
+ induced by the positive operator T and Remark 3.25.
1755
+
1756
+ Lemma 3.31. Let 0d and Id denote the zero and identity d×d matrices, respectively.
1757
+ Let us define
1758
+ Θ :=
1759
+
1760
+ 
1761
+ 0d
1762
+ 0d
1763
+ 0d
1764
+ 0d
1765
+ Id
1766
+ 0d
1767
+ 0d
1768
+ 0d
1769
+ 0d
1770
+ 0d
1771
+ 0d
1772
+ 0d
1773
+ 0d
1774
+ 0d
1775
+ −Id
1776
+ 0d
1777
+
1778
+  .
1779
+
1780
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
1781
+ 27
1782
+ Let T ∈ J 1 and consider ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1. For z = (x, ω), w =
1783
+ (u, v) ∈ R2d we have
1784
+
1785
+ T(z, w) = Gϕ
1786
+ T ♮Θ(Gϕ
1787
+ ϕ⊗ϕ)∗(z, w)
1788
+ (69)
1789
+ =
1790
+
1791
+ R2d
1792
+
1793
+ R2d Gϕ
1794
+ T(z′, w′)(Gϕ
1795
+ ϕ⊗ϕ)∗(z − z′, w − w′)e2πi(ωx′−u′v) dz′dw′,
1796
+ where z′ = (x′, ω′), w′ = (u′, v′) ∈ R2d.
1797
+ Proof. We apply twice Moyal’s identity:
1798
+
1799
+ T(z, w) =
1800
+
1801
+ R2d Vϕ[Tπ(w)ϕ](z′)Vϕ[π(z)ϕ](z′) dz′
1802
+ =
1803
+
1804
+ R2d
1805
+
1806
+ R2d Vϕ[π(w)ϕ](w′)Vϕ[T ∗π(z′)ϕ](w′)⟨π(z′)ϕ, π(z)ϕ⟩ dz′dw′
1807
+ =
1808
+
1809
+ R2d
1810
+
1811
+ R2d Gϕ
1812
+ T(z′, w′)⟨π(w)ϕ, π(w′)ϕ⟩⟨π(z′)ϕ, π(z)ϕ⟩ dz′dw′.
1813
+ It is then a direct, although tedious, calculation to show that
1814
+ ⟨π(z)ϕ, π(z′)ϕ⟩⟨π(w′)ϕ, π(w)ϕ⟩ = (Gϕ
1815
+ ϕ⊗ϕ)∗(z − z′, w − w′)e2πi(ωx′−u′v).
1816
+ This concludes the proof.
1817
+
1818
+ Lemma 3.32. Let T ∈ J 1, T ≥ 0 and consider ϕ ∈ S(Rd) such that ∥ϕ∥L2 = 1.
1819
+ Then for any τ ∈ [0, 1]:
1820
+ (70)
1821
+ WτT(z) =
1822
+
1823
+ R2d
1824
+
1825
+ R2d e−2πi[(ωx′−ω′x)+( 1
1826
+ 2− 3
1827
+ 4 τ)x′ω′+x′v]Gϕ
1828
+ T
1829
+ �z′
1830
+ 2 − w, −z′
1831
+ 2 − w
1832
+
1833
+ dwdz′,
1834
+ where z = (x, ω), z′ = (x′, ω′), w = (u, v) ∈ R2d.
1835
+ Proof. We start rephrasing the τ-Wigner distribution of T:
1836
+ WτT(z) = FσFWτT(z) =
1837
+
1838
+ R2d e−2πi(ωx′−ω′x) tr(πτ(z′)∗T) dz′.
1839
+ Recalling the properties for πτ, see Section 2, we see that
1840
+ πτ(z′/2 + z′/2) = e2πi[(1−τ) x′ω′
1841
+ 4
1842
+ −τ x′ω′
1843
+ 4
1844
+ ]πτ(z′/2)πτ(z′/2)
1845
+ = e
1846
+ π
1847
+ 2 i(1−2τ)x′ω′πτ(z′/2)πτ(z′/2).
1848
+
1849
+ 28
1850
+ FEDERICO BASTIANONI AND FRANZ LUEF
1851
+ Taking the adjoint we get πτ(z′)∗ = e− π
1852
+ 2 i(1−2τ)x′ω′πτ(z′/2)∗πτ(z′/2)∗ and we write
1853
+ using Lemma 3.28:
1854
+ tr(πτ(z′)∗T) = e− π
1855
+ 2 i(1−2τ)x′ω′ tr(πτ(z′/2)∗Tπτ(z′/2)∗)
1856
+ = e− π
1857
+ 2 i(1−2τ)x′ω′ �
1858
+ R2d⟨Tπτ(z′/2)∗πτ(w)∗ϕ, πτ(z′/2)πτ(w)∗ϕ⟩ dw
1859
+ = e− π
1860
+ 2 i(1−2τ)x′ω′e− π
1861
+ 2 i(1−τ)x′ω′
1862
+ ×
1863
+
1864
+ R2d⟨Tπτ(−z′/2)πτ(−w)ϕ, πτ(z′/2)πτ(−w)ϕ⟩ dw
1865
+ = e− π
1866
+ 2 i(2−3τ)x′ω′ �
1867
+ R2d⟨Tπ(−z′/2)π(−w)ϕ, π(z′/2)π(−w)ϕ⟩ dw
1868
+ = e− π
1869
+ 2 i(2−3τ)x′ω′ �
1870
+ R2d e−2πix′v⟨Tπ(−z′/2 − w)ϕ, π(z′/2 − w)ϕ⟩ dw.
1871
+ This concludes the argument.
1872
+
1873
+ 4. A characterization of Schwartz operators
1874
+ In this section we introduce weighted versions of S0 and give an alternative de-
1875
+ scription of the class S. We use the polynomial weight
1876
+ (71)
1877
+ vs(z) := (1 + |z|2)
1878
+ s
1879
+ 2,
1880
+ z ∈ R2d,
1881
+ where s ≥ 0. In order to avoid an extremely cumbersome notation, just for the
1882
+ weight functions vs we shall use the following:
1883
+ vs ⊗ vs(z, w) := Kvs⊗vs = vs(z)vs(w),
1884
+ ∀z, w ∈ R2d.
1885
+ Definition 4.1. For s ≥ 0 we define the weighted class of Feichtinger operators as
1886
+ (72)
1887
+ M1
1888
+ s := {S : S′
1889
+ 0(Rd) → S0(Rd) | S is linear, continuous with kernel KS ∈ M1
1890
+ vs⊗vs(R2d)}.
1891
+ For S in M1
1892
+ s we define the mapping
1893
+ (73)
1894
+ ∥S∥M1s := ∥KS∥M1
1895
+ vs⊗vs .
1896
+ Remark 4.2.
1897
+ (i) For s = 0 we recover the Feichtinger operators S0;
1898
+ (ii) The mapping defined in (73) is a norm on M1
1899
+ s and it is easy to see that
1900
+ (M1
1901
+ s, ∥·∥M1s) is a Banach space and the following continuous inclusion holds
1902
+ true for every s ≥ 0:
1903
+ (74)
1904
+ M1
1905
+ s ֒→ S0.
1906
+ Lemma 4.3. For any S ∈ M1
1907
+ s there exist {fn}n, {gn}n ⊆ M1
1908
+ vs⊗vs(R2d) such that
1909
+ S =
1910
+
1911
+
1912
+ n=1
1913
+ fn ⊗ gn,
1914
+
1915
+
1916
+ n=1
1917
+ ∥fn∥M1vs ∥gn∥M1vs ≤ +∞,
1918
+ KS =
1919
+
1920
+
1921
+ n=1
1922
+ Kfn⊗gn.
1923
+
1924
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
1925
+ 29
1926
+ Proof. The proof follows from the fact that
1927
+ M1
1928
+ vs⊗vs(R2d) = M1
1929
+ vs(Rd)ˆ⊗M1
1930
+ vs(Rd).
1931
+ See also the proof of Lemma 3.4.
1932
+
1933
+ Theorem 4.4. For every τ ∈ [0, 1] the mapping Wτ : M1
1934
+ s → M1
1935
+ vs⊗vs(R2d) is a topo-
1936
+ logical isomorphism with inverse given by Opτ : M1
1937
+ vs⊗vs(R2d) → M1
1938
+ s.
1939
+ Proof. The proof follows the same pattern as the ones of Theorem 3.7 and Corollary
1940
+ 3.8.
1941
+
1942
+ Corollary 4.5. An operator S belongs to M1
1943
+ s if and only if for some (hence every)
1944
+ τ ∈ [0, 1] WτS ∈ M1
1945
+ vs⊗vs(R2d).
1946
+ Theorem 4.6. The following is true:
1947
+ (75)
1948
+ S =
1949
+
1950
+ s≥0
1951
+ M1
1952
+ s.
1953
+ Proof. By Corollary 4.5, S belongs to the set on the right-hand side if and only if
1954
+ WτS ∈
1955
+
1956
+ s≥0
1957
+ M1
1958
+ vs⊗vs(R2d) = S(R2d).
1959
+ The claim follows since W1/2S is the Weyl symbol of S, i.e. aS
1960
+ 1/2 = W1/2S.
1961
+
1962
+ We recall that a function F on R2d is called rapidly decaying if for every multiindex
1963
+ α, β ∈ Nd
1964
+ 0 we have
1965
+ sup
1966
+ x,ω∈Rd
1967
+ ��xαωβF(x, ω)
1968
+ �� < +∞,
1969
+ where, if x = (x1, . . . , xd) and α = (α1, . . . , αd), xα stands for xα1
1970
+ 1 · . . . · xαd
1971
+ d .
1972
+ In [12, Theorem 1.1] a sufficient condition is given for a positive trace-class op-
1973
+ erator to be in S.
1974
+ Namely, if T ∈ B(L2), T ≥ 0, is such that WτT exists for
1975
+ some τ ∈ [0, 1] and it is rapidly decreasing, then T ∈ S and WτT exists for every
1976
+ τ ∈ [0, 1]. In this spirit, we provide the following sufficient condition for a generic
1977
+ S ∈ B(L2). Observe that we do not not require S to be positive.
1978
+ Corollary 4.7. Let S ∈ B(L2) and assume that for some τ ∈ [0, 1] WτS exists.
1979
+ Suppose also that, w.r.t. some non-zero window in L2(R2d), the STFT of WτS is
1980
+ rapidly decaying. Then WτS exists for every τ ∈ [0, 1] and S is in S.
1981
+ Proof. Let us pick G ∈ L2(R2d) ∖ {0}. If VGWτS is rapidly decaying then S ∈ M1
1982
+ s
1983
+ for every s ≥ 0. The claim follows from Theorem 4.6.
1984
+
1985
+
1986
+ 30
1987
+ FEDERICO BASTIANONI AND FRANZ LUEF
1988
+ Acknowledgments
1989
+ The first author would like to thank Eduard Ortega for the financial support to
1990
+ visit Trondheim which led to this work.
1991
+ References
1992
+ [1] F. Bastianoni, E. Cordero and F. Nicola. Decay and smoothness for eigenfunctions of local-
1993
+ ization operators. J. Math. Anal. Appl. 492, 124480, 2020.
1994
+ [2] O. Christensen. An introduction to frames and Riesz bases. Applied and Numerical Harmonic
1995
+ Analysis, Birkh¨auser Basel, Second Edition, 2016.
1996
+ [3] E. Cordero and K. Gr¨ochenig. Time-frequency analysis of localization operators. J. Funct.
1997
+ Anal., 205(1):107–131, 2003.
1998
+ [4] E. Cordero and F. Nicola. Sharp integral bounds for Wigner distributions. Int. Math. Res.
1999
+ Not. IMRN, (6):1779–1807, 2018.
2000
+ [5] E. Cordero and L. Rodino. Time-Frequency analysis of operators. De Gruyter Studies in
2001
+ Mathematics 75, Berlin/Boston, 2020.
2002
+ [6] M. D¨orfler, F. Luef, H. McNulty and E. Skrettingland. Time-Frequency Analysis and Coorbit
2003
+ Spaces of Operators. arXiv preprint arXiv:2210.04844, 2022.
2004
+ [7] C. de Gosson and M. de Gosson. On the Non-Uniqueness of Statistical Ensembles Defining a
2005
+ Density Operator and a Class of Mixed Quantum States with Integrable Wigner Distribution.
2006
+ Quantum Reports, 3(3):473-81, 2021.
2007
+ [8] J. De Vries. The local weight of an effective locally compact transformation group and the
2008
+ dimension og L2(G). Colloq. Math. 39(2): 319–3323, 1978.
2009
+ [9] H. G. Feichtinger. On a new Segal algebra. Monatshefte f¨ur Mathematik 92, 269–289, 1981.
2010
+ [10] H. G. Feichtinger and M. S. Jakobsen. The inner kernel theorem for a certain Segal algebra.
2011
+ Monatsh. Math., 2022.
2012
+ [11] K. Gr¨ochenig and T. Strohmer. Pseudodifferential operators on locally compact abelian groups
2013
+ and Sj¨ostrand’s symbol class. Journal f¨ur die reine und angewandte Mathematik, 2007(613),
2014
+ 121–146, 2007.
2015
+ [12] F. Hern´andez and C. J. Riedel. Rapidly decaying Wigner functions are Schwartz functions. J.
2016
+ Math. Phys. 63, 022104, 2022.
2017
+ [13] M. S. Jakobsen. On a (no longer) new Segal algebra: a review of the Feichtinger algebra. J.
2018
+ Fourier Anal. Appl., 24:1579–1660, 2018.
2019
+ [14] M. Keyl, J. Kiukas and R. Werner. Schwartz operators. Rev. Math. Phys. 28(3), 1630001, 60,
2020
+ 2016.
2021
+ [15] L. Lafleche. On Quantum Sobolev Inequalities. arXiv preprint arXiv:2210.03013, 2022.
2022
+ [16] F. Luef and E. Skrettingland. On accumulated Cohen’s class distributions and mixed-state
2023
+ localization operators. Constr. Approx. 52, 31–64, 2020.
2024
+ [17] F. Luef and E. Skrettingland. Mixed-state localization operators: Cohen’s class and trace class
2025
+ operators. J. Fourier Anal. Appl., 25(4):2064–2108, 2019.
2026
+ [18] R. Megginson. An Introduction to Banach Space Theory. Graduate Texts in Mathematics,
2027
+ vol.183, pp. xx+596. Springer, New York, 1998.
2028
+ [19] J. E. Moyal. Quantum mechanics as a statistical theory. Proc. Cambridge Phil. Soc., 45:99–
2029
+ 124, 1949.
2030
+ [20] E. Skrettingland. Convolutions for Localization Operators. Master Thesis, NTNU, 2017.
2031
+ [21] B. Simon. Trace Ideal and Their Applications. Cambridge University Press, Cambridge, 1979.
2032
+
2033
+ τ-QUANTIZATION AND τ-COHEN CLASSES OF FEICHTINGER OPERATORS
2034
+ 31
2035
+ [22] J. Toft. Continuity and compactness for pseudo-differential operators with symbols in quasi-
2036
+ Banach spaces or H¨ormander classes. Anal. Appl. (Singap.), 15(3):353–389, 2017.
2037
+ [23] R. F. Werner. Quantum harmonic analysis on phase space. J. Math. Phys. 25(5), 1404–1411,
2038
+ 1984.
2039
+ [24] E. P. Wigner. On the quantum correction for thermodynamic equilibrium. Phys. Rev. 40,
2040
+ 749–759, 1932.
2041
+ Dipartimento di Scienze Matematiche, Politecnico di Torino, corso Duca degli
2042
+ Abruzzi 24, 10129 Torino, Italy
2043
+ Email address: [email protected]
2044
+ Department of Mathematics, NTNU Norwegian University of Science and Tech-
2045
+ nology, NO-7491 Trondheim, Norway
2046
+ Email address: [email protected]
2047
+
4tE4T4oBgHgl3EQfBAt_/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dE3T4oBgHgl3EQfpQo9/content/tmp_files/2301.04640v1.pdf.txt ADDED
@@ -0,0 +1,825 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04640v1 [math.GM] 2 Jan 2023
2
+ Properties of the multi-index special function W(¯α,¯ν)(z)
3
+ R. Drogheia
4
+ aLiceo Scientifico Francesco Severi, Viale Europa,36, 03100 Frosinone (FR), ITALY
5
+ ABSTRACT
6
+ In this paper, we investigate some properties related to a multi-index special func-
7
+ tion W(¯α,¯ν) that arose from an eigenvalue problem for a multi-order fractional hyper-
8
+ Bessel operator, involving Caputo fractional derivatives. We show that for particular
9
+ values of the parameters involved in this special function W(¯α,¯ν), this leads to the
10
+ hyper-Bessel function of Delerue. The Laplace transform of the W(¯α,¯ν) is discussed
11
+ obtaining, in particular cases, the well-known functional relation between hyper-
12
+ Bessel function and multi-index Mittag-Leffler function, or, quite simply, between
13
+ classical Wright and Mittag-Leffler functions. Moreover, it is shown that the multi-
14
+ index special function satisfies the recurrence relation involving fractional deriva-
15
+ tives. In a particular case, we derive, to the best of our knowledge, a new differential
16
+ recurrence relation for the Mittag-Leffler function. We also provide derivatives of the
17
+ 3-parameters function Wα,β,ν with respect to parameters, leading to infinite power
18
+ series with coefficients being quotients of digamma and gamma functions.
19
+ KEYWORDS
20
+ Special Function of Fractional Calculus; hyper-Bessel type operators; Wright and
21
+ Mittag-Leffler functions; Caputo derivatives; recurrence relations of special
22
+ functions; hyper-Bessel functions
23
+ 1. Introduction
24
+ Nowadays, the interest in fractional differential equations is increasing because these
25
+ are becoming more adequate than those of integer order to investigate various problems
26
+ in different fields of physics, engineering and economics [1], [2], [3]. They have indeed
27
+ the fundamental characteristic to describe memory and heredity properties of many
28
+ materials. Some of them have been introduced within the framework of partition theory
29
+ in solving number theory problems. This is the case of the Wright function, introduced
30
+ by E. M. Wright in his articles on the asymptotic partition formulae[4], [5], [6] and [7],
31
+ [8], [9].
32
+ Recently, many authors are dealing with multi-indices special functions (SF) of
33
+ fractional calculus (FC) appearing in solution of differential equations and systems of
34
+ fractional multi-order type (e.g. hyper-Bessel and quasi-Bessel operators) [10], [11].
35
+ Among them, the most general functions we just want to refer to are the Fox H-
36
+ function and the Wright generalized hypergeometric function [12]. Indeed, one gets the
37
+ classical SF setting their parameters with integer values.
38
+ In the previous paper [13] the author investigated a hyper-Bessel-type operator in-
39
+ volving Caputo derivatives. Solving the eigenvalue problem associated with this frac-
40
+ tional operator, the author introduced a function, written in series expansion, that in
41
+ specific cases is possible to refer to the well-known special function of the fractional
42
+ CONTACT R. Droghei. Email: [email protected]
43
+
44
+ calculus. According to the information we have, this special function was not studied
45
+ by now. But as seen, it is reduced in particular cases to some known special func-
46
+ tions, which on their side are cases of the Bessel and hyper-Bessel functions and more
47
+ generally, of the multi-index Mittag-Leffer functions.
48
+ This multi-index special function, called in the previous paper m-p generalized
49
+ Wright function, plays an important role in nonlinear fractional differential equations,
50
+ and in their isochronous ω-modified version[13],[14]. It is also a natural generalization
51
+ of the applications of the Laguerre derivatives and the Laguerre-type exponentials [15],
52
+ [16], [17], [18]. In this survey article, firstly, we want to examine several properties as-
53
+ sociated with the multi-index special function investigated in [13].
54
+ The outline of this work is as follows. In Section 2, we recall the definition of the
55
+ multi-index function W(¯α,¯ν) introduced in [13] and its connection with the Hyper -
56
+ Bessel function. Moreover, the simpler function in the only 3-parameters case Wα,β,ν
57
+ is described. In Section 3 we computed the Laplace Transform of the function W(¯α,¯ν)
58
+ and, using it, we derived some new functional relations between this function and
59
+ other known special functions. The main result of this work is described in Section 4.
60
+ Here we showed the recurrence relations of the function Wα,β,ν obtaining, we suppose,
61
+ new differential recurrence relation for the Mittag-Leffler function. In Section 5 we
62
+ investigated the derivatives of Wα,β,ν with respect to the parameters.
63
+ 2. Multi-index special function W(¯α,¯ν)(z)
64
+ The multi-index special function W(¯α,¯ν)(z) investigated in [13], is defined by series
65
+ representation as a function of the complex variable z and parameters αj, j = 1, ..., n+
66
+ 1 and νj, j = 1, ..., n:
67
+ W(¯α,¯ν)(z) =
68
+
69
+
70
+ k=0
71
+ k
72
+
73
+ i=1
74
+ n
75
+
76
+ j=1
77
+ Γ(αn+1i + aj)
78
+ Γ(αn+1i + bj) ·
79
+ zk
80
+ Γ(αn+1k + bn+1)
81
+ .
82
+ (1)
83
+ where
84
+ aj = 1 +
85
+ j
86
+
87
+ m=1
88
+ (νm−1 − αm) ;
89
+ bj = 1 +
90
+ j
91
+
92
+ m=1
93
+ (νm−1 − αm−1) .
94
+ (2)
95
+ and the relation aj = bj − αj with j = 1..n + 1.
96
+ The W(¯α,¯ν)(z) is an entire function for αj > 0, j = 1..n + 1; νj ∈ C, j = 1..n and
97
+ α0 = ν0 = 0.
98
+ Theorem 2.1. The multi-index special function W(¯α,¯ν)(λxαn+1) with λ ∈ R, x ≥
99
+ 0, αj > 0, j = 1, ..., n + 1 and νj > 0, j = 1..n satisfy the following fractional differ-
100
+ ential equation involving fractional hyper-Bessel-type operator.[see [13] for the proof]
101
+ 2
102
+
103
+ ˆD(¯α,¯ν)
104
+ nL
105
+ W(¯α,¯ν)(λxαn+1) = λW(¯α,¯ν)(λxαn+1);
106
+ (3)
107
+ where
108
+ ˆD(¯α,¯ν)
109
+ nL
110
+ = x
111
+ �n
112
+ s=1(αs−νs) dαn+1
113
+ dxαn+1 xνn dαn
114
+ dxαn xνn−1 dαn−1
115
+ dxαn−1 · · · xν1 dα1
116
+ dxα1 .
117
+ (4)
118
+ 2.1. Hyper-Bessel function as a particular case
119
+ The hyper-Bessel function of Delerue (or a multi-index analogue of Bessel function) of
120
+ order d with indices µ1, ..., µd, introduced in 1953 by Delereu [19] as a generalization
121
+ of the Bessel function of the first type (see also [20]) is defined by
122
+ Jµd(z) = z−
123
+ µ1+...+µd
124
+ d+1
125
+ Jµd((d + 1)
126
+ d+1√z) =
127
+
128
+ k≥0
129
+ (−1)kzk
130
+ k! �d
131
+ j=1 Γ(k + µj + 1)
132
+ .
133
+ (5)
134
+ Setting αj = 1, j = 1, ..., n + 1 in the multi-index special function W(¯α,¯ν), we obtain
135
+ the relation
136
+ W(¯1,¯ν)(z) =
137
+ n
138
+
139
+ j=1
140
+ Γ(1 + aj)Jan(−z), .
141
+ (6)
142
+ with aj defined in (2). It is not surprising because the hyper-Bessel function satisfies the
143
+ so-called hyper-Bessel differential operators of higher order, introduced by Dimovski
144
+ and Kiryakova [21], [22], and obtained from (3) setting all parameters αj = 1 with
145
+ j = 1..n + 1, i.e. derivatives of integer order.
146
+ 2.2. 3-parameters function Wα,β,ν
147
+ In this section we analyse the simpler case of (1) with n = 1, α2 = β, α1 = α and
148
+ ν1 = ν:
149
+ Wα,β,ν(xβ) =
150
+
151
+
152
+ k=0
153
+ k
154
+
155
+ i=1
156
+ Γ(βi + 1 − α)
157
+ Γ(βi + 1)
158
+ xβk
159
+ Γ(βk + 1 − α + ν).
160
+ (7)
161
+ Proposition 2.2. Obviously, the above function (7) satisfies the following fractional
162
+ differential equation
163
+ ˆDα,β,νf(x) = xα−ν dβ
164
+ dxβ
165
+
166
+ xν dα
167
+ dxα f(x)
168
+
169
+ = f(x),
170
+ (8)
171
+ involving two fractional derivatives in the sense of Caputo of orders α, β ∈ (0, 1).
172
+ Where
173
+ f(x) = Wα,β,ν(xβ)
174
+ 3
175
+
176
+ .
177
+ Remark 1. The Weinstein and Bessel-Clifford operators Setting α = β = 1
178
+ and ν = k, k ≥ 1 the operator ˆDα,β,ν becomes
179
+ ˆD1,1,k = xBk = x
180
+ � d2
181
+ dx2 + k
182
+ x
183
+ d
184
+ dx
185
+
186
+ = x−k+1 d
187
+ dxxk d
188
+ dx
189
+ where Bk is the well known Weinstein operator (or Bessel operator) from the so-
190
+ called Darboux-Weinstein relation [23], [24]. In [25] Hayek studied in details exactly
191
+ the operator ˆD1,1,k+1 calling its solution as Bessel-Clifford function of second order
192
+ Cν(x) = x− ν−1
193
+ 2 Iν−1(2√x) =
194
+ 1
195
+ Γ(ν+1) 0F1(ν + 1; −x), where Iν(x) is the modified Bessel
196
+ function of the first kind. Later, in [26] he introduced the two indices Bessel-Clifford
197
+ functions of the third order modifying the hyper-Bessel function J(2)
198
+ µ,ν(x):
199
+ Cµ,ν(x) = x− µ+ν
200
+ 3 J(2)
201
+ µ,ν(3
202
+ 3√x) =
203
+ 1
204
+ Γ(µ + 1)Γ(ν + 1) 0
205
+ F2(µ + 1, ν + 1; −x);
206
+ (9)
207
+ satisfying the third-order Bessel-Clifford differential equation related to the operator
208
+ ˆBµ,ν = x−ν d
209
+ dxxµ−ν+1 d
210
+ dxxν+1 d
211
+ dx.
212
+ (10)
213
+ As it is simple to see, the two-parameter operator ˆBµ,ν is equivalent to the operator
214
+ (4), ˆD({α1,α2,α3},{ν1,ν2})
215
+ 2L
216
+ with α1 = α2 = α3 = 1; ν1 = ν + 1 and ν2 = µ − ν + 1; and
217
+ then the Bessel-Clifford of the third order function (9) is equal to
218
+ Cµ,ν(x) =
219
+ 1
220
+ Γ(ν + 1)W({1,1,1},{ν+1,µ−ν+1})(x).
221
+ These differential operators appear very often in the PDEs of mathematical physics
222
+ (especially in fluid mechanics, elasticity, and transonic flow), for instance in the gen-
223
+ eralized Bessel heat equation and other equations of generalized axially symmetric
224
+ potentials (GASP) theory [27].
225
+ 2.2.1. Particular cases of Wα,β,ν
226
+ For α = 1, β = λ and ν = µ the function corresponds to the Classical Wright function
227
+ W1,λ,µ(xλ) = Wλ,µ
228
+ �xλ
229
+ λ
230
+
231
+ =
232
+
233
+
234
+ k=0
235
+
236
+
237
+ λ
238
+ �k
239
+ k!Γ(λk + µ).
240
+ (11)
241
+ For α = 0, β → α, ν → β − 1 the function corresponds to the generalized Mittag-
242
+ Leffler function
243
+ W0,α,β−1(z) = Eα,β(z) =
244
+
245
+
246
+ k=0
247
+ zk
248
+ Γ(αk + β).
249
+ (12)
250
+ 4
251
+
252
+ In case of α = β = ν holds the relation
253
+ Wν,ν,ν(xν) = E1;ν,1(xν)
254
+ where Eα;ν,γ(x) = �∞
255
+ k=0
256
+ xk
257
+ Γα+1(νk+γ) is the α-Mittag-Leffler function.
258
+ In Addition, we present some examples of the 3-parameters function Wα,β,ν in the
259
+ following table, and in Figure 1 we represent the behavior of this function for different
260
+ values of the parameters α, β, ν;
261
+ Integer order derivatives
262
+ Fractional order derivatives
263
+ W0,1,0(x) = ex
264
+ W 1
265
+ 2 , 1
266
+ 2, 1
267
+ 2 (√x) = +I0(2√x) + L0(2√x)
268
+ W0,1,n(x) = ex
269
+ xn − �n−1
270
+ i=0
271
+ xi−n
272
+ i!
273
+ with n ∈ N
274
+ W 1
275
+ 2, 1
276
+ 2, 3
277
+ 2 (√x) = +I1(2√x) + L1(√x)
278
+ W1,1,0(x) = √xI1(2√x)
279
+ W 1
280
+ 2, 1
281
+ 2,1(√x) = sinh(2√x)+cosh(2√x)−1
282
+ √πx
283
+ W1,1,ν(x) = x− ν−1
284
+ 2 Iν−1(2√x)
285
+ W 1
286
+ 2, 1
287
+ 2,2(√x) = (2√x−1)e2√x−2x+1
288
+ 2x√πx
289
+ where Iα(x) = i−αJα(ix) = �∞
290
+ m=0
291
+ 1
292
+ m!Γ(m+α+1)(x
293
+ 2)2m+α is the modified Bessel func-
294
+ tion of the first kind and Lα(x) =
295
+ � x
296
+ 2
297
+ �ν+1 �∞
298
+ m=0
299
+ ( x
300
+ 2)
301
+ 2m
302
+ Γ(m+ 3
303
+ 2)Γ(m+ν+ 3
304
+ 2 ) is the modified Struve
305
+ function.
306
+ (a)
307
+ Plot
308
+ of
309
+ the
310
+ function
311
+ W0,1,ν(x)
312
+ for
313
+ ν
314
+ =
315
+ 0; 0.25; 0.5; 0.75; 1; 1.25; 1.5; 1.75; 2.
316
+ (b)
317
+ Plot
318
+ of
319
+ the
320
+ function
321
+ W1,1,ν(x)
322
+ for
323
+ ν
324
+ =
325
+ 0; 0.25; 0.5; 0.75; 1; 1.25; 1.5; 1.75; 2.
326
+ (c)
327
+ Plot
328
+ of
329
+ the
330
+ function
331
+ W 1
332
+ 2 , 1
333
+ 2 ,ν(√x)
334
+ for
335
+ ν
336
+ =
337
+ 0; 0.25; 0.5; 0.75; 1; 1.25; 1.5; 1.75; 2.
338
+ (d)
339
+ Plot
340
+ of
341
+ the
342
+ function
343
+ W 1
344
+ 2 ,1,ν(x)
345
+ for
346
+ ν
347
+ =
348
+ 0; 0.25; 0.5; 0.75; 1; 1.25; 1.5; 1.75; 2.
349
+ Figure 1.
350
+ 3. Laplace Transform
351
+ Let us compute the Laplace transform of the W(¯α,¯ν)(λx)
352
+ 5
353
+
354
+ L
355
+
356
+ W(¯α,¯ν)(λxαn+1), s
357
+
358
+ =
359
+ � ∞
360
+ 0
361
+ e−sx
362
+
363
+
364
+ k=0
365
+ k
366
+
367
+ i=1
368
+ n
369
+
370
+ j=1
371
+ Γ(αn+1i + aj)
372
+ Γ(αn+1i + bj)
373
+ λkxαn+1k
374
+ Γ(αn+1k + bn+1)dx
375
+ =
376
+
377
+
378
+ k=0
379
+ k
380
+
381
+ i=1
382
+ n
383
+
384
+ j=1
385
+ λkΓ(αn+1i + aj)
386
+ Γ(αn+1i + bj)Γ(αn+1k + bn+1)
387
+ � ∞
388
+ 0
389
+ e−sxxαn+1kdx
390
+ =
391
+ 1
392
+ s
393
+
394
+
395
+ k=0
396
+ k
397
+
398
+ i=1
399
+ n
400
+
401
+ j=1
402
+ Γ(αn+1i + aj)Γ(αn+1k + 1)
403
+ Γ(αn+1i + bj)Γ(αn+1k + bn+1)
404
+
405
+ λ
406
+ sαn+1
407
+ �k
408
+ . (13)
409
+ th analytical properties of the W(¯α,¯ν) provides that the resulting Laplace transform
410
+ turns out to be an analytic function, vanishing at infinity and exhibiting an essential
411
+ singularity at s = 0.
412
+ Remark 2. In case we set αj = 1, j = 1, ..., n + 1, the multi-index special functions
413
+ W(¯α,¯ν) will be related to the hyper-Bessel functions as is showed in (6). After some
414
+ calculations, we obtain the following functional relation between the Laplace transform
415
+ of the Hyper-Bessel function and the multi-index Mittag-Leffler function. A more
416
+ general relation between these two functions can be found in the article of Kiryakova
417
+ and Luchko [28].
418
+ L
419
+
420
+ W(¯1,¯ν)(λx), s
421
+
422
+ =
423
+ n
424
+
425
+ j=1
426
+ Γ(1 + aj)1
427
+ s
428
+
429
+
430
+ k=0
431
+ 1
432
+ �n
433
+ j=1 Γ(k + aj+1 + 1)
434
+ �λ
435
+ s
436
+ �k
437
+ =
438
+ n
439
+
440
+ j=1
441
+ Γ(1 + aj)1
442
+ sE(n)
443
+ (1,1,...,1),(aj+1+1)
444
+ �λ
445
+ s
446
+
447
+ .
448
+ (14)
449
+ Remark 3. The Laplace transform of Wα,β,ν(x) can be obtained as a special case of
450
+ the (13) as follows:
451
+ L (Wα,β,ν(λxρ), s) = 1
452
+ s
453
+
454
+
455
+ k=0
456
+ k
457
+
458
+ i=1
459
+ βΓ(βi + 1 − α)
460
+ Γ(βi + 1)
461
+ Γ(ρk + 1)
462
+ Γ(βk + 1 − α + ν)
463
+ � λ
464
+
465
+ �k
466
+ ;
467
+ (15)
468
+ and, in the case of the parameter α = 1, we obtain the well-known Laplace transform
469
+ of the Wright function which can be expressed in terms of the two-parameter Mittag-
470
+ Leffler function.
471
+ L (W1,β,ν(λx), s) = L (Wβ,ν(λx), s) = 1
472
+ sEβ,ν
473
+ � λ
474
+ β s
475
+
476
+ .
477
+ (16)
478
+
479
+ 6
480
+
481
+ 4. Recurrence relations of Wα,β,ν
482
+ A recurrence relation is an equation that recursively defines a sequence of values; given
483
+ one or more initial terms, each further term of the sequence is defined as a function of
484
+ the previous terms. Differential recurrence relation of the generalized Wright function
485
+ can be used in the study of fractional differential equations, and it is obtained directly
486
+ from series representation.
487
+ xα+β dβ
488
+ dxβ
489
+
490
+ xν−α+βWα,β,ν+β(xβ)
491
+
492
+ − 2xν+βWα,β,ν(xβ) + xα+ν dα
493
+ dxα Wα,β,ν−β(xβ) = 0.
494
+ (17)
495
+ Remark 4. In case α = β = 1; ν = n + 1 with n ∈ N0 and
496
+ d
497
+ dxW1,1,n(x) = W1,1,n+1(x) = Cn(x);
498
+ we obtain the well known three-term recurrence relation for the Bessel-Clifford func-
499
+ tion Cn(x)
500
+ xCn+2(x) + (n + 1)Cn+1(x) = Cn(x).
501
+ (18)
502
+ Remark 5. Recurrence fractional derivatives relation for the Wright and
503
+ Mittag-Leffler functions. From the relation (11) between the generalized Wright
504
+ function and the classical Wright function the relation (17) becomes
505
+
506
+ dzλ
507
+
508
+ zλ+ν−1Wλ,λ+ν
509
+ �zλ
510
+ λ
511
+ ��
512
+ = zν−1Wλ,ν
513
+ �zλ
514
+ λ
515
+
516
+ ;
517
+ (19)
518
+ using the formula
519
+ d
520
+ dz Wλ,ν−λ
521
+ �zλ
522
+ λ
523
+
524
+ = zλ−1Wλ,ν
525
+ �zλ
526
+ λ
527
+
528
+ .
529
+ (20)
530
+ In case α = 0, and β → α, ν → β − 1 the generalized Wright function is related to
531
+ the Mittag-Leffler function by the following relation:
532
+ W0,α,β−1(z) = Eα,β(z).
533
+ (21)
534
+ In particular, from the recurrence relation (17), we obtain the new recurrence relation
535
+ involving fractional derivatives for M-L functions.
536
+ zα dα
537
+ dzα
538
+
539
+ zα+β−1Eα,α+β(zα)
540
+
541
+ − 2zα+β−1Eα,β(zα) + zβ−1Eα,β−α(zα) = 0.
542
+ (22)
543
+ 7
544
+
545
+ 5. Partial derivatives of Wα,β,ν with respect to the parameters
546
+ In this section, taking inspiration from the works of Apelblat and Mainardi [29], [30] we
547
+ analyse the derivatives of Wα,β,ν respect the three parameters included in the function.
548
+ We can treat parameters as variables and hence the derivatives with respect to them
549
+ can be obtained. These derivatives lead to infinite power series involving digamma (ψ)
550
+ and gamma functions.
551
+
552
+ ∂ν Wα,β,ν(z) = −
553
+
554
+
555
+ k=0
556
+ k
557
+
558
+ i=1
559
+ Γ(βi + 1 − α)
560
+ Γ(βi + 1)
561
+ ψ(βk + 1 − α + ν)
562
+ Γ(βk + 1 − α + ν)zk;
563
+ (23)
564
+
565
+ ∂β Wα,β,ν(z) =
566
+
567
+
568
+ k=0
569
+ k
570
+
571
+ i=1
572
+ Γ(βi + 1 − α)
573
+ Γ(βi + 1)
574
+ zk
575
+ Γ(βk + 1 − α + ν) ·
576
+ ·
577
+
578
+
579
+ k
580
+
581
+ j=1
582
+ j [ψ(βj + 1 − α) − ψ(βj + 1)] − kψ(βk + 1 − α + ν)
583
+
584
+  ;
585
+ (24)
586
+
587
+ ∂αWα,β,ν(z) =
588
+
589
+
590
+ k=0
591
+ k
592
+
593
+ i=1
594
+ Γ(βi + 1 − α)
595
+ Γ(βi + 1)
596
+ zk
597
+ Γ(βk + 1 − α + ν)
598
+
599
+ −
600
+ k
601
+
602
+ j=1
603
+ ψ(βj + 1 − α) + ψ(βk + 1 − α + ν)
604
+
605
+  ;
606
+ (25)
607
+ where ψ(z) = Γ′(z)
608
+ Γ(z) denotes the digamma function.
609
+ Remark 6. In the case α = 1 and considering the property of the digamma function
610
+ ψ(z+1) = ψ(z)+ 1
611
+ z; we obtain the formula (5) and (6) of the Apelblat-Mainardi article
612
+ ([30]) for the classical Wright function
613
+
614
+ ∂β W1,β,ν(z) =
615
+ � ∂
616
+ ∂β Wβ,ν
617
+
618
+ (βz) = −
619
+
620
+
621
+ k=0
622
+ � ψ(βk + ν)
623
+ k!Γ(βk + ν)
624
+
625
+ kzk;
626
+
627
+ ∂ν W1,β,ν(z) =
628
+ � ∂
629
+ ∂ν Wβ,ν
630
+
631
+ (βz) = −
632
+
633
+
634
+ k=0
635
+ � ψ(βk + ν)
636
+ k!Γ(βk + ν)
637
+
638
+ zk.
639
+ By setting the parameters, α = 0, β → α and ν → β − 1, we obtain the formulas
640
+ (95) and (96) of the Apelblat paper ([29])
641
+
642
+ ∂αW0,α,β−1(z) = ∂
643
+ ∂αEα,β(z) = −
644
+
645
+
646
+ k=0
647
+ �kψ(αk + β)
648
+ Γ(αk + β)
649
+
650
+ zk;
651
+
652
+ ∂β W0,α,β−1(z) = ∂
653
+ ∂β Eα,β(z) = −
654
+
655
+
656
+ k=0
657
+ �ψ(αk + β)
658
+ Γ(αk + β)
659
+
660
+ zk.
661
+ 8
662
+
663
+ 6. Conclusion
664
+ The aim of this paper is to investigate several properties related to the multi-index
665
+ special function W(¯α,¯ν) and its 3-parameters version. An important result was finding
666
+ the connection between the W(¯α,¯ν) and the hyper-Bessel function of Delerue. Here we
667
+ analyzed the Laplace transform, recurrence relation and derivatives of the function
668
+ with respect to the parameters. In particular, we found new findings that, for special
669
+ values of the parameters, retrieve some well-known relations. Indeed, a simple func-
670
+ tional relation is obtained between the Laplace transform of the hyper-Bessel function
671
+ and the multi-index Mittag-Leffler.
672
+ Disclosure statement
673
+ No potential conflict of interest was reported by the author.
674
+ Acknowledgements
675
+ The author is grateful to Dr Roberto Garra for providing essential information, help
676
+ and advice.
677
+ References
678
+ [1] Podlubny I. Fractional Differential Equations. Academic Press, San Diego; 1999.
679
+ [2] Mainardi F. Fractional calculus and waves in linear viscoelasticity: an introduction to
680
+ mathematical models. World Scientific; 2010.
681
+ [3] Gorenflo R, Kilbas AA, Mainardi F, Rogosin SV. Mittag-Leffler functions, related topics
682
+ and applications (p. 540). New York, NY, USA: Springer; 2020.
683
+ [4] Wright E. M. Asymptotic partition formulae: I. plane partitions. The Quarterly Journal of
684
+ Mathematics, Volume os-2, Issue 1; 1931; p. 177–189. https://doi.org/10.1093/qmath/os-
685
+ 2.1.177
686
+ [5] Wright E. M. Asymptotic partition formulae:(II) weighted partitions. Proceedings of the
687
+ London Mathematical Society, 2(1); 1934; p. 117-141. https://doi.org/10.1112/plms/s2-
688
+ 36.1.117
689
+ [6] Wright E. M. Asymptotic partition formulae. III. Partitions intok-th powers. Acta Math-
690
+ ematica, 63(1); 1934; p.143-191. https://doi.org/10.1007/BF02547353
691
+ [7] Wright EM. On the coefficients of power series having exponential singularities. Journal
692
+ London Math. Soc. 8; 1933; p. 71–79.
693
+ [8] Wright EM. The asymptotic expansion of the generalized Bessel function. Proc. London
694
+ Math. Soc. (Ser. II) 38; 1935; p. 257–270.
695
+ [9] Wright EM. The asymptotic expansion of the generalized hypergeometric function. Jour-
696
+ nal London Math. Soc. 10; 1935; p. 287–293.
697
+ [10] Garra R, Polito F. On some operators involving Hadamard derivatives. Integral Trans-
698
+ forms and Special Functions; 2013. https://doi.org/10.1080/10652469.2012.756875.
699
+ [11] Dubovski PB, Slepoi JA. Construction and analysis of series solutions for frac-
700
+ tional
701
+ quasi-Bessel
702
+ equations.
703
+ Fract
704
+ Calc
705
+ Appl
706
+ Anal
707
+ 25;
708
+ 2022;
709
+ p.1229–1249.
710
+ https://doi.org/10.1007/s13540-022-00045-z
711
+ [12] Kiryakova V. Fractional calculus of some ”new” but not new special function: K-, multi-
712
+ index-, and S-analogues. AIP Conference Proceedings. 2172, 050008; 2019.
713
+ 9
714
+
715
+ [13] Droghei R. On a Solution of a Fractional Hyper-Bessel Differential Equation by Means
716
+ of a Multi-Index Special Function. Fract Calc Appl Anal 24; 2021; p. 1559–1570.
717
+ https://doi.org/10.1515/fca-2021-0065
718
+ [14] Droghei R, Garra R. Isochronous fractional PDEs. Lecture Notes of TICMI 21; 2020; p.
719
+ 43–51.
720
+ [15] Dattoli G, Ricci PE. Laguerre-type exponentials, and the relevant-circular and-hyperbolic
721
+ functions. Georgian Mathematical Journal, 10(3); 2003; p. 481-494.
722
+ [16] Bretti G, Ricci PE. Laguerre-type special functions and population dynamics. Applied
723
+ mathematics and computation, 187(1); 2007; p. 89-100.
724
+ [17] Ricci PE. Laguerre-Type Exponentials, Laguerre Derivatives and Applications. A Survey.
725
+ Mathematics 8, 2054; 2020.
726
+ [18] Garra R, Tomovski Z. Exact results on some nonlinear Laguerre-type diffusion equations.
727
+ Mathematical Modelling and Analysis, 26(1); 2021; p. 72-81.
728
+ [19] Delerue P., Sur le calcul symbolique `a n variables et fonctions hyperbesseliennes (II). Ann.
729
+ Soc. Sci. Brux. 3; 1953; p. 229–274.
730
+ [20] Kiryakova V. Generalized Fractional Calculus and Applications. Longman – J. Wiley,
731
+ Harlow, N. York; 1994.
732
+ [21] Dimowski I, Kiryakova V. Generalized Poisson transmutations and corresponding repre-
733
+ sentations of hyper-Bessel functions. C. R. Acad. Bulg. Sci. 39, N. 10; 1986; p. 20-32.
734
+ [22] Dimowski I, Kiryakova V. Generalized Poisson representations of hyper-geometric func-
735
+ tions pFq , p < q using fractional integrals. In: Proc.16th Spring Conf Union Bulg. Math.
736
+ Sofia; 1987; p. 205-212.
737
+ [23] Weinstein A. The generalized radiation problem and the Euler-Poisson-Darboux equation.
738
+ Summa Brazil Math. 3; 1955; p. 125-147.
739
+ [24] Kiryakova V, Hernandez-Suarez V. Bessel-Clifford third order differential operator and
740
+ corresponding Laplace type integral transform. Dissertationes Mathematicae 340; 1995);
741
+ p. 143-161.
742
+ [25] Hayek N. Estudio de la ecuaci`on diferencial xy′′ + (ν + 1)y′ + y = 0 y de sus aplicaciones.
743
+ Collect. Math. 18, No 1-2; 1967; p. 57-174.
744
+ [26] Hayek N. Funciones de Bessel-Cliff`ord de tercer orden. Actas XII Jornadas Luso-Esp. de
745
+ Mat. (Braga); 1987; p. 346-351.
746
+ [27] Weinstein A. Generalized axially symmetric potential theory. Bull.AMS 59, 20; 1955.
747
+ [28] Kiryakova V, Luchko Yu. The Multiindex MittagLeffler Functions and Their Applications
748
+ for Solving Fractional Order Problems in Applied Analysis. AIP Conf. Proc. 1301, 597;
749
+ 2010; doi: 10.1063/1.3526661.
750
+ [29] Apelblat A. Differentiation of the Mittag-Leffler functions with respect to parameters in
751
+ the Laplace transform approach. Mathematics, 8(5), 657; 2020.
752
+ [30] Apelblat A, Mainardi F. Differentiation of the Wright functions with respect to parameters
753
+ and other results. arXiv e-prints, arXiv-2009; 2020.
754
+ Appendix A. Fractional calculus
755
+ In order to make the papar self-contained, we briefly recall main definitions and prop-
756
+ erties of fractional calculus operators.
757
+ Let γ ∈ R+. The Riemann-Liouville fractional integral is defined by
758
+
759
+ x f(x) =
760
+ 1
761
+ Γ(γ)
762
+ � x
763
+ 0
764
+ (x − x′)γ−1f(x′)dx′,
765
+ (A1)
766
+ 10
767
+
768
+ where
769
+ Γ(γ) =
770
+ � +∞
771
+ 0
772
+ xγ−1e−xdx,
773
+ is the Euler Gamma function.
774
+ Note that, by definition, J0
775
+ xf(x) = f(x).
776
+ Moreover it satisfies the semigroup property, i.e. Jα
777
+ x Jβ
778
+ x f(x) = Jα+β
779
+ x
780
+ f(x).
781
+ There are different definitions of fractional derivative (see e.g. [1]). In this paper we
782
+ used the fractional derivatives in the sense of Caputo, that is
783
+
784
+ xf(x) = Jm−γ
785
+ x
786
+ Dm
787
+ x f(x) =
788
+ 1
789
+ Γ(m − γ)
790
+ � x
791
+ 0
792
+ (x−x′)m−γ−1
793
+ dm
794
+ d(x′)m f(x′) dx′, γ ̸= m. (A2)
795
+ It is simple to prove the following properties of fractional derivatives and integrals
796
+ (see e.g. [1]) that will be used in the analysis:
797
+
798
+ xJγ
799
+ x f(x) = f(x),
800
+ γ > 0,
801
+ (A3)
802
+
803
+ x Dγ
804
+ xf(x) = f(x) −
805
+ m−1
806
+
807
+ k=0
808
+ f (k)(0)xk
809
+ k! ,
810
+ γ > 0, x > 0,
811
+ (A4)
812
+
813
+ x xδ =
814
+ Γ(δ + 1)
815
+ Γ(δ + γ + 1)xδ+γ
816
+ γ > 0, δ > −1, t > 0,
817
+ (A5)
818
+
819
+ xxδ =
820
+ Γ(δ + 1)
821
+ Γ(δ − γ + 1)xδ−γ
822
+ γ > 0, δ > −1, t > 0.
823
+ (A6)
824
+ 11
825
+
5dE3T4oBgHgl3EQfpQo9/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,468 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf,len=467
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
3
+ page_content='04640v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
4
+ page_content='GM] 2 Jan 2023 Properties of the multi-index special function W(¯α,¯ν)(z) R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
5
+ page_content=' Drogheia aLiceo Scientifico Francesco Severi, Viale Europa,36, 03100 Frosinone (FR), ITALY ABSTRACT In this paper, we investigate some properties related to a multi-index special func- tion W(¯α,¯ν) that arose from an eigenvalue problem for a multi-order fractional hyper- Bessel operator, involving Caputo fractional derivatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
6
+ page_content=' We show that for particular values of the parameters involved in this special function W(¯α,¯ν), this leads to the hyper-Bessel function of Delerue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
7
+ page_content=' The Laplace transform of the W(¯α,¯ν) is discussed obtaining, in particular cases, the well-known functional relation between hyper- Bessel function and multi-index Mittag-Leffler function, or, quite simply, between classical Wright and Mittag-Leffler functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
8
+ page_content=' Moreover, it is shown that the multi- index special function satisfies the recurrence relation involving fractional deriva- tives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
9
+ page_content=' In a particular case, we derive, to the best of our knowledge, a new differential recurrence relation for the Mittag-Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
10
+ page_content=' We also provide derivatives of the 3-parameters function Wα,β,ν with respect to parameters, leading to infinite power series with coefficients being quotients of digamma and gamma functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
11
+ page_content=' KEYWORDS Special Function of Fractional Calculus;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
12
+ page_content=' hyper-Bessel type operators;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
13
+ page_content=' Wright and Mittag-Leffler functions;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
14
+ page_content=' Caputo derivatives;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
15
+ page_content=' recurrence relations of special functions;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
16
+ page_content=' hyper-Bessel functions 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
17
+ page_content=' Introduction Nowadays, the interest in fractional differential equations is increasing because these are becoming more adequate than those of integer order to investigate various problems in different fields of physics, engineering and economics [1], [2], [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
18
+ page_content=' They have indeed the fundamental characteristic to describe memory and heredity properties of many materials.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
19
+ page_content=' Some of them have been introduced within the framework of partition theory in solving number theory problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
20
+ page_content=' This is the case of the Wright function, introduced by E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
21
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
22
+ page_content=' Wright in his articles on the asymptotic partition formulae[4], [5], [6] and [7], [8], [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
23
+ page_content=' Recently, many authors are dealing with multi-indices special functions (SF) of fractional calculus (FC) appearing in solution of differential equations and systems of fractional multi-order type (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
24
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
25
+ page_content=' hyper-Bessel and quasi-Bessel operators) [10], [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
26
+ page_content=' Among them, the most general functions we just want to refer to are the Fox H- function and the Wright generalized hypergeometric function [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
27
+ page_content=' Indeed, one gets the classical SF setting their parameters with integer values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
28
+ page_content=' In the previous paper [13] the author investigated a hyper-Bessel-type operator in- volving Caputo derivatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
29
+ page_content=' Solving the eigenvalue problem associated with this frac- tional operator, the author introduced a function, written in series expansion, that in specific cases is possible to refer to the well-known special function of the fractional CONTACT R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
30
+ page_content=' Droghei.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
31
+ page_content=' Email: riccardo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
32
+ page_content='droghei@francescoseveri.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
33
+ page_content='org calculus.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
34
+ page_content=' According to the information we have, this special function was not studied by now.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
35
+ page_content=' But as seen, it is reduced in particular cases to some known special func- tions, which on their side are cases of the Bessel and hyper-Bessel functions and more generally, of the multi-index Mittag-Leffer functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
36
+ page_content=' This multi-index special function, called in the previous paper m-p generalized Wright function, plays an important role in nonlinear fractional differential equations, and in their isochronous ω-modified version[13],[14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
37
+ page_content=' It is also a natural generalization of the applications of the Laguerre derivatives and the Laguerre-type exponentials [15], [16], [17], [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
38
+ page_content=' In this survey article, firstly, we want to examine several properties as- sociated with the multi-index special function investigated in [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
39
+ page_content=' The outline of this work is as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
40
+ page_content=' In Section 2, we recall the definition of the multi-index function W(¯α,¯ν) introduced in [13] and its connection with the Hyper - Bessel function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
41
+ page_content=' Moreover, the simpler function in the only 3-parameters case Wα,β,ν is described.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
42
+ page_content=' In Section 3 we computed the Laplace Transform of the function W(¯α,¯ν) and, using it, we derived some new functional relations between this function and other known special functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
43
+ page_content=' The main result of this work is described in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
44
+ page_content=' Here we showed the recurrence relations of the function Wα,β,ν obtaining, we suppose, new differential recurrence relation for the Mittag-Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
45
+ page_content=' In Section 5 we investigated the derivatives of Wα,β,ν with respect to the parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
46
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
47
+ page_content=' Multi-index special function W(¯α,¯ν)(z) The multi-index special function W(¯α,¯ν)(z) investigated in [13], is defined by series representation as a function of the complex variable z and parameters αj, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
48
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
49
+ page_content=', n+ 1 and νj, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
50
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
51
+ page_content=', n: W(¯α,¯ν)(z) = ∞ � k=0 k � i=1 n � j=1 Γ(αn+1i + aj) Γ(αn+1i + bj) · zk Γ(αn+1k + bn+1) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
52
+ page_content=' (1) where aj = 1 + j � m=1 (νm−1 − αm) ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
53
+ page_content=' bj = 1 + j � m=1 (νm−1 − αm−1) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
54
+ page_content=' (2) and the relation aj = bj − αj with j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
55
+ page_content='.n + 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
56
+ page_content=' The W(¯α,¯ν)(z) is an entire function for αj > 0, j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
57
+ page_content='.n + 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
58
+ page_content=' νj ∈ C, j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
59
+ page_content='.n and α0 = ν0 = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
60
+ page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
61
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
62
+ page_content=' The multi-index special function W(¯α,¯ν)(λxαn+1) with λ ∈ R, x ≥ 0, αj > 0, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
63
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
64
+ page_content=', n + 1 and νj > 0, j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
65
+ page_content='.n satisfy the following fractional differ- ential equation involving fractional hyper-Bessel-type operator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
66
+ page_content=' [see [13] for the proof] 2 ˆD(¯α,¯ν) nL W(¯α,¯ν)(λxαn+1) = λW(¯α,¯ν)(λxαn+1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
67
+ page_content=' (3) where ˆD(¯α,¯ν) nL = x �n s=1(αs−νs) dαn+1 dxαn+1 xνn dαn dxαn xνn−1 dαn−1 dxαn−1 · · · xν1 dα1 dxα1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
68
+ page_content=' (4) 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
69
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
70
+ page_content=' Hyper-Bessel function as a particular case The hyper-Bessel function of Delerue (or a multi-index analogue of Bessel function) of order d with indices µ1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
71
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
72
+ page_content=', µd, introduced in 1953 by Delereu [19] as a generalization of the Bessel function of the first type (see also [20]) is defined by Jµd(z) = z− µ1+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
73
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
74
+ page_content='+µd d+1 Jµd((d + 1) d+1√z) = � k≥0 (−1)kzk k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
75
+ page_content=' �d j=1 Γ(k + µj + 1) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
76
+ page_content=' (5) Setting αj = 1, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
77
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
78
+ page_content=', n + 1 in the multi-index special function W(¯α,¯ν), we obtain the relation W(¯1,¯ν)(z) = n � j=1 Γ(1 + aj)Jan(−z), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
79
+ page_content=' (6) with aj defined in (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
80
+ page_content=' It is not surprising because the hyper-Bessel function satisfies the so-called hyper-Bessel differential operators of higher order, introduced by Dimovski and Kiryakova [21], [22], and obtained from (3) setting all parameters αj = 1 with j = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
81
+ page_content='.n + 1, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
82
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
83
+ page_content=' derivatives of integer order.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
84
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
85
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
86
+ page_content=' 3-parameters function Wα,β,ν In this section we analyse the simpler case of (1) with n = 1, α2 = β, α1 = α and ν1 = ν: Wα,β,ν(xβ) = ∞ � k=0 k � i=1 Γ(βi + 1 − α) Γ(βi + 1) xβk Γ(βk + 1 − α + ν).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
87
+ page_content=' (7) Proposition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
88
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
89
+ page_content=' Obviously, the above function (7) satisfies the following fractional differential equation ˆDα,β,νf(x) = xα−ν dβ dxβ � xν dα dxα f(x) � = f(x), (8) involving two fractional derivatives in the sense of Caputo of orders α, β ∈ (0, 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
90
+ page_content=' Where f(x) = Wα,β,ν(xβ) 3 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
91
+ page_content=' Remark 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
92
+ page_content=' The Weinstein and Bessel-Clifford operators Setting α = β = 1 and ν = k, k ≥ 1 the operator ˆDα,β,ν becomes ˆD1,1,k = xBk = x � d2 dx2 + k x d dx � = x−k+1 d dxxk d dx where Bk is the well known Weinstein operator (or Bessel operator) from the so- called Darboux-Weinstein relation [23], [24].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
93
+ page_content=' In [25] Hayek studied in details exactly the operator ˆD1,1,k+1 calling its solution as Bessel-Clifford function of second order Cν(x) = x− ν−1 2 Iν−1(2√x) = 1 Γ(ν+1) 0F1(ν + 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
94
+ page_content=' −x), where Iν(x) is the modified Bessel function of the first kind.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
95
+ page_content=' Later, in [26] he introduced the two indices Bessel-Clifford functions of the third order modifying the hyper-Bessel function J(2) µ,ν(x): Cµ,ν(x) = x− µ+ν 3 J(2) µ,ν(3 3√x) = 1 Γ(µ + 1)Γ(ν + 1) 0 F2(µ + 1, ν + 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
96
+ page_content=' −x);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
97
+ page_content=' (9) satisfying the third-order Bessel-Clifford differential equation related to the operator ˆBµ,ν = x−ν d dxxµ−ν+1 d dxxν+1 d dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
98
+ page_content=' (10) As it is simple to see, the two-parameter operator ˆBµ,ν is equivalent to the operator (4), ˆD({α1,α2,α3},{ν1,ν2}) 2L with α1 = α2 = α3 = 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
99
+ page_content=' ν1 = ν + 1 and ν2 = µ − ν + 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
100
+ page_content=' and then the Bessel-Clifford of the third order function (9) is equal to Cµ,ν(x) = 1 Γ(ν + 1)W({1,1,1},{ν+1,µ−ν+1})(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
101
+ page_content=' These differential operators appear very often in the PDEs of mathematical physics (especially in fluid mechanics, elasticity, and transonic flow), for instance in the gen- eralized Bessel heat equation and other equations of generalized axially symmetric potentials (GASP) theory [27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
102
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
103
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
104
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
105
+ page_content=' Particular cases of Wα,β,ν For α = 1, β = λ and ν = µ the function corresponds to the Classical Wright function W1,λ,µ(xλ) = Wλ,µ �xλ λ � = ∞ � k=0 � xλ λ �k k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
106
+ page_content='Γ(λk + µ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
107
+ page_content=' (11) For α = 0, β → α, ν → β − 1 the function corresponds to the generalized Mittag- Leffler function W0,α,β−1(z) = Eα,β(z) = ∞ � k=0 zk Γ(αk + β).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
108
+ page_content=' (12) 4 In case of α = β = ν holds the relation Wν,ν,ν(xν) = E1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
109
+ page_content='ν,1(xν) where Eα;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
110
+ page_content='ν,γ(x) = �∞ k=0 xk Γα+1(νk+γ) is the α-Mittag-Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
111
+ page_content=' In Addition, we present some examples of the 3-parameters function Wα,β,ν in the following table, and in Figure 1 we represent the behavior of this function for different values of the parameters α, β, ν;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
112
+ page_content=' Integer order derivatives Fractional order derivatives W0,1,0(x) = ex W 1 2 , 1 2, 1 2 (√x) = +I0(2√x) + L0(2√x) W0,1,n(x) = ex xn − �n−1 i=0 xi−n i!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
113
+ page_content=' with n ∈ N W 1 2, 1 2, 3 2 (√x) = +I1(2√x) + L1(√x) W1,1,0(x) = √xI1(2√x) W 1 2, 1 2,1(√x) = sinh(2√x)+cosh(2√x)−1 √πx W1,1,ν(x) = x− ν−1 2 Iν−1(2√x) W 1 2, 1 2,2(√x) = (2√x−1)e2√x−2x+1 2x√πx where Iα(x) = i−αJα(ix) = �∞ m=0 1 m!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
114
+ page_content='Γ(m+α+1)(x 2)2m+α is the modified Bessel func- tion of the first kind and Lα(x) = � x 2 �ν+1 �∞ m=0 ( x 2) 2m Γ(m+ 3 2)Γ(m+ν+ 3 2 ) is the modified Struve function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
115
+ page_content=' (a) Plot of the function W0,1,ν(x) for ν = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
116
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
117
+ page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
118
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
119
+ page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
120
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
121
+ page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
122
+ page_content=' 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
123
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
124
+ page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
125
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
126
+ page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
127
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
128
+ page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
129
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
130
+ page_content=' (b) Plot of the function W1,1,ν(x) for ν = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
131
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
132
+ page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
133
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
134
+ page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
135
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
136
+ page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
137
+ page_content=' 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
138
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
139
+ page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
140
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
141
+ page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
142
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
143
+ page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
144
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
145
+ page_content=' (c) Plot of the function W 1 2 , 1 2 ,ν(√x) for ν = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
146
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
147
+ page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
148
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
149
+ page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
150
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
151
+ page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
152
+ page_content=' 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
153
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
154
+ page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
155
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
156
+ page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
157
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
158
+ page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
159
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
160
+ page_content=' (d) Plot of the function W 1 2 ,1,ν(x) for ν = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
161
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
162
+ page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
163
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
164
+ page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
165
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
166
+ page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
167
+ page_content=' 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
168
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
169
+ page_content='25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
170
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
171
+ page_content='5;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
172
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
173
+ page_content='75;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
174
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
175
+ page_content=' Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
176
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
177
+ page_content=' Laplace Transform Let us compute the Laplace transform of the W(¯α,¯ν)(λx) 5 L � W(¯α,¯ν)(λxαn+1), s � = � ∞ 0 e−sx ∞ � k=0 k � i=1 n � j=1 Γ(αn+1i + aj) Γ(αn+1i + bj) λkxαn+1k Γ(αn+1k + bn+1)dx = ∞ � k=0 k � i=1 n � j=1 λkΓ(αn+1i + aj) Γ(αn+1i + bj)Γ(αn+1k + bn+1) � ∞ 0 e−sxxαn+1kdx = 1 s ∞ � k=0 k � i=1 n � j=1 Γ(αn+1i + aj)Γ(αn+1k + 1) Γ(αn+1i + bj)Γ(αn+1k + bn+1) � λ sαn+1 �k .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
178
+ page_content=' (13) th analytical properties of the W(¯α,¯ν) provides that the resulting Laplace transform turns out to be an analytic function, vanishing at infinity and exhibiting an essential singularity at s = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
179
+ page_content=' Remark 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
180
+ page_content=' In case we set αj = 1, j = 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
181
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
182
+ page_content=', n + 1, the multi-index special functions W(¯α,¯ν) will be related to the hyper-Bessel functions as is showed in (6).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
183
+ page_content=' After some calculations, we obtain the following functional relation between the Laplace transform of the Hyper-Bessel function and the multi-index Mittag-Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
184
+ page_content=' A more general relation between these two functions can be found in the article of Kiryakova and Luchko [28].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
185
+ page_content=' L � W(¯1,¯ν)(λx), s � = n � j=1 Γ(1 + aj)1 s ∞ � k=0 1 �n j=1 Γ(k + aj+1 + 1) �λ s �k = n � j=1 Γ(1 + aj)1 sE(n) (1,1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
186
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
187
+ page_content=',1),(aj+1+1) �λ s � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
188
+ page_content=' (14) Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
189
+ page_content=' The Laplace transform of Wα,β,ν(x) can be obtained as a special case of the (13) as follows: L (Wα,β,ν(λxρ), s) = 1 s ∞ � k=0 k � i=1 βΓ(βi + 1 − α) Γ(βi + 1) Γ(ρk + 1) Γ(βk + 1 − α + ν) � λ sρ �k ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
190
+ page_content=' (15) and, in the case of the parameter α = 1, we obtain the well-known Laplace transform of the Wright function which can be expressed in terms of the two-parameter Mittag- Leffler function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
191
+ page_content=' L (W1,β,ν(λx), s) = L (Wβ,ν(λx), s) = 1 sEβ,ν � λ β s � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
192
+ page_content=' (16) 6 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
193
+ page_content=' Recurrence relations of Wα,β,ν A recurrence relation is an equation that recursively defines a sequence of values;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
194
+ page_content=' given one or more initial terms, each further term of the sequence is defined as a function of the previous terms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
195
+ page_content=' Differential recurrence relation of the generalized Wright function can be used in the study of fractional differential equations, and it is obtained directly from series representation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
196
+ page_content=' xα+β dβ dxβ � xν−α+βWα,β,ν+β(xβ) � − 2xν+βWα,β,ν(xβ) + xα+ν dα dxα Wα,β,ν−β(xβ) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
197
+ page_content=' (17) Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
198
+ page_content=' In case α = β = 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
199
+ page_content=' ν = n + 1 with n ∈ N0 and d dxW1,1,n(x) = W1,1,n+1(x) = Cn(x);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
200
+ page_content=' we obtain the well known three-term recurrence relation for the Bessel-Clifford func- tion Cn(x) xCn+2(x) + (n + 1)Cn+1(x) = Cn(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
201
+ page_content=' (18) Remark 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
202
+ page_content=' Recurrence fractional derivatives relation for the Wright and Mittag-Leffler functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
203
+ page_content=' From the relation (11) between the generalized Wright function and the classical Wright function the relation (17) becomes dλ dzλ � zλ+ν−1Wλ,λ+ν �zλ λ �� = zν−1Wλ,ν �zλ λ � ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
204
+ page_content=' (19) using the formula d dz Wλ,ν−λ �zλ λ � = zλ−1Wλ,ν �zλ λ � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
205
+ page_content=' (20) In case α = 0, and β → α, ν → β − 1 the generalized Wright function is related to the Mittag-Leffler function by the following relation: W0,α,β−1(z) = Eα,β(z).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
206
+ page_content=' (21) In particular, from the recurrence relation (17), we obtain the new recurrence relation involving fractional derivatives for M-L functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
207
+ page_content=' zα dα dzα � zα+β−1Eα,α+β(zα) � − 2zα+β−1Eα,β(zα) + zβ−1Eα,β−α(zα) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
208
+ page_content=' (22) 7 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
209
+ page_content=' Partial derivatives of Wα,β,ν with respect to the parameters In this section, taking inspiration from the works of Apelblat and Mainardi [29], [30] we analyse the derivatives of Wα,β,ν respect the three parameters included in the function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
210
+ page_content=' We can treat parameters as variables and hence the derivatives with respect to them can be obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
211
+ page_content=' These derivatives lead to infinite power series involving digamma (ψ) and gamma functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
212
+ page_content=' ∂ ∂ν Wα,β,ν(z) = − ∞ � k=0 k � i=1 Γ(βi + 1 − α) Γ(βi + 1) ψ(βk + 1 − α + ν) Γ(βk + 1 − α + ν)zk;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
213
+ page_content=' (23) ∂ ∂β Wα,β,ν(z) = ∞ � k=0 k � i=1 Γ(βi + 1 − α) Γ(βi + 1) zk Γ(βk + 1 − α + ν) · \uf8ee \uf8f0 k � j=1 j [ψ(βj + 1 − α) − ψ(βj + 1)] − kψ(βk + 1 − α + ν) \uf8f9 \uf8fb ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
214
+ page_content=' (24) ∂ ∂αWα,β,ν(z) = ∞ � k=0 k � i=1 Γ(βi + 1 − α) Γ(βi + 1) zk Γ(βk + 1 − α + ν) \uf8ee \uf8f0− k � j=1 ψ(βj + 1 − α) + ψ(βk + 1 − α + ν) \uf8f9 \uf8fb ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
215
+ page_content=' (25) where ψ(z) = Γ′(z) Γ(z) denotes the digamma function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
216
+ page_content=' Remark 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
217
+ page_content=' In the case α = 1 and considering the property of the digamma function ψ(z+1) = ψ(z)+ 1 z;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
218
+ page_content=' we obtain the formula (5) and (6) of the Apelblat-Mainardi article ([30]) for the classical Wright function ∂ ∂β W1,β,ν(z) = � ∂ ∂β Wβ,ν � (βz) = − ∞ � k=0 � ψ(βk + ν) k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
219
+ page_content='Γ(βk + ν) � kzk;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
220
+ page_content=' ∂ ∂ν W1,β,ν(z) = � ∂ ∂ν Wβ,ν � (βz) = − ∞ � k=0 � ψ(βk + ν) k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
221
+ page_content='Γ(βk + ν) � zk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
222
+ page_content=' By setting the parameters, α = 0, β → α and ν → β − 1, we obtain the formulas (95) and (96) of the Apelblat paper ([29]) ∂ ∂αW0,α,β−1(z) = ∂ ∂αEα,β(z) = − ∞ � k=0 �kψ(αk + β) Γ(αk + β) � zk;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
223
+ page_content=' ∂ ∂β W0,α,β−1(z) = ∂ ∂β Eα,β(z) = − ∞ � k=0 �ψ(αk + β) Γ(αk + β) � zk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
224
+ page_content=' 8 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
225
+ page_content=' Conclusion The aim of this paper is to investigate several properties related to the multi-index special function W(¯α,¯ν) and its 3-parameters version.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
226
+ page_content=' An important result was finding the connection between the W(¯α,¯ν) and the hyper-Bessel function of Delerue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
227
+ page_content=' Here we analyzed the Laplace transform, recurrence relation and derivatives of the function with respect to the parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
228
+ page_content=' In particular, we found new findings that, for special values of the parameters, retrieve some well-known relations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
229
+ page_content=' Indeed, a simple func- tional relation is obtained between the Laplace transform of the hyper-Bessel function and the multi-index Mittag-Leffler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
230
+ page_content=' Disclosure statement No potential conflict of interest was reported by the author.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
231
+ page_content=' Acknowledgements The author is grateful to Dr Roberto Garra for providing essential information, help and advice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
232
+ page_content=' References [1] Podlubny I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
233
+ page_content=' Fractional Differential Equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
234
+ page_content=' Academic Press, San Diego;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
235
+ page_content=' 1999.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
236
+ page_content=' [2] Mainardi F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
237
+ page_content=' Fractional calculus and waves in linear viscoelasticity: an introduction to mathematical models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
238
+ page_content=' World Scientific;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
239
+ page_content=' 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
240
+ page_content=' [3] Gorenflo R, Kilbas AA, Mainardi F, Rogosin SV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
241
+ page_content=' Mittag-Leffler functions, related topics and applications (p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
242
+ page_content=' 540).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
243
+ page_content=' New York, NY, USA: Springer;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
244
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
245
+ page_content=' [4] Wright E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
246
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
247
+ page_content=' Asymptotic partition formulae: I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
248
+ page_content=' plane partitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
249
+ page_content=' The Quarterly Journal of Mathematics, Volume os-2, Issue 1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
250
+ page_content=' 1931;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
251
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
252
+ page_content=' 177–189.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
253
+ page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
254
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
255
+ page_content='1093/qmath/os- 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
256
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
257
+ page_content='177 [5] Wright E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
258
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
259
+ page_content=' Asymptotic partition formulae:(II) weighted partitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
260
+ page_content=' Proceedings of the London Mathematical Society, 2(1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
261
+ page_content=' 1934;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
262
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
263
+ page_content=' 117-141.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
264
+ page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
265
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
266
+ page_content='1112/plms/s2- 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
267
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
268
+ page_content='117 [6] Wright E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
269
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
270
+ page_content=' Asymptotic partition formulae.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
271
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
272
+ page_content=' Partitions intok-th powers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
273
+ page_content=' Acta Math- ematica, 63(1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
274
+ page_content=' 1934;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
275
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
276
+ page_content='143-191.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
277
+ page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
278
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
279
+ page_content='1007/BF02547353 [7] Wright EM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
280
+ page_content=' On the coefficients of power series having exponential singularities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
281
+ page_content=' Journal London Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
282
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
283
+ page_content=' 8;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
284
+ page_content=' 1933;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
285
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
286
+ page_content=' 71–79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
287
+ page_content=' [8] Wright EM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
288
+ page_content=' The asymptotic expansion of the generalized Bessel function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
289
+ page_content=' Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
290
+ page_content=' London Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
291
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
292
+ page_content=' (Ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
293
+ page_content=' II) 38;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
294
+ page_content=' 1935;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
295
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
296
+ page_content=' 257–270.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
297
+ page_content=' [9] Wright EM.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
298
+ page_content=' The asymptotic expansion of the generalized hypergeometric function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
299
+ page_content=' Jour- nal London Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
300
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
301
+ page_content=' 10;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
302
+ page_content=' 1935;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
303
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
304
+ page_content=' 287–293.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
305
+ page_content=' [10] Garra R, Polito F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
306
+ page_content=' On some operators involving Hadamard derivatives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
307
+ page_content=' Integral Trans- forms and Special Functions;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
308
+ page_content=' 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
309
+ page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
310
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
311
+ page_content='1080/10652469.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
312
+ page_content='2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
313
+ page_content='756875.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
314
+ page_content=' [11] Dubovski PB, Slepoi JA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
315
+ page_content=' Construction and analysis of series solutions for frac- tional quasi-Bessel equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
316
+ page_content=' Fract Calc Appl Anal 25;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
317
+ page_content=' 2022;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
318
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
319
+ page_content='1229–1249.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
320
+ page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
321
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
322
+ page_content='1007/s13540-022-00045-z [12] Kiryakova V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
323
+ page_content=' Fractional calculus of some ”new” but not new special function: K-, multi- index-, and S-analogues.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
324
+ page_content=' AIP Conference Proceedings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
325
+ page_content=' 2172, 050008;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
326
+ page_content=' 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
327
+ page_content=' 9 [13] Droghei R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
328
+ page_content=' On a Solution of a Fractional Hyper-Bessel Differential Equation by Means of a Multi-Index Special Function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
329
+ page_content=' Fract Calc Appl Anal 24;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
330
+ page_content=' 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
331
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
332
+ page_content=' 1559–1570.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
333
+ page_content=' https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
334
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
335
+ page_content='1515/fca-2021-0065 [14] Droghei R, Garra R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
336
+ page_content=' Isochronous fractional PDEs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
337
+ page_content=' Lecture Notes of TICMI 21;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
338
+ page_content=' 2020;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
339
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
340
+ page_content=' 43–51.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
341
+ page_content=' [15] Dattoli G, Ricci PE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
342
+ page_content=' Laguerre-type exponentials, and the relevant-circular and-hyperbolic functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
343
+ page_content=' Georgian Mathematical Journal, 10(3);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
344
+ page_content=' 2003;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
345
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
346
+ page_content=' 481-494.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
347
+ page_content=' [16] Bretti G, Ricci PE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
348
+ page_content=' Laguerre-type special functions and population dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
349
+ page_content=' Applied mathematics and computation, 187(1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
350
+ page_content=' 2007;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
351
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
352
+ page_content=' 89-100.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
353
+ page_content=' [17] Ricci PE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
354
+ page_content=' Laguerre-Type Exponentials, Laguerre Derivatives and Applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
355
+ page_content=' A Survey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
356
+ page_content=' Mathematics 8, 2054;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
357
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
358
+ page_content=' [18] Garra R, Tomovski Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
359
+ page_content=' Exact results on some nonlinear Laguerre-type diffusion equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
360
+ page_content=' Mathematical Modelling and Analysis, 26(1);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
361
+ page_content=' 2021;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
362
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
363
+ page_content=' 72-81.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
364
+ page_content=' [19] Delerue P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
365
+ page_content=', Sur le calcul symbolique `a n variables et fonctions hyperbesseliennes (II).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
366
+ page_content=' Ann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
367
+ page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
368
+ page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
369
+ page_content=' Brux.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
370
+ page_content=' 3;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
371
+ page_content=' 1953;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
372
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
373
+ page_content=' 229–274.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
374
+ page_content=' [20] Kiryakova V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
375
+ page_content=' Generalized Fractional Calculus and Applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
376
+ page_content=' Longman – J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
377
+ page_content=' Wiley, Harlow, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
378
+ page_content=' York;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
379
+ page_content=' 1994.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
380
+ page_content=' [21] Dimowski I, Kiryakova V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
381
+ page_content=' Generalized Poisson transmutations and corresponding repre- sentations of hyper-Bessel functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
382
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
383
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
384
+ page_content=' Acad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
385
+ page_content=' Bulg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
386
+ page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
387
+ page_content=' 39, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
388
+ page_content=' 10;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
389
+ page_content=' 1986;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
390
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
391
+ page_content=' 20-32.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
392
+ page_content=' [22] Dimowski I, Kiryakova V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
393
+ page_content=' Generalized Poisson representations of hyper-geometric func- tions pFq , p < q using fractional integrals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
394
+ page_content=' In: Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
395
+ page_content='16th Spring Conf Union Bulg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
396
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
397
+ page_content=' Sofia;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
398
+ page_content=' 1987;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
399
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
400
+ page_content=' 205-212.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
401
+ page_content=' [23] Weinstein A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
402
+ page_content=' The generalized radiation problem and the Euler-Poisson-Darboux equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
403
+ page_content=' Summa Brazil Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
404
+ page_content=' 3;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
405
+ page_content=' 1955;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
406
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
407
+ page_content=' 125-147.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
408
+ page_content=' [24] Kiryakova V, Hernandez-Suarez V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
409
+ page_content=' Bessel-Clifford third order differential operator and corresponding Laplace type integral transform.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
410
+ page_content=' Dissertationes Mathematicae 340;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
411
+ page_content=' 1995);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
412
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
413
+ page_content=' 143-161.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
414
+ page_content=' [25] Hayek N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
415
+ page_content=' Estudio de la ecuaci`on diferencial xy′′ + (ν + 1)y′ + y = 0 y de sus aplicaciones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
416
+ page_content=' Collect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
417
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
418
+ page_content=' 18, No 1-2;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
419
+ page_content=' 1967;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
420
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
421
+ page_content=' 57-174.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
422
+ page_content=' [26] Hayek N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
423
+ page_content=' Funciones de Bessel-Cliff`ord de tercer orden.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
424
+ page_content=' Actas XII Jornadas Luso-Esp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
425
+ page_content=' de Mat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
426
+ page_content=' (Braga);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
427
+ page_content=' 1987;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
428
+ page_content=' p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
429
+ page_content=' 346-351.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
430
+ page_content=' [27] Weinstein A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
431
+ page_content=' Generalized axially symmetric potential theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
432
+ page_content=' Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
433
+ page_content='AMS 59, 20;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
434
+ page_content=' 1955.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
435
+ page_content=' [28] Kiryakova V, Luchko Yu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
436
+ page_content=' The Multiindex MittagLeffler Functions and Their Applications for Solving Fractional Order Problems in Applied Analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
437
+ page_content=' AIP Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
438
+ page_content=' Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
439
+ page_content=' 1301, 597;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
440
+ page_content=' 2010;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
441
+ page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
442
+ page_content='1063/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
443
+ page_content='3526661.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
444
+ page_content=' [29] Apelblat A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
445
+ page_content=' Differentiation of the Mittag-Leffler functions with respect to parameters in the Laplace transform approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
446
+ page_content=' Mathematics, 8(5), 657;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
447
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
448
+ page_content=' [30] Apelblat A, Mainardi F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
449
+ page_content=' Differentiation of the Wright functions with respect to parameters and other results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
450
+ page_content=' arXiv e-prints, arXiv-2009;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
451
+ page_content=' 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
452
+ page_content=' Appendix A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
453
+ page_content=' Fractional calculus In order to make the papar self-contained, we briefly recall main definitions and prop- erties of fractional calculus operators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
454
+ page_content=' Let γ ∈ R+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
455
+ page_content=' The Riemann-Liouville fractional integral is defined by Jγ x f(x) = 1 Γ(γ) � x 0 (x − x′)γ−1f(x′)dx′, (A1) 10 where Γ(γ) = � +∞ 0 xγ−1e−xdx, is the Euler Gamma function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
456
+ page_content=' Note that, by definition, J0 xf(x) = f(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
457
+ page_content=' Moreover it satisfies the semigroup property, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
458
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
459
+ page_content=' Jα x Jβ x f(x) = Jα+β x f(x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
460
+ page_content=' There are different definitions of fractional derivative (see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
461
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
462
+ page_content=' [1]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
463
+ page_content=' In this paper we used the fractional derivatives in the sense of Caputo, that is Dγ xf(x) = Jm−γ x Dm x f(x) = 1 Γ(m − γ) � x 0 (x−x′)m−γ−1 dm d(x′)m f(x′) dx′, γ ̸= m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
464
+ page_content=' (A2) It is simple to prove the following properties of fractional derivatives and integrals (see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
465
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
466
+ page_content=' [1]) that will be used in the analysis: Dγ xJγ x f(x) = f(x), γ > 0, (A3) Jγ x Dγ xf(x) = f(x) − m−1 � k=0 f (k)(0)xk k!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
467
+ page_content=' , γ > 0, x > 0, (A4) Jγ x xδ = Γ(δ + 1) Γ(δ + γ + 1)xδ+γ γ > 0, δ > −1, t > 0, (A5) Dγ xxδ = Γ(δ + 1) Γ(δ − γ + 1)xδ−γ γ > 0, δ > −1, t > 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
468
+ page_content=' (A6) 11' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/5dE3T4oBgHgl3EQfpQo9/content/2301.04640v1.pdf'}
6NE1T4oBgHgl3EQf6wWy/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:44f211a650353713f58f7fb3cb1024df1c7003e0103338b20ca2b3dbb3541700
3
+ size 86430
8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:995d833071383db496ee808e9461cf00ef3c95923ea5e55dd29a051c1737879f
3
+ size 458539
8dA0T4oBgHgl3EQfOv8t/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d8e39dec4c3606eaa5c1072b2843a1034b4d3143aa972741fb6868d41e97c388
3
+ size 1769517
8dA0T4oBgHgl3EQfOv8t/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:30b9eaa69de47672ac7b7ec49aa4a9f359f67b0a187084d7efb39392265a1db1
3
+ size 65121
B9E3T4oBgHgl3EQfUAr7/content/2301.04448v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:397c458a1497a6f05b93cc3e810f32cad2c40cd4cd44215807dbe9efc6e1734a
3
+ size 231678
B9E3T4oBgHgl3EQfUAr7/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6f3189dd0bc48c61ff87087d92a7ccd6680b615f6830bbd1c230a5cc553c1173
3
+ size 2359341
B9E3T4oBgHgl3EQfUAr7/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b76e456c5ba66a3ce3950192d1474af41b1ae6c3f8d4abb4d198856f2d166816
3
+ size 97479
BdE2T4oBgHgl3EQfngiP/content/2301.04009v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:64cffba3b220ea00d2aa3f80f0d52f444578810856418cd1f957872d29a31aa0
3
+ size 308085
BdE2T4oBgHgl3EQfngiP/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b89014f96f2656cd52d730abc8a4a13afa154e6eebb20012c192be6ab52d9d08
3
+ size 4194349
BdE2T4oBgHgl3EQfngiP/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:451a22cad8f26e2bca5bade44e27ea3aa97a475b3cb360d0eee8a72621738be4
3
+ size 166867
CdAzT4oBgHgl3EQfiP0X/content/tmp_files/2301.01495v1.pdf.txt ADDED
@@ -0,0 +1,1449 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Beckman Defense
2
+ A V Subramanyam
3
+ IIITD
4
5
+ Abstract
6
+ Optimal transport (OT) based distributional robust
7
+ optimisation (DRO) has received some traction in
8
+ the recent past. However, it is at a nascent stage but
9
+ has a sound potential in robustifying the deep learn-
10
+ ing models. Interestingly, OT barycenters demon-
11
+ strate a good robustness against adversarial attacks.
12
+ Owing to the computationally expensive nature of
13
+ OT barycenters, they have not been investigated
14
+ under DRO framework.
15
+ In this work, we pro-
16
+ pose a new barycenter, namely Beckman barycen-
17
+ ter, which can be computed efficiently and used
18
+ for training the network to defend against adver-
19
+ sarial attacks in conjunction with adversarial train-
20
+ ing. We propose a novel formulation of Beckman
21
+ barycenter and analytically obtain the barycenter
22
+ using the marginals of the input image. We show
23
+ that the Beckman barycenter can be used to train
24
+ adversarially trained networks to improve the ro-
25
+ bustness. Our training is extremely efficient as it re-
26
+ quires only a single epoch of training. Elaborate ex-
27
+ periments on CIFAR-10, CIFAR-100 and Tiny Im-
28
+ ageNet demonstrate that training an adversarially
29
+ robust network with Beckman barycenter can sig-
30
+ nificantly increase the performance. Under auto at-
31
+ tack, we get a a maximum boost of 10% in CIFAR-
32
+ 10, 8.34% in CIFAR-100 and 11.51% in Tiny Ima-
33
+ geNet. Our code is available at http://bitly.ws/yvgh.
34
+ 1
35
+ Introduction
36
+ Optimal mass transport (OT), originally proposed by Monge
37
+ in his seminal work [Monge,
38
+ 1781],
39
+ has gathered a
40
+ widespread interest in the field of learning representations.
41
+ The original deterministic OT problem was later relaxed by
42
+ Kantorovich [Kantorovich, 1942] and considered a proba-
43
+ bilistic transport problem. This formulation seeks solution
44
+ for the optimal transport plan which can transport mass be-
45
+ tween two measures by incurring the minimum cost and is
46
+ solved using a linear program. The modern day OT is also at-
47
+ tributed to the phenomenal work of Kantorovich. Following
48
+ the OT theory, barycenters in Wasserstein space was proposed
49
+ by Agueh and Carlier in their remarkable work [Agueh and
50
+ Carlier, 2011]. Further, using entropic regularization [Cuturi,
51
+ 2013], a fast method of computing barycenters was proposed
52
+ by Cuturi and Doucet [Cuturi and Doucet, 2014]. Recent
53
+ works addresses the challenge of computational complexity
54
+ of barycenters using neural networks [Lacombe et al., 2021].
55
+ In this work, we investigate the barycenters towards robust
56
+ learning of deep learning models.
57
+ Deep learning systems have shown impressive perfor-
58
+ mance in various applications. However, these systems are
59
+ vulnerable to adversarial perturbations [Wong et al., 2020],
60
+ [Croce and Hein, 2020], [Xie et al., 2019].
61
+ In order to
62
+ counter these attacks, several defense mechanisms have also
63
+ been proposed.
64
+ In one of the early works, Szegedy et
65
+ al. [Szegedy et al., 2013] formulated the adversarial attack
66
+ as an optimization problem and obtained the adversarial sam-
67
+ ple using L-BFGS. Several adversarial attacks have been
68
+ proposed since Szegedy’ work [Goodfellow et al., 2014;
69
+ Kurakin et al., 2016]. On the other hand, strong defense mea-
70
+ sures have been studied in [Madry et al., 2017], [Theagarajan
71
+ et al., 2019], [Wong et al., 2020], [Rebuffi et al., 2021].
72
+ Rotated
73
+ samples of
74
+ Classical AT
75
+ Barycentric
76
+ Training
77
+
78
+ Barycenter of
79
+ adversarial sample
80
+ Inference
81
+ Figure 1: Illustration: Classical defense methods use Adversarial
82
+ Training (AT) as a major defense technique. Our method obtains
83
+ barycenter from rotated inputs and uses them for training the model
84
+ using a cross-entropy loss. During inference time also we compute
85
+ barycenter of the given sample. The dashed boundary of barycenter
86
+ indicates that the barycenter is close to input samples in terms of
87
+ appearance but there are some differences. In the computation of
88
+ barycenter of adversarial sample, the barycenter shows the changes
89
+ in same color as that of the background to imply that barycenter
90
+ suppresses the adversarial noise.
91
+ In the field of adversarial attacks and defense, lP space has
92
+ arXiv:2301.01495v1 [cs.LG] 4 Jan 2023
93
+
94
+ been extensively studied. However, only a few works investi-
95
+ gate attacks under OT framework [Wong et al., 2019], [Li et
96
+ al., 2021]. There are even fewer works which investigate ro-
97
+ bustness using OT theory [Kwon et al., 2020], [Subramanyam
98
+ and Raj, 2022]. Distinct from these works, we first intro-
99
+ duce Beckman barycenter, a concept analogous to Wasser-
100
+ stein barycenter. We use proximal operator methods to solve
101
+ for the barycenter. The barycenters obtained from the clean
102
+ samples are used to train a pretrained adversarially robust net-
103
+ work. We note that in the absence of adversarial samples in
104
+ the training, the model would give a better clean accuracy but
105
+ will suffer in terms of adversarial accuracy. Therefore, we
106
+ use a pre-trained adversarially robust network to overcome
107
+ this challenge. An abstract illustration of our method is given
108
+ in Figure 1.
109
+ Beckman barycenter is obtained from input marginals via
110
+ a non-linear interpolation. The input marginals are linearly
111
+ transformed versions of the input and thus interfere with the
112
+ adversarial noise. Using these marginals the barycenter gen-
113
+ erates a sample which is similar in appearance to the input
114
+ and is closer in terms of class label. Thus, the class label
115
+ is preserved when the input is a clean sample, whereas, the
116
+ adversarial noise gets suppressed when the input is an ad-
117
+ versarial sample. Further, the network needs to be trained
118
+ with barycenter of clean samples so as to correctly classify
119
+ them. However, this training is cheap as a single epoch is
120
+ sufficient. We prove our hypothesis using extensive qualita-
121
+ tive and quantitative experiments.
122
+ 2
123
+ Related Works
124
+ Adversarial Attacks Given an adversarial sample x with la-
125
+ bel y, a target network f parameterized by θ, the adversary
126
+ tries to find xadv by adding an adversarial noise such that
127
+ the prediction fθ(xadv) ̸= fθ(x) = y. Some of the robust at-
128
+ tacks are iterative FGSM [Kurakin et al., 2016], PGD [Madry
129
+ et al., 2017], Carlini and Wagner attacks [Carlini and Wagner,
130
+ 2017], Jacobian based attack [Papernot et al., 2016], physical
131
+ attack Athalye [Athalye et al., 2018], and Autoattack [Croce
132
+ and Hein, 2020]. These attacks are primarily focused in lp
133
+ domain.
134
+ Adversarial Defense In response to adversarial attacks, sev-
135
+ eral defenses been proposed. One of the best defense ap-
136
+ proach is adversarial training [Szegedy et al., 2013], [Good-
137
+ fellow et al., 2014], [Moosavi-Dezfooli et al., 2016]. Madry
138
+ et al. [Madry et al., 2017] formally studied adversarial train-
139
+ ing and proposed that such training allows network to de-
140
+ fend well against first order adversary. Adversarial logit pair-
141
+ ing uses a pair of logits from clean and adversarial examples
142
+ to defend against adversarial samples [Kannan et al., 2018].
143
+ TRADES [Zhang et al., 2019] prove the bounds based on
144
+ regularization term which minimizes the difference in pre-
145
+ diction between clean and adversarial examples. In [Wong et
146
+ al., 2020], authors proposed to effectively combine FGSM
147
+ and random initialization to demonstrate better adversarial
148
+ training. RST [Carmon et al., 2019] propose a self-training
149
+ technique using unlabelled samples to improve the robust-
150
+ ness. Observing the correlation between flatness of weight
151
+ loss landscape and adversarial robustness, Wu et al. proposed
152
+ adversarial weight perturbation (AWP) to regularize the flat-
153
+ ness of weight loss [Wu et al., 2020]. On similar lines, [Yu et
154
+ al., 2022] propose a criterion called Loss Stationary Condi-
155
+ tion (LSC) for constrained perturbation, which regulates the
156
+ weight perturbation to prevent overfitting. LBGAT [Cui et al.,
157
+ 2021] constrains the logits of a robust model, trained with ad-
158
+ versarial examples, to be similar to the logits of a clean model
159
+ trained on natural data.
160
+ While adversarial training uses all the samples, many tech-
161
+ niques propose that naively using adversarial samples in ad-
162
+ versarial training is not efficient.
163
+ This primarily involves
164
+ training the model with a weak attack first, and then grad-
165
+ ually increasing the strength of the adversary - CAT [Cai et
166
+ al., 2018], DART [Wang et al., 2019a], MART [Wang et al.,
167
+ 2019b], FAT [Zhang et al., 2020]. Aforementioned methods
168
+ rely on pre-determined attack parameters for adversarial sam-
169
+ ple generation. However, this restricts the model’s robust-
170
+ ness. To address this issue, LAS-AT [Jia et al., 2022] propose
171
+ a framework for adversarial training that introduces the no-
172
+ tion of learnable attack strategy. It is composed of two com-
173
+ ponents: a target network that uses adversarial examples for
174
+ training to improve robustness, and a strategy network that
175
+ produces attack strategies to control adversarial sample gen-
176
+ eration. In similar spirit, A2 [Xu et al., 2022] and [Cheng
177
+ et al., 2022] have also been proposed. A classical review of
178
+ defense methods can be obtained in [Bai et al., 2021].
179
+ In a parallel line of defense works, input purification has
180
+ also been explored. At the test time, these techniques try to
181
+ remove the adversarial noise [Shi et al., 2021], TRADESSSL
182
+ [Mao et al., 2021], HedgeRST [Wu et al., 2021]. Score based
183
+ generative models such as [Yoon et al., 2021] and [Nie et al.,
184
+ 2022] have also been used to purify the images before sending
185
+ them for classification.
186
+ Our work is inspired from two different theories, namely,
187
+ OT barycenters and distributional robust optimization. We
188
+ discuss these theories in the following.
189
+ Wasserstein Barycenter In the following we discuss Wasser-
190
+ stein distance and barycenter. Given probability distributions,
191
+ µ1, µ2 ∈ Ω, the Wasserstein distance is defined as,
192
+ W(µ1, µ2) = inf
193
+ Ω×Ω c(x, y)π(x, y)dxdy,
194
+ (1)
195
+ s.t.
196
+
197
+
198
+ π(x, y)dx = µ1(x),
199
+
200
+
201
+ π(x, y)dy = µ2(y),
202
+ where the cost matrix c(x, y) = ∥x − y∥1 and π denotes the
203
+ transport plan. This is also known as Earth Mover’ Distance
204
+ (EMD). This form is also used to compute barycenter [Cuturi
205
+ and Peyr´e, 2016] wherein the summation of Wasserstein dis-
206
+ tance between the barycenter and each input marginal is con-
207
+ sidered. However, barycenters are costly to compute and the
208
+ best known complexity scales exponentially with the number
209
+ of marginals [Fan et al., 2022].
210
+ EMD can also be represented as dual of the dual of Eq 1
211
+ in variational form popularly introduced by Beckman [Beck-
212
+
213
+ mann, 1952], [Li et al., 2018], [Lee et al., 2020],
214
+ W(µ1, µ2) = inf
215
+ M
216
+
217
+
218
+ ∥M∥
219
+ (2)
220
+ s.t. div(M) + µ1 − µ2 = 0
221
+ M.n = 0 ∀x ∈ ∂Ω; n is normal to ∂Ω
222
+ Under appropriate discretisation, M = (Mx, My), M ∈
223
+ Rn×2 is flux vector satisfying zero flux boundary conditions.
224
+ µ1, µ2 ∈ Rn, and,
225
+ div(M) = (Mx[i, j]−Mx[i−1, j])+(My[i, j]−My[i, j−1])
226
+ and the zero-flux boundary conditions mean that Mx[i, j] =
227
+ My[i, j] = 0 outside the boundary. Eq 2 is favorable com-
228
+ pared to Eq 1 as it reduces the complexity from O(n2) to
229
+ O(n) [Li et al., 2018]. Motivated by the recent developments
230
+ of OT barycenters, we make use of Eq 2 to propose Beckman
231
+ barycenter as they can be efficiently solved using well known
232
+ techniques like [Goldstein and Osher, 2009], [Chambolle and
233
+ Pock, 2011].
234
+ DRO One of the influential works in DRO was proposed by
235
+ Scarf [Scarf, 1957]. Following this work, significant research
236
+ has been done in this field [Ben-Tal et al., 2009], [Duchi et
237
+ al., 2021], [Staib and Jegelka, 2017]. DRO aims to address
238
+ the problem of uncertainty or shift in the data distribution that
239
+ can arise due to measurement errors and admits a solution
240
+ for the worst case scenario. Let L(θ, x) be the loss function
241
+ where θ are network parameters. Then, DRO solves for,
242
+ inf
243
+ θ sup
244
+ Q∈Q
245
+ EQL(θ, x)
246
+ (3)
247
+ Here, Q is the distribution against which DRO minimizes
248
+ the loss. For instance, Q can be considered as a distribu-
249
+ tion set which contains perturbations of input samples x.
250
+ Here we note that adversarial training can be considered to
251
+ be a specific instance of DRO wherein the distribution Q is
252
+ drawn from adversarial samples. In our case, we consider the
253
+ barycenters as the samples drawn from the distribution Q and
254
+ thus provide robustness against perturbed samples.
255
+ 2.1
256
+ Proposed Algorithm
257
+ In this work, we propose a novel Beckman Barycenter for-
258
+ mulation and derive the barycenter analytically. We use the
259
+ barycenter to demonstrate that it can be applied for adversar-
260
+ ial defense. We first obtain the barycenter using the marginals
261
+ from the given input image and then train the network using
262
+ barycenter.
263
+ While OT barycenters are a good choice for the distri-
264
+ bution Q in Eq 3, computing OT barycenter suffers from
265
+ high complexity and exponentially increases with the number
266
+ marginals [Fan et al., 2022]. To counter this high complexity
267
+ challenge, we first discuss an analogous barycenter problem
268
+ by building upon the formulation given in Eq 2.
269
+ inf
270
+ M1,M2
271
+ r1,r2,µ
272
+ ∥M1∥2,1 + ∥M2∥2,1 + α(∥r1∥1
273
+ (4)
274
+ +∥r2∥1) + β∥µ∥1
275
+ s.t. div(M1) + µ1 − µ = r1
276
+ div(M2) + µ2 − µ = r2
277
+ where, r1, r2, µ ∈ Rn. Our formulation is loosely inspired
278
+ from the Beckman OT formulation that are given in [Li et al.,
279
+ 2018], [Lee et al., 2020]. There are notable changes in Eq 4
280
+ from Eq 2. First we solve for Beckman barycenter µ in ad-
281
+ dition to other variables. Similar to Wasserstein barycenter
282
+ which acts as a representative of marginals using Wasserstein
283
+ metric, the Beckman barycenter µ minimizes the flux with
284
+ respect to input marginals µ1 and µ2. In our experiments,
285
+ these marginals are obtained by rotating the input image with
286
+ ±4◦. Second, the variables r1 and r2 allow the mass to be
287
+ created or destroyed [Lee et al., 2020] and the regularization
288
+ over r1, r2 and µ ensure that these variable do not take ar-
289
+ bitrarily large values. Third, Eq 4 can be easily converted to
290
+ Lagrange formulation and solved in linear time using primal-
291
+ dual method of Chambolle and Pock [Chambolle and Pock,
292
+ 2011].
293
+ In order to make the objective strongly convex, we first
294
+ apply proximal operators. The l2 regularizer makes the ob-
295
+ jective strongly convex. Using the proximal operator,
296
+ inf
297
+ M1,M2,r1
298
+ r2,µ′
299
+ 1,µ′
300
+ 2,µ
301
+ ∥M1∥2,1 + ∥M2∥2,1 + α(∥r1∥1 (5)
302
+ +∥r2∥1) + 1
303
+ 2ρ(∥µ′
304
+ 1 − µ1∥2 + ∥µ′
305
+ 2 − µ2∥2) + β∥µ∥1
306
+ s.t. div(M1) + µ′
307
+ 1 − µ = r1
308
+ div(M2) + µ′
309
+ 2 − µ = r2
310
+ The Lagrangian of Eq 5 is given as,
311
+ inf
312
+ M1,M2,r1
313
+ r2,µ′
314
+ 1,µ′
315
+ 2,µ
316
+ ∥M1∥2,1 + ∥M2∥2,1 + α(∥r1∥1 (6)
317
+ +∥r2∥1) + 1
318
+ 2ρ(∥µ′
319
+ 1 − µ1∥2 + ∥µ′
320
+ 2 − µ2∥2) + β∥µ∥1
321
+ +
322
+
323
+ i
324
+ ⟨λi, div(Mi) + µ′
325
+ i − µ − ri⟩
326
+ Eq 6 can be solved using first-order primal dual method of
327
+ Chambolle and Pock [Chambolle and Pock, 2011]1.
328
+ Mt+1
329
+ i
330
+ ← arg min
331
+ Mi
332
+ ∥Mi∥2,1 + ⟨λi, div(Mi) + µ′
333
+ i−
334
+ µ − ri⟩ + 1
335
+ 2τ1
336
+ ∥Mi − Mt
337
+ i∥2
338
+ ∀i = {1, 2}
339
+ µ′
340
+ i
341
+ t+1 ← arg min
342
+ µ′
343
+ i
344
+ 1
345
+ 2τ1
346
+ (∥µ′
347
+ i − µi∥2) + ⟨λi, µ′
348
+ i⟩
349
+ + 1
350
+ 2τ1
351
+ ∥µ′
352
+ i − µ′
353
+ i
354
+ t∥2
355
+ rt+1
356
+ i
357
+ ← arg min
358
+ ri
359
+ α∥ri∥1 + ⟨λt
360
+ i, ri⟩ + 1
361
+ 2τ1
362
+ ∥ri − rt
363
+ i∥2
364
+ µt+1 ← arg min
365
+ µ
366
+ ∥µ∥1 + ⟨λt
367
+ i, µ⟩ + 1
368
+ 2τ1
369
+ ∥µ − µt∥2
370
+ λt+1
371
+ i
372
+ ← arg max
373
+ λi
374
+ ⟨λi, κt+1⟩ − 1
375
+ 2τ2
376
+ ∥λi − λt
377
+ i∥2,
378
+ 1We use similar notations to that of [Li et al., 2018], [Chambolle
379
+ and Pock, 2011] for consistency and simplicity.
380
+
381
+ where, κt+1 = 2(div(Mi)t+1+µ′
382
+ i
383
+ t+1−rt+1
384
+ i
385
+ )−(div(Mi)t+
386
+ µ′
387
+ i
388
+ t − rt
389
+ i)
390
+ We now discuss the solution of each individual optimiza-
391
+ tion.
392
+ Solving for Mi: The rows mij of Mi can be expressed
393
+ and solved using l21 norm shrinkage operator,
394
+ mt+1
395
+ ij
396
+ ← shrinkl2
397
+ τ1(mt
398
+ ij − τ1div∗(λt
399
+ i)j)
400
+ (7)
401
+ Here,
402
+ div∗
403
+ denotes the adjoint of div operator,
404
+ and
405
+ shrinkl2
406
+ τ1η = max(∥η∥2 − τ1, 0) ⊙
407
+ η
408
+ (∥η∥2). “⊙” denotes the
409
+ Hadamard product.
410
+ Solving for µ′
411
+ i:
412
+ µ′
413
+ i
414
+ t+1 ← max{0,
415
+ ρτ1
416
+ 1 + ρτ1
417
+ µ′
418
+ i +
419
+ 1
420
+ 1 + ρτ1
421
+ (µ′
422
+ i
423
+ t − τ1λt
424
+ i)}, (8)
425
+ Solving for ri: We use an l1 shrinkage operator.
426
+ rt+1
427
+ i
428
+ ← shrinkl1
429
+ ατ1(rt
430
+ i + τ1λt
431
+ i)
432
+ (9)
433
+ Here, shrinkl1
434
+ ατ1(η) = sign(η) ⊙ max(∥η∥ − ατ1, 0).
435
+ Solving for barycenter µ:
436
+ µt+1 ← shrinkl1
437
+ βτ1(µt + τ1(λt
438
+ 1 + λt
439
+ 2))
440
+ (10)
441
+ Solving for λ:
442
+ λt+1
443
+ i
444
+ ← λt
445
+ i + τ2κt+1
446
+ (11)
447
+ 2.2
448
+ Toy example
449
+ We demonstrate the barycenter computation using a Gaussian
450
+ image in Figure 2. The barycenter of clean samples, sample
451
+ with random noise and adversarial sample are shown. As we
452
+ see, for the clean case the barycenter is very similar to that of
453
+ the original image. In the second column where random noise
454
+ is added, the barycenter reduces the noise.
455
+ Similar effect
456
+ is also seen for the case where adversarial noise is present.
457
+ This indicates that non-linear interpolation of Barycenter sup-
458
+ presses the adversarial noise.
459
+ (a) Clean
460
+ (b) Random
461
+ (c) Adversarial
462
+ Figure 2: Top: Clean image, noisy image, adversarial image. Bot-
463
+ tom: Barycenter of clean image, noisy image, adversarial image.
464
+ 2.3
465
+ Training
466
+ Let a model be given by fθ, the barycenter of clean samples
467
+ be denoted by x and its labels as y. We then optimize the
468
+ following loss
469
+ arg min
470
+ θ
471
+ 1
472
+ n
473
+ n
474
+
475
+ i=1
476
+ LCE(fθ(xi), yi)
477
+ where LCE is the cross-entropy loss. We would like to em-
478
+ phasize that we do not perform adversarial training. Instead
479
+ we use an adversarially pretrained model. Thus, fθ is an ad-
480
+ versarial robust model and our training further enhances the
481
+ robustness. We also note that this optimization falls under
482
+ DRO as the samples used are barycenters which belong to the
483
+ distribution Q.
484
+ 2.4
485
+ Theoretical analysis
486
+ We first present a convergence analysis of Eq 6.
487
+ Theorem 1.
488
+ Let τ1τ2(λmax(∇2) + 3)
489
+ <
490
+ 1, where
491
+ λmax(∇2) denotes the largest eigenvalue of discrete Lapla-
492
+ cian operator ∇2 = DD⊤, where D is the matrix repre-
493
+ senting div operator. Then, the iterations Mt
494
+ i, µ′
495
+ i
496
+ t
497
+ i, µt, rt
498
+ i, λt
499
+ converge to the saddle point solution of the Lagrangian
500
+ M∗
501
+ i , µ∗
502
+ i , µ∗, r∗
503
+ i , λ∗.
504
+ Proof: Let u = {M1, M2, µ2, µ2, µ, r}. Then, we write
505
+ Eq 6 as
506
+ L(u, λ) = G(u) + ⟨λ, ˜Kb⟩
507
+ where λ
508
+ =
509
+ [λ1; λ2],
510
+ K
511
+ =
512
+ [D, I, −I, −I],
513
+ ˜K
514
+ =
515
+ [K, 0; 0, K], b = [b1; b2], b1 = [vec(M1); µ′
516
+ 1; µ; r1]; b2 =
517
+ [vec(M2); µ′
518
+ 2; µ; r2].
519
+ The function G
520
+ =
521
+ ∥M1∥2,1 +
522
+ ∥M2∥2,1 + α(∥r1∥1 + ∥r2∥1) +
523
+ 1
524
+ 2ρ(∥µ′
525
+ 1 − µ1∥2 + ∥µ′
526
+ 2 −
527
+ µ2∥2) + β∥µ∥1 is convex and ˜K is a linear operator. These
528
+ conditions satisfy Theorem 1 of [Chambolle and Pock, 2011].
529
+ If λmax(∇2) is the max eigenvalue of DD⊤, then the max
530
+ eigenvalue of [D, ±I][D, ±I]⊤ is λmax(∇2) + 1. Similarly,
531
+ for KK⊤, it is λmax(∇2) + 3. Since ˜K is obtained from
532
+ K by padding zeros only, ˜K has the same max eigenvalue
533
+ as that of K. Further, since ∥ ˜K ˜K⊤∥2
534
+ 2 ≥ λmax( ˜K ˜K⊤) =
535
+ λmax(∇2) + 3, we can also write the convergence criteria as
536
+ τ1τ2∥ ˜K ˜K⊤∥2
537
+ 2 < 1.
538
+ Since we solve for the Lagrangian dual function, we anal-
539
+ yse the primal dual gap which is given as [Jacobs et al., 2019]
540
+ G(u, λ) =
541
+ sup
542
+ ∥λ′−λ0∥≤R1
543
+ L(u, λ′) −
544
+ inf
545
+ ∥u′−u0∥≤R2L(u′, λ)
546
+ Theorem 2.
547
+ Suppose the step sizes τ1 and τ2 satisfy
548
+ τ1τ2∥ ˜K ˜K⊤∥2
549
+ 2 < 1. Let uN =
550
+ 1
551
+ N
552
+ �N
553
+ n=1 un and λN =
554
+ 1
555
+ N
556
+ �N
557
+ n=1 λn, where un and λn are sequences generated from
558
+ Eqns 7 - 11. Then after N iterations, we have,
559
+ G(u, λ) ≤ sup
560
+ u,λ
561
+ 1
562
+ 2N
563
+
564
+ ∥u − u0∥2
565
+ τ1
566
+ + ∥λ − λ0∥2
567
+ τ2
568
+
569
+ This rate is similar to convergence rates in gradient descent
570
+ and shows that the gap converges with rate O(1/N). For
571
+ brevity, we omit the proof and it can be derived as an exten-
572
+ sion of Theorem 1 [Chambolle and Pock, 2011].
573
+
574
+ 2.5
575
+ Mutual Information
576
+ In order to understand the underlying reason behind the per-
577
+ formance of our method, we provide more insights using
578
+ mutual information (MI). We first note that the MI between
579
+ two random variables is given by I(X, y) = H(P(y)) −
580
+ E
581
+ P (x)[H(P(y|X))]. In our case, we take the random variables
582
+ as model parameters θ and softmax output y. Then, given a
583
+ sample x and dataset D,
584
+ I(θ, y|D, x) = H(p(y|x, D)) −
585
+ E
586
+ p(θ|D)
587
+ H(p(y|x, θ)) (12)
588
+ Eq 12 measures the information shared between θ and y.
589
+ A tractable way of computing I(θ, y|D, x) is given in [Smith
590
+ and Gal, 2018], [Houlsby et al., 2011].
591
+ I(θ, y|D, x) = 1
592
+ C
593
+ C
594
+
595
+ j=1
596
+ 1
597
+ n
598
+ n
599
+
600
+ i=1
601
+ (pij − ˆp)2
602
+ (13)
603
+ where, ˆp ∈ [0, 1]C is computed as the mean of all softmax
604
+ probabilities, C is the number of classes, pi ∈ [0, 1]C, pij ∈
605
+ [0, 1] denotes the softmax probability for a particular class j.
606
+ A higher I indicates that knowing θ (or y) gives a higher
607
+ information about y (or θ). In other words, the model will
608
+ perform better if the mutual information is high.
609
+ In addition, we also compute MI between the predictions
610
+ for the following two cases - (i) clean test set and adversarial
611
+ test set, and (ii) barycenter of clean test set and barycenter of
612
+ adversarial test set using [Ji et al., 2019]. Given a model f
613
+ paramterised by θ, clean sample xi and its adversarial coun-
614
+ terpart x′
615
+ i, the joint probability distribution between natural
616
+ and adversarial samples is given by the following C × C ma-
617
+ trix,
618
+ I(f(xi, θ), f(x′, θ)) =
619
+ C
620
+
621
+ y=1
622
+ C
623
+
624
+ y′=1
625
+ Pyy′ ln Pyy′
626
+ PyPy′
627
+ (14)
628
+ where, Pyy′ is given as,
629
+ Pyy′ = 1
630
+ n
631
+ n
632
+
633
+ i=1
634
+ f(xi, θ)f(x′
635
+ i, θ)⊤
636
+ (15)
637
+ and the marginals Py, Py′ are obtained by row and column
638
+ sum of Pyy′. A higher value of I(., .) indicates that know-
639
+ ing about clean samples gives a higher amount of information
640
+ about the adversarial samples.
641
+ 3
642
+ Experiments
643
+ We present elaborate experimental results on CIFAR-10,
644
+ CIFAR-100 and Tiny ImageNet. We use strong baseline of
645
+ LAS [Jia et al., 2022]. We also show improvements over
646
+ other baselines - LBGAT [Cui et al., 2021], PGD-AT [Madry
647
+ et al., 2017], TRADES [Zhang et al., 2019], RST [Carmon
648
+ et al., 2019]. We compare against several popular adversarial
649
+ training models, MART [Wang et al., 2019b], AWP-A2 [Xu
650
+ et al., 2022], RST-RWT [Yu et al., 2022], TRADESAWP [Wu
651
+ et al., 2020], AWP [Wu et al., 2020], LASAT, LASTRADES,
652
+ LASAWP [Jia et al., 2022]. We also compare with adaptive test
653
+ time defenses HedgeRST [Wu et al., 2021] and TRADESSSL
654
+ [Mao et al., 2021]. In the Tables, we use “+B” to indicate the
655
+ results obtained using our approach.
656
+ 3.1
657
+ Implementation details
658
+ In case of CIFAR10 and CIFAR100, WideResNet34-10 is
659
+ used and for Tiny ImageNet PreActResnet18 is used. Ad-
660
+ ditionally, we evaluate on CIFAR-10 with WideResNet28-
661
+ 10, WideResNet32-10, WideResNet70-16 and on CIFAR-
662
+ 100 with WideResNet34-20. We use these models for a fair
663
+ comparison with existing works as these models are widely
664
+ used for adversarial defense evaluation. We evaluate against
665
+ different attacks namely FGSM, PGD-10, PGD-20, CW, and
666
+ AA using l∞ attack with ϵ = 8/255. Our evaluation proto-
667
+ cols are similar to the protocols given in [Zhang et al., 2019],
668
+ [Jia et al., 2022]. We would like to emphasize that we use the
669
+ checkpoints from the baseline models and perform a single
670
+ epoch training using clean barycenters. Upon increasing the
671
+ number of epochs, the clean accuracy improves, however, the
672
+ adversarial accuracy becomes comparable to that of baseline
673
+ and further increasing epochs leads to subsequent drop in ac-
674
+ curacy against adversarial samples. We use SGD optimizer
675
+ with a learning rate of 1e-4, momentum = 0.9 without any
676
+ weight decay.
677
+ In order to compute the barycenter, we set ρ = 5e−1, τ1 =
678
+ 1e − 1, τ2 = α = β = 1 and iterations is set to 200. While
679
+ one can also attack the barycenter, we give experiments for
680
+ the case where the clean image is attacked. This is because
681
+ the barycenter itself lies at an ϵ which is greater than attacker’
682
+ budget. Thus attacking barycenter has little incentive as in
683
+ that case the attacked image will lie at an ϵ outside the given
684
+ ϵ = 8/255 for the l∞ attack.
685
+ 3.2
686
+ Comparison on CIFAR-10
687
+ In Table 1, we observe that clean performance is better
688
+ for the models trained with barycenters - TRADESAWP+B,
689
+ LBGAT+B, LASTRADES+B and RST+B. Amongst WRN-
690
+ 28-10 models, RST has the best clean performance and our
691
+ method enhances it by 1%. In PGD-10, there is a rise of
692
+ 2.57%. In case of AA, there is a boost of 6.49%.
693
+ In case of WRN-34-10, LASAT+B shows a huge boost
694
+ of 10% under AA. Further, LASAWP+B shows the best per-
695
+ formance under PGD-10, PGD-20 and CW attack amongst
696
+ WRN-34-10 models. Under AA it shows an improvement of
697
+ 7.71%.
698
+ Comparison with Adversarial Purification models Our
699
+ RST+B model outperforms Hedge∗
700
+ RST under all the cases.
701
+ Against AA, our approach gives 3.1% higher accuracy
702
+ compared to Hedge∗
703
+ RST.
704
+ We also see that compared to
705
+ TRADESSSL, TRADESAWP has a better performance.
706
+ 3.3
707
+ Comparison on CIFAR-100
708
+ In Table 2, we observe that our method gives a significant
709
+ boost under all the cases. In case of strong baseline LASAWP,
710
+ our method increases the performance by 0.85% under clean
711
+ accuracy. For PGD-20, there is a rise of 0.91%. In case of
712
+ CW, there is an increase of 18.35%. In other models such as
713
+ LBGAT, we see a rise of 5.4% in clean accuracy.
714
+ 3.4
715
+ Comparison with Curriculum based AT
716
+ In Table 3, we compare against curriculum based AT meth-
717
+ ods like CAT [Cai et al., 2018], FAT [Zhang et al., 2020] and
718
+
719
+ Table 1: CIFAR-10.
720
+ ∗ indicates that the model uses WRN-28-10.
721
+ Bold font is used to indicate the best performance amongst WRN-
722
+ 34-10 and Red color font is used to indicate the best performance
723
+ amongst WRN-28-10.
724
+ Method
725
+ Clean
726
+ PGD10
727
+ PGD20
728
+ CW
729
+ AA
730
+ Adversarial Training
731
+ PGD-AT
732
+ 85.17
733
+ 56.07
734
+ 55.08
735
+ 53.91
736
+ 51.69
737
+ TRADES
738
+ 85.72
739
+ 56.75
740
+ 56.10
741
+ 53.87
742
+ 53.40
743
+ MART
744
+ 84.17
745
+ 58.98
746
+ 58.56
747
+ 54.58
748
+ 51.10
749
+ AWP-A2
750
+ 87.54
751
+ -
752
+ 59.50
753
+ 57.42
754
+ 54.86
755
+ RST-RWT∗
756
+ 88.87
757
+ -
758
+ 64.11
759
+ 62.03
760
+ 60.36
761
+ Adversarial Purification
762
+ TRADESSSL
763
+ 82.12
764
+ -
765
+ -
766
+ -
767
+ 60.67
768
+ Hedge∗
769
+ RST
770
+ 88.64
771
+ -
772
+ -
773
+ 73.89
774
+ 63.10
775
+ Adversarial and Barycentric Training
776
+ TRADESAWP
777
+ 85.36
778
+ 59.58
779
+ 59.25
780
+ 57.07
781
+ 56.17
782
+ +B
783
+ 87.32
784
+ 62.60
785
+ 62.32
786
+ 75.85
787
+ 65.32
788
+ LBGAT
789
+ 88.22
790
+ 56.25
791
+ 54.60
792
+ 54.29
793
+ 52.23
794
+ +B
795
+ 88.38
796
+ 59.28
797
+ 58.43
798
+ 74.61
799
+ 61.22
800
+ LASAT
801
+ 86.23
802
+ 57.11
803
+ 56.41
804
+ 55.54
805
+ 53.58
806
+ +B
807
+ 86.21
808
+ 61.08
809
+ 60.64
810
+ 74.09
811
+ 63.59
812
+ LASTRADES
813
+ 85.24
814
+ 57.66
815
+ 57.07
816
+ 55.45
817
+ 54.15
818
+ +B
819
+ 86.15
820
+ 60.32
821
+ 60.03
822
+ 73.75
823
+ 63.43
824
+ LASAWP
825
+ 87.74
826
+ 61.09
827
+ 60.16
828
+ 58.22
829
+ 55.52
830
+ +B
831
+ 87.45
832
+ 63.66
833
+ 61.16
834
+ 74.81
835
+ 63.23
836
+ RST∗
837
+ 89.69
838
+ 63.48
839
+ 62.51
840
+ 61.06
841
+ 59.71
842
+ +B∗
843
+ 90.68
844
+ 65.12
845
+ 64.38
846
+ 77.08
847
+ 66.20
848
+ DART [Wang et al., 2019a]. Under FGSM, PGD-20 and CW,
849
+ our model shows a huge improvement. In case of clean sam-
850
+ ples, we see that the accuracy of FAT+B compared to FAT is
851
+ less. This may be due to the fact that FAT employs curricu-
852
+ lum learning in the training whereas our method does not use
853
+ curriculum learning.
854
+ 3.5
855
+ Comparison on Tiny ImageNet
856
+ We present the results in Table 4. In comparison to baselines,
857
+ our method shows significant improvement in all cases. For
858
+ LASAWP, our method improves the performance under clean
859
+ samples by 1.65%. In case of PGD-50, our method shows
860
+ a rise of 1.28%, and in case of CW attack, our method al-
861
+ most doubles the accuracy. Under AA, LASTRADES observes
862
+ a maximum performance rise by 11.51%.
863
+ 3.6
864
+ Analysis using Deeper and Wider Models
865
+ We use WRN-70-16 and WRN-34-20 to analyse the effect
866
+ when the models get deeper and wider. In particular, for clean
867
+ samples, we can observe that the deeper and wider models
868
+ give a better boost. In CIFAR-10, WRN-70-16 gives 88.87%
869
+ for clean samples which is 3.21% better than LASAWP model’
870
+ 85.66%. In contrast, for WRN-34-10, our method gives accu-
871
+ racy similar to that of LASAWP. In CIFAR-100, our method
872
+ boosts the performance by 8.34% under AA. In other cases
873
+ also we see that the barycenters improve the performance by
874
+ a significant margin.
875
+ Table 2: CIFAR-100 WRN-34-10.
876
+ Method
877
+ Clean
878
+ PGD-10
879
+ PGD-20
880
+ CW
881
+ PGD-AT
882
+ 60.89
883
+ 32.19
884
+ 31.69
885
+ 30.10
886
+ TRADES
887
+ 58.61
888
+ 29.20
889
+ 28.66
890
+ 27.05
891
+ TRADESAWP
892
+ 60.17
893
+ 33.81
894
+ 33.6
895
+ 57.07
896
+ +B
897
+ 63.67
898
+ 36.34
899
+ 36.15
900
+ 51.92
901
+ LBGAT
902
+ 60.64
903
+ 35.13
904
+ 34.53
905
+ 30.65
906
+ +B
907
+ 66.04
908
+ 36.29
909
+ 36.01
910
+ 52.92
911
+ LASAT
912
+ 61.8
913
+ 33.27
914
+ 32.83
915
+ 31.12
916
+ +B
917
+ 62.45
918
+ 36.60
919
+ 36.17
920
+ 49.60
921
+ LASTRADES
922
+ 60.62
923
+ 32.82
924
+ 32.51
925
+ 29.51
926
+ +B
927
+ 62.58
928
+ 35.22
929
+ 34.96
930
+ 50.99
931
+ LASAWP
932
+ 64.89
933
+ 37.11
934
+ 36.36
935
+ 33.92
936
+ +B
937
+ 65.50
938
+ 37.55
939
+ 37.27
940
+ 52.27
941
+ Table 3: CIFAR-10 WRN-32-10.
942
+ Method
943
+ Clean
944
+ FGSM
945
+ PGD-20
946
+ CW
947
+ CAT
948
+ 77.43
949
+ 57.17
950
+ 46.06
951
+ 42.48
952
+ DART
953
+ 85.03
954
+ 63.53
955
+ 48.70
956
+ 47.27
957
+ FAT
958
+ 89.34
959
+ 65.52
960
+ 46.13
961
+ 46.82
962
+ +B
963
+ 84.59
964
+ 69.98
965
+ 57.02
966
+ 71.36
967
+ 3.7
968
+ TSNE
969
+ In Figure 3, we show the tsne plots for MNIST testset with
970
+ classes 0 and 1. Here, we use a weak MNIST model which
971
+ has only two dimensions before the classification layer. We
972
+ deliberately chose a weak model so that we can easily show
973
+ the effect in low dimensions. Though higher dmensions could
974
+ be taken, the effect cannot be easily seen due to a highly non-
975
+ linear transformation from high to low dimension of tsne. We
976
+ can see that the two clusters yellow and purple are well sepa-
977
+ rated for clean and barycenters of clean images. In case of ad-
978
+ versarial samples, the points overlap on each other. However,
979
+ when we take barycenter of adversarial samples, we again
980
+ see that the clusters are well separated, similar to the case of
981
+ clean images. Thus, it is evident that the barycenter nullifies
982
+ the effect of adversarial noise.
983
+ (a) Clean
984
+ (b) Barycenter
985
+ (c) Attacked
986
+ (d) Adv.+Bary.
987
+ Figure 3: Left to right: Plot of 2D features of Clean image, Barycen-
988
+ ter of clean image, Attacked image, Barycenter of adversarial image.
989
+ MNIST model obtains 51% accuracy and has only 2D feature vector
990
+ before the classification layer.
991
+ 3.8
992
+ Mutual Information
993
+ In Table 6, we present the study of mutual information. We
994
+ use LASAT and LASTRADES on CIFAR-10. The MI is com-
995
+ puted using Eq 12 and Eq 14. Here we note that the MI for
996
+ LASAT+B is more for training set compared to that of LASAT.
997
+
998
+ Table 4: Tiny ImageNet PreActResNet18.
999
+ Method
1000
+ Clean
1001
+ PGD-50
1002
+ CW
1003
+ AA
1004
+ LASAT
1005
+ 44.86
1006
+ 22.16
1007
+ 18.54
1008
+ 16.74
1009
+ +B
1010
+ 45.12
1011
+ 24.54
1012
+ 37.14
1013
+ 27.78
1014
+ LASTRADES
1015
+ 41.38
1016
+ 18.36
1017
+ 14.50
1018
+ 14.08
1019
+ +B
1020
+ 43.07
1021
+ 19.25
1022
+ 35.13
1023
+ 25.59
1024
+ LASAWP
1025
+ 45.26
1026
+ 23.42
1027
+ 19.88
1028
+ 18.42
1029
+ +B
1030
+ 46.91
1031
+ 24.70
1032
+ 37.93
1033
+ 27.00
1034
+ Table 5: CIFAR-10 (C-10) WRN-70-16 and CIFAR-100 (C-100)
1035
+ WRN-34-20.
1036
+ Dataset
1037
+ Method
1038
+ Clean
1039
+ FGSM
1040
+ CW
1041
+ AA
1042
+ C-10
1043
+ LASAWP
1044
+ 85.66
1045
+ 70.25
1046
+ 58.44
1047
+ 57.61
1048
+ +B
1049
+ 88.87
1050
+ 74.04
1051
+ 75.40
1052
+ 62.54
1053
+ C-100
1054
+ LBGAT
1055
+ 62.55
1056
+ 43.16
1057
+ 31.72
1058
+ 31.92
1059
+ +B
1060
+ 66.86
1061
+ 50.92
1062
+ 54.19
1063
+ 40.26
1064
+ This indicates that the information available about the labels
1065
+ given the model parameters is high and in turn gives a better
1066
+ clean accuracy. In case of adversarial samples too, we see that
1067
+ the MI is higher for our case. This indicates that the model
1068
+ has better prediction for these samples. Further, the measure
1069
+ for test set is smaller compared to training set which is ex-
1070
+ pected as the model carries more information about train set
1071
+ compared to test set.
1072
+ Table 6: CIFAR-10 WRN-34-10.
1073
+ Method
1074
+ Train
1075
+ Test
1076
+ FGSM
1077
+ CW
1078
+ LASAT
1079
+ 0.029
1080
+ 0.026
1081
+ 0.020
1082
+ 0.019
1083
+ +B
1084
+ 0.034
1085
+ 0.029
1086
+ 0.023
1087
+ 0.022
1088
+ LASTRADES
1089
+ 0.048
1090
+ 0.040
1091
+ 0.033
1092
+ 0.032
1093
+ +B
1094
+ 0.054
1095
+ 0.045
1096
+ 0.037
1097
+ 0.036
1098
+ In Table 7, we present the results obtained using Eq 14. We
1099
+ observe that for the model trained with barycenter, the MI is
1100
+ higher between the barycenter of clean and adversarial sam-
1101
+ ples. Thus, the model does better on barycenter of adversarial
1102
+ samples compared to baseline LASAT and TRADESAWP. This
1103
+ is consistent across FGSM, PGD-10 and CW attacks.
1104
+ 3.9
1105
+ Sensitivity to Barycenter Parameters
1106
+ In Figure 4, we demonstrate the sensitivity to different pa-
1107
+ rameters involved in the computation of barycenter. In the top
1108
+ row, we fix the number of iterations to 200 and τ1 = 1e − 1.
1109
+ Here we observe that increasing τ2 makes the barycenter
1110
+ brighter. In the second row, increasing τ1 makes the barycen-
1111
+ ter darker. Decreasing iterations has a similar effect in the last
1112
+ row. We see that unless there is a change of order of magni-
1113
+ tude, the appearance does not substantially change. Thus, our
1114
+ proposed Beckman barycenter is robust with respect to the
1115
+ parameter settings.
1116
+ 4
1117
+ Conclusion
1118
+ In this work we introduce Beckman barycenter analogous to
1119
+ Wasserstein barycenter. We use the Beckman OT formula-
1120
+ Table 7: Mutial Information for CIFAR-10 WRN-34-10.
1121
+ Method
1122
+ FGSM
1123
+ PGD-10
1124
+ CW
1125
+ LASAT
1126
+ 0.218
1127
+ 0.198
1128
+ 0.203
1129
+ +B
1130
+ 0.275
1131
+ 0.241
1132
+ 0.264
1133
+ LASTRADES
1134
+ 0.576
1135
+ 0.554
1136
+ 0.563
1137
+ +B
1138
+ 0.629
1139
+ 0.572
1140
+ 0.618
1141
+ Figure 4: Top row: Blue boundary represent the given image.
1142
+ Barycenter for iterations = 200, τ1 = 1e − 1, τ2 = 1, 1e-1, 1e-2,
1143
+ 1e-3. Second: barycenter for iterations = 200, τ1=1, 1e-1, 1e-2, 1e-
1144
+ 3, τ2 = 1. Third: iterations = 200, 100, 50, 10, τ1=1e-1, τ2=1. The
1145
+ red boundary indicates the images obtained from default settings of
1146
+ the paramater which are used for all experiments.
1147
+ tion and analytically solve for the barycenter. Defining the
1148
+ baycenter using Beckman OT also has the advantage that the
1149
+ computational tools to obtain barycenter are well known and
1150
+ efficient. This overcomes the complexity in solving Wasser-
1151
+ stein barycenters. Further, we show that barycenter can be
1152
+ used for enhancing the performance of adversarially trained
1153
+ models. Our training is very efficient as we only need a sin-
1154
+ gle epoch. We theoretically show that our barycenters can
1155
+ help in defending against attacks. We perform rigorous qual-
1156
+ itative and quantitaive analysis to show the effectivenes of
1157
+ barycenter. Experimental analysis on CIFAR-10, CIFAR-100
1158
+ and Tiny ImageNet demonstrates state-of-art results against
1159
+ wide variety of attacks.
1160
+ References
1161
+ [Agueh and Carlier, 2011] Martial Agueh and Guillaume
1162
+ Carlier. Barycenters in the wasserstein space. SIAM Jour-
1163
+ nal on Mathematical Analysis, 43(2):904–924, 2011.
1164
+ [Athalye et al., 2018] Anish Athalye, Logan Engstrom, An-
1165
+ drew Ilyas, and Kevin Kwok. Synthesizing robust adver-
1166
+ sarial examples. In ICML, pages 284–293. PMLR, 2018.
1167
+ [Bai et al., 2021] Tao Bai, Jinqi Luo, Jun Zhao, Bihan Wen,
1168
+ and Qian Wang. Recent advances in adversarial training
1169
+ for adversarial robustness. In IJCAI, 2021.
1170
+ [Beckmann, 1952] Martin Beckmann. A continuous model
1171
+ of transportation. Econometrica: Journal of the Econo-
1172
+ metric Society, pages 643–660, 1952.
1173
+
1174
+ [Ben-Tal et al., 2009] Aharon Ben-Tal, Laurent El Ghaoui,
1175
+ and Arkadi Nemirovski. Robust optimization, volume 28.
1176
+ Princeton university press, 2009.
1177
+ [Cai et al., 2018] Qi-Zhi Cai, Min Du, Chang Liu, and Dawn
1178
+ Song.
1179
+ Curriculum adversarial training.
1180
+ arXiv preprint
1181
+ arXiv:1805.04807, 2018.
1182
+ [Carlini and Wagner, 2017] Nicholas
1183
+ Carlini
1184
+ and
1185
+ David
1186
+ Wagner.
1187
+ Towards evaluating the robustness of neural
1188
+ networks. In Symposium on security and privacy, pages
1189
+ 39–57, 2017.
1190
+ [Carmon et al., 2019] Yair Carmon,
1191
+ Aditi Raghunathan,
1192
+ Ludwig Schmidt, John C Duchi, and Percy S Liang. Un-
1193
+ labeled data improves adversarial robustness.
1194
+ NeurIPS,
1195
+ 2019.
1196
+ [Chambolle and Pock, 2011] Antonin
1197
+ Chambolle
1198
+ and
1199
+ Thomas Pock.
1200
+ A first-order primal-dual algorithm for
1201
+ convex problems with applications to imaging. Journal of
1202
+ mathematical imaging and vision, 40(1):120–145, 2011.
1203
+ [Cheng et al., 2022] Minhao Cheng, Qi Lei, Pin-Yu Chen,
1204
+ Inderjit Dhillon, and Cho-Jui Hsieh. Cat: Customized ad-
1205
+ versarial training for improved robustness. In IJCAI, 2022.
1206
+ [Croce and Hein, 2020] Francesco Croce and Matthias Hein.
1207
+ Reliable evaluation of adversarial robustness with an en-
1208
+ semble of diverse parameter-free attacks. In ICML, pages
1209
+ 2206–2216. PMLR, 2020.
1210
+ [Cui et al., 2021] Jiequan Cui, Shu Liu, Liwei Wang, and Ji-
1211
+ aya Jia. Learnable boundary guided adversarial training.
1212
+ In ICCV, pages 15721–15730, 2021.
1213
+ [Cuturi and Doucet, 2014] Marco
1214
+ Cuturi
1215
+ and
1216
+ Arnaud
1217
+ Doucet. Fast computation of wasserstein barycenters. In
1218
+ ICML, pages 685–693. PMLR, 2014.
1219
+ [Cuturi and Peyr´e, 2016] Marco Cuturi and Gabriel Peyr´e. A
1220
+ smoothed dual approach for variational wasserstein prob-
1221
+ lems. SIAM Journal on Imaging Sciences, 9(1):320–343,
1222
+ 2016.
1223
+ [Cuturi, 2013] Marco Cuturi.
1224
+ Sinkhorn distances: Light-
1225
+ speed computation of optimal transport.
1226
+ NeurIPS,
1227
+ 26:2292–2300, 2013.
1228
+ [Duchi et al., 2021] John C Duchi, Peter W Glynn, and
1229
+ Hongseok Namkoong. Statistics of robust optimization:
1230
+ A generalized empirical likelihood approach. Mathemat-
1231
+ ics of Operations Research, 46(3):946–969, 2021.
1232
+ [Fan et al., 2022] Jiaojiao Fan, Isabel Haasler, Johan Karls-
1233
+ son, and Yongxin Chen. On the complexity of the optimal
1234
+ transport problem with graph-structured cost. In AISTATS,
1235
+ pages 9147–9165. PMLR, 2022.
1236
+ [Goldstein and Osher, 2009] Tom Goldstein and Stanley Os-
1237
+ her. The split bregman method for l1-regularized prob-
1238
+ lems. SIAM journal on imaging sciences, 2(2):323–343,
1239
+ 2009.
1240
+ [Goodfellow et al., 2014] Ian
1241
+ J
1242
+ Goodfellow,
1243
+ Jonathon
1244
+ Shlens, and Christian Szegedy. Explaining and harnessing
1245
+ adversarial examples.
1246
+ arXiv preprint arXiv:1412.6572,
1247
+ 2014.
1248
+ [Houlsby et al., 2011] Neil Houlsby, Ferenc Husz´ar, Zoubin
1249
+ Ghahramani, and M´at´e Lengyel. Bayesian active learning
1250
+ for classification and preference learning. arXiv preprint
1251
+ arXiv:1112.5745, 2011.
1252
+ [Jacobs et al., 2019] Matt Jacobs, Flavien L´eger, Wuchen Li,
1253
+ and Stanley Osher. Solving large-scale optimization prob-
1254
+ lems with a convergence rate independent of grid size.
1255
+ SIAM Journal on Numerical Analysis, 57(3):1100–1123,
1256
+ 2019.
1257
+ [Ji et al., 2019] Xu Ji,
1258
+ Joao F Henriques,
1259
+ and Andrea
1260
+ Vedaldi. Invariant information clustering for unsupervised
1261
+ image classification and segmentation. In Proceedings of
1262
+ the IEEE/CVF International Conference on Computer Vi-
1263
+ sion, pages 9865–9874, 2019.
1264
+ [Jia et al., 2022] Xiaojun Jia, Yong Zhang, Baoyuan Wu,
1265
+ Ke Ma, Jue Wang, and Xiaochun Cao. Las-at: Adversar-
1266
+ ial training with learnable attack strategy. In CVPR, pages
1267
+ 13398–13408, 2022.
1268
+ [Kannan et al., 2018] Harini Kannan, Alexey Kurakin, and
1269
+ Ian Goodfellow. Adversarial logit pairing. NIPS, 2018.
1270
+ [Kantorovich, 1942] L Kantorovich.
1271
+ On the transfer of
1272
+ masses (in russian).
1273
+ In Doklady Akademii Nauk, vol-
1274
+ ume 37, pages 227–229, 1942.
1275
+ [Kurakin et al., 2016] Alexey Kurakin, Ian Goodfellow, and
1276
+ Samy Bengio.
1277
+ Adversarial machine learning at scale.
1278
+ arXiv preprint arXiv:1611.01236, 2016.
1279
+ [Kwon et al., 2020] Yongchan
1280
+ Kwon,
1281
+ Wonyoung
1282
+ Kim,
1283
+ Joong-Ho Won, and Myunghee Cho Paik.
1284
+ Principled
1285
+ learning method for wasserstein distributionally robust
1286
+ optimization with local perturbations.
1287
+ In International
1288
+ Conference on Machine Learning, pages 5567–5576.
1289
+ PMLR, 2020.
1290
+ [Lacombe et al., 2021] Julien Lacombe, Julie Digne, Nico-
1291
+ las
1292
+ Courty,
1293
+ and
1294
+ Nicolas
1295
+ Bonneel.
1296
+ Learning
1297
+ to
1298
+ generate
1299
+ wasserstein
1300
+ barycenters.
1301
+ arXiv
1302
+ preprint
1303
+ arXiv:2102.12178, 2021.
1304
+ [Lee et al., 2020] John Lee,
1305
+ Nicholas P Bertrand,
1306
+ and
1307
+ Christopher J Rozell. Unbalanced optimal transport reg-
1308
+ ularization for imaging problems. IEEE Transactions on
1309
+ Computational Imaging, 6:1219–1232, 2020.
1310
+ [Li et al., 2018] Wuchen Li, Ernest K Ryu, Stanley Osher,
1311
+ Wotao Yin, and Wilfrid Gangbo. A parallel method for
1312
+ earth mover’s distance. Journal of Scientific Computing,
1313
+ 75(1):182–197, 2018.
1314
+ [Li et al., 2021] Jincheng Li, Jiezhang Cao, Shuhai Zhang,
1315
+ Yanwu Xu, Jian Chen, and Mingkui Tan. Internal wasser-
1316
+ stein distance for adversarial attack and defense.
1317
+ arXiv
1318
+ preprint arXiv:2103.07598, 2021.
1319
+ [Madry et al., 2017] Aleksander
1320
+ Madry,
1321
+ Aleksandar
1322
+ Makelov,
1323
+ Ludwig
1324
+ Schmidt,
1325
+ Dimitris
1326
+ Tsipras,
1327
+ and
1328
+ Adrian Vladu.
1329
+ Towards deep learning models resistant
1330
+ to adversarial attacks. arXiv preprint arXiv:1706.06083,
1331
+ 2017.
1332
+ [Mao et al., 2021] Chengzhi Mao, Mia Chiquier, Hao Wang,
1333
+ Junfeng Yang, and Carl Vondrick. Adversarial attacks are
1334
+
1335
+ reversible with natural supervision. In ICCV, pages 661–
1336
+ 671, 2021.
1337
+ [Monge, 1781] Gaspard Monge. Memoir on the theory of
1338
+ cuttings and embankments.
1339
+ Histoire de l’Acad’e mie
1340
+ Royale des Sciences de Paris, 1781.
1341
+ [Moosavi-Dezfooli et al., 2016] Seyed-Mohsen
1342
+ Moosavi-
1343
+ Dezfooli, Alhussein Fawzi, and Pascal Frossard. Deep-
1344
+ fool: a simple and accurate method to fool deep neural
1345
+ networks. In CVPR, pages 2574–2582, 2016.
1346
+ [Nie et al., 2022] Weili Nie, Brandon Guo, Yujia Huang,
1347
+ Chaowei Xiao, Arash Vahdat, and Anima Anandkumar.
1348
+ Diffusion models for adversarial purification. ICML, 2022.
1349
+ [Papernot et al., 2016] Nicolas Papernot, Patrick McDaniel,
1350
+ Somesh Jha, Matt Fredrikson, Z Berkay Celik, and Anan-
1351
+ thram Swami. The limitations of deep learning in adver-
1352
+ sarial settings. In European symposium on security and
1353
+ privacy, pages 372–387, 2016.
1354
+ [Rebuffi et al., 2021] Sylvestre-Alvise Rebuffi, Sven Gowal,
1355
+ Dan A Calian, Florian Stimberg, Olivia Wiles, and Timo-
1356
+ thy Mann. Fixing data augmentation to improve adversar-
1357
+ ial robustness. arXiv preprint arXiv:2103.01946, 2021.
1358
+ [Scarf, 1957] Herbert E Scarf. A min-max solution of an in-
1359
+ ventory problem. Rand Corporation Santa Monica, 1957.
1360
+ [Shi et al., 2021] Changhao Shi, Chester Holtz, and Gal
1361
+ Mishne.
1362
+ Online adversarial purification based on self-
1363
+ supervision. ICLR, 2021.
1364
+ [Smith and Gal, 2018] Lewis Smith and Yarin Gal. Under-
1365
+ standing measures of uncertainty for adversarial example
1366
+ detection. arXiv preprint arXiv:1803.08533, 2018.
1367
+ [Staib and Jegelka, 2017] Matthew
1368
+ Staib
1369
+ and
1370
+ Stefanie
1371
+ Jegelka.
1372
+ Distributionally robust deep learning as a
1373
+ generalization of adversarial training. In NIPS workshop
1374
+ on Machine Learning and Computer Security, volume 3,
1375
+ page 4, 2017.
1376
+ [Subramanyam and Raj, 2022] AV Subramanyam and Abhi-
1377
+ gyan Raj. Barycentric defense. In ICIP, pages 2276–2280,
1378
+ 2022.
1379
+ [Szegedy et al., 2013] Christian
1380
+ Szegedy,
1381
+ Wojciech
1382
+ Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian
1383
+ Goodfellow, and Rob Fergus.
1384
+ Intriguing properties of
1385
+ neural networks. arXiv preprint arXiv:1312.6199, 2013.
1386
+ [Theagarajan et al., 2019] Rajkumar
1387
+ Theagarajan,
1388
+ Ming
1389
+ Chen, Bir Bhanu, and Jing Zhang. Shieldnets: Defending
1390
+ against adversarial attacks using probabilistic adversarial
1391
+ robustness. In CVPR, pages 6988–6996, 2019.
1392
+ [Wang et al., 2019a] Yisen Wang, Xingjun Ma, James Bai-
1393
+ ley, Jinfeng Yi, Bowen Zhou, and Quanquan Gu. On the
1394
+ convergence and robustness of adversarial training. In In-
1395
+ ternational Conference on Machine Learning, 2019.
1396
+ [Wang et al., 2019b] Yisen Wang, Difan Zou, Jinfeng Yi,
1397
+ James Bailey, Xingjun Ma, and Quanquan Gu. Improv-
1398
+ ing adversarial robustness requires revisiting misclassified
1399
+ examples. In International Conference on Learning Rep-
1400
+ resentations, 2019.
1401
+ [Wong et al., 2019] Eric Wong, Frank Schmidt, and Zico
1402
+ Kolter.
1403
+ Wasserstein adversarial examples via projected
1404
+ sinkhorn iterations. In ICML, pages 6808–6817. PMLR,
1405
+ 2019.
1406
+ [Wong et al., 2020] Eric Wong, Leslie Rice, and J Zico
1407
+ Kolter. Fast is better than free: Revisiting adversarial train-
1408
+ ing. ICLR, 2020.
1409
+ [Wu et al., 2020] Dongxian Wu, Shu-Tao Xia, and Yisen
1410
+ Wang. Adversarial weight perturbation helps robust gen-
1411
+ eralization. NeurIPS, 33:2958–2969, 2020.
1412
+ [Wu et al., 2021] Boxi Wu, Heng Pan, Li Shen, Jindong Gu,
1413
+ Shuai Zhao, Zhifeng Li, Deng Cai, Xiaofei He, and Wei
1414
+ Liu.
1415
+ Attacking adversarial attacks as a defense.
1416
+ arXiv
1417
+ preprint arXiv:2106.04938, 2021.
1418
+ [Xie et al., 2019] Cihang Xie, Zhishuai Zhang, Yuyin Zhou,
1419
+ Song Bai, Jianyu Wang, Zhou Ren, and Alan L Yuille. Im-
1420
+ proving transferability of adversarial examples with input
1421
+ diversity. In CVPR, pages 2730–2739, 2019.
1422
+ [Xu et al., 2022] Zhuoer Xu,
1423
+ Guanghui Zhu,
1424
+ Changhua
1425
+ Meng, Shiwen Cui, Zhenzhe Ying, Weiqiang Wang, Ming
1426
+ Gu, and Yihua Huang.
1427
+ A2:
1428
+ Efficient automated at-
1429
+ tacker for boosting adversarial training.
1430
+ arXiv preprint
1431
+ arXiv:2210.03543, 2022.
1432
+ [Yoon et al., 2021] Jongmin Yoon, Sung Ju Hwang, and
1433
+ Juho Lee. Adversarial purification with score-based gen-
1434
+ erative models. In ICML, 2021.
1435
+ [Yu et al., 2022] Chaojian Yu, Bo Han, Mingming Gong,
1436
+ Li Shen, Shiming Ge, Bo Du, and Tongliang Liu.
1437
+ Ro-
1438
+ bust weight perturbation for adversarial training. In IJCAI,
1439
+ 2022.
1440
+ [Zhang et al., 2019] Hongyang Zhang, Yaodong Yu, Jiantao
1441
+ Jiao, Eric Xing, Laurent El Ghaoui, and Michael Jordan.
1442
+ Theoretically principled trade-off between robustness and
1443
+ accuracy. In ICML, pages 7472–7482. PMLR, 2019.
1444
+ [Zhang et al., 2020] Jingfeng Zhang, Xilie Xu, Bo Han,
1445
+ Gang Niu, Lizhen Cui, Masashi Sugiyama, and Mohan
1446
+ Kankanhalli. Attacks which do not kill training make ad-
1447
+ versarial learning stronger. In ICML, pages 11278–11287.
1448
+ PMLR, 2020.
1449
+
CdAzT4oBgHgl3EQfiP0X/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
DtAyT4oBgHgl3EQf4vpJ/content/tmp_files/2301.00791v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
DtAyT4oBgHgl3EQf4vpJ/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
E9A0T4oBgHgl3EQfBP8f/content/2301.01972v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ed779c5f1201ab5dc1f5ef79f5414aea109e65fb685fe3da953681e08cda8b27
3
+ size 218371
E9A0T4oBgHgl3EQfBP8f/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bea68d1fa6fd371b2d805d2c609d95c11b2cccb0572fdff93f0039389033dcd7
3
+ size 248114
E9E5T4oBgHgl3EQfVA-E/content/tmp_files/2301.05548v1.pdf.txt ADDED
@@ -0,0 +1,1854 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Prepared for submission to JINST
2
+ Improving primary-vertex reconstruction with a
3
+ minimum-cost lifted multicut graph partitioning algorithm
4
+ V. Kostyukhin,1 M. Keuper,2,3 I. Ibragimov,1 N. Owtscharenko,1 and M. Cristinziani1
5
+ 1Center for Particle Physics Siegen, Department Physik, Universität Siegen
6
+ 2Visual Computing, Department Elektrotechnik und Informatik, Universität Siegen
7
+ 3Max Planck Institute for Informatics, Saarland Informatics Campus
8
+ Abstract: Particle physics experiments often require the simultaneous reconstruction of many
9
+ interaction vertices. Usually, this problem is solved by ad hoc heuristic algorithms. We propose
10
+ a universal approach to address the multiple vertex finding through a principled formulation as
11
+ a minimum-cost lifted multicut problem.
12
+ The suggested algorithm is tested in a typical LHC
13
+ environment with multiple proton–proton interaction vertices. Reconstruction errors caused by the
14
+ particle detectors complicate the solution and require the introduction of special metrics to assess
15
+ the vertex-finding performance. We demonstrate that the minimum-cost lifted multicut approach
16
+ outperforms heuristic algorithms and works well up to the highest vertex multiplicity expected at
17
+ the LHC.
18
+ Keywords: Vertexing algorithms; Pattern recognition, cluster finding, calibration and fitting
19
+ methods
20
+ arXiv:2301.05548v1 [hep-ex] 13 Jan 2023
21
+
22
+ Contents
23
+ 1
24
+ Introduction
25
+ 1
26
+ 2
27
+ Minimum-cost multicuts and lifted multicut algorithm for cluster finding
28
+ 3
29
+ 3
30
+ Data simulation
31
+ 5
32
+ 4
33
+ Features of simulated data
34
+ 6
35
+ 5
36
+ Edge weights and constraints
37
+ 6
38
+ 6
39
+ Performance metrics
40
+ 10
41
+ 7
42
+ Results
43
+ 12
44
+ 8
45
+ Conclusion
46
+ 19
47
+ A Non-clustered tracks and total reconstructed clusters
48
+ 21
49
+ 1
50
+ Introduction
51
+ In particle physics experiments, many problems require a precise reconstruction of vertices — points
52
+ in 3D space where particle interactions occur. Knowledge of the positions and features of such
53
+ vertices provides valuable information about the underlying physics of these interactions. There are
54
+ numerous examples: 𝐵 physics, heavy-flavour jet identification, primary event vertex reconstruction,
55
+ search for exotic particles as new physics manifestations, etc. Except for a few specifically designed
56
+ detectors (emulsions, Wilson chamber, etc.), rarely used in modern experiments, the vertices are
57
+ not directly detectable. The presence of vertices is usually inferred from 3D traces of charged stable
58
+ particles produced in the interaction. Various tracking detectors measure the curved trajectories of
59
+ these particles (tracks) in space. The trajectories can be extrapolated to a single 3D point, which
60
+ represents the interaction vertex position [1].
61
+ Despite the simplicity of the vertex reconstruction idea, its real-life exploitation encounters
62
+ problems. For example, at the Large Hadron Collider (LHC) at the end of Run 2, a typical recorded
63
+ event consisted of ∼80 primary proton–proton interactions, and numerous produced charged par-
64
+ ticles underwent further interactions leading to additional vertices, distributed in significant 3D
65
+ volumes. The expected number of proton–proton interactions in a single event at the LHC after
66
+ the planned high-luminosity upgrade (HL-LHC) may reach 200–300, resulting in a few thousand
67
+ reconstructed tracks. Therefore, prior to determining the vertex positions, one needs to determine
68
+ how many vertices are present in a given event and assign the reconstructed tracks to these assumed
69
+ vertices. The track measurement uncertainties, which may differ by a factor of 10 for different tracks
70
+ – 1 –
71
+
72
+ and often are comparable with the vertex–vertex distances, cause additional complications. These
73
+ uncertainties make an exact crossing of track pairs in 3D space impossible: even if two charged
74
+ particles are produced in the same interaction point, their reconstructed trajectories will only be
75
+ close to the true vertex position and to each other, up to the corresponding uncertainties.
76
+ The explicit reconstruction of multiple vertices in an event can be addressed in a graph-based
77
+ approach. In fact, all space trajectories of the particles produced in a single vertex should be pairwise
78
+ compatible, i.e. every pair of tracks should be close to each other in some volume around the true
79
+ vertex position. Therefore, a compatibility graph can be constructed where every node represents
80
+ a track. Two nodes are connected by an edge if and only if the distance of the corresponding
81
+ trajectories is very small. In the ideal case, every vertex is represented by a fully connected, isolated
82
+ subgraph in such a graph. In a realistic scenario, track measurement errors shuffle tracks among
83
+ different vertices, resulting in a large number of fake edges in the compatibility graph. Yet, it can
84
+ be tried to split the full graph into non-overlapping clusters by minimising the track–track distances
85
+ for all track pairs in a cluster. The obtained set of isolated clusters should be a good approximation
86
+ of the true vertices.
87
+ The present paper focuses on finding primary proton–proton interaction vertices at the LHC.
88
+ Subsequent decays of the particles produced in the detector volume and their interactions with
89
+ the detector material will not be considered here. To illustrate the primary-vertex reconstruction
90
+ problem, Figure 1 shows two zoomed-in regions of a typical LHC event with several pileup
91
+ interactions. The upper plot presents a region where a pileup interaction vertex is identified, which
92
+ has the largest sum of track transverse momenta.
93
+ The bottom plot presents a region where a
94
+ hard-scatter vertex, i.e. the point of interaction of interest, is identified. In both plots, the true
95
+ positions of interaction vertices are shown, together with charged particle trajectories displaced
96
+ due to reconstruction uncertainties. Several true interaction vertices in these plots do not have
97
+ associated tracks because all emanated particles in this interaction are outside of the tracking
98
+ detector’s sensitive volume, see Section 3 for the details. The overlap of the red (from hard-scatter
99
+ vertex), blue and grey (from nearby pileup vertices) tracks in the centre of the bottom plot on
100
+ Figure 1 is clearly visible.
101
+ Experiments at the LHC use heuristic algorithms [3–5] to reconstruct multiple proton–proton
102
+ interaction vertices. Several other approaches can be found in the literature, including medical
103
+ imaging-inspired algorithms [6] and the RAVE package [7] implementing the deterministic anneal-
104
+ ing algorithm [8].
105
+ This article presents an implementation of the Lifted Multicut Graph Partitioning algorithm
106
+ (LMC), which solves the inclusive vertex reconstruction problem described above.
107
+ Section 2
108
+ describes the LMC algorithm and details of its implementation for the vertex finding application.
109
+ Section 3 describes the simulated samples which are used to test the algorithm performance. In
110
+ Section 4, features of the simulated samples are discussed. Section 5 introduces edge cost functions
111
+ used in the graph partitioning. In Section 6, the metrics are introduced to estimate the algorithm
112
+ performance and to compare it with other existing approaches. Section 7 presents the performance
113
+ of the LMC approach in simulation. In Section 8, conclusions are made.
114
+ – 2 –
115
+
116
+ 61
117
+
118
+ 60
119
+
120
+ 59
121
+
122
+ 58
123
+
124
+ 57
125
+
126
+ 56
127
+
128
+ 55
129
+
130
+ 54
131
+
132
+ 53
133
+
134
+ 52
135
+
136
+ z [mm]
137
+ 1
138
+
139
+ 0.8
140
+
141
+ 0.6
142
+
143
+ 0.4
144
+
145
+ 0.2
146
+
147
+ 0
148
+ 0.2
149
+ 0.4
150
+ 0.6
151
+ 0.8
152
+ 1
153
+ r [mm]
154
+ Reco z = -56.71 mm
155
+ Truth z = -2.59 mm
156
+ 2
157
+ = 470.3 GeV
158
+ T
159
+ 2
160
+ p
161
+ Σ
162
+ w
163
+ T
164
+ p
165
+ Σ
166
+ PU Vertex chosen by
167
+ Truth
168
+ Reco
169
+ HS tracks
170
+ PU tracks
171
+ HS jets
172
+ PU jets
173
+ truth PU vertex
174
+ truth HS vertex
175
+ cut
176
+ 0
177
+ z
178
+ T
179
+ -p
180
+ η
181
+ Simulation Preliminary
182
+ ATLAS
183
+ 7
184
+
185
+ 6
186
+
187
+ 5
188
+
189
+ 4
190
+
191
+ 3
192
+
193
+ 2
194
+
195
+ 1
196
+
197
+ 0
198
+ 1
199
+ 2
200
+ z [mm]
201
+ 1
202
+
203
+ 0.8
204
+
205
+ 0.6
206
+
207
+ 0.4
208
+
209
+ 0.2
210
+
211
+ 0
212
+ 0.2
213
+ 0.4
214
+ 0.6
215
+ 0.8
216
+ 1
217
+ r [mm]
218
+ Reco z = -2.60 mm
219
+ Truth z = -2.59 mm
220
+ 2
221
+ = 121.2 GeV
222
+ T
223
+ 2
224
+ p
225
+ Σ
226
+ Reconstructed Hard-Scatter Primary Vertex
227
+ Truth
228
+ Reco
229
+ HS tracks
230
+ PU tracks
231
+ HS jets
232
+ PU jets
233
+ truth PU vertex
234
+ truth HS vertex
235
+ cut
236
+ 0
237
+ z
238
+ T
239
+ -p
240
+ η
241
+ Simulation Preliminary
242
+ ATLAS
243
+ Figure 1: Two regions of a typical LHC event in the ATLAS detector with many pileup interac-
244
+ tions [2]. True positions of the proton–proton interactions are shown, as well as the reconstructed
245
+ trajectories (tracks) of the produced particles scattered due to reconstruction uncertainties. Some
246
+ truth interaction vertices do not have associated tracks because all emanated particles are outside
247
+ of the sensitive detector phase space and not reconstructed. These pictures illustrate typical track
248
+ densities and overlap of the tracks produced in nearby interaction vertices. Both, tracks associated
249
+ with the hard-scattering (HS) and pileup (PU) are shown.
250
+ 2
251
+ Minimum-cost multicuts and lifted multicut algorithm for cluster finding
252
+ We formulate the primary-vertex reconstruction problem as a minimum-cost lifted multicut problem.
253
+ This problem was originally proposed in Reference [9] in the context of image segmentation and
254
+ mesh decomposition. It is a generalization of the better-known minimum cost multicut problem,
255
+ also referred to as the weighted correlation clustering problem [10, 11]. The minimum cost multicut
256
+ problem is a grouping problem defined for a graph 𝐺 = (𝑉, 𝐸) and a cost function 𝑐 : 𝐸 → R
257
+ which assigns to all edges 𝑒 ∈ 𝐸 a real-valued cost or reward for being cut. Then, the minimum
258
+ – 3 –
259
+
260
+ cost multicut problem is to find a binary edge labelling 𝑦 according to
261
+ min
262
+ 𝑦∈{0,1}𝐸
263
+ ∑︁
264
+ 𝑒∈𝐸
265
+ 𝑐𝑒𝑦𝑒
266
+ (2.1)
267
+ subject to
268
+ ∀𝐶 ∈ cycles(𝐺)
269
+ ∀𝑒 ∈ 𝐶 : 𝑦𝑒 ≤
270
+ ∑︁
271
+ 𝑒∈𝐶\{𝑒}
272
+ 𝑦𝑒 .
273
+ (2.2)
274
+ The constraints on the feasible set of labellings 𝑦 given in Equation (2.2) ensure that the solution
275
+ of the multicut problem relates one-to-one to the decompositions of graph 𝐺, by ensuring for every
276
+ cycle in 𝐺 that if an edge is cut within the cycle (𝑦𝑒 = 1), so needs to be at least one other. Trivial
277
+ optimal solutions are avoided by assigning positive (attractive) costs 𝑐𝑒 to edges between nodes
278
+ 𝑣, 𝑤 ∈ 𝑉 that likely belong to the same component, while negative (repulsive) costs are assigned to
279
+ edges that likely belong to different components.
280
+ The minimum cost lifted multicut problem (LMC) generalizes over the problem defined in
281
+ Equation (2.1)–Equation (2.2) by adding a second set of edges that defines additional, potentially
282
+ long-range costs without altering the set of feasible solutions. It thus defines a second set of edges
283
+ 𝐹 between the nodes 𝑉 of 𝐺, resulting in a lifted graph 𝐺′ = (𝑉, 𝐸 ∪ 𝐹), on which we can define
284
+ a cost function 𝑐′ : 𝐸 ∪ 𝐹 → R. Then, Equation (2.1) and Equation (2.2) are optimized over all
285
+ edges in 𝐸 ∪ 𝐹 and two additional sets of constraints are defined according to [9]
286
+ ∀𝑣, 𝑤 ∈ 𝐹
287
+ ∀𝑃 ∈ 𝑣, 𝑤 − paths(𝐺) : 𝑦𝑣𝑤 ≤
288
+ ∑︁
289
+ 𝑒∈𝑃
290
+ 𝑦𝑒
291
+ (2.3)
292
+ ∀𝑣, 𝑤 ∈ 𝐹
293
+ ∀𝐶 ∈ 𝑣, 𝑤 − cuts(𝐺) : 1 − 𝑦𝑣𝑤 ≤
294
+ ∑︁
295
+ 𝑒∈𝐶
296
+ (1 − 𝑦𝑒)
297
+ (2.4)
298
+ to ensure that the feasible solutions to the LMC problem still relate one-to-one to the decompositions
299
+ of the original graph 𝐺.
300
+ For the vertex reconstruction problem, this formulation allows encoding Euclidean distance
301
+ constraints in the structure of graph 𝐺 (e.g. point observations that are spatially distant can not
302
+ originate from the same vertex), while the cost function can be naturally defined in the distance
303
+ significance space to take into account the measurement errors. The Euclidean distance and its
304
+ significance can be very different in case of significant reconstruction errors, the lifted multicut
305
+ formulation encodes both metrics in the same graph.
306
+ The minimum cost multicut problem is 𝑛𝑝-hard, and so is the minimum cost LMC problem
307
+ [12]. Yet, efficient heuristic solvers provide practically good solutions [9, 13–16]. Here, we resolve
308
+ to use the primal feasible heuristic KLj that has been proposed in Reference [9] and published in
309
+ an open-source library1. KLj is an iterative approach that produces a sequence of feasible solutions
310
+ whose cost decreases monotonically. It takes as input an initial edge labelling (for example, all
311
+ edge labels are initially set to 0), a lifted graph and costs defined on all edges. In every step, it
312
+ either moves nodes between two neighbouring components, moves nodes from one component into
313
+ a new component or joins two components such as to decrease the cost of the multicut maximally
314
+ according to Equation (2.1).
315
+ 1https://github.com/bjoern-andres/graph
316
+ – 4 –
317
+
318
+ 3
319
+ Data simulation
320
+ To estimate the clustering performance, we simulated data using DELPHES [17]. The framework
321
+ allows to perform a fast and realistic simulation of a general-purpose collider detector composed of
322
+ an inner tracker, electromagnetic and hadron calorimeters, and a muon system. For this study, we
323
+ added a detailed parameterisation of the ATLAS detector tracking resolution to the framework.
324
+ To simulate the pileup vertices and hard-scattering events, a sufficiently large amount of
325
+ minimum-bias interaction events was prepared, consisting of single, double, and non-diffractive
326
+ processes. These events have been generated using the Pythia 8 [18] event generator. As the main
327
+ source of hard-scattering interactions, 𝑡¯𝑡 events are used, also generated with Pythia 8. To simulate
328
+ an LHC collision event with full pileup, a single 𝑡¯𝑡 event is mixed with a number of minimum-
329
+ bias events, distributed according to a Poisson distribution with a mean corresponding to a chosen
330
+ luminosity. The interaction vertices are then distributed along the LHC beam trajectory inside the
331
+ detector, according to typical interaction region parameters for ATLAS, i.e. according to a Gaussian
332
+ with 𝜎𝑧 = 42 mm.
333
+ The acceptance of the ATLAS detector allows for reconstructing charged particle trajectories in
334
+ a limited phase space of 𝑝⊥ > 500 MeV and |𝜂| < 2.5. Some minimum-bias proton–proton interac-
335
+ tions produce only particles outside the sensitive phase space of the ATLAS detector, which makes
336
+ them unreconstructable. Positions of interactions with a single track in the ATLAS acceptance can
337
+ be reconstructed, but this vertex category is contaminated by tracks that are strongly displaced by
338
+ measurement errors. In the following, a reconstructable truth vertex refers to the true position of a
339
+ proton–proton interaction producing at least two tracks within the ATLAS detector acceptance.
340
+ All tracks produced in an event and falling into the sensitive ATLAS detector phase space
341
+ are smeared according to the parameterised ATLAS detector resolution.
342
+ Tracks with smeared
343
+ parameters are referred to as reconstructed tracks in the following. The set of reconstructed tracks
344
+ corresponding to a full pileup event is used as input for the performance estimation of the clustering
345
+ algorithms. DELPHES samples used in this paper have been prepared with different energies and
346
+ different pileup conditions (Table 1).
347
+ Energy
348
+
349
+ 𝜇
350
+
351
+ Interaction region 𝜎��
352
+
353
+ 𝑁event
354
+ trk
355
+
356
+
357
+ 𝑁vrt
358
+ trk =0
359
+
360
+
361
+ 𝑁vrt
362
+ trk =1
363
+
364
+
365
+ 𝑁vrt
366
+ trk >1
367
+
368
+ 13 TeV
369
+ 63
370
+ 35 mm
371
+ 718
372
+ 9
373
+ 4
374
+ 50
375
+ 14 TeV 150
376
+ 42 mm
377
+ 1674
378
+ 22
379
+ 9
380
+ 119
381
+ 14 TeV 200
382
+ 42 mm
383
+ 2227
384
+ 28
385
+ 12
386
+ 160
387
+ 14 TeV 250
388
+ 42 mm
389
+ 2771
390
+ 35
391
+ 16
392
+ 199
393
+ Table 1: The DELPHES samples used to estimate the LMC performance. Column 𝑁event
394
+ trk
395
+ reports
396
+ the total number of reconstructed tracks in simulated events. The last three columns show the
397
+ numbers of true vertices with 𝑁vrt
398
+ trk = 0, 1, > 1, correspondingly.
399
+ – 5 –
400
+
401
+ 4
402
+ Features of simulated data
403
+ The number of truth tracks in the detector acceptance in the simulated vertices and the position
404
+ measurement errors of these tracks are shown in Figure 2. As can be seen in Figure 2a, in 14% of
405
+ the cases, the simulated vertices do not have tracks in the detector acceptance, and in 6.5% of the
406
+ cases, they have only one track. The number of tracks for all other vertices is widely spread up to
407
+ 80.
408
+ 0
409
+ 20
410
+ 40
411
+ 60
412
+ 80
413
+ Number of tracks in a truth vertex
414
+ 0
415
+ 0.02
416
+ 0.04
417
+ 0.06
418
+ 0.08
419
+ 0.1
420
+ 0.12
421
+ 0.14
422
+ Fraction
423
+ a)
424
+ 0
425
+ 0.5
426
+ 1
427
+ 1.5
428
+ 2
429
+ Track measurement error
430
+ 0
431
+ 0.02
432
+ 0.04
433
+ 0.06
434
+ 0.08
435
+ 0.1
436
+ 0.12
437
+ 0.14
438
+ 0.16
439
+ 0.18
440
+ 0.2
441
+ Fraction
442
+ b)
443
+ Figure 2: a) Number of tracks per simulated vertex and b) Track measurement errors of the
444
+ simulated tracks.
445
+ Track measurement errors are shown in Figure 2b. From the sizes of the luminous regions and
446
+ the number of vertices in Table 1 we can conclude that the track measurement errors are comparable
447
+ or larger than a typical vertex–vertex distance in the simulated data. Smearing of the track positions
448
+ due to measurement errors results in a significant overlap of the tracks from different truth vertices.
449
+ The fraction of cases when a track from one vertex is entirely surrounded by tracks from other
450
+ vertices for different pileup scenarios is shown in Table 2. An example of the track overlap can be
451
+ seen in the bottom panel of Figure 1. Another example is shown in Figure 3.
452
+
453
+ 𝜇
454
+
455
+ 63
456
+ 150
457
+ 200
458
+ 250
459
+ Track overlap fraction 20% 41% 53% 66%
460
+ Table 2: Fraction of tracks, positioned in between tracks from other truth vertices due to measure-
461
+ ment errors, as a function of the pileup.
462
+ A priori, well-measured tracks with small errors should be easy to cluster according to the
463
+ truth, while poorly measured tracks with large errors can easily migrate from one cluster to another,
464
+ independently of their true origin. This random migration can be interpreted as noise, and thus, the
465
+ overall problem may be considered as clustering in the presence of significant noise.
466
+ 5
467
+ Edge weights and constraints
468
+ To formulate the vertex finding problem in the presence of pileup as a minimum cost lifted multicut
469
+ (LMC) problem, a track-pair compatibility graph needs to be constructed. A node in this graph
470
+ – 6 –
471
+
472
+ 4
473
+ 6
474
+ 8
475
+ 10
476
+ 12
477
+ Track and true vertex positions (mm)
478
+ 1.5
479
+
480
+ 1
481
+
482
+ 0.5
483
+
484
+ 0
485
+ 0.5
486
+ 1
487
+ 1.5
488
+ Track error (mm)
489
+ Track positions linked to true vertices
490
+ True vertices
491
+ Figure 3: Example display of overlapping tracks from different vertices caused by measurement
492
+ errors (zoom of a simulated DELPHES event with 𝜇 = 150). The crosses at the ordinate value
493
+ of 0 represent the track positions, and the vertical error bars represent the corresponding position
494
+ measurement errors. Squares at ordinate values of 1.3 represent the truth vertex positions. The
495
+ connecting lines show the origin vertex for every track.
496
+ represents a track, and two nodes are connected by an edge if and only if they are close in space and
497
+ can be produced in the same vertex. The degree of track closeness, or equivalently the probability of
498
+ originating in the same vertex, is estimated during the graph construction and is expressed as a weight
499
+ assigned to the edge. The edge weights determine the efficiency of the clustering. Therefore, they
500
+ should incorporate enough information, and the weight assignment procedure should be carefully
501
+ designed. The following approaches are used in our study:
502
+ 1. Probability density function (PDF) ratio of the track–track geometrical distance significance
503
+ based on measured uncertainties, 𝑆 =
504
+ √︃
505
+ (𝑧𝑖 − 𝑧 𝑗)2/(𝜎2
506
+ 𝑖 + 𝜎2
507
+ 𝑗 );
508
+ 2. Multivariate binary classification with Boosted Decision Trees (BDT);
509
+ 3. Logistic regression based on 𝑆.
510
+ The LMC formulation assumes that the correct edges (two tracks from the same vertex) receive
511
+ positive weights, while random (fake) edges receive negative weights. This can be achieved by
512
+ using a logarithm of the ratio of the probability density functions for the correct and fake edges
513
+ as the cost function of the problem log 𝑝true
514
+ 𝑝fake . According to the Neyman–Pearson lemma, this is
515
+ the most efficient test statistic for the true/fake edge classification. An example of the track–track
516
+ distance significance distributions and their ratio are shown in Figure 4. As the PDF of the fake
517
+ edges is independent of the track–track distance significance, its overall normalisation depends on
518
+ the significance range used for the parameterisation. Thus, the exact values of the PDF ratio can
519
+ be scaled by the choice of the parametrisation range, which in principle, should not affect the LMC
520
+ – 7 –
521
+
522
+ clustering performance if the range is sufficiently large. Such a behaviour can be mimicked by a
523
+ global multiplier of the PDF ratio function. The influence of this multiplier on the clustering will
524
+ be studied in Section 7.3.
525
+ 0
526
+ 1
527
+ 2
528
+ 3
529
+ 4
530
+ 5
531
+ 6
532
+ Track-track distance significance
533
+ 0
534
+ 0.002
535
+ 0.004
536
+ 0.006
537
+ 0.008
538
+ 0.01
539
+ 0.012
540
+ 0.014
541
+ 0.016
542
+ 0.018
543
+ 0.02
544
+ 0.022
545
+ 0.024
546
+ True edges
547
+ 0
548
+ 1
549
+ 2
550
+ 3
551
+ 4
552
+ 5
553
+ 6
554
+ Track-track distance significance
555
+ 0
556
+ 0.001
557
+ 0.002
558
+ 0.003
559
+ 0.004
560
+ 0.005
561
+ 0.006
562
+ Fake edges
563
+ 0
564
+ 1
565
+ 2
566
+ 3
567
+ 4
568
+ 5
569
+ 6
570
+ Track-track distance significance
571
+ 0
572
+ 0.5
573
+ 1
574
+ 1.5
575
+ 2
576
+ 2.5
577
+ 3
578
+ 3.5
579
+ 4
580
+ 4.5
581
+ 5
582
+ Ratio True/Fake pdf's
583
+ Figure 4: Example track–track distance significance for true and fake edges and their ratio. The
584
+ significance distributions are normalized to one.
585
+ A better clustering performance could be achieved by encoding more information in the edge
586
+ weight calculation. To test this approach, we use a BDT classifier combining seven features, listed
587
+ in Table 3, to distinguish true edges from fake ones. The GradientBoost implementation (BDTG)
588
+ from the TMVA [19] package is used to train the classifier. An example of the trained classifier
589
+ response2 is shown in Figure 5. The output is negative for fake edges and positive for true ones,
590
+ exactly as required by the KLj algorithm, and therefore can be used directly as the edge weight.
591
+ n. Description
592
+ 1
593
+ Squared significance 𝑆2 (or 𝜒2) of track–track distance along beamline
594
+ 2
595
+ Average position of the track pair along beamline
596
+ 3
597
+ Position uncertainty of track 1
598
+ 4
599
+ Position uncertainty of track 2
600
+ 5
601
+ Pseudorapidity 𝜂 of track 1
602
+ 6
603
+ Pseudorapidity 𝜂 of track 2
604
+ 7
605
+ Number of other tracks crossing the beamline between tracks 1 and 2
606
+ Table 3: Input features for the edge classification BDT.
607
+ Edge weights can also be assigned by using the logistic regression 𝑝 = 𝑒𝑧/(𝑒𝑧 + 1), where
608
+ 𝑧 = 𝛽0 + �𝑛
609
+ 𝑖=1 𝛽𝑖𝑥𝑖 and 𝑥𝑖 are explanatory variables. The negative inverse of the logistic function,
610
+ logit(𝑝) = log[𝑝/(1 − 𝑝)], provides the necessary edge weight behaviour. Edges that need to be
611
+ removed receive negative weights, and those that need to be preserved receive positive weights.
612
+ The intercept value 𝛽0 is defined by the ratio between the amount of true and fake edges used
613
+ for training, which can be linked to a prior probability of a given edge being true or fake. In the
614
+ 2TMVA GradientBoost uses the binomial log-likelihood loss 𝐿(𝐹, 𝑦) = ln[1 + exp(−2𝐹(𝑥)𝑦)] with Gini Index
615
+ separation. We use the following training settings NTree=800, MaxDepth=10, MinNodeSize=1.5%, Shrinkage=0.07.
616
+ – 8 –
617
+
618
+ 0.8
619
+
620
+ 0.6
621
+
622
+ 0.4
623
+
624
+ 0.2
625
+
626
+ 0
627
+ 0.2
628
+ 0.4
629
+ 0.6
630
+ 0.8
631
+ BDTG response
632
+ 0
633
+ 1
634
+ 2
635
+ 3
636
+ 4
637
+ 5
638
+ 6
639
+ dx
640
+ /
641
+
642
+ (1/N) dN
643
+ Signal
644
+ Background
645
+ U/O-flow (S,B): (0.0, 0.0)% / (0.0, 0.0)%
646
+ TMVA response for classifier: BDTG
647
+ Figure 5: Example BDTG classification weight distributions for true and fake edges.
648
+ current problem, the prior probability depends on the true vertex density and cannot be defined
649
+ unambiguously, e.g. it depends on the range of the track–track distance significance 𝑆, see above.
650
+ Therefore, the value of the intercept 𝛽0 in this approach can be modified in some range to achieve
651
+ an over- or undersegmentation in order to validate its optimality. This will be further discussed in
652
+ Section 7.3. A one-dimensional regression is tested in this paper, using variable (1) from Table 3.
653
+ The logistic regression for the edge weight calculation is illustrated in Figure 6.
654
+ 0
655
+ 5
656
+ 10
657
+ 15
658
+ 20
659
+ 0.0
660
+ 0.2
661
+ 0.4
662
+ 0.6
663
+ 0.8
664
+ 1.0
665
+ S2
666
+ True
667
+ Figure 6: Example one-variable logistic regression for true and fake edges using the squared
668
+ track–track distance significance 𝑆2.
669
+ The usage of the track–track distance significance for partitioning does not guarantee the com-
670
+ pactness of the obtained cluster in Cartesian space, which may be beneficial when the vertex density
671
+ is large. The compactness requirement can be imposed using the LMC constraint mechanism.
672
+ Some edges in the connectivity graph can be additionally labelled as “have to be cut”, based on a
673
+ priori information, different from the edge probability itself. To make clusters more compact, we
674
+ – 9 –
675
+
676
+ can constrain the edges to be cut if the corresponding Cartesian track–track distance is larger than
677
+ some scale. In the following, a rather weak requirement of |𝑧𝑖 − 𝑧 𝑗| < 1 mm will be used, which
678
+ removes tracks with very large errors, see Figure 2b. In addition to improving the quality of the
679
+ solution, the constraint limits the phase space of possible solutions, and this leads to a significant
680
+ algorithm speedup.
681
+ 6
682
+ Performance metrics
683
+ For a quantitative assessment of the performance of the vertex-finding algorithm, one or several
684
+ metrics are to be established. To compare the performance of the clustering algorithms in, e.g.,
685
+ image segmentation problems, metrics are usually employed, which are based on the assignment
686
+ of graph nodes to clusters. One example of such a metric is the Variation of Information (VI)
687
+ proposed in Reference [20]. The VI metric calculates the degree of compatibility of a clustering 𝐶
688
+ with another clustering 𝐶′ as
689
+ 𝑉𝐼(𝐶, 𝐶′) = 𝐻(𝐶) + 𝐻(𝐶′) − 2 · 𝐼(𝐶, 𝐶′)
690
+ (6.1)
691
+ with
692
+ 𝐻(𝐶) = −
693
+ 𝐾
694
+ ∑︁
695
+ 𝑘=1
696
+ 𝑃(𝑘) · log(𝑃(𝑘)) and 𝐼(𝐶, 𝐶′) =
697
+ 𝐾
698
+ ∑︁
699
+ 𝑘=1
700
+ 𝐾 ′
701
+ ∑︁
702
+ 𝑘′=1
703
+ 𝑃(𝑘, 𝑘′) · log
704
+ � 𝑃(𝑘, 𝑘′)
705
+ 𝑃(𝑘)𝑃(𝑘′)
706
+
707
+ .
708
+ (6.2)
709
+ Here 𝑃(𝑘) = 𝑛𝑘/𝑁, 𝑃(𝑘, 𝑘′) = |𝐶𝑘 ∩ 𝐶′
710
+ 𝑘′|/𝑁, 𝑛𝑘 is the number of nodes in the cluster 𝐶𝑘, 𝑁 is
711
+ the total number of nodes in the graph, and 𝐾 and 𝐾′ are the number of elements in 𝐶 and 𝐶′,
712
+ respectively. In our case, the VI metric can be used to compare the truth track-to-vertex assignment
713
+ with the obtained clustering solution. When the obtained set of clusters and the track-to-cluster
714
+ assignment reproduce the truth exactly, 𝑉𝐼 vanishes. Consequently, smaller VI values correspond
715
+ to more truth-like (and therefore better) clustering solutions.
716
+ Another track-to-cluster-based metric, which is investigated in the following, is the Silhou-
717
+ ette [21] score
718
+ 𝑠(𝑖) =
719
+ 𝑏(𝑖) − 𝑎(𝑖)
720
+ max{𝑎(𝑖), 𝑏(𝑖)}
721
+ (6.3)
722
+ with
723
+ 𝑎(𝑖) =
724
+ 1
725
+ 𝑛𝑘 − 1
726
+ 𝐶𝑘
727
+ ∑︁
728
+ 𝑗, 𝑖≠𝑗
729
+ 𝑑(𝑖, 𝑗) and 𝑏(𝑖) =
730
+ min
731
+ 𝐶𝑘′≠𝐶𝑘
732
+ 1
733
+ 𝑛 𝑗
734
+ 𝐶𝑘′
735
+ ∑︁
736
+ 𝑗
737
+ 𝑑(𝑖, 𝑗)
738
+ (6.4)
739
+ for node 𝑖 in cluster 𝐶𝑘. Here 𝑑(𝑖, 𝑗) is a distance between nodes 𝑖 and 𝑗. In this study, we use the
740
+ Cartesian distance between tracks and average over all tracks silhouette value
741
+
742
+ 𝑠(𝑖)
743
+
744
+ as a quality
745
+ estimator of the clustering solution. The silhouette value is limited −1 < 𝑠(𝑖) < 1, larger values
746
+ corresponding to more compact clusters, better separated from each other.
747
+ Several other track-to-cluster-based metrics can be found in Reference [20]. These metrics are
748
+ expected to encounter problems in the present case due to the overlap of truth clusters, as explained
749
+ in Section 4. Tracks are assigned most probably to the wrong cluster by any partitioning algorithm
750
+ if placed in between tracks from other clusters by mismeasurement. This phenomenon inevitably
751
+ reduces the accuracy of any track-to-cluster-based metrics. Nevertheless, at least the clustering of
752
+ – 10 –
753
+
754
+ the well-measured tracks should reproduce the truth closely, which the track-to-cluster metrics can
755
+ still be sensitive to.
756
+ As the metric accuracy is compromised by the presence of tracks with large measurement
757
+ errors, it might be useful to downscale the contribution of such tracks to the metric. For the VI
758
+ metric this can be achieved by weighting every track with 𝜎−2 in the metric calculations, namely
759
+ 𝑛𝑘 = �𝑘
760
+ 𝑖=1
761
+ 1
762
+ 𝜎2
763
+ 𝑖 , 𝑁 = �𝑁
764
+ 𝑖=1
765
+ 1
766
+ 𝜎2
767
+ 𝑖 , etc. For the Silhouette metric the Cartesian distance between two
768
+ tracks can be replaced by its significance 𝑑(𝑖, 𝑗) = 𝑆𝑖 𝑗. The weighted versions of the VI and
769
+ Silhouette metric will be used in the following, along with the original versions.
770
+ The number of reconstructed clusters and the weighted average positions of these clusters,
771
+ dominated by the well-measured tracks, are mostly decoupled from the details of the track-to-
772
+ cluster assignment. The number of clusters can be directly used as a metric (up to the possible
773
+ presence of fake clusters), but a Cartesian distance-based metric is not straightforward. One may
774
+ try to introduce such a metric exploiting the cluster–cluster resolution 𝑅𝑐𝑐, i.e. the minimal distance
775
+ between two reconstructed clusters, see Figure 7. The good, merged, bad cluster categories could
776
+ be defined based on whether the cluster–truth vertex distance is smaller or larger than 𝑅𝑐𝑐. Such
777
+ cluster categories could be used to compare various clustering solutions. But this categorisation
778
+ explicitly depends on 𝑅𝑐𝑐, which itself depends on the clustering algorithm. To avoid such circular
779
+ dependence, a scale-independent Cartesian distance-based metric is needed.
780
+ 4
781
+
782
+ 3
783
+
784
+ 2
785
+
786
+ 1
787
+
788
+ 0
789
+ 1
790
+ 2
791
+ 3
792
+ 4
793
+ z[mm]
794
+
795
+
796
+ 0
797
+ 20
798
+ 40
799
+ 60
800
+ 80
801
+ 100
802
+ 120
803
+ 140
804
+ 160
805
+ 180
806
+ Events / 0.1mm
807
+ =0.35mm
808
+ CC
809
+ R
810
+ Figure 7: Example of a fit to the cluster–cluster distance to determine the resolution. The used
811
+ fitting function is 𝑎/{1 + exp[𝑏 · (𝑅𝑐𝑐 − |𝑥|)]} + 𝑐 where a, b, c are free fitting parameters and 𝑅𝑐𝑐
812
+ is the cluster–cluster resolution, defined as the half-width at the half-depth of the dip in the centre
813
+ of the cluster–cluster weighted centre distances, averaged over all clusters.
814
+ To construct such a metric, we propose the following procedure. Every reconstructable truth
815
+ vertex is linked to the closest reconstructed cluster in the Cartesian space that has 2 or more assigned
816
+ tracks. Thus, a list of linked reconstructed clusters is obtained. Then, every reconstructed cluster is
817
+ classified depending on how many times it enters into this list. If a cluster enters this list only once,
818
+ there is just a single truth vertex referencing this cluster. Therefore it can be called unique, which
819
+ means that a truth vertex is unambiguously reconstructed as a cluster. If a cluster enters several
820
+ times into the list, it is referenced by several truth vertices, and therefore it combines tracks from
821
+ – 11 –
822
+
823
+ these vertices: this cluster can be called merged. Also, some clusters may not appear in this list
824
+ at all: such clusters are not referenced by any truth vertex and are thus fake. The total number of
825
+ obtained clusters and their classification as unique, merged, fake are scale-independent and can be
826
+ used as a metric to compare various clustering options.
827
+ 7
828
+ Results
829
+ 7.1
830
+ LHC Run-2 13 TeV data
831
+ First, the LMC clustering algorithm is tested with simulated DELPHES data at a collision energy of
832
+ 13 TeV, with pileup
833
+
834
+ 𝜇
835
+
836
+ = 63 and 𝜎𝑧 = 35 mm. These parameters are chosen to provide simulated
837
+ data close to the actual data collected by the ATLAS detector in Run 2. Edge-weight distributions
838
+ for various edge-labelling approaches on these data are shown in Figure 8. The performance of
839
+ the LMC algorithm on these data is shown in Table 4. The rows labelled “cnst” in these tables
840
+ provide performance estimation with the applied constraints |𝑧𝑖 − 𝑧 𝑗| < 1 mm, while the “base”
841
+ rows describe the baseline algorithm performance without constraints.
842
+ 15
843
+
844
+ 10
845
+
846
+ 5
847
+
848
+ 0
849
+ 5
850
+ Edge weight
851
+ 0
852
+ 0.02
853
+ 0.04
854
+ 0.06
855
+ 0.08
856
+ 0.1
857
+ 0.12
858
+ 0.14
859
+ 0.16
860
+ 0.18
861
+ 0.2
862
+ 0.22
863
+ 0.24
864
+ Density (arbitrary units)
865
+ PDF ratio
866
+ 20
867
+
868
+ 15
869
+
870
+ 10
871
+
872
+ 5
873
+
874
+ 0
875
+ 5
876
+ Edge weight
877
+ 0
878
+ 0.02
879
+ 0.04
880
+ 0.06
881
+ 0.08
882
+ 0.1
883
+ 0.12
884
+ 0.14
885
+ 0.16
886
+ 0.18
887
+ 0.2
888
+ Density (arbitrary units)
889
+ Logistic regression 1var
890
+ 1
891
+
892
+ 0
893
+ 1
894
+ 2
895
+ Edge weight
896
+ 0
897
+ 0.02
898
+ 0.04
899
+ 0.06
900
+ 0.08
901
+ 0.1
902
+ 0.12
903
+ 0.14
904
+ Density (arbitrary units)
905
+ BDT
906
+ Figure 8: Typical edge weight distributions for various edge labelling options.
907
+ The column 𝑁wrong
908
+ trk
909
+ in Table 4 is the number of tracks assigned to one cluster but entirely
910
+ surrounded by tracks from other clusters. This number is an estimator for the degree of cluster
911
+ overlap in the obtained solution. The relevant truth data overlap for comparison can be found
912
+ in Table 1.
913
+ In addition, Table 9 in the Appendix gives the number of isolated nodes (tracks)
914
+ reported by the LMC clustering algorithm. These non-assigned tracks do not represent the one-
915
+ track truth vertices, considered non-reconstructable without a priori information, but rather reflect
916
+ the clustering problems.
917
+ The PDF ratio and the regression-based edge weight assignment result in approximately equal
918
+ clustering performance. The BDT-based edge weight assignment leads to a significantly worse
919
+ Silhouette metric value, a smaller value of the cluster overlap and a larger amount of fake clusters.
920
+ As expected, the weighted versions of the VI and Silhouette metrics have significantly better values
921
+ than the standard ones due to downscaling of the noise. Using constraints uniformly improves all
922
+ quality estimators and provides ∼ 30% CPU reduction.
923
+ In total, 70% of the reconstructable truth vertices are reconstructed as unique clusters, while
924
+ the remaining 30% (i.e. 15) truth vertices are squeezed into 7.5 merged vertices. The amount of
925
+ – 12 –
926
+
927
+ Edge weight
928
+ VI
929
+ VI
930
+ Silhouette
931
+ Silhouette
932
+ Unique
933
+ Merged
934
+ Fake 𝑁wrong
935
+ trk
936
+ CPU
937
+ weighted
938
+ weighted
939
+ PDF ratio
940
+ base 0.839
941
+ 0.407
942
+ 0.615
943
+ 0.646
944
+ 33.3
945
+ 8.2
946
+ 2.4
947
+ 15%
948
+ 0.25s
949
+ cnst
950
+ 0.782
951
+ 0.362
952
+ 0.649
953
+ 0.660
954
+ 33.9
955
+ 7.9
956
+ 2.3
957
+ 8%
958
+ 0.18s
959
+ Regression
960
+ base 0.860
961
+ 0.416
962
+ 0.589
963
+ 0.623
964
+ 34.7
965
+ 7.6
966
+ 4.1
967
+ 14%
968
+ 0.27s
969
+ cnst
970
+ 0.829
971
+ 0.387
972
+ 0.614
973
+ 0.633
974
+ 35.0
975
+ 7.5
976
+ 3.9
977
+ 8%
978
+ 0.18s
979
+ BDT
980
+ base 0.945
981
+ 0.399
982
+ 0.478
983
+ 0.230
984
+ 35.0
985
+ 7.5
986
+ 7.1
987
+ 5%
988
+ 0.23s
989
+ cnst
990
+ 0.937
991
+ 0.377
992
+ 0.487
993
+ 0.234
994
+ 35.2
995
+ 7.4
996
+ 7.0
997
+ 4%
998
+ 0.14s
999
+ Table 4: LMC performance for the collision energy 13 TeV, pileup 63 and interaction region width
1000
+ 𝜎𝑧 = 35 mm. These simulation parameters are chosen to match the full ATLAS simulation for Run
1001
+ 2 results used for comparison. The column 𝑁wrong
1002
+ trk
1003
+ shows the fraction of tracks wrongly associated
1004
+ by the clustering algorithm, which shall be compared to the truth fraction of 20% (Table 2).
1005
+ fake clusters is in the range of 5–15%. The number of tracks in the different cluster categories is
1006
+ presented in Figure 9. The number of tracks in the unique clusters is close to the track amount in
1007
+ the truth vertices, see Figure 2, while the merged clusters contain much more tracks. Finally, fake
1008
+ clusters have a very small number of tracks.
1009
+ 0
1010
+ 10 20 30 40 50 60 70 80 90 100
1011
+ Number of tracks in cluster
1012
+ 0
1013
+ 0.02
1014
+ 0.04
1015
+ 0.06
1016
+ 0.08
1017
+ 0.1
1018
+ Density (arbitrary units)
1019
+ Unique vertices
1020
+ 0
1021
+ 10 20 30 40 50 60 70 80 90 100
1022
+ Number of tracks in cluster
1023
+ 0
1024
+ 0.005
1025
+ 0.01
1026
+ 0.015
1027
+ 0.02
1028
+ 0.025
1029
+ 0.03
1030
+ 0.035
1031
+ Density (arbitrary units)
1032
+ Merged vertices
1033
+ 0
1034
+ 10 20 30 40 50 60 70 80 90 100
1035
+ Number of tracks in cluster
1036
+ 0
1037
+ 0.1
1038
+ 0.2
1039
+ 0.3
1040
+ 0.4
1041
+ 0.5
1042
+ 0.6
1043
+ 0.7
1044
+ Density (arbitrary units)
1045
+ Fake vertices
1046
+ Figure 9: Number of tracks in a cluster for the unique, merged and fake cluster categories. The
1047
+ distributions are obtained for pileup
1048
+
1049
+ 𝜇
1050
+
1051
+ = 63 data using a one-variable logistic regression for the
1052
+ edge weight assignment.
1053
+ 7.2
1054
+ High-Luminosity LHC 14 TeV data
1055
+ The High Luminosity LHC (HL-LHC) project foresees a significant increase in interaction rates
1056
+ to collect significantly more data and thus increase the sensitivity for new physics. The exact
1057
+ parameters of the upgraded HL-LHC are not yet final; pileup values of 150, 200, and 250, and an
1058
+ interaction region width of 𝜎𝑧 = 42 mm are considered the most probable options. These options
1059
+ result in an increase in the density of pileup interaction vertices up to a factor of 4, as compared
1060
+ to the current LHC parameters. The degree of truth cluster overlap rises from 20% to 66%, see
1061
+ – 13 –
1062
+
1063
+ Table 1. It is interesting to check the performance of the LMC problem formulation in such extreme
1064
+ conditions.
1065
+ For this test, the same PDF ratio and logistic regression function are used for the edge weight
1066
+ calculation, while the BDT classification is retrained using 𝜇 = 150, 200, 250 data. Results for
1067
+ nominal PDF ratio and logistic regression-based edge weight calculation functions are shown in
1068
+ Tables 5, 6, and 7.
1069
+ Edge weight
1070
+ VI
1071
+ VI
1072
+ Silhouette
1073
+ Silhouette
1074
+ Unique
1075
+ Merged
1076
+ Fake 𝑁wrong
1077
+ trk
1078
+ CPU
1079
+ weighted
1080
+ weighted
1081
+ PDF ratio
1082
+ base 1.318
1083
+ 0.690
1084
+ 0.535
1085
+ 0.577
1086
+ 57.7
1087
+ 27.4
1088
+ 4.8
1089
+ 28%
1090
+ 1.1s
1091
+ cnst
1092
+ 1.211
1093
+ 0.612
1094
+ 0.581
1095
+ 0.609
1096
+ 59.4
1097
+ 26.9
1098
+ 4.1
1099
+ 14%
1100
+ 0.42s
1101
+ Regression
1102
+ base 1.316
1103
+ 0.682
1104
+ 0.514
1105
+ 0.559
1106
+ 63.0
1107
+ 25.6
1108
+ 8.8
1109
+ 26%
1110
+ 0.73s
1111
+ cnst
1112
+ 1.259
1113
+ 0.634
1114
+ 0.546
1115
+ 0.582
1116
+ 63.6
1117
+ 25.4
1118
+ 8.2
1119
+ 14%
1120
+ 0.50s
1121
+ BDT
1122
+ base 1.303
1123
+ 0.658
1124
+ 0.394
1125
+ 0.146
1126
+ 61.8
1127
+ 25.9
1128
+ 13
1129
+ 9%
1130
+ 0.96s
1131
+ cnst
1132
+ 1.275
1133
+ 0.616
1134
+ 0.409
1135
+ 0.155
1136
+ 62.8
1137
+ 25.6
1138
+ 12
1139
+ 7%
1140
+ 0.43s
1141
+ Table 5: LMC performance for pileup 𝜇 = 150 in an HL-LHC environment with collision energy
1142
+ 14 TeV and interaction region size 𝜎𝑧 = 42 mm. The column 𝑁wrong
1143
+ trk
1144
+ shows the fraction of the
1145
+ tracks, wrongly associated by the clustering algorithm, which can be compared to the true fraction
1146
+ 41% (Table 2).
1147
+ Edge weight
1148
+ VI
1149
+ VI
1150
+ Silhouette
1151
+ Silhouette
1152
+ Unique
1153
+ Merged
1154
+ Fake 𝑁wrong
1155
+ trk
1156
+ CPU
1157
+ weighted
1158
+ weighted
1159
+ PDF ratio
1160
+ base 1.574
1161
+ 0.852
1162
+ 0.500
1163
+ 0.546
1164
+ 64.3
1165
+ 40.3
1166
+ 5.7
1167
+ 36%
1168
+ 2.3s
1169
+ cnst
1170
+ 1.441
1171
+ 0.756
1172
+ 0.552
1173
+ 0.586
1174
+ 66.6
1175
+ 39.8
1176
+ 4.8
1177
+ 18%
1178
+ 0.69s
1179
+ Regression
1180
+ base 1.546
1181
+ 0.825
1182
+ 0.492
1183
+ 0.539
1184
+ 70.3
1185
+ 38.6
1186
+ 9.0
1187
+ 32%
1188
+ 2.4s
1189
+ cnst
1190
+ 1.470
1191
+ 0.765
1192
+ 0.529
1193
+ 0.568
1194
+ 71.0
1195
+ 38.4
1196
+ 8.1
1197
+ 18%
1198
+ 0.69s
1199
+ BDT
1200
+ base 1.512
1201
+ 0.805
1202
+ 0.312
1203
+ 0.040
1204
+ 69.9
1205
+ 38.6
1206
+ 15.6
1207
+ 13%
1208
+ 1.8s
1209
+ cnst
1210
+ 1.479
1211
+ 0.755
1212
+ 0.332
1213
+ 0.051
1214
+ 71.3
1215
+ 38.2
1216
+ 15.0
1217
+ 7%
1218
+ 0.66s
1219
+ Table 6: LMC performance for pileup 𝜇 = 200 in an HL-LHC environment with collision energy
1220
+ 14 TeV and interaction region size 𝜎𝑧 = 42 mm. The column 𝑁wrong
1221
+ trk
1222
+ shows the fraction of the
1223
+ tracks, wrongly associated by the clustering algorithm, which can be compared to the true fraction
1224
+ 53% (Table 2).
1225
+ Similarly to the 𝜇 = 63 results, the BDT-based edge weight assignment leads to a significantly
1226
+ worse Silhouette metric value, a much smaller value of the cluster overlap and a larger number of
1227
+ fake clusters, while the PDF ratio and regression-based edge weight calculation approaches provide
1228
+ similar performances. The weighted versions of the VI and Silhouette metrics have significantly
1229
+ better values than the standard ones due to downscaling of the noise.
1230
+ The use of constraints
1231
+ – 14 –
1232
+
1233
+ Edge weight
1234
+ VI
1235
+ VI
1236
+ Silhouette
1237
+ Silhouette
1238
+ Unique
1239
+ Merged
1240
+ Fake 𝑁wrong
1241
+ trk
1242
+ CPU
1243
+ weighted
1244
+ weighted
1245
+ PDF ratio
1246
+ base 1.782
1247
+ 0.990
1248
+ 0.477
1249
+ 0.526
1250
+ 68.7
1251
+ 53.2
1252
+ 6.4
1253
+ 42%
1254
+ 3.0s
1255
+ cnst
1256
+ 1.638
1257
+ 0.887
1258
+ 0.531
1259
+ 0.569
1260
+ 71.0
1261
+ 52.7
1262
+ 5.3
1263
+ 21%
1264
+ 1.7s
1265
+ Regression
1266
+ base 1.753
1267
+ 0.961
1268
+ 0.467
1269
+ 0.517
1270
+ 77.1
1271
+ 51.2
1272
+ 11.
1273
+ 38%
1274
+ 3.2s
1275
+ cnst
1276
+ 1.672
1277
+ 0.895
1278
+ 0.505
1279
+ 0.547
1280
+ 77.8
1281
+ 51.1
1282
+ 9.9
1283
+ 21%
1284
+ 1.7s
1285
+ BDT
1286
+ base 1.691
1287
+ 0.941
1288
+ 0.307
1289
+ 0.040
1290
+ 72.8
1291
+ 52.4
1292
+ 15.
1293
+ 12%
1294
+ 3.0s
1295
+ cnst
1296
+ 1.651
1297
+ 0.882
1298
+ 0.330
1299
+ 0.055
1300
+ 74.5
1301
+ 52.0
1302
+ 14.
1303
+ 9%
1304
+ 1.2s
1305
+ Table 7: LMC performance for pileup 𝜇 = 250 in an HL-LHC environment with collision energy
1306
+ 14 TeV and interaction region size 𝜎𝑧 = 42 mm. The column 𝑁wrong
1307
+ trk
1308
+ shows the fraction of the
1309
+ tracks, wrongly associated by the clustering algorithm, which can be compared to the true fraction
1310
+ 66% (Table 2).
1311
+ significantly improves all quality estimators and provides ∼ 30% CPU reduction.
1312
+ The number of unambiguously reconstructed unique clusters is 53% (44%, 37%) out of the
1313
+ total amount of the reconstructable truth vertices for the pileup 𝜇 = 150 (200, 250). The remaining
1314
+ 56 (90, 125) reconstructable truth vertices are clustered into 25 (40, 52) merged clusters. The
1315
+ correctness of representation of the initial truth vertices by merged clusters is not granted. Truth
1316
+ vertices with a large number of tracks might “absorb” vertices with a small number of tracks.
1317
+ 7.3
1318
+ LMC performance adjustment
1319
+ As can be seen from Tables 4–7, different edge weight assignment approaches lead to non-coinciding
1320
+ clustering results. For a practical application of the LMC approach for primary vertex finding in
1321
+ the LHC experiments, it is important to verify whether a unique optimal clustering solution exists
1322
+ in this problem and, if so, whether the different LMC cost functions can be tuned to provide the
1323
+ same clustering. As explained in Section 5, parameters of the PDF ratio and regression function for
1324
+ the edge weights can be modified to enforce under- or over-segmentation.The PDF ratio function
1325
+ can be scaled up and down. In the logistic regression function, the intercept term can be shifted by
1326
+ a constant. The cost function modifications are tried on the 𝜇 = 150 data. The obtained clustering
1327
+ results are shown in Figure 10 and Figure 11.
1328
+ In the performed test, the exploited metrics change monotonically depending on the scale factor
1329
+ for the PDF ratio and the intercept shift for the linear regression function. It doesn’t seem possible
1330
+ to adjust the PDF ratio and logistic regression parameters so that both approaches provide exactly
1331
+ the same clustering performances in all used metrics. In addition, the BDTG-based Silhouette and
1332
+ Silhouette weighted metrics results (see Table 5) are not reproducible by any modification of the
1333
+ PDF ratio and logistic regression cost functions. However, the overall variations of the clustering
1334
+ results remain limited, which means that the LMC approach performance stays close to optimal in
1335
+ the full scanned parameter range.
1336
+ To conclude, the cost function modification test doesn’t demonstrate the presence of an evident
1337
+ unique globally optimal clustering solution for the problem in consideration. Three used edge
1338
+ – 15 –
1339
+
1340
+ 0.8
1341
+ 0.9
1342
+ 1
1343
+ 1.1
1344
+ PDF ratio scale
1345
+ 0.4
1346
+ 0.5
1347
+ 0.6
1348
+ 0.7
1349
+ 0.8
1350
+ 0.9
1351
+ 1
1352
+ 1.1
1353
+ 1.2
1354
+ 1.3
1355
+ 1.4
1356
+ Metrics
1357
+ VI
1358
+ VI weighted
1359
+ Silhouette
1360
+ Silhouette weighted
1361
+ 0.8
1362
+ 0.9
1363
+ 1
1364
+ 1.1
1365
+ PDF ratio scale
1366
+ 0
1367
+ 20
1368
+ 40
1369
+ 60
1370
+ 80
1371
+ 100
1372
+ Clusters
1373
+ All
1374
+ Unique
1375
+ Merged
1376
+ Fake
1377
+ Resolution
1378
+ 0
1379
+ 0.2
1380
+ 0.4
1381
+ Resolution (mm)
1382
+ Figure 10: PDF ratio cost-based clustering results as a function of the applied scaling.
1383
+ 0.2
1384
+
1385
+ 0
1386
+ 0.2
1387
+ 0.4
1388
+ Regression intercept shift
1389
+ 0.4
1390
+ 0.5
1391
+ 0.6
1392
+ 0.7
1393
+ 0.8
1394
+ 0.9
1395
+ 1
1396
+ 1.1
1397
+ 1.2
1398
+ 1.3
1399
+ 1.4
1400
+ Metrics
1401
+ VI
1402
+ VI weighted
1403
+ Silhouette
1404
+ Silhouette weighted
1405
+ 0.2
1406
+
1407
+ 0
1408
+ 0.2
1409
+ 0.4
1410
+ Regression intercept shift
1411
+ 0
1412
+ 20
1413
+ 40
1414
+ 60
1415
+ 80
1416
+ 100
1417
+ Clusters
1418
+ All
1419
+ Unique
1420
+ Merged
1421
+ Fake
1422
+ Resolution
1423
+ 0
1424
+ 0.2
1425
+ 0.4
1426
+ Resolution (mm)
1427
+ Figure 11: Logistic regression cost-based clustering results as a function of the logistic regression
1428
+ intercept term shift.
1429
+ weight assignment strategies provide different clustering results, which can be additionally changed
1430
+ by simple modification of the cost functions. Therefore, for a practical application as a primary
1431
+ vertex finder, an exact LMC formulation should be chosen based on desired physics requirements,
1432
+ e.g. minimal amount of fake vertices or best vertex–vertex resolution, disregarding the clustering
1433
+ metrics.
1434
+ 7.4
1435
+ Influence of tracks with large measurement errors
1436
+ As the truth cluster overlap is caused by the track position mismeasurement, the overlap degree
1437
+ can be reduced by removing the badly measured tracks by cutting on the track measurement error
1438
+ shown in Figure 2b. A moderate decrease in the total amount of tracks due to this rejection should
1439
+ not significantly affect the overall clustering efficiency as the total amount of tracks per truth vertex
1440
+ is big enough, see Figure 2a. Reduction of the amount of the selected tracks and the degree of the
1441
+ truth cluster overlap due to strongly mismeasured track removal is shown in Table 8. The results
1442
+ – 16 –
1443
+
1444
+ Track error cut
1445
+ 𝑁trk
1446
+ Truth overlap
1447
+ -
1448
+ 1674
1449
+ 41%
1450
+ 0.8
1451
+ 1540
1452
+ 31%
1453
+ 0.6
1454
+ 1444
1455
+ 27%
1456
+ 0.4
1457
+ 1283
1458
+ 22%
1459
+ Table 8: Number of selected tracks and the truth degree of overlap as a function of the track error
1460
+ cut for 𝜇 = 150 data.
1461
+ of the clustering are shown in Figure 12 for the PDF ratio cost function and in Figure 13 for the
1462
+ nominal logistic regression cost function.
1463
+ 0.5
1464
+ 1
1465
+ 1.5
1466
+ Track error cut(mm)
1467
+ 0.4
1468
+ 0.5
1469
+ 0.6
1470
+ 0.7
1471
+ 0.8
1472
+ 0.9
1473
+ 1
1474
+ 1.1
1475
+ 1.2
1476
+ 1.3
1477
+ 1.4
1478
+ Metrics
1479
+ VI
1480
+ VI weighted
1481
+ Silhouette
1482
+ Silhouette weighted
1483
+ 0.5
1484
+ 1
1485
+ 1.5
1486
+ Track error cut (mm)
1487
+ 0
1488
+ 20
1489
+ 40
1490
+ 60
1491
+ 80
1492
+ 100
1493
+ Clusters
1494
+ All
1495
+ Unique
1496
+ Merged
1497
+ Fake
1498
+ Figure 12: PDF ratio cost-based clustering results as a function of the applied track error cut for
1499
+ the 𝜇 = 150 data.
1500
+ 0.5
1501
+ 1
1502
+ 1.5
1503
+ Track error cut(mm)
1504
+ 0.4
1505
+ 0.5
1506
+ 0.6
1507
+ 0.7
1508
+ 0.8
1509
+ 0.9
1510
+ 1
1511
+ 1.1
1512
+ 1.2
1513
+ 1.3
1514
+ 1.4
1515
+ Metrics
1516
+ VI
1517
+ VI weighted
1518
+ Silhouette
1519
+ Silhouette weighted
1520
+ 0.5
1521
+ 1
1522
+ 1.5
1523
+ Track error cut (mm)
1524
+ 0
1525
+ 20
1526
+ 40
1527
+ 60
1528
+ 80
1529
+ 100
1530
+ Clusters
1531
+ All
1532
+ Unique
1533
+ Merged
1534
+ Fake
1535
+ Figure 13: Logistic regression cost-based clustering results as a function of the applied track error
1536
+ cut for the 𝜇 = 150 data.
1537
+ – 17 –
1538
+
1539
+ The distance-based metric demonstrates very small changes in the clustering results in a
1540
+ wide range of the badly measured track admixture and, correspondingly, the initial degree of the
1541
+ vertex overlap. One may conclude that the amount of clusters identified by the LMC algorithm is
1542
+ largely defined by the tracks with small measurement errors and, therefore, is stable with respect
1543
+ to significant track noise admixture. Redistribution of the tracks with big errors over the obtained
1544
+ clusters doesn’t change their amount but evidently strongly affects all track counting-based clustering
1545
+ metrics. The track weighting does mitigate this effect for the VI metric, its weighted version is
1546
+ practically independent of the track noise admixture. Surprisingly, the Silhouette metric is only
1547
+ weakly sensitive to this noise.
1548
+ 7.5
1549
+ Comparison with the existing approaches
1550
+ 6
1551
+
1552
+ 4
1553
+
1554
+ 2
1555
+
1556
+ 0
1557
+ 2
1558
+ 4
1559
+ 6
1560
+ z [mm]
1561
+
1562
+ arbitrary units
1563
+
1564
+ t
1565
+ AMVF, t
1566
+
1567
+ t
1568
+ IVF, t
1569
+ Preliminary
1570
+ Simulation
1571
+ ATLAS
1572
+ = 60
1573
+
1574
+ µ
1575
+
1576
+ = 13 TeV,
1577
+ s
1578
+ 0
1579
+ 10
1580
+ 20
1581
+ 30
1582
+ 40
1583
+ 50
1584
+ 60
1585
+ 70
1586
+ 80
1587
+ interactions per bunch crossing
1588
+ pp
1589
+ Number of
1590
+ 0
1591
+ 10
1592
+ 20
1593
+ 30
1594
+ 40
1595
+ 50
1596
+ 60
1597
+ Average number of reconstructed vertices
1598
+ 100% interaction reconstruction efficiency
1599
+ Reconstruction acceptance
1600
+ t
1601
+ AMVF, t
1602
+ t
1603
+ IVF, t
1604
+ AMVF - MATCHED
1605
+ AMVF - MERGED
1606
+ AMVF - SPLIT
1607
+ AMVF - FAKE
1608
+ ATLAS Simulation Preliminary
1609
+ = 13 TeV
1610
+ s
1611
+ 6
1612
+
1613
+ 4
1614
+
1615
+ 2
1616
+
1617
+ 0
1618
+ 2
1619
+ 4
1620
+ 6
1621
+ z[mm]
1622
+
1623
+
1624
+ 0
1625
+ 200
1626
+ 400
1627
+ 600
1628
+ 800
1629
+ 1000
1630
+ 1200
1631
+ 1400
1632
+ Events / 0.02mm
1633
+ DELPHES simulation LMC Cluster-Cluster distance
1634
+ =0.37mm
1635
+ CC
1636
+ R
1637
+ 0
1638
+ 10
1639
+ 20
1640
+ 30
1641
+ 40
1642
+ 50
1643
+ 60
1644
+ 70
1645
+ 80
1646
+ Number of pp interactions per bunch crossing
1647
+ 0
1648
+ 10
1649
+ 20
1650
+ 30
1651
+ 40
1652
+ 50
1653
+ 60
1654
+ Average number of reconstructed clusters
1655
+ LMC All
1656
+ LMC Unique
1657
+ LMC Merged
1658
+ 100% interaction reconstruction efficiency
1659
+ Reconstruction acceptance
1660
+ Figure 14: The vertex–vertex resolution and the number of reconstructed vertices as a function
1661
+ of the number of 𝑝𝑝 interactions for typical ATLAS data. The upper plots are obtained with the
1662
+ the ATLAS baseline AMVF [4] and IVF [3] algorithms. The bottom plots are obtained using the
1663
+ LMC algorithm with the PDF ratio-based edge weight assignment on DELPHES 𝜇 = 63 data.
1664
+ The DELPHES 𝜇 = 63 simulation is specially tuned to match the ATLAS data used in [4]. The
1665
+ cluster–cluster resolution for the LMC algorithm on the bottom left picture is obtained as described
1666
+ in Section 6.
1667
+ The ATLAS Collaboration used the IVF algorithm [3] to reconstruct the 𝑝𝑝 collision vertices
1668
+ in Run 1 and the AMVF algorithm [4] in Run 2 and Run 3. Essential characteristics of a primary-
1669
+ vertex reconstruction algorithm are the vertex–vertex resolution and the number of reconstructed
1670
+ – 18 –
1671
+
1672
+ vertices as a function of the number of 𝑝𝑝 interactions. The upper plots in Figure 14 present the
1673
+ corresponding distributions for typical ATLAS data for the AMVF and IVF algorithms. The bottom
1674
+ plots show the same distributions provided by the LMC algorithm using DELPHES data tuned to
1675
+ the same pileup conditions.
1676
+ Figure 14 clearly demonstrates that the LMC algorithm outperforms the ATLAS heuristic
1677
+ algorithms. It provides significantly better vertex–vertex resolution. This naturally leads to a larger
1678
+ amount of Unique/Matched vertices reconstructed by LMC, while the amount of Merged vertices
1679
+ remains practically the same. Routine application of the LMC for the primary vertex reconstruction
1680
+ can provide a significant gain in performance for LHC and future collider experiments.
1681
+ 8
1682
+ Conclusion
1683
+ In this work, we have addressed a typical particle physics problem of reconstructing multiple
1684
+ interaction positions in a dense environment, where each interaction is represented by a cluster
1685
+ of tracks. Significant track reconstruction errors lead to a large overlap of truth track clusters,
1686
+ which makes their identification challenging. Heuristic algorithms are usually used to address this
1687
+ problem. In contrast, we propose to address this problem through a principled formulation as a
1688
+ minimum-cost lifted multicut problem. We construct several cost functions for the LMC from
1689
+ track–track distances and their significance. We study the performance of the LMC algorithm
1690
+ for different vertex densities, cost functions, constraint usage and varying degree of overlap. To
1691
+ address potential performance problems of existing track counting clustering metrics for strongly
1692
+ overlapped clusters, dedicated metrics are introduced.
1693
+ We demonstrate that the LMC approach outperforms the heuristic algorithms in the problem
1694
+ of vertex reconstruction in dense environments in terms of vertex–vertex resolution and vertex
1695
+ reconstruction efficiency. It works up to the highest vertex density expected at the HL-HLC project
1696
+ in spite of the strong truth cluster overlap reaching ∼ 60%. Variations of the LMC algorithm
1697
+ parameters and cost functions studied in this work resulted in relatively small variations of the
1698
+ obtained clustering solutions.
1699
+ Acknowledgments
1700
+ This work is supported by the German Science Foundation (DFG) through a research grant and a
1701
+ Heisenberg professorship under contracts CR-312/4-1 and CR-312/5-1.
1702
+ References
1703
+ [1] R. Frühwirth and A. Strandlie, Pattern Recognition, Tracking and Vertex Reconstruction in Particle
1704
+ Detectors. Springer, 2021, 10.1007/978-3-030-65771-0.
1705
+ [2] ATLAS Collaboration, “Primary Vertex Selection in VBF Higgs to Invisibles at 𝜇 = 200 with the
1706
+ ATLAS Experiment.” IDTR-2019-004, 2019.
1707
+ [3] ATLAS Collaboration, Reconstruction of primary vertices at the ATLAS experiment in Run 1
1708
+ proton–proton collisions at the LHC, Eur. Phys. J. C 77 (2017) 332.
1709
+ – 19 –
1710
+
1711
+ [4] ATLAS Collaboration, “Development of ATLAS primary vertex reconstruction for LHC Run 3.”
1712
+ ATL-PHYS-PUB-2019-015, 2019.
1713
+ [5] CMS Collaboration, Description and performance of track and primary-vertex reconstruction with
1714
+ the cms tracker, JINST 9 (2014) P10009.
1715
+ [6] S. Hageböck and E. von Toerne, Medical imaging inspired vertex reconstruction at LHC, Journal of
1716
+ Physics: Conference Series 396 (2012) 022021.
1717
+ [7] W. Waltenberger et al., Rave—a detector-independent vertex reconstruction toolkit, Nuclear
1718
+ Instruments and Methods in Physics Research A (2007) 549.
1719
+ [8] K. Rose, Deterministic annealing for clustering, compression, classification, regression and related
1720
+ optimisation problems, Proceedings of the IEEE 86 (1998) 2210.
1721
+ [9] M. Keuper, E. Levinkov, N. Bonneel, G. Lavoue, T. Brox and B. Andres, Efficient decomposition of
1722
+ image and mesh graphs by lifted multicuts, Proceedings of the IEEE International Conference on
1723
+ Computer Vision, ICCV (2015) .
1724
+ [10] E. D. Demaine, D. Emanuel, A. Fiat and N. Immorlica, Correlation clustering in general weighted
1725
+ graphs, Theoretical Computer Science 361 (2006) 172.
1726
+ [11] S. Chopra and M. R. Rao, The partition problem, Mathematical Programming 59 (1993) 87.
1727
+ [12] A. Horňáková, J.-H. Lange and B. Andres, Analysis and optimization of graph decompositions by
1728
+ lifted multicuts, Proceedings of the International Conference on Machine Learning, ICML (2017)
1729
+ [1503.03791].
1730
+ [13] T. Beier, T. Kroeger, J. Kappes, U. Köthe and F. Hamprecht, Cut, glue & cut: A fast, approximate
1731
+ solver for multicut partitioning, Proceedings of the IEEE Conference on Computer Vision and Pattern
1732
+ Recognition, CVPR (2014) .
1733
+ [14] J. H. Kappes, B. Andres, F. A. Hamprecht, C. Schnörr, S. Nowozin, D. Batra et al., A Comparative
1734
+ Study of Modern Inference Techniques for Structured Discrete Energy Minimization Problems,
1735
+ International Journal of Computer Vision 115 (2015) 155 [1404.0533].
1736
+ [15] T. Beier, B. Andres, U. Köthe and F. A. Hamprecht, An efficient fusion move algorithm for the
1737
+ minimum cost lifted multicut problem, Computer Vision – ECCV 2016. Lecture Notes in Computer
1738
+ Science (2016) .
1739
+ [16] A. Kardoost and M. Keuper, Solving minimum cost lifted multicut problems by node agglomeration,
1740
+ Computer Vision – ACCV 2018 (2019) .
1741
+ [17] DELPHES 3 collaboration, DELPHES 3: a modular framework for fast simulation of a generic
1742
+ collider experiment, JHEP 02 (2014) 057 [1307.6346].
1743
+ [18] C. Bierlich et al., A comprehensive guide to the physics and usage of PYTHIA 8.3, 2203.11601.
1744
+ [19] A. Hoecker et al., TMVA - Toolkit for Multivariate Data Analysis, physics/0703039.
1745
+ [20] M. Meilă, Comparing clusterings—an information based distance, Journal of Multivariate Analysis
1746
+ 98 (2007) 873.
1747
+ [21] P. J. Rousseeuw, Silhouettes: A graphical aid to the interpretation and validation of cluster analysis,
1748
+ Journal of Computational and Applied Mathematics 20 (1987) 53.
1749
+ – 20 –
1750
+
1751
+ A
1752
+ Non-clustered tracks and total reconstructed clusters
1753
+ In this study, we use four simulated event samples representing realistic proton–proton interactions at
1754
+ the LHC with different energies and luminosities. The total amounts of interaction vertices with one
1755
+ reconstructed track and two and more tracks are shown in Table 9. Due to the track measurement
1756
+ errors, the one-track vertices are difficult to reconstruct correctly without a priori information.
1757
+ Finding two and more track vertices becomes problematic if the vertex–vertex distance is less than
1758
+ the typical track measurement error. Both problems are illustrated in Table 9, where the amounts
1759
+ of the one-track and multi-track clusters are given for every cost function and event sample.
1760
+ 13 TeV
1761
+ 14 TeV
1762
+
1763
+ 𝜇
1764
+
1765
+ = 63
1766
+
1767
+ 𝜇
1768
+
1769
+ = 150
1770
+
1771
+ 𝜇
1772
+
1773
+ = 200
1774
+
1775
+ 𝜇
1776
+
1777
+ = 250
1778
+ 𝑁vrt
1779
+ ntrk=1
1780
+ 𝑁vrt
1781
+ ntrk>1
1782
+ 𝑁vrt
1783
+ ntrk=1
1784
+ 𝑁vrt
1785
+ ntrk>1
1786
+ 𝑁vrt
1787
+ ntrk=1
1788
+ 𝑁vrt
1789
+ ntrk>1
1790
+ 𝑁vrt
1791
+ ntrk=1
1792
+ 𝑁vrt
1793
+ ntrk>1
1794
+ Truth
1795
+ 4
1796
+ 50
1797
+ 9
1798
+ 119
1799
+ 12
1800
+ 160
1801
+ 16
1802
+ 199
1803
+ 𝑁cl
1804
+ ntrk = 1
1805
+ 𝑁rec
1806
+ clust
1807
+ 𝑁cl
1808
+ ntrk = 1
1809
+ 𝑁rec
1810
+ clust
1811
+ 𝑁cl
1812
+ ntrk = 1
1813
+ 𝑁rec
1814
+ clust
1815
+ 𝑁cl
1816
+ ntrk = 1
1817
+ 𝑁rec
1818
+ clust
1819
+ PDF ratio
1820
+ 11
1821
+ 44
1822
+ 19
1823
+ 90
1824
+ 23
1825
+ 110
1826
+ 25
1827
+ 128
1828
+ Regression
1829
+ 13
1830
+ 46
1831
+ 25
1832
+ 97
1833
+ 27
1834
+ 118
1835
+ 31
1836
+ 139
1837
+ BDTG
1838
+ 43
1839
+ 50
1840
+ 77
1841
+ 101
1842
+ 102
1843
+ 124
1844
+ 104
1845
+ 140
1846
+ Table 9: Average numbers of non-clustered tracks and reconstructed clusters obtained by the
1847
+ LMC algorithm with different cost functions as compared to the truth numbers of single-track and
1848
+ multi-track vertices. Results are shown for all collision energies and pileup densities.
1849
+ The number of one-track clusters in each case is significantly larger than the truth amount of
1850
+ one-track interaction vertices, especially in the BDTG case. They should be thought of as non-
1851
+ clustered tracks, not as reconstructed one-track vertices. The fraction of multi-track clusters found
1852
+ decreases with the interaction vertex density, as expected.
1853
+ – 21 –
1854
+
E9E5T4oBgHgl3EQfVA-E/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9AyT4oBgHgl3EQfSveK/content/tmp_files/2301.00092v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9AyT4oBgHgl3EQfSveK/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
FtE0T4oBgHgl3EQfRAB3/content/tmp_files/2301.02201v1.pdf.txt ADDED
@@ -0,0 +1,867 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Computer Anxiety: Supporting the Transition
2
+ from Desktop to Mobile
3
+ Thiago Donizetti dos Santos
4
+ Federal University of ABC (UFABC)
5
+ Santo André, SP, Brazil
6
7
+ Vagner Figueredo de Santana
8
+ IBM Research
9
+ São Paulo, SP, Brazil
10
11
+ ABSTRACT
12
+ Computer Anxiety is a phenomenon studied in multiple contexts
13
+ and, in the actual COVID-19 scenario, it is gaining more and more
14
+ importance as it impacts technology adoption and autonomy. Peo-
15
+ ple with Computer Anxiety (PwCA) might feel intimidated, afraid
16
+ of feeling embarrassed or scared of damaging computers, even
17
+ before the actual interaction. Thus, supporting the detection of
18
+ Computer Anxiety at scale has the potential to support the tech-
19
+ nology industry to cope with this challenge. This position paper
20
+ presents a user study involving 39 elderly participants in an inves-
21
+ tigation on the feasibility of using interaction events common to
22
+ desktop and smartphones to predict different levels of Computer
23
+ Anxiety. Moreover, it also proposes research directions about the
24
+ role of smartphones in the context of Computer Anxiety for elderly
25
+ people as a mean of supporting good first user experiences with
26
+ technology, meaningful daily use, privacy, and feeling safe even
27
+ when doing mistakes. We expect this position paper motivates prac-
28
+ titioners, designers, and developers to consider Computer Anxiety
29
+ as one of the existing barriers when creating mobile applications
30
+ for elderly people.
31
+ CCS CONCEPTS
32
+ • Human-centered computing → Field studies.
33
+ KEYWORDS
34
+ Computer Anxiety; Aging; Older Adults; Accessibility; Usability;
35
+ User Experience; smartphones; mobile
36
+ ACM Reference Format:
37
+ Thiago Donizetti dos Santos and Vagner Figueredo de Santana. 2021. Com-
38
+ puter Anxiety: Supporting the Transition from Desktop to Mobile. , 7 pages.
39
+ 1
40
+ INTRODUCTION
41
+ The use of smartphones in daily activities is increasing in a fast pace.
42
+ The ownership of smartphones by adults, in US, grew from 35%
43
+ to 81% in the period between 2011 and 2019 [6]. Smartphones are
44
+ generally used to make and receive calls, to access the internet, to
45
+ text, to access social media and services (e.g., such as food delivery,
46
+ transport, and mobility). Bearing in mind the ownership of devices,
47
+ the rate of people owning smartphones drops from 96% (for the
48
+ Permission to make digital or hard copies of part or all of this work for personal or
49
+ classroom use is granted without fee provided that copies are not made or distributed
50
+ for profit or commercial advantage and that copies bear this notice and the full citation
51
+ on the first page. Copyrights for third-party components of this work must be honored.
52
+ For all other uses, contact the owner/author(s).
53
+ CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13,
54
+ 2021, Yokohama, Japan
55
+ © 2021 Copyright held by the owner/author(s).
56
+ group aging between 18 and 29 years) to 53% (for the group aging
57
+ 65+ years) [6]. This difference shows that elderly people are increas-
58
+ ingly using smartphones, but have not yet adopted this technology
59
+ in the same way as young adults, which may indicate the existence
60
+ of aspects impacting the adoption of smartphones by elderly users.
61
+ Since a variety of services and content are currently available
62
+ online, the difficulties faced by elderly people while using smart-
63
+ phones may impact their quality of life. Through the use of mobile
64
+ applications, one could order food, get a driver using a transport
65
+ app, travel alone using maps, communicate with family members
66
+ using instant messaging, learn new things on e-learning platforms
67
+ or just browse photos and other contents on the social media appli-
68
+ cations. Such services foment autonomy and help to avoid common
69
+ stereotypes of dependency and limitations.
70
+ One phenomenon that can help in the understanding of issues
71
+ faced by the elderly people when using new technologies is Com-
72
+ puter Anxiety (CA). CA can be defined in terms of affective factors
73
+ such as intimidation, fear, apprehension, hostility, and worries that
74
+ one will be embarrassed, will look stupid, or thinks she/he could
75
+ damage the computer [15]. Although generally related to the use of
76
+ computers, CA can also impact the use of other electronic devices
77
+ and previously was also called “Technophobia” [3]. CA is related
78
+ to technology acceptance [36] and it is generally related to biologi-
79
+ cal changes such as blood pressure, heart rate and electrodynamic
80
+ responses that occur while a person is using a device [30]. CA
81
+ symptoms can occur during the interaction with the system and
82
+ even before it, affecting the perceived ease of use and acting as a
83
+ barrier, impacting the system accessibility as well [35]. Although
84
+ CA can affect people of all ages, the literature shows that CA is
85
+ more present in older groups [7, 12, 35]. Adding this to the rela-
86
+ tionship between CA and technology acceptance, elderly people
87
+ may face problems to use mobile devices and, when they use it, CA
88
+ could make the system difficult to use, make them perform poorly
89
+ on tasks or fail to achieve their goals while using the device.
90
+ In this context, this position paper presents results from a user
91
+ study involving 39 elderly participants aiming at exploring the
92
+ feasibility of predicting CA from interaction events common to
93
+ desktop and smartphones, mapped here as a regression problem.
94
+ In addition, it also discusses the role of smartphones in supporting
95
+ people with CA (PwCA) in the process of learning how to use
96
+ technology, first experience, daily use, and autonomy. Thus, the
97
+ following research questions were defined to guide the study: (1)
98
+ Is it possible to predict different levels of CA using interaction events
99
+ common to desktop and smartphones? and (2) How can smartphones
100
+ be used to support the adoption of new technologies by PwCA? The
101
+ work is organized as follows: the section 2 presents the related
102
+ work, the section 3 details the user study, the section 4 shows the
103
+ arXiv:2301.02201v1 [cs.HC] 5 Jan 2023
104
+
105
+ CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
106
+ Thiago Donizetti dos Santos and Vagner Figueredo de Santana
107
+ results, section 5 discusses the role of smartphone for PwCA and
108
+ section 6 concludes.
109
+ 2
110
+ RELATED WORK
111
+ CA is also called Computerphobia, Computer Apprehension, and
112
+ Technophobia in the literature [3]. Rosen et al. [32] pointed out the
113
+ following methods and questionnaires to measure CA:
114
+ • Computer Anxiety Index (CAIN) examines avoidance of,
115
+ caution with, negative attitudes toward, and disinterest in
116
+ computers [23].
117
+ • Computer Attitude Scale (CAS) assesses computer liking,
118
+ confidence, and anxiety through a Likert attitude-measurement
119
+ format [21].
120
+ • Attitudes Toward Computers Questionnaire (ATCQ) as-
121
+ sesses attitudes towards computer appreciation, usage, and
122
+ societal impact [31].
123
+ • Computer Anxiety Rating Scale (CARS) assesses behav-
124
+ ioral, cognitive, and affective components related to technol-
125
+ ogy use [15, 32].
126
+ • Mobile Computer Anxiety Scale (MCAS) assesses anxiety
127
+ regarding mobile computer using a 38-item Likert scale [39].
128
+ The literature presents multiple factors associated with CA. In
129
+ sum, PwCA usually have less experience in using computers, have
130
+ low Computer Self-efficacy (CSE)1, take too long to accomplish
131
+ tasks, perform worse when compared to other users, have negative
132
+ beliefs about computer/skills, or negative bodily sensations previ-
133
+ ous/during the interaction with a computer [35]. Earlier studies find
134
+ a strong relationship between age and CA levels, showing evidence
135
+ that CA is more present in groups with older people and that they
136
+ have more CA than younger ones [7, 12, 27]. This can be related
137
+ to the pace in which technology advances and to the fact that 48%
138
+ of older adults report that they usually need someone else to set
139
+ up a new electronic device or show them how to use it [5]. In this
140
+ scenario, mobile accessibility has potential to support PwCA in
141
+ increasing CSE, reducing negative beliefs and worries of using or
142
+ damaging the device in front of other people.
143
+ CA is also present in a few acceptance models. The Technology
144
+ Acceptance Model (TAM) is one example. It uses the CA as a compo-
145
+ nent that changes the perceived ease of use2. So, when considering
146
+ the adoption of new technology by elderly people, CA should be
147
+ taken into account, from design to personalization features.
148
+ The influence of CA was investigated in contexts such as accep-
149
+ tance of e-learning tools, e-gov, new technologies and health-care
150
+ systems [8, 14, 17, 18, 22, 29, 36]. These studies stated that:
151
+ • PwCA tend to prefer traditional classes instead of e-learning
152
+ systems and computer-based tests;
153
+ • PwCA usually perform worse on virtual classes when com-
154
+ pared to people without CA;
155
+ • PwCA have more difficulties in accepting new technologies;
156
+ • Older PwCA face difficulties using home telehealth services
157
+ and to learn how to use smartphones.
158
+ 1Computer Self-efficacy (CSE) is the belief one has in his/her own abilities to perform
159
+ a task in the computer [9]
160
+ 2Perceived ease of use is defined as the degree to which a person believes that using a
161
+ particular system would be free of effort [1]
162
+ Considering support offered to PwCA, the literature presents
163
+ that instructional/technical support reduce CA in the context of
164
+ e-learning systems [13, 24, 26]. Finally, smartphones have potential
165
+ to provide instructional support in a privacy respecting way, sup-
166
+ porting the user-technology dialog, reducing worriers associated
167
+ to trial and error inherent to learning.
168
+ 3
169
+ METHOD
170
+ This section details how the user study was run, including its materi-
171
+ als, procedure, setup, experiment design, and data analysis planned.
172
+ The goal of the study was to collect data related to questionnaires
173
+ to identify different CA levels and collect detailed interaction data
174
+ while participants performed tasks on a website in order to detect
175
+ CA. Moreover, this study also aimed at exploring interaction data
176
+ common to desktop and smartphone and at understanding the role
177
+ of smartphone usage for PwCA. The types of data captured will be
178
+ detailed in the Data Analysis section. Before the main experiment,
179
+ a pilot was performed in order to assess the user study plan as
180
+ whole. The pilot included 4 elderly participants, recruited the same
181
+ way the participants of the main experiment (detailed in the next
182
+ section). The pilot achieved its goals in assessing protocol adopted,
183
+ duration, and data capture procedure. Next, we detail the method
184
+ followed in the main experiment.
185
+ 3.1
186
+ Participants
187
+ Elderly people may face difficulties in staying up-to-date with tech-
188
+ nology and, since they have not used computers since childhood,
189
+ many of them face CA even when performing a simple task to
190
+ others age groups [35]. Hence, the target-audience considered in
191
+ this work is elderly people.
192
+ The participants of the experiment were recruited from a list
193
+ of registered people at the elderly center of the city of São Paulo,
194
+ Brazil, called Reference Centre for Citizenship of Elderly (CRECI@).
195
+ São Paulo is the biggest city in Latin America, with a population
196
+ of approximately 11.2 million people in the last census (2010) and
197
+ the current estimate is of 12.2 million people3; the population of
198
+ elderly people is approximately 11.9%4. Before recruiting partici-
199
+ pants, a partnership was signed and the proper process for ethics
200
+ committee was followed at the Federal University of ABC (process #
201
+ 2.808.392 and CAEE: 94704418.8.0000.5594), detailing the materials,
202
+ procedure, questionnaires, data to be collected, and analysis to be
203
+ performed.
204
+ Moreover, only those who had never taken computer classes
205
+ offered by CRECI@ were invited as potential participants, since
206
+ results from the literature point that computer classes might reduce
207
+ CA [35], which could result in a bias.
208
+ 3.2
209
+ Materials
210
+ Questionnaires about CA, use of smartphones and computers skills
211
+ were applied (Appendix A). In order to isolate CA from other co-
212
+ morbidities, questionnaires to assess cognitive abilities and levels
213
+ of depression were also applied. Only participants with low levels
214
+ of depression and those who do not present signals of dementia or
215
+ 3https://cidades.ibge.gov.br/brasil/sp/sao-paulo/panorama
216
+ 4http://produtos.seade.gov.br/produtos/retratosdesp/view/index.php?
217
+ temaId=1&indId=4&locId=3550308
218
+
219
+ Computer Anxiety: Supporting the Transition
220
+ from Desktop to Mobile
221
+ CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
222
+ cognitive deficits had their data considered in the analyses. These
223
+ two metrics were considered in the exclusion criteria, detailed in
224
+ the procedure. The questionnaires applied are listed below:
225
+ • Technology use and profile: Has questions about the par-
226
+ ticipant’s age, educational level, and frequency of use of
227
+ computers and smartphones. This questionnaire was applied
228
+ to give an overview of how participants use technology on
229
+ a daily basis (Appendix A).
230
+ • Mini Mental: A cognitive screening test used for adults and
231
+ the elderly to evaluate orientation, memory and attention,
232
+ naming ability, obedience to verbal and writing commands,
233
+ free writing of a sentence, and copying a complex drawing
234
+ (two intersecting polygons). It is currently the most used test
235
+ for this type of assessment in the world [25]. The rationale
236
+ for using Mini Mental was to identify comorbidity to CA.
237
+ • Geriatric Depression Scale (GDS): GDS is a scale with 30
238
+ yes/no questions used for screening depression in elderly
239
+ people [2, 40]. The rationale for using GDS was also to iden-
240
+ tify comorbidity to CA.
241
+ • Computer Anxiety Rating Scale (CARS): CARS has nine-
242
+ teen questions in a five points Likert scale ranging from
243
+ strongly disagree to strongly agree. It assesses the behavioral,
244
+ cognitive and affective components related to technology
245
+ use [15, 32]. The rationale for using CARS is that it is the
246
+ most referenced questionnaire for screening CA [35].
247
+ • Computer Self-Efficacy (CSE): CSE is a ten items scale used
248
+ to assess Computer Self-efficacy [9, 38]. The rationale for
249
+ using CSE was to cross check the results from this study
250
+ with results from the literature that show that CSE has a
251
+ strong but inverse relationship with CA.
252
+ • System Usability Scale (SUS): A five points Likert scale ques-
253
+ tionnaire with ten items. It is often used to assess the per-
254
+ ceived usability [4]. The rationale for using it was to compare
255
+ perceived usability of the website and the CARS values.
256
+ In order to capture the interaction data, the participants used a
257
+ desktop computer including a interaction logger and internet access.
258
+ The interaction logger used was the open source logger called User
259
+ Test Logger5. The User Test Logger captures all JavaScript events
260
+ such as mouse movements, clicks, keys pressed, etc., and generates
261
+ a raw log file where each line represents an event and information
262
+ about when, where, and what is related to the event triggered [34].
263
+ 3.3
264
+ Procedure
265
+ The experiment was structured into three steps: pre-test, test, and
266
+ post-test. The steps are detailed next.
267
+ 3.3.1
268
+ Pre-test. First, screening tests for cognitive deficit, depres-
269
+ sion, and literacy were applied to identify participants whose scores
270
+ fall outside the inclusion criteria. The Mini Mental presents a score
271
+ indicating good cognitive capacity relating the answer points ob-
272
+ tained and years of education of the participant as follows:
273
+ • No formal education: ≤ 21 points;
274
+ • 1 to 5 years of formal education: ≤ 24 points;
275
+ • 6 to 11 years of formal education: ≤ 26 points;
276
+ • 12+ years of formal education: ≤ 27 points
277
+ 5https://github.com/IBM/user-test-logger
278
+ For GDS screening test, a score of four points or less on the scale
279
+ indicates low levels of depression. Hence, the exclusion criterion
280
+ was: 𝐺𝐷𝑆 ≥ 5 points. After the tests considered in the exclusion
281
+ criteria, CARS and CSE were applied.
282
+ 3.3.2
283
+ Test. The tasks were performed individually on a computer
284
+ with the User Test Logger installed. First, each participant was asked
285
+ to access SESC homepage (Figure 1). The Social Service of Com-
286
+ merce (SESC) is a private entity maintained by the entrepreneurs of
287
+ the trade in goods, tourism, and services. SESC aims to provide the
288
+ welfare and quality of life to workers in this sector and their fami-
289
+ lies 6. SESC offers many activities for elderly people such as courses,
290
+ sports, art exhibition and culture-related events in multiple units in
291
+ the metropolitan area of São Paulo. The tasks were defined aiming
292
+ to encourage participants to search online for activities offered by
293
+ SESC and others services in the city, hoping to help them to see the
294
+ internet as a tool which they can use as a means of improving their
295
+ quality of life. The same way they do at CRECI@. In addition, the
296
+ tasks were structured to be as familiar and as close to real tasks as
297
+ possible. The tasks read out loud to participants were the following:
298
+ (1) Search for an event, class, or activity he/she might be inter-
299
+ ested;
300
+ (2) Find the address of the unit where the chosen activity/event
301
+ is offered;
302
+ (3) Find the route to the unit.
303
+ Figure 1: Homepage of the SESC’s website.
304
+ There was no maximum time limit for the tasks. Thus, the task
305
+ duration depended on participants saying whether they finished or
306
+ gave up on the task. Finally, Thinking-Aloud Protocol [20] was used
307
+ to understand the rationale of users while performing the tasks.
308
+ 3.3.3
309
+ Post-test. In order to evaluate the perceived usability and
310
+ any relationship with CA levels, they were asked to answer the
311
+ SUS questionnaire.
312
+ 3.4
313
+ Data analysis
314
+ According to the exclusion criteria defined, the data from partic-
315
+ ipants who did not score the points required by Mini Mental or
316
+ scored five or more points on GDS were removed from the data set
317
+ to be analyzed. The resulting data set combined data from the inter-
318
+ action logger, questionnaires, and thinking-aloud protocol. Since
319
+ the logged data were in raw format, all data captured were pro-
320
+ cessed in order to extract usage metrics. The following metrics were
321
+ considered having in mind they could also be applied in a mobile
322
+ interaction setting: time to perform the task, number of clicks and
323
+ double-clicks, click duration, typing velocity, and total time typing.
324
+ 6https://www.sescsp.org.br/
325
+
326
+ 3 Pagina Inicial - Sesc SP - Mozilla Firefox
327
+ Debugging with Firefox Developer T X
328
+ S Pagina Inicial - Sesc SP
329
+ +
330
+ @ https://www.sescsp.org.br
331
+ Q Pesquisar
332
+ 国三不
333
+ Um Portal para cada um!
334
+ Login
335
+ Esqueci a senha I Cadastre-se
336
+ Para ver os destaques da programagao de acordo com seus interesses
337
+ fEntrar com Facebook
338
+ ou
339
+ email
340
+ senha
341
+ ok
342
+ online, cadastre-se aqui.
343
+ OPORTUNIDADES
344
+ + CREDENCIAL PLENA
345
+ Meu perfil
346
+ Sesc
347
+ SAO PAULO
348
+ O que voce procura?
349
+ 0000.
350
+ Projeto Sawe
351
+ Encontros no Sesc Ipiranga debatem a luta dos
352
+ indios pela defesa de seus territorios e os desafios de
353
+ construir o futuro mediante contextos impostos pela
354
+ sociedade nao indigenaCHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
355
+ Thiago Donizetti dos Santos and Vagner Figueredo de Santana
356
+ Finally, all metrics and the questionnaires scores were combined
357
+ in a single comma-separated-values (CSV) file used to perform
358
+ the data analysis. This CSV file is the main data source for the
359
+ regression analysis performed to predict CARS values based only
360
+ on interaction data, which could allow its use at scale.
361
+ 4
362
+ RESULTS
363
+ The experiment included 39 participants, but data from 8 partici-
364
+ pants were not considered in the analysis due to exclusion crite-
365
+ ria. Thus, considering the data from the remaining 31 participants
366
+ (51.61% of males, 48.39% of females). The participants’ ages ranged
367
+ between 62 and 87 years (𝑥 = 72.84). Regarding the computer usage,
368
+ 25.81% of the participants reported that they do not own a computer
369
+ and do not have frequent access to computers, while 12.90% do not
370
+ own a computer, but use it at lanhouses or those available in public
371
+ places; 61.29% reported owning computers. Regarding frequency
372
+ of use, 61.29% reported that rarely (less than once a month) use a
373
+ computer, 16.13% reported that use it sometimes (more than once
374
+ a month), 6.45% reported that usually (more than once a week)
375
+ use it, and 16.13% reported that always (everyday) use computers.
376
+ When considering ownership and use of smartphones, 87.10% of
377
+ the participants reported that they own smartphones and 48.39%
378
+ reported that they always use it. The education level of the par-
379
+ ticipants varies from 0 to 15 years of formal education (𝑥 = 10.42)
380
+ (Figure 2).
381
+ Figure 2: Distribution of years of formal education.
382
+ The obtained scores for CARS ranged from 20 to 59 (𝑥 = 42.19).
383
+ Based on [10], the maximum and minimum scores were used to
384
+ divide the data into 3 groups as follows: 𝐶𝐴𝑅𝑆_𝑟𝑎𝑛𝑔𝑒 : 59 − 20 = 39
385
+ and 𝐺𝑟𝑜𝑢𝑝_𝑟𝑎𝑛𝑔𝑒 : 𝐶𝐴𝑅𝑆_𝑟𝑎𝑛𝑔𝑒/3 = 13.
386
+ • No CA: CARS < 33 (6 participants);
387
+ • Moderate CA: 33 ≤ CARS < 46 (14 participants);
388
+ • High CA: CARS ≥ 46 (11 participants).
389
+ Considering the three CA groups, Figure 3 shows the presence of
390
+ CA considering the participants’ age. It can be seen that participants
391
+ in the no CA group are among the youngest. The age of these
392
+ participants ranged from 63 to 78 years old (𝑥 = 68.43, 𝜎 = 5.68).
393
+ The age of the participants in the moderate CA group ranged from
394
+ 62 to 83 years old (𝑥 = 73.92, 𝜎 = 5.60). And, for the high CA group,
395
+ the age of the participants ranged from 63 to 87 (𝑥 = 74.36, 𝜎 = 6.77),
396
+ showing that high levels of CA are present over almost the entire
397
+ age range covered in the study. Mann-Whitney non-parametric test
398
+ shows that age was different between no CA and moderate CA
399
+ groups (p-value = 0.03); no significant difference was found in other
400
+ pairwise group comparisons.
401
+ Figure 3: Age distributions for different CA groups.
402
+ Bearing in mind the use of smartphones, Figure 4 shows smart-
403
+ phone ownership and different uses by different CA groups. It can
404
+ be seen that high CA group uses smartphones more for calls and less
405
+ for leisure and other communication activities (e.g., games, music,
406
+ video, instant messages, and social networks). On the other hand,
407
+ people in the no CA group use smartphone heavily to access social
408
+ network, instant messages, and internet. Analyzing the ownership
409
+ rate by CA groups, it can be seen that 73% of the participants with
410
+ high CA own smartphones, while the ownership is greater in the
411
+ moderate CA group (92%) and reaches 100% for the no CA group.
412
+ Similarly, considering the frequency of use of computers, people
413
+ who rarely use computers are the ones with greater CA levels. 82%
414
+ of the participants with high CA use it rarely, while it is 61.5% of
415
+ the participants of the moderate CA and 28% of the no CA group.
416
+ Figure 4: Smartphone ownership and use by CA groups.
417
+ Bearing in mind task completion, 23 (74.19%) participants found
418
+ an activity and completed the first task. Four participants found an
419
+ activity that was not of interest to them or was offered by a unit
420
+ far from their home, but they did not find another one after that.
421
+ The remaining four gave up without finding an activity. For the
422
+ Task 2, nine out of 23 (39.13%) participants found the address of
423
+ the unit where the selected activity is offered and 14 participants
424
+ found only the name of the unit. Regarding the Task 3, six out of
425
+ nine (66.67%) participants found the map available on the site, but
426
+ all of them failed to find the route to the unit. Only two out of
427
+ nine (22.22%) participants figured out how to put the starting point
428
+ address on the map-based UI. In sum, task completion dropped from
429
+ 74.19% (task 1), to 39.13% (task 2), and to 0% (task 3); 22.22% (6.45%,
430
+ considering 31 participants) partially completed the last task. This
431
+ can be related to task difficulty, fatigue effects, and task dependence.
432
+
433
+ Education levels (in years)
434
+ 12
435
+ participants
436
+ 10
437
+ Number of
438
+ 2
439
+ 0
440
+ 4
441
+ 6
442
+ 8
443
+ 10
444
+ 11
445
+ 13
446
+ 14
447
+ 15
448
+ Education yearsAge vs. CARS groups
449
+ 85
450
+ 80
451
+ e
452
+ 75
453
+ 70
454
+ 65
455
+
456
+ No CARS
457
+ Moderate CARS
458
+ High CARSSmartphone use x Computer Anxiety Leve
459
+ Music/Video
460
+ Message
461
+ Games
462
+ Call
463
+ Instant Message
464
+ Social networks
465
+ Internet
466
+ Smartphone ownership
467
+ 0%
468
+ 10%
469
+ 20%
470
+ 30%
471
+ 40%
472
+ 50%
473
+ 60%
474
+ 70%
475
+ 80%
476
+ %06
477
+ 100%
478
+ No CA
479
+ Moderate CA
480
+ High CAComputer Anxiety: Supporting the Transition
481
+ from Desktop to Mobile
482
+ CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
483
+ However, after triangulating these results with thinking-aloud data,
484
+ it was possible to identify that participants faced difficulties with
485
+ the map-based UI. For instance, participant 11 said: “It doesn’t say
486
+ where it is. I didn’t like SESC.”, participant 35 said: “Why don’t you
487
+ have the address on the about the unit page?” and participant 42
488
+ said: “It will take me a long time to find it (address)”. While using
489
+ the map, for instance, participant 22 said: “What should I do here?
490
+ I have never used it (map) before”; participants are numbered from
491
+ 1-4 for the pilot and 5-43 for the experiment.
492
+ Table 1 summarizes the time taken by each group to complete
493
+ the tasks, showing the mean time and standard deviation by CA
494
+ group. It can be seen that the group of participants with high CA
495
+ had a mean shorter task time than the other groups in some tasks.
496
+ This might be related to the fact that PwCA usually gave up more
497
+ because they feel frustrated, lost, or think that they would not be
498
+ able to finish the task. This also shows the relationship between
499
+ high CA and low CSE, as identified in previous studies [35] and
500
+ [11]. This can be exemplified by the participants quotes as: “I think
501
+ I will have difficulty in this task”, “This is difficult”, “I’m lost, I don’t
502
+ know what to do”, and “I don’t know how to find it”.
503
+ Task 1 in sec.
504
+ Task 2 in sec.
505
+ Task 3 in sec.
506
+ Group
507
+ 𝑥 (𝜎)
508
+ 𝑥 (𝜎)
509
+ 𝑥 (𝜎)
510
+ High CA
511
+ 411.18 (230.72)
512
+ 599.67 (220.30)
513
+ 398.00 (262.19)
514
+ Mod. CA
515
+ 647.90 (666.46)
516
+ 450.13 (336.52)
517
+ 560.50 (30.50)
518
+ No CA
519
+ 525.14 (331.39)
520
+ 587.00 (390.73)
521
+ 399.67 (375.05)
522
+ Table 1: Average task time by group and standard deviations.
523
+ Although the interaction data was collected during the use of a
524
+ desktop computer, in this study we explore metrics which can be
525
+ captured in a mobile setting as well, namely: task time, numbers
526
+ of clicks and double clicks, mean click duration (interval between
527
+ pressing and releasing), typing velocity and total time typing. All
528
+ metrics were normalized for the regression analysis. Prior to fit-
529
+ ting the regression model, a random oversampling algorithm was
530
+ applied7 addressing the minority values and a train-test split of
531
+ 80% / 20% was applied. Figure 5 shows Random Forest regression
532
+ predictions for CA values (y-axis) vs. CARS values in the test set
533
+ (x-axis). The obtained regressor has a mean squared error (MSE) of
534
+ 22.21 and 𝑅2 = 0.84. The high MSE value is due to errors related to
535
+ predictions for lower CA scores. This pessimist prediction would
536
+ show that users need more support than they would actually need,
537
+ so such regressor might be useful for indicating when support for
538
+ PwCA could be applied.
539
+ 5
540
+ DISCUSSION
541
+ Although there are few studies reporting no significant relationship
542
+ between age and CA [16, 19, 28], there are also evidences that older
543
+ people manifest more CA than younger ones [7, 12, 27, 33, 37].
544
+ Results suggest that younger participants were in the no CA group,
545
+ while the older were in the moderate CA group. For high CA group,
546
+ results suggest that there were participants with high CA almost
547
+ in the whole age range considered, but it still shows a greater
548
+ concentration among the older ones (median = 74 years, 𝑥 = 74.2,
549
+ 7https://imbalanced-learn.org/stable/over_sampling.html
550
+ Figure 5: Regression test results of CARS scores prediction.
551
+ 𝑠𝑖𝑔𝑚𝑎 = 7.12). These results are similar to other findings in the
552
+ literature, indicating that the CA is more present in the older groups.
553
+ Moreover, unlike [30], the results suggest that previous experience
554
+ may impact CA levels, since people who rarely use computers and
555
+ smartphones were the ones with greater CA levels.
556
+ The difficulty in adopting new technologies is suggested by re-
557
+ sults in Figure 4. Although there is a high rate of PwCA owning
558
+ smartphones, the most frequent reported use is making calls. Thus,
559
+ the participants use the smartphone, but they use the same way
560
+ they used to do with the old phones: making calls. Moreover, the no
561
+ CA group presented the same rate (57%) when using smartphones
562
+ to make calls, using instant message and social networks apps. In
563
+ contrast, moderate and high CA groups use more to make calls
564
+ than to any of the other functions analyzed. Also they use more
565
+ to make calls then the no CA group and presented a lower rate of
566
+ ownership of smartphones than the no CA group. The increasing
567
+ rate of smartphone ownership and the decreasing rate of use of
568
+ different smartphone functions show possible impacts of CA on
569
+ the behavior of the elderly regarding technology. The second most
570
+ frequent use is instant message apps, even though there is also a
571
+ difference between groups for this use. The use of this application
572
+ could be related to the presence of functions such as the ability to
573
+ make calls using the app or using voice messages. They reported to
574
+ be used to make calls and that the use of voice messages is easier for
575
+ them, since they generally have difficulties using the keyboard of
576
+ the smartphones to write and may have difficulty in reading due to
577
+ the size of the screen and letters. These findings suggest that high
578
+ levels of CA may affect people of all ages, but it is more present
579
+ among older ones due to factors such as lack of practice or lack of
580
+ knowledge about recent features that could improve UX.
581
+ The results regarding task completion and time taken to complete
582
+ tasks show how CA levels might affect task performance. Besides
583
+ the low task completion rate for the high CA group, this group
584
+ took less time trying to complete the Task 1, showing that PwCA
585
+ usually gave up more. The implications for HCI researchers in this
586
+ aspect are related to the design of shorter and simpler tasks and to
587
+ improve user experience, accessibility and usability, since high CA
588
+ levels impact negatively the perceived easy of use and CSE, as they
589
+ may feel frustrated or lost when facing problems to achieve their
590
+ goals during the interaction.
591
+
592
+ Random Forest Regression
593
+ 50
594
+ 30
595
+
596
+ 21
597
+ 31
598
+ 50
599
+ CARSCHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
600
+ Thiago Donizetti dos Santos and Vagner Figueredo de Santana
601
+ CA is also related to specific situations since it tends to arise or
602
+ be stronger during the first use of a device [17]. Thus, in addition
603
+ to promoting the contact of the elderly with new technologies, it is
604
+ important to promote a good first experience. It means an experi-
605
+ ence free of effort, that helps the user to feel safe and unafraid of
606
+ making mistakes. A bad experience, during which the user feels lost
607
+ or makes mistakes, can reinforce the fears of PwCA. Consequently,
608
+ this can increase their CA levels, making them believe they are
609
+ unable to use it and prevent them from trying again.
610
+ The results of the Random Forest regression show that CA in-
611
+ fluences on how users interact with the system. Although the data
612
+ belongs to desktop computer interaction domain, the result sug-
613
+ gests that such approach should be explored in the mobile settings
614
+ as well, given that the interaction events selected are common to
615
+ desktop and smartphones. The prediction of higher CARS values
616
+ could trigger personalization features and additional support, for
617
+ instance. Smartphones have a myriad of sensors that could be used
618
+ for such personalization features and here we advocate the use of
619
+ the following metrics as a starting point: task time, numbers of
620
+ clicks and double clicks, mean click duration, typing velocity and
621
+ total time typing.
622
+ This paper defends the idea that the use of smartphones by the
623
+ elderly can bring benefits such as autonomy, access to content and
624
+ services and communication. However, CA may create barriers
625
+ which prevent elderly from enjoying these benefits. Therefore, we
626
+ argue that further studies are needed regarding the influences of
627
+ levels of CA in acceptance of smartphones and apps by the elderly
628
+ people. On his work about the development of a mobile computer
629
+ anxiety scale (MCAS), [39] argues that MCAS is related to three
630
+ distinct components: (1) traditional CA construct; (2) Internet anxi-
631
+ ety construct and (3) special factors making up the mobile anxiety
632
+ construct (e.g., equipment limitation). The limitations of mobile
633
+ equipment listed by [39] and that elderly people report as being
634
+ problematic for them are: small screens and small multi-function
635
+ key pads; lower display resolution; unfriendly user-interfaces; and
636
+ graphical limitations. Thus, these limitations should be considered
637
+ when developing new technologies for elderly people as well. Fur-
638
+ thermore, the importance of the first experience is found in the
639
+ literature and reported in the interviews conducted in this study.
640
+ They reported having purchased or been presented with a new
641
+ smartphone and feeling lost or afraid to use it. So, it is important
642
+ that the device has a simple, accessible and usable interface. Another
643
+ common factor reported, is the fear of making mistakes, looking
644
+ stupid or breaking the device. In this sense, it is important that the
645
+ system provides a safe environment, which asks for confirmation
646
+ for important (dangerous) actions. And, in case the user makes a
647
+ mistake, the system must provide ways to recover from the error,
648
+ returning to the previous state without difficulty.
649
+ In Brazil, families often have a computer to be shared by family
650
+ members. It can make elderly people afraid of breaking what be-
651
+ longs to the family or afraid of losing some important data if they
652
+ do something wrong. The smartphone, on the other hand, is seen
653
+ as an personal device. According to the participants’ reports, this
654
+ brings greater freedom to learn how to use through trial and error.
655
+ Besides that, as it is mobile, it has the advantage that elderly people
656
+ can avoid to use it in front of other people. This can help dealing
657
+ with the fear of not knowing how to use it or making mistakes in
658
+ front of younger people.
659
+ Finally, we believe a research agenda about the role of smart-
660
+ phones for elderly people in the context of CA should address the
661
+ following research questions: (1) How to detect CA during the use
662
+ of mobile phones at scale? (2) How to provide (first) good user
663
+ experiences for this population? (3) How to create a secure envi-
664
+ ronment for PwCA to recover from mistakes? (4) How to combine
665
+ technology use with learning in order to increase CSE? (5) How
666
+ CA on the desktop relates to CA on smartphones?
667
+ 6
668
+ CONCLUSION
669
+ This position paper discussed how elderly people use smartphones
670
+ in a specific region of São Paulo, Brazil, and shows how CA is
671
+ present in this sample of the population. Our findings suggest
672
+ that higher CA levels are prevalent on higher age and CA impacts
673
+ how users interact with technologies. In addition, results indicate
674
+ that the behavior of elderly users when performing tasks can be
675
+ negatively impacted not only because of age-related factors, but
676
+ also by the CA levels. The results indicating the preference of some
677
+ applications over others by elderly people indicate the need for
678
+ further studies on why some technologies still present barriers
679
+ for PwCA. Moreover, the shorter task time obtained by the high
680
+ CA group and the fact that they usually gave up when feel lost
681
+ shows the importance of shorter and simpler tasks. The differences
682
+ between groups regarding ownership of smartphones show that
683
+ CA may impact on the technology adoption. In addition, the results
684
+ showing the preference for known functions can be important to
685
+ designers and developers to consider when developing new systems,
686
+ since the inclusion of functions considered easy to use may increase
687
+ the system adoption and improve user experience by reducing
688
+ frustration.
689
+ Finally, tackling technology adoption by elderly people may im-
690
+ prove their quality of life, since the use of smartphones and the
691
+ wide variety of applications and services may help they achieve
692
+ independence, make their lives more comfortable, promoting their
693
+ better participation in the community and allowing access to the
694
+ most diverse online content. The presented user test shows that
695
+ metrics such as task time, number of clicks, click duration, typing
696
+ speed and total time typing can support the prediction of different
697
+ CARS scores (𝑅2=0.84). In the current context of the COVID-19 pan-
698
+ demics, promoting autonomy, communication and leisure activities
699
+ became core goals for any technology and here we emphasize that
700
+ by understanding CA and considering it in design and development
701
+ phases mobile apps have the potential to change the live of PwCA.
702
+ ACKNOWLEDGMENTS
703
+ We thank the CRECI@ for all the support. This study was financed
704
+ in part by the Coordenação de Aperfeiçoamento de Pessoal de Nível
705
+ Superior - Brasil (CAPES) - Finance Code 001.
706
+ REFERENCES
707
+ [1] Fazil Abdullah, Rupert Ward, and Ejaz Ahmed. 2016. Investigating the influence
708
+ of the most commonly used external variables of TAM on students’ Perceived
709
+ Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios. Computers in
710
+ Human Behavior 63 (2016), 75–90.
711
+ [2] Osvaldo P. Almeida and Shirley A. Almeida. 1999. Confiabilidade da versão
712
+ brasileira da Escala de Depressão em Geriatria (GDS) versão reduzida. Arquivos
713
+
714
+ Computer Anxiety: Supporting the Transition
715
+ from Desktop to Mobile
716
+ CHI ’21, Workshop on Designing Interactions for the Ageing Populations, May 08–13, 2021, Yokohama, Japan
717
+ de Neuro-Psiquiatria 57 (06 1999), 421 – 426. http://www.scielo.br/scielo.php?
718
+ script=sci_arttext&pid=S0004-282X1999000300013&nrm=iso
719
+ [3] Mustafa Baloğlu and Vildan Çevik. 2008. Multivariate effects of gender, ownership,
720
+ and the frequency of use on computer anxiety among high school students.
721
+ Computers in Human Behavior 24, 6 (2008), 2639–2648.
722
+ [4] John Brooke et al. 1996. SUS-A quick and dirty usability scale. Usability evaluation
723
+ in industry 189, 194 (1996), 4–7.
724
+ [5] Pew Research Center. 2017. Tech Adoption Climbs Among Older Adults. http://
725
+ www.pewinternet.org/2017/05/17/tech-adoption-climbs-among-older-adults/
726
+ [6] Pew Research Center. 2019. Mobile Fact Sheet. https://www.pewresearch.org/
727
+ internet/fact-sheet/mobile/
728
+ [7] Jyh-Rong Chou and Hung-Cheng Tsai. 2009. On-line learning performance and
729
+ computer anxiety measure for unemployed adult novices using a grey relation
730
+ entropy method. Information Processing & Management 45, 2 (2009), 200–215.
731
+ [8] Miha Cimperman, Maja M. Brenčič, and Peter Trkman. 2016. Analyzing older
732
+ users’ home telehealth services acceptance behavior-applying an Extended
733
+ UTAUT model. International journal of medical informatics 90 (2016), 22–31.
734
+ [9] Deborah R. Compeau and Christopher A. Higgins. 1995. Computer self-efficacy:
735
+ Development of a measure and initial test. MIS quarterly (1995), 189–211.
736
+ [10] Elizabeth D. Cooper-Gaiter. 2015. Computer anxiety and computer self-efficacy
737
+ of older adults. (2015).
738
+ [11] Thiago Donizetti dos Santos and Vagner Figueredo de Santana. 2019. A Computer
739
+ Anxiety Model for Elderly Users Interacting with the Web. In Proceedings of the
740
+ 16th Web For All 2019 Personalization - Personalizing the Web (San Francisco, CA,
741
+ USA) (W4A ’19). Association for Computing Machinery, New York, NY, USA,
742
+ Article 32, 10 pages. https://doi.org/10.1145/3315002.3317565
743
+ [12] Mireia Fernández-Ardèvol and Loredana Ivan. 2015. Why age is not that impor-
744
+ tant? An ageing perspective on computer anxiety. In International Conference on
745
+ Human Aspects of IT for the Aged Population. Springer, 189–200.
746
+ [13] Saurabh Gupta. 2017. Reducing computer anxiety in self-paced technology
747
+ training. Advances in Teaching and Learning Technologies (2017).
748
+ [14] Rugayah Hashim, Hashim Ahmad, and Che Abdullah. 2010. Paradox of e-learning
749
+ for distance education students at UiTM Shah Alam. In Distance Learning and
750
+ Education (ICDLE), 2010 4th International Conference on. IEEE, 105–107.
751
+ [15] Robert K. Heinssen, Carol R. Glass, and Luanne A. Knight. 1987. Assessing
752
+ computer anxiety: Development and validation of the computer anxiety rating
753
+ scale. Computers in human behavior 3, 1 (1987), 49–59.
754
+ [16] Fabian Herrmann, Iris Niedermann, Matthias Peissner, Katja Henke, and Anja
755
+ Naumann. 2007. Users interact differently: Towards a usability-oriented user
756
+ taxonomy. Jacko, Julie A.(Pub.) Human-Computer Interaction. Interaction design
757
+ and usability. Berlin: Springer (Lecture notes in computer science, 4550) (2007),
758
+ 812–817.
759
+ [17] Loredana Ivan and Ioana Schiau. 2016. Experiencing Computer Anxiety Later
760
+ in Life: The Role of Stereotype Threat. In International Conference on Human
761
+ Aspects of IT for the Aged Population. Springer, 339–349.
762
+ [18] Ashok Jashapara and Wei-Chun Tai. 2006. Understanding the complexity of
763
+ human characteristics on e-learning systems: an integrated study of dynamic
764
+ individual differences on user perceptions of ease of use. Knowledge Management
765
+ Research & Practice 4, 3 (2006), 227–239.
766
+ [19] Stella Korobili, Aspasia Togia, and Afrodite Malliari. 2010. Computer anxiety
767
+ and attitudes among undergraduate students in Greece. Computers in Human
768
+ Behavior 26, 3 (2010), 399–405.
769
+ [20] Clayton Lewis. 1982. Using the" thinking-aloud" method in cognitive interface
770
+ design. IBM TJ Watson Research Center Yorktown Heights, NY.
771
+ [21] Brenda H. Loyd and Clarice Gressard. 1984. Reliability and factorial validity of
772
+ computer attitude scales. Educational and psychological measurement 44, 2 (1984),
773
+ 501–505.
774
+ [22] Ruth H. Maki, William S. Maki, Michele Patterson, and P. David Whittaker.
775
+ 2000. Evaluation of a Web-based introductory psychology course: I. Learning
776
+ and satisfaction in on-line versus lecture courses. Behavior Research Methods,
777
+ Instruments, & Computers 32, 2 (01 Jun 2000), 230–239. https://doi.org/10.3758/
778
+ BF03207788
779
+ [23] Matthew M. Maurer and Michael R. Simonson. 1984. Development and validation
780
+ of a measure of computer anxiety. (1984).
781
+ [24] Ram Mehar and Avneet Kaur. 2017. Effect of Web Based Instructional Strategy
782
+ on Achievement in Computer Science in Relation to Computer Anxiety. Asian
783
+ Journal of Research in Social Sciences and Humanities 7, 6 (2017), 202–216.
784
+ [25] Denise M. de Melo and Altemir J. G. Barbosa. 2015. O uso do Mini-Exame
785
+ do Estado Mental em pesquisas com idosos no Brasil: uma revisão sistemática.
786
+ Ciência e Saúde Coletiva 20 (12 2015), 3865 – 3876. http://www.scielo.br/scielo.
787
+ php?script=sci_arttext&pid=S1413-81232015001203865&nrm=iso
788
+ [26] Zacchaeus O Omogbadegun. 2019. Technical Support: Towards Mitigating Effects
789
+ of Computer Anxiety on Acceptance of E-Assessment Amongst University Stu-
790
+ dents in Sub Saharan African Countries. In ICT Unbounded, Social Impact of Bright
791
+ ICT Adoption: IFIP WG 8.6 International Conference on Transfer and Diffusion of
792
+ IT, TDIT 2019, Accra, Ghana, June 21–22, 2019, Proceedings, Vol. 558. Springer, 48.
793
+ [27] Saroj Parasuraman and Magid Igbaria. 1990. An examination of gender differences
794
+ in the determinants of computer anxiety and attitudes toward microcomputers
795
+ among managers. International Journal of Man-Machine Studies 32, 3 (1990),
796
+ 327–340.
797
+ [28] Satyanarayana Parayitam, Kiran J Desai, Mayur S Desai, and Mary K Eason. 2010.
798
+ Computer attitude as a moderator in the relationship between computer anxiety,
799
+ satisfaction, and stress. Computers in Human Behavior 26, 3 (2010), 345–352.
800
+ [29] Chee W. Phang, Juliana Sutanto, Atreyi Kankanhalli, Yan Li, Bernard C. Tan,
801
+ and Hock-Hai Teo. 2006. Senior citizens’ acceptance of information systems: A
802
+ study in the context of e-government services. IEEE Transactions on Engineering
803
+ Management 53, 4 (2006), 555–569.
804
+ [30] William G. Powers et al. 1973. The Effects of Prior Computer Exposure On
805
+ Man-Machine Computer Anxiety. (1973).
806
+ [31] Annalyse C. Raub. 1981. Correlates of computer anxiety in college students.
807
+ (1981).
808
+ [32] Larry D. Rosen, Deborah C. Sears, and Michelle M. Weil. 1987. Computerphobia.
809
+ Behavior Research Methods 19, 2 (1987), 167–179.
810
+ [33] Glenn Russell and Graham Bradley. 1997. Teachers’ computer anxiety: Implica-
811
+ tions for professional development. Education and information Technologies 2, 1
812
+ (1997), 17–30.
813
+ [34] Vagner F. de Santana and Felipe E. Silva. 2018. User Test Logger: An Open Source
814
+ Browser Plugin for Logging and Reporting Local User Studies. Proceedings of
815
+ HCI International 2019 (2018).
816
+ [35] Thiago D. dos Santos and Vagner F. de Santana. 2018. Computer Anxiety and
817
+ Interaction: A Systematic Review. In Proceedings of the Internet of Accessible
818
+ Things. ACM, 18.
819
+ [36] Maimunah M. Shah, Roshidi Hassan, and Roslani Embi. 2012. Technology ac-
820
+ ceptance and computer anxiety. In 2012 International Conference on Innovation
821
+ Management and Technology Research. 306–309. https://doi.org/10.1109/ICIMTR.
822
+ 2012.6236408
823
+ [37] Linn Anette Solberg. 1998. Variables which affect the ability to cope with changes
824
+ in IT. In Computer Human Interaction Conference, 1998. Proceedings. 1998 Aus-
825
+ tralasian. IEEE, 300–301.
826
+ [38] Jason B. Thatcher, J. Christopher Zimmer, Michael J. Gundlach, and D. Harrison
827
+ McKnight. 2008. Internal and External Dimensions of Computer Self-Efficacy:
828
+ An Empirical Examination. IEEE Transactions on Engineering Management 55, 4
829
+ (Nov 2008), 628–644. https://doi.org/10.1109/TEM.2008.927825
830
+ [39] Yi-Shun Wang. 2007. Development and validation of a mobile computer anxiety
831
+ scale. British Journal of Educational Technology 38, 6 (2007), 990–1009.
832
+ [40] Jerome A. Yesavage, Terence L. Brink, Terence L. Rose, Owen Lum, Virginia
833
+ Huang, Michael Adey, and Von O. Leirer. 1982. Development and validation of a
834
+ geriatric depression screening scale: a preliminary report. Journal of psychiatric
835
+ research 17, 1 (1982), 37–49.
836
+ A
837
+ TECHNOLOGY USE AND PROFILE
838
+ (1) Do you have a computer available at home? If not, do you use
839
+ a computer somewhere else (e.g., at work or in the lanhouse)?
840
+ (2) How often do you use a computer?
841
+ A: [ ] Rarely
842
+ [ ] Sometimes
843
+ [ ] Usually
844
+ [ ] Always
845
+ (3) What do you usually do on computer?
846
+ (4) Do you own a smartphone?
847
+ (5) How often do you use smartphones?
848
+ A: [ ] Rarely
849
+ [ ] Sometimes
850
+ [ ] Usually
851
+ [ ] Always
852
+ (6) What do you usually do on smartphone?
853
+ Internet: [ ] Yes
854
+ [ ] No
855
+ Social networks: [ ] Yes
856
+ [ ] No
857
+ Instant Message: [ ] Yes
858
+ [ ] No
859
+ Call: [ ] Yes
860
+ [ ] No
861
+ Games: [ ] Yes
862
+ [ ] No
863
+ Message: [ ] Yes
864
+ [ ] No
865
+ Music / Video: [ ] Yes
866
+ [ ] No
867
+
FtE0T4oBgHgl3EQfRAB3/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
G9E2T4oBgHgl3EQfTge-/content/tmp_files/2301.03804v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
G9E2T4oBgHgl3EQfTge-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
G9E4T4oBgHgl3EQfgQ3v/content/2301.05116v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6d6baa967408a67190b405e63c743bba26d076ab7726b82fe4d0bb9f71037207
3
+ size 8901643
G9E4T4oBgHgl3EQfgQ3v/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4dc9f5a8818c856bae3a8ac02b6391c54717077b4fd4d90e17abda674391a3ff
3
+ size 18153517
HtE1T4oBgHgl3EQfXwQA/content/tmp_files/2301.03129v1.pdf.txt ADDED
@@ -0,0 +1,1705 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Positivity-preserving entropy filtering for the ideal
2
+ magnetohydrodynamics equations
3
+ T. Dzanica,∗, F. D. Witherdena
4
+ aDepartment of Ocean Engineering, Texas A&M University, College Station, TX 77843
5
+ A R T I C L E I N F O
6
+ Keywords:
7
+ Discontinuous spectral element
8
+ Ideal magnetohydrodynamics
9
+ Shock capturing
10
+ Positivity-preserving
11
+ Entropy filtering
12
+ A B S T R A C T
13
+ In this work, we present a positivity-preserving adaptive filtering approach for discontinuous
14
+ spectral element approximations of the ideal magnetohydrodynamics equations. This approach
15
+ combines the entropy filtering method (Dzanic and Witherden, J. Comput. Phys., 468, 2022) for
16
+ shock capturing in gas dynamics along with the eight-wave method for enforcing a divergence-
17
+ free magnetic field. Due to the inclusion of non-conservative source terms, an operator-splitting
18
+ approach is introduced to guarantee that the positivity and entropy constraints remain satisfied
19
+ by the discrete solution. Furthermore, a computationally efficient algorithm for solving the op-
20
+ timization process for this nonlinear filtering approach is presented. The resulting scheme can
21
+ robustly resolve strong discontinuities on general unstructured grids without tunable parameters
22
+ while recovering high-order accuracy for smooth solutions. The efficacy of the scheme is shown
23
+ in numerical experiments on various problems including extremely magnetized blast waves and
24
+ three-dimensional magnetohydrodynamic instabilities.
25
+ 1. Introduction
26
+ The transport and interaction of a non-resistive conducting fluid and its electromagnetic field remain extensively
27
+ investigated phenomena as they are instrumental in various applications ranging from the study of astrophysical accre-
28
+ tion disks [1] and supernova remnants [2] to magnetic confinement fusion [3] and plasma physics [4]. These strongly
29
+ nonlinear effects are governed by the equations of ideal magnetohydrodynamics (MHD), which are composed of a
30
+ combination of the Euler equations of gas dynamics and Maxwell’s equations of electromagnetism. From this formu-
31
+ lation, a strong coupling between the magnetic field and the conducting fluid can be observed, where the magnetic
32
+ field induces a current in the fluid which, in turn, gives rise to a second, induced magnetic field. This interaction
33
+ can introduce multi-scale, multi-physics behavior in the system, such that magnetohydrodynamic flows can become
34
+ exceedingly complex.
35
+ As a result of this complexity, the robust and accurate numerical approximation of ideal MHD can present many
36
+ challenges. Since hyperbolic systems are known to produce discontinuities even with smooth initial conditions [5],
37
+ the numerical scheme must be able to robustly resolve these discontinuities which, in the case of MHD, come in the
38
+ form of hydrodynamic and magnetic shocks and contact waves. Furthermore, the approximation of the ideal MHD
39
+ equations also requires an intrinsic constraint on the solution in the form of a solenoidal magnetic field which may
40
+ not be satisfied by the scheme even if the magnetic field is initially solenoidal. Without a mechanism to enforce
41
+ this constraint, unphysical dynamics can arise in the solution which can lead to numerical instabilities. The standard
42
+ numerical schemes for approximating MHD flows are finite difference and finite volume methods, whose properties
43
+ and robustness are well-established in the literature [6–11]. However, they possess certain drawbacks in that they
44
+ are either difficult to extend to complex domains with unstructured grids or cannot recover high-order accuracy in a
45
+ computationally efficient manner.
46
+ A particular class of schemes which have more recently grown in popularity are high-order discontinuous spec-
47
+ tral element methods (DSEM) as they possess the geometric flexibility of finite volume methods while retaining the
48
+ arbitrarily high-order accuracy and efficiency of spectral methods. As such, they provide a promising avenue for
49
+ significantly decreasing the computational cost and expanding the viability of simulating complex MHD problems.
50
+ However, due to the presence of discontinuities in MHD, DSEM approximations of these systems may introduce spu-
51
+ rious oscillations in the solution in the form of Gibbs phenomena. Without proper treatment, these oscillations can
52
+ ∗Corresponding author
53
+ [email protected] (T. Dzanic)
54
+ ORCID(s): 0000-0003-3791-1134 (T. Dzanic); 0000-0003-2343-412X (F.D. Witherden)
55
+ T. Dzanic et al.: Preprint submitted to Elsevier
56
+ Page 1 of 22
57
+ arXiv:2301.03129v1 [math.NA] 9 Jan 2023
58
+
59
+ aPositivity-preserving entropy filtering for the ideal MHD equations
60
+ result in unphysical predictions or the failure of the numerical scheme altogether. To extend to use of DSEM to MHD,
61
+ various numerical stabilization techniques have been proposed, ranging from artificial viscosity methods [12, 13] to
62
+ limiting-type approaches [14, 15]. While these various methods may be sufficient to stabilize the solution in many
63
+ cases, they may not guarantee that the solution will abide by physical constraints, may require problem-dependent tun-
64
+ able parameters, can be computationally inefficient for general unstructured grids, or may be excessively dissipative in
65
+ smooth regions of the flow.
66
+ There is significant interest in the design of numerical schemes that are “provably robust” in the sense that they
67
+ can guarantee that the solution will abide by certain physical constraints even in the presence of features such as
68
+ discontinuities, the quintessential examples being positivity-preserving schemes for gas dynamics which guarantee the
69
+ positivity of the density and internal energy/pressure. For DSEM, this property is typically achieved through some
70
+ form of nonlinear limiting or filtering [14, 16–18]. However, designing schemes that possess this property without
71
+ sacrificing the computational efficiency of DSEM for general unstructured grids and their advantageous scale-resolving
72
+ properties in smooth flow regions can be challenging. In the context of MHD, this becomes even more difficult due
73
+ to the additional complexity of the governing equations as well as the incorporation of differential constraints, namely
74
+ solenoidal magnetic fields. As such, there is a need for numerical stabilization techniques for DSEM approximations
75
+ of the ideal MHD equations that retain as many of these desirable properties as possible, namely that they:
76
+ 1. Guarantee that physical constraints of the solution are satisfied.
77
+ 2. Are compatible with numerical techniques for enforcing intrinsic constraints such as a solenoidal magnetic field.
78
+ 3. Do not require problem-dependent tunable parameters.
79
+ 4. Do not appreciably degrade the ability of the underlying DSEM to resolve smooth portions of the flow.
80
+ 5. Can be easily and efficiently implemented on general unstructured grids.
81
+ In this work, we propose a nonlinear adaptive filtering approach as a numerical stabilization technique for DSEM
82
+ approximations of the ideal MHD equations to address these points. The proposed technique can be considered as an
83
+ extension of the entropy filtering approach originally introduced by the authors for shock capturing in gas dynamics to
84
+ the ideal MHD system [17]. This technique relies on using the solution’s ability to preserve convex invariants of the
85
+ system, namely positivity of the density and pressure and a discrete local minimum entropy principle, to compute the
86
+ necessary filter strength to ensure a well-behaved solution in the vicinity of discontinuities. Extending this approach to
87
+ the ideal MHD system presents several challenges, primarily stemming from the treatment of the divergence-free con-
88
+ straint on the magnetic field. We utilize the eight-wave method of Powell et al. [7] which introduces non-conservative
89
+ source terms in the equation proportional to the divergence of the magnetic field. As these non-conservative terms
90
+ can conflict with the necessary assumptions of the entropy filtering approach, we present a modified set of conditions
91
+ and introduce an operator splitting approach to the system which allows the filtering method to retain its positivity-
92
+ preserving properties. Furthermore, as the original approach for performing the optimization process necessary in the
93
+ adaptive filtering framework as presented in Dzanic and Witherden [17] was found to be quite computationally expen-
94
+ sive, we develop a highly-efficient numerical approach which drastically reduces the overall computational cost. The
95
+ resulting approach can robustly resolve strong hydrodynamic and magnetic discontinuities in the flow without appre-
96
+ ciably degrading the accuracy of the underlying DSEM for smooth flows, does not require problem-dependent tunable
97
+ parameters, and can be easily extended to unstructured grids with relatively low computational cost. The efficacy of
98
+ the proposed method is demonstrated in a variety of numerical experiments including smooth transport, extremely
99
+ magnetized blast waves, and three-dimensional magnetohydrodynamic instabilities computing using high-order ap-
100
+ proximations on both structured and unstructured grids.
101
+ The organization of this work is as follows. We present some preliminaries regarding DSEM approximations and
102
+ the ideal MHD equations in Section 2. The entropy filtering approach for ideal MHD is then introduced in Section 3,
103
+ and its numerical implementation and computational optimizations are presented in Section 4. Results for various test
104
+ cases are then shown in Section 5, and conclusions are drawn in Section 6.
105
+ 2. Preliminaries
106
+ 2.1. Ideal magnetohydrodynamics
107
+ The governing equations for the evolution of an ideal magnetohydrodynamic fluid can be given in the form of a
108
+ hyperbolic conservation law as
109
+ 휕푡퐮 + 훁⋅퐅 (퐮) = 퐒푩(퐮),
110
+ (1)
111
+ T. Dzanic et al.: Preprint submitted to Elsevier
112
+ Page 2 of 22
113
+
114
+ Positivity-preserving entropy filtering for the ideal MHD equations
115
+ where 퐮 = 퐮(퐱, 푡) ∈ ℝ푚 is the solution of some number of field variables 푚 defined over a 푑-dimensional spatial
116
+ domain 퐱 ∈ ℝ푑 and time 푡, 퐅(퐮) ∈ ℝ푚×푑, and 퐒퐁(퐮) is an additional source term to be defined in Section 2.3 whose
117
+ purpose is to ensure a solenoidal magnetic field. The solution and flux are given as
118
+ 퐮 =
119
+
120
+
121
+
122
+ ⎢⎣
123
+
124
+ 흆풗
125
+
126
+
127
+
128
+
129
+
130
+ ⎥⎦
131
+ and
132
+ 퐅 =
133
+
134
+
135
+
136
+
137
+
138
+ ⎢⎣
139
+ 흆풗
140
+ 흆풗 ⊗ 퐯 + 퐈
141
+ (
142
+ 푃 + 1
143
+ 2퐁⋅퐁
144
+ )
145
+ − 퐁 ⊗ 퐁
146
+ 풗 ⊗ 퐁 − 퐁 ⊗ 풗
147
+ (
148
+ 퐸 + 푃 + 1
149
+ 2퐁⋅퐁
150
+ )
151
+ 퐯 − 퐁(퐯⋅퐁)
152
+
153
+
154
+
155
+
156
+
157
+ ⎥⎦
158
+ ,
159
+ (2)
160
+ where 휌 is the density, 흆풗 is the momentum, 퐸 is the total energy, 푃 = (훾 − 1)
161
+ (
162
+ 퐸 − 1
163
+ 2휌퐯⋅퐯 − 1
164
+ 2퐁⋅퐁
165
+ )
166
+ is the pressure,
167
+ 퐁 is the magnetic field, and 훾 is the specific heat ratio. Furthermore, the symbol 퐈 denotes the identity matrix in ℝ푑×푑
168
+ and 퐯 = 흆풗∕휌 denotes the velocity. The solution can be more conveniently expressed in terms of a vector of primitive
169
+ variables as 퐪 = [휌, 퐯, 퐁, 푃]푇 , and auxiliary quantities representing the magnetic pressure and plasma-beta can be
170
+ defined as 푃푏 = 1
171
+ 2(훾 − 1)퐁⋅퐁 and 훽 = 2푃∕(퐁⋅퐁), respectively.
172
+ Due to the lack of magnetic monopoles, the MHD equations have an intrinsic constraint on the solution in the form
173
+ of a solenoidal magnetic field, i.e.,
174
+ 훁⋅퐁 = 0.
175
+ (3)
176
+ Although this constraint must be satisfied analytically by the MHD equations, numerical approximations do not nec-
177
+ essarily satisfy it even if the magnetic field is initially solenoidal. If this constraint is not enforced by the scheme,
178
+ numerical instabilities may arise in addition to the non-physical nature of the approximation. Many approaches exist
179
+ to enforce this condition on the magnetic field, including the use of solenoidal basis functions [19], projection meth-
180
+ ods [20], constrained-transport schemes [6], divergence cleaning methods [21], and the eight-wave method [7]. An
181
+ overview of the salient techniques is presented in Wu and Shu [15].
182
+ The entropy solution of Eq. (1) satisfies an entropy inequality of the form
183
+ 휕푡휎(퐮) + 훁⋅횺(퐮) ≥ 0,
184
+ (4)
185
+ where (휎, 횺) is any numerical entropy-flux pair [22] that satisfies the relation
186
+ 휕퐮횺 = 휕퐮휎휕퐮퐅.
187
+ Note that this inequality may be negated depending on which notation is used for the numerical entropy. In Dao and
188
+ Nazarov [23], it was shown that the entropy solution (in a vanishing viscosity sense) of the ideal MHD system satisfies
189
+ a minimum entropy principle on the specific physical entropy 휎 = 푃휌−훾 in the form
190
+ 휎 (퐮(퐱, 푡 + Δ푡)) ≥ min
191
+
192
+ 휎 (퐮(퐱, 푡)) ,
193
+ (5)
194
+ where Δ푡 > 0. This property is identical to the minimum entropy principle in gas dynamics [24], and it should be
195
+ satisfied by the solution in both smooth regions and in the vicinity of discontinuities.
196
+ 2.2. Discontinuous spectral element methods
197
+ For nodal discontinuous spectral element approximations of Eq. (1), including discontinuous Galerkin [25] and flux
198
+ reconstruction [26] schemes, the domain Ω is partitioned into 푁푒 elements Ω푘 such that Ω = ⋃
199
+ 푁푒 Ω푘 and Ω푖 ∩Ω푗 = ∅
200
+ for 푖 ≠ 푗. With a slight abuse of notation, the solution 퐮(퐱) within each element Ω푘 is approximated in a nodal manner
201
+ as
202
+ 퐮(퐱) =
203
+
204
+ 푖∈푆
205
+ 퐮푖휙푖(퐱),
206
+ (6)
207
+ where 퐱푖 ∀ 푖 ∈ 푆 is a set of solution nodes, 휙푖(퐱) are their associated nodal basis functions that possess the property
208
+ 휙푖(퐱푗) = 훿푖푗, and 푆 is the set of nodal indices for the stencil. For brevity, we utilize the notation that 퐮푖 = 퐮(퐱푖). The
209
+ order of the approximation of the solution is denoted as ℙ푝 for some order 푝, where 푝 is the maximal order of 퐮(퐱).
210
+ This approximation formally yields a convergence rate of at least 푝 + 1 [25].
211
+ T. Dzanic et al.: Preprint submitted to Elsevier
212
+ Page 3 of 22
213
+
214
+ Positivity-preserving entropy filtering for the ideal MHD equations
215
+ The flux is approximated via the contribution of an interior term, denoted by the subscript Ω푘, and an interface
216
+ term, denoted by the subscript 휕Ω푘, as
217
+ 퐅(퐮) ≈ 퐅Ω푘(퐮) + 퐅휕Ω푘(퐮).
218
+ (7)
219
+ For the interior component, the flux is computed through a collocation approach as
220
+ 퐅Ω푘(퐮) =
221
+
222
+ 푖∈푆
223
+ 퐅(퐮푖)휙푖(퐱),
224
+ (8)
225
+ such that the interior contribution to the divergence of the flux can be computed as
226
+ 훁⋅퐅Ω푘(퐮푖) =
227
+
228
+ 푗∈푆
229
+ 퐜푖푗퐅(퐮푗),
230
+ where
231
+ 퐜푖푗 = ∇휙푖(퐱푗).
232
+ (9)
233
+ The interface component of the flux is formed over a set of interface nodes 퐱푖 ∈ 휕Ω푘 ∀ 푖 ∈ 퐼, where 퐼 is a set of nodal
234
+ indices for the interface stencil. We assume that these interface nodes are a subset of the solution nodes (i.e., 퐼 ⊂ 푆)
235
+ to avoid issues regarding interpolation for discontinuous solutions. At each interface node, there exist two values of
236
+ the solution, 퐮−
237
+ 푖 and 퐮+
238
+ 푖 , representing the solution evaluated from the element of interest and the interface-adjacent
239
+ element, respectively. The interface flux term can then be computed as
240
+ 퐅휕Ω푘(��푖) =
241
+
242
+ 푗∈퐼
243
+ 퐅(퐮−
244
+ 푗 , 퐮+
245
+ 푗 , 퐧푗)휙푗(퐱),
246
+ (10)
247
+ where 퐅(퐮−
248
+ 푖 , 퐮+
249
+ 푖 , 퐧푖) are the common interface flux values dependent on the interior and exterior values of the solution
250
+ and their associated normal vectors 퐧푖 and 휙푖(퐱) are the interface bases. The common interface flux is generally
251
+ computed using an approximate Riemann solver such as that of Rusanov [27]. The interface bases are dependent on
252
+ the choice of spatial discretization, e.g., for flux reconstruction schemes, these terms can be given as
253
+ 휙푖(퐱) = 퐧푖⋅퐡푖(퐱) − 휙푖(퐱).
254
+ (11)
255
+ Here, 퐡푖 are a set of correction functions [28, 29] that posses the properties that
256
+ 퐧푖⋅퐡푗(퐱푖) = 훿푖푗
257
+ and
258
+
259
+ 푖∈퐼
260
+ 퐡푖(퐱) ∈ RT푝,
261
+ (12)
262
+ where RT푝 is the Raviart–Thomas space [30] of order 푝. In this work, the flux reconstruction scheme with the equivalent
263
+ discontinuous Galerkin correction functions [26] is used which recovers the nodal discontinuous Galerkin method [25].
264
+ The interface contribution to the divergence of the flux can then be given as
265
+ 훁⋅퐅휕Ω푘(퐮푖) =
266
+
267
+ 푗∈퐼
268
+ 퐜푖푗퐅(퐮−
269
+ 푗 , 퐮+
270
+ 푗 , 퐧푗),
271
+ where
272
+ 퐜푖푗 = ∇휙푖(퐱푗).
273
+ (13)
274
+ The semi-discrete form of Eq. (1) can then be given as
275
+ 휕푡퐮푖 = −
276
+ (
277
+ 퐅휕Ω푘(퐮푖) + 훁⋅퐅휕Ω푘(퐮푖)
278
+ )
279
+ + 퐒퐁(퐮푖).
280
+ (14)
281
+ We assume that the spatial scheme satisfies the relation
282
+ 휕푡퐮 = − ∫휕Ω푘
283
+ 퐅 (퐱) ⋅ 퐧(퐱) d퐱 ≈ −
284
+
285
+ 푗∈퐼
286
+ 푚푗퐅(퐮−
287
+ 푗 , 퐮+
288
+ 푗 , 퐧푗)
289
+ (15)
290
+ where 푚푗 is the associated quadrature weight for 퐱푗 and 퐮 is the element-wise mean defined as
291
+ 퐮 = 1
292
+ 푉푘 ∫Ω푘
293
+ 퐮(퐱) d퐱
294
+ and
295
+ 푉푘 = ∫Ω푘
296
+ d퐱.
297
+ (16)
298
+ This assumption is appropriate for nodal discontinuous Galerkin schemes given appropriate quadrature and flux recon-
299
+ struction schemes utilizing the equivalent discontinuous Galerkin correction functions.
300
+ T. Dzanic et al.: Preprint submitted to Elsevier
301
+ Page 4 of 22
302
+
303
+ Positivity-preserving entropy filtering for the ideal MHD equations
304
+ 2.3. Eight-wave method
305
+ A common method for enforcing a divergence-free magnetic field is to utilize the eight-wave method of Powell
306
+ et al. [7]. This approach relies on an additional wave structure of the Riemann problem in MHD that arises when the
307
+ magnetic field is not exactly solenoidal, and it can be utilized to force the magnetic field to a solenoidal state via a
308
+ source term, given as
309
+ 퐒푩(퐮) = −
310
+
311
+
312
+
313
+ ⎢⎣
314
+ 0
315
+
316
+
317
+ 풖⋅푩
318
+
319
+
320
+
321
+ ⎥⎦
322
+ 훁⋅푩.
323
+ (17)
324
+ With the inclusion of this source term, the divergence of the magnetic field is typically suppressed to the order of mag-
325
+ nitude of the approximation error [15]. As such, due to the simplicity of implementation and applicability to general
326
+ unstructured grids, it remains a routine approach for robustly enforcing the divergence-free constraint on the solenoidal
327
+ field. In addition, only this modified form of the ideal MHD equations is symmetrizable and Galilean invariant when
328
+ the magnetic field is not exactly solenoidal [15]. However, as this form is non-conservative, it occasionally can cause
329
+ inaccurate predictions around discontinuities in the flow (see Tóth [31]).
330
+ The use of Powell’s method requires some clarification about the choice of the formulation for computing the
331
+ divergence of the magnetic field. In the context of DSEM, there exist two formulations, a local divergence, consisting
332
+ of just the interior component as
333
+ 훁⋅푩퐿(퐮푖) =
334
+
335
+ 푗∈푆
336
+ 퐜푖푗푩푗,
337
+ (18)
338
+ and a global divergence, consisting of both the interior component and the interface contribution as
339
+ 훁⋅푩퐺(퐮푖) =
340
+
341
+ 푗∈푆
342
+ 퐜푖푗푩푗 +
343
+
344
+ 푗∈퐼
345
+ 퐜푖푗푩푗,
346
+ (19)
347
+ where 푩푗 is a common interface value for the magnetic field, typically taken as the centered average of the interior and
348
+ exterior values. Whereas the divergence-free constraint can be imposed on the local divergence through straightforward
349
+ approaches such as projection to solenoidal bases, enforcing this constraint on the global divergence is typically more
350
+ difficult as its domain of influence is not strictly contained within the element. It can be argued that the global approach
351
+ is the “correct” choice as it is the one for which the space of the divergence is consistent with the space of the solution,
352
+ but in practice, the local approach is typically sufficient. In this work, the global approach is used as the complexity of
353
+ the two implementations is similar with Powell’s method.
354
+ 3. Methodology
355
+ Due to the presence of discontinuities in MHD flows in the form of hydrodynamic and magnetic shocks, it is
356
+ necessary to apply some sort of a numerical stabilization procedure to ensure robustness of the DSEM approximation.
357
+ In Dzanic and Witherden [17], an adaptive filtering approach was introduced with goal of stabilizing the scheme by
358
+ discretely enforcing convex constraints on the solution, given in the form of
359
+ Γ(퐮푖) > 0 ∀ 푖 ∈ 푆,
360
+ (20)
361
+ where Γ(퐮) is some constraint functional. For a positivity-preserving scheme, these constraints are set as
362
+ Γ1(퐮) = 휌
363
+ and
364
+ Γ2(퐮) = 푃,
365
+ (21)
366
+ corresponding to constraints on the positivity of density and pressure.
367
+ While these constraints can ensure the positivity of these quantities, they are generally not restrictive enough to
368
+ ensure that the solution remains well-behaved in the vicinity of discontinuities. It is necessary to attempt to form
369
+ additional constraints on the solution that are restrictive enough to stabilize the solution in the vicinity of discontinuities
370
+ without degrading the accuracy of the scheme in regions where the solution is smooth. By utilizing the fact that the
371
+ minimum entropy principle presented in Section 2 should be satisfied by both smooth and discontinuous solutions, a
372
+ third constraint on the solution is enforced corresponding to a discrete form of a local minimum entropy principle as
373
+ Γ3(퐮) = 휎(퐮) − 휎min,
374
+ (22)
375
+ T. Dzanic et al.: Preprint submitted to Elsevier
376
+ Page 5 of 22
377
+
378
+ Positivity-preserving entropy filtering for the ideal MHD equations
379
+ where 휎(퐮) = 푃 휌−훾 is the specific physical entropy and 휎min is some local minimum entropy bound. This minimum
380
+ bound 휎min is computed in an element-wise manner as the discrete minima of the entropy functional across the element
381
+ and its face neighbors prior to each stage of a temporal integration scheme, resulting in the enforcement of a discrete
382
+ minimum entropy principle over the local domain of influence of the element (see Dzanic and Witherden [17], Section
383
+ 2 and 3). It was found in the context of gas dynamics that enforcing this constraint ensured well-behaved solutions in
384
+ the vicinity of discontinuities while recovering high-order accuracy in smooth regions of the flow [17].
385
+ 3.1. Adaptive filtering
386
+ The constraints are enforced by an adaptive filtering procedure, where the filtered solution ̃퐮 is given in terms of a
387
+ filter kernel 퐻 applied to the solution, i.e.,
388
+ ̃퐮 = 퐻(퐮).
389
+ (23)
390
+ This filtering is performed in modal space given a modal decomposition of the solution in the form of
391
+ 퐮(퐱) =
392
+
393
+ 푖∈푆
394
+ ̂퐮푖휓푖(퐱),
395
+ (24)
396
+ where 휓푖(퐱) ∀ 푖 ∈ 푆 are a set of modal basis functions and ̂퐮푖 are their corresponding modes. We assume that this modal
397
+ decomposition is chosen with respect to the unit measure (e.g., Legendre polynomials, Koornwinder polynomials, etc.).
398
+ A discrete form of this change-of-basis operation can be given in terms of a Vandermonde matrix 퐕 as
399
+ ̂퐮 = 퐕−1퐮.
400
+ (25)
401
+ The filter kernel ̂
402
+ 퐻 is taken as a second-order exponential kernel in modal space, such that the filtered modal modes
403
+ can be computed as
404
+ ̂
405
+ 퐻푖(̂퐮푖) = ̂퐮 exp(−휁푝2
406
+ 푖 ),
407
+ (26)
408
+ where 휁 is the filter strength and 푝푖 is the total order of the corresponding mode ̂퐮푖. It must be noted that the adaptive
409
+ filtering approach is not restricted to this choice of filter and can be applied to any conservative filtering operation of
410
+ one free variable that can recover both the unfiltered solution and the mean mode [17]. The filtering operation 퐻(퐮)
411
+ can be cast in terms of a matrix-vector operation as
412
+ ̃퐮 = 퐻(퐮) = 퐕횲퐕−1퐮,
413
+ (27)
414
+ where 횲 is a diagonal matrix of 푝 + 1 unique values with its entries equal to 횲푖,푖 = exp(−휁푝2
415
+ 푖 ).
416
+ The filter strength is computed via an element-wise nonlinear optimization process, taken as the minimum filter
417
+ strength necessary such that the constraints are satisfied, i.e.,
418
+ 휁 = arg min
419
+ 휁 ≥ 0
420
+ s.t. [Γ1
421
+ (̃퐮(퐱푖)) > 0, Γ2
422
+ (̃퐮(퐱푖)) > 0, Γ3
423
+ (̃퐮(퐱푖)) > 0 ∀ 푖 ∈ 푆] .
424
+ (28)
425
+ Existence of a solution of 휁 is guaranteed if the element-wise mean of the solution satisfies the constraints, an assump-
426
+ tion that will be explored in Section 3.2. As this optimization process is a function of a scalar free variable, its solution
427
+ can be obtained using any root-bracketing approach. Furthermore, as it is nonlinear and non-convex, convergence to
428
+ a local minima is sufficient in the case of multiple values of 휁 existing such that the constraints are satisfied exactly.
429
+ While this optimization problem seems computationally demanding due to the element-wise matrix-vector operations
430
+ necessary to compute the filtered solution each iteration of the solve, we present a numerical approach to solving
431
+ this problem in Section 4.1 that is much more computationally efficient than the original methodology in Dzanic and
432
+ Witherden [17].
433
+ 3.2. Extensions to MHD
434
+ Extending the entropy filtering approach to the MHD system requires some modifications, with special care neces-
435
+ sary in regards to the treatment of the source terms. The adaptive filtering operation naturally relies on that assumption
436
+ that there exists a filter strength such that the constraints are satisfied, and it is trivial to show that a solution exists if the
437
+ element-wise mean satisfies the constraints [17]. The ability of discontinuous Galerkin-type approaches to preserve
438
+ convex invariants of hyperbolic systems on the element-wise mean is a well established in the literature, and the reader
439
+ T. Dzanic et al.: Preprint submitted to Elsevier
440
+ Page 6 of 22
441
+
442
+ Positivity-preserving entropy filtering for the ideal MHD equations
443
+ is referred to a variety of works which utilize this property [15–17, 32–35]. However, the inclusion of the source term
444
+ and the presence of entropy constraints introduces some caveats on this property of the scheme.
445
+ Let the set 퐺 represent the set of solutions which satisfy the constraints (i.e., Γ1(퐮) > 0, Γ2(퐮) > 0, Γ3(퐮) > 0), and
446
+ let the shorthand notation 퐮 ∈ 퐺 represent 퐮푖 ∈ 퐺 ∀ 푖 ∈ 푆. To ensure that the filter can recover a constraint-satisfying
447
+ solution, it is necessary for the temporal update of the element-wise mean to preserve these invariants, i.e., for some
448
+ time step 푛, if 퐮푛 ∈ 퐺, then 퐮푛+1 ∈ 퐺. For brevity, we consider a temporal update in the form of a forward Euler
449
+ approximation, given as
450
+ 퐮푛+1 = 퐮푛 + Δ푡 [퐿1(퐮푛) + 퐿2(퐮푛)] ,
451
+ (29)
452
+ where
453
+ 퐿1(퐮) = −훁⋅퐅(퐮)
454
+ and
455
+ 퐿2(퐮) = 퐒퐁(퐮).
456
+ (30)
457
+ Without an exactly solenoidal magnetic field, the property 퐮푛+1 ∈ 퐺 is not necessarily satisfied in this form under the
458
+ standard assumptions posed in works such as Zhang and Shu [32] and the original presentation of entropy filtering
459
+ for gas dynamics in Dzanic and Witherden [17], e.g., appropriate Riemann solver, CFL condition, strong stability
460
+ preserving temporal integration. If we consider the set of solutions 퐺푃 which satisfy just the positivity constraints
461
+ (i.e., 퐮 ∈ 퐺푃 if Γ1(퐮) > 0, Γ2(퐮) > 0), then the work of Wu and Shu [15] showed that the property 퐮푛+1 ∈ 퐺푃 is
462
+ satisfied under a potentially more restrictive condition on the time step dependent on the discrete divergence of the
463
+ magnetic field (see Theorem 3.1 in Wu and Shu [15]). Furthermore, if we neglect the source term and consider an
464
+ intermediate temporal update as
465
+ 퐮∗ = 퐮푛 + Δ푡퐿1(퐮푛),
466
+ (31)
467
+ then the work of Bouchut et al. [36] (paired with the equivalency of the element-wise mean and Godunov methods
468
+ presented in Zhang and Shu [32] and subsequent works) shows that this intermediate state satisfies the property 퐮∗ ∈ 퐺
469
+ under the standard assumptions.
470
+ These two observations motivate an operator splitting approach for the filter. Two separate filtering operations are
471
+ considered, a more restrictive filter which enforces both the positivity and entropy constraints, denoted by 퐻푒[퐮], and
472
+ a more relaxed filter that enforces only positivity constraints, denoted by 퐻푝[퐮]. As the assumption on the positivity
473
+ and entropy constraints on the element-wise mean are satisfied by the intermediate state, the more restrictive filter can
474
+ be applied, i.e.,
475
+ ̃퐮∗ = 퐻푒
476
+ [퐮푛 + Δ푡퐿1(퐮푛)] .
477
+ (32)
478
+ Since the entropy constraints are the most restrictive constraint and the contribution of the source term is typically
479
+ minimal compared to the divergence of the flux (since it is proportional to 훁⋅퐁), this filtering operation can usually
480
+ mitigate the majority of the spurious oscillations in the vicinity of discontinuities. The contribution of the source term
481
+ is then added onto this filtered state, after which the positivity constraints are then enforced again on the temporal
482
+ update as
483
+ ̃퐮푛+1 = 퐻푝
484
+ [̃퐮∗ + Δ푡퐿2(퐮푛)] .
485
+ (33)
486
+ A solution to this filtering optimization problem is also guaranteed to exist as the positivity of the element-wise mean
487
+ is guaranteed [15].
488
+ Several properties of this splitting approach must be noted. First, it is very rarely the case that the secondary filtering
489
+ operation is necessary – the entropy constraints on ̃퐮∗ are typically restrictive enough to where ̃퐮∗ + Δ푡퐿2(퐮푛) retains
490
+ its positivity-preserving properties, such that in most cases, the positivity constraints are typically just checked and no
491
+ filtering is needed. However, to ensure that the scheme remains provably positivity-preserving, this secondary filtering
492
+ operation must be included. Second, the splitting for the source term is calculated explicitly as 퐿2(퐮푛), not through
493
+ a Strang-type splitting approach [37] as 퐿2(퐮∗). While the latter may potentially better approximate the necessary
494
+ corrections to the solution for preserving a solenoidal magnetic field, these forms of splitting can introduce a limit on
495
+ the temporal accuracy of the scheme and therefore are avoided. Finally, unless the linear filtering kernel which recovers
496
+ the squeeze limiter of Zhang and Shu [32] is chosen (see Dzanic and Witherden [17], Remark 1), the divergence of
497
+ the filtered magnetic field is not guaranteed to be equal or lower than the unfiltered state. As this work pertains to a
498
+ nonlinear filter, it may introduce minor divergence errors similarly to any nonlinear limiting operation, but these are
499
+ mitigated via the source term at the next temporal update with the explicit splitting approach such that its effects were
500
+ found to be negligible.
501
+ T. Dzanic et al.: Preprint submitted to Elsevier
502
+ Page 7 of 22
503
+
504
+ Positivity-preserving entropy filtering for the ideal MHD equations
505
+ Extensions to higher-order strong stability preserving (SSP) schemes follow readily from this formulation, e.g., the
506
+ temporal update for a third-order, three-stage SSP Runge–Kutta scheme, neglecting the notatioñ⋅ for brevity, is given
507
+ as
508
+ 퐮(1) = 퐻푝
509
+ [퐻푒
510
+ [퐮푛 + Δ푡퐿1(퐮푛)] + Δ푡퐿2(퐮푛)] ,
511
+ (34)
512
+ 퐮(2) = 퐻푝
513
+ [
514
+ 퐻푒
515
+ [3
516
+ 4퐮푛 + 1
517
+ 4퐮(1) + 1
518
+ 4Δ푡퐿1(퐮(1))
519
+ ]
520
+ + 1
521
+ 4Δ푡퐿2(퐮(1))
522
+ ]
523
+ ,
524
+ 퐮푛+1 = 퐻푝
525
+ [
526
+ 퐻푒
527
+ [1
528
+ 3퐮푛 + 2
529
+ 3퐮(2) + 2
530
+ 3Δ푡퐿1(퐮(2))
531
+ ]
532
+ + 2
533
+ 3Δ푡퐿2(퐮(2))
534
+ ]
535
+ ,
536
+ where the entropy constraints for 퐻푒 are computed from the previous temporal stage (see Dzanic and Witherden [17],
537
+ Appendix A).
538
+ 4. Implementation
539
+ Ω푘
540
+ Figure 1:
541
+ Schematic of a two-dimensional ℙ2 triangular element Ω푘 showing interior solution points (red circles), interior
542
+ interface flux/solution points (red circles, blue outline), and exterior interface flux points (blue circles).
543
+ The governing equations and the adaptive filtering approach were implemented in PyFR [38], a high-order GPU-
544
+ accelerated unstructured flux reconstruction solver. The solution nodes were distributed along the Gauss–Legendre–
545
+ Lobatto quadrature points and 훼-optimized points [25] for tensor-product and simplex elements, respectively. An
546
+ example of the solution and flux point distributions for a two-dimensional ℙ2 triangular element is shown in Fig. 1.
547
+ Temporal integration was performed using a three-stage, third-order SSP Runge–Kutta scheme as presented in Eq. (34).
548
+ Unless otherwise stated, common interface fluxes were computed using the Harten-Lax-van Leer contact (HLLC)
549
+ Riemann solver of Li [39] and Gurski [40] with the Davis wavespeed estimate [41], although for most test cases, we
550
+ observed negligible differences in comparison to Rusanov-type [27] and Harten-Lax-van Leer (HLL) [42] Riemann
551
+ solvers. To avoid a vacuum state for the Riemann solver and apply a numerical tolerance to the entropy condition, the
552
+ constraints were instead implemented as
553
+ Γ1(퐮) = 휌 − 휖,
554
+ Γ2(퐮) = 푃 − 휖,
555
+ and
556
+ Γ3(퐮) = 휎 − 휎min − 휖,
557
+ where 휖 = 10−8 is a small constant taken as some arbitrary factor of the machine precision.
558
+ Boundary conditions were enforced in a weak sense through the imposition of an exterior ghost state to the inter-
559
+ face Riemann solver [43]. Three types of boundary conditions were considered in this work: 1) Dirichlet boundary
560
+ conditions, where the exterior state is explicitly defined; 2) Neumann boundary conditions, where the exterior state is
561
+ identical to the interior state; and 3) reflecting boundary conditions, where the exterior state is identical to the interior
562
+ state with the normal component of the velocity and magnetic field negated.
563
+ T. Dzanic et al.: Preprint submitted to Elsevier
564
+ Page 8 of 22
565
+
566
+ Positivity-preserving entropy filtering for the ideal MHD equations
567
+ 4.1. Filter optimization
568
+ Each time the filtering operation is called, the constraints are first checked on the solution. If the solution satisfies
569
+ the constraints, no filtering is applied, otherwise the filter strength is computed using the Illinois root-bracketing ap-
570
+ proach [44] with a stopping tolerance of 10−8 and a maximum of 20 iterations. While the filter strength can be simply
571
+ iterated by repeatedly evaluating the element-wise filtered solution as per Eq. (27) and computing the minima of the
572
+ constraints, several optimizations can be performed to drastically decrease the computational cost of performing this
573
+ filtering operation.
574
+ First, instead of solving for 휁, it beneficial to solve for 푓 = exp(−휁) and utilize the relation
575
+ exp(−휁푝2
576
+ 푖 ) = 푓 푝2
577
+ 푖 .
578
+ This bounds the search space of the root-bracketing approach to 푓 ∈ [0, 1], and the evaluation of the filter coefficients
579
+ reduces to simple integer powers of the argument 푓. Then, to avoid the costly computation of the matrix-vector
580
+ product in Eq. (27) each iteration of the root-bracketing process, certain properties of the matrix 횲 can be exploited.
581
+ As previously mentioned, 횲 is a diagonal matrix of 푝 + 1 unique values with its entries equal to 횲푖,푖 = exp(−휁푝2
582
+ 푖 ). If
583
+ we define a set of diagonal matrices 퐈(푘) for 0 ≤ 푘 ≤ 푝 as
584
+ 퐈(푘)
585
+ 푖,푖 =
586
+ {
587
+ 1,
588
+ if푝푖 = 푘,
589
+ 0,
590
+ else,
591
+ (35)
592
+ then the filtering operation can be equivalently represented as
593
+ ̃퐮 =
594
+
595
+
596
+ 푖=0
597
+ 푓 푝2
598
+ 푖 퐮(푘),
599
+ (36)
600
+ where
601
+ 퐮(푘) = 퐕퐈(푘)퐕−1퐮.
602
+ (37)
603
+ Note that the values 퐮(푘) are independent of the value of 푓, such that these values can be pre-computed and the fil-
604
+ tered solution can be efficiently evaluated each iteration of the root-bracketing approach without having to repeatedly
605
+ compute the matrix-vector product 퐕횲퐕−1퐮.
606
+ This approach can be even further optimized by utilizing the fact that the nodal values of the solution can now
607
+ be decoupled, such that the root-bracketing process can be applied across each solution node sequentially which is
608
+ particularly beneficial for computing architectures where memory bandwidth is the bottleneck. In this sequential
609
+ approach, each solution node 퐱푗 for 푗 ∈ 푆 solves for a value of 푓푗 such that ̃퐮푗 satisfies the constraints. It is trivial to
610
+ show that if
611
+ 푓 = min
612
+ 푗∈푆 푓푗,
613
+ then ̃퐮 satisfies the constraints at all nodes. It is therefore advantageous to then use 푓푗 as the upper bound for the root-
614
+ bracketing process for the node 퐱푗+1 as the constraints can be checked for ̃퐮푗+1 using this upper bound and the root-
615
+ bracketing process for that node can be skipped if they are satisfied. As the proposed algorithm requires effectively only
616
+ one full evaluation of Eq. (27) irrespective of the number of iterations of the root-bracketing approach, the memory
617
+ bandwidth requirements are significantly decreased, such that the filtering process becomes only a relatively small
618
+ portion of the total compute time that is typically less than the cost of the evaluation of the divergence of the flux. An
619
+ example of the implementation of this approach is provided in the electronic supplementary material of this work, and
620
+ an evaluation of the efficiency improvements of this proposed algorithm in comparison to the original methodology in
621
+ Dzanic and Witherden [17] which utilizes repeated evaluations of Eq. (27) is presented in Section 5.
622
+ 5. Results
623
+ 5.1. Near-vacuum convecting vortex
624
+ To verify that the proposed scheme retains the high-order accuracy of the underlying DSEM for smooth solutions,
625
+ the rate of convergence was calculated for the smooth magnetized convecting vortex problem introduced by Christlieb
626
+ T. Dzanic et al.: Preprint submitted to Elsevier
627
+ Page 9 of 22
628
+
629
+ Positivity-preserving entropy filtering for the ideal MHD equations
630
+ et al. [45]. For this problem, the domain is taken as Ω = [−10, 10]2 with periodic boundary conditions discretized on
631
+ a structured quadrilateral mesh, and the initial conditions are given as
632
+ 퐪(퐱, 0) =
633
+
634
+
635
+
636
+
637
+
638
+
639
+ ⎢⎣
640
+
641
+
642
+
643
+ 퐵푥
644
+ 퐵푦
645
+
646
+
647
+
648
+
649
+
650
+
651
+
652
+ ⎥⎦
653
+ =
654
+
655
+
656
+
657
+
658
+
659
+
660
+ ⎢⎣
661
+ 1
662
+ 1 − 푦훿푢
663
+ 1 + 푥훿푢
664
+ −푦훿퐵
665
+ 푥훿퐵
666
+ 1 + 훿푃
667
+
668
+
669
+
670
+
671
+
672
+
673
+ ⎥⎦
674
+ (38)
675
+ where
676
+ 훿푢 =
677
+
678
+
679
+ 2휋
680
+ 휙(푟),
681
+ 훿퐵 = 휇
682
+ 2휋 휙(푟),
683
+ 훿푃 = −휇2(1 + 푟2)
684
+ 8휋2
685
+ 휙(푟)2,
686
+ (39)
687
+ and
688
+ 휙(푟) = exp(1 − 푟2),
689
+ 푟 =
690
+
691
+ 푥2 + 푦2.
692
+ (40)
693
+ The specific heat ratio was set as 훾 = 5∕3. These conditions give a non-isentropic nature to the flow field, which
694
+ allows for a proper assessment of the proposed entropy-based constraints for smooth flows where the filter should be
695
+ primarily inactive. To make this problem more numerically challenging, the parameter 휇 is chosen such as to give
696
+ a near-vacuum state for the pressure field [45]. This value was set as 휇 = 5.38948938512, which gives a minimum
697
+ pressure value in the domain of approximately 2휖 = 2⋅10−8.
698
+ The problem was solved until a non-dimensional time of 푡 = 0.05 using a fixed time step of Δ푡 = 1⋅10−4, after
699
+ which the 퐿1 norm of the magnetic field error was computed as
700
+ 푒퐵 = 1
701
+ 퐴 ∫Ω
702
+ ||퐵푥 − 퐵exact
703
+
704
+ || + |||퐵푦 − 퐵exact
705
+
706
+ ||| d퐱,
707
+ (41)
708
+ where 퐴 = 202. The exact solution was computed through a translation of the initial conditions with a translation
709
+ velocity of [1, 1], and the integration was computed using a 9th order Gauss–Legendre quadrature rule. The error
710
+ with respect to the mesh resolution 푁푒 is shown for various approximation orders in Table 1 in addition to the rate of
711
+ convergence. High-order convergence, on the order of 푝 to 푝 + 1, was observed for all approximation orders between
712
+ ℙ2 and ℙ5. Furthermore, the ℙ2 results can be compared to the positivity-preserving third-order DG scheme in Wu and
713
+ Shu [15] (Table 2), which can be considered as a subset of the adaptive filtering approach without entropy constraints
714
+ (see Dzanic and Witherden [17], Remark 1). The proposed scheme gives marginally lower error even after removing
715
+ the 1∕퐴 normalization factor.
716
+ 푁푒
717
+ ℙ2
718
+ ℙ3
719
+ ℙ4
720
+ ℙ5
721
+ 202
722
+ 2.29 × 10−4
723
+ 3.07 × 10−5
724
+ 3.30 × 10−6
725
+ 4.04 × 10−7
726
+ 252
727
+ 1.18 × 10−4
728
+ 1.17 × 10−5
729
+ 1.37 × 10−6
730
+ 9.36 × 10−8
731
+ 332
732
+ 5.39 × 10−5
733
+ 4.07 × 10−6
734
+ 3.39 × 10−7
735
+ 2.44 × 10−8
736
+ 402
737
+ 3.04 × 10−5
738
+ 2.02 × 10−6
739
+ 1.44 × 10−7
740
+ 9.55 × 10−9
741
+ 502
742
+ 1.59 × 10−5
743
+ 8.72 × 10−7
744
+ 5.02 × 10−8
745
+ 2.92 × 10−9
746
+ 672
747
+ 6.92 × 10−6
748
+ 2.99 × 10−7
749
+ 1.31 × 10−8
750
+ 6.51 × 10−10
751
+ RoC
752
+ 2.89
753
+ 3.80
754
+ 4.62
755
+ 5.23
756
+ Table 1:
757
+ Convergence of the 퐿1 norm of the magnetic field error at 푡 = 0.05 with respect to mesh resolution 푁푒 for the
758
+ near-vacuum convecting vortex problem with varying approximation order. Rate of convergence shown on bottom.
759
+ 5.2. Brio–Wu shock tube
760
+ Extensions to flows with discontinuities was then performed through the shock tube problem of Brio and Wu [8]
761
+ which includes features of the Riemann problem such as shock waves, contact discontinuities, rarefaction waves, and
762
+ compound waves. For this problem, the domain is set as Ω = [0, 1] and the initial conditions are given by
763
+ T. Dzanic et al.: Preprint submitted to Elsevier
764
+ Page 10 of 22
765
+
766
+ Positivity-preserving entropy filtering for the ideal MHD equations
767
+ 퐪(퐱, 0) =
768
+
769
+
770
+
771
+
772
+
773
+
774
+ ⎢⎣
775
+
776
+
777
+
778
+ 퐵푥
779
+ 퐵푦
780
+
781
+
782
+
783
+
784
+
785
+
786
+
787
+ ⎥⎦
788
+ =
789
+ {
790
+ 퐪푙,
791
+ if 푥 ≤ 0.5,
792
+ 퐪푟,
793
+ else,
794
+ where
795
+ 퐪푙 =
796
+
797
+
798
+
799
+
800
+
801
+
802
+ ⎢⎣
803
+ 1
804
+ 0
805
+ 0
806
+ 0.75
807
+ 1
808
+ 1
809
+
810
+
811
+
812
+
813
+
814
+
815
+ ⎥⎦
816
+ and
817
+ 퐪푟 =
818
+
819
+
820
+
821
+
822
+
823
+
824
+ ⎢⎣
825
+ 0.125
826
+ 0
827
+ 0
828
+ 0.75
829
+ −1
830
+ 0.1
831
+
832
+
833
+
834
+
835
+
836
+
837
+ ⎥⎦
838
+ .
839
+ (42)
840
+ The specific heat ratio is set as 훾 = 2. The hydrodynamic components of this problem are identical to the Sod shock
841
+ tube [46]. Although this problem is one-dimensional, it was instead solved on a one element wide two-dimensional
842
+ mesh to facilitate the use of the vertical magnetic field component within the solver. Dirichlet boundary conditions were
843
+ applied on the left/right boundaries while periodic boundary conditions were applied along the top/bottom boundaries.
844
+ The problem was computed with a ℙ3 scheme using a coarser mesh of 200 elements and a finer mesh of 400
845
+ elements with time steps of Δ푡 = 2⋅10−4 and 1⋅10−4, respectively. A reference solution was also computed using a
846
+ highly-resolved ℙ0 scheme with 5⋅104 elements. The predicted density, pressure, and vertical magnetic field profiles
847
+ at 푡 = 0.1 are shown in Fig. 2 for both the coarse and fine mesh. For all fields, both rarefaction waves and the shock
848
+ were well-resolved, showing sub-element resolution without any noticeable spurious oscillations. Furthermore, similar
849
+ behavior was observed for the contact and compound wave in the pressure and magnetic fields. Some minor oscillations
850
+ were observed in the density profile in the region between the compound wave and contact discontinuity, although this
851
+ behavior is not uncommon for some numerical schemes. The predicted density profile in that region converged to the
852
+ reference results with increasing resolution, but minor undershoots in front of the contact discontinuity were observed.
853
+ 0
854
+ 0.2
855
+ 0.4
856
+ 0.6
857
+ 0.8
858
+ 1
859
+ 0
860
+ 0.2
861
+ 0.4
862
+ 0.6
863
+ 0.8
864
+ 1
865
+
866
+
867
+ Reference
868
+ 푁푒 = 200
869
+ 푁푒 = 400
870
+ (a) Density
871
+ 0
872
+ 0.2
873
+ 0.4
874
+ 0.6
875
+ 0.8
876
+ 1
877
+ 0
878
+ 0.2
879
+ 0.4
880
+ 0.6
881
+ 0.8
882
+ 1
883
+
884
+
885
+ (b) Pressure
886
+ 0
887
+ 0.2
888
+ 0.4
889
+ 0.6
890
+ 0.8
891
+ 1
892
+ −1
893
+ −0.5
894
+ 0
895
+ 0.5
896
+ 1
897
+
898
+ 퐵푦
899
+ (c) Vertical magnetic field
900
+ Figure 2:
901
+ Density, pressure, and vertical magnetic field profiles for the Brio–Wu shock tube problem at 푡 = 0.1 computed
902
+ using a ℙ3 FR scheme with 200 and 400 elements.
903
+ 5.3. Orszag–Tang vortex
904
+ Two-dimensional flows with more complex features were then considered through the canonical Orszag–Tang
905
+ vortex problem [47]. This case is a well-known model problem for evaluating a scheme’s ability to handle MHD
906
+ shocks and shock interactions as well as predicting transition to supersonic MHD turbulence. The domain is set as
907
+ Ω = [0, 1]2 with periodic boundary conditions, and the initial conditions are given as
908
+ 퐪(퐱, 0) =
909
+
910
+
911
+
912
+
913
+
914
+
915
+ ⎢⎣
916
+
917
+
918
+
919
+ 퐵푥
920
+ 퐵푦
921
+
922
+
923
+
924
+
925
+
926
+
927
+
928
+ ⎥⎦
929
+ =
930
+
931
+
932
+
933
+
934
+
935
+
936
+ ⎢⎣
937
+ 25∕(36휋)
938
+ − sin(2휋푦)
939
+ sin(2휋푥)
940
+ sin(2휋푦)∕
941
+
942
+ 4휋
943
+ − sin(4휋푥)∕
944
+
945
+ 4휋
946
+ 5∕(12휋)
947
+
948
+
949
+
950
+
951
+
952
+
953
+ ⎥⎦
954
+ .
955
+ (43)
956
+ The specific heat ratio is set as 훾 = 5∕3. Uniform meshes of various resolution were generated, and the problem
957
+ was solved using a ℙ3 scheme. The contours of density at 푡 = 0.5 computed on meshes with 푁푒 = 642, 1282, and
958
+ T. Dzanic et al.: Preprint submitted to Elsevier
959
+ Page 11 of 22
960
+
961
+ Positivity-preserving entropy filtering for the ideal MHD equations
962
+ 2562 elements are shown in Fig. 3, computed using time steps of Δ푡 = 4⋅10−4, 2⋅10−4, and 1⋅10−4, respectively. The
963
+ results show good prediction of the canonical flow field of the Orszag–Tang vortex, with better approximation of shock
964
+ structure and small-scale flow features with increasing resolution. Minor spurious oscillations were observed in the
965
+ density field at low resolutions, but these oscillations diminished with increasing mesh resolution, such that the flow
966
+ field at 푁푒 = 2562 was virtually oscillation-free.
967
+ (a) 푁푒 = 642
968
+ (b) 푁푒 = 1282
969
+ (c) 푁푒 = 2562
970
+ Figure 3:
971
+ Contours of density for the Orszag-Tang vortex at 푡 = 0.5 computed using a ℙ3 FR scheme with 642 (left),
972
+ 1282 (middle), and 2562 (right) elements.
973
+ For a more quantitative comparison, the predicted pressure profile on the cross-section 푦 = 0.3125 at 푡 = 0.48 is
974
+ shown in Fig. 4 in comparison to the results of Jiang and Wu [48] obtained using a high-order weighted essentially
975
+ non-oscillator (WENO) scheme. It can be seen that similar observations can be made for the pressure field as with the
976
+ density field, with minor spurious oscillations at lower resolutions that diminish with increasing resolution. The overall
977
+ prediction of the pressure profile was in good agreement with the reference results at moderate and high resolutions,
978
+ and strong discontinuities in the pressure field were generally well resolved at the sub-element level even at lower
979
+ resolutions. At the highest resolution, there was very good agreement with the reference data with minor differences
980
+ in the prediction of the location of some small-scale flow features on the left-hand side of the cross-section. Overall,
981
+ the results showed good predictions of the various flow features of the Orszag–Tang vortex.
982
+ 0.0
983
+ 0.2
984
+ 0.4
985
+ 0.6
986
+ 0.8
987
+ 1.0
988
+ 0.0
989
+ 0.1
990
+ 0.2
991
+ 0.3
992
+ 푥∕퐿
993
+
994
+ Reference
995
+ 푁푒 = 642
996
+ 푁푒 = 1282
997
+ 푁푒 = 2562
998
+ Figure 4:
999
+ Pressure profile of the Orszag-Tang vortex on the cross-section 푦∕퐿 = 0.3125 at 푡 = 0.48 computed using a ℙ3
1000
+ FR scheme with 642, 1282, and 2562 elements. Numerical results of Jiang and Wu [48] shown for reference.
1001
+ 5.4. Shock cloud interaction
1002
+ The proposed scheme was then evaluated on the shock cloud interaction problem of Dai and Woodward [9], con-
1003
+ sisting of a high-density cloud interacting with an impinging shock wave which results in strong discontinuities and
1004
+ the development of small-scale flow instabilities. The problem setup as described by Balbás and Tadmor [11] is solved
1005
+ T. Dzanic et al.: Preprint submitted to Elsevier
1006
+ Page 12 of 22
1007
+
1008
+ 0.4
1009
+ 0.35
1010
+ 0.3
1011
+ 0.25
1012
+ 0.2
1013
+ 0.15
1014
+ 0.1Positivity-preserving entropy filtering for the ideal MHD equations
1015
+ on the domain Ω = [0, 1]2 with the initial conditions given as
1016
+ 퐪(퐱, 0) = [휌, 푢, 푣, 푤, 퐵푥, 퐵푦, 퐵푧, 푃]푇 =
1017
+
1018
+
1019
+
1020
+ ⎪⎩
1021
+ 퐪푐,
1022
+ if 푟′ ≤ 0.15,
1023
+ 퐪푙,
1024
+ else if 푥 ≤ 0.6,
1025
+ 퐪푟,
1026
+ else,
1027
+ (44)
1028
+ where the cloud state, left state, and right state are given as
1029
+ 퐪푐 =
1030
+
1031
+
1032
+
1033
+
1034
+
1035
+
1036
+
1037
+
1038
+ ⎢⎣
1039
+ 10
1040
+ 0
1041
+ 0
1042
+ 0
1043
+ 2.1826182
1044
+ −2.1826182
1045
+ 1
1046
+ 167.345
1047
+
1048
+
1049
+
1050
+
1051
+
1052
+
1053
+
1054
+
1055
+ ⎥⎦
1056
+ ,
1057
+ 퐪푙 =
1058
+
1059
+
1060
+
1061
+
1062
+
1063
+
1064
+
1065
+
1066
+ ⎢⎣
1067
+ 3.86859
1068
+ 0
1069
+ 0
1070
+ 0
1071
+ 2.1826182
1072
+ −2.1826182
1073
+ 1
1074
+ 167.345
1075
+
1076
+
1077
+
1078
+
1079
+
1080
+
1081
+
1082
+
1083
+ ⎥⎦
1084
+ ,
1085
+ and
1086
+ 퐪푟 =
1087
+
1088
+
1089
+
1090
+
1091
+
1092
+
1093
+
1094
+
1095
+ ⎢⎣
1096
+ 1
1097
+ −11.2536
1098
+ 0
1099
+ 0
1100
+ 0
1101
+ 0.56418958
1102
+ 0.56418958
1103
+ 1
1104
+
1105
+
1106
+
1107
+
1108
+
1109
+
1110
+
1111
+
1112
+ ⎥⎦
1113
+ ,
1114
+ (45)
1115
+ respectively. The specific heat ratio is set as 훾 = 5∕3. The cloud is centered at [0.8, 0.5] with a radius of 0.15, such
1116
+ that
1117
+ 푟′ =
1118
+
1119
+ (푥 − 0.8)2 + (푦 − 0.5)2.
1120
+ To facilitate the use of the three-dimensional magnetic field within the solver, the problem is solved on a one
1121
+ element deep three-dimensional mesh. Additionally, while the original problem setup uses a [0, 1]2 domain with
1122
+ Neumann boundary conditions on the top/bottom boundaries, we instead extend the domain to [0, 1] × [−0.5, 1.5] and
1123
+ apply periodic boundary conditions on the top/bottom boundaries. As these boundaries on the extended domain are
1124
+ outside of the domain of influence of the shock cloud interaction over the time range of the simulation, the effect of this
1125
+ modified setup on the flow field is negligible but it helps alleviate any issues arising from numerical errors compounding
1126
+ at free boundaries. The remaining left and right boundary conditions were set as Neumann and Dirichlet, respectively,
1127
+ while periodicity was enforced along the 푧 direction.
1128
+ (a) Density
1129
+ (b) Pressure
1130
+ (c) Magnetic pressure
1131
+ Figure 5:
1132
+ Contours of density (left), pressure (middle), and magnetic pressure (right) on the subregion [0, 1]2 for the
1133
+ shock cloud interaction problem at 푡 = 0.06 computed using a ℙ2 FR scheme with 4002 elements.
1134
+ To perform a comparison of the proposed approach to a third-order DG scheme augmented with a WENO limiter
1135
+ presented in Wu and Shu [15], an identical problem setup is used with a ℙ2 scheme on 4002 mesh (with respect to
1136
+ the original domain size Ω = [0, 1]2). The predicted contours of density, pressure, and magnetic pressure at 푡 = 0.06
1137
+ computed using a time step of Δ푡 = 4⋅10−6 are shown in Fig. 5. The results show good resolution of the strong
1138
+ discontinuities in the various fields without any observable spurious oscillations. Furthermore, small-scale features in
1139
+ T. Dzanic et al.: Preprint submitted to Elsevier
1140
+ Page 13 of 22
1141
+
1142
+ p
1143
+ 2
1144
+ 5
1145
+ 10
1146
+ 20
1147
+ 40P
1148
+ 100
1149
+ 200
1150
+ 300
1151
+ 4000.2
1152
+ 0.5
1153
+ 2
1154
+ 5
1155
+ 10
1156
+ 20
1157
+ 50
1158
+ 100Positivity-preserving entropy filtering for the ideal MHD equations
1159
+ the cloud region of the density and magnetic fields were not excessively dissipated, and the symmetry of the problem
1160
+ was well-preserved. A comparison to the method of Wu and Shu [15] (Fig. 1) is shown in Fig. 6. Note that some
1161
+ discrepancy in the color schemes between the two images may be present. The proposed scheme was roughly equally
1162
+ performative in terms of the resolution of discontinuities and marginally better at resolving small-scale flow features on
1163
+ the trailing side of the cloud. Without the positivity-preserving filtering approach, the scheme diverged due to negative
1164
+ pressure in the solution.
1165
+ (a) Entropy filter
1166
+ (b) DG with WENO limiter
1167
+ Figure 6:
1168
+ Comparison of the contours of density computed by the proposed entropy filtering approach (left) and the
1169
+ positivity-preserving DG scheme augmented with a WENO limiter of Wu and Shu [15] (right).
1170
+ 5.5. Magnetized blast
1171
+ As a stress test for the positivity-preserving property of the proposed scheme for extreme flow conditions, a modified
1172
+ form of the magnetized blast wave problem of Zachary et al. [49] and Balsara and Spicer [10] was considered. In this
1173
+ problem, a blast wave is driven by a spherical overpressure region in the center of the domain surrounded by a low
1174
+ plasma-beta ambient state, resulting in strong magnetosonic shocks. The problem is solved on the periodic domain
1175
+ Ω = [−0.5, 0.5]2, and the initial conditions are given as
1176
+ 퐪(퐱, 0) =
1177
+
1178
+
1179
+
1180
+
1181
+
1182
+
1183
+ ⎢⎣
1184
+
1185
+
1186
+
1187
+ 퐵푥
1188
+ 퐵푦
1189
+
1190
+
1191
+
1192
+
1193
+
1194
+
1195
+
1196
+ ⎥⎦
1197
+ =
1198
+ {
1199
+ 퐪푒,
1200
+ if
1201
+
1202
+ 푥2 + 푦2 ≤ 0.1,
1203
+ 퐪푎,
1204
+ else,
1205
+ where
1206
+ 퐪푒 =
1207
+
1208
+
1209
+
1210
+
1211
+
1212
+
1213
+ ⎢⎣
1214
+ 1
1215
+ 0
1216
+ 0
1217
+ 퐵0
1218
+ 0
1219
+ 푃푒
1220
+
1221
+
1222
+
1223
+
1224
+
1225
+
1226
+ ⎥⎦
1227
+ and
1228
+ 퐪푎 =
1229
+
1230
+
1231
+
1232
+
1233
+
1234
+
1235
+ ⎢⎣
1236
+ 1
1237
+ 0
1238
+ 0
1239
+ 퐵0
1240
+ 0
1241
+ 푃푎
1242
+
1243
+
1244
+
1245
+
1246
+
1247
+
1248
+ ⎥⎦
1249
+ .
1250
+ (46)
1251
+ The specific heat ratio is set as 5∕3. While the original problem setup uses 푃푎 = 0.1, 푃푒 = 103, and 퐵0 = 100∕
1252
+
1253
+ 4휋, we
1254
+ consider the much more extreme case presented in Wu and Shu [15] with 푃푎 = 0.1, 푃푒 = 104, and 퐵0 = 1000∕
1255
+
1256
+ 4휋,
1257
+ resulting in a very large pressure ratio of 105 and a very small plasma-beta of 훽 ≈ 2.5⋅10−4. As these conditions are
1258
+ quite extreme, the scheme would diverge almost instantly in the absence of any positivity-preserving modifications.
1259
+ To verify that the proposed scheme can be easily extended to unstructured grids, the problem was solved on trian-
1260
+ gular meshes using a ℙ4 scheme. A coarse mesh and a fine mesh were generated, consisting of approximately 1.2⋅105
1261
+ elements with an average edge length of ℎ = 1∕200 and approximately 5⋅105 elements with an average edge length of
1262
+ ℎ = 1∕400, respectively. For this case, the HLL Riemann solver was used as it was found to be much better behaved
1263
+ in these extreme conditions than the HLLC Riemann solver, although both approaches were properly stabilized with
1264
+ the proposed entropy filtering method. The contours of density, velocity magnitude, pressure, and magnetic pressure
1265
+ at 푡 = 0.001 are shown in Fig. 7 and Fig. 8 for the coarse and fine meshes, respectively, computed using time steps of
1266
+ Δ푡 = 2⋅10−7 and Δ푡 = 1⋅10−7. Even with these extreme conditions on unstructured grids, the predicted solutions were
1267
+ T. Dzanic et al.: Preprint submitted to Elsevier
1268
+ Page 14 of 22
1269
+
1270
+ d
1271
+ 0
1272
+ 10
1273
+ 20
1274
+ 30
1275
+ 40Positivity-preserving entropy filtering for the ideal MHD equations
1276
+ (a) Density
1277
+ (b) Velocity Magnitude
1278
+ (c) Pressure
1279
+ (d) Magnetic Pressure
1280
+ Figure 7:
1281
+ Contours of density (top left), velocity magnitude (top right), pressure (bottom left), and magnetic pressure
1282
+ (bottom right) for the magnetized blast problem at 푡 = 0.001 computed using a ℙ4 scheme on an unstructured mesh with
1283
+ an average edge length of ℎ = 1∕200.
1284
+ well-behaved, and both the coarse and fine meshes showed excellent resolution of the various discontinuities in the
1285
+ velocity, pressure, and magnetic fields with sub-element resolution and no observable spurious oscillations. Further-
1286
+ more, the numerical width of the discontinuities decreased appropriately with increasing resolution. For the density
1287
+ field, minor spurious oscillations were observed, primarily at lower resolution and somewhat indicative of mesh im-
1288
+ printing, but the strength and distribution of these oscillations decreased with the finer mesh. These observations are
1289
+ consistent with the case of the Brio–Wu shock tube where the density field was marginally less well-behaved than the
1290
+ other fields. However, the predicted fields were still very good given such extreme conditions and an unstructured
1291
+ mesh, indicating that the proposed approach remains robust and accurate for such flows.
1292
+ To demonstrate the sub-element shock-resolving ability of the entropy filtering approach on unstructured grids, an
1293
+ enlarged view of the contours of pressure with the mesh overlaid is shown for the two meshes in Fig. 9. It can be seen
1294
+ that the shock was resolved well within the element, with the majority of the feature resolved across 1-2 solution nodes.
1295
+ Furthermore, this behavior persisted when the mesh resolution was increased, such that the discrete shock thickness
1296
+ T. Dzanic et al.: Preprint submitted to Elsevier
1297
+ Page 15 of 22
1298
+
1299
+ 3
1300
+ 4
1301
+ 5/vl
1302
+ O
1303
+ 10
1304
+ 20
1305
+ 30
1306
+ 40
1307
+ 50P
1308
+ 1000
1309
+ 2000
1310
+ 3000
1311
+ 4000
1312
+ 5000P
1313
+ 23000
1314
+ 24000
1315
+ 25000
1316
+ 26000
1317
+ 27000
1318
+ 28000Positivity-preserving entropy filtering for the ideal MHD equations
1319
+ (a) Density
1320
+ (b) Velocity Magnitude
1321
+ (c) Pressure
1322
+ (d) Magnetic Pressure
1323
+ Figure 8:
1324
+ Contours of density (top left), velocity magnitude (top right), pressure (bottom left), and magnetic pressure
1325
+ (bottom right) for the magnetized blast problem at 푡 = 0.001 computed using a ℙ4 scheme on an unstructured mesh with
1326
+ an average edge length of ℎ = 1∕400.
1327
+ decreased proportionally. Given the unstructured nature of the mesh and the resulting solution point distribution, the
1328
+ circular shape of the shock front was still well-represented, with even better approximation at higher mesh resolutions.
1329
+ These results indicate that the proposed approach can be extended to unstructured grids in a straightforward manner
1330
+ without appreciably sacrificing its efficiency or performance at resolving discontinuities.
1331
+ 5.6. Three-dimensional Rayleigh–Taylor instability
1332
+ A final evaluation of the proposed approach and the extension to three-dimensional flows was performed through
1333
+ the simulation of a magnetized three-dimensional Rayleigh–Taylor instability. The problem consists of a denser gas
1334
+ resting on top of a lighter gas under the effect of a gravitational field initially in equilibrium with the pressure gradient.
1335
+ Instabilities arise in the form of “bubbles” of the lighter gas rising and “fingers” of the heavier gas descending, after
1336
+ which nonlinear momentum transport drives the flow to a turbulent mixing state. The problem is solved on the domain
1337
+ T. Dzanic et al.: Preprint submitted to Elsevier
1338
+ Page 16 of 22
1339
+
1340
+ 3
1341
+ 4
1342
+ 5I
1343
+ /vl
1344
+ 10
1345
+ 20
1346
+ 30
1347
+ 40
1348
+ 50P
1349
+ 1000
1350
+ 2000
1351
+ 3000
1352
+ 4000
1353
+ 5000P
1354
+ 23000
1355
+ 24000
1356
+ 25000
1357
+ 26000
1358
+ 27000
1359
+ 28000Positivity-preserving entropy filtering for the ideal MHD equations
1360
+ (a) Coarse mesh
1361
+ (b) Fine mesh
1362
+ Figure 9:
1363
+ Enlarged view of contours of pressure with mesh overlay for the magnetized blast problem at 푡 = 0.001 computed
1364
+ using a ℙ4 scheme on the coarse mesh (left) and fine mesh (right). Contour scale identical to Fig. 7 and Fig. 8.
1365
+ [−퐿∕2, 퐿∕2]2 × [−퐿, 퐿], where 퐿 = 1, and the initial conditions are given as
1366
+ 퐪(퐱, 0) = [휌, 푢, 푣, 푤, 퐵푥, 퐵푦, 퐵푧, 푃]푇 =
1367
+ {
1368
+ 퐪푙,
1369
+ if 푧 ≤ 0,
1370
+ 퐪ℎ,
1371
+ else,
1372
+ (47)
1373
+ where
1374
+ 퐪푙 =
1375
+
1376
+
1377
+
1378
+
1379
+
1380
+
1381
+
1382
+
1383
+ ⎢⎣
1384
+ 휌푙
1385
+ 0
1386
+ 0
1387
+ 푊 (푥, 푦, 푧)
1388
+ 퐵0
1389
+ 0
1390
+ 0
1391
+ 푃(푧)
1392
+
1393
+
1394
+
1395
+
1396
+
1397
+
1398
+
1399
+
1400
+ ⎥⎦
1401
+ and
1402
+ 퐪ℎ =
1403
+
1404
+
1405
+
1406
+
1407
+
1408
+
1409
+
1410
+
1411
+ ⎢⎣
1412
+ 휌ℎ
1413
+ 0
1414
+ 0
1415
+ 푊 (푥, 푦, 푧)
1416
+ 퐵0
1417
+ 0
1418
+ 0
1419
+ 푃(푧)
1420
+
1421
+
1422
+
1423
+
1424
+
1425
+
1426
+
1427
+
1428
+ ⎥⎦
1429
+ ,
1430
+ (48)
1431
+ for some vertical velocity perturbation 푊 (푥, 푦, 푧) and initial pressure distribution 푃 (푧). Periodic boundary conditions
1432
+ are enforced along the transverse (푥, 푦) directions while reflecting boundary conditions are enforced along the top and
1433
+ bottom boundaries. A gravitational field is added to the problem, given in the form of a source term as
1434
+ 퐒퐆 = −[0, 0, 0, 휌푔, 0, 0, 0, 휌푤푔],
1435
+ (49)
1436
+ where 푔 = 1. The treatment of this gravitational field in the context of the entropy filter is taken simply as an additional
1437
+ term in the source term of Powell’s method, and as it not stiff for this problem, it does not appreciably affect the time
1438
+ step restrictions of the scheme.
1439
+ The parameters for the problem are taken similarly to a scaled form of the setup in Stone and Gardiner [50]. The
1440
+ densities of the light and heavy gases are taken as 휌푙 = 1 and 휌ℎ = 3, respectively, yielding an Atwood number of 1∕2.
1441
+ To enforce equilibrium in the flow, the initial pressure field is taken as
1442
+ 푃(푧) = 푃0 − 휌푔푧,
1443
+ (50)
1444
+ where 푃0 = 10∕훾 for a specific heat ratio 훾 = 5∕3. To seed instabilities in the flow, perturbations were added in the
1445
+ form of a vertical velocity field component as
1446
+ 푊 (푥, 푦, 푧) = 퐴 cos
1447
+ ( 휋푧
1448
+ 2퐿
1449
+ )
1450
+ sin
1451
+ (4휋푥
1452
+
1453
+ )
1454
+ sin
1455
+ (4휋푦
1456
+
1457
+ )
1458
+ ,
1459
+ (51)
1460
+ T. Dzanic et al.: Preprint submitted to Elsevier
1461
+ Page 17 of 22
1462
+
1463
+ Positivity-preserving entropy filtering for the ideal MHD equations
1464
+ where 퐴 = 0.05. This differs from the work of Stone and Gardiner [50] in that the transverse distribution of the
1465
+ perturbations is taken as a single deterministic mode instead of randomly-generated noise. As such, the predicted flow
1466
+ fields are expected to differ during the linear growth regime of the instability.
1467
+ The addition of a magnetic field significantly impacts the behavior of the Rayleigh–Taylor instability as it induces
1468
+ a stabilizing effect on the flow. In fact, linear stability analysis presents a cutoff magnetic field value,
1469
+ 퐵푐 =
1470
+
1471
+ (휌ℎ − 휌푙)푔퐿 =
1472
+
1473
+ 2,
1474
+ (52)
1475
+ above which the instability is completely damped by the magnetic field [50]. We consider three variations of this flow,
1476
+ a hydrodynamic case where 퐵0 = 0, a weakly magnetized case where 퐵0 = 0.1퐵푐, and a strongly magnetized case
1477
+ where 퐵0 = 0.5퐵푐. The term strongly magnetized is relative in the sense that the plasma-beta is still quite high, but
1478
+ the magnetic field can suppress almost all potential instability modes along its orientation.
1479
+ These three flow conditions were computed using a ℙ3 scheme on a 푁푒 = 64 × 64 �� 128 mesh with a time step of
1480
+ Δ푡 = 2⋅10−5. The flow, visualized in the form of a volume rendering of the density field, at various times is shown in
1481
+ Fig. 10, Fig. 11, and Fig. 12 for the hydrodynamic, weakly magnetized, and strongly magnetized cases, respectively.
1482
+ For the hydrodynamic case, the canonical flow pattern of the Rayleigh–Taylor instability was observed, with rising
1483
+ bubbles and descending figures. At later times, these features transitioned to a turbulent mixing state. When a weak
1484
+ magnetic field was applied, a significant degree of anisotropy was imparted on the flow, seen in the form of distortions
1485
+ in the bubbles and fingers aligned with the orientation of the magnetic field. Furthermore, the slowed growth rate of
1486
+ the instabilities due to the stabilizing effect of this weak magnetic field could be observed. For the strongly magnetized
1487
+ case, the magnetic field effectively damped all instabilities along the orientation of the field, such that the resulting
1488
+ flow only varied perpendicular to the orientation of the field. Given a long enough simulation time, this flow would
1489
+ be expected to transition to a three-dimensional turbulent mixing state as nonlinear transport effects overcome the
1490
+ stabilizing nature of the magnetic field. For all cases, the flow was numerically well-behaved, indicating that the
1491
+ proposed approach can be effectively applied to three-dimensional flows in both the magnetized and hydrodynamic
1492
+ regimes.
1493
+ (a) 푡 = 2
1494
+ (b) 푡 = 3
1495
+ (c) 푡 = 4
1496
+ (d) 푡 = 5
1497
+ Figure 10:
1498
+ Volume rendering of the density field for the hydrodynamic (퐵0 = 0) Rayleigh–Taylor instability problem at
1499
+ varying times computed using a ℙ3 scheme on a 푁푒 = 64 × 64 × 128 mesh.
1500
+ To quantify the efficiency improvements of the proposed algorithm in comparison to the original approach in
1501
+ Dzanic and Witherden [17] which utilizes repeated evaluations of the matrix-vector product in Eq. (27), a runtime
1502
+ comparison between the two methods was performed for the case of 퐵0 = 0.1퐵푐. The cost was evaluated on 16
1503
+ NVIDIA V100 GPUs with respect to the wall-clock time elapsed until the simulation reached 푡 = 1, and the results
1504
+ are shown in Fig. 13. While the original approach required 61.4 GPU hours, the proposed approach required only
1505
+ 25.3 GPU hours, a speedup factor of approximately 2.4 across the entire simulation time. Furthermore, this speedup
1506
+ is expected to increase with higher approximation orders due to the increased number of solution points per element.
1507
+ T. Dzanic et al.: Preprint submitted to Elsevier
1508
+ Page 18 of 22
1509
+
1510
+ 2
1511
+ 3
1512
+ dPositivity-preserving entropy filtering for the ideal MHD equations
1513
+ (a) 푡 = 2
1514
+ (b) 푡 = 3
1515
+ (c) 푡 = 4
1516
+ (d) 푡 = 5
1517
+ Figure 11:
1518
+ Volume rendering of the density field for the weakly magnetized (퐵0 = 0.1퐵푐) Rayleigh–Taylor instability
1519
+ problem at varying times computed using a ℙ3 scheme on a 푁푒 = 64 × 64 × 128 mesh.
1520
+ (a) 푡 = 2
1521
+ (b) 푡 = 3
1522
+ (c) 푡 = 4
1523
+ (d) 푡 = 5
1524
+ Figure 12:
1525
+ Volume rendering of the density field for the strongly magnetized (퐵0 = 0.5퐵푐) Rayleigh–Taylor instability
1526
+ problem at varying times computed using a ℙ3 scheme on a 푁푒 = 64 × 64 × 128 mesh.
1527
+ To confirm this, an identical comparison was performed using a ℙ4 approximation on a 푁푒 = 51 × 51 × 102 mesh,
1528
+ which results in approximately the same number of degrees of freedom. At this approximation order, the original
1529
+ approach required 257 GPU hours whereas the proposed approach required only 39.8 GPU hours, a speedup factor
1530
+ of approximately 6.5. These results indicate that the proposed algorithmic improvements both substantially decrease
1531
+ the overall computational cost of the entropy filtering approach and show much better scaling with respect to the
1532
+ approximation order.
1533
+ T. Dzanic et al.: Preprint submitted to Elsevier
1534
+ Page 19 of 22
1535
+
1536
+ 2
1537
+ 3
1538
+ d2
1539
+ 3
1540
+ dPositivity-preserving entropy filtering for the ideal MHD equations
1541
+ ℙ3
1542
+ ℙ4
1543
+ 0
1544
+ 100
1545
+ 200
1546
+ 300
1547
+ 25.3
1548
+ 61.4
1549
+ 39.8
1550
+ 257
1551
+ GPU hours per characteristic time
1552
+ Proposed algorithm
1553
+ Original algorithm
1554
+ Figure 13:
1555
+ Comparison of the wall-clock time to reach 푡 = 1 for the weakly magnetized (퐵0 = 0.1퐵푐) Rayleigh–Taylor
1556
+ instability problem with a ℙ3 (left) and ℙ4 (right) scheme with the same number of degrees of freedom using the original
1557
+ algorithm of Dzanic and Witherden [17] and the proposed algorithm.
1558
+ 6. Conclusions
1559
+ In this work, a positivity-preserving adaptive filtering approach was proposed for shock capturing in discontinuous
1560
+ spectral element approximations of the ideal magnetohydrodynamics equations. The proposed scheme can be consid-
1561
+ ered as an extension of the entropy filtering approach [17] introduced by the authors for the gas dynamics equations
1562
+ to the ideal magnetohydrodynamics system. By formulating convex invariants such as positivity of density and pres-
1563
+ sure and a local discrete minimum entropy principle as discrete constraints on the solution, the amount of filtering
1564
+ necessary to satisfy the constraints was computed as an element-wise scalar optimization problem. This approach was
1565
+ combined with the eight-wave method of Powell et al. [7] for enforcing a solenoidal magnetic field. As this method
1566
+ introduced non-conservative source terms to the system, an operator splitting approach was proposed and its effects
1567
+ on the assumptions necessitated by the adaptive filtering approach to guarantee the satisfaction of the constraints were
1568
+ analyzed. An improved algorithm for solving the optimization problem for the filter strength was also introduced which
1569
+ significantly improved the computational efficiency of the proposed method.
1570
+ The proposed scheme could robustly resolve strong discontinuities while recovering high-order accuracy in smooth
1571
+ regions of the flow and could be easily and efficiently implemented on general unstructured grids. The efficacy of the
1572
+ approach was shown in a variety of numerical experiments, ranging from simple transport and shock tubes to extremely
1573
+ magnetized blast waves and three-dimensional magnetohydrodynamic instabilities. Furthermore, the proposed algo-
1574
+ rithmic enhancements yielded significant improvements in the computational cost and showed much better scaling with
1575
+ respect to approximation order, reducing the total runtime of the simulations by a factor of 2.4 for ℙ3 approximations
1576
+ and 6.5 for ℙ4 approximations. Future improvements to the proposed scheme could focus on applying different filter
1577
+ kernels to various components on the solution, alternate methods for enforcing a divergence-free magnetic field, and
1578
+ anisotropic filtering approaches.
1579
+ Acknowledgements
1580
+ This work was supported in part by the U.S. Air Force Office of Scientific Research via grant FA9550-21-1-0190
1581
+ ("Enabling next-generation heterogeneous computing for massively parallel high-order compressible CFD") of the
1582
+ Defense University Research Instrumentation Program (DURIP) under the direction of Dr. Fariba Fahroo.
1583
+ References
1584
+ [1] John F. Hawley. Global magnetohydrodynamical simulations of accretion tori. The Astrophysical Journal, 528(1):462–479, January 2000.
1585
+ doi: 10.1086/308180.
1586
+ [2] Alex S. Hill, M. Ryan Joung, Mordecai-Mark Mac Low, Robert A. Benjamin, L. Matthew Haffner, Christian Klingenberg, and Knut Waagan.
1587
+ Vertical structure of a supernova–driven turbulence, magnetized interstellar medium. The Astrophysical Journal, 750(2):104, April 2012. doi:
1588
+ 10.1088/0004-637x/750/2/104.
1589
+ T. Dzanic et al.: Preprint submitted to Elsevier
1590
+ Page 20 of 22
1591
+
1592
+ Positivity-preserving entropy filtering for the ideal MHD equations
1593
+ [3] A Fasoli, S Brunner, W A Cooper, J P Graves, P Ricci, O Sauter, and L Villard. Computational challenges in magnetic-confinement fusion
1594
+ physics. Nat. Phys., 12(5):411–423, May 2016. doi: 10.1038/nphys3744.
1595
+ [4] Xiang Zhai, Hui Li, Paul M. Bellan, and Shengtai Li. Three–dimensional MHD simulation of the Caletch plasma jet experiment: First results.
1596
+ The Astrophysical Journal, 791(1):40, July 2014. doi: 10.1088/0004-637x/791/1/40.
1597
+ [5] Eberhard Hopf. The partial differential equation 푢푡+푢푢푥 = 휇푥푥. Communications on Pure and Applied Mathematics, 3(3):201–230, September
1598
+ 1950. doi: 10.1002/cpa.3160030302.
1599
+ [6] Charles R. Evans and John F. Hawley. Simulation of magnetohydrodynamic flows - A constrained transport method. The Astrophysical
1600
+ Journal, 332:659, September 1988. doi: 10.1086/166684.
1601
+ [7] Kenneth G. Powell, Philip L. Roe, Timur J. Linde, Tamas I. Gombosi, and Darren L. De Zeeuw. A solution-adaptive upwind scheme for ideal
1602
+ magnetohydrodynamics. Journal of Computational Physics, 154(2):284–309, September 1999. doi: 10.1006/jcph.1999.6299.
1603
+ [8] M Brio and C.C Wu. An upwind differencing scheme for the equations of ideal magnetohydrodynamics. Journal of Computational Physics,
1604
+ 75(2):400–422, April 1988. doi: 10.1016/0021-9991(88)90120-9.
1605
+ [9] Wenlong Dai and Paul R. Woodward. A simple finite difference scheme for multidimensional magnetohydrodynamical equations. Journal of
1606
+ Computational Physics, 142(2):331–369, May 1998. doi: 10.1006/jcph.1998.5944.
1607
+ [10] Dinshaw S Balsara and Daniel S Spicer. A staggered mesh algorithm using high order Godunov fluxes to ensure solenoidal magnetic fields in
1608
+ magnetohydrodynamic simulations. Journal of Computational Physics, 149(2):270–292, March 1999. doi: 10.1006/jcph.1998.6153.
1609
+ [11] Jorge Balbás and Eitan Tadmor. Nonoscillatory central schemes for one- and two-dimensional magnetohydrodynamics equations. II: High-
1610
+ order semi-discrete schemes. SIAM Journal on Scientific Computing, 28(2):533–560, January 2006. doi: 10.1137/040610246.
1611
+ [12] C. Ciucă, P. Fernandez, A. Christophe, N.C. Nguyen, and J. Peraire. Implicit hybridized discontinuous Galerkin methods for compressible
1612
+ magnetohydrodynamics. Journal of Computational Physics: X, 5:100042, January 2020. doi: 10.1016/j.jcpx.2019.100042.
1613
+ [13] T. Dzanic, W. Trojak, and F.D. Witherden. Utilizing time-reversibility for shock capturing in nonlinear hyperbolic conservation laws. Com-
1614
+ puters & Fluids, 247:105652, October 2022. doi: 10.1016/j.compfluid.2022.105652.
1615
+ [14] Andrés M. Rueda-Ramírez, Will Pazner, and Gregor J. Gassner. Subcell limiting strategies for discontinuous Galerkin spectral element
1616
+ methods. Computers & Fluids, 247:105627, October 2022. doi: 10.1016/j.compfluid.2022.105627.
1617
+ [15] Kailiang Wu and Chi-Wang Shu. A provably positive discontinuous Galerkin method for multidimensional ideal magnetohydrodynamics.
1618
+ SIAM Journal on Scientific Computing, 40(5):B1302–B1329, January 2018. doi: 10.1137/18m1168042.
1619
+ [16] Xiangxiong Zhang and Chi-Wang Shu. On positivity-preserving high order discontinuous Galerkin schemes for compressible Euler equations
1620
+ on rectangular meshes. Journal of Computational Physics, 229(23):8917–8934, November 2011. doi: 10.1016/j.jcp.2010.08.016.
1621
+ [17] T. Dzanic and F.D. Witherden. Positivity-preserving entropy-based adaptive filtering for discontinuous spectral element methods. Journal of
1622
+ Computational Physics, 468:111501, November 2022. doi: 10.1016/j.jcp.2022.111501.
1623
+ [18] Yimin Lin, Jesse Chan, and Ignacio Tomas. A positivity preserving strategy for entropy stable discontinuous Galerkin discretizations of the
1624
+ compressible Euler and Navier-Stokes equations. Journal of Computational Physics, 475:111850, February 2023. doi: 10.1016/j.jcp.2022.
1625
+ 111850.
1626
+ [19] Fengyan Li and Chi-Wang Shu. Locally divergence-free discontinuous Galerkin methods for MHD equations. Journal of Scientific Computing,
1627
+ 22-23(1-3):413–442, June 2005. doi: 10.1007/s10915-004-4146-4.
1628
+ [20] J.U Brackbill and D.C Barnes. The effect of nonzero ∇ · B on the numerical solution of the magnetohydrodynamic equations. Journal of
1629
+ Computational Physics, 35(3):426–430, May 1980. doi: 10.1016/0021-9991(80)90079-0.
1630
+ [21] A. Dedner, F. Kemm, D. Kröner, C.-D. Munz, T. Schnitzer, and M. Wesenberg. Hyperbolic divergence cleaning for the MHD equations.
1631
+ Journal of Computational Physics, 175(2):645–673, January 2002. doi: 10.1006/jcph.2001.6961.
1632
+ [22] Ami Harten, Bjorn Engquist, Stanley Osher, and Sukumar R Chakravarthy. Uniformly high order accurate essentially non-oscillatory schemes,
1633
+ III. Journal of Computational Physics, 71(2):231–303, August 1987. doi: 10.1016/0021-9991(87)90031-3.
1634
+ [23] Tuan Anh Dao and Murtazo Nazarov. Monolithic parabolic regularization of the MHD equations and entropy principles. Computer Methods
1635
+ in Applied Mechanics and Engineering, 398:115269, August 2022. doi: 10.1016/j.cma.2022.115269.
1636
+ [24] Eitan Tadmor. A minimum entropy principle in the gas dynamics equations. Applied Numerical Mathematics, 2(3-5):211–219, October 1986.
1637
+ doi: 10.1016/0168-9274(86)90029-2.
1638
+ [25] Jan S. Hesthaven and Tim Warburton. Nodal Discontinuous Galerkin Methods. Springer New York, 2008. doi: 10.1007/978-0-387-72067-8.
1639
+ [26] H. T. Huynh. A flux reconstruction approach to high-order schemes including discontinuous Galerkin methods. In 18th AIAA Computational
1640
+ Fluid Dynamics Conference. American Institute of Aeronautics and Astronautics, June 2007. doi: 10.2514/6.2007-4079.
1641
+ [27] V.V Rusanov. The calculation of the interaction of non-stationary shock waves and obstacles. USSR Computational Mathematics and Math-
1642
+ ematical Physics, 1(2):304–320, January 1962. doi: 10.1016/0041-5553(62)90062-9.
1643
+ [28] P. Castonguay, P. E. Vincent, and A. Jameson. A new class of high-order energy stable flux reconstruction schemes for triangular elements.
1644
+ Journal of Scientific Computing, 51(1):224–256, June 2011. doi: 10.1007/s10915-011-9505-3.
1645
+ [29] W. Trojak and F.D. Witherden. A new family of weighted one-parameter flux reconstruction schemes. Computers & Fluids, 222:104918, May
1646
+ 2021. doi: 10.1016/j.compfluid.2021.104918.
1647
+ [30] P. A. Raviart and J. M. Thomas. A mixed finite element method for 2-nd order elliptic problems. In Lecture Notes in Mathematics, pages
1648
+ 292–315. Springer Berlin Heidelberg, 1977. doi: 10.1007/bfb0064470.
1649
+ [31] Gábor Tóth. The ∇·B=0 constraint in shock-capturing magnetohydrodynamics codes. Journal of Computational Physics, 161(2):605–652,
1650
+ July 2000. doi: 10.1006/jcph.2000.6519.
1651
+ [32] Xiangxiong Zhang and Chi-Wang Shu.
1652
+ On maximum-principle-satisfying high order schemes for scalar conservation laws.
1653
+ Journal of
1654
+ Computational Physics, 229(9):3091–3120, May 2010. doi: 10.1016/j.jcp.2009.12.030.
1655
+ [33] Xiangxiong Zhang, Yinhua Xia, and Chi-Wang Shu.
1656
+ Maximum-principle-satisfying and positivity-preserving high order discontinuous
1657
+ Galerkin schemes for conservation laws on triangular meshes.
1658
+ Journal of Scientific Computing, 50(1):29–62, February 2011.
1659
+ doi:
1660
+ 10.1007/s10915-011-9472-8.
1661
+ T. Dzanic et al.: Preprint submitted to Elsevier
1662
+ Page 21 of 22
1663
+
1664
+ Positivity-preserving entropy filtering for the ideal MHD equations
1665
+ [34] Xiangxiong Zhang and Chi-Wang Shu. Positivity-preserving high order discontinuous Galerkin schemes for compressible Euler equations
1666
+ with source terms. Journal of Computational Physics, 230(4):1238–1248, February 2011. doi: 10.1016/j.jcp.2010.10.036.
1667
+ [35] Tianheng Chen and Chi-Wang Shu. Entropy stable high order discontinuous Galerkin methods with suitable quadrature rules for hyperbolic
1668
+ conservation laws. Journal of Computational Physics, 345:427–461, September 2017. doi: 10.1016/j.jcp.2017.05.025.
1669
+ [36] François Bouchut, Christian Klingenberg, and Knut Waagan. A multiwave approximate Riemann solver for ideal MHD based on relaxation.
1670
+ I: theoretical framework. Numerische Mathematik, 108(1):7–42, September 2007. doi: 10.1007/s00211-007-0108-8.
1671
+ [37] L. Demkowicz, J.T. Oden, and W. Rachowicz. A new finite element method for solving compressible Navier-Stokes equations based on an
1672
+ operator splitting method and h-p adaptivity. Computer Methods in Applied Mechanics and Engineering, 84(3):275–326, December 1990.
1673
+ doi: 10.1016/0045-7825(90)90081-v.
1674
+ [38] F.D. Witherden, A.M. Farrington, and P.E. Vincent. PyFR: An open source framework for solving advection–diffusion type problems on
1675
+ streaming architectures using the flux reconstruction approach. Computer Physics Communications, 185(11):3028–3040, November 2014.
1676
+ doi: 10.1016/j.cpc.2014.07.011.
1677
+ [39] Shengtai Li. An HLLC Riemann solver for magneto-hydrodynamics. Journal of Computational Physics, 203(1):344–357, February 2005.
1678
+ doi: 10.1016/j.jcp.2004.08.020.
1679
+ [40] K. F. Gurski. An HLLC-type approximate Riemann solver for ideal magnetohydrodynamics. SIAM Journal on Scientific Computing, 25(6):
1680
+ 2165–2187, January 2004. doi: 10.1137/s1064827502407962.
1681
+ [41] S. F. Davis. Simplified second-order Godunov-type methods. SIAM Journal on Scientific and Statistical Computing, 9(3):445–473, May 1988.
1682
+ doi: 10.1137/0909030.
1683
+ [42] Amiram Harten, Peter D. Lax, and Bram van Leer. On upstream differencing and Godunov-type schemes for hyperbolic conservation laws.
1684
+ SIAM Review, 25(1):35–61, January 1983. doi: 10.1137/1025002.
1685
+ [43] Gianmarco Mengaldo, Daniele De Grazia, Freddie Witherden, Antony Farrington, Peter Vincent, Spencer Sherwin, and Joaquim Peiro. A
1686
+ guide to the implementation of boundary conditions in compact high-order methods for compressible aerodynamics. In 7th AIAA Theoretical
1687
+ Fluid Mechanics Conference. American Institute of Aeronautics and Astronautics, June 2014. doi: 10.2514/6.2014-2923.
1688
+ [44] M. Dowell and P. Jarratt. A modified regula falsi method for computing the root of an equation. BIT, 11(2):168–174, June 1971. doi:
1689
+ 10.1007/bf01934364.
1690
+ [45] Andrew J. Christlieb, Yuan Liu, Qi Tang, and Zhengfu Xu. Positivity-preserving finite difference weighted ENO schemes with constrained
1691
+ transport for ideal magnetohydrodynamic equations. SIAM Journal on Scientific Computing, 37(4):A1825–A1845, January 2015. doi: 10.
1692
+ 1137/140971208.
1693
+ [46] Gary A Sod. A survey of several finite difference methods for systems of nonlinear hyperbolic conservation laws. Journal of Computational
1694
+ Physics, 27(1):1–31, April 1978. doi: 10.1016/0021-9991(78)90023-2.
1695
+ [47] Steven A. Orszag and Cha-Mei Tang. Small-scale structure of two-dimensional magnetohydrodynamic turbulence. Journal of Fluid Mechan-
1696
+ ics, 90(1):129–143, January 1979. doi: 10.1017/s002211207900210x.
1697
+ [48] Guang-Shan Jiang and Cheng-Chin Wu. A high-order WENO finite difference scheme for the equations of ideal magnetohydrodynamics.
1698
+ Journal of Computational Physics, 150(2):561–594, April 1999. doi: 10.1006/jcph.1999.6207.
1699
+ [49] Andrew L. Zachary, Andrea Malagoli, and Phillip Colella. A higher-order Godunov method for multidimensional ideal magnetohydrodynam-
1700
+ ics. SIAM Journal on Scientific Computing, 15(2):263–284, March 1994. doi: 10.1137/0915019.
1701
+ [50] James M. Stone and Thomas Gardiner. Nonlinear evolution of the magnetohydrodynamic Rayleigh-Taylor instability. Physics of Fluids, 19
1702
+ (9):094104, September 2007. doi: 10.1063/1.2767666.
1703
+ T. Dzanic et al.: Preprint submitted to Elsevier
1704
+ Page 22 of 22
1705
+
HtE1T4oBgHgl3EQfXwQA/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ItE3T4oBgHgl3EQfXAqD/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:abab2159b144ca7469f5cf3e1e359cd41a2ea74e114b13270e59b40f208677e3
3
+ size 5963821
ItFKT4oBgHgl3EQfdy7h/content/2301.11822v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8c43bdd29c32e69edb7e97f2930470d4e7eb906cdedcbb2e111fb4522d3c1425
3
+ size 221292
ItFKT4oBgHgl3EQfdy7h/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5a005be37bee953ade22f268c077252a8cdc4be03d7b2edce240d68ccccd7383
3
+ size 2555949
ItFKT4oBgHgl3EQfdy7h/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:447adb0fa9a607dd5750b1441e207e04cb7d0919365f29c43eb7796ef727a57d
3
+ size 88496
JdAyT4oBgHgl3EQf5_qu/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d26aae70ae23a18c30e9f341ea82034cde30ff7f40021fce1b697e0bbbd54ab1
3
+ size 101147
JtE0T4oBgHgl3EQfSADl/content/tmp_files/2301.02217v1.pdf.txt ADDED
@@ -0,0 +1,1455 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ EgoDistill: Egocentric Head Motion Distillation
2
+ for Efficient Video Understanding
3
+ Shuhan Tan1
4
+ Tushar Nagarajan1
5
+ Kristen Grauman1,2
6
+ 1The University of Texas at Austin
7
+ 2FAIR, Meta AI
8
+ {shuhan,tushar.nagarajan,grauman}@cs.utexas.edu
9
+ Abstract
10
+ Recent advances in egocentric video understanding
11
+ models are promising, but their heavy computational ex-
12
+ pense is a barrier for many real-world applications. To ad-
13
+ dress this challenge, we propose EgoDistill, a distillation-
14
+ based approach that learns to reconstruct heavy egocen-
15
+ tric video clip features by combining the semantics from
16
+ a sparse set of video frames with the head motion from
17
+ lightweight IMU readings. We further devise a novel self-
18
+ supervised training strategy for IMU feature learning. Our
19
+ method leads to significant improvements in efficiency, re-
20
+ quiring 200× fewer GFLOPs than equivalent video models.
21
+ We demonstrate its effectiveness on the Ego4D and EPIC-
22
+ Kitchens datasets, where our method outperforms state-of-
23
+ the-art efficient video understanding methods.
24
+ 1. Introduction
25
+ Recent advances in augmented and virtual reality
26
+ (AR/VR) technology have the potential to change the way
27
+ people interact with the digital world, much like the smart-
28
+ phone did in the previous decade.
29
+ A fundamental re-
30
+ quirement for AR/VR systems is the ability to recognize
31
+ user behavior from egocentric video captured from a head-
32
+ mounted camera.
33
+ Towards this goal, several egocentric
34
+ video datasets have been proposed in recent years, spurring
35
+ increasing attention of the research community [11,26,56].
36
+ Recent advances in egocentric action recognition, antic-
37
+ ipation, and retrieval focus on building powerful clip-based
38
+ video models that operate on video clips of a few seconds
39
+ at a time [12, 16, 18, 25, 43, 44, 54, 55]. Despite encourag-
40
+ ing performance, these models typically process densely-
41
+ sampled frames with temporally-aware operations, making
42
+ them computationally heavy. This makes them impractical
43
+ for AR/VR devices with constrained resources, or for real-
44
+ time video applications that require low latency. How to
45
+ efficiently perform egocentric video understanding is there-
46
+ fore an important, yet unsolved problem.
47
+ +
48
+ Camera motion (IMU)
49
+ Video Frame
50
+ EgoDistill
51
+ Figure 1. Illustration of EgoDistill. Given a single video frame
52
+ and camera motion from IMU, EgoDistill learns to reconstruct the
53
+ more expensive dense video clip feature. With its lightweight in-
54
+ put, EgoDistill significantly improves efficiency.
55
+ To address this issue, we take inspiration from how an-
56
+ imals perceive the world with ego-motion. Neuroscience
57
+ research has found that during active movement, the animal
58
+ visual cortex receives and utilizes head motion signals from
59
+ the motor cortex for visual processing [27,52,53]. This indi-
60
+ cates that head motion signals support an embodied agent’s
61
+ efficient understanding of the egocentric visual stream. In-
62
+ spired by this phenomenon, we explore the relationship be-
63
+ tween human head motion and egocentric video for efficient
64
+ video understanding. In practice, we consider head motion
65
+ signals captured by the inertial measurement unit (IMU) of
66
+ a head-mounted camera. IMU measures motion from an ac-
67
+ celerometer and gyroscope and is widely available on pop-
68
+ ular wearable devices. Prior work leverages IMU as an ex-
69
+ tra modality for human action recognition [13,68,69], (e.g.,
70
+ jumping, walking, standing) or as geometric cues for visual-
71
+ inertial odometry [7,20,71].
72
+ In contrast, we propose to achieve efficient video under-
73
+ standing by drawing on IMU as a substitute for dense video
74
+ frame observations. The intuition is as follows. A video
75
+ clip contains two things: semantic content (appearance of
76
+ objects, places, people) and dynamics (how the scene and
77
+ the camera move).
78
+ While densely sampled frames are
79
+ sure to capture both of the above—as done by current clip
80
+ arXiv:2301.02217v1 [cs.CV] 5 Jan 2023
81
+
82
+ models [16, 17, 54]—we hypothesize they are sometimes
83
+ overkill. For a short video clip, much of the semantic con-
84
+ tent is intelligible from even a single frame; meanwhile, the
85
+ head motion provides a good portion of the dynamics, im-
86
+ plicitly revealing how the visual appearance changes across
87
+ neighboring frames.
88
+ Building on this insight, we introduce EgoDistill, an ap-
89
+ proach that learns to reconstruct dense egocentric video
90
+ clip features using temporally sparse visual observations
91
+ (as few as one RGB frame) together with the head motion
92
+ from IMU. Specifically, EgoDistill employs a new form of
93
+ knowledge distillation from video models. During training,
94
+ we train a lightweight model that takes sparsely sampled
95
+ image(s) and IMU to approximate the video representation
96
+ extracted by a powerful but expensive video model. We fur-
97
+ ther improve the model with a novel self-supervised train-
98
+ ing stage for IMU feature learning. During inference, we
99
+ directly utilize the lightweight model for egocentric video
100
+ recognition, leading to much higher efficiency. Our model
101
+ is flexible to the target heavy video feature, as we demon-
102
+ strate with multiple current leading egocentric video mod-
103
+ els [16–18,54]. See Figure 1.
104
+ Importantly, EgoDistill offers a major efficiency gain:
105
+ processing low-dimensional IMU and a few frames is much
106
+ more efficient compared to processing a dense stack of
107
+ frames. In practice, EgoDistill uses 200× fewer GFLOPs
108
+ than the original video model.
109
+ We experiment on the largest available egocentric ac-
110
+ tion recognition datasets: Ego4D [26] and EPIC-Kitchens-
111
+ 100 [11]. We show that IMU coupled with an image offers
112
+ better cross-modality knowledge distillation performance
113
+ than images alone or images with audio. For a typical 50-
114
+ minute egocentric video, EgoDistill reduces inference time
115
+ of the source video model from 25 minutes to 36 seconds.
116
+ Moreover, with only 1-4 frames, our lightweight distillation
117
+ model achieves a better accuracy-efficiency trade-off than
118
+ state-of-the-art models for adaptively sampling video con-
119
+ tent [50,65]. Notably, we surpass the accuracy of these fast
120
+ approaches by a large margin while requiring 4× to 8× less
121
+ computation.
122
+ 2. Related Work
123
+ IMU for activity recognition. Recent work explores us-
124
+ ing the IMU sensor on mobile devices for human activ-
125
+ ity recognition of actions like walking, jumping, or sit-
126
+ ting [3,47,59–61]. Normally, these models take input from
127
+ IMU sensors mounted on human body joints [9, 42, 60],
128
+ waist-mounted [41] or in-pocket smartphones [33]. See [64]
129
+ for a survey. Abundant work in video recognition explores
130
+ ways to learn from RGB coupled with other modalities—
131
+ audio [1, 22, 38], optical flow [19, 57, 58] or both [32, 36,
132
+ 51]—but comparatively fewer use IMU [48], and unlike our
133
+ work, they focus on third-person video [13, 68, 69] and do
134
+ not target at model efficiency. Our idea is for IMU to help
135
+ reconstruct more expensive video features, rather than sim-
136
+ ply fuse IMU with RGB for multi-modal recognition.
137
+ IMU for odometry. Inertial odometry aims to estimate the
138
+ position and orientation of the camera-wearer with readings
139
+ from the IMU sensor. Traditionally, methods rely on IMU
140
+ double integration [4] or enhancements thereof [5, 35, 40].
141
+ Recent data-driven methods automatically learn to per-
142
+ form inertial odometry with supervised [30, 70] or self-
143
+ supervised learning [7], or combine IMU and visual in-
144
+ put for more robust estimates with visual-inertial odome-
145
+ try [20, 71]. While IMU can convey geometric ego-motion
146
+ to our learned model, our goal is to produce efficient ego-
147
+ centric video features rather than to output odometry.
148
+ Visual feature learning with IMU. IMU is also used to
149
+ learn better vision features [14,15,34,63], e.g., to encourage
150
+ image features that are equivariant with ego-motion [34],
151
+ to predict an IMU-captured body part (leg, hand) [14, 15],
152
+ or to predict video-IMU correspondence [63], for applica-
153
+ tions like action recognition [15,63] and scene understand-
154
+ ing [14, 34]. While these results reinforce that IMU can
155
+ inject embodied motion into visual features, our idea to use
156
+ head motion to infer pretrained video features for speedy
157
+ video understanding is distinct.
158
+ Efficient video recognition. Being crucial for mobile ap-
159
+ plications, efficient video recognition has received increas-
160
+ ing attention in recent years. Several studies focus on de-
161
+ signing lightweight architectures [17, 30, 37, 62, 72] by re-
162
+ ducing 3D CNN operations across densely sampled frames.
163
+ Our idea is orthogonal to them as we focus on inputs with
164
+ sparsely-sampled frames. As we show in experiments, our
165
+ method is compatible with different video architectures.
166
+ Another line of research achieves efficiency by adap-
167
+ tively selecting video content to process.
168
+ Some reduce
169
+ temporal redundancy by adaptively selecting which video
170
+ clip [39], frames [24, 49], and/or feature channel [50] to
171
+ process and which to skip, while others reduce spatial re-
172
+ dundancy, efficient recognition by dynamically selecting
173
+ selecting for each frame a smaller but important region to
174
+ process [66,67]. Other work dynamically selects tokens in
175
+ video transformers among both the spatial and temporal di-
176
+ mensions [65]. Our idea is complementary: rather than dy-
177
+ namically subsample the available video content, we show
178
+ how to infer “full” video features for every clip using static
179
+ image(s) and motion data. Our results outperform state-of-
180
+ the-art sampling models (cf. Sec. 4). In addition, we fo-
181
+ cus on egocentric video, where head motion is particularly
182
+ meaningful for inferring unobserved visual content. To our
183
+ knowledge, ours is the first technique specifically aimed at
184
+ accelerating egocentric video processing.
185
+ Multimodal distillation. Knowledge distillation aims to
186
+ transfer knowledge learned by an expensive model to a
187
+ lightweight model [31]. Recent work explores multimodal
188
+
189
+ distillation, e.g., transferring from a RGB model to a flow or
190
+ depth model [23,28], from a 3D model to a 2D model [45],
191
+ or from a visual model to audio model [2,21]. The Listen-
192
+ ToLook model [22] incorporates both clip subsampling and
193
+ video-to-audio distillation for fast activity recognition in
194
+ third-person video. In contrast, we explore the relationship
195
+ between the camera-wearer’s head motion and RGB sig-
196
+ nals for egocentric video. Our experiments show EgoDis-
197
+ till’s advantage over ListenToLook in terms of the speed-
198
+ accuracy tradeoff on egocentric video datasets.
199
+ 3. Approach
200
+ We introduce EgoDistill, which uses sparsely-sampled
201
+ frames and head motion from IMU to approximate the fea-
202
+ tures of heavy video models for efficient egocentric video
203
+ understanding.
204
+ We first introduce the egocentric action
205
+ recognition task (Sec. 3.1). Then, we introduce our pipeline
206
+ (Sec. 3.2), our distillation model and training objective
207
+ (Sec. 3.3), and our self-supervised IMU feature learning
208
+ (Sec. 3.4). Figure 2 overviews our approach.
209
+ 3.1. Egocentric action recognition
210
+ Given a fixed-length video clip V ∈ RT ×H×W ×3 con-
211
+ sisting of T RGB frames of size H×W and a set of C action
212
+ classes, the task of action recognition is to output a score for
213
+ each action class, representing its likelihood. Typically, this
214
+ is done with a powerful but expensive video model Ω, that
215
+ directly operates on all the available frames to output the C
216
+ class logits Ω(V) ∈ RC. Ω is trained with standard classifi-
217
+ cation loss:
218
+ LACT =
219
+
220
+ Vi
221
+ LCE(ci, σ(Ω(Vi))),
222
+ (1)
223
+ where Vi is the i-th video clip in the dataset, ci is the
224
+ corresponding ground-truth action label, σ is the softmax
225
+ function, and LCE is cross-entropy loss.
226
+ Popular video
227
+ recognition models use clips that are typically �2 seconds
228
+ long [16, 18, 54]. For longer videos, scores are averaged
229
+ across all clips it contains to infer the video action label.
230
+ 3.2. Efficient video inference with head motion
231
+ Processing the video clip V for action recognition is
232
+ computationally intensive; however, the computation cost
233
+ can be modulated depending on how frames from the clip
234
+ are used. On the one hand, clip-based models [16–18, 54]
235
+ process most (or all) frames in a video clip V to achieve
236
+ strong recognition performance, but come at a high com-
237
+ putational cost.
238
+ On the other hand, frame-level mod-
239
+ els [24, 49, 51, 67] only process one (or a small number)
240
+ of frames from V and are more efficient, but suffer a drop
241
+ in performance as a result. Our goal is to train a frame-
242
+ based model that can approximate heavy clip-based model
243
+ performance while maintaining high efficiency.
244
+ For this, we turn to head motion captured by IMU. Along
245
+ with RGB frames, each video clip is paired with IMU mea-
246
+ surements M that record the camera (head) motion during
247
+ the video. Specifically, the IMU readings are composed of
248
+ 6-dimensional accelerometer and gyroscope measurements
249
+ in the xyz axes, which encode strong temporal motion in-
250
+ formation about camera pose changes (both translation and
251
+ rotation) across frames.
252
+ For short video clips, a set of sparsely sampled frames I
253
+ often already captures most appearance information. Com-
254
+ plementary to this, the IMU readings capture camera mo-
255
+ tion information (see below for discussion on scene mo-
256
+ tion). Moreover, IMU is very efficient to process due to its
257
+ low dimensionality. By processing inputs from these two
258
+ sources with a lightweight frame-based model, we can infer
259
+ the semantic and dynamic features of a heavier clip-based
260
+ video model.
261
+ Given I and M, we train an efficient lightweight model
262
+ Φ to approximate the output of video model Ω. Specifically,
263
+ we train our EgoDistill model Φ that achieves
264
+ Φ(I, M) ≈ Ω(V).
265
+ (2)
266
+ Such a lightweight model will be able to approximate the
267
+ result of the heavy video model, while being much more ef-
268
+ ficient. Our approach is agnostic to the specific video model
269
+ Ω; in experiments, we demonstrate its versatility for Mo-
270
+ tionFormer [54], MViT [16], SlowFast [18] and X3D [17].
271
+ In practice, we uniformly sample N frames1 from V to
272
+ obtain I. We can achieve a trade-off between efficiency and
273
+ performance by changing the number of frames N. In our
274
+ experiments we use very low values of N (1 to 4 frames).
275
+ In the next section, we discuss how we train Φ.
276
+ 3.3. Video feature distillation with IMU
277
+ We achieve the objective in Equation 2 via knowledge
278
+ distillation [31], where we transfer knowledge learned by
279
+ the expensive teacher model Ω to a lightweight student
280
+ model Φ. Next we present the design of Φ and the train-
281
+ ing objectives, followed by our self-supervised IMU feature
282
+ pretraining stage in Sec. 3.4.
283
+ We design Φ to be a two-stream model. For a video clip
284
+ and associated IMU signal (I, M), we extract image fea-
285
+ tures zI = fI(I) and IMU features zM = fM(M) using
286
+ lightweight feature encoders fI, fM respectively. Then,
287
+ we fuse zI and zM with a fusion network Π to obtain the
288
+ fused VisIMU feature zφ = Π(zI, zM). Finally, a fully-
289
+ connected layer uses the fused feature to predict class logits
290
+ Φ(I, M) ∈ RC.
291
+ The fused feature zφ contains semantic information from
292
+ the image frame coupled with complementary motion infor-
293
+ 1Other frame sampling heuristics (e.g., selecting from the start or center
294
+ of the video) performed equivalently or worse than uniform sampling.
295
+
296
+ Video clip
297
+ Video model
298
+ Frame
299
+ IMU
300
+ Image Encoder
301
+ IMU Encoder
302
+ Fusion Layer
303
+ FC-Softmax
304
+ FC-Softmax
305
+ Frame
306
+ IMU
307
+ Image Encoder
308
+ IMU Encoder
309
+ Frame
310
+ Image Encoder
311
+ IMU Predictor
312
+ Figure 2. EgoDistill architecture. Left: Self-supervised IMU feature learning. Given start and end frames of a clip, we train the IMU
313
+ encoder to anticipate visual changes. Right: Video feature distillation with IMU. Given image frame(s) and IMU, along with our pre-
314
+ trained IMU encoder, our method trains a lightweight model with knowledge distillation to reconstruct the features from a heavier video
315
+ model. When the input includes more than one image frame, the image encoder aggregates frame features temporally with a GRU.
316
+ mation from IMU, allowing us to accurately reconstruct the
317
+ video clip feature. See Figure 2.
318
+ We train Φ with a combination of three losses, as fol-
319
+ lows. First, we train Φ to approximate the original video
320
+ feature zV from the video model Ω:
321
+ L1 =
322
+
323
+ (zVi,zφi)
324
+ ∥zVi − zφi∥1 .
325
+ (3)
326
+ This cross-modal loss encourages the fused feature zφ to
327
+ match the video feature, i.e., the combined features from
328
+ the different modalities should match in the feature space.
329
+ Training with L1 alone does not fully capture the clas-
330
+ sification output of Ω. Therefore, we also train Φ with a
331
+ knowledge distillation loss:
332
+ LKD =
333
+
334
+ (Vi,Ii,Mi)
335
+ DKL(σ(Ω(Vi)/τ), σ(Φ(Ii, Mi)/τ)),
336
+ (4)
337
+ where (Vi, Ii, Mi) represents the i-th clip in the dataset,
338
+ DKL measures KL-divergence between the class logits from
339
+ the teacher model Ω and student model Φ, and τ is a tem-
340
+ perature parameter. Intuitively, LKD casts the output of the
341
+ video teacher model as a soft target for training the student
342
+ model. In this way, the student model learns to better gen-
343
+ eralize by mimicking the output distribution of the heavy
344
+ video model.
345
+ Finally, to further encourage the features to preserve el-
346
+ ements useful for activity understanding, we also compute
347
+ an action classification loss:
348
+ LGT =
349
+
350
+ (Ii,Mi)
351
+ LCE(ci, σ(Φ(Ii, Mi))),
352
+ (5)
353
+ where ci is the ground-truth action label, following Equa-
354
+ tion 1. The final training loss is a combination of these three
355
+ loss functions:
356
+ L = αLKD + (1 − α)LGT + βL1,
357
+ (6)
358
+ where α controls the balance between knowledge distilla-
359
+ tion and activity training [31], and β controls the weight for
360
+ feature space matching.
361
+ Critically, processing a few image frame(s) and the low-
362
+ dimensional IMU readings is substantially faster than pro-
363
+ cessing the entire video. Once trained, our model can ap-
364
+ proximate the behavior of the source video model for recog-
365
+ nition tasks, with the key benefit of efficient egocentric
366
+ video recognition.
367
+ What kind of motion does our model preserve? Video
368
+ motion decomposes into scene motion (e.g., how the objects
369
+ and the camera wearer’s hands are moving on their own),
370
+ and camera motion (i.e., how the camera wearer is moving
371
+ their head). By itself, IMU would directly account only for
372
+ camera motion, not scene motion. However, by learning to
373
+ map from the RGB frame and IMU to the full video fea-
374
+ ture, we are able to encode predictable scene motions tied
375
+ to scene content, e.g., how does hand and object movement
376
+ in subsequent frames relate to the camera wearer’s head mo-
377
+ tion (see Figure 7). Moreover, our model is applied to rel-
378
+ atively short clips (1-2 seconds) in sequence, which means
379
+ the appearance content is regularly refreshed as we slide
380
+ down to process the longer video.
381
+ 3.4. Self-supervised IMU feature learning
382
+ The success of EgoDistill depends on how well the IMU
383
+ feature encoder fM extracts useful camera motion informa-
384
+ tion and associates it with the visual appearance change in
385
+ the video clip. In this way EgoDistill can learn to antic-
386
+ ipate unseen visual changes in the video with I and M.
387
+ We design a self-supervised pretraining task to initialize the
388
+ weights of fM to achieve this.
389
+
390
+ Specifically, for each clip V, we obtain its first and last
391
+ frames (I0, IT ) as well as the IMU M. We first extract
392
+ visual features z0
393
+ I, zT
394
+ I and IMU feature zM with feature
395
+ extractors fI and fM mentioned above. Then, we train
396
+ a feature predictor h to predict the IMU feature ˆzM =
397
+ h(z0
398
+ I, zT
399
+ I ). By connecting ˆzM—which is a function of im-
400
+ age features only—with zM, we encourage fM to extract
401
+ useful camera motion features specifically associated with
402
+ the visual appearance changes. Note that those appearance
403
+ changes may include scene motion. Therefore, we include
404
+ an L1 loss to train fM, which encourages fM to extract mo-
405
+ tion features accounting for scene motion in the full video.
406
+ In sum, we train fM, h, and the fusion network Π using
407
+ L1 and NCE loss [29]: Lpretrain = LNCE + L1, where
408
+ LNCE =
409
+
410
+ i
411
+ − log
412
+ sim(ˆzMi, zMi)
413
+
414
+ j sim(ˆzMi, zMj).
415
+ (7)
416
+ We sample negative examples zMj from other instances
417
+ in the same mini-batch for j
418
+ ̸=
419
+ i, and sim(q, k)
420
+ =
421
+ exp( q·k
422
+ |q||k|
423
+ 1
424
+ τ ′ ) with temperature τ ′ = 0.12.
425
+ To summarize, prior to the main training stage of Equa-
426
+ tion 6, we pretrain the IMU feature extractor fM and fu-
427
+ sion network Π. As we will show below, both pretraining
428
+ losses result in IMU features that are consistent with visual
429
+ changes and lead to better finetuning performance.
430
+ 4. Experiments
431
+ We evaluate our approach for resource-efficient action
432
+ recognition.
433
+ 4.1. Experimental setup
434
+ Datasets.
435
+ We experiment on two large-scale egocen-
436
+ tric action recognition datasets.
437
+ Ego4D [26] contains
438
+ 3,670 hours of egocentric videos of people performing di-
439
+ verse tasks (from cooking to farming) across the globe.
440
+ As action recognition is not part of the original Ego4D
441
+ benchmark, we construct this task with annotations from
442
+ the Hands+Objects temporal localization benchmark [26]
443
+ (see Supp. for details).
444
+ We include clips with paired
445
+ IMU and audio3, and consider classes with at least 2 la-
446
+ beled instances.
447
+ This results in a 94-class action recog-
448
+ nition dataset with 8.5k training videos and 3.6k evalua-
449
+ tion videos. EPIC-Kitchens [11] contains 100 hours of
450
+ egocentric videos capturing daily activities in kitchen en-
451
+ vironments. We use annotations from the action recogni-
452
+ tion benchmark. Similar to Ego4D, we select videos that
453
+ have paired IMU and audio data, and split the resulting data
454
+ by camera-wearer. This results in a 62-class action dataset
455
+ 2We keep the ImageNet-pretrained fI model frozen, as finetuning it
456
+ leads to mode collapse.
457
+ 3We require audio to compare with the audio-based baseline [22].
458
+ with 29k training videos and 6.2k evaluation videos. For
459
+ both datasets, we use “verb” labels as the target for action
460
+ recognition as they are well aligned to activity motions.
461
+ Evaluation metrics. To measure action recognition per-
462
+ formance, we report the per-video top-1 accuracy on the
463
+ validation set. We densely sample clips from each video
464
+ and average their predictions to compute accuracy.
465
+ To
466
+ benchmark efficiency, we measure computational cost with
467
+ FLOPs (floating-point operations) during inference.
468
+ Implementation details. In our main experiments, we
469
+ use MotionFormer [54] as the video teacher model Ω due
470
+ to its strong performance for egocentric video. For EPIC-
471
+ Kitchens, we use the authors’ provided checkpoint.
472
+ For
473
+ Ego4D, we finetune the above model for 50 epochs with
474
+ 1e−4 learning rate and 64 batch size on the training set.
475
+ We use 16-frame input with sample rate 4. For the stu-
476
+ dent model Φ, we use a ResNet-18 as the image backbone
477
+ fI and a 1D Dilated CNN [6] for the IMU backbone fM.
478
+ The feature fusion module Π uses a concatenation operation
479
+ following a two-layer fully-connected layer with hidden di-
480
+ mension 1024. For each video clip, the input image(s) is
481
+ resized to 224 × 224, and the IMU is a 422 × 6 matrix
482
+ (around 2 seconds with 198Hz frequency), representing the
483
+ accelerometer and gyroscope readings along the xyz axes.
484
+ For the image input, we uniformly sample N frames from
485
+ the video clip. If N > 1, we use fI to sequentially gen-
486
+ erate features for each frame and aggregate them with a
487
+ GRU module [10]. For both datasets, we first pretrain the
488
+ model with the self-supervised objective (Section 3.4) for
489
+ 50 epochs with AdamW [46] using batch size 64 and learn-
490
+ ing rate 1e−4. Then, we finetune all the models with the
491
+ same setting (Equation 6). We set α = 0.95 and β = 1.0
492
+ based on validation data. For Ego4D, we set τ = 10.0 and
493
+ train the model for 150 epochs. For EPIC-Kitchens, we set
494
+ τ = 1.0 and train for 50 epochs.
495
+ 4.2. Baselines
496
+ We compare to the following methods:
497
+ • AdaFuse [50] trains a lightweight policy network to
498
+ adaptively compute (or skip) feature map channels for
499
+ each frame during inference. We use the AdaFuseTSN
500
+ R50
501
+ model with the provided hyper-parameters.
502
+ • STTS [65] trains a module to rank spatio-temporal
503
+ tokens derived from videos in a transformer-based
504
+ model, and selects only the top-K tokens to speed up
505
+ inference.
506
+ • ListenToLook [22]: uses the audio-based feature dis-
507
+ tillation module from [22] following the same audio
508
+ processing and model architecture.
509
+ These methods represent recent advances in efficient
510
+ video recognition models. AdaFuse represents state-of-the-
511
+
512
+ 2
513
+ 4
514
+ 6
515
+ 8
516
+ 10
517
+ 12
518
+ 14
519
+ 16
520
+ Inference cost per video clip (GFLOPs)
521
+ 33
522
+ 34
523
+ 35
524
+ 36
525
+ 37
526
+ 38
527
+ Ego4D accuracy (%)
528
+ Ego4D
529
+ 2
530
+ 4
531
+ 6
532
+ 8
533
+ 10
534
+ 12
535
+ 14
536
+ 16
537
+ Inference cost per video clip (GFLOPs)
538
+ 30
539
+ 35
540
+ 40
541
+ 45
542
+ 50
543
+ EPIC-Kitchens accuracy (%)
544
+ EPIC-Kitchens
545
+ EgoDistill (ours)
546
+ AdaFuse [50]
547
+ STTS [65]
548
+ ListenToLook [22]
549
+ VisOnly-Distill
550
+ VisIMU
551
+ VisOnly
552
+ Figure 3. Accuracy vs. efficiency for action recognition on Ego4D (left) and EPIC-Kitchens (right). EgoDistill outperforms state-of-
553
+ the-art efficient video recognition methods that adaptively sample video content, while using 4× to 8× fewer GFLOPs.
554
+ LKD
555
+ L1
556
+ LGT
557
+ L1-pretrain
558
+ LNCE-pretrain
559
+ Ego4D
560
+ EPIC-Kitchens
561
+
562
+ 34.15
563
+ 35.04
564
+
565
+
566
+
567
+
568
+ 35.51
569
+ 39.33
570
+
571
+
572
+
573
+
574
+ 37.71
575
+ 42.20
576
+
577
+
578
+
579
+
580
+ 37.46
581
+ 43.17
582
+
583
+
584
+
585
+ 36.99
586
+ 41.21
587
+
588
+
589
+
590
+
591
+ 37.26
592
+ 42.30
593
+
594
+
595
+
596
+
597
+ 37.49
598
+ 43.51
599
+
600
+
601
+
602
+
603
+
604
+ 37.95
605
+ 44.95
606
+ Table 1. Ablation study of model components. We compare the
607
+ accuracy of EgoDistill with different components under N = 1.
608
+ art approaches that achieve efficiency by reducing tempo-
609
+ ral redundancy in CNN models. STTS is one of the most
610
+ recent approaches that efficiently reduces both spatial and
611
+ temporal redundancy in ViT models, which achieves the
612
+ state-of-the-art on Kinectics-400 [8]. ListenToLook also re-
613
+ lies on distillation, but using audio rather than head motion.
614
+ For each model we generate multiple versions with differ-
615
+ ent computation budgets to plot accuracy vs. GFLOPs. We
616
+ train all AdaFuse and STTS models with 4 input frames to
617
+ align with the maximum frames used by our model.
618
+ For
619
+ AdaFuse, we use the only provided hyper-parameter in the
620
+ paper.4 For STTS, we use three provided variants: T0
621
+ 0.5-
622
+ S4
623
+ 0.7, T0
624
+ 0.8-S4
625
+ 0.9 and the full model without token selection.
626
+ For ListenToLook we adopt the same efficiency-accuracy
627
+ trade-off as our method, i.e., varying the number of input
628
+ frames.
629
+ In addition, we test variants of our method:
630
+ • VisOnly-Distill is our model without the IMU branch
631
+ and fusion layer but trained with the same loss func-
632
+ tion. Performance of this model reveals the role of
633
+ IMU in the process of distillation.
634
+ • VisIMU is our model trained with only LGT in Equa-
635
+ 4Modifying hyper-parameters to control the accuracy-efficiency trade-
636
+ off results in unstable training and unreliable performance.
637
+ Source Model
638
+ Ego4D
639
+ EPIC-Kitchens
640
+ Video
641
+ EgoDistill
642
+ VisOnly-D
643
+ Video
644
+ EgoDistill
645
+ VisOnly-D
646
+ MFormer [54]
647
+ 46.38
648
+ 37.95
649
+ 34.32
650
+ 77.28
651
+ 44.95
652
+ 37.20
653
+ MViT [16]
654
+ 40.32
655
+ 36.46
656
+ 33.40
657
+ 53.38
658
+ 36.90
659
+ 31.22
660
+ SlowFast [18]
661
+ 40.52
662
+ 33.29
663
+ 33.04
664
+ 58.34
665
+ 39.42
666
+ 33.47
667
+ X3D [17]
668
+ 37.56
669
+ 33.57
670
+ 32.90
671
+ 52.28
672
+ 36.34
673
+ 31.71
674
+ Table 2. Versatility to model architectures. EgoDistill outper-
675
+ forms the baseline for multiple common architectures, showing
676
+ the generality of our idea. “Video” refers to the more expensive
677
+ source model. We show the model accuracy under N = 1.
678
+ tion 5. It shows the effectiveness of distillation from
679
+ the video model compared with directly training the
680
+ features with action labels.
681
+ • VisOnly is an image-only model trained with LGT,
682
+ which serves as the baseline.
683
+ 4.3. Main Results
684
+ Importance of IMU-guided distillation.
685
+ Figure 3
686
+ shows the accuracy vs. efficiency curves. Methods towards
687
+ the top-left of the plot represent those with both high ac-
688
+ curacy and efficiency.
689
+ Our method achieves good accu-
690
+ racy with low computational cost. Specifically, on EPIC-
691
+ Kitchens, when N = 1, EgoDistill improves over VisOnly-
692
+ Distill by 8.4% with only a small increase in computa-
693
+ tion. This result shows the effectiveness of IMU for recon-
694
+ structing egocentric video features. Compared to VisIMU,
695
+ EgoDistill improves by 9.9%, showing the effectiveness of
696
+ knowledge distillation from the video model. Importantly,
697
+ this reveals that EgoDistill does not simply benefit from the
698
+ extra IMU context; our idea to approximate video features is
699
+ necessary for best results. We see similar results on Ego4D.
700
+ Comparison with the state of the art. Figure 3 also
701
+ shows that EgoDistill achieves better accuracy with less
702
+ computation than existing efficient video recognition mod-
703
+ els AdaFuse [50], STTS [65], and ListenToLook [22].
704
+
705
+ pack
706
+ sew
707
+ iron
708
+ spray
709
+ unscrew
710
+ paint
711
+ dip
712
+ water
713
+ play
714
+ file
715
+ hit
716
+ throw
717
+ inspect
718
+ pull
719
+ insert
720
+ clean
721
+ close
722
+ detach
723
+ smooth
724
+ cut
725
+ press
726
+ hang
727
+ shuffle
728
+ tighten
729
+ 20
730
+ 0
731
+ 20
732
+ 40
733
+ 60
734
+ Accuracy improvement(%)
735
+ Ego4D
736
+ break
737
+ mix
738
+ drink
739
+ shake
740
+ dry
741
+ pour
742
+ close
743
+ wash
744
+ put
745
+ cut
746
+ turn-off
747
+ apply
748
+ open
749
+ peel
750
+ turn-on
751
+ throw
752
+ flip
753
+ scrub
754
+ insert
755
+ move
756
+ take
757
+ empty
758
+ fill
759
+ scoop
760
+ 10
761
+ 0
762
+ 10
763
+ 20
764
+ 30
765
+ 40
766
+ Accuracy improvement(%)
767
+ EPIC-Kitchens
768
+ Figure 4. Per-class accuracy improvement over VisOnly-Distill.
769
+ Best and worst performing classes are shown.
770
+ GFLOPs
771
+ Runtime (ms)
772
+ Parameters (M)
773
+ Video [54]
774
+ 369.51
775
+ 10.70
776
+ 108.91
777
+ AdaFuse [50]
778
+ 15.20
779
+ 2.04
780
+ 38.85
781
+ STTS [65]
782
+ 7.19
783
+ 1.63
784
+ 36.63
785
+ ListenToLook [22]
786
+ 3.10
787
+ 0.43
788
+ 25.53
789
+ EgoDistill
790
+ 1.91
791
+ 0.25
792
+ 20.56
793
+ Table 3. Efficiency analysis. Our approach is the most efficient.
794
+ “Video” refers to the original (full-clip) feature. Lower is better.
795
+ With N = 4 frames, EgoDistill surpasses STTS by 7.4%
796
+ and AdaFuse by 4.2% on EPIC-Kitchens, with 2× fewer
797
+ GFLOPs, and surpasses both methods by 2.1% on Ego4D.
798
+ In addition, EgoDistill surpasses ListenToLook by 7.4%
799
+ and 2.9% on EPIC-Kitchens and Ego4D respectively, which
800
+ suggests that head motion is more informative than audio
801
+ for feature reconstruction in egocentric video.
802
+ 4.4. Analysis
803
+ Model component ablations. Table 1 ablates different
804
+ design choices in our model, setting N = 1 for all exper-
805
+ iments. We observe that training EgoDistill without L1,
806
+ LKD or LGT deteriorates performance. Specifically, training
807
+ without LKD leads to the largest performance drop, which
808
+ indicates that knowledge distillation is an essential compo-
809
+ nent in our approach. Training without L1 also leads to a
810
+ significant performance drop, which shows the importance
811
+ of our idea to align features from the different modalities.
812
+ Further, our self-supervised pretraining stage is very effec-
813
+ tive at training the IMU extractor to encode useful motion
814
+ information that is consistent with visual feature change.
815
+ Finally, we compare with a model that simply does multi-
816
+ modal recognition with IMU (top row). The strong contrast
817
+ here indicates the importance of our idea to use IMU to pre-
818
+ dict video model features, as opposed to simply adding IMU
819
+ as an additional input modality.
820
+ Impact of teacher video model architecture. In our
821
+ main experiments we use MotionFormer [54] as the teacher
822
+ video model due to its strong performance on egocentric
823
+ video tasks.
824
+ To emphasize the generality of our idea,
825
+ we show the performance of EgoDistill with other video
826
+ teacher architectures in Table 2.
827
+ Similar to the Motion-
828
+ Former model, we train these models on each of the labeled
829
+ Figure 5. Best (top) and worst (bottom) reconstructed videos.
830
+ datasets, and then train our model using the resulting video
831
+ models as the teacher. As expected, better video teacher
832
+ models lead to better student model performance. More im-
833
+ portantly, we observe consistent improvement by EgoDis-
834
+ till over the VisOnly-Distill baseline on both datasets and
835
+ with different video teacher models, highlighting our idea’s
836
+ generality and versatility.
837
+ Where does our model work best/worst? In Figure 3
838
+ we saw that using IMU leads to an overall performance
839
+ improvement on action recognition, indicating better video
840
+ feature prediction capability. Next, we explore what kinds
841
+ of clips are better reconstructed using EgoDistill. Figure 4
842
+ shows the improvement of EgoDistill over the VisOnly-
843
+ Distill model on Ego4D and EPIC-Kitchens split by action
844
+ class. We observe that IMU is more useful for actions with
845
+ predictable head motion (e.g., break, cut, close), and is less
846
+ helpful for actions where head motion may be small or un-
847
+ related (e.g., empty, fill, press).
848
+ Figure 5 shows clip examples whose video features are
849
+ best and worst reconstructed. We observe that the best re-
850
+ constructed clips (top) contain moderate head motion that
851
+ is predictive of scene motion and action semantics. For ex-
852
+ ample, the camera wearer’s head moves slightly backwards
853
+ while opening the cabinet. On the other hand, more poorly
854
+ reconstructed clips tend to contain little head motion (third
855
+ row)—in which case IMU is redundant to the RGB frame—
856
+ or drastic head motion that is weakly correlated with the
857
+ camera wearer’s activity and introduces blur to the frame
858
+ (last row).
859
+ Efficiency analysis. To compare the efficiency of dif-
860
+ ferent models, aside from GFLOPs, we also compare their
861
+ inference run-time and number of parameters. For run-time,
862
+ we record the time spent to infer a single video clip’s label
863
+ with a single A40 GPU, and take the average time over the
864
+ full validation datasets of Ego4D and EPIC-Kitchens with
865
+ batch-size of 32. Table 3 shows the results. EgoDistill runs
866
+ much faster than the other methods. Notably, it reduces the
867
+ GFLOPs of MotionFormer by nearly 200×. Furthermore,
868
+
869
+ EgoDistill
870
+ EgoDistill
871
+ VisOnly-D
872
+ EgoDistill
873
+ EgoDistill
874
+ EgoDistill
875
+ VisOnly-D
876
+ EgoDistill
877
+ Figure 6. Retrieving video clips with EgoDistill. Given a query frame (bottom left) and a paired IMU segment (red camera frustums) ,
878
+ we retrieve the nearest clip in the video dataset according to EgoDistill and visualize its (unobserved) frames (strip to the right). Compared
879
+ to VisOnly-Distill, which outputs a single feature for a given input frame (bottom row), EgoDistill outputs a distinct feature by condi-
880
+ tioning on IMU, showing its ability to preserve both semantic and motion during reconstruction. For instance, in the top-right example,
881
+ EgoDistill retains the cabinet interaction semantics in the frame as well as the upward camera-motion in the IMU. Zoom in to view best.
882
+ close: 0.88
883
+ open: 0.01
884
+ close: 0.18
885
+ open: 0.34
886
+ GT: close
887
+ EgoDistill
888
+ VisOnly-D
889
+ put: 0.40
890
+ take: 0.10
891
+ put: 0.14
892
+ take: 0.44
893
+ GT: put
894
+ EgoDistill
895
+ VisOnly-D
896
+ Figure 7. Anticipating scene motion with EgoDistill. For each clip, we show the head motion and video frames. Note, only the center
897
+ frame (red border) is observed by the model. Action classification scores are shown on the right. EgoDistill can successfully anticipate
898
+ scene motion and disambiguate the action semantics in the input frame. For example, in the top center frame, the image alone cannot reveal
899
+ if the door is being opened or closed, whereas our feature, learned with head motion, recovers correlations with the scene motion (i.e., hand
900
+ motion and door motion) to disambiguate “close” from “open”. A similar effect for “put” vs. “take” is seen in the second example.
901
+ it runs 6.5× faster than STTS [65] while achieving 4.4%
902
+ higher accuracy on EPIC-Kitchens.
903
+ 4.5. Qualitative Results
904
+ What do EgoDistill features capture? To explore this,
905
+ we pair a single input frame with different IMU clips as in-
906
+ puts to EgoDistill, then retrieve the nearest video clip for
907
+ each resulting anticipated video feature. Figure 6 illustrates
908
+ this. We see that EgoDistill outputs video features that all
909
+ involve interaction with the cabinet (right panel), and is able
910
+ to use different IMU inputs to retrieve different video clips
911
+ that show consistent camera motion. In contrast, VisOnly-
912
+ Distill only retains the semantic context to retrieve a single
913
+ clip. These results indicate that EgoDistill is able to approx-
914
+ imate video features that capture both semantic and motion
915
+ information. See Supp. for more (and animated) results.
916
+ Is there evidence EgoDistill captures scene motion?
917
+ Figure 7 shows how our features learned with head motion
918
+ can nonetheless expose certain scene motion cues. EgoDis-
919
+ till improves the accuracy over VisOnly-Distill on ambigu-
920
+ ous categories (like close and put) by a large margin (20.3%
921
+ and 10.4% on EPIC-Kitchens, 8.5% and 3.9% on Ego4D).
922
+ See caption for details.
923
+ 5. Conclusion
924
+ We present EgoDistill, the first model to explore ego-
925
+ centric video feature approximation for fast recognition.
926
+ Experiments on action recognition on Ego4D and EPIC-
927
+ Kitchens demonstrate that our model achieves a good bal-
928
+ ance between accuracy and efficiency, outperforming state-
929
+ of-the-art efficient video understanding methods. Our ap-
930
+ proach has great potential to accelerate video understand-
931
+ ing for egocentric videos using a data stream that is already
932
+ ubiquitous in egocentric cameras. In the future, we plan to
933
+ investigate how to use head motion for long-term human
934
+ activity understanding with room context and visual corre-
935
+ spondence learning for multi-view videos.
936
+
937
+ References
938
+ [1] Relja Arandjelovi´c and Andrew Zisserman. Look, listen and
939
+ learn. 2017 IEEE International Conference on Computer Vi-
940
+ sion (ICCV), pages 609–617, 2017. 2
941
+ [2] Yusuf Aytar, Carl Vondrick, and Antonio Torralba. Sound-
942
+ net: Learning sound representations from unlabeled video.
943
+ In Proceedings of the 30th International Conference on
944
+ Neural Information Processing Systems, NIPS’16, page
945
+ 892–900, Red Hook, NY, USA, 2016. Curran Associates Inc.
946
+ 3
947
+ [3] Anna Borowska-Terka and Pawel Strumillo. Person inde-
948
+ pendent recognition of head gestures from parametrised and
949
+ raw signals recorded from inertial measurement unit. Ap-
950
+ plied Sciences, 10(12), 2020. 2
951
+ [4] John E. Bortz. A new mathematical formulation for strap-
952
+ down inertial navigation. IEEE Transactions on Aerospace
953
+ and Electronic Systems, AES-7:61–66, 1971. 2
954
+ [5] Agata Brajdic and Robert K. Harle. Walk detection and step
955
+ counting on unconstrained smartphones. Proceedings of the
956
+ 2013 ACM international joint conference on Pervasive and
957
+ ubiquitous computing, 2013. 2
958
+ [6] M. Brossard, S. Bonnabel, and A. Barrau. Denoising imu
959
+ gyroscopes with deep learning for open-loop attitude esti-
960
+ mation. IEEE Robotics and Automation Letters, 5(3):4796–
961
+ 4803, 2020. 5, 12
962
+ [7] Xiya Cao, Caifa Zhou, Dandan Zeng, and Yongliang Wang.
963
+ Rio: Rotation-equivariance supervised learning of robust in-
964
+ ertial odometry. In Proceedings of the IEEE/CVF Confer-
965
+ ence on Computer Vision and Pattern Recognition (CVPR),
966
+ pages 6614–6623, June 2022. 1, 2
967
+ [8] Joao Carreira and Andrew Zisserman.
968
+ Quo vadis, action
969
+ recognition? a new model and the kinetics dataset. In pro-
970
+ ceedings of the IEEE Conference on Computer Vision and
971
+ Pattern Recognition, pages 6299–6308, 2017. 6
972
+ [9] Chen Chen, Roozbeh Jafari, and Nasser Kehtarnavaz. Utd-
973
+ mhad: A multimodal dataset for human action recognition
974
+ utilizing a depth camera and a wearable inertial sensor. In
975
+ 2015 IEEE International Conference on Image Processing
976
+ (ICIP), pages 168–172, 2015. 2
977
+ [10] Kyunghyun Cho, Bart van Merrienboer, C¸ aglar G¨ulc¸ehre,
978
+ Dzmitry Bahdanau, Fethi Bougares, Holger Schwenk, and
979
+ Yoshua Bengio.
980
+ Learning phrase representations using
981
+ rnn encoder–decoder for statistical machine translation. In
982
+ EMNLP, 2014. 5
983
+ [11] Dima Damen, Hazel Doughty, Giovanni Maria Farinella,
984
+ , Antonino Furnari, Jian Ma, Evangelos Kazakos, Davide
985
+ Moltisanti, Jonathan Munro, Toby Perrett, Will Price, and
986
+ Michael Wray.
987
+ Rescaling egocentric vision: Collection,
988
+ pipeline and challenges for epic-kitchens-100. International
989
+ Journal of Computer Vision (IJCV), 130:33–55, 2022. 1, 2,
990
+ 5, 12
991
+ [12] Samyak Datta, Sameer Dharur, Vincent Cartillier, Ruta
992
+ Desai, Mukul Khanna, Dhruv Batra, and Devi Parikh.
993
+ Episodic memory question answering.
994
+ In Proceedings of
995
+ the IEEE/CVF Conference on Computer Vision and Pattern
996
+ Recognition (CVPR), pages 19119–19128, June 2022. 1
997
+ [13] Alexander Diete, Timo Sztyler, and Heiner Stuckenschmidt.
998
+ Vision and acceleration modalities: Partners for recogniz-
999
+ ing complex activities. In 2019 IEEE International Confer-
1000
+ ence on Pervasive Computing and Communications Work-
1001
+ shops (PerCom Workshops), pages 101–106, 2019. 1, 2
1002
+ [14] Kiana Ehsani, Hessam Bagherinezhad, Joseph Redmon,
1003
+ Roozbeh Mottaghi, and Ali Farhadi. Who let the dogs out?
1004
+ modeling dog behavior from visual data. In CVPR, 2018. 2
1005
+ [15] Kiana Ehsani, Daniel Gordon, Thomas Nguyen, Roozbeh
1006
+ Mottaghi, and Ali Farhadi.
1007
+ Learning visual representa-
1008
+ tion from human interactions. International Conference on
1009
+ Learning Representations, 2021. 2
1010
+ [16] Haoqi Fan, Bo Xiong, Karttikeya Mangalam, Yanghao Li,
1011
+ Zhicheng Yan, Jitendra Malik, and Christoph Feichtenhofer.
1012
+ Multiscale vision transformers. In ICCV, 2021. 1, 2, 3, 6
1013
+ [17] Christoph Feichtenhofer. X3d: Expanding architectures for
1014
+ efficient video recognition. 2020 IEEE/CVF Conference on
1015
+ Computer Vision and Pattern Recognition (CVPR), pages
1016
+ 200–210, 2020. 2, 3, 6
1017
+ [18] Christoph Feichtenhofer, Haoqi Fan, Jitendra Malik, and
1018
+ Kaiming He. Slowfast networks for video recognition. In
1019
+ 2019 IEEE/CVF International Conference on Computer Vi-
1020
+ sion (ICCV), pages 6201–6210, 2019. 1, 2, 3, 6
1021
+ [19] Christoph Feichtenhofer, Axel Pinz, and Andrew Zisserman.
1022
+ Convolutional two-stream network fusion for video action
1023
+ recognition. 2016 IEEE Conference on Computer Vision and
1024
+ Pattern Recognition (CVPR), pages 1933–1941, 2016. 2
1025
+ [20] Christian Forster, Luca Carlone, Frank Dellaert, and Da-
1026
+ vide Scaramuzza. On-manifold preintegration for real-time
1027
+ visual–inertial odometry. IEEE Transactions on Robotics,
1028
+ 33(1):1–21, 2017. 1, 2
1029
+ [21] C. Gan, H. Zhao, P. Chen, D. Cox, and A. Torralba. Self-
1030
+ supervised moving vehicle tracking with stereo sound. In
1031
+ 2019 IEEE/CVF International Conference on Computer Vi-
1032
+ sion (ICCV), pages 7052–7061, Los Alamitos, CA, USA,
1033
+ nov 2019. IEEE Computer Society. 3
1034
+ [22] Ruohan Gao, Tae-Hyun Oh, Kristen Grauman, and Lorenzo
1035
+ Torresani. Listen to look: Action recognition by previewing
1036
+ audio. In Proceedings of the IEEE/CVF Conference on Com-
1037
+ puter Vision and Pattern Recognition, pages 10457–10467,
1038
+ 2020. 2, 3, 5, 6, 7, 12
1039
+ [23] Nuno C. Garcia, Pietro Morerio, and Vittorio Murino.
1040
+ Modality distillation with multiple stream networks for ac-
1041
+ tion recognition. In The European Conference on Computer
1042
+ Vision (ECCV), September 2018. 3
1043
+ [24] Amir Ghodrati, Babak Ehteshami Bejnordi, and Amirhos-
1044
+ sein Habibian. Frameexit: Conditional early exiting for effi-
1045
+ cient video recognition. In Proceedings of the IEEE Confer-
1046
+ ence on Computer Vision and Pattern Recognition, 2021. 2,
1047
+ 3
1048
+ [25] Rohit Girdhar, Mannat Singh, Nikhila Ravi, Laurens van der
1049
+ Maaten, Armand Joulin, and Ishan Misra. Omnivore: A Sin-
1050
+ gle Model for Many Visual Modalities. In CVPR, 2022. 1
1051
+ [26] Kristen
1052
+ Grauman,
1053
+ Andrew
1054
+ Westbury,
1055
+ Eugene
1056
+ Byrne,
1057
+ Zachary Chavis, Antonino Furnari, Rohit Girdhar, Jack-
1058
+ son Hamburger, Hao Jiang, Miao Liu, Xingyu Liu, Miguel
1059
+ Martin, Tushar Nagarajan, Ilija Radosavovic, Santhosh Ku-
1060
+ mar Ramakrishnan, Fiona Ryan, Jayant Sharma, Michael
1061
+
1062
+ Wray, Mengmeng Xu, Eric Zhongcong Xu, Chen Zhao,
1063
+ Siddhant Bansal, Dhruv Batra, Vincent Cartillier, Sean
1064
+ Crane, Tien Do, Morrie Doulaty, Akshay Erapalli, Christoph
1065
+ Feichtenhofer, Adriano Fragomeni, Qichen Fu, Christian
1066
+ Fuegen, Abrham Gebreselasie, Cristina Gonzalez, James
1067
+ Hillis, Xuhua Huang, Yifei Huang, Wenqi Jia, Weslie Khoo,
1068
+ Jachym Kolar, Satwik Kottur, Anurag Kumar, Federico Lan-
1069
+ dini, Chao Li, Yanghao Li, Zhenqiang Li, Karttikeya Man-
1070
+ galam, Raghava Modhugu, Jonathan Munro, Tullie Mur-
1071
+ rell, Takumi Nishiyasu, Will Price, Paola Ruiz Puentes,
1072
+ Merey Ramazanova, Leda Sari, Kiran Somasundaram, Au-
1073
+ drey Southerland, Yusuke Sugano, Ruijie Tao, Minh Vo,
1074
+ Yuchen Wang, Xindi Wu, Takuma Yagi, Yunyi Zhu, Pablo
1075
+ Arbelaez, David Crandall, Dima Damen, Giovanni Maria
1076
+ Farinella, Bernard Ghanem, Vamsi Krishna Ithapu, C. V.
1077
+ Jawahar, Hanbyul Joo, Kris Kitani, Haizhou Li, Richard
1078
+ Newcombe, Aude Oliva, Hyun Soo Park, James M. Rehg,
1079
+ Yoichi Sato, Jianbo Shi, Mike Zheng Shou, Antonio Tor-
1080
+ ralba, Lorenzo Torresani, Mingfei Yan, and Jitendra Ma-
1081
+ lik. Ego4d: Around the World in 3,000 Hours of Egocentric
1082
+ Video. In IEEE/CVF Computer Vision and Pattern Recogni-
1083
+ tion (CVPR), 2022. 1, 2, 5, 12
1084
+ [27] Grigori Guitchounts, Javier Mas´ıs, Steffen B.E. Wolff, and
1085
+ David Cox. Encoding of 3d head orienting movements in the
1086
+ primary visual cortex. Neuron, 108(3):512–525.e4, 2020. 1
1087
+ [28] Saurabh Gupta, Judy Hoffman, and Jitendra Malik. Cross
1088
+ modal distillation for supervision transfer.
1089
+ In 2016 IEEE
1090
+ Conference on Computer Vision and Pattern Recognition
1091
+ (CVPR), pages 2827–2836, 2016. 3
1092
+ [29] Michael Gutmann and Aapo Hyv¨arinen. Noise-contrastive
1093
+ estimation: A new estimation principle for unnormalized sta-
1094
+ tistical models. In Yee Whye Teh and Mike Titterington, edi-
1095
+ tors, Proceedings of the Thirteenth International Conference
1096
+ on Artificial Intelligence and Statistics, volume 9 of Proceed-
1097
+ ings of Machine Learning Research, pages 297–304, Chia
1098
+ Laguna Resort, Sardinia, Italy, 13–15 May 2010. PMLR. 5
1099
+ [30] Sachini Herath, Hang Yan, and Yasutaka Furukawa. Ronin:
1100
+ Robust neural inertial navigation in the wild: Benchmark,
1101
+ evaluations, & new methods. In 2020 IEEE International
1102
+ Conference on Robotics and Automation (ICRA), pages
1103
+ 3146–3152, 2020. 2
1104
+ [31] Geoffrey E. Hinton, Oriol Vinyals, and Jeffrey Dean. Distill-
1105
+ ing the knowledge in a neural network. NIPS Deep Learning
1106
+ Workshop, abs/1503.02531, 2014. 2, 3, 4
1107
+ [32] Yu Huang, Chenzhuang Du, Zihui Xue, Xuanyao Chen,
1108
+ Hang Zhao, and Longbo Huang. What makes multi-modal
1109
+ learning better than single (provably). In A. Beygelzimer,
1110
+ Y. Dauphin, P. Liang, and J. Wortman Vaughan, editors, Ad-
1111
+ vances in Neural Information Processing Systems, 2021. 2
1112
+ [33] Andrey Ignatov. Real-time human activity recognition from
1113
+ accelerometer data using convolutional neural networks. Ap-
1114
+ plied Soft Computing, 62:915–922, 2018. 2
1115
+ [34] D. Jayaraman and K. Grauman. Learning image representa-
1116
+ tions tied to egomotion. In ICCV, 2015. 2
1117
+ [35] A.R. Jimenez, F. Seco, C. Prieto, and J. Guevara. A compar-
1118
+ ison of pedestrian dead-reckoning algorithms using a low-
1119
+ cost mems imu. In 2009 IEEE International Symposium on
1120
+ Intelligent Signal Processing, pages 37–42, 2009. 2
1121
+ [36] Evangelos Kazakos, Arsha Nagrani, Andrew Zisserman, and
1122
+ Dima Damen. Epic-fusion: Audio-visual temporal binding
1123
+ for egocentric action recognition.
1124
+ In IEEE/CVF Interna-
1125
+ tional Conference on Computer Vision (ICCV), 2019. 2
1126
+ [37] Dan Kondratyuk, Liangzhe Yuan, Yandong Li, Li Zhang,
1127
+ Mingxing
1128
+ Tan,
1129
+ Matthew
1130
+ Brown,
1131
+ and
1132
+ Boqing
1133
+ Gong.
1134
+ Movinets: Mobile video networks for efficient video recog-
1135
+ nition. In Proceedings of the IEEE/CVF Conference on Com-
1136
+ puter Vision and Pattern Recognition, pages 16020–16030,
1137
+ 2021. 2
1138
+ [38] Bruno Korbar, Du Tran, and Lorenzo Torresani.
1139
+ Co-
1140
+ operative learning of audio and video models from self-
1141
+ supervised synchronization. In Proceedings of the 32nd In-
1142
+ ternational Conference on Neural Information Processing
1143
+ Systems, NIPS’18, page 7774–7785, Red Hook, NY, USA,
1144
+ 2018. Curran Associates Inc. 2
1145
+ [39] Bruno Korbar, Du Tran, and Lorenzo Torresani. Scsampler:
1146
+ Sampling salient clips from video for efficient action recog-
1147
+ nition. 2019 IEEE/CVF International Conference on Com-
1148
+ puter Vision (ICCV), pages 6231–6241, 2019. 2
1149
+ [40] Masakatsu Kourogi and Takeshi Kurata. A method of pedes-
1150
+ trian dead reckoning for smartphones using frequency do-
1151
+ main analysis on patterns of acceleration and angular veloc-
1152
+ ity. pages 164–168, 05 2014. 2
1153
+ [41] Jennifer R. Kwapisz, Gary M. Weiss, and Samuel A.
1154
+ Moore. Activity recognition using cell phone accelerome-
1155
+ ters. SIGKDD Explor. Newsl., 12(2):74–82, mar 2011. 2
1156
+ [42] Heike Leutheuser, Dominik Schuldhaus, and Bjoern M. Es-
1157
+ kofier.
1158
+ Hierarchical, multi-sensor based classification of
1159
+ daily life activities: Comparison with state-of-the-art algo-
1160
+ rithms using a benchmark dataset. PLOS ONE, 8(10):1–11,
1161
+ 10 2013. 2
1162
+ [43] Yiming Li, Ziang Cao, Andrew Liang, Benjamin Liang, Lu-
1163
+ oyao Chen, Hang Zhao, and Chen Feng. Egocentric predic-
1164
+ tion of action target in 3d. In Proceedings of the IEEE/CVF
1165
+ Conference on Computer Vision and Pattern Recognition
1166
+ (CVPR), June 2022. 1
1167
+ [44] Shaowei Liu, Subarna Tripathi, Somdeb Majumdar, and Xi-
1168
+ aolong Wang. Joint hand motion and interaction hotspots
1169
+ prediction from egocentric videos.
1170
+ In Proceedings of the
1171
+ IEEE/CVF Conference on Computer Vision and Pattern
1172
+ Recognition (CVPR), pages 3282–3292, June 2022. 1
1173
+ [45] Zhengzhe Liu, Xiaojuan Qi, and Chi-Wing Fu. 3d-to-2d dis-
1174
+ tillation for indoor scene parsing. 2021 IEEE/CVF Confer-
1175
+ ence on Computer Vision and Pattern Recognition (CVPR),
1176
+ pages 4462–4472, 2021. 3
1177
+ [46] Ilya Loshchilov and Frank Hutter. Fixing weight decay reg-
1178
+ ularization in adam, 2018. 5
1179
+ [47] Niall Lyons, Avik Santra, and Ashutosh Pandey. Improved
1180
+ deep representation learning for human activity recognition
1181
+ using imu sensors. In 2021 20th IEEE International Confer-
1182
+ ence on Machine Learning and Applications (ICMLA), pages
1183
+ 326–332, 2021. 2
1184
+ [48] Sharmin Majumder and Nasser Kehtarnavaz. Vision and in-
1185
+ ertial sensing fusion for human action recognition: A review.
1186
+ IEEE Sensors Journal, 21(3):2454–2467, 2021. 2
1187
+ [49] Yue Meng, Chung-Ching Lin, Rameswar Panda, Prasanna
1188
+ Sattigeri, Leonid Karlinsky, Aude Oliva, Kate Saenko, and
1189
+
1190
+ Rogerio Feris. Ar-net: Adaptive frame resolution for effi-
1191
+ cient action recognition. arXiv preprint arXiv:2007.15796,
1192
+ 2020. 2, 3
1193
+ [50] Yue Meng, Rameswar Panda, Chung-Ching Lin, Prasanna
1194
+ Sattigeri, Leonid Karlinsky, Kate Saenko, Aude Oliva, and
1195
+ Rogerio Feris. Adafuse: Adaptive temporal fusion network
1196
+ for efficient action recognition. In International Conference
1197
+ on Learning Representations, 2021. 2, 5, 6, 7
1198
+ [51] Rameswar Panda, Chun-Fu Chen, Quanfu Fan, Ximeng Sun,
1199
+ Kate Saenko, Aude Oliva, and Rogerio Feris.
1200
+ AdaMML:
1201
+ Adaptive Multi-Modal Learning for Efficient Video Recog-
1202
+ nition.
1203
+ In International Conference on Computer Vision
1204
+ (ICCV), 2021. 2, 3
1205
+ [52] Philip R.L. Parker, Morgan A. Brown, Matthew C. Smear,
1206
+ and Cristopher M. Niell. Movement-related signals in sen-
1207
+ sory areas: Roles in natural behavior.
1208
+ Trends in Neuro-
1209
+ sciences, 43(8):581–595, 2020. 1
1210
+ [53] Philip R. L. Parker, Elliott T. T. Abe, Emmalyn S. P. Leonard,
1211
+ Dylan M. Martins, and Cristopher M. Niell. Joint coding of
1212
+ visual input and eye/head position in v1 of freely moving
1213
+ mice. bioRxiv, 2022. 1
1214
+ [54] Mandela Patrick, Dylan Campbell, Yuki M. Asano, Is-
1215
+ han Misra Florian Metze, Christoph Feichtenhofer, Andrea
1216
+ Vedaldi, and Jo˜ao F. Henriques. Keeping your eye on the
1217
+ ball: Trajectory attention in video transformers. In Advances
1218
+ in Neural Information Processing Systems (NeurIPS), 2021.
1219
+ 1, 2, 3, 5, 6, 7
1220
+ [55] Chiara Plizzari, Mirco Planamente, Gabriele Goletto, Marco
1221
+ Cannici, Emanuele Gusso, Matteo Matteucci, and Barbara
1222
+ Caputo.
1223
+ E2(go)motion: Motion augmented event stream
1224
+ for egocentric action recognition.
1225
+ In Proceedings of the
1226
+ IEEE/CVF Conference on Computer Vision and Pattern
1227
+ Recognition (CVPR), pages 19935–19947, June 2022. 1
1228
+ [56] Gunnar A Sigurdsson, Abhinav Gupta, Cordelia Schmid, Ali
1229
+ Farhadi, and Karteek Alahari. Charades-ego: A large-scale
1230
+ dataset of paired third and first person videos. arXiv preprint
1231
+ arXiv:1804.09626, 2018. 1
1232
+ [57] Karen Simonyan and Andrew Zisserman. Two-stream con-
1233
+ volutional networks for action recognition in videos. In Z.
1234
+ Ghahramani, M. Welling, C. Cortes, N. Lawrence, and K.Q.
1235
+ Weinberger, editors, Advances in Neural Information Pro-
1236
+ cessing Systems, volume 27. Curran Associates, Inc., 2014.
1237
+ 2
1238
+ [58] Shuyang Sun, Zhanghui Kuang, Lu Sheng, Wanli Ouyang,
1239
+ and Wei Zhang.
1240
+ Optical flow guided feature: A fast and
1241
+ robust motion representation for video action recognition.
1242
+ In The IEEE Conference on Computer Vision and Pattern
1243
+ Recognition (CVPR), June 2018. 2
1244
+ [59] Yin Tang, Lei Zhang, Fuhong Min, and Jun He. Multi-scale
1245
+ deep feature learning for human activity recognition using
1246
+ wearable sensors. IEEE Transactions on Industrial Electron-
1247
+ ics, pages 1–1, 2022. 2
1248
+ [60] Wenjin Tao, Haodong Chen, Md. Moniruzzaman, Ming C.
1249
+ Leu, Zhaozheng Yi, and Ruwen Qin. Attention-based sen-
1250
+ sor fusion for human activity recognition using imu signals.
1251
+ ArXiv, abs/2112.11224, 2021. 2
1252
+ [61] Catherine Tong, Jinchen Ge, and Nicholas D Lane. Zero-shot
1253
+ learning for imu-based activity recognition using video em-
1254
+ beddings. Proceedings of the ACM on Interactive, Mobile,
1255
+ Wearable and Ubiquitous Technologies, 5(4):1–23, 2021. 2
1256
+ [62] Du Tran, Heng Wang, Lorenzo Torresani, Jamie Ray, Yann
1257
+ LeCun, and Manohar Paluri. A closer look at spatiotemporal
1258
+ convolutions for action recognition. 2018 IEEE/CVF Con-
1259
+ ference on Computer Vision and Pattern Recognition, pages
1260
+ 6450–6459, 2018. 2
1261
+ [63] Satoshi Tsutsui, Ruta Desai, and Karl Ridgeway. How you
1262
+ move your head tells what you do: Self-supervised video
1263
+ representation learning with egocentric cameras and imu
1264
+ sensors. ICCV Workshop on Egocentric Perception, Inter-
1265
+ action and Computing (EPIC), 2021. 2
1266
+ [64] Jindong Wang, Yiqiang Chen, Shuji Hao, Xiaohui Peng, and
1267
+ Lisha Hu. Deep learning for sensor-based activity recogni-
1268
+ tion: A survey. Pattern Recognit. Lett., 119:3–11, 2019. 2
1269
+ [65] Junke Wang, Xitong Yang, Hengduo Li, Liu Li, Zuxuan
1270
+ Wu, and Yu-Gang Jiang. Efficient video transformers with
1271
+ spatial-temporal token selection. In ECCV, 2022. 2, 5, 6, 7,
1272
+ 8
1273
+ [66] Yulin Wang, Zhaoxi Chen, Haojun Jiang, Shiji Song, Yizeng
1274
+ Han, and Gao Huang.
1275
+ Adaptive focus for efficient video
1276
+ recognition. In Proceedings of the IEEE/CVF International
1277
+ Conference on Computer Vision (ICCV), October 2021. 2
1278
+ [67] Yulin Wang, Yang Yue, Yuanze Lin, Haojun Jiang, Zihang
1279
+ Lai, Victor Kulikov, Nikita Orlov, Humphrey Shi, and Gao
1280
+ Huang.
1281
+ Adafocus v2: End-to-end training of spatial dy-
1282
+ namic networks for video recognition.
1283
+ In Proceedings of
1284
+ the IEEE/CVF Conference on Computer Vision and Pattern
1285
+ Recognition (CVPR), 2022. 2, 3
1286
+ [68] Haoran Wei, Pranav Chopada, and Nasser Kehtarnavaz. C-
1287
+ mhad: Continuous multimodal human action dataset of si-
1288
+ multaneous video and inertial sensing.
1289
+ Sensors, 20(10),
1290
+ 2020. 1, 2
1291
+ [69] Haoran Wei and Nasser Kehtarnavaz. Simultaneous utiliza-
1292
+ tion of inertial and video sensing for action detection and
1293
+ recognition in continuous action streams.
1294
+ IEEE Sensors
1295
+ Journal, 20(11):6055–6063, 2020. 1, 2
1296
+ [70] Hang Yan, Qi Shan, and Yasutaka Furukawa. Ridi: Robust
1297
+ imu double integration. In ECCV, 2018. 2
1298
+ [71] Mingyu Yang, Yu Chen, and Hun-Seok Kim. Efficient deep
1299
+ visual and inertial odometry with adaptive visual modality
1300
+ selection. ArXiv, abs/2205.06187, 2022. 1, 2
1301
+ [72] Mohammadreza Zolfaghari, Kamaljeet Singh, and Thomas
1302
+ Brox. ECO: efficient convolutional network for online video
1303
+ understanding. In ECCV, 2018. 2
1304
+
1305
+ The supplementary materials of this work consist of:
1306
+ A. Supplementary video.
1307
+ B. Dataset details.
1308
+ C. Implementation details.
1309
+ D. Additional analysis of our model.
1310
+ A. Supplementary Video
1311
+ In our supplementary video, we have a brief introduction
1312
+ of our work. More importantly, we show animated videos
1313
+ of Best and Worse reconstructed clips (Figure 5), Retriev-
1314
+ ing video clips with EgoDistill (Figure 6), and Anticipating
1315
+ scene motion with EgoDistill (Figure 7).
1316
+ Animated version of these figures better show head mo-
1317
+ tion and video dynamics. We recommend viewing the sup-
1318
+ plementary video for better understanding of our method
1319
+ and results.
1320
+ B. Dataset Details.
1321
+ We use two datasets in our experiments: Ego4D [26] and
1322
+ EPIC-Kitchens-100 [11]. In this section we describe more
1323
+ details about how we create our training and evaluation data.
1324
+ 1. Ego4D [26] contains 3,670 hours of egocentric videos
1325
+ of people performing diverse tasks (from cooking to
1326
+ farming) across the globe. As action recognition is not
1327
+ part of the original Ego4D benchmark, we construct
1328
+ this task with annotations from the Hands+Objects
1329
+ temporal localization benchmark [26].
1330
+ Specifically,
1331
+ for each hand-objects interaction temporal annotation,
1332
+ we take the video clip between the pre-frame and post-
1333
+ frame of the annotation as input, and use the annotated
1334
+ verb for this interaction as label.
1335
+ We include clips with paired IMU and audio, and con-
1336
+ sider classes with at least 2 labeled instances, resulting
1337
+ in 94 action categories with 12.1k videos in total. In
1338
+ average, each clip has 2.2 second duration. Then, we
1339
+ randomly split data from each category into training
1340
+ and evaluation sets with 70%:30% ratio. Finally, we
1341
+ obtain a 94-class action recognition dataset with 8.5k
1342
+ training videos and 3.6k evaluation videos.
1343
+ 2. EPIC-Kitchens [11] contains 100 hours of egocen-
1344
+ tric videos capturing daily activities in kitchen environ-
1345
+ ments. We use annotations from the action recognition
1346
+ benchmark in our experiment.
1347
+ We select videos that have paired IMU and audio data,
1348
+ and split the resulting data by camera-wearer, ensuring
1349
+ non-overlapping splits following the original bench-
1350
+ mark setting. Specifically, we take videos captured by
1351
+ camera-wearer id starting with P30, P35, P37 as evalu-
1352
+ ation videos and use all the remaining videos as train-
1353
+ ing videos. This results in a 62-class action dataset
1354
+ with 29k training videos and 6.2k evaluation videos.
1355
+ C. Implementation Details.
1356
+ IMU input processing. For each input clip, IMU in-
1357
+ put is a 422 × 6 matrix (around 2 seconds with 198Hz
1358
+ frequency), representing the accelerometer and gyroscope
1359
+ readings along the xyz axes. We observe that the raw IMU
1360
+ input has significant drifting and bias issues. This induces
1361
+ inconsistent correspondence between camera motion and
1362
+ IMU reading across different clips and videos. Therefore,
1363
+ for IMU reading of each clip, on each dimension we sep-
1364
+ arately subtract raw readings by the mean values on the
1365
+ corresponding dimension. This operation normalizes IMU
1366
+ readings in each dimension to have zero average value. In
1367
+ this way, our model can only focus on the temporal motion
1368
+ patterns in each clip.
1369
+ Audio input processing. For ListenToLook [22], we
1370
+ process the audio input in the same way mentioned in the
1371
+ paper. Specifically, we subsample the audio at 16kHZ, and
1372
+ compute STFT using Hann window size of 400 and hop
1373
+ length of 160. Please refer to [22] for more details.
1374
+ Model architecture. For the image backbone, we use
1375
+ the ImageNet-pretrained ResNet-18 model. For the IMU
1376
+ backbone, we use a 5-layer 1D Dilated CNN, as found ef-
1377
+ fective for IMU data processing [6]. We use the same net-
1378
+ work setting (kernel dimension, dilation gap and channel
1379
+ dimension) as in prior work [6]. The feature fusion model
1380
+ consists of a concatenation operation following two fully-
1381
+ connected layers with hidden dimension of 1024.
1382
+ Each
1383
+ layer except for the output layer is followed by a ReLU ac-
1384
+ tivation. The output dimension is the same as the teacher
1385
+ video model’s feature dimension (768 in the case of Mo-
1386
+ tionFormer). When N > 1, we use a one-layer GRU mod-
1387
+ ule to aggregate extracted features for each frame. We use
1388
+ a single-directioal GRU with hidden dimension of 512.
1389
+ Model training.
1390
+ We train our models in two stages.
1391
+ In the self-supervised IMU feature learning stage, we train
1392
+ random initialized IMU encoder fM, IMU predictor h and
1393
+ the fusion network Π with LNCE. Here the image encoder
1394
+ fI is a fixed ImageNet pretrained model. On both datasets,
1395
+ we train the model for 50 epochs with AdamW and batch
1396
+ size 64. The initial training rate is 1e−4. We decay the
1397
+ training rate by 0.1 at epoch 30 and epoch 40. In the sec-
1398
+ ond video feature distillation stage, we initialize the model
1399
+ with parameters obtained in the last stage and finetune. On
1400
+ both datasets, we use AdamW with batch size 64 and ini-
1401
+ tial learning rate 1e−4. On Ego4D, we train for 150 epochs.
1402
+ We decay the training rate by 0.1 at epoch 90 and epoch
1403
+ 120. On EPIC-Kitchens, we train for 50 epochs. We decay
1404
+ the training rate by 0.1 at epoch 30 and epoch 40.
1405
+
1406
+ Ego4D
1407
+ EPIC-Kitchens
1408
+ uniform
1409
+ 38.46
1410
+ 52.43
1411
+ random
1412
+ 36.85
1413
+ 48.48
1414
+ first
1415
+ 38.68
1416
+ 46.40
1417
+ last
1418
+ 35.46
1419
+ 41.72
1420
+ center
1421
+ 37.04
1422
+ 44.85
1423
+ Table 4. Effect of frame selection. We compare the accuracy of
1424
+ using different frame selection heuristics for EgoDistill when N =
1425
+ 4. We observe that Uniform on average achieves better results.
1426
+ D. Analysis.
1427
+ Effect of frame selection.
1428
+ In Section 3.2, we men-
1429
+ tioned that we use uniform sampling to obtain the N frames
1430
+ from each video clip. In this section, we compare the per-
1431
+ formance of our work under uniform sampling with other
1432
+ heuristics. Specifically, we compare with random sampling,
1433
+ the first N frames, the last N frames and the center N
1434
+ frames. We show the results in Table 4 under N = 4. These
1435
+ results indicate that uniform sampling leads to the best per-
1436
+ formance on average. Intuitively, uniform sampling on av-
1437
+ erage leads to a broader coverage of both semantic contexts
1438
+ as well as scene motion.
1439
+ Why we set N to be small. In our experiments, we set
1440
+ N to be 1 to 4. Using larger N (e.g., 8 or 16) with densely
1441
+ sampled frames could lead to better results of all the meth-
1442
+ ods with more computational cost. Efficient video under-
1443
+ standing methods could benefit more as they have better
1444
+ temporal aggregation mechanisms given densely-sampled
1445
+ frames.
1446
+ However, the core purpose of our model is to
1447
+ deal with cases where we only use a few number of sam-
1448
+ ples. Therefore, our model is not comparable to video clip
1449
+ models under dense-frame setting. Furthermore, setting N
1450
+ to be a small number is very important in many applica-
1451
+ tions. As loading more image frames takes additional time
1452
+ and memory, applications with streaming videos or low-
1453
+ resource AR/VR devices will benefit from loading only a
1454
+ few frames.
1455
+
JtE0T4oBgHgl3EQfSADl/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LNFAT4oBgHgl3EQfwR78/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0b79941cd367839edebfdacf39db3bad54263e307320eeb40cd6e7cbce6de11e
3
+ size 12582957