jackkuo commited on
Commit
e2f0065
·
verified ·
1 Parent(s): c8fa9a0

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -9AzT4oBgHgl3EQf_f5A/content/tmp_files/2301.01948v1.pdf.txt +1623 -0
  2. -9AzT4oBgHgl3EQf_f5A/content/tmp_files/load_file.txt +0 -0
  3. .gitattributes +6 -0
  4. 59E0T4oBgHgl3EQfvwFr/content/tmp_files/2301.02622v1.pdf.txt +3166 -0
  5. 59E0T4oBgHgl3EQfvwFr/content/tmp_files/load_file.txt +0 -0
  6. 5tFIT4oBgHgl3EQf8CtK/content/tmp_files/2301.11400v1.pdf.txt +0 -0
  7. 5tFIT4oBgHgl3EQf8CtK/content/tmp_files/load_file.txt +0 -0
  8. 7tE4T4oBgHgl3EQf2g0r/content/tmp_files/2301.05298v1.pdf.txt +2262 -0
  9. 7tE4T4oBgHgl3EQf2g0r/content/tmp_files/load_file.txt +0 -0
  10. BNE5T4oBgHgl3EQfTA98/content/tmp_files/load_file.txt +219 -0
  11. C9E1T4oBgHgl3EQfWATV/content/tmp_files/2301.03110v1.pdf.txt +2742 -0
  12. C9E1T4oBgHgl3EQfWATV/content/tmp_files/load_file.txt +0 -0
  13. CdFQT4oBgHgl3EQfOTbk/content/tmp_files/2301.13275v1.pdf.txt +451 -0
  14. CdFQT4oBgHgl3EQfOTbk/content/tmp_files/load_file.txt +484 -0
  15. CtAyT4oBgHgl3EQfR_f1/content/2301.00079v1.pdf +3 -0
  16. DNAzT4oBgHgl3EQfTvz-/content/tmp_files/2301.01257v1.pdf.txt +1115 -0
  17. DNAzT4oBgHgl3EQfTvz-/content/tmp_files/load_file.txt +0 -0
  18. EdE4T4oBgHgl3EQffQ16/content/tmp_files/2301.05106v1.pdf.txt +557 -0
  19. EdE4T4oBgHgl3EQffQ16/content/tmp_files/load_file.txt +277 -0
  20. FdE3T4oBgHgl3EQfVwo4/content/tmp_files/2301.04462v1.pdf.txt +0 -0
  21. FdE3T4oBgHgl3EQfVwo4/content/tmp_files/load_file.txt +0 -0
  22. ItE4T4oBgHgl3EQfIgwL/content/tmp_files/2301.04912v1.pdf.txt +789 -0
  23. ItE4T4oBgHgl3EQfIgwL/content/tmp_files/load_file.txt +0 -0
  24. JdAyT4oBgHgl3EQffviy/vector_store/index.faiss +3 -0
  25. JtE2T4oBgHgl3EQfAQZo/content/tmp_files/2301.03589v1.pdf.txt +1992 -0
  26. JtE2T4oBgHgl3EQfAQZo/content/tmp_files/load_file.txt +0 -0
  27. LdAzT4oBgHgl3EQfkf0t/content/tmp_files/2301.01531v1.pdf.txt +976 -0
  28. LdAzT4oBgHgl3EQfkf0t/content/tmp_files/load_file.txt +0 -0
  29. LtE3T4oBgHgl3EQfYQrP/content/tmp_files/2301.04487v1.pdf.txt +2863 -0
  30. LtE3T4oBgHgl3EQfYQrP/content/tmp_files/load_file.txt +0 -0
  31. MNFQT4oBgHgl3EQfVDaQ/content/tmp_files/2301.13299v1.pdf.txt +530 -0
  32. MNFQT4oBgHgl3EQfVDaQ/content/tmp_files/load_file.txt +162 -0
  33. PdE4T4oBgHgl3EQf-Q54/content/tmp_files/2301.05362v1.pdf.txt +1499 -0
  34. PdE4T4oBgHgl3EQf-Q54/content/tmp_files/load_file.txt +0 -0
  35. Q9E5T4oBgHgl3EQfZg88/content/tmp_files/2301.05581v1.pdf.txt +2209 -0
  36. Q9E5T4oBgHgl3EQfZg88/content/tmp_files/load_file.txt +0 -0
  37. QNA0T4oBgHgl3EQfDP_p/content/tmp_files/2301.02002v1.pdf.txt +792 -0
  38. QNA0T4oBgHgl3EQfDP_p/content/tmp_files/load_file.txt +0 -0
  39. RtFRT4oBgHgl3EQf8ThG/content/tmp_files/2301.13683v1.pdf.txt +1816 -0
  40. RtFRT4oBgHgl3EQf8ThG/content/tmp_files/load_file.txt +0 -0
  41. U9E3T4oBgHgl3EQfawpi/vector_store/index.faiss +3 -0
  42. U9FIT4oBgHgl3EQfgSvJ/content/tmp_files/2301.11283v1.pdf.txt +766 -0
  43. U9FIT4oBgHgl3EQfgSvJ/content/tmp_files/load_file.txt +388 -0
  44. VtE5T4oBgHgl3EQfcA97/content/tmp_files/2301.05600v1.pdf.txt +1863 -0
  45. VtE5T4oBgHgl3EQfcA97/content/tmp_files/load_file.txt +0 -0
  46. XNE4T4oBgHgl3EQfNQyg/content/tmp_files/2301.04955v1.pdf.txt +2205 -0
  47. XNE4T4oBgHgl3EQfNQyg/content/tmp_files/load_file.txt +0 -0
  48. XtAzT4oBgHgl3EQfmf3D/content/tmp_files/2301.01565v1.pdf.txt +1344 -0
  49. XtAzT4oBgHgl3EQfmf3D/content/tmp_files/load_file.txt +0 -0
  50. YNE1T4oBgHgl3EQfcATB/content/tmp_files/2301.03180v1.pdf.txt +0 -0
-9AzT4oBgHgl3EQf_f5A/content/tmp_files/2301.01948v1.pdf.txt ADDED
@@ -0,0 +1,1623 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ RESEARCH ARTICLE
2
+ Random forests, sound symbolism and
3
+ Poke´mon evolution
4
+ Alexander James KilpatrickID1☯*, Aleksandra C´ wiek2☯, Shigeto Kawahara3
5
+ 1 International Communication, Nagoya University of Commerce and Business, Nagoya, Aichi, Japan,
6
+ 2 Department Leibniz-Zentrum Allgemeine Sprachwissenschaft, Berlin, Germany, 3 Institute of Cultural and
7
+ Linguistic Studies, Keio University, Tokyo, Japan
8
+ ☯ These authors contributed equally to this work.
9
10
+ Abstract
11
+ This study constructs machine learning algorithms that are trained to classify samples using
12
+ sound symbolism, and then it reports on an experiment designed to measure their under-
13
+ standing against human participants. Random forests are trained using the names of Poke´-
14
+ mon, which are fictional video game characters, and their evolutionary status. Poke´mon
15
+ undergo evolution when certain in-game conditions are met. Evolution changes the appear-
16
+ ance, abilities, and names of Poke´mon. In the first experiment, we train three random forests
17
+ using the sounds that make up the names of Japanese, Chinese, and Korean Poke´mon to
18
+ classify Poke´mon into pre-evolution and post-evolution categories. We then train a fourth
19
+ random forest using the results of an elicitation experiment whereby Japanese participants
20
+ named previously unseen Poke´mon. In Experiment 2, we reproduce those random forests
21
+ with name length as a feature and compare the performance of the random forests against
22
+ humans in a classification experiment whereby Japanese participants classified the names
23
+ elicited in Experiment 1 into pre-and post-evolution categories. Experiment 2 reveals an
24
+ issue pertaining to overfitting in Experiment 1 which we resolve using a novel cross-valida-
25
+ tion method. The results show that the random forests are efficient learners of systematic
26
+ sound-meaning correspondence patterns and can classify samples with greater accuracy
27
+ than the human participants.
28
+ Introduction
29
+ Natural language processing (NLP) is a field of study that combines computational linguistics
30
+ and artificial intelligence and is concerned with giving computers the ability to understand
31
+ language in much the same way humans can. The present study tests whether an NLP algo-
32
+ rithm can classify samples using sound symbolism, which has been a largely overlooked feature
33
+ of human language in NLP. While in modern linguistics, the relationship between sound and
34
+ meaning is generally assumed to be arbitrary [1], a growing number of studies have revealed
35
+ systematic relationships between sounds and meanings, some of which hold cross-linguisti-
36
+ cally. For example, speakers of many languages tend to associate words containing [i] with
37
+ PLOS ONE
38
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
39
+ January 4, 2023
40
+ 1 / 27
41
+ a1111111111
42
+ a1111111111
43
+ a1111111111
44
+ a1111111111
45
+ a1111111111
46
+ OPEN ACCESS
47
+ Citation: Kilpatrick AJ, C´wiek A, Kawahara S (2023)
48
+ Random forests, sound symbolism and Poke´mon
49
+ evolution. PLoS ONE 18(1): e0279350. https://doi.
50
+ org/10.1371/journal.pone.0279350
51
+ Editor: Maki Sakamoto, The University of Electro-
52
+ Communications, JAPAN
53
+ Received: July 12, 2022
54
+ Accepted: December 6, 2022
55
+ Published: January 4, 2023
56
+ Peer Review History: PLOS recognizes the
57
+ benefits of transparency in the peer review
58
+ process; therefore, we enable the publication of
59
+ all of the content of peer review and author
60
+ responses alongside final, published articles. The
61
+ editorial history of this article is available here:
62
+ https://doi.org/10.1371/journal.pone.0279350
63
+ Copyright: © 2023 Kilpatrick et al. This is an open
64
+ access article distributed under the terms of the
65
+ Creative Commons Attribution License, which
66
+ permits unrestricted use, distribution, and
67
+ reproduction in any medium, provided the original
68
+ author and source are credited.
69
+ Data Availability Statement: All data, scripts and
70
+ an explanation of their implementation are available
71
+ at the following OSF repository. https://osf.io/
72
+ pe24w/?view_only=
73
+ 02e9327a7bd54b9280b57434a90ed83a
74
+
75
+ small objects, while words containing [a] are typically associated with larger objects [2–5].
76
+ Humans understand certain sound symbolic associations in infancy and these associations are
77
+ said to scaffold language development and facilitate word learning [6–9]. It is therefore impor-
78
+ tant for any NLP algorithm to understand sound symbolism if its goal is to understand lan-
79
+ guage in the same way that humans can. This study is concerned with the random forest
80
+ algorithm (further RF: [10]), which is an ensemble method machine learning algorithm typi-
81
+ cally applied to classification and regression tasks. It builds upon recent research by Winter
82
+ and Perlman ([11]; see also [12]), who used RFs to show that there is a systematic sound-sym-
83
+ bolic relationship between size and phonemes in English words.
84
+ In the following, we construct and test RFs using the fictional names of characters known
85
+ as Poke´mon. Initially released in 1996 as a video game, Poke´mon is an incredibly popular
86
+ mixed-media franchise, particularly in its country of origin, Japan [13]. The present study
87
+ measures the classification accuracy of RFs against that of Japanese university students. The
88
+ RFs are trained to classify Poke´mon into pre-evolution and post-evolution categories using
89
+ only the sounds that make up their names. In Experiment 1, three RFs are constructed using
90
+ the sounds that make up the names of Japanese, Mandarin Chinese (hereafter: Chinese), and
91
+ South Korean (hereafter: Korean) Poke´mon. These RFs are trained using a subset of each data-
92
+ set and then tested on the remaining data. While all RFs classify Poke´mon at a rate better than
93
+ chance, the Japanese RF was found to perform the best, hence the remaining experiments are
94
+ conducted on Japanese participants and Japanese Poke´mon names only. The Japanese RF is
95
+ then tested using the results of an elicitation experiment where Japanese participants were
96
+ asked to name previously unseen Poke´mon presented next to a pre/post-evolution parallel. A
97
+ further RF is constructed using the responses from the elicitation experiment and tested both
98
+ on the elicitation responses and the official Japanese names. In Experiment 2, we retrain the
99
+ RFs presented in Experiment 1 to include name length. These retrained RFs uncover an issue
100
+ of overfitting caused by a lack of variability in decision trees. We resolve this issue through
101
+ cross-validation by constructing multiple random forests (MRFs) with different starting values
102
+ for the randomization of splitting the data into training and testing subsets. The mean accu-
103
+ racy of the RFs in the Japanese MRF is then compared to the results of a classification experi-
104
+ ment where Japanese participants were asked to classify the elicited responses from
105
+ Experiment 1 into pre- and post-evolution categories. The results of the human participants in
106
+ the categorization experiment are then measured against the results of the MRFs. To summa-
107
+ rize, Experiment 1 tests whether RFs can learn to make classification decisions using the
108
+ sounds that make up names and whether this learning is applicable to elicited samples, and
109
+ Experiment 2 measures the performance of MRFs against humans.
110
+ Sound symbolism
111
+ One of the standard assumptions of modern linguistic theory is that the relationship between
112
+ sound and meaning is arbitrary [1,14]. While language is undoubtedly capable of associating
113
+ sounds and meanings in arbitrary ways, the last few decades have seen a growing number of
114
+ studies that reveal systematic relationships between sounds and meanings [15–17]. One well-
115
+ known example is the takete-maluma effect [18] which is the observation that voiceless obstru-
116
+ ents are typically associated with jagged-shaped objects, while names with sonorant sounds are
117
+ more often associated with round-shaped objects. This effect has been shown to hold cross-lin-
118
+ guistically [19–23]. While relationships between sound and meaning can be systematic, they
119
+ are typically stochastic in nature [24]; that is, sound-meaning relationships manifest them-
120
+ selves as a probability distribution that show statistical skews but may not be hold in all lexical
121
+ items. For example, English adjectives like tiny, mini, and itsy bitsy adhere to the high front
122
+ PLOS ONE
123
+ Random forests, sound symbolism and Poke´mon evolution
124
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
125
+ January 4, 2023
126
+ 2 / 27
127
+ Funding: AK - Grant obtained from Japan Society
128
+ for the Promotion of Science (Tokyo, JP)
129
+ GRANT_NUMBER: 20K13055 https://www.jsps.go.
130
+ jp/english/index.html The funders had no role in
131
+ study design, data collection and analysis, decision
132
+ to publish, or preparation of the manuscript.
133
+ Competing interests: The authors have declared
134
+ that no competing interests exist.
135
+
136
+ vowel equates to smallness pattern discussed above, while the English adjective small is a clear
137
+ exception to this generalization [11]. Sound symbolism is demonstrably important for lan-
138
+ guage acquisition processes [21,25]; symbolic words are more common in both child-directed
139
+ speech and early infant speech [26,27], and indeed, research has shown that infants are sensi-
140
+ tive to sound symbolism [6–9].
141
+ Poke´monastics is a relatively new subfield of sound symbolism that examines sound sym-
142
+ bolic relationships between the names of video game characters known as Poke´mon and their
143
+ attributes. In the video games, the player character collects Poke´mon, which they use to battle
144
+ other players. As Poke´mon earn experience, many have the option to evolve. Poke´mon evolu-
145
+ tion permanently changes the Poke´mon, they typically grow larger and stronger, and their
146
+ names change. Poke´monastic studies have shown that Poke´mon evolution status can be sig-
147
+ naled via some sound symbolic means in English and Japanese by an increase in name length,
148
+ increased use of voiced obstruents, and in vowel use where the high front vowel [i] is typically
149
+ associated with pre-evolution Poke´mon [28–31]. Based on these established relationships and
150
+ the likelihood that the participants would be familiar with the subject, Poke��mon evolution was
151
+ determined to be a suitable test case for measuring the ability of RFs against humans in under-
152
+ standing sound symbolism (see also [11]).
153
+ Random forests
154
+ RFs, first introduced by Breiman [10], are ensemble method machine learning algorithms that
155
+ are typically applied to classification and regression tasks. Since their inception, RFs have been
156
+ a popular tool in machine learning, and several recent review articles attest to their efficacy
157
+ [32–34]. Typically, RFs work by constructing many decision trees using a two-thirds subset of
158
+ the data, they are then tested on the remaining data. Decision trees themselves are non-
159
+ parametric supervised machine learning algorithms that resemble flow charts where each
160
+ internal node represents a test of features. The decision tree splits at each node based on how
161
+ important each feature is in the task. Splits eventually lead to a terminal node in the decision
162
+ tree, which depicts the outcome of the decision-making process. Decision trees can be
163
+ extremely useful; they are scale-invariant, robust to irrelevant features and inherently inter-
164
+ pretable. However, decision trees are sensitive to noise and outliers, and are thus prone to
165
+ overfitting data which limits their ability to generalize to unobserved samples [35,36]. Overfit-
166
+ ting is a modelling error that occurs when a function is too closely aligned to a limited set of
167
+ data points. This results in a model that performs well for the trained dataset but may not gen-
168
+ eralize well to other datasets. To address the issue of overfitting, RFs use bootstrap aggregating
169
+ (bagging: [37]) and the random subspace method [38]. Bagging involves using many decision
170
+ trees to improve the stability and accuracy of the algorithm by averaging voting (in classifica-
171
+ tion) or the output (in regression). In bagging, samples are randomly allocated to trees, typi-
172
+ cally with replacement, which raises the issue of duplication. The random subspace method
173
+ resolves this issue by randomly selecting a subset of features at each internal node, which
174
+ allows the model to better generalize by introducing variability into the decision trees. In other
175
+ words, bagging randomly selects samples while the subspace method randomly selects fea-
176
+ tures. By randomizing the decision trees across both dimensions, random forests resolve the
177
+ issue of overfitting inherent in decision trees.
178
+ Experiment 1: Elicitation
179
+ Material and methods
180
+ The data, an explanation of the data, and a detailed annotated script for the following algo-
181
+ rithms are available under the OSF repository.
182
+ PLOS ONE
183
+ Random forests, sound symbolism and Poke´mon evolution
184
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
185
+ January 4, 2023
186
+ 3 / 27
187
+
188
+ Official Poke´mon name data. All data were obtained from Bulbapedia ([39], last accessed
189
+ in June 2022). As of June 2022, Bulbapedia has completed (mainspaced in the parlance of the
190
+ website) lists for Japanese, Chinese, Korean, English, German, and French Poke´mon. Japanese,
191
+ Chinese, and Korean names were selected for this experiment on the basis that Japanese kata-
192
+ kana, Chinese pinyin, and Korean McCune-Reischauer romanisation are reasonably phonetic
193
+ scripts. An algorithm was created for each language to count the number of times each sound
194
+ occurs in each name. The algorithms and a detailed explanation for their implementation are
195
+ included in the above OSF repository. This resulted in an almost entirely phonemic analysis
196
+ except in the case of tones in Chinese, which are counted as separate features, and voicing on
197
+ plosives in Korean. In Korean [40] and Chinese [41], there is no phonological opposition
198
+ between voiced and voiceless plosives. However, Korean plosives are systematically voiced
199
+ when they occur intervocalically [40], and this is reflected in the McCune-Reischauer romani-
200
+ sation of Korean. Given that voiced plosives have been shown carry information pertaining to
201
+ Poke´mon evolution in other languages [29,31], intervocalic plosives were counted separately
202
+ in Korean.
203
+ As of June 2022, there are 905 Poke´mon that span eight generations. This study only exam-
204
+ ines the names of pre-evolution and post-evolution Poke´mon. Some Poke´mon do not evolve
205
+ and are therefore not included in the current study. The sixth generation of the core video
206
+ game series saw the introduction of a mechanic known as Mega Evolution that temporarily
207
+ transforms certain Poke´mon. Mega evolution is not considered by the present study because
208
+ this is a temporary transformation that has little effect on Poke´mon names other than the addi-
209
+ tion of prefixes like mega. Other Poke´mon that were excluded from the analysis are mid-stage
210
+ evolutionary variants. An example of a mid-stage Poke´mon is Electabuzz which was intro-
211
+ duced in the first generation of the video game series. Its pre-evolution variant, Elekid, was
212
+ introduced in the second generation, and its post-evolution variant, Electivire, was introduced
213
+ in the fourth generation. In the present study, we exclude Electabuzz from the analysis because
214
+ it is considered the mid-stage variant, despite other Poke´mon being added to the evolutionary
215
+ family retroactively. Kawahara and Kumagai [28] analysed the relationships between the
216
+ sounds in the names of Poke´mon and Poke´mon evolution where they did not exclude mid-
217
+ stage Poke´mon. To achieve this, they had four categories based on evolution level rather than
218
+ binary pre- and post-evolution categories. RFs are capable of multiclass classification; however,
219
+ we opted for binary classification for the current analysis because, while the data is technically
220
+ count data, it is almost entirely binary (e.g., 96.7% of all data points in the Japanese dataset are
221
+ either 0 or 1). Therefore, it made sense to use a binary classifier given that the sound symbolic
222
+ patterns are likely scalar across mid- and final-stage categories. The removal of mid-stage
223
+ Poke´mon and Poke´mon with no evolutionary family resulted in 628 unique Poke´mon names,
224
+ 303 of which are pre-evolution and 325 of which are post-evolution. The reason for the distri-
225
+ bution skew is because certain pre-evolution Poke´mon may evolve into multiple post-evolu-
226
+ tion variants.
227
+ Elicitation experiment.
228
+ This experiment received ethics approval from the Nagoya Uni-
229
+ versity of Business and Commerce. ID number 21048.
230
+ The elicitation experiment has two main goals. The first is to determine whether an RF con-
231
+ structed using the official Poke´mon name data can be used to classify names elicited from par-
232
+ ticipants and vice versa. In other words, is there enough overlap between the official names
233
+ and names provided by participants for each model to be useful in classifying Poke´mon from
234
+ the alternate dataset. The second goal is to provide stimuli for a categorization experiment
235
+ (Experiment 2) designed to measure the performance of human participants against the
236
+ machine learning algorithms. To get a fair measurement of classification accuracy, it was
237
+ PLOS ONE
238
+ Random forests, sound symbolism and Poke´mon evolution
239
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
240
+ January 4, 2023
241
+ 4 / 27
242
+
243
+ important to test both humans and the machine learning algorithms on data that they had not
244
+ previously been exposed to, hence the need for elicited samples.
245
+ The elicitation experiment was conducted using Google Forms. Each Google form con-
246
+ sisted of a short instructional paragraph, followed by twenty Poke´mon-like images. Following
247
+ the method outlined in Kawahara & Kumagai [28], these images were not of existing Poke´mon
248
+ and had likely not been previously viewed by the participants. The instructions noted that only
249
+ native Japanese speakers were to take the survey. Participants were informed that they were to
250
+ name twenty new Poke´mon. It was made clear to participants that they would be shown
251
+ images of pre- and post-evolution Poke´mon. Participants were asked to provide names for
252
+ Poke´mon in katakana which is the script used for Poke´mon names and nonce words in Japa-
253
+ nese. Participants were instructed not to use existing words (Japanese or otherwise) to name
254
+ the Poke´mon. Participants were given no further instructions (such as length limitations)
255
+ regarding naming the Poke´mon. Participants were not asked if they were familiar with the
256
+ Poke´mon franchise prior to completing the survey. All instructions were written in Japanese.
257
+ Participants were informed that their participation was entirely voluntary, that they may quit
258
+ the survey at any time. Consent was obtained verbally and it was explained to participants that
259
+ their participation also constituted consent. No personal data were collected other than stu-
260
+ dent email addresses which were collected to ensure that students were not completing the sur-
261
+ vey twice. These were discarded prior to the analysis.
262
+ Each image contained a pre-evolution and a post-evolution Poke´mon presented side by
263
+ side. The pre-evolution Poke´mon was always located to the left of the post-evolution Poke´mon
264
+ and was always presented as substantially smaller (see Fig 1) than its post-evolution counter-
265
+ part. In each image, there was an arrow pointing to the Poke´mon that was to be named. Images
266
+ with arrows pointing to the pre-evolution Poke´mon were always followed by an identical
267
+ image, except the arrow would be pointing to the post-evolution Poke´mon. Trials were not
268
+ randomized, and the pre-evolution image was always followed by the post-evolution image.
269
+ Pre-evolution Poke´mon were always presented on the left and post-evolution Pokemon were
270
+ always presented on the right. The images were created by a semi-professional artist (Devian-
271
+ tArt user: Involuntary-Twitch), and samples are presented in Fig 1. The images very closely
272
+ resemble the pixelated images used to represent Poke´mon in the earlier generations of Poke´-
273
+ mon games.
274
+ Participants were recruited from the Nagoya University of Commerce and Business via a
275
+ post on the student bulletin board. Students were not compensated for their time monetarily
276
+ or otherwise. The human participants needed to be somewhat familiar with the subject matter
277
+ because sound-symbolic relationships in fictional names may not adhere to those found in nat-
278
+ ural languages. Given the popularity of Poke´mon in Japan and that the participants were Japa-
279
+ nese university students, Poke´mon was determined to be a good test case for assessing the
280
+ accuracy of RFs against that of humans. Forty-nine students responded to the survey. In total,
281
+ 980 responses were recorded; however, some responses were blank and other responses con-
282
+ tained duplicate names, the distribution of which suggested that participants had possibly con-
283
+ ferred while taking the survey. These were discarded, resulting in 967 unique names (482 pre-
284
+ evolution; 485 post-evolution). Elicited names were transcribed using the same algorithm used
285
+ for the official Japanese Poke´mon names. None of the names collected in the elicitation experi-
286
+ ment were names of existing Poke´mon.
287
+ Random forests.
288
+ Random forests were constructed and tested using the ranger package
289
+ 0.13.1 [42]. The number of trees included in each RF was manually tuned by constructing nine
290
+ RFs at different tree number values with different starting points for randomization (set.seed).
291
+ Optimal values were determined by examining mean out of bag (OOB) accuracy and its stan-
292
+ dard deviation. OOB error refers to incorrectly classified samples. For all RFs, 20,000 trees
293
+ PLOS ONE
294
+ Random forests, sound symbolism and Poke´mon evolution
295
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
296
+ January 4, 2023
297
+ 5 / 27
298
+
299
+ were determined to be a suitable size because we observed no reduction in OOB error with
300
+ increased trees and because calculating feature importance using the Altmann method [43] at
301
+ 20,000 trees approached the processing capability of the computer the RFs were constructed
302
+ upon. Hyperparameters pertaining to the number of features examined at each node, the sam-
303
+ ple fraction, and node size were tuned using the tuneRanger package 0.5 [44]. Essentially, the
304
+ tuning process determines how much variability there is between trees. Highly variable trees
305
+ Fig 1. Sample stimulus pairs of pre- and post-evolution Poke´mon characters used in Experiment 1. These images
306
+ are reproduced with the permission of the artist.
307
+ https://doi.org/10.1371/journal.pone.0279350.g001
308
+ PLOS ONE
309
+ Random forests, sound symbolism and Poke´mon evolution
310
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
311
+ January 4, 2023
312
+ 6 / 27
313
+
314
+ ↑will produce highly variable results but might encounter issues with datasets that contain
315
+ many unimportant features or null values. Low variability in decision trees results in more sta-
316
+ ble algorithms but may mask the importance of weaker features because they will often be
317
+ paired with strong features. The accuracy of the RF is determined by feeding the testing data
318
+ into the model and assessing the OOB error. The OOB error gives an overall representation of
319
+ the accuracy of the algorithm but does not communicate which features are important in clas-
320
+ sification, which is instead determined by feature importance. There are several ways to calcu-
321
+ late feature importance, the present study uses permutation. In permutation, each feature is
322
+ randomized individually, and then the algorithm is reconstructed with all other features
323
+ remaining the same. Feature importance is calculated on the increase of OOB error due to ran-
324
+ domization. One issue with the interpretability of RFs is that feature importance does not com-
325
+ municate directionality. For example, those sounds that are important to classification may be
326
+ considered as “pulling” each sample into one category or the other, while feature importance
327
+ communicates the strength of the “pull”, it does not communicate whether that “pull” is in the
328
+ direction of the pre- or post-evolution category. In the present study, we report on the distri-
329
+ bution of speech sounds to pre- and post-evolution categories.to indicate directionality,
330
+ though it should be noted that they are not necessarily the same measure.
331
+ In total, there were six RFs constructed for Experiment 1. The first three RFs presented in
332
+ the results section were trained using a randomly sampled subset consisting of two-thirds of
333
+ the Japanese, Chinese and Korean Poke´mon names. The fourth RF is trained using two-thirds
334
+ of the results of the elicitation experiment. All four RFs are then tested using the remaining
335
+ one-third subset of each dataset. We then calculate feature importance for each RF to examine
336
+ potential cross-linguistic patterns, and patterns between the Japanese Poke´mon data and the
337
+ elicited data. The remaining two RFs are constructed using the entirety of the official Japanese
338
+ Poke´mon names and the entirety of the samples collected in the Elicitation experiment. These
339
+ two RFs are then tested using the alternate dataset. In other words, one RF is constructed
340
+ using all the official names and tested on the elicited responses, while the other is constructed
341
+ using all the elicited samples and tested on the official names. This is done to determine
342
+ whether there is enough overlap in the two datasets for the algorithms to be useful in classify-
343
+ ing the opposite dataset.
344
+ Results
345
+ The three RFs trained and tested on the official Poke´mon names all classified Poke´mon at a
346
+ rate better than chance. Given that there is an uneven distribution of pre- and post-evolution
347
+ Poke´mon, any model that naïvely classified to the majority category would achieve an accuracy
348
+ of around 52% (OOB error 48%) depending on the split of the training and testing subsets.
349
+ The Japanese RF was the most accurate (OOB error 29.05%), followed by the Chinese RF
350
+ (OOB error 39.05%), and finally, the Korean RF (OOB error 40.95%). A confusion matrix for
351
+ the Japanese RF is presented in Table 1 and feature importance for the Japanese RF is pre-
352
+ sented in Table 2. Note here that in Experiment 2, we report on the results of MRFs with differ-
353
+ ent starting values for the randomization of both splitting the data in the training and testing
354
+ Table 1. Confusion matrix for the Japanese RF.
355
+ Classification
356
+ Pre-evolution
357
+ Post-evolution
358
+ Sample
359
+ Pre-evolution
360
+ 69
361
+ 38
362
+ Post-evolution
363
+ 23
364
+ 80
365
+ https://doi.org/10.1371/journal.pone.0279350.t001
366
+ PLOS ONE
367
+ Random forests, sound symbolism and Poke´mon evolution
368
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
369
+ January 4, 2023
370
+ 7 / 27
371
+
372
+ subsets, and the RFs themselves. The results of the MRFs (OOB error: M = 34.07%,
373
+ SD = 2.48%) suggest that this result was an outlier caused by a particularly advantageous split
374
+ between training and testing subsets. This process was conducted for the Chinese (OOB error:
375
+ M = 40.85%, SD = 3.35%) and Korean (OOB error: M = 43.28%, SD = 3.09%) datasets as well.
376
+ The RF trained and tested on the elicited names (Elicited RF) classified samples at a rate better
377
+ than chance. As with the official datasets, there was an uneven distribution to categories, a
378
+ naïve model would accurately classify samples in the elicited data 50.16% (OOB error 49.84%)
379
+ of the time. The Elicited RF achieved an OOB error of 30.96%. Feature importance was calcu-
380
+ lated for each model to determine which sounds contributed to classification. Feature impor-
381
+ tance and significance is calculated using the Altmann [43] permutation method on the
382
+ training subsets. Permutation involves randomizing features individually; the random forest is
383
+ then reconstructed for each feature. Feature importance is the increase in OOB error for the
384
+ feature being randomized. The Altmann permutation method involves running multiple per-
385
+ mutations to estimate more precise p values. Feature importance significance is calculated by
386
+ normalizing the biased measure based on a permutation test. This returns a significance result
387
+ for each feature, not for the random forest itself [43]. All RFs in the present study use the Alt-
388
+ mann permutation method with the number of iterations set at 100. Directionality was deter-
389
+ mined by the distribution of features in the training subsets of the data. The distribution of
390
+ features in the Japanese training subset is presented in Fig 2. In the Japanese RF, the most
391
+ important features were the bilabial nasal (/m/), the coda nasal (/ɴ/), long vowels (/:/), and the
392
+ voiced velar plosive (/g/). Of these features, only /m/ occurs more frequently in the pre-evolu-
393
+ tion samples.
394
+ As with the Japanese RF, the distribution of most features that were important in the Chi-
395
+ nese RF skewed towards the post-evolution category. A confusion matrix for the Chinese RF is
396
+ presented in Table 3 and feature importance scores for its features are presented in Table 4,
397
+ and distribution is presented in Fig 3. Tones are an important feature in the RF; where the fall-
398
+ ing tone occurs more frequently in the post-evolution samples, the neutral tone occurs more
399
+ frequently in the pre-evolution samples. The velar nasal (/η/) was also found to be an impor-
400
+ tant feature in the Chinese RF.
401
+ Table 2. Feature importance (Importance) and p values for features that achieved a feature importance greater
402
+ than 0.1% in the Japanese RF.
403
+ Feature
404
+ Importance
405
+ p value
406
+ /m/
407
+ 0.78%
408
+ 0.030
409
+ /ɴ/a
410
+ 0.63%
411
+ 0.020
412
+ /:/b
413
+ 0.45%
414
+ 0.049
415
+ /g/
416
+ 0.40%
417
+ 0.049
418
+ /a/
419
+ 0.39%
420
+ 0.139
421
+ /ɾ/
422
+ 0.35%
423
+ 0.089
424
+ /Q/c
425
+ 0.24%
426
+ 0.059
427
+ /ɸ/
428
+ 0.20%
429
+ 0.079
430
+ /ʈ ͡ɕ/
431
+ 0.19%
432
+ 0.069
433
+ /d ͡ʒ/
434
+ 0.19%
435
+ 0.129
436
+ /d/
437
+ 0.19%
438
+ 0.228
439
+ a /ɴ/ represents the coda nasal.
440
+ b /:/ represents the second portion of long vowels.
441
+ c /Q/ represents the initial portion of geminate consonants.
442
+ https://doi.org/10.1371/journal.pone.0279350.t002
443
+ PLOS ONE
444
+ Random forests, sound symbolism and Poke´mon evolution
445
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
446
+ January 4, 2023
447
+ 8 / 27
448
+
449
+ In the Korean RF, vowels /ɯ/, /a/, /ʌ/, and /u/ were important, as was the voiced labial-
450
+ velar approximant /w/. Interestingly, while the close back unrounded vowel, /ɯ/ was present
451
+ more often in post-evolution samples, the close back rounded vowel /u/ was present more
452
+ often in pre-evolution samples. Table 5 presents a confusion matrix for the Korean RF, Table 6
453
+ presents the feature importance and p values, and Fig 4 presents the distribution.
454
+ Fig 2. Distribution of features to pre- and post-evolution categories in the Japanese training subset. Features
455
+ appear in order of importance from left to right. Asterisks denote significant features.
456
+ https://doi.org/10.1371/journal.pone.0279350.g002
457
+ Table 3. Feature importance (Importance) and p values for features that achieved a feature importance greater
458
+ than 0.1% in the Chinese RF.
459
+ Classification
460
+ Pre-evolution
461
+ Post-evolution
462
+ Sample
463
+ Pre-evolution
464
+ 53
465
+ 50
466
+ Post-evolution
467
+ 29
468
+ 78
469
+ https://doi.org/10.1371/journal.pone.0279350.t003
470
+ PLOS ONE
471
+ Random forests, sound symbolism and Poke´mon evolution
472
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
473
+ January 4, 2023
474
+ 9 / 27
475
+
476
+ 1.00 -
477
+ 0.75 -
478
+ Distribution
479
+ Condition
480
+ 0.50 -
481
+ Post-Evolution
482
+ Pre-Evolution
483
+ 0.25 -
484
+ 0.00
485
+ Im/ IN*
486
+ la/
487
+ r
488
+ FeatureTable 4. Feature importance (Importance) and p values for features that achieved a feature importance greater
489
+ than 0.1% in the Chinese RF.
490
+ Feature
491
+ Importance
492
+ p value
493
+ Falling tone
494
+ 0.88%
495
+ 0.020
496
+ /η/
497
+ 0.87%
498
+ 0.010
499
+ /ʈ ͡ɕ/
500
+ 0.20%
501
+ 0.089
502
+ /ɕ/
503
+ 0.14%
504
+ 0.109
505
+ /e/
506
+ 0.13%
507
+ 0.238
508
+ /o/
509
+ 0.13%
510
+ 0.257
511
+ Neutral tone
512
+ 0.13%
513
+ 0.188
514
+ https://doi.org/10.1371/journal.pone.0279350.t004
515
+ Fig 3. Distribution of features to pre- and post-evolution categories in the Chinese training subset. Features
516
+ appear in order of importance from left to right. Asterisks denote significant features.
517
+ https://doi.org/10.1371/journal.pone.0279350.g003
518
+ PLOS ONE
519
+ Random forests, sound symbolism and Poke´mon evolution
520
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
521
+ January 4, 2023
522
+ 10 / 27
523
+
524
+ 1.00-
525
+ 0.75-
526
+ uopnqusia
527
+ Condition
528
+ 0.50 -
529
+ Post-Evolution
530
+ Pre-Evolution
531
+ 0.25 -
532
+ 0.00
533
+ Falling tone
534
+ lel
535
+ Neutral tone
536
+ Inr
537
+ Ic/
538
+ FeatureTable 5. Confusion matrix for the Korean RF.
539
+ Classification
540
+ Pre-evolution
541
+ Post-evolution
542
+ Sample
543
+ Pre-evolution
544
+ 57
545
+ 50
546
+ Post-evolution
547
+ 36
548
+ 67
549
+ https://doi.org/10.1371/journal.pone.0279350.t005
550
+ Table 6. Feature importance (Imp.) and p values (p) for features that achieved a feature importance greater than
551
+ 0.1% in the Korean RF.
552
+ Feature
553
+ Importance
554
+ p value
555
+ /ɯ/
556
+ 2.558%
557
+ <0.001
558
+ /a/
559
+ 1.326%
560
+ 0.0297
561
+ /w/
562
+ 0.226%
563
+ 0.0693
564
+ /ʌ/
565
+ 0.207%
566
+ 0.1287
567
+ /u/
568
+ 0.113%
569
+ 0.1782
570
+ https://doi.org/10.1371/journal.pone.0279350.t006
571
+ Fig 4. Distribution of features to pre- and post-evolution categories in the Korean training subset. Features appear
572
+ in order of importance from left to right. Asterisks denote significant features.
573
+ https://doi.org/10.1371/journal.pone.0279350.g004
574
+ PLOS ONE
575
+ Random forests, sound symbolism and Poke´mon evolution
576
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
577
+ January 4, 2023
578
+ 11 / 27
579
+
580
+ 1.00 -
581
+ 0.75 -
582
+ Distribution
583
+ Condition
584
+ 0.50 -
585
+ Post-Evolution
586
+ Pre-Evolution
587
+ 0.25 -
588
+ 0.00 -
589
+ Iur
590
+ /a
591
+ IN
592
+ Iu/
593
+ FeatureMost of the features that were important in the Japanese RF were also important in the Elic-
594
+ ited RF. These include voiced plosives (/g/ & /d/), the open front unrounded vowel (/a/), the
595
+ coda nasal (/ɴ/), and long vowels (/:/). Interestingly, all the features that achieved a feature
596
+ importance greater than 0.1% in the Elicited RF occurred more frequently in post-evolution
597
+ Poke´mon. The confusion matrix for the RF constructed and tested on the data from the elicita-
598
+ tion experiment are presented in Tables 7 and 8 presents the feature importance scores, and
599
+ Fig 5 presents the distribution chart.
600
+ Given that the Japanese RF and the Elicited RF feature importance patterns are reasonably
601
+ similar, we wanted to test whether these RFs would be able to accurately classify samples from
602
+ their opposite dataset. Important features that are shared between the two models are non-
603
+ labial voiced obstruents such as /d/ and /g/, coda nasals, long vowels, and the low front vowel
604
+ /a/. Interestingly, the distributional skew for all of these features is towards the post-evolution
605
+ category. We tested each existing RF on the entirety of their opposite dataset (not just the test
606
+ subsets). The Japanese RF was able to accurately classify the elicited samples 61.43% of the
607
+ time (OOB error 38.57%), and the Elicited RF was able to accurately classify the official Japa-
608
+ nese Poke´mon name samples 66.72% of the time (OOB error 33.28%) where naïve models
609
+ would be expected to achieve an accuracy of 52% and 50.16% respectively. The confusion
610
+ matrix for the RF trained using the official Japanese Poke´mon names and tested using the elic-
611
+ ited samples is shown in Table 9. Table 10 shows the confusion matrix for the for the RF
612
+ trained using the elicited samples and tested using the official Japanese Poke´mon names.
613
+ Discussion
614
+ All the RFs presented above performed better than a naïve algorithm would. For the Japanese,
615
+ Chinese, and Korean RFs, a naïve algorithm would be expected to achieve an OOB error of
616
+ 48%. While the Japanese RF was shown to be the most accurate (OOB error 29.05%), the Chi-
617
+ nese (OOB error 39.05%) and Korean (OOB error 40.95%) error rates were well below 48%.
618
+ The elicited RF, for which a naïve algorithm would be expected to achieve an OOB error of
619
+ 50%, achieved an OOB error of 30.96%. Important to remember here is that the RFs were
620
+ Table 7. Confusion matrix for the Elicited RF.
621
+ Classification
622
+ Pre-evolution
623
+ Post-evolution
624
+ Sample
625
+ Pre-evolution
626
+ 103
627
+ 55
628
+ Post-evolution
629
+ 45
630
+ 120
631
+ https://doi.org/10.1371/journal.pone.0279350.t007
632
+ Table 8. Feature importance (Imp.) and p values (p) for features that achieved a feature importance greater than
633
+ 0.1% in the Elicited RF.
634
+ Feature
635
+ Importance
636
+ p value
637
+ /d/
638
+ 1.263%
639
+ <0.001
640
+ /ɯ/
641
+ 1.059%
642
+ <0.001
643
+ /a/
644
+ 0.918%
645
+ <0.001
646
+ /g/
647
+ 0.838%
648
+ <0.001
649
+ /d ͡ʒ/
650
+ 0.448%
651
+ <0.001
652
+ /o/
653
+ 0.219%
654
+ 0.2277
655
+ /ɴ/
656
+ 0.180%
657
+ 0.2376
658
+ /:/
659
+ 0.140%
660
+ 0.2772
661
+ /z/
662
+ 0.138%
663
+ 0.1287
664
+ https://doi.org/10.1371/journal.pone.0279350.t008
665
+ PLOS ONE
666
+ Random forests, sound symbolism and Poke´mon evolution
667
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
668
+ January 4, 2023
669
+ 12 / 27
670
+
671
+ trained on only two-thirds of the data, so the RFs were efficient learners, given that they only
672
+ had 419 samples to learn from. The RF trained on the official Japanese data and tested on the
673
+ elicited data was trained on all 628 official Japanese samples and tested on all 967 elicited
674
+ responses. Despite having more samples from which to learn, the RF trained on the official
675
+ names and tested on the elicited responses (OOB error 38.57%) was less accurate than the RF
676
+ trained and tested on the official names (OOB error 29.05%). Similarly, the RF trained on the
677
+ Fig 5. Distribution of features to pre- and post-evolution categories in the elicited training subset. Features appear
678
+ in order of importance from left to right. Asterisks denote significant features.
679
+ https://doi.org/10.1371/journal.pone.0279350.g005
680
+ Table 9. Confusion matrix for the RF trained using the official Japanese Poke´mon names and tested using the
681
+ elicited samples.
682
+ Classification
683
+ Pre-evolution
684
+ Post-evolution
685
+ Sample
686
+ Pre-evolution
687
+ 245
688
+ 237
689
+ Post-evolution
690
+ 136
691
+ 349
692
+ https://doi.org/10.1371/journal.pone.0279350.t009
693
+ PLOS ONE
694
+ Random forests, sound symbolism and Poke´mon evolution
695
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
696
+ January 4, 2023
697
+ 13 / 27
698
+
699
+ 1.00
700
+ 0.75-
701
+ Distribution
702
+ Condition
703
+ 0.50
704
+ Post-Evolution
705
+ Pre-Evolution
706
+ 0.25
707
+ 0.00
708
+ Ia/t
709
+ la/
710
+ Ig/* Ids/
711
+ 1o/
712
+ IN
713
+ Featureentirety of the elicited responses and tested on the official names (OOB error 33.28%) was less
714
+ accurate than the RF trained and tested on the elicited responses (OOB error 30.96%). Despite
715
+ these differences, the official names and the elicited responses are similar enough to perform
716
+ better than naïve algorithms.
717
+ The feature importance scores of the RFs reveal interesting relationships between Poke´mon
718
+ evolution status and the sounds that make up their names, some of which hold across lan-
719
+ guages. While high front vowels did not achieve a feature importance greater than 0.1% in any
720
+ of the RFs, the low front vowel /a/ and the high back unrounded vowel /ɯ/ were important in
721
+ the Japanese, Korean, and Elicited RFs and were distributionally skewed towards post-evolu-
722
+ tion in all cases. The result for the phoneme /a/ as representing post-evolution Poke´mon is in
723
+ line with the well-known observation that nonce words containing [a] are larger than those
724
+ containing [i] [2,45,46] given that post-evolution Poke´mon are typically larger than their pre-
725
+ evolution counterparts. Interestingly, the high back rounded vowel /u/ was important in the
726
+ Chinese model, but it skewed towards the pre-evolution category. Vowels were found to be
727
+ important in the Korean model, particularly /ɯ/, /a/, /ʌ/, and /u/. Korean vowels have been
728
+ found to hold sound symbolic correspondences between “light” and “dark” vowels [47]. These
729
+ correspondences run counter to cross-linguistic patterns. For example, light vowels are
730
+ defined as being low vowels and are said to reflect small, fast-moving entities, while dark (or
731
+ high) vowels are said to reflect larger, slow-moving entities [48]. Our findings do not support
732
+ this observation. Although the distribution of dark vowels /ɯ/ and /ʌ/ skew towards the post-
733
+ evolution category, the distribution of the light vowel /a/ skews towards the post-evolution cat-
734
+ egory, while the dark vowel /u/ skews towards the pre-evolution category. The finding that /a/
735
+ is important to the Korean model and skews towards the post-evolution category is in line
736
+ with [5] who found that Korean listeners judge nonce words to be larger when the contain [a].
737
+ Long vowels were important in both the Japanese and the Elicited RFs, and they skewed
738
+ towards post-evolution in both cases. This finding is reflected in previous Pokemon studies
739
+ [29,30], which also show that long vowels are associated with increased size. These studies
740
+ tend to suggest this can be explained by the iconicity of quantity which is the finding that larger
741
+ objects are typically associated with longer names [49]. This is explored further in Experiment
742
+ 2. Lastly, tones in the Chinese RF were important to the model. The falling tone had the high-
743
+ est feature importance in the Chinese RF and it skewed toward the post-evolution category.
744
+ The neutral tone, on the other hand, skewed toward the pre-evolution category. In a similar
745
+ Poke´monastic study, Shih et al., [50] found that the falling tone seems to be associated with
746
+ increased power, evolution stage, and increased distribution to the male gender. This is seem-
747
+ ingly more complex than what Ohala’s Frequency Code hypothesis [51] would predict as it
748
+ simply states that low tones should reflect largeness while high tones should predict smallness;
749
+ but makes no prediction regarding tone pitch contour. Shih et al., [50] propose that the falling
750
+ tone has the steepest pitch of all Chinese tones, and that this may explain why this tone is icon-
751
+ ically linked to largeness in Chinese.
752
+ The Japanese nasal /ɴ/ and the Chinese nasal /η/ were important in the Japanese, Chinese,
753
+ and Elicited RFs and skewed towards post-evolution in all cases. This is an interesting finding
754
+ Table 10. Confusion matrix for the for the RF trained using the elicited samples and tested using the official Japa-
755
+ nese Poke´mon names.
756
+ Classification
757
+ Pre-evolution
758
+ Post-evolution
759
+ Sample
760
+ Pre-evolution
761
+ 180
762
+ 123
763
+ Post-evolution
764
+ 83
765
+ 242
766
+ https://doi.org/10.1371/journal.pone.0279350.t010
767
+ PLOS ONE
768
+ Random forests, sound symbolism and Poke´mon evolution
769
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
770
+ January 4, 2023
771
+ 14 / 27
772
+
773
+ given that both consonants can only occur in the coda position, although the coda nasal /η/ in
774
+ Korean did not achieve a feature importance greater than 0.1%. Cross-linguistically, nasal con-
775
+ sonants are generally associated with large entities [2,52], likely due to their low frequency [2].
776
+ In Japanese, however, bilabial consonants have been found to be associated with images of
777
+ cuteness and softness [53], which may explain why /m/ was both important in the Japanese
778
+ model and was skewed towards the pre-evolution category. High back vowels in the Korean
779
+ model present an interesting case study when examined through the lens of the relationship
780
+ between cuteness and labiality in Japanese. In the Korean model, both high back vowels were
781
+ found to be important. While the high back rounded vowel /u/ skewed towards the pre-evolu-
782
+ tion category, the high back unrounded vowel /ɯ/ skewed towards the post-evolution cate-
783
+ gory. This result suggests that the association between cuteness and labiality may be a cross-
784
+ linguistic one; however, this suggestion is tentative given that the Korean labial-velar approxi-
785
+ mant both skewed towards post-evolution and was important in the model. Berlin [2] suggests
786
+ that nasal consonants can imply largeness given their low frequency energy; however, the bila-
787
+ bial nasal /m/ skewed towards the pre-evolution category and was found to be important in
788
+ the Japanese RF. In line with Shih et al. [31], who found that voiced plosives were reflective of
789
+ size in Japanese and English Poke´mon names, voiced plosives /d/ and /g/ were important in
790
+ the Japanese and Elicited RFs. Intervocalic plosives in Korean were counted separately due to
791
+ maintaining systematic voicing in these positions; however, these did not achieve a feature
792
+ importance greater than 0.1%.
793
+ Experiment 2: Categorization
794
+ Random forests
795
+ The RFs presented in Experiment 1 were constructed using only the sounds that make up the
796
+ names of Poke´mon. In Experiment 2, we reconstruct those RFs with name length as an addi-
797
+ tional feature. Length was not included in the previous RFs because previous studies suggest
798
+ that it is likely a highly important feature [29,31], the inclusion of which would likely mask the
799
+ importance of other features. In all other aspects, the RFs presented in Experiment 2 follow the
800
+ same method as those in Experiment 1, except in the case where multiple random forests
801
+ (MRFs) are constructed independently of each other. In MRFs, the starting value for the ran-
802
+ domization for splitting data into training and testing subsets, as well as the starting value for
803
+ the randomization for each RF was set as the number where the RF fell in the RF sequence. So
804
+ the first RF in each MRF had a set.seed value of 1 while the ninth RF had a set.seed value of 9.
805
+ For MRFs, tuning was conducted on the first RF only and those hyperparameter settings were
806
+ applied to all nine RFs in each MRF. This is because, as far as we can tell, there is no way to
807
+ make the tuning process replicable and the data for individual RFs come from the same source.
808
+ We test each MRF nine times using the testing subset for each random split. In those instances
809
+ where the entirety of a dataset is tested against the entirety of a different dataset, as in the case
810
+ of testing the accuracy of the official Japanese MRF against the elicited Japanese MRF, nine
811
+ iterations of each test were run with different starting values for the randomization of the
812
+ MRFs.
813
+ Categorization experiment
814
+ This experiment received ethics approval from the Nagoya University of Business and Com-
815
+ merce. ID number 21057.
816
+ In the categorization experiment, we took the elicited responses from Experiment 1 and
817
+ asked Japanese participants to classify them as either pre-evolution or post-evolution Poke´-
818
+ mon. One hundred samples were selected randomly from the 967 elicited responses. There
819
+ PLOS ONE
820
+ Random forests, sound symbolism and Poke´mon evolution
821
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
822
+ January 4, 2023
823
+ 15 / 27
824
+
825
+ was no control for distribution in the random sampling process because there is no distribu-
826
+ tion control in the splitting of subsets for RFs. These samples were used to populate five Google
827
+ Forms that held twenty elicited names each. The surveys were designed in this manner, rather
828
+ than randomly sampling twenty names from the entire dataset, to simulate the voting process
829
+ that decision trees undertake in RFs. This is discussed further in the results section below. The
830
+ forms explained (in Japanese) to the participants that they were to assign new Poke´mon to either
831
+ pre- or post-evolution categories. These choices were presented as buttons labelled 進化前 [pre-
832
+ evolution] and 進化後 [post-evolution]. Participants were not asked if they were familiar with the
833
+ Poke´mon franchise prior to completing the survey. Five QR codes were generated for each of the
834
+ five Google Forms. The codes were printed on handouts and distributed to Japanese university
835
+ students at the Aichi Prefectural University and the Nagoya University of Business and Com-
836
+ merce. Other than the QR code, there was no other information on the handout except for the
837
+ heading ポケモンクイズ [Poke´mon Quiz]. Handouts were distributed to students prior to club
838
+ activities and scheduled classes. Students were not given any time in class to complete the survey.
839
+ In total, 119 participants responded to the survey, and there were 10 instances where participants
840
+ had failed to designate a category, resulting in 2,370 responses. As with Experiment 1, participants
841
+ were informed that their participation was entirely voluntary, that they may quit the survey at any
842
+ time. Consent was obtained verbally. No personal data were collected other than student email
843
+ addresses which were collected to ensure that students were not completing the survey twice.
844
+ These were discarded prior to the analysis. It was requested that students who had undertaken
845
+ Experiment 1 were to refrain from taking Experiment 2.
846
+ Results
847
+ The aim of Experiment 2 is to compare the performance of RFs against that of humans in clas-
848
+ sifying Poke´mon into pre- and post-evolution categories. In the categorization experiment,
849
+ human participants had access to name length, so length was included in the algorithms to
850
+ give the RFs access to this information. In the following, the distribution of length is examined
851
+ across pre-and post-evolution in all four datasets. Then, all previous RFs are reconstructed to
852
+ include length to ascertain its effects on OOB error. We also calculate the feature importance
853
+ of length to determine how much it is contributing to OOB error. Finally, we report on the
854
+ results of the categorization experiment and compare the accuracy of the human participants
855
+ against that of the machine learning algorithms. Length was calculated on the sum of all
856
+ sounds in each dataset except for Chinese tones. In an exploration of sound symbolic relation-
857
+ ships in Poke´mon names, Kawahara and Kumagai [28] calculated name length on the number
858
+ of moras in Japanese names because the mora is the most psycholinguistically salient prosodic
859
+ unit [54]. Although decision trees are scale-invariant, we calculated length on the number of
860
+ features to bring the Japanese length parameter in line with the Chinese and Korean parame-
861
+ ters. Chinese tones were excluded from the length calculation because tones are a measure of
862
+ pitch contour and do not contribute to the overall length of a name the same way that other
863
+ speech sounds do. Despite this, Chinese names were longer than those in all other data sets,
864
+ with both pre-evolution (M = 8.76, SD = 2.09) and post-evolution (M = 9.31, SD = 2.09) Poke´-
865
+ mon names consisting of a median of nine sounds. Length in the Japanese, Korean, and elic-
866
+ ited datasets were similar, with all pre-evolution names consisting of a median of seven
867
+ sounds, and all post-evolution names consisting of a median of eight sounds. The difference
868
+ between mean pre- and post-evolution length was greatest in the Elicited dataset (1.52), fol-
869
+ lowed by the Japanese dataset (0.9), Korean (0.73), and finally Chinese (0.55). Mean, median
870
+ and standard deviation for length across datasets are presented in Table 11. Fig 6 presents a
871
+ boxplot of length in Chinese, Japanese, and Korean by evolution status.
872
+ PLOS ONE
873
+ Random forests, sound symbolism and Poke´mon evolution
874
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
875
+ January 4, 2023
876
+ 16 / 27
877
+
878
+ Table 11. Feature importance (Imp.) and p values (p) for features that achieved a feature importance greater than
879
+ 0.1% in the Korean RF.
880
+ Language
881
+ Measure
882
+ Pre-evolution
883
+ Post-evolution
884
+ Chinese
885
+ Median
886
+ 9
887
+ 9
888
+ Mean
889
+ 8.76
890
+ 9.31
891
+ Standard Deviation
892
+ 2.09
893
+ 2.09
894
+ Japanese
895
+ Median
896
+ 7
897
+ 8
898
+ Mean
899
+ 7.28
900
+ 8.18
901
+ Standard Deviation
902
+ 1.38
903
+ 1.26
904
+ Korean
905
+ Median
906
+ 7
907
+ 8
908
+ Mean
909
+ 7.33
910
+ 8.06
911
+ Standard Deviation
912
+ 1.88
913
+ 1.81
914
+ Elicited
915
+ Median
916
+ 7
917
+ 8
918
+ Mean
919
+ 6.79
920
+ 8.31
921
+ Standard Deviation
922
+ 2.07
923
+ 2.38
924
+ https://doi.org/10.1371/journal.pone.0279350.t011
925
+ Fig 6. Boxplot of length for pre- and post-evolution Poke´mon across the three languages.
926
+ https://doi.org/10.1371/journal.pone.0279350.g006
927
+ PLOS ONE
928
+ Random forests, sound symbolism and Poke´mon evolution
929
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
930
+ January 4, 2023
931
+ 17 / 27
932
+
933
+ 16 -
934
+ 12 -
935
+ Evolution
936
+ Length
937
+ Pre-evolution
938
+ Post-evolution
939
+ 8
940
+ 4
941
+ Chinese
942
+ Japanese
943
+ Korean
944
+ LanguageThe distribution of length in the official Japanese Poke´mon dataset and the elicited dataset
945
+ were extremely similar. While there were more outliers in the elicited dataset, the median,
946
+ upper and lower quartiles, and minimum and maximum scores (excluding outliers) were
947
+ almost identical. Fig 7 presents a boxplot for the official Japanese Poke´mon name length, and
948
+ the elicited name length presented side by side to illustrate these similarities.
949
+ Length was excluded from the RFs in the previous section because it is clear from previous
950
+ studies that length would be an important feature [29,31] and would likely mask the impor-
951
+ tance of speech sounds. Its inclusion should therefore increase the accuracy of the models (or
952
+ reduce OOB error). However, this was not the case. All previous RFs were reconstructed to
953
+ include the length feature. These RFs underwent the same tuning process outlined in Experi-
954
+ ment 1. The feature importance of length is presented in Table 12. Table 12 also presents the
955
+ OOB error rates for the RFs constructed with (+L) and without (-L) length. The inclusion of
956
+ length increased the OOB error of all but the Chinese RF, which should be the RF least affected
957
+ by length because the difference in average length between pre- and post-evolution Poke´mon
958
+ Fig 7. Official Japanese Poke´mon name length (Official) and elicited name length (Elicited) presented side by side
959
+ in a boxplot.
960
+ https://doi.org/10.1371/journal.pone.0279350.g007
961
+ PLOS ONE
962
+ Random forests, sound symbolism and Poke´mon evolution
963
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
964
+ January 4, 2023
965
+ 18 / 27
966
+
967
+ 20 -
968
+ 15 -
969
+ Designation
970
+ Length
971
+ Elicited
972
+ 10
973
+ Official
974
+ 5-
975
+ Pre-evolution
976
+ Post-evolution
977
+ Evolutionwas the smallest in the Chinese dataset. Confoundingly, length was shown to be an important
978
+ feature in the RFs, yet its effects were not being exhibited by the difference in OOB error
979
+ between +L and -L RFs.
980
+ To explore a potential explanation for this, we examined the randomization processes used
981
+ in the construction of RFs. For all RFs until this point, we used the same set.seed value, except
982
+ for those used to tune the number of trees in each forest (num.trees). This value was used as
983
+ the starting number to generate randomization for both the splits between training and testing
984
+ data and the RFs themselves. In the method section of Experiment 1, we tuned num.trees by
985
+ running nine iterations of each num.trees value with different set.seed values for the randomi-
986
+ zation of RFs. We applied this method to the randomization of the splits between training and
987
+ testing subsets and found a substantial amount of variation in OOB error. We ran nine itera-
988
+ tions of each of the RFs presented in this study. Here, however, we adjusted the set.seed values
989
+ for both the subset splits and the RFs. The set.seed values ranged from 1–9 for both +L and -L
990
+ RFs, resulting in the same nine subset splits. The results of these are displayed in Table 13.
991
+ There is no way to control for randomization in the tuning process, each time the tuning pro-
992
+ cess is conducted, it returns different hyperparameter values even when conducted on the
993
+ same data. Given that the nature of the data remained the same, the hyperparameter values
994
+ used for the MRFs were taken from the previous RFs.
995
+ To understand the reason why the Japanese RF in Experiment 1 achieved such a low OOB
996
+ error, we examined the mean feature importance values for features in the -L Japanese MRFs
997
+ and compared them to the feature importance of features in the -L Japanese RF. Table 14
998
+ shows the confusion matrix for the Japanese MRF. Table 15 presents the feature importance
999
+ values in the Japanese RF and the mean feature importance values in the Japanese MRF. Here
1000
+ we see that the Japanese RF outlined in Experiment 1 was over-emphasising the importance of
1001
+ features /m/, /ɸ/, and /Q/, and under-emphasising the importance of /ɴ/, /:/, /ɾ/, /d/, /ɯ/, /o/,
1002
+ and /s/. The latter three were not included in earlier tables and charts because they did not
1003
+ achieve a feature importance greater than 0.1% in the Japanese RF.
1004
+ Given that the randomization of subsets has such a large impact on OOB error, we recon-
1005
+ ducted the tests of the Japanese RF using the elicited data and the Elicited RF using the official
1006
+ Japanese Poke´mon data using both -L and +L datasets. We tested the entirety of the Japanese
1007
+ Table 12. OOB error rates for the RFs constructed in Experiment 1 (-L OOB), the OOB error for RFs constructed
1008
+ using length (+L OOB), and the feature importance of length in those RFs (L Imp).
1009
+ RF
1010
+ -L OOBa
1011
+ +L OOBb
1012
+ L Impc
1013
+ Chinese
1014
+ 41.90%
1015
+ 41.43%
1016
+ 0.25%
1017
+ Japanese
1018
+ 29.05%
1019
+ 30.95%
1020
+ 4.74%
1021
+ Korean
1022
+ 40.95%
1023
+ 41.43%
1024
+ 1.33%
1025
+ Elicited
1026
+ 30.34%
1027
+ 30.96%
1028
+ 6.66%
1029
+ https://doi.org/10.1371/journal.pone.0279350.t012
1030
+ Table 13. Results of multiple random forests. The mean OOB error for RFs constructed without length (-L OOBM) and their standard deviation (-L OOBSD), the
1031
+ mean OOB error for the RFS constructed with length (+L OOBM) and their standard deviation (+L OOBSD), and the mean feature importance of length (L ImpM) in the
1032
+ +L MRFs.
1033
+ MRF
1034
+ -L OOBM
1035
+ -L OOBSD
1036
+ +L OOBM
1037
+ +L OOBSD
1038
+ L ImpM
1039
+ Chinese
1040
+ 40.85%
1041
+ 3.35%
1042
+ 39.36%
1043
+ 4.52%
1044
+ 0.51%
1045
+ Japanese
1046
+ 34.07%
1047
+ 2.40%
1048
+ 31.69%
1049
+ 3.01%
1050
+ 5.47%
1051
+ Korean
1052
+ 43.28%
1053
+ 3.09%
1054
+ 40.85%
1055
+ 2.85%
1056
+ 2.44%
1057
+ Elicited
1058
+ 36.29%
1059
+ 1.98%
1060
+ 32.47%
1061
+ 2.44%
1062
+ 6.99%
1063
+ https://doi.org/10.1371/journal.pone.0279350.t013
1064
+ PLOS ONE
1065
+ Random forests, sound symbolism and Poke´mon evolution
1066
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1067
+ January 4, 2023
1068
+ 19 / 27
1069
+
1070
+ and elicited datasets on the Elicited and Japanese MRFs, respectively. Table 16 presents the RF
1071
+ trained on the official Japanese Poke´mon names and tested on the elicited samples. Table 17
1072
+ shows the confusion matrix for the RF trained using the elicited samples and tested on the offi-
1073
+ cial names.
1074
+ Table 14. Confusion matrix for the Japanese MRF trained and tested on multiple subsets from the official Poke´-
1075
+ mon names that include length as a feature.
1076
+ Classification
1077
+ Pre-evolution
1078
+ Post-evolution
1079
+ Sample
1080
+ Pre-evolution
1081
+ 609
1082
+ 314
1083
+ Post-evolution
1084
+ 285
1085
+ 682
1086
+ https://doi.org/10.1371/journal.pone.0279350.t014
1087
+ Table 15. Feature importance of sounds for Japanese RF trained on official Poke´mon names (RF Imp), mean fea-
1088
+ ture importance of sounds for Japanese MRF trained on official names (MRF ImpM), and mean standard devia-
1089
+ tion for the Japanese MRF (MRF ImpSD). Asterisks reflect a mean p value of less than 0.05.
1090
+ Feature
1091
+ RF Imp
1092
+ MRF ImpM
1093
+ MRF ImpSD
1094
+ /m/
1095
+ 0.78%�
1096
+ 0.39%�
1097
+ 0.22%
1098
+ /ɴ/
1099
+ 0.63%�
1100
+ 1.29%�
1101
+ 0.38%
1102
+ /:/
1103
+ 0.45%�
1104
+ 0.83%�
1105
+ 0.21%
1106
+ /g/
1107
+ 0.40%�
1108
+ 0.45%
1109
+ 0.20%
1110
+ /a/
1111
+ 0.39%
1112
+ 0.37%
1113
+ 0.23%
1114
+ /ɾ/
1115
+ 0.35%
1116
+ 0.67%�
1117
+ 0.26%
1118
+ /Q/
1119
+ 0.25%
1120
+ 0.01%
1121
+ 0.05%
1122
+ /ɸ/
1123
+ 0.21%
1124
+ 0.09%�
1125
+ 0.11%
1126
+ /t ͡ɕ/
1127
+ 0.19%
1128
+ 0.10%
1129
+ 0.07%
1130
+ /d ͡ʒ/
1131
+ 0.19%
1132
+ 0.11%
1133
+ 0.14%
1134
+ /d/
1135
+ 0.19%
1136
+ 0.50%
1137
+ 0.26%
1138
+ /ɯ/
1139
+ 0.51%�
1140
+ 0.29%
1141
+ /o/
1142
+ 0.27%
1143
+ 0.18%
1144
+ /s/
1145
+ 0.10%
1146
+ 0.07%
1147
+ https://doi.org/10.1371/journal.pone.0279350.t015
1148
+ Table 16. Confusion matrix for the MRF trained on all official Japanese Poke´mon names and tested on all elicited
1149
+ samples.
1150
+ Classification
1151
+ Pre-evolution
1152
+ Post-evolution
1153
+ Sample
1154
+ Pre-evolution
1155
+ 3055
1156
+ 1510
1157
+ Post-evolution
1158
+ 1283
1159
+ 2855
1160
+ https://doi.org/10.1371/journal.pone.0279350.t016
1161
+ Table 17. Confusion matrix for the MRF trained on all elicited samples and tested on all official Japanese Poke´-
1162
+ mon names.
1163
+ Classification
1164
+ Pre-evolution
1165
+ Post-evolution
1166
+ Sample
1167
+ Pre-evolution
1168
+ 1436
1169
+ 1291
1170
+ Post-evolution
1171
+ 585
1172
+ 2340
1173
+ https://doi.org/10.1371/journal.pone.0279350.t017
1174
+ PLOS ONE
1175
+ Random forests, sound symbolism and Poke´mon evolution
1176
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1177
+ January 4, 2023
1178
+ 20 / 27
1179
+
1180
+ To explore the issue of overfitting further, we reconstructed the -L Japanese MRF; this time,
1181
+ however, we skipped the tuning process and used the default hyperparameter settings in the
1182
+ Ranger package. This was done because we considered that the most likely reason for overfit-
1183
+ ting was low variability in decision trees due to the hyperparameter settings suggested by the
1184
+ tuning process. The untuned -L Japanese MRF (OOB error M = 35.94%, SD = 1.75%) was less
1185
+ accurate than the tuned MRF (OOB error M = 34.07%, SD = 2.4%), but the standard deviation
1186
+ was lower, suggesting that overfitting was less prevalent in individual RFs. We then recreated
1187
+ the untuned MRF using the entirety of the official Japanese names and tested it on the entirety
1188
+ of the elicited names and found the same pattern whereby the untuned MRF (OOB error
1189
+ M = 38.24%, SD = 0.42%) was less accurate, but more stable than the tuned MRF (OOB error
1190
+ M = 37.31%, SD = 1.26%) presented in Table 18.
1191
+ We considered a potential alternative explanation for the high standard deviation in tuned
1192
+ MRFs; that variability caused by the randomization of subset splits may be explained by an
1193
+ over/under-representation of pre-/post-evolution Poke´mon in the testing/training subsets. A
1194
+ simple regression model was constructed to predict the effect of increased post-evolution
1195
+ Poke´mon in the testing subset on OOB error for all the Japanese, Chinese and Korean RFs
1196
+ taken from the MRFs. Elicitation data was not included because the distribution of samples to
1197
+ pre-/post-evolution categories is different in the elicited responses. No correlation between
1198
+ distribution in subsets and OOB error was observed, F(1,25) = 0.31, p = 0.581, R2 = 0.01. We
1199
+ must therefore consider that the variability in accuracy when randomizing the subsets is most
1200
+ likely due to overfitting resulting from low variability in decision trees.
1201
+ In the classification experiment, 119 Japanese participants each classified twenty names
1202
+ into either pre- or post-evolution categories. The twenty names were taken from 100 randomly
1203
+ selected samples from the results of Experiment 1. The participants were reasonably accurate
1204
+ (M = 61.58%, SD = 17.84%) at assigning the elicited Poke´mon names to pre- and post-evolu-
1205
+ tion categories. This assessment was based on the individual responses taken from their mean
1206
+ accuracy. This is arguably an unfair assessment of human ability, given that sound symbolic
1207
+ associations are decided upon by speech communities, not individual speakers. In RFs con-
1208
+ structed for classification tasks, each decision tree votes for the classification of samples. The
1209
+ RF chooses the classification based on majority voting. To apply this method to the results of
1210
+ the classification experiment, we treated each response as a vote and examined the results of a
1211
+ majority vote analysis. Put simply, we examined the mode rather than the mean for each sam-
1212
+ ple. Using majority voting, the participants in the classification experiment were able to accu-
1213
+ rately classify 71% of the samples. The same 100 samples were then tested using each RF in the
1214
+ MRF constructed with the official Japanese names. The MRF was able to accurately classify the
1215
+ samples far more accurately than the humans, correctly classifying samples 75.88% of the time
1216
+ (OOB error M = 24.12%, SD = 1.61%).
1217
+ Discussion
1218
+ Experiment 2 was designed to test whether machine learning algorithms perform on par with
1219
+ humans, though it may not be immediately clear which of the MRFs presented in Table 18
1220
+ Table 18. Results of testing the Japanese MRF on the elicited data from Experiment 1 and the Elicited MRF on the Japanese data. This includes both MRFs that do
1221
+ not contain length as a feature (-L OOBM) and those that do (+L OOBM) as well as their standard deviation (-L OOBSD, +L OOBSD).
1222
+ Train data
1223
+ Test data
1224
+ -L OOBM
1225
+ -L OOBSD
1226
+ +L OOBM
1227
+ +L OOBSD
1228
+ Japanese
1229
+ Elicited
1230
+ 37.31%
1231
+ 1.26%
1232
+ 32.09%
1233
+ 0.75%
1234
+ Elicited
1235
+ Japanese
1236
+ 35.86%
1237
+ 2.01%
1238
+ 33.19%
1239
+ 2.03%
1240
+ https://doi.org/10.1371/journal.pone.0279350.t018
1241
+ PLOS ONE
1242
+ Random forests, sound symbolism and Poke´mon evolution
1243
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1244
+ January 4, 2023
1245
+ 21 / 27
1246
+
1247
+ should be used as a fair yardstick for the accuracy of the algorithms. We consider the results of
1248
+ the MRF trained using the length and sounds of all of the official Japanese Poke´mon names
1249
+ and tested on the 100 samples used in Experiment 2 (OOB error M = 24.12%) as the fairest
1250
+ measure for the performance of the algorithms, because they were trained on the maximum
1251
+ amount of information available that was also available to the human participants and tested
1252
+ on the same samples used in Experiment 2. Converting the responses of the human partici-
1253
+ pants to OOB error shows us that the human participants (OOB error M = 38.42%,
1254
+ SD = 17.84%) were far less accurate than the algorithm (OOB error M = 20.12%, SD = 1.61%),
1255
+ even when using the majority vote method (OOB error = 29%).
1256
+ The finding that the algorithms were more accurate than individual participants at classify-
1257
+ ing Poke´mon is unintuitive, particularly given the limited data upon which the MRFs were
1258
+ trained. One interpretation of this finding is that human participants do not give their best
1259
+ effort all the time, while machine learning algorithms do. This lack of effort may come down
1260
+ to a lack of motivation, not taking the survey seriously, or any number of other factors that are
1261
+ simply impossible to take into account. However, we contend that this does not account for
1262
+ the entirety of the difference in classification accuracy for the following reasons. Firstly, the
1263
+ categorisation experiment was voluntary; participants were not rewarded monetarily or other-
1264
+ wise for their participation. While the printed handouts were distributed prior to classes, the
1265
+ students were not given any time in class to complete the experiment. It was done entirely in
1266
+ their own time. Additionally, the task was brief, taking around 2–3 minutes to complete.
1267
+ Lastly, the subject matter was specifically chosen because it was appealing and familiar to the
1268
+ population sample. Based on these factors, we expect that participant interest would have been
1269
+ high and that many participants would have been invested in the experiment.
1270
+ Therefore, we believe that another interpretation may better explain the difference between
1271
+ participant and algorithm accuracy. That humans are susceptible to cognitive biases while
1272
+ machine learning algorithms are not. For example, humans will often apply oversimplified
1273
+ images or ideas to types of people or things, this is known as stereotyping. Through the lens of
1274
+ RFs, stereotyping is the overapplication of a feature to a category. Other cognitive biases sug-
1275
+ gest that humans do not intuitively understand probabilities, this is important given that
1276
+ sound symbolism is stochastic, not deterministic [24]. These biases include the recency bias
1277
+ (also known as the availability bias) which is the expectation that events that have occurred
1278
+ recently will reoccur regardless of their probability and the conjunction fallacy which is the
1279
+ assumption that a specific condition is more probable than a general one even when said spe-
1280
+ cific condition includes the general condition [55]. Indeed, other studies have shown that
1281
+ machine learning algorithms can outperform humans (see [56] for a recent review). For exam-
1282
+ ple, McKinney et al. [57] presented a machine learning algorithm that outperformed six expert
1283
+ readers of mammographs in breast cancer prediction performance. Compared to the expert
1284
+ radiologists, the algorithm showed an absolute reduction in both false positives and false nega-
1285
+ tives. Given the nature of the task and the human participants, we can reasonably safely assume
1286
+ that the difference in performance was not based on disinterest or lack of motivation on the
1287
+ part of the radiologists. We must therefore consider that the OOB error difference between the
1288
+ human participants and the algorithm in this study is potentially due to a difference in learning
1289
+ efficiency and the application of that learning.
1290
+ Length was omitted from the RFs presented in Experiment 1 because we wanted to isolate
1291
+ the feature importance of speech sounds, and the descriptive statistics suggested that Length
1292
+ was going to be an important feature that may mask the importance of weaker features.
1293
+ Indeed, Length was found to be important in all the MRFs. It was most important in the Elic-
1294
+ ited (6.99%) and Japanese (5.47%) MRFs which suggest that word length carries a considerable
1295
+ amount of sound symbolic information in Japanese. It was less important in the Korean
1296
+ PLOS ONE
1297
+ Random forests, sound symbolism and Poke´mon evolution
1298
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1299
+ January 4, 2023
1300
+ 22 / 27
1301
+
1302
+ (2.44%) and Chinese (0.51%) MRFs. Isolating Length from the other features in Experiment 1
1303
+ and introducing it into the RFs in Experiment 2 uncovered the issue of overfitting that led to
1304
+ the use of MRFs. The -L Japanese RF in Experiment 1 (OOB 29.05%) performed better than
1305
+ the +L Japanese RF in Experiment 2 (OOB 30.95%), despite Length being a highly important
1306
+ feature (4.54%) in the +L Japanese RF. The most likely explanation for overfitting is that there
1307
+ was little variability in decision trees. This hypothesis was tested by recreating the Japanese
1308
+ RFs using the default hyperparameter settings in the Ranger package. Running the untuned
1309
+ MRFs resulted in more stable RFs that were only slightly less accurate than their tuned coun-
1310
+ terparts. This finding supports our hypothesis that overfitting in Experiment 1 was the result
1311
+ of a lack of variability in decision trees. The lack of decision tree variability is likely due to a
1312
+ high number of features being examined at each node (mtry) which was suggested by the tun-
1313
+ ing process due to the large percentage of null values in the dataset (82.26%).
1314
+ A potential solution to this issue was explored, which involved constructing each RF using
1315
+ the default hyperparameter settings; however, this resulted in an increased OOB error in all
1316
+ cases. Another potential solution would be to reduce the number of null values by reporting
1317
+ on phonological features rather than the sounds themselves. This would reduce both the num-
1318
+ ber of null values and the number of features resulting in a less fine-grained data resolution.
1319
+ Instead, we constructed MRFs made up of independent RFs with different starting values for
1320
+ the randomisation of both the splitting of data into subsets and the RFs themselves. At first
1321
+ glance, MRFs may appear to be stacked RFs (SRFs: [58]), but this is not the case. Stacking [37]
1322
+ is a method of improving algorithm accuracy by combining weaker models into a super
1323
+ learner [59]. For example, Ha¨nsch [58] sequentially adds RFs to SRFs using the estimates of
1324
+ earlier RFs to improve the accuracy of the final model. Our method is more like k-fold cross-
1325
+ validation which involves randomly dividing the data into k groups, or folds, and then recom-
1326
+ bining the data by way of a partial Latin square to create multiple training/testing subsets
1327
+ which are then used for constructing and testing multiple iterations of the algorithm [60]. K-
1328
+ fold cross-validation was not used in the present study because if the user adheres to the two-
1329
+ thirds subset rule, they are limited in choice for the number of iterations.
1330
+ Conclusion
1331
+ The present study builds and tests machine learning algorithms using the names of Poke´mon.
1332
+ Those algorithms are constructed to classify Poke´mon into pre- and post-evolution categories.
1333
+ In Experiment 1, the algorithms are constructed using the speech sounds that make up Japa-
1334
+ nese, Chinese, and Korean Poke´mon names. The feature importance calculations of these algo-
1335
+ rithms show that while some sound-symbolic patterns hold across languages, many important
1336
+ features are unique to each language. Experiment 1 also includes an elicitation experiment
1337
+ whereby Japanese participants named previously unseen Poke´mon. We then construct RFs
1338
+ using the entirety of the official Japanese Poke´mon name data and the elicited responses and
1339
+ test them on their opposite dataset. The OOB error of these tests shows that the sound sym-
1340
+ bolic patterns in these datasets are reasonably similar, suggesting that either those sound sym-
1341
+ bolic patterns already exist in the Japanese language, or the participants are familiar with
1342
+ Poke´mon naming conventions. Previous studies have shown no correlation between Pokemon
1343
+ familiarity and sound symbolism effect size in nonce-word Poke´monastic experiments [61,62],
1344
+ suggesting that their results were not driven by existing knowledge of Poke´mon names. In
1345
+ Experiment 2, all algorithms are reconstructed to include name length as a feature. This
1346
+ uncovers an issue of overfitting, which we resolve using MRFs. The performance of the MRFs
1347
+ is then measured against the performance of Japanese participants. The MRFs are shown to
1348
+ perform more accurately than humans.
1349
+ PLOS ONE
1350
+ Random forests, sound symbolism and Poke´mon evolution
1351
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1352
+ January 4, 2023
1353
+ 23 / 27
1354
+
1355
+ RFs are said to be appropriate for “small N, high p” datasets [63], such as those found in the
1356
+ present study. However, Experiment 2 uncovers a clear case of overfitting in Experiment 1.
1357
+ The RFs constructed with length as a feature showed that length was important, yet this impor-
1358
+ tance was not always reflected in OOB error. For example, the Japanese +L MRF
1359
+ (OOB = 31.69%) performed worse than the -L RF in Experiment 1 (OOB = 29.05%). Given
1360
+ that length was found to be important in the MRFs, this suggests that the individual RFs were
1361
+ overfitting because of the lack of variability in decision trees. Further evidence for this can be
1362
+ found in the difference between the accuracy of the RF trained on official Japanese Poke´mon
1363
+ names to classify Elicited names (OOB = 38.57%) and the -L MRF trained on official Japanese
1364
+ Poke´mon names to classify Elicited names (OOBM = 37.31%). In other words, the Japanese RF
1365
+ in Experiment 1 was more accurate than the Japanese MRF at classifying its own testing subset
1366
+ but less accurate at classifying the elicited samples because its function was too closely aligned
1367
+ to the initial dataset, resulting in a reduced capacity to classify external samples.
1368
+ Sound symbolism is the study of systematic relationships between sounds and meanings.
1369
+ These relationships are not deterministic but rather stochastic, so they need to be observed
1370
+ through a statistical analysis. This paper details random forest algorithms that learn from these
1371
+ stochastic relationships and apply that learning to a classification task. Said task is the classifi-
1372
+ cation of Poke´mon into pre- and post-evolution categories. This finding has important impli-
1373
+ cations for the Natural Language Processing field of research, adding to the findings of Winter
1374
+ and Perlman [11] and showing that machine learning algorithms can make classification deci-
1375
+ sions driven (at least mostly) by sound symbolic principles, and should do so if the goal of an
1376
+ algorithm is to understand and use language the same way that humans do. The algorithms
1377
+ show how they make their classification decisions using feature importance, which is a useful
1378
+ metric for measuring the sound symbolic qualities of specific linguistic features. This is partic-
1379
+ ularly useful when assessing universal sound-symbolic patterns. The present paper also expo-
1380
+ ses an issue of overfitting inherent in random forests constructed using decision trees with low
1381
+ variability. This issue is resolved by randomizing training and testing subset splits across mul-
1382
+ tiple random forests. The machine learning algorithms are shown to be efficient learners in
1383
+ this task, achieving a higher classification accuracy than the human participants, despite hav-
1384
+ ing access to a limited number of samples from which to learn.
1385
+ Author Contributions
1386
+ Conceptualization: Alexander James Kilpatrick, Shigeto Kawahara.
1387
+ Data curation: Alexander James Kilpatrick.
1388
+ Formal analysis: Alexander James Kilpatrick.
1389
+ Funding acquisition: Alexander James Kilpatrick.
1390
+ Investigation: Alexander James Kilpatrick.
1391
+ Methodology: Alexander James Kilpatrick.
1392
+ Project administration: Alexander James Kilpatrick.
1393
+ Resources: Alexander James Kilpatrick.
1394
+ Software: Alexander James Kilpatrick.
1395
+ Supervision: Alexander James Kilpatrick.
1396
+ Validation: Alexander James Kilpatrick.
1397
+ Visualization: Alexander James Kilpatrick.
1398
+ PLOS ONE
1399
+ Random forests, sound symbolism and Poke´mon evolution
1400
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1401
+ January 4, 2023
1402
+ 24 / 27
1403
+
1404
+ Writing – original draft: Alexander James Kilpatrick, Aleksandra C´wiek.
1405
+ Writing – review & editing: Alexander James Kilpatrick, Aleksandra C´wiek, Shigeto
1406
+ Kawahara.
1407
+ References
1408
+ 1.
1409
+ De Saussure F. Cours de linguistique ge´ne´rale. Paris: Payot; 1916.
1410
+ 2.
1411
+ Berlin B. The first congress of ethnozoological nomenclature. Journal of the Royal Anthropological Insti-
1412
+ tute. 2006; 12:S23–44.
1413
+ 3.
1414
+ Blasi DE, Wichmann S, Hammarstro¨m H, Stadler PF, Christiansen MH. Sound–meaning association
1415
+ biases evidenced across thousands of languages. Proceedings of the National Academy of Sciences.
1416
+ 2016; 113(39):10818–23. https://doi.org/10.1073/pnas.1605782113 PMID: 27621455
1417
+ 4.
1418
+ Newman SS. Further experiments in phonetic symbolism. The American Journal of Psychology. 1933;
1419
+ 45(1):53–75.
1420
+ 5.
1421
+ Shinohara K, Kawahara S. A cross-linguistic study of sound symbolism: The images of size. InAnnual
1422
+ Meeting of the Berkeley Linguistics Society 2010; 36(1): 396–410.
1423
+ 6.
1424
+ Imai M, Kita S. The sound symbolism bootstrapping hypothesis for language acquisition and language
1425
+ evolution. Philosophical transactions of the Royal Society B: Biological sciences. 2014 Sep 19; 369
1426
+ (1651):20130298. https://doi.org/10.1098/rstb.2013.0298 PMID: 25092666
1427
+ 7.
1428
+ Ozturk O, Krehm M, Vouloumanos A. Sound symbolism in infancy: Evidence for sound–shape cross-
1429
+ modal correspondences in 4-month-olds. Journal of experimental child psychology. 2013; 114(2):173–
1430
+ 86. https://doi.org/10.1016/j.jecp.2012.05.004 PMID: 22960203
1431
+ 8.
1432
+ Perniss P, Vigliocco G. The bridge of iconicity: from a world of experience to the experience of lan-
1433
+ guage. Philosophical Transactions of the Royal Society B: Biological Sciences. 2014; 369
1434
+ (1651):20130300.
1435
+ 9.
1436
+ Sidhu DM, Williamson J, Slavova V, Pexman PM. An investigation of iconic language development in
1437
+ four datasets. Journal of Child Language. 2022; 49(2):382–96. https://doi.org/10.1017/
1438
+ S0305000921000040 PMID: 34176538
1439
+ 10.
1440
+ Breiman L. Random forests. Machine learning. 2001; 45(1):5–32.
1441
+ 11.
1442
+ Winter B, Perlman M. Size sound symbolism in the English lexicon. Glossa: a journal of general linguis-
1443
+ tics. 2021; 6(1).
1444
+ 12.
1445
+ Miura, T, Murata, M, Yasuda, S, Miyabe, M, Aramaki, E. (2012). 音象徴の機械学習による再現: 最強の
1446
+ ポケモンの生成 [Machine learning reproduction of sound symbols: Generating the strongest Poke-
1447
+ mon]. 言語処理学会第 18 回年次大会発表論文集 [Proceedings of the 18th Annual Meeting of the Asso-
1448
+ ciation for Natural Language Processing], 2012; 18:65–68.
1449
+ 13.
1450
+ Bainbridge J. ‘It is a Poke´mon world’: The Poke´mon franchise and the environment. International Jour-
1451
+ nal of Cultural Studies. 2014; 17(4):399–414.
1452
+ 14.
1453
+ Hockett CD. The origin of speech. Scientific American. 1960; 203(3):88–97. PMID: 14402211
1454
+ 15.
1455
+ Kawahara S. Sound symbolism and theoretical phonology. Language and Linguistics Compass. 2020;
1456
+ 14(8):e12372.
1457
+ 16.
1458
+ Sidhu DM, Pexman PM. Five mechanisms of sound symbolic association. Psychonomic bulletin &
1459
+ review. 2018; 25(5):1619–43. https://doi.org/10.3758/s13423-017-1361-1 PMID: 28840520
1460
+ 17.
1461
+ Spence C. Crossmodal correspondences: A tutorial review. Attention, Perception, & Psychophysics.
1462
+ 2011; 73(4):971–95. https://doi.org/10.3758/s13414-010-0073-7 PMID: 21264748
1463
+ 18.
1464
+ Ko¨hler W. Gestalt psychology. New York: NY; 1947.
1465
+ 19.
1466
+ Bremner AJ, Caparos S, Davidoff J, de Fockert J, Linnell KJ, Spence C. “Bouba” and “Kiki” in Namibia?
1467
+ A remote culture make similar shape–sound matches, but different shape–taste matches to Western-
1468
+ ers. Cognition. 2013; 126(2):165–72. https://doi.org/10.1016/j.cognition.2012.09.007 PMID: 23121711
1469
+ 20.
1470
+ Chen YC, Huang PC, Woods A, Spence C. When “Bouba” equals “Kiki”: Cultural commonalities and
1471
+ cultural differences in sound-shape correspondences. Scientific reports. 2016; 6(1):1–9.
1472
+ 21.
1473
+ C´ wiek A, Fuchs S, Draxler C, Asu EL, Dediu D, Hiovain K, et al. The bouba/kiki effect is robust across
1474
+ cultures and writing systems. Philosophical Transactions of the Royal Society B. 2022; 377
1475
+ (1841):20200390. https://doi.org/10.1098/rstb.2020.0390 PMID: 34775818
1476
+ 22.
1477
+ Rogers SK, Ross AS. A cross-cultural test of the Maluma-Takete phenomenon. Perception. 1975; 4
1478
+ (1):105–106. https://doi.org/10.1068/p040105 PMID: 1161435
1479
+ PLOS ONE
1480
+ Random forests, sound symbolism and Poke´mon evolution
1481
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1482
+ January 4, 2023
1483
+ 25 / 27
1484
+
1485
+ 23.
1486
+ Styles SJ, Gawne L. When does maluma/takete fail? Two key failures and a meta-analysis suggest that
1487
+ phonology and phonotactics matter. i-Perception. 2017; 8(4):2041669517724807. https://doi.org/10.
1488
+ 1177/2041669517724807 PMID: 28890777
1489
+ 24.
1490
+ Kawahara S, Katsuda H, Kumagai G. Accounting for the stochastic nature of sound symbolism using
1491
+ Maximum Entropy model. Open Linguistics. 2019; 5(1):109–20.
1492
+ 25.
1493
+ Maurer D, Pathman T, Mondloch CJ. The shape of boubas: Sound–shape correspondences in toddlers
1494
+ and adults. Developmental science. 2006; 9(3):316–22. https://doi.org/10.1111/j.1467-7687.2006.
1495
+ 00495.x PMID: 16669803
1496
+ 26.
1497
+ Perry LK, Perlman M, Lupyan G. Iconicity in English and Spanish and its relation to lexical category and
1498
+ age of acquisition. PloS one. 2015; 10(9):e0137147. https://doi.org/10.1371/journal.pone.0137147
1499
+ PMID: 26340349
1500
+ 27.
1501
+ Perry LK, Perlman M, Winter B, Massaro DW, Lupyan G. Iconicity in the speech of children and adults.
1502
+ Developmental Science. 2018; 21(3):e12572. https://doi.org/10.1111/desc.12572 PMID: 28523758
1503
+ 28.
1504
+ Kawahara S, Kumagai G. Expressing evolution in Poke´mon names: Experimental explorations. Journal
1505
+ of Japanese Linguistics. 2019; 35(1):3–8.
1506
+ 29.
1507
+ Kawahara S, Moore J. How to express evolution in English Poke´mon names. Linguistics. 2021; 59
1508
+ (3):577–607.
1509
+ 30.
1510
+ Kawahara S, Noto A, Kumagai G. Sound symbolic patterns in Poke´mon names. Phonetica. 2018; 75
1511
+ (3):219–44.
1512
+ 31.
1513
+ Shih SS, Ackerman J, Hermalin N, Inkelas S, Kavitskaya D. Poke´monikers: A study of sound symbolism
1514
+ and Poke´mon names. Proceedings of the Linguistic Society of America. 2018; 3(1):42:1–6.
1515
+ 32.
1516
+ Biau G, Scornet E. A random forest guided tour. Test. 2016; 25(2):197–227.
1517
+ 33.
1518
+ Belgiu M, Drăguţ L. Random forest in remote sensing: A review of applications and future directions.
1519
+ ISPRS journal of photogrammetry and remote sensing. 2016; 114:24–31.
1520
+ 34.
1521
+ Ziegler A, Ko¨nig IR. Mining data with random forests: current options for real-world applications. Wiley
1522
+ Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 2014; 4(1):55–63.
1523
+ 35.
1524
+ Al-Akhras M, El Hindi K, Habib M, Shawar BA. Instance reduction for avoiding overfitting in decision
1525
+ trees. Journal of Intelligent Systems. 2021; 30(1):438–59.
1526
+ 36.
1527
+ Kotsiantis S. B. (2013). Decision trees: a recent overview. Artificial Intelligence Review, 39(4), 261–
1528
+ 283.
1529
+ 37.
1530
+ Breiman L. Bagging predictors. Machine learning. 1996; 24(2):123–40.
1531
+ 38.
1532
+ Ho TK. The random subspace method for constructing decision forests. IEEE transactions on pattern
1533
+ analysis and machine intelligence. 1998; 20(8):832–44.
1534
+ 39.
1535
+ Bulbagarden. Bulbapedia: The community-driven Poke´mon encyclopedia [internet] 2004 [updated
1536
+ 2022 Apr 22]; available from https://bulbapedia.bulbagarden.net/wiki/Main_Page.
1537
+ 40.
1538
+ Sohn HM. Korean. Routledge; 2019.
1539
+ 41.
1540
+ Duanmu S. The phonology of standard Chinese. OUP Oxford; 2007.
1541
+ 42.
1542
+ Wright MN, Ziegler A. ranger: A fast implementation of random forests for high dimensional data in C++
1543
+ and R. Journal of Statistical Software. 2017; 77(1):1–17. https://doi.org/10.18637/jss
1544
+ 43.
1545
+ Altmann A, Toloşi L, Sander O, Lengauer T. Permutation importance: a corrected feature importance
1546
+ measure. Bioinformatics. 2010; 26(10):1340–7. https://doi.org/10.1093/bioinformatics/btq134 PMID:
1547
+ 20385727
1548
+ 44.
1549
+ Probst P, Wright MN, Boulesteix AL. Hyperparameters and tuning strategies for random forest. Wiley
1550
+ Interdisciplinary Reviews: data mining and knowledge discovery. 2019; 9(3):e1301.
1551
+ 45.
1552
+ Sapir E. A study in phonetic symbolism. Journal of experimental psychology. 1929; 12(3):225.
1553
+ 46.
1554
+ Ultan R. Size-sound symbolism. Universals of human language. 1978; 2:525–68.
1555
+ 47.
1556
+ Cho YM, Gregory KI. Korean phonology in the late twentieth century. Language Research. 1997; 33
1557
+ (4):687–735.
1558
+ 48.
1559
+ Kim KO. Sound symbolism in Korean1. Journal of Linguistics. 1977; 13(1):67–75.
1560
+ 49.
1561
+ Haiman J. The iconicity of grammar: Isomorphism and motivation. Language. 1980; 56(3):515–40.
1562
+ 50.
1563
+ Shih SS, Ackerman J, Hermalin N, Inkelas S, Jang H, Johnson J, Kavitskaya D, Kawahara S, Oh M,
1564
+ Starr RL, Yu A. Cross-linguistic and language-specific sound symbolism: Poke´monastics. Ms. Univer-
1565
+ sity of Southern California, University of California, Merced, University of California. Berkeley: Keio
1566
+ University, National University of Singapore and University of Chicago. 2019.
1567
+ 51.
1568
+ Ohala JJ. The frequency code hypothesis underlies the sound symbolic use of voice pitch. Sound sym-
1569
+ bolism. 1994; 2:325–47.
1570
+ PLOS ONE
1571
+ Random forests, sound symbolism and Poke´mon evolution
1572
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1573
+ January 4, 2023
1574
+ 26 / 27
1575
+
1576
+ 52.
1577
+ Lapolla RJ. An experimental investigation into phonetic symbolism as it relates to Mandarin Chinese. In:
1578
+ Hinton L, Johanna N, Ohala J. editors. Sound symbolism. 2006; Cambridge: Cambridge University
1579
+ Press:130–147.
1580
+ 53.
1581
+ Kumagai G. The pluripotentiality of bilabial consonants: The images of softness and cuteness in Japa-
1582
+ nese and English. Open Linguistics. 2020; 6(1):693–707.
1583
+ 54.
1584
+ Otake T, Hatano G, Cutler A, Mehler J. Mora or syllable? Speech segmentation in Japanese. Journal of
1585
+ memory and language. 1993; 32(2):258–78.
1586
+ 55.
1587
+ Tversky A, Kahneman D. Extensional versus intuitive reasoning: The conjunction fallacy in probability
1588
+ judgment. Psychological review. 1983; 90(4):293–315.
1589
+ 56.
1590
+ Webb ME, Fluck A, Magenheim J, Malyn-Smith J, Waters J, Deschênes M, Zagami J. Machine learning
1591
+ for human learners: opportunities, issues, tensions and threats. Educational Technology Research and
1592
+ Development. 2021; 69(4):2109–30.
1593
+ 57.
1594
+ McKinney SM, Sieniek M, Godbole V, Godwin J, Antropova N, Ashrafian H, Back T, Chesus M, Corrado
1595
+ GS, Darzi A, Etemadi M. International evaluation of an AI system for breast cancer screening. Nature.
1596
+ 2020; 577(7788):89–94. https://doi.org/10.1038/s41586-019-1799-6 PMID: 31894144
1597
+ 58.
1598
+ Ha¨nsch R. Stacked Random Forests: More accurate and better calibrated. In IGARSS 2020–2020
1599
+ IEEE International Geoscience and Remote Sensing Symposium. 2020; 1751–1754, https://doi.org/10.
1600
+ 1109/IGARSS39084.2020.9324475
1601
+ 59.
1602
+ Van der Laan MJ, Polley EC, Hubbard AE. Super learner. Statistical applications in genetics and molec-
1603
+ ular biology. 2007; 6(1): 1544–6115, https://doi.org/10.2202/1544-6115.1309 PMID: 17910531
1604
+ 60.
1605
+ Gareth J, Daniela W, Trevor H, Robert T. An introduction to statistical learning: with applications in R.
1606
+ Spinger; 2013.
1607
+ 61.
1608
+ Kawahara S, Kumagai G. Inferring Poke´mon types using sound symbolism: The effects of voicing and
1609
+ labiality. 音声研究 [speech research]. 2019; 23:111–6.
1610
+ 62.
1611
+ Godoy MC, de Souza Filho NS, de Souza JG, Franc¸a HA, Kawahara S. Gotta name’em all: An experi-
1612
+ mental study on the sound symbolism of Poke´mon names in Brazilian Portuguese. Journal of Psycho-
1613
+ linguistic Research. 2020 Oct; 49(5):717–40.
1614
+ 63.
1615
+ Strobl C, Malley J, Tutz G. An introduction to recursive partitioning: rationale, application, and character-
1616
+ istics of classification and regression trees, bagging, and random forests. Psychological methods.
1617
+ 2009; 14(4):323–348. https://doi.org/10.1037/a0016973 PMID: 19968396
1618
+ PLOS ONE
1619
+ Random forests, sound symbolism and Poke´mon evolution
1620
+ PLOS ONE | https://doi.org/10.1371/journal.pone.0279350
1621
+ January 4, 2023
1622
+ 27 / 27
1623
+
-9AzT4oBgHgl3EQf_f5A/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -175,3 +175,9 @@ FtE3T4oBgHgl3EQftQtg/content/2301.04674v1.pdf filter=lfs diff=lfs merge=lfs -tex
175
  bdE_T4oBgHgl3EQfzRz6/content/2301.08323v1.pdf filter=lfs diff=lfs merge=lfs -text
176
  QtE3T4oBgHgl3EQfDAk3/content/2301.04281v1.pdf filter=lfs diff=lfs merge=lfs -text
177
  _NE1T4oBgHgl3EQfUwPr/content/2301.03095v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
175
  bdE_T4oBgHgl3EQfzRz6/content/2301.08323v1.pdf filter=lfs diff=lfs merge=lfs -text
176
  QtE3T4oBgHgl3EQfDAk3/content/2301.04281v1.pdf filter=lfs diff=lfs merge=lfs -text
177
  _NE1T4oBgHgl3EQfUwPr/content/2301.03095v1.pdf filter=lfs diff=lfs merge=lfs -text
178
+ x9AzT4oBgHgl3EQfCfrw/content/2301.00962v1.pdf filter=lfs diff=lfs merge=lfs -text
179
+ U9E3T4oBgHgl3EQfawpi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
180
+ CtAyT4oBgHgl3EQfR_f1/content/2301.00079v1.pdf filter=lfs diff=lfs merge=lfs -text
181
+ mtE3T4oBgHgl3EQf6gu4/content/2301.04791v1.pdf filter=lfs diff=lfs merge=lfs -text
182
+ JdAyT4oBgHgl3EQffviy/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
183
+ tdAzT4oBgHgl3EQf6v4U/content/2301.01878v1.pdf filter=lfs diff=lfs merge=lfs -text
59E0T4oBgHgl3EQfvwFr/content/tmp_files/2301.02622v1.pdf.txt ADDED
@@ -0,0 +1,3166 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Astronomy & Astrophysics manuscript no. main
2
+ ©ESO 2023
3
+ January 9, 2023
4
+ What does a typical full-disc around a post-AGB binary look like?⋆
5
+ Radiative transfer models reproducing PIONIER, GRAVITY, and MATISSE data
6
+ A. Corporaal1, J. Kluska1, H. Van Winckel1, D. Kamath2, 3, 4, and M. Min5
7
+ 1 Institute of Astronomy, KU Leuven, Celestijnenlaan 200D, 3001 Leuven, Belgium
8
+ e-mail: [email protected]
9
+ 2 School of Mathematical and Physical Sciences, Macquarie University, Sydney, NSW, Australia
10
+ 3 Astronomy, Astrophysics and Astrophotonics Research Centre, Macquarie University, Sydney, NSW, Australia
11
+ 4 INAF, Observatory of Rome, Via Frascati 33, 00077 Monte Porzio Catone (RM), Italy
12
+ 5 SRON Netherlands Institute for Space Research, Niels Bohrweg 4, 2333 CA, Leiden, The Netherlands
13
+ Received ; accepted
14
+ ABSTRACT
15
+ Context. Stable circumbinary discs around evolved post-Asymptotic Giant branch (post-AGB) binary systems composed of gas and
16
+ dust show many similarities with protoplanetary discs around young stellar objects. These discs can provide constraints on both
17
+ binary evolution and the formation of macrostructures within circumstellar discs. Here we focus on one post-AGB binary system:
18
+ IRAS 08544-4431.
19
+ Aims. We aim to refine the physical model of IRAS 08544-4431 with a radiative transfer treatment and continue the near-infrared
20
+ and mid-infrared interferometric analysis covering the H-, K-, L-, and N-bands. Results from geometric modelling of this data in our
21
+ previous study constrain the shape of the inner rim of the disc and its radial dust structure. We aim to capture the previously detected
22
+ amount of over-resolved flux and the radial intensity profile at and beyond the inner dust disc rim to put constraints on the physical
23
+ processes in the inner disc regions.
24
+ Methods. We used a three-dimensional Monte Carlo radiative transfer code to investigate the physical structure of the disc by re-
25
+ producing both the photometry and the multi-wavelength infrared interferometric data set. We first performed a parametric study
26
+ to explore the effect of the individual parameters and selected the most important parameters which were then used in a thorough
27
+ grid search to fit the structural characteristics. We developed a strategy to identify the models which perform best to reproduce our
28
+ extensive multi-wavelength data set.
29
+ Results. We found a family of models that successfully fit the infrared photometric and interferometric data in all bands. These models
30
+ show a flaring geometry with efficient settling. Larger grains are present in the inner disc as probed by our infrared interferometric
31
+ observations. Some over-resolved flux component was recovered in all bands but the optimised models still fall short to explain all the
32
+ over-resolved flux. This suggests that another dusty structure within the system plays a role, which is not comprised in our models.
33
+ The structure of this over-resolved component is unclear but it has a colour temperature between 1400 and 3600 K.
34
+ Conclusions. Multi-wavelength infrared interferometric observations of circumstellar discs allow to study the inner disc regions
35
+ in unprecedented detail. The refined physical models can reproduce most of the investigated features, including the photometric
36
+ characteristics, the radial extent, and the overall shape of the visibility curves. Our multi-wavelength interferometric observations
37
+ combined with photometry show that the disc around IRAS 08544-4431 is similar to protoplanetary discs around young stars with
38
+ similar dust masses and efficient dust growth. The resulting disc geometry is capable of reproducing part of the over-resolved flux but
39
+ to fully reproduce the over-resolved flux component, an additional component is needed. Multi-scale high-angular resolution analysis
40
+ combining VLTI, VLT/SPHERE, and ALMA data is needed to fully define the structure of the system.
41
+ Key words. Stars: AGB and post-AGB - techniques: interferometric - binaries: general - protoplanetary discs - circumstellar matter
42
+ 1. Introduction
43
+ Circumstellar discs composed of gas and dust are found at vari-
44
+ ous stellar evolutionary stages. One class of evolved stellar sys-
45
+ tems that show such circumstellar discs are post-asymptotic gi-
46
+ ant branch (post-AGB) binaries. Their spectral energy distribu-
47
+ tions (SEDs) show infrared excesses pointing toward the pres-
48
+ ence of hot dust. It has now been well established that this prop-
49
+ erty of the SEDs provides observational evidence for the pres-
50
+ ence of stable, massive circumbinary discs around these systems
51
+ (e.g. de Ruyter et al. 2006; Van Winckel 2003, 2017; Kamath
52
+ ⋆ Based on observations collected at the European Southern Obser-
53
+ vatory under ESO programmes 094.D-0865, 0102.D-0760, 60.A-9275,
54
+ and 0104.D-0739
55
+ et al. 2014, 2015; Kluska et al. 2022). Observational properties
56
+ of these systems are recently reviewed by Van Winckel (2018).
57
+ These discs show evidence of stability and a Keplerian veloc-
58
+ ity field has been spatially resolved at millimetre wavelengths in
59
+ CO in several objects (Bujarrabal et al. 2013b, 2015, 2017, 2018;
60
+ Gallardo Cava et al. 2021). More objects were detected in single
61
+ dish and also their narrow CO profile is indicative of rotation
62
+ (Bujarrabal et al. 2013a). Moreover, the dust grains show evi-
63
+ dence of strong processing in a stable environment resulting in
64
+ grain growth and a high degree of crystallinity as revealed by
65
+ infrared spectroscopic observations and millimetre photometry
66
+ (e.g. Gielen et al. 2011; Sahai et al. 2011).
67
+ While the presence of these circumbinary discs around post-
68
+ AGB binaries is well established, their formation, structure, and
69
+ Article number, page 1 of 18
70
+ arXiv:2301.02622v1 [astro-ph.SR] 6 Jan 2023
71
+
72
+ A&A proofs: manuscript no. main
73
+ evolution are still insufficiently understood. There is observa-
74
+ tional evidence for interactions between the system’s compo-
75
+ nents. Indirect observational evidence for disc-binary interac-
76
+ tions is provided by analyses of time-series of spectroscopic ob-
77
+ servations and photospheric abundance determinations. The for-
78
+ mer observations show fast outflows or jets originating from an
79
+ accretion disc around the companion (Gorlova et al. 2012, 2015;
80
+ Bollen et al. 2017, 2019, 2022). To launch the jets, the mass-
81
+ accretion rates onto the companion are found to be on the order
82
+ of 10−6 to 10−4 M⊙/yr (Bollen et al. 2020). Such a mass-accretion
83
+ rate cannot be due to the mass-loss rate of the post-AGB primary
84
+ and is pointing towards accretion from the circumbinary disc as
85
+ the main feeding mechanism of the circum-companion disc. Ad-
86
+ ditional evidence for accretion from the circumbinary disc comes
87
+ from the depletion of refractory elements observed on the pho-
88
+ tosphere of the post-AGB primary itself (e.g. Van Winckel et al.
89
+ 1995; Maas et al. 2005; Giridhar et al. 2005; Oomen et al. 2018).
90
+ Such depletion is caused by the re-accretion of gas from the cir-
91
+ cumbinary disc (Oomen et al. 2019) while the refractory ele-
92
+ ments remain on the dust grains in the disc. However, the cause
93
+ of this dust-gas separation is still debated.
94
+ Kluska et al. (2022) showed a link between the strength of
95
+ the photospheric depletion and the lack of near-infrared (near-
96
+ IR) excess in the SEDs of the systems (labelled transition discs),
97
+ showing that the most depleted targets are surrounded by discs
98
+ with a large dust free cavity. In young stellar objects (YSO) such
99
+ a depletion pattern is also observed in targets hosting a transition
100
+ disc and are often linked to planet-disc interactions.
101
+ Constraining the physical processes in the inner disc regions
102
+ and the disc-binary interactions of circumbinary discs around
103
+ post-AGB binaries will improve our understanding of the late
104
+ evolution of binary systems. Interferometric techniques in the
105
+ infrared are needed to spatially resolve the inner disc regions as
106
+ well as the inner binary.
107
+ Two-dimensional radiative transfer modelling efforts of
108
+ high-angular resolution interferometric data of such discs (Deroo
109
+ et al. 2006, 2007; Hillen et al. 2014, 2015, 2017; Kluska et al.
110
+ 2018) have shown that passively irradiated disc models devel-
111
+ oped for protoplanetary discs are able to reproduce the data.
112
+ This points toward a similar structure of discs around post-AGB
113
+ binary systems and protoplanetary discs around YSOs. An im-
114
+ portant difference is, however, that estimated lifetime of discs
115
+ around post-AGB binaries is only in the order of (104 − 105 yr),
116
+ while protoplanetary discs live up to a few Myr.
117
+ While there is growing evidence that initial phases of planet
118
+ formation around YSOs can be short and grain growth is very
119
+ efficient on short timescales (∼ 105 yr) (e.g. Sheehan & Eisner
120
+ 2018; Segura-Cox et al. 2020; Cridland et al. 2022; Lau et al.
121
+ 2022), it is as yet unclear what the formation timescale is of full-
122
+ grown planets. Discs around post-AGB binaries, thus, represent
123
+ an interesting laboratory to test processes for planet formation
124
+ and this in a different parameter space than around YSOs.
125
+ Here
126
+ we
127
+ focus
128
+ on
129
+ one
130
+ post-AGB
131
+ binary
132
+ system,
133
+ IRAS 08544-4431, hereafter IRAS 08544. IRAS 08544 is a
134
+ luminous (∼
135
+ 10500 L⊙) post-AGB star with a confirmed
136
+ companion (Maas et al. 2003). The binary is surrounded by
137
+ an optically thick circumbinary disc with the near-IR excess
138
+ providing evidence for a full disc with the inner rim located
139
+ at the dust sublimation radius (de Ruyter et al. 2006; Hillen
140
+ et al. 2016; Kluska et al. 2018; Kluska et al. 2022). It is indeed
141
+ classified as a Category 1 disc in Kluska et al. (2022) and
142
+ is the prototypical full disc surrounding a post-AGB binary.
143
+ Interferometric observations in the near-IR have revealed the
144
+ structure of the inner rim of the disc by geometric models, im-
145
+ age reconstruction techniques, and radiative transfer modelling
146
+ (Hillen et al. 2016; Kluska et al. 2018). With these techniques,
147
+ a small resolved flux excess at the location of the companion
148
+ was also identified. As this excess cannot be explained by
149
+ photospheric emission from the main sequence companion star,
150
+ this excess likely originates from a circum-secondary accretion
151
+ disc.
152
+ The radiative transfer model of IRAS 08544 from Kluska
153
+ et al. (2018) provides a good fit to the SED and the H-band
154
+ interferometric measurements. These authors find that the disc
155
+ inner rim coincides with the theoretical dust sublimation radius.
156
+ Their disc model requires, however, an ad-hoc over-resolved flux
157
+ component of unknown origin on top of the disc model (see also
158
+ Sects. 4.2 and 6.2). By performing 2D geometric modelling of
159
+ both near-IR and mid-IR interferometric observations, Corpo-
160
+ raal et al. (2021) reproduce the visibility data of the H-, K-,
161
+ L- and N-bands and find that the inner rim of the circumbi-
162
+ nary disc is rounded and puffed-up. In the near-IR, the inner rim,
163
+ the stars, and a spatially extended component are detected. The
164
+ over-resolved flux contribution to the total flux is rather constant
165
+ throughout the H-, K-, and L-bands. In the mid-IR, however, the
166
+ stars contribute only a few per cent to the total flux, and thus
167
+ the visibilities are mainly dominated by thermal emission and
168
+ scattering from the circumbinary disc. While the 2D geometric
169
+ models (i.e. parameterised rings on the image plane) are able to
170
+ reproduce most features in the visibility data, we now want to de-
171
+ velop a 3D radiative transfer model of a disc with self-consistent
172
+ handling of dust settling to infer the physical properties of the
173
+ circumbinary disc.
174
+ Here we present such a physical model of the circumbinary
175
+ disc around IRAS 08544. We aim to reproduce the main charac-
176
+ teristics of both the observed photometry and the interferometric
177
+ visibilities in four infrared bands. We focus on investigating the
178
+ over-resolved flux component and retrieve the radial profile of
179
+ the inner disc regions using data of the current three four-beam
180
+ combiners at Very Large Telescope Interferometer (VLTI): PIO-
181
+ NIER, GRAVITY, and MATISSE. We summarise the observa-
182
+ tions in Sect. 2 and the physical setup of the radiative transfer
183
+ model in Sect. 3. We investigate our parameter space in Sect. 4
184
+ and use the results of the most impacting parameters to refine the
185
+ disc model in Sect. 5. We discuss the results and implications in
186
+ Sect. 6 and summarise the conclusions in Sect. 7.
187
+ 2. Observations
188
+ 2.1. Photometry
189
+ The energetics of the target are taken from the catalogue of
190
+ Galactic post-AGB binary systems of Kluska et al. (2022) and
191
+ we refer to this paper for a full description of the data collection.
192
+ In short, the full SED is assembled by collecting public broad-
193
+ band photometric data from a broad range of wavelengths (from
194
+ 0.3 µm to 0.8 mm). The parameters of the photospheric model of
195
+ the post-AGB star were derived from Kurucz stellar atmosphere
196
+ models (Castelli & Kurucz 2003).
197
+ 2.2. Interferometry
198
+ We used the infrared interferometric data set presented in Cor-
199
+ poraal et al. (2021). Here, we summarise the main characteris-
200
+ tics of the data. The data set consists of observations obtained
201
+ on the following three current four-telescope beam combiner in-
202
+ struments the VLTI at Mount Paranal in Chile: PIONIER (Le
203
+ Bouquin et al. 2011), GRAVITY (Gravity Collaboration et al.
204
+ Article number, page 2 of 18
205
+
206
+ A. Corporaal et al.: What does a typical full-disc around a post-AGB binary look like?
207
+ 2017), and MATISSE (Lopez et al. 2014, 2022). These instru-
208
+ ments provide simultaneous observations on six baselines and
209
+ three independent closure phases per pointing.
210
+ The PIONIER instrument operates in the H-band (between
211
+ 1.5 µm and 1.85 µm). The data set was taken in 2015 (prog. ID:
212
+ 094.D-0865, PI: Hillen), using the three configurations on the
213
+ 1.8 m Auxiliary Telescopes (ATs). A log of these observations is
214
+ reported in Hillen et al. (2016).
215
+ GRAVITY is operating in the K-band (2.0 - 2.4 µm). The
216
+ data are taken in 2018 and 2019 (prog. ID: 0102.D-0760, PI:
217
+ Bollen), using the three configurations of the ATs at high resolu-
218
+ tion (R ∼ 4000) in single field mode.
219
+ The data set taken with the MATISSE instrument covers the
220
+ L-band (2.9-4.2 µm) and N-band (8-13 µm). Observations were
221
+ taken during 2019 (prog. ID 60.A-9275, PI: Kluska) and 2020
222
+ (prog. ID 0104.D-0739, PI: Kluska) with the three configura-
223
+ tions of the ATs. All observations are taken in the low spectral
224
+ resolution mode (R ∼ 30). N-band photometry was not taken
225
+ during the 2019 observations such that the coherent flux mea-
226
+ surements could not be normalised and the visibility amplitudes
227
+ could not be determined. As a result, the reported visibilities in
228
+ the N-band are correlated fluxes.
229
+ 3. Physical setup
230
+ To infer the physical structure of the dusty circumbinary disc
231
+ of IRAS 08544 from the observations we used the Monte Carlo
232
+ radiative transfer code MCMax3D (Min et al. 2009). In such a
233
+ code, the photon packages emitted from the central stellar source
234
+ are scattered, absorbed, or re-emitted by the dust particles. The
235
+ user specifies the dust distribution by setting the disc structure
236
+ and its density distribution as well as the dust grain properties
237
+ and composition. In MCMax3D, the disc can be made of several
238
+ zones with different parameters for the disc structure, which is
239
+ defined by the dust disc inner and outer radii, the vertical dust
240
+ settling, and the scale height. This flexibility allows the explo-
241
+ ration of complex disc geometries.
242
+ Vertical dust settling is handled self-consistently with a sin-
243
+ gle parameter, the turbulent mixing strength, α (Shakura & Sun-
244
+ yaev 1973), following the prescription of Mulders & Dominik
245
+ (2012). Stronger turbulence mixing strengths imply more effi-
246
+ cient settling as larger grains decouple from the gas.
247
+ The disc vertical scale height is defined by a power law:
248
+ h(r) = h0
249
+ � r
250
+ Rin
251
+ �β
252
+ ,
253
+ (1)
254
+ where h0 is the scale height at the radius we set to coincide with
255
+ the disc inner radius, Rin, and β is the flaring exponent describing
256
+ the disc curvature. Grain sizes are distributed by a power law
257
+ with index q:
258
+ n(a) ∝ a−q
259
+ for
260
+ amin < a < amax
261
+ (2)
262
+ where amin and amax are the minimum and maximum grain sizes,
263
+ respectively.
264
+ The surface density profile is prescribed by a radial power
265
+ law with index p and radius r:
266
+ Σ(r) ∝
267
+ � r
268
+ rc
269
+ �−p
270
+ (3)
271
+ The surface density is scaled to the dust mass in the disc. We ap-
272
+ ply a two-zone model to adopt a double power law of the surface
273
+ density to smooth the disc inner rim (Hillen et al. 2015; Kluska
274
+ et al. 2018). In our two-zone model, there is an additional pa-
275
+ rameter, the turn-over radius, rmid, at which the surface density
276
+ profile (Eq. 3) changes as we apply different values of p in the
277
+ zones. To ensure continuity in the full disc model, rmid corre-
278
+ sponds to the outer radius of the inner zone and the inner radius
279
+ of the outer zone. Besides the inner and outer radii of these discs
280
+ and the surface density distribution, we do not consider differ-
281
+ ences in the inner and the outer disc. The outcome of the Monte
282
+ Carlo run is a three-dimensional temperature distribution within
283
+ the disc. This thermal structure is used to calculate ray-traced
284
+ synthetic spectra and images in a subsequent step.
285
+ 4. Parameter study
286
+ We first aim to understand the impact of the individual param-
287
+ eters on the SED and the visibilities. This will allow us to 1)
288
+ select the parameters that impact the observables the most, such
289
+ that we can constrain the disc parameters in a subsequent step
290
+ to provide a good fit to the data and 2) investigate the parame-
291
+ ter space of the individual parameters. This section is organised
292
+ as follows: we describe our reference model in Sect. 4.1, discuss
293
+ our strategy for our parametric study in Sect. 4.3, present the re-
294
+ sults in Sect. 4.4, and select the most promising parameters to
295
+ meet the shortcomings of the reference model in Sect. 4.5.
296
+ 4.1. The reference model
297
+ Both the SED and the squared visibility measurements of the
298
+ PIONIER data set for IRAS 08544 were reproduced by Kluska
299
+ et al. (2018) using the 2D version of MCMax. Here, we build
300
+ upon this model. We translated this model to MCMax3D to be
301
+ able to incorporate azimuthally asymmetric features in the fu-
302
+ ture. We assumed a distance of 1.22+0.01
303
+ −0.003 kpc from the recent
304
+ Gaia data release 3 (Gaia Collaboration et al. 2016, 2022) and
305
+ rescaled the stellar and disc parameters accordingly. Gaia did not
306
+ flag this object as an astrometric binary and hence this distance is
307
+ determined using a single star fit to the astrometric data. The stel-
308
+ lar photosphere of the post-AGB star is modelled from the results
309
+ of the SED fitting by Kluska et al. (2022). Stellar masses from
310
+ the updated distance estimate are calculated in the same way as
311
+ the upper limit estimates of Kluska et al. (2018). The mass of
312
+ the post-AGB star is estimated using the luminosity-core mass
313
+ relation for post-AGB stars (Vassiliadis & Wood 1994), as it is
314
+ expected to have lost most of its envelope. The stellar parameters
315
+ are reported in Table 1.
316
+ As we are interested in the radial and vertical disc structure,
317
+ we neglect the binary nature of the system in our modelling as
318
+ the post-AGB primary is much more luminous than the main se-
319
+ quence companion and the binary separation is negligible com-
320
+ pared to the size of the disc (Oomen et al. 2018). We also neglect
321
+ the effect of the (asymmetric) irradiation of on the disc due to the
322
+ non-central energy source (see Sect. 6.5 for future implications).
323
+ In the post-processing phase, the contribution of the accretion
324
+ disc around the secondary is taken into account in the photom-
325
+ etry by adding a blackbody with a temperature of 4000 K and a
326
+ flux contribution of 3.9% at 1.65 µm, which are taken from a fit
327
+ to the PIONIER data by Hillen et al. (2016) and Kluska et al.
328
+ (2018). Likewise, this contribution is added to the synthetic in-
329
+ terferometric images by assuming for simplicity that the emis-
330
+ sion coincides with the position of the primary.
331
+ We used the refined model for dust opacity of the DIANA
332
+ project (Woitke et al. 2016). Since the circumbinary discs around
333
+ post-AGB binaries are mostly found to be oxygen-rich (e.g. Gie-
334
+ len et al. 2011), the carbon fraction is set to zero, leaving the dust
335
+ Article number, page 3 of 18
336
+
337
+ A&A proofs: manuscript no. main
338
+ Fig. 1: Spectral energy distribution and visibility curves of the four interferometric bands of the reference model. From left to right:
339
+ the reddened spectral energy distribution, the H-band, K-band, and L-band squared visibility curves, and N-band correlated fluxes.
340
+ The wavelength regimes of the H-, K-, L-, and N-bands and the reddened stellar photosphere are depicted in the SED plot by the
341
+ grey vertical areas and by the brown curve, respectively.
342
+ to consist of amorphous pyroxene silicates (Mg0.7Fe0.3SiO3).
343
+ The ISM-like opacities that were assumed in the 2D model were
344
+ found to best correspond to irregular shaped particles with a
345
+ porosity, p, of 0% and a distribution of hollow spheres (Min et al.
346
+ 2005) with a maximum hollow volume ratio, fmax, of 0.7. We
347
+ note that these are different from the standard DIANA opacity,
348
+ as it takes a porosity of 25% and fmax = 0.8. The opacities are
349
+ calculated using a MRN-like distribution following Mathis et al.
350
+ (1977), who showed that the grain size distribution with q = 3.5
351
+ reproduced the extinction curve in the Milky Way.
352
+ We call this adapted version of the previous best-fit model
353
+ our reference model. Parameters of this reference model can be
354
+ found in Table 1. The performance of this model on the photom-
355
+ etry and the infrared interferometric data sets are shown in Fig.
356
+ 1.
357
+ 4.2. The extended component
358
+ The model of Kluska et al. (2018) needed an additional ad-hoc
359
+ extended component contributing 8.1% in the H-band to fit the
360
+ SED and reproduce the H-band interferometric measurements.
361
+ This component points towards an over-resolved emission that
362
+ is not reproduced by the reference model. Indeed, Fig. 1 shows
363
+ that by excluding this extended component, both the photometric
364
+ and the interferometric data are not well reproduced. The model
365
+ visibility curve in the H-band lies above the PIONIER data as
366
+ a result of this missing flux. This offset indicates that the stellar
367
+ flux relative to the total is over-estimated.The model lacks pho-
368
+ tometric fluxes in the near-IR and mid-IR, while the millime-
369
+ tre fluxes are fitted well. For these reasons, we aim at finding
370
+ models that have more photometric fluxes in all bands and more
371
+ over-resolved flux in the H-, K-, and L-bands.
372
+ One possibility to explain this over-resolved emission is that
373
+ it is a scattering component coming from the outer disc and
374
+ hence originating from a flared disc. For a more flared disc, we
375
+ expect that the outer regions of the disc intercept more starlight
376
+ such that there is more scattering.
377
+ Besides the over-resolved flux component, the reference
378
+ model fails to fit the visibilities at short baselines before the first
379
+ zero, which provides a measure for the wavelength-dependent
380
+ radial profile. This leads to a significant underestimation of the
381
+ size of the emission in these bands.
382
+ Table 1: Parameter space for the parametric study.
383
+ Stellar propertiesa
384
+ Parameter
385
+ Value
386
+ Teff (K)
387
+ 7250
388
+ log g (dex)
389
+ 1.01
390
+ RPost−AGB star (R⊙)
391
+ 65
392
+ LPost−AGB star (L⊙)
393
+ 10500
394
+ d (kpc)
395
+ 1.22
396
+ Parameter
397
+ reference model
398
+ grid range
399
+ α
400
+ 0.01
401
+ [0.001, 0.01, 0.1]
402
+ β
403
+ 1.2
404
+ [1.2, 1.4, 1.6]
405
+ amin(µm)
406
+ 0.1
407
+ [0.01, 0.1, 1.0]
408
+ gas/dust
409
+ 100
410
+ [50, 100, 200]
411
+ h0 (au)
412
+ 0.93
413
+ [0.93, 1.40, 1.87]
414
+ md (×10−3 M⊙)
415
+ 2.0
416
+ [1.0, 2.0, 4.0]
417
+ pin
418
+ -1.5
419
+ [-1.0, -1.5, -2.0]
420
+ q
421
+ 2.75
422
+ [2.50, 2.75, 3.25]
423
+ rmid (Rin)
424
+ 3.0
425
+ [2.5, 3.0, 3.5]
426
+ Rin (au)
427
+ 7.20
428
+ fixed
429
+ Rout (au)
430
+ 175
431
+ fixed
432
+ amax (mm)
433
+ 1.0
434
+ fixed
435
+ i (deg)
436
+ 19
437
+ fixed
438
+ PA (deg)
439
+ 6
440
+ fixed
441
+ pout
442
+ 1.0
443
+ fixed
444
+ Dust composition
445
+ reference model
446
+ grid range
447
+ porosity
448
+ 0%
449
+ [0%, 25%]
450
+ fmax
451
+ 0.7
452
+ [0.7, 0.8]
453
+ crystallinity fraction
454
+ 0.0
455
+ [0.0, 0.2, 0.4]
456
+ metallic iron
457
+ 0%
458
+ [0%, 15%]
459
+ Notes.a Values for the displayed stellar parameters are taken from
460
+ Kluska et al. (2022) and Kluska et al. (2018) and re-scaled with the
461
+ distances from Gaia DR3 Gaia Collaboration et al. (2022).
462
+ 4.3. Strategy
463
+ In this section we define how we set up the exploration of the
464
+ parameters while showing the results in Sect. 4.4.
465
+ 4.3.1. Exploration of the parameter space
466
+ Since the effect of the different parameters has not been exam-
467
+ ined extensively for such post-AGB circumstellar discs yet, we
468
+ start by exploring our parameter space by investigating 1) the
469
+ Article number, page 4 of 18
470
+
471
+ V2
472
+ V2
473
+ V2
474
+ Fcorr (Jy)
475
+ 0.9
476
+ 1.0
477
+ 100
478
+ 10-6,
479
+ Reference model
480
+ 0.8
481
+ Data
482
+ 0.8
483
+ 10-1,
484
+ 102
485
+ 0.7
486
+ 10-8
487
+ s
488
+ cm-2 s
489
+ 0.6
490
+ 0.6
491
+ 10-2
492
+ 0.5
493
+ 0.4
494
+ 101
495
+ 0.4
496
+ 10-3
497
+ 10-12
498
+ 0.3
499
+ 0.2
500
+ 0.2
501
+ 10-14
502
+ 0.0
503
+ 10-4
504
+ 100
505
+ 100
506
+ 102
507
+ 20
508
+ 40
509
+ 60
510
+ 80
511
+ 20
512
+ 40
513
+ 09
514
+ 0
515
+ 10
516
+ 20
517
+ 30
518
+ 40
519
+ 0
520
+ 5
521
+ 10
522
+ 15
523
+ Wavelength (μm)
524
+ B (M^)
525
+ B (M入)
526
+ B (M入)
527
+ B (M入)A. Corporaal et al.: What does a typical full-disc around a post-AGB binary look like?
528
+ Fig. 2: From left to right: the reddened SEDs, H-band squared visibilities, K-band squared visibilities, L-band squared visibilities,
529
+ and N-band correlated fluxes for variations in the most impacting parameters. The SED plots are zoomed in to the area of interest
530
+ (i.e. in the wavelengths for which have infrared interferometric data) to highlight the changes. The reddened stellar photosphere
531
+ is depicted in brown in the SED plots. Here, the wavelength regimes of the H-, K-, L-, and N-bands are depicted by the grey
532
+ vertical areas. The reference model is always depicted in blue. The visibilities are calculated at synthetic baselines between 1-
533
+ 150 m. Interferometric data are only shown around the central wavelengths of the wavelength bands. From top to bottom: variations
534
+ in α, β, h0, q, md, and rmid.
535
+ Article number, page 5 of 18
536
+
537
+ V2
538
+ V2
539
+ V2
540
+ Fcorr (ly)
541
+ 10-7
542
+ 0.9
543
+ 1.0
544
+ 10°
545
+ α = 0.01
546
+ α = 0.1
547
+ 0.8
548
+ α= 0.001
549
+ 0.8
550
+ Data
551
+ 10-1
552
+ 0.7
553
+ 102
554
+ 10-8
555
+ s
556
+ (erg cm-² s
557
+ 0.6
558
+ 0.6
559
+ 10-2
560
+ 0.5
561
+ 101
562
+ 5
563
+ 10-9
564
+ 0.4
565
+ 10-3
566
+ 0.3
567
+ 0.2
568
+ 0.2
569
+ 10-10l
570
+ 0.0
571
+ 10-4
572
+ 1001
573
+ 100
574
+ 101
575
+ 0
576
+ 20
577
+ 40
578
+ 60
579
+ 80
580
+ 20
581
+ 40
582
+ 60
583
+ 0
584
+ 10
585
+ 20
586
+ 30
587
+ 0
588
+ 5
589
+ 10
590
+ 0
591
+ Wavelength (μm)
592
+ B (M^)
593
+ B (M)
594
+ B (M入)
595
+ B (M入)V2
596
+ V2
597
+ V2
598
+ Fcorr (ly)
599
+ 10-7
600
+ 0.9
601
+ 1.0
602
+ 100
603
+ β = 1.2
604
+ 0.8
605
+ β = 1.4
606
+ β = 1.6
607
+ 0.8
608
+ 10-1
609
+ 102
610
+ Data
611
+ 0.7
612
+ 10-8
613
+ 0.6
614
+ 0.6
615
+ 10-2
616
+ 0.5
617
+ 0.4
618
+ 101
619
+ 10-9
620
+ 0.4
621
+ 10-3
622
+ 0.3
623
+ 0.2
624
+ 0.2
625
+ 10-10/
626
+ 0.0-
627
+ 10-4
628
+ 1001
629
+ 100
630
+ 101
631
+ 0
632
+ 20
633
+ 40
634
+ 60
635
+ 80
636
+ 20
637
+ 40
638
+ 60
639
+ 0
640
+ 10
641
+ 20
642
+ 30
643
+ 0
644
+ 5
645
+ 10
646
+ 0
647
+ Wavelength (μm)
648
+ B (M^)
649
+ B (M)
650
+ B (M入)
651
+ B (M入)V2
652
+ V2
653
+ V2
654
+ Fcorr (Jy)
655
+ 10-7
656
+ 0.9
657
+ 1.0
658
+ 100
659
+ ho = 0.93 au
660
+ 0.8
661
+ ho = 1.87 au
662
+ ho = 1.40 au
663
+ 0.8
664
+ 10-1
665
+ 102
666
+ Data
667
+ 0.7
668
+ 10-8
669
+ 0.6
670
+ 0.6
671
+ 10-2
672
+ 0.5
673
+ 0.4
674
+ 101
675
+ 5
676
+ 10-9
677
+ 0.4
678
+ 10-3
679
+ 0.3
680
+ 0.2
681
+ 0.2
682
+ :
683
+ 10-10/
684
+ 0.0
685
+ 10-4
686
+ 1001
687
+ 100
688
+ 101
689
+ 20
690
+ 40
691
+ 60
692
+ 80
693
+ 20
694
+ 40
695
+ 60
696
+ 0
697
+ 10
698
+ 20
699
+ 30
700
+ 0
701
+ 5
702
+ 10
703
+ 0
704
+ 0
705
+ Wavelength (μm)
706
+ B (MΛ)
707
+ B (M)
708
+ B (M入)
709
+ B (M入)V2
710
+ V2
711
+ V2
712
+ Fcorr (ly)
713
+ 10-7
714
+ 0.9
715
+ 1.0
716
+ 10°
717
+ q = 2.75
718
+ q = 3.25
719
+ 0.8
720
+ q = 2.5
721
+ 0.8
722
+ Data
723
+ 10-
724
+ 102
725
+ 0.7
726
+ 10-8
727
+ s
728
+ (erg cm-2 g
729
+ 0.6
730
+ 0.6
731
+ 10-2
732
+ 0.5
733
+ 101
734
+ 10-9
735
+ 0.4
736
+ 10-3
737
+ 0.3
738
+ 0.2
739
+ 0.2
740
+ 10-10/
741
+ 0.0
742
+ 10-4
743
+ 1001
744
+ 100
745
+ 101
746
+ 20
747
+ 40
748
+ 60
749
+ 80
750
+ 20
751
+ 40
752
+ 60
753
+ 0
754
+ 10
755
+ 20
756
+ 30
757
+ 0
758
+ 5
759
+ 10
760
+ 0
761
+ Wavelength (μm)
762
+ B (M^)
763
+ B (M)
764
+ B (M入)
765
+ B (M入)V2
766
+ V2
767
+ V2
768
+ Fcorr (Jy)
769
+ 10-7
770
+ 0.9
771
+ 1.0
772
+ 10°
773
+ md = 2.0e-03 Mo
774
+ md = 4.0e-03 Mo
775
+ 0.8
776
+ md = 1.0e-03 M。
777
+ 0.8
778
+ 102
779
+ Data
780
+ 10-1
781
+ 0.7
782
+ 10-8
783
+ s
784
+ (erg cm-2 g
785
+ 0.6
786
+ 0.6
787
+ 10-2
788
+ 0.5
789
+ 101
790
+ 5
791
+ 10-9
792
+ 0.4
793
+ 10-3
794
+ 0.3
795
+ 0.2
796
+ 0.2
797
+ 10-10l
798
+ 0.0
799
+ 10-4
800
+ 1001
801
+ 100
802
+ 101
803
+ 20
804
+ 40
805
+ 60
806
+ 80
807
+ 20
808
+ 40
809
+ 60
810
+ 0
811
+ 10
812
+ 20
813
+ 30
814
+ 0
815
+ 5
816
+ 10
817
+ 0
818
+ 0
819
+ Wavelength (μm)
820
+ B (M^)
821
+ B (M)
822
+ B (M入)
823
+ B (M入)A&A proofs: manuscript no. main
824
+ Fig. 2: Cont. Variations in rmid.
825
+ Fig. 3: Same as Fig. 2 but for the dust composition. Top. Effect of changing the porosity and the maximum hollow volume ratio
826
+ assuming the DIANA project opacities. Middle. Effect of adding a crystalline component. Bottom. Effect of adding a metallic iron
827
+ component.
828
+ disc geometry with the primary aim to study the extended com-
829
+ ponent and 2) the radial profile of the disc within our interfero-
830
+ metric observations.
831
+ We varied various disc parameters based on previous works
832
+ in circumstellar disc modelling (e.g., Woitke et al. 2016). Table
833
+ 1 lists the disc parameters along with the grid range for the para-
834
+ metric study. In general, we tested values that are both higher
835
+ and lower than the reference model values except for parameters
836
+ influencing the amount of the over-resolved emission such as β
837
+ and h0 (Eq. 1) that control the flaring. The infrared interferomet-
838
+ ric observations are not sensitive to the maximum grain size, and
839
+ the outer disc radius.These parameters are therefore fixed to one
840
+ value throughout this study. The inner disc radius is well con-
841
+ strained by the PIONIER data (Kluska et al. 2018) and is kept
842
+ fixed to their best-fit value, scaled to the updated distance from
843
+ Gaia DR3, of 7.2 au. The inclination, i, and position angle, PA,
844
+ are constrained by the geometric model fitting of the PIONIER
845
+ data by Hillen et al. (2016). We kept these parameters fixed to
846
+ i = 19◦ and PA = 6◦ (measured north to east), respectively.
847
+ Article number, page 6 of 18
848
+
849
+ V2
850
+ V2
851
+ V2
852
+ Fcorr (ly)
853
+ 10-7
854
+ 0.9
855
+ 1.0
856
+ 10°
857
+ Fe = 0%
858
+ Fe = 15%
859
+ 0.8
860
+ Data
861
+ 0.8
862
+ 10-
863
+ 0.7
864
+ 102
865
+ 10-8
866
+ s
867
+ (erg cm-² s
868
+ 0.6
869
+ 0.6
870
+ 10-2
871
+ 0.5
872
+ 0.4
873
+ 101
874
+ 5
875
+ 10-9
876
+ 0.4
877
+ 10-3
878
+ 0.3
879
+ 0.2
880
+ 0.2
881
+ 10-10/
882
+ 0.0
883
+ 10-4
884
+ 1001
885
+ 100
886
+ 101
887
+ 0
888
+ 20
889
+ 40
890
+ 60
891
+ 40
892
+ 60
893
+ 20
894
+ 10
895
+ 80
896
+ 20
897
+ 0
898
+ 10
899
+ 30
900
+ 0
901
+ 5
902
+ Wavelength (μm)
903
+ B (M^)
904
+ B (M)
905
+ B (M入)
906
+ B (M入)V2
907
+ V2
908
+ V2
909
+ Fcorr (ly)
910
+ 10-7
911
+ 0.9
912
+ 1.0
913
+ 100
914
+ rmid = 3.0 Rin
915
+ rmid = 2.5 Rin
916
+ 0.8
917
+ rmid = 3.5 Rin
918
+ 0.8
919
+ 102
920
+ Data
921
+ 10-
922
+ 0.7
923
+ 10-8
924
+ s
925
+ (erg cm-² s
926
+ 0.6
927
+ 0.6
928
+ 10-2
929
+ 0.5
930
+ 0.4
931
+ 101
932
+ 5
933
+ 10-9
934
+ 0.4
935
+ 10-3
936
+ 0.3
937
+ 0.2
938
+ 0.2
939
+ 10-101
940
+ 0.0
941
+ 10-4
942
+ 1001
943
+ 100
944
+ 101
945
+ 20
946
+ 40
947
+ 60
948
+ 80
949
+ 20
950
+ 40
951
+ 60
952
+ 0
953
+ 10
954
+ 20
955
+ 30
956
+ 0
957
+ 5
958
+ 10
959
+ 0
960
+ 0
961
+ Wavelength (μm)
962
+ B (M^)
963
+ B (M)
964
+ B (M入)
965
+ B (M入)V2
966
+ V2
967
+ V2
968
+ Fcorr (Jy)
969
+ 10-7
970
+ 0.9
971
+ 1.0
972
+ 10°
973
+ p = 0.0, fmax = 0.7
974
+ 0.8
975
+ p = 0.0, fmax = 0.8
976
+ p = 0.25, fmax = 0.7
977
+ 0.8
978
+ 10-1
979
+ 102
980
+ p = 0.25, fmax = 0.8
981
+ 0.7
982
+ Data
983
+ 10-8
984
+ s
985
+ (erg cm-2 g
986
+ 0.6
987
+ 0.6
988
+ 10-2
989
+ 0.5
990
+ 0.4
991
+ 101
992
+ 5
993
+ 10-9
994
+ 0.4
995
+ 10-3
996
+ 0.3
997
+ 0.2
998
+ 0.2
999
+ 10-10
1000
+ 0.0
1001
+ 10-4
1002
+ 1001
1003
+ 100
1004
+ 101
1005
+ 0
1006
+ 20
1007
+ 40
1008
+ 60
1009
+ 80
1010
+ 20
1011
+ 40
1012
+ 60
1013
+ 0
1014
+ 10
1015
+ 20
1016
+ 30
1017
+ 0
1018
+ 5
1019
+ 10
1020
+ 0
1021
+ Wavelength (μm)
1022
+ B (M^)
1023
+ B (M)
1024
+ B (M^)
1025
+ B (M入)V2
1026
+ V2
1027
+ V2
1028
+ Fcorr (Jy)
1029
+ 10-7
1030
+ 0.9
1031
+ 1.0
1032
+ 10°
1033
+ crystallinity = 0.0
1034
+ crystallinity = 0.2
1035
+ 0.8
1036
+ crystallinity = 0.4
1037
+ 0.8
1038
+ Data
1039
+ 10-1
1040
+ 102
1041
+ 0.7
1042
+ 10-8
1043
+ s
1044
+ (erg cm-² s
1045
+ 0.6
1046
+ 0.6
1047
+ 10-2
1048
+ 0.5
1049
+ 0.4
1050
+ 101
1051
+ 5
1052
+ 10-9
1053
+ 0.4
1054
+ 10-3
1055
+ 0.3
1056
+ 0.2
1057
+ 0.2
1058
+ 10-10/
1059
+ 0.0-
1060
+ 10-4
1061
+ 1001
1062
+ 100
1063
+ 101
1064
+ 0
1065
+ 20
1066
+ 40
1067
+ 60
1068
+ 80
1069
+ 20
1070
+ 40
1071
+ 60
1072
+ 0
1073
+ 10
1074
+ 20
1075
+ 30
1076
+ 0
1077
+ 5
1078
+ 10
1079
+ 0
1080
+ Wavelength (μm)
1081
+ B (M^)
1082
+ B (M)
1083
+ B (M入)
1084
+ B (M入)A. Corporaal et al.: What does a typical full-disc around a post-AGB binary look like?
1085
+ The mid-IR interferometric observations are also sensitive to
1086
+ the radial opacity profile. To investigate the effects of the opac-
1087
+ ity on the observables, we varied three dust properties. First, we
1088
+ varied the porosity and the fmax of the amorphous silicate dust
1089
+ mixture, as determined by the DIANA project, and adopted the
1090
+ values of the DIANA standard. Second, we added a crystalline
1091
+ component by taking a mixture of the amorphous silicates of the
1092
+ DIANA project and crystalline forsterite. For the latter, forsterite
1093
+ was chosen since it was found that it is the dominant source of
1094
+ crystalline dust in discs around post-AGB binaries (Gielen et al.
1095
+ 2008). The opacities are computed from the optical constants
1096
+ of Servoin & Piriou (1973) assuming the grain properties are
1097
+ in agreement with our standard dust mixture (i.e. with a poros-
1098
+ ity of 0% and fmax = 0.7). For the crystalline component, we
1099
+ tested crystallinity fractions of 0.2 and 0.4 by volume. Third, we
1100
+ mixed the amorphous silicates with metallic iron. The formation
1101
+ of metallic iron in the disc environment has been debated in e.g.
1102
+ Hillen et al. (2014). We tested a mixture of 85% amorphous sil-
1103
+ icate with 15% metallic iron by mass. For metallic Fe, optical
1104
+ constants of Palik (1991) were used to compute the opacities. In
1105
+ all cases the dust composition is assumed to be homogeneous
1106
+ throughout the disc.
1107
+ To investigate the impact of the models parameters on the
1108
+ radial morphology of the emission, we used the half-light radii
1109
+ (hlr) of the disc in different spectral bands. This quantity speci-
1110
+ fies the radius at which half of the flux emitted at a given wave-
1111
+ length is captured. These hlr are constrained by geometric mod-
1112
+ els in Corporaal et al. (2021).
1113
+ 4.3.2. Ray-traced spectra and images
1114
+ We fitted the interstellar reddening to the photosphere of the
1115
+ post-AGB star for the reference model, by using the Levenberg-
1116
+ Marquardt fitting routine from the Python package lmfit (for a
1117
+ more thorough explanation of the applied reddening see Ap-
1118
+ pendix B). The SED of each model is then reddened with this
1119
+ value.
1120
+ Ray-tracing images is computationally expensive. For this
1121
+ reason, we computed images at a single continuum wavelength
1122
+ coinciding with the centres of the wavelength bands of interest.
1123
+ We compared the image to one given spectral channel of the
1124
+ near-IR interferometric data to avoid any intra band chromatic
1125
+ effects.
1126
+ To visualise the effect of varying the parameters on the
1127
+ interferometric visibilities, we plot the squared visibilities for
1128
+ synthetic baselines between 1-150 meters, to match the base-
1129
+ line range of the VLTI. Since IRAS 08544 is almost pole-on,
1130
+ the direction to which the uv-coordinates are calculated, does
1131
+ not change the visibility signal significantly. The synthetic uv-
1132
+ coordinate space was calculated along the semi-major axis in
1133
+ the image plane. Output images were converted to complex vis-
1134
+ ibilities via a Fourier transform at this synthetic uv-coordinate
1135
+ space. These complex visibilities were subsequently converted
1136
+ to squared visibilities for the H-, K-, and L-bands and to corre-
1137
+ lated fluxes in the N-band, in agreement with the observables of
1138
+ the data.
1139
+ 4.4. Results of parametric study
1140
+ The impact on the SED and on the visibilities for the most im-
1141
+ pacting structural parameters of our disc model is illustrated in
1142
+ Fig. 2. In Fig. 3 we show the same but for variations in the
1143
+ dust composition. The impact of these parameters on the hlr are
1144
+ Table 2: Explored set of parameters for the application to
1145
+ IRAS 08544 and the parameters of the family of best-fit mod-
1146
+ els (see also Table 3).
1147
+ Parameter
1148
+ Grid range
1149
+ Values best models
1150
+ α
1151
+ [0.01, 0.1]
1152
+ [0.1, 0.01]
1153
+ β
1154
+ [1.2, 1.3, 1.4]
1155
+ [1.2, 1.3, 1.4]
1156
+ h0 (au)
1157
+ [0.93, 1.40, 1.87]
1158
+ [1.40, 1.87]
1159
+ md (×10−3 M⊙)
1160
+ [1.0, 1.5, 2.0, 3.0]
1161
+ [1.0, 1.5, 2.0]
1162
+ q
1163
+ [2.75, 3.0, 3.25]
1164
+ [2.75, 3.0]
1165
+ rmid
1166
+ [2.5, 3.0, 3.5]
1167
+ [2.5, 3.0, 3.5]
1168
+ metallic iron
1169
+ [0%, 15%]
1170
+ [0%, 15%]
1171
+ shown in Fig. 4. The impact on the photometry and interferome-
1172
+ try and on the hlr for a change in the other parameters are shown
1173
+ in Fig. A.1 and Fig. A.2, respectively.
1174
+ 4.4.1. The impact of the turbulence parameter
1175
+ The turbulence parameter controls the strength of the dust set-
1176
+ tling and, therefore, the scale height of the larger grains. Stronger
1177
+ dust settling leads to the removal of large grains from the sur-
1178
+ face layers. A decrease in α decreases the photometric fluxes,
1179
+ increases the star-to-disc flux ratio significantly and increases the
1180
+ over-resolved flux component. An increase of α shows, however,
1181
+ only slight variations with respect to the reference model, such
1182
+ as a slight increase in the photometric fluxes, suggesting that the
1183
+ number density of small grains where infrared interferometric
1184
+ observations are sensitive to are not changing from α = 0.01
1185
+ to α = 0.1. Neither an increase nor a decrease in α has notable
1186
+ effects on the hlr.
1187
+ 4.4.2. The impact of the scale height
1188
+ The disc flaring as controlled by β and h0 strongly affects all ob-
1189
+ servables that we investigated. Larger β and h0 significantly in-
1190
+ crease the near-IR and mid-IR photometric fluxes, as well as the
1191
+ over-resolved emission and the hlr. For more flared discs or more
1192
+ vertically extended discs, the star-to-disc flux ratio is decreased
1193
+ with respect to the reference model, as the these parameters in-
1194
+ crease the captured infrared flux of the disc due to scattering and
1195
+ absorption. Both parameters impact similarly with two important
1196
+ exceptions: first, they have different effects on the amplitude of
1197
+ the visibility bump in the N-band. Indeed, for increased values
1198
+ of h0, the amplitude increases while this amplitude remains un-
1199
+ changed for varying β. Second, increased values of β affect the
1200
+ radial extent of the N-band more than it affect the radial extents
1201
+ of the H-, K-, and L-bands. The model with β = 1.6 is also the
1202
+ only model in which the N-band extent deduced from the data is
1203
+ reached, while it also performs well for the near-IR hlr.
1204
+ 4.4.3. The impact of grain-size distribution
1205
+ Variations in the value of q changes the dust grain size distri-
1206
+ bution between the number of small and large grains, with sizes
1207
+ below and above 1µm respectively. Varying q leads to changes
1208
+ in the mean dust grain size. These alter the SED and visibili-
1209
+ ties significantly. If the number of small grains is increased with
1210
+ respect to the large grains, or equivalently, if higher values of
1211
+ q are taken, the radial extents in all bands decrease, the SED
1212
+ fluxes increase in the H-, K-, and L-bands, and the over-resolved
1213
+ emission increase in all bands. Moreover, the star-to-disc flux
1214
+ ratio is then significantly decreased. The small grains contribute
1215
+ Article number, page 7 of 18
1216
+
1217
+ A&A proofs: manuscript no. main
1218
+ Fig. 4: Half-light-radius variations of the radial emission as a function of wavelength for changes in the parameters that have the
1219
+ most promising impact on the photometric and interferometric observables (top and middle) and for changes in the dust composition
1220
+ (bottom). The half-light radii were calculated at the central wavelengths of the H-, K-, L-, and N-bands. The geometric model data
1221
+ points are taken from Corporaal et al. (2021). Top. Effect of changing α (left), β (middle), and h0 (right). Middle. Effect of changing
1222
+ md (left) and q (middle), and rmid (right). Bottom. Variations of the DIANA parameters (left), the crystallinity fraction (middle), and
1223
+ the metallic iron content (right).
1224
+ considerably to the total flux of the disc such that the disc emis-
1225
+ sion becomes more dominant relative to the star. A decrease in
1226
+ q slightly decreases the fluxes in the H-, K-, and L-bands, in-
1227
+ creases the star-to-disc flux ratio, increases the hlr, and increases
1228
+ the over-resolved flux component. The increase/decrease in the
1229
+ near-IR photometric flux is stronger than in the mid-IR, which is
1230
+ different than what we find for other parameters. The grain-size
1231
+ distribution thus affects both the radial intensity profile and the
1232
+ emission morphology.
1233
+ 4.4.4. The impact of the dust mass
1234
+ The dust mass impacts the whole SED, the visibilities, as well as
1235
+ the hlr. Increasing/decreasing the dust mass decreases/increases
1236
+ the stellar contribution significantly and thus shifts the visibility
1237
+ curve in the near-IR as the dust mass in the inner regions is dou-
1238
+ bled/halved as well. For this reason, higher dust masses decrease
1239
+ the IR excess of the disc and slightly increase the N-band over-
1240
+ resolved flux and visa versa for smaller dust masses. In the H-,
1241
+ K-, and L-bands, the over-resolved flux is not altered by varying
1242
+ the dust mass.
1243
+ 4.4.5. The impact of the turn-over radius
1244
+ Variations in the turn-over radius, rmid, were compared by
1245
+ putting it closer to/farther from the inner rim while keeping the
1246
+ total dust mass constant. To ensure continuity in the surface den-
1247
+ sity profile, the ratio of dust mass in the inner zone and the outer
1248
+ zone is altered. For larger rmid, the surface density in the inner re-
1249
+ gions is higher, while for smaller rmid the turn-over is at smaller
1250
+ radii thus with a lower surface density. Variations in rmid signifi-
1251
+ cantly affects all observables. Putting rmid closer to/farther from
1252
+ the inner rim decreases/increases the SED fluxes in the H-, K-
1253
+ Article number, page 8 of 18
1254
+
1255
+ 24
1256
+ 29.2
1257
+ α= 0.001
1258
+ α=0.01
1259
+ 20
1260
+ α = 0.1
1261
+ 24.4
1262
+ Data
1263
+ 16
1264
+ 19.5
1265
+ hlr (mas)
1266
+ hlr (AU)
1267
+ 12
1268
+ 14.6
1269
+ 8
1270
+ 9.8
1271
+ 4
1272
+ 4.9
1273
+ 0
1274
+ .0.0
1275
+ 0
1276
+ 2
1277
+ 3
1278
+ 4
1279
+ 6
1280
+ 8
1281
+ 10
1282
+ 12
1283
+ Wavelength (μum)24
1284
+ 29.2
1285
+ β= 1.2
1286
+ β = 1.4
1287
+ 20
1288
+ 24.4
1289
+ β = 1.6
1290
+ Data
1291
+ 16
1292
+ 19.5
1293
+ hlr (mas)
1294
+ hlr (AU)
1295
+ 12
1296
+ 14.6
1297
+ 8
1298
+ 9.8
1299
+ 4
1300
+ 4.9
1301
+ 0
1302
+ 0.0
1303
+ 0
1304
+ 2
1305
+ 3
1306
+ 4
1307
+ 6
1308
+ 8
1309
+ 10
1310
+ 12
1311
+ Wavelength (μum)24
1312
+ 29.2
1313
+ ho = 0.66 au
1314
+ ho=0.99au
1315
+ 20
1316
+ ho = 1.32 au
1317
+ 24.4
1318
+ Data
1319
+ 16
1320
+ 19.5
1321
+ hlr (mas)
1322
+ hlr (AU)
1323
+ 12
1324
+ 14.6
1325
+ 8
1326
+ 9.8
1327
+ 4
1328
+ 4.9
1329
+ 0
1330
+ .0.0
1331
+ 0
1332
+ 2
1333
+ 3
1334
+ 4
1335
+ 6
1336
+ 8
1337
+ 10
1338
+ 12
1339
+ Wavelength (μm)24
1340
+ 29.2
1341
+ md = 1.0e-03 Mo
1342
+ md = 2.0e-03 M。
1343
+ 20
1344
+ md = 4.0e-03 M。
1345
+ 24.4
1346
+ Data
1347
+ 16
1348
+ 19.5
1349
+ hlr (mas)
1350
+ hlr (AU)
1351
+ 12
1352
+ 14.6
1353
+ 8
1354
+ 9.8
1355
+ 4
1356
+ 4.9
1357
+ 0
1358
+ .0.0
1359
+ 0
1360
+ 2
1361
+ 3
1362
+ 4
1363
+ 6
1364
+ 8
1365
+ 10
1366
+ 12
1367
+ Wavelength (μm)24
1368
+ 29.2
1369
+ q = 2.5
1370
+ q = 2.75
1371
+ 20
1372
+ q = 3.25
1373
+ 24.4
1374
+ Data
1375
+ 16
1376
+ 19.5
1377
+ hlr (mas)
1378
+ hlr (AU)
1379
+ 12
1380
+ 14.6
1381
+ 8
1382
+ 9.8
1383
+ 4
1384
+ 4.9
1385
+ 0
1386
+ .0.0
1387
+ 0
1388
+ 2
1389
+ 3
1390
+ 4
1391
+ 6
1392
+ 8
1393
+ 10
1394
+ 12
1395
+ Wavelength (μum)24
1396
+ 29.2
1397
+ rmid = 2.5 Rin
1398
+ rmid = 3.0 Rin
1399
+ 20
1400
+ rmid = 3.5 Rin
1401
+ 24.4
1402
+ Data
1403
+ 16
1404
+ 19.5
1405
+ hlr (mas)
1406
+ hlr (AU)
1407
+ 12
1408
+ 14.6
1409
+ 8
1410
+ 9.8
1411
+ 4
1412
+ 4.9
1413
+ 0
1414
+ .0.0
1415
+ 0
1416
+ 2
1417
+ 3
1418
+ 4
1419
+ 6
1420
+ 8
1421
+ 10
1422
+ 12
1423
+ Wavelength (μm)24
1424
+ 29.2
1425
+ p = 0.0, fmax = 0.7
1426
+ p = 0.0, fmax = 0.8
1427
+ 20
1428
+ p = 0.25, fmax = 0.7
1429
+ 24.4
1430
+ p = 0.25, fmax = 0.8
1431
+ Data
1432
+ 16
1433
+ 19.5
1434
+ hlr (mas)
1435
+ hlr (AU)
1436
+ 12
1437
+ 14.6
1438
+ 8
1439
+ 9.8
1440
+ 4
1441
+ 4.9
1442
+ 0
1443
+ .0.0
1444
+ 0
1445
+ 2
1446
+ 3
1447
+ 4
1448
+ 6
1449
+ 8
1450
+ 10
1451
+ 12
1452
+ Wavelength (μm)24
1453
+ 29.2
1454
+ crystallinity = 0.0
1455
+ crystallinity = 0.2
1456
+ 20
1457
+ crystallinity = 0.4
1458
+ 24.4
1459
+ Data
1460
+ 16
1461
+ 19.5
1462
+ hlr (mas)
1463
+ hlr (AU)
1464
+ 12
1465
+ 14.6
1466
+ 8
1467
+ 9.8
1468
+ 4
1469
+ 4.9
1470
+ 0
1471
+ .0.0
1472
+ 0
1473
+ 2
1474
+ 3
1475
+ 4
1476
+ 6
1477
+ 8
1478
+ 10
1479
+ 12
1480
+ Wavelength (μum)24
1481
+ 29.2
1482
+ Fe = 0%
1483
+ Fe = 15%
1484
+ 20
1485
+ Data
1486
+ 24.4
1487
+ 16
1488
+ 19.5
1489
+ hlr (mas)
1490
+ hlr (AU)
1491
+ 12
1492
+ 14.6
1493
+ 8
1494
+ 9.8
1495
+ 4
1496
+ 4.9
1497
+ 0
1498
+ 0.0
1499
+ 0
1500
+ 2
1501
+ 3
1502
+ 4
1503
+ 6
1504
+ 8
1505
+ 10
1506
+ 12
1507
+ Wavelength (μum)A. Corporaal et al.: What does a typical full-disc around a post-AGB binary look like?
1508
+ Fig. 5: Flowchart representing the different steps taken to find the models that represent best the photometric and interferometric
1509
+ data of IRAS 08544. The blue boxes describe different calculation steps and the orange boxes indicate the three selection steps.
1510
+ Table 3: Parameters of the family of best models and the score,
1511
+ sc, that these models got based on the number of characteristics
1512
+ that the model can reproduce.
1513
+ Model α
1514
+ β
1515
+ h0
1516
+ md
1517
+ q
1518
+ rmid
1519
+ Fe
1520
+ sc
1521
+ (×10−3)
1522
+ (au)
1523
+ (M⊙)
1524
+ (Rin)
1525
+ (%)
1526
+ 1
1527
+ 0.1
1528
+ 1.3
1529
+ 1.40
1530
+ 1.0
1531
+ 2.75
1532
+ 2.5
1533
+ 0
1534
+ 12
1535
+ 2
1536
+ 0.01
1537
+ 1.4
1538
+ 1.40
1539
+ 1.0
1540
+ 2.75
1541
+ 2.5
1542
+ 0
1543
+ 11
1544
+ 3
1545
+ 0.01
1546
+ 1.2
1547
+ 1.87
1548
+ 1.0
1549
+ 2.75
1550
+ 2.5
1551
+ 0
1552
+ 11
1553
+ 4
1554
+ 0.01
1555
+ 1.3
1556
+ 1.40
1557
+ 1.5
1558
+ 2.75
1559
+ 3.0
1560
+ 0
1561
+ 11
1562
+ 5
1563
+ 0.1
1564
+ 1.2
1565
+ 1.40
1566
+ 1.5
1567
+ 2.75
1568
+ 3.5
1569
+ 15
1570
+ 11
1571
+ 6
1572
+ 0.1
1573
+ 1.2
1574
+ 1.40
1575
+ 1.0
1576
+ 3.0
1577
+ 3.5
1578
+ 0
1579
+ 10
1580
+ 7
1581
+ 0.1
1582
+ 1.2
1583
+ 1.40
1584
+ 2.0
1585
+ 2.75
1586
+ 3.5
1587
+ 0
1588
+ 10
1589
+ 8
1590
+ 0.1
1591
+ 1.2
1592
+ 1.40
1593
+ 1.0
1594
+ 3.0
1595
+ 3.0
1596
+ 0
1597
+ 10
1598
+ 9
1599
+ 0.1
1600
+ 1.2
1601
+ 1.40
1602
+ 1.5
1603
+ 2.75
1604
+ 3.0
1605
+ 0
1606
+ 10
1607
+ 10
1608
+ 0.01
1609
+ 1.2
1610
+ 1.40
1611
+ 1.0
1612
+ 3.0
1613
+ 3.5
1614
+ 15
1615
+ 10
1616
+ , and L-bands and decreases/increases the hlr in all bands, and
1617
+ increases/decreases the star-to-disc flux ratio.
1618
+ 4.4.6. The impact of the dust composition
1619
+ The dust composition determines the radial opacity profile of the
1620
+ disc. Variations of the DIANA opacities show a decrease in the
1621
+ star-to-disc flux ratio and a slight decrease in the hlr for mod-
1622
+ els with p = 0.25. Changes in fmax do not show notable effects
1623
+ on the interferometry. The crystallinity factor decreases the star-
1624
+ to-disc flux ratio and shows the emission in all bands is simi-
1625
+ larly radially extended as the reference model. The addition of
1626
+ metallic iron slightly increases the star-to-disc flux ratio, slightly
1627
+ decreases the radial extents in the near-IR and increases the ra-
1628
+ dial extents in the mid-IR. Different from the DIANA opacity
1629
+ changes and the addition of the crystallinity factor, the addition
1630
+ of metallic iron increases the photometric flux in the K- and L-
1631
+ bands significantly, while the H- and N-band fluxes remain not
1632
+ significantly affected. For all models with changing dust com-
1633
+ position, the over-resolved flux component remains unchanged
1634
+ with respect to the reference model and the hlr values are also
1635
+ barely affected.
1636
+ 4.5. Selection of most impacting parameters
1637
+ Here, we outline our selection of the parameters which have
1638
+ most impact on the observables with a specific focus on the over-
1639
+ resolved flux component. We find the following six structural
1640
+ parameters that have the most impact on the SED and the in-
1641
+ terferometry in terms of the photometric flux, the over-resolved
1642
+ flux, and the radial extent: α, β, h0, md, q, and rmid. For α, β, h0,
1643
+ and q we found that increased values of these parameters with
1644
+ respect to the reference model show results improved the fit to
1645
+ the SED in the near-IR and mid-IR, the over-resolved flux com-
1646
+ ponent, and on the radial profile of the disc. Variations in the
1647
+ other parameters with significant impact, md and rmid, need to
1648
+ be explored in both ways with respect to the reference model.
1649
+ Therefore, we selected values for these six parameters that are
1650
+ either the values of the reference model or in the direction which
1651
+ improves the fit to the observables, i.e. the SED or the interfero-
1652
+ metric measurements.
1653
+ Changes in the dust compositions have smaller impacts on
1654
+ the explored observables as compared to the structural parame-
1655
+ ters. Effects of the opacity are therefore not considered to play
1656
+ a significant role in explaining the over-resolved component.
1657
+ Moreover, it remains difficult to break the degeneracies between
1658
+ the effect of the different dust compositions. However, the ad-
1659
+ dition of metallic iron as an additional opacity source signifi-
1660
+ cantly increases the K- and L-band photometric fluxes, while not
1661
+ changing the morphological characteristics of the emission. For
1662
+ this reason, we included the metallic iron as a parameter in our
1663
+ grid. We tested both models assuming a dust composition fixed
1664
+ to the composition of our reference model and models with a
1665
+ dust composition that is a mixture of silicates (85%) and metal-
1666
+ lic iron with content (15%) and kept this fixed throughout the
1667
+ disc. In what follows, we take these seven parameters for a more
1668
+ in-depth study while we keep all other parameters fixed to the
1669
+ values of the reference model.
1670
+ 5. Application to IRAS 08544
1671
+ In this section, we perform a more in-depth study of the charac-
1672
+ teristics of the circumbinary disc around IRAS 08544. We out-
1673
+ line our strategy to find our family of best-fit models in Sect. 5.1
1674
+ and present the results in Sect. 5.2. We performed a systematic
1675
+ study within the parameter space derived from the results in pre-
1676
+ Article number, page 9 of 18
1677
+
1678
+ Compute radiative
1679
+ transfer models
1680
+ and assess photometry
1681
+ and within our set limits in at
1682
+ 1280 models
1683
+ least two bands.
1684
+ 28%
1685
+ Ray-trace monochromatic images
1686
+ and compute visibilities at uv-
1687
+ (329 models)
1688
+ coordinates around central wavelengths
1689
+ Rank models based on the photometric
1690
+ fluxes, star-to-disc flux ratio, hlr, and V?
1691
+ Select models with the highest
1692
+ small
1693
+ Calculate chromatic images
1694
+ and compute visibilities at
1695
+ uv-coordinates of the data.
1696
+ 15%
1697
+ (55 models)
1698
+ 10 highest
1699
+ ranked
1700
+ Select best families of models.A&A proofs: manuscript no. main
1701
+ Fig. 6: The distribution of the parameter space resulting from each of the three selection steps. The parameter space is defined by
1702
+ (from left to right) α, β, h0, md, q, rmid, and Fe. The distribution for the total number of models (1380 models) is indicated by the
1703
+ circles and are equally distributed over each of the parameters. The final distribution of parameters of our family of best-fit models
1704
+ are indicated by the diamonds.
1705
+ vious section. Table 2 displays the range of the varied parame-
1706
+ ters.
1707
+ 5.1. Strategy
1708
+ To limit computational time, our strategy consists of three selec-
1709
+ tion steps. A graphical representation of our strategy is depicted
1710
+ in Fig. 5. We first ran the radiative transfer models, computed
1711
+ the photometry, and subsequently assessed the performance of
1712
+ the SEDs with respect to the data before creating the images and
1713
+ comparing the model to the interferometric measurements.
1714
+ From the full investigation of the parameter space, we get
1715
+ 1280 unique models. Photometric data points in the H-, K-, and
1716
+ L-bands are taken from de Ruyter et al. (2006). To avoid dis-
1717
+ crepancy between the model and the data due to the 11.3 µm
1718
+ crystalline forsterite feature, interpolation is performed between
1719
+ all photometric flux points in the N-band (from 8-13 µm) to find
1720
+ the photometric flux at 10 µm. This is then compared to the pho-
1721
+ tometric flux at 10 µm of the models. The amorphous pyroxene
1722
+ silicate feature at 9.8 µm is broad and extents throughout the N-
1723
+ band such that we cannot bypass this feature. We selected con-
1724
+ fidence intervals in which we considered the model fluxes to be
1725
+ good enough within our framework. These are within 20% of the
1726
+ photometric data in the H, K and L-bands and 25% of the inter-
1727
+ polated data point at 10 µm in the N-band. These levels take into
1728
+ account the uncertainties in the photometric data points.
1729
+ We fitted the interstellar reddening for each model spectrum
1730
+ individually (see also Appendix B). The SED of each model
1731
+ is then reddened accordingly. The reduced χ2 of this reddened
1732
+ SED, χ2
1733
+ red,SED, was calculated by taking into account only photo-
1734
+ metric data points up to 20 µm, since our interferometric observ-
1735
+ ables are sensitive to neither the geometry of the outer disc nor
1736
+ larger grain sizes.
1737
+ As a first selection step, we selected models based on the fol-
1738
+ lowing two criteria: 1) models that have χ2
1739
+ red,SED that are smaller
1740
+ than the χ2
1741
+ red,SED of the reference model (which has χ2
1742
+ red,SED = 90)
1743
+ and 2) models that comply with the observed photometry within
1744
+ our set limits in at least two out of the four bands. For models
1745
+ that satisfy these criteria, we computed the monochromatic im-
1746
+ ages at the central wavelengths of each band. To compute the
1747
+ synthetic visibilities, we used the uv-coordinates of the data and
1748
+ performed a Fourier transform at these uv-coordinates.
1749
+ We then ranked the models for which we computed the
1750
+ monochromatic images based on their reduced χ2 (χ2
1751
+ red) of both
1752
+ the photometry and the interferometry of the different bands. The
1753
+ model with the lowest χ2
1754
+ red in each category got the lowest rank.
1755
+ The resulting five ranks per model were then added to get a set
1756
+ of models that perform well.
1757
+ As a second selection step, we selected the 15% models with
1758
+ the lowest ranks. We subsequently ray-traced the images of these
1759
+ models at six wavelength channels per band, resulting in chro-
1760
+ matic images. For the H-band, we calculated the images at the
1761
+ wavelengths of the six spectral channels of PIONIER. For the
1762
+ other bands, the wavelengths of the different images are equally
1763
+ distributed over the wavelength range of the bands. The images
1764
+ were subsequently combined and saved as an image cube. Model
1765
+ visibilities were calculated at the (u,v)-coordinates of the data by
1766
+ linearly interpolating between the wavelengths.
1767
+ The models were then assessed based on their performances
1768
+ on the photometric fluxes, star-to-total flux ratios, hlr, and the
1769
+ over-resolved flux component to have metrics on the disc geom-
1770
+ etry and the radial structure. For the over-resolved component,
1771
+ we took the value of the visibility at the shortest baseline(s) of
1772
+ the data and compared it to the predicted value of the model at
1773
+ the same baseline. Reported values are at baselines of B = 4.31
1774
+ Mλ in H and B = 4.55 Mλ in K. In the L-band we took into
1775
+ account the set of short baselines B < 0.6 Mλ from the shortest
1776
+ baseline (B = 2.35 Mλ) to have a fair comparison between the
1777
+ model and the data by taking into account the uncertainties on
1778
+ the V2. We took this larger range since there are data points at
1779
+ V2 = 0.46 and at V2 = 0.57 with overlapping uncertainties at
1780
+ the short baselines with an average of V2 = 0.51. In the N-band,
1781
+ the correlated flux for the shortest baselines (< 0.8Mλ) are be-
1782
+ tween Fcorr ∼ 160 Jy and Fcorr ∼ 220 Jy. Reported values for
1783
+ are at B = 2.47 Mλ and B = 0.67 Mλ in L and N, respectively.
1784
+ The confidence levels for which we consider our models pre-
1785
+ dicting sufficient over-resolved fluxes are chosen to be 20% in
1786
+ the near-IR bands and 40% in the mid-IR bands, proportional to
1787
+ the measurement uncertainties.
1788
+ Similarly, we set our confidence levels for which we con-
1789
+ sider our models to predict a large enough radial extent to 15%
1790
+ for the near-IR bands and 20% in the mid-IR bands. As noted
1791
+ in Sect. 4.3.1, we took the radial extents as constrained by geo-
1792
+ metric models in Corporaal et al. (2021) which are reported at
1793
+ the central wavelength of the four bands. To compare the model
1794
+ Article number, page 10 of 18
1795
+
1796
+ Total models
1797
+ Frequency of models
1798
+ First selection
1799
+ 21.0
1800
+ Second selection
1801
+ Third selection
1802
+ 0.8
1803
+ 0.6
1804
+ 0.4
1805
+ 8
1806
+ 0.2
1807
+
1808
+ 0.0
1809
+ α= 0.01
1810
+ α= 0.1
1811
+ β= 1.2
1812
+ β= 1.3
1813
+ β= 1.4
1814
+ q = 2.75
1815
+ q = 3.0
1816
+ q = 3.25
1817
+ rmid = 3.0Rin
1818
+ %0=
1819
+ Fe = 15%
1820
+ = 0.93
1821
+ =1.40
1822
+ =1.87
1823
+ md=2.0 ×10-3 NA. Corporaal et al.: What does a typical full-disc around a post-AGB binary look like?
1824
+ Table 4: The SED characteristics of the family of best-fit models.
1825
+ Model
1826
+ FH
1827
+ FK
1828
+ FL
1829
+ FN
1830
+ χ2
1831
+ red,SED
1832
+ (×10−8)
1833
+ (×10−8)
1834
+ (×10−8)
1835
+ (×10−8)
1836
+ (erg/s/cm2)
1837
+ (erg/s/cm2)
1838
+ (erg/s/cm2)
1839
+ (erg/s/cm2)
1840
+ data
1841
+ 2.60
1842
+ 3.46
1843
+ 5.48
1844
+ 5.00
1845
+ -
1846
+ 1
1847
+ 2.50
1848
+ 2.96
1849
+ 4.59
1850
+ 5.49
1851
+ 45
1852
+ 2
1853
+ 2.52
1854
+ 2.86
1855
+ 4.32
1856
+ 5.77
1857
+ 55
1858
+ 3
1859
+ 2.63
1860
+ 3.16
1861
+ 4.79
1862
+ 5.27
1863
+ 38
1864
+ 4
1865
+ 2.48
1866
+ 2.76
1867
+ 4.16
1868
+ 5.73
1869
+ 55
1870
+ 5
1871
+ 2.46
1872
+ 3.05
1873
+ 5.06
1874
+ 5.73
1875
+ 54
1876
+ 6
1877
+ 2.56
1878
+ 2.70
1879
+ 3.64
1880
+ 5.66
1881
+ 56
1882
+ 7
1883
+ 2.43
1884
+ 2.77
1885
+ 4.31
1886
+ 5.67
1887
+ 55
1888
+ 8
1889
+ 2.68
1890
+ 3.04
1891
+ 4.17
1892
+ 5.32
1893
+ 44
1894
+ 9
1895
+ 2.46
1896
+ 2.85
1897
+ 4.37
1898
+ 5.13
1899
+ 39
1900
+ 10
1901
+ 2.80
1902
+ 3.50
1903
+ 4.84
1904
+ 6.07
1905
+ 55
1906
+ hlr with these results, we calculated the hlr of the image at these
1907
+ central wavelengths.
1908
+ The stellar flux contribution with respect to the total,
1909
+ Fs/Frest, was calculated from the central wavelength image of
1910
+ the H-band, as the star is contributing most significantly in this
1911
+ band, with a contribution ∼ 62% to the total flux at 1.65 µm (Cor-
1912
+ poraal et al. 2021). The total contribution at this wavelength is
1913
+ coming from the star, the disc, and an over-resolved component.
1914
+ The total flux emerging from the star, Fs was thus compared
1915
+ with that emerging from the regions farther than the star, Frest.
1916
+ The confidence levels for Fs/Frest are set to 10%, proportional
1917
+ to the uncertainties of the geometric models.
1918
+ We checked whether our models are compliant with the four
1919
+ photometric bands, the stellar contribution as seen in the H-band
1920
+ interferometry, the four hlr, the four over-resolved flux compo-
1921
+ nents, and the stellar contribution with respect to the total flux in
1922
+ the confidence levels we outlined above. We summed the amount
1923
+ of times a model complies with these levels. Each model can get
1924
+ a maximum score of 13. As a third selection step, we selected the
1925
+ ten models with the highest score and ranked the models with the
1926
+ same score against each other based on their photometric and in-
1927
+ terferometric χ2
1928
+ red.
1929
+ 5.2. Results
1930
+ 5.2.1. The parameters after each selection step
1931
+ The results of the three selection steps per parameter are shown
1932
+ in Fig. 6. The total number of models are equally distributed be-
1933
+ tween all parameters. From the inspection of the SEDs, we found
1934
+ 329 (28% of the total) models display SEDs satisfying the crite-
1935
+ ria defined in Sect. 5.1. From this first selection we can deduce
1936
+ two general parameter preferences. First, both a high scale height
1937
+ at the inner rim (h0 = 1.87 au), or a high degree of disc flaring
1938
+ (β = 1.4) show an overprediction of the N-band and to a lesser
1939
+ extent also an overprediction in the L-band flux. Instead, models
1940
+ with a h0 = 0.93 au and a β = 1.2 are favourable with 53% and
1941
+ 62% of the models after the first selection, respectively. Second,
1942
+ grain size distributions with q = 2.75 or q = 3.0 are preferred
1943
+ over larger values of q, pointing towards the presence of larger
1944
+ grains.
1945
+ After the second selection, 55 models are left. The infrared
1946
+ interferometric observations show strong constraints in four of
1947
+ the parameters. The second selection step shows similar con-
1948
+ tributions as the first selection step in β with a strong prefer-
1949
+ ence for β = 1.2. Moreover, there is a clear preference for
1950
+ h0 = 1.40 au. There are strong differences within the wavelength
1951
+ bands. The near-IR interferometric data are sensitive to h0 and
1952
+ strongly prefer h0 = 1.40 au. The L-band data show a preference
1953
+ for h0 = 1.40 au but values of h0 = 0.93 au are not ruled out. The
1954
+ N-band data show, however, a clear preference for h0 = 0.93 au,
1955
+ resulting from the influence on the amplitude of the second lobe
1956
+ in the interferometry. Models with higher h0 show higher am-
1957
+ plitudes, which resides above the data. Third, the infrared inter-
1958
+ ferometric observations clearly prefer small dust masses. Dust
1959
+ masses of 1.0×10−3 M⊙ are highly preferred in 62% of the mod-
1960
+ els, with a decreasing slope with increasing dust mass. Fourth,
1961
+ grain size distributions with q = 2.75 are preferred while none
1962
+ of the models have q = 3.25.
1963
+ The ten models that remain after the third selection step
1964
+ shows a strong preference for β = 1.2. 90% of the models
1965
+ after this selection have h0 = 1.40 au while all models with
1966
+ h0 = 0.93 au are ruled out. A scale height at the inner rim larger
1967
+ than for our reference model is thus preferred. The distribution
1968
+ of dust masses and the grain size distribution power law remain
1969
+ similar to the second selection. While the first and second selec-
1970
+ tion did not prefer models with or models without Fe, the third
1971
+ selection shows a strong preferences for models without metal-
1972
+ lic iron. The distributions of α and rmid after the three selection
1973
+ steps do not show a strong preference for certain values of these
1974
+ parameters.
1975
+ 5.2.2. The family of best-fit models
1976
+ The models resulting from the third selection step are our fam-
1977
+ ily of best-fit models. The parameters of these models are dis-
1978
+ played in Table 3. The performance of these models on photom-
1979
+ etry is displayed in Table 4. The stellar contribution, the visibility
1980
+ χ2
1981
+ red of the different bands resulting from the chromatic images,
1982
+ and the values of the visibility at the smallest baselines of these
1983
+ models are given in Table 5. The hlr of these models are given
1984
+ in Table 6. Values represented in bold in Tables 4-6 are within
1985
+ our set confidence levels and are considered to be good enough
1986
+ within our framework. The score, sc, in Table 3 corresponds to
1987
+ the addition of the number of such bold representations in the
1988
+ tables. The SED and infrared interferometric visibility curves of
1989
+ Model 1 are shown in Fig. 7. The performance of Model 1 on
1990
+ the wavelength-dependent radial extents is shown in Fig. 8. The
1991
+ Article number, page 11 of 18
1992
+
1993
+ A&A proofs: manuscript no. main
1994
+ Table 5: The χ2
1995
+ red and small baselines of the family of best-fit models.
1996
+ Model
1997
+ Fs/Frest
1998
+ χ2
1999
+ red,H
2000
+ χ2
2001
+ red,K
2002
+ χ2
2003
+ red,L
2004
+ χ2
2005
+ red,N
2006
+ V2
2007
+ smallH
2008
+ V2
2009
+ smallK
2010
+ V2
2011
+ smallL
2012
+ Fcorr,smallN
2013
+ (Jy)
2014
+ data
2015
+ 1.65
2016
+ -
2017
+ -
2018
+ -
2019
+ -
2020
+ 0.65
2021
+ 0.43
2022
+ 0.51
2023
+ 208
2024
+ 1
2025
+ 1.62
2026
+ 20
2027
+ 313
2028
+ 251
2029
+ 41
2030
+ 0.77
2031
+ 0.51
2032
+ 0.67
2033
+ 287
2034
+ 2
2035
+ 1.58
2036
+ 12
2037
+ 265
2038
+ 149
2039
+ 29
2040
+ 0.75
2041
+ 0.50
2042
+ 0.70
2043
+ 283
2044
+ 3
2045
+ 1.45
2046
+ 38
2047
+ 317
2048
+ 189
2049
+ 34
2050
+ 0.74
2051
+ 0.49
2052
+ 0.68
2053
+ 270
2054
+ 4
2055
+ 1.74
2056
+ 21
2057
+ 272
2058
+ 81
2059
+ 28
2060
+ 0.76
2061
+ 0.51
2062
+ 0.63
2063
+ 287
2064
+ 5
2065
+ 1.70
2066
+ 21
2067
+ 338
2068
+ 187
2069
+ 22
2070
+ 0.81
2071
+ 0.53
2072
+ 0.66
2073
+ 273
2074
+ 6
2075
+ 1.66
2076
+ 6
2077
+ 242
2078
+ 122
2079
+ 17
2080
+ 0.73
2081
+ 0.50
2082
+ 0.62
2083
+ 250
2084
+ 7
2085
+ 1.82
2086
+ 15
2087
+ 271
2088
+ 120
2089
+ 24
2090
+ 0.79
2091
+ 0.52
2092
+ 0.64
2093
+ 301
2094
+ 8
2095
+ 1.34
2096
+ 30
2097
+ 301
2098
+ 144
2099
+ 21
2100
+ 0.74
2101
+ 0.51
2102
+ 0.67
2103
+ 240
2104
+ 9
2105
+ 1.75
2106
+ 17
2107
+ 308
2108
+ 269
2109
+ 32
2110
+ 0.78
2111
+ 0.53
2112
+ 0.67
2113
+ 276
2114
+ 10
2115
+ 1.38
2116
+ 57
2117
+ 354
2118
+ 117
2119
+ 11
2120
+ 0.77
2121
+ 0.52
2122
+ 0.65
2123
+ 233
2124
+ Notes. Reported χ2
2125
+ red are calculated from the chromatic images considering the full interferometric data
2126
+ set.
2127
+ images of the H-, K-, L-, and N-bands of Model 1 are shown in
2128
+ Fig. 9.
2129
+ Overall, our resulting family of models is able to explain
2130
+ many features of our dataset. Model 1 performs best in terms of
2131
+ the photometry, the over-resolved fluxes and the radial extents
2132
+ and scores 12 out of a maximum of 13. It is able to reproduce
2133
+ well the photometry, the over-resolved flux component, the stel-
2134
+ lar contribution, and the radial extent in the H-, K-, and L-bands.
2135
+ It only cannot reproduce the N-band radial extent within our set
2136
+ limits. Models 4, 5, and 7 are able to reach these levels in the
2137
+ N-band radial extent. Models 2-5, have a total score of 11 and
2138
+ Models 6-10 have a score of 10.
2139
+ Models 1-4, 6, and 8 reproduce the over-resolved flux com-
2140
+ ponent at short baselines within our set limits. The models are
2141
+ thus able to explain at least part of the over-resolved flux. How-
2142
+ ever, there is a systematic underprediction of the over-resolved
2143
+ flux component compared to the data in all the models (see
2144
+ Sect. 6.2 for a discussion).
2145
+ The photometric flux is well reproduced in all bands for
2146
+ Models 1, 3, 5, and 10. This shows that the disc geometry is able
2147
+ to reproduce the fluxes in the SED. The models with metallic Fe,
2148
+ Model 5 and 10, come closer to the K- and L-band fluxes than
2149
+ all other models, as expected from the parameter study (Sect. 4).
2150
+ These models lack, however, over-resolved flux, most notable
2151
+ for Model 5 in the H-band.
2152
+ Model 6 performs best in the infrared interferometric χ2
2153
+ red. In
2154
+ the H-band, the model is the highest ranked in the second and
2155
+ third selection, in the K- and L-bands it is ranked in the top 10%
2156
+ but in the N-band it is in the bottom 50%. The latter is due to the
2157
+ larger h0, which is preferable for H, K, and L but not for N.
2158
+ 6. Discussion
2159
+ In this work, we showed that we can find a family of physical
2160
+ models that reproduce the extensive data set covering both pho-
2161
+ tometric and multi-wavelength infrared interferometric observa-
2162
+ tions from the H- to the N-band with a parameterised disc model,
2163
+ originally designed for protoplanetary discs around young stars.
2164
+ Here we discuss the implications of the results of Sect. 5.2. We
2165
+ discuss the constrained disc parameters and its implications for
2166
+ the disc structure (Sect. 6.1), the origin of the missing over-
2167
+ resolved flux (Sect. 6.2), the difference in preferred structural
2168
+ Table 6: The half-light-radii of the family of best-fit models.
2169
+ Model
2170
+ hlrH
2171
+ hlrK
2172
+ hlrL
2173
+ hlrN
2174
+ (mas)
2175
+ (mas)
2176
+ (mas)
2177
+ (mas)
2178
+ geometric model
2179
+ 7.12
2180
+ 7.31
2181
+ 8.85
2182
+ 20.22
2183
+ 1
2184
+ 7.00
2185
+ 7.33
2186
+ 8.55
2187
+ 15.50
2188
+ 2
2189
+ 7.09
2190
+ 7.38
2191
+ 8.65
2192
+ 16.00
2193
+ 3
2194
+ 7.24
2195
+ 7.48
2196
+ 8.65
2197
+ 14.50
2198
+ 4
2199
+ 7.00
2200
+ 7.33
2201
+ 8.65
2202
+ 17.00
2203
+ 5
2204
+ 6.87
2205
+ 7.24
2206
+ 8.55
2207
+ 17.00
2208
+ 6
2209
+ 7.47
2210
+ 7.62
2211
+ 9.09
2212
+ 15.90
2213
+ 7
2214
+ 7.18
2215
+ 7.48
2216
+ 8.99
2217
+ 16.40
2218
+ 8
2219
+ 7.00
2220
+ 7.24
2221
+ 8.42
2222
+ 14.50
2223
+ 9
2224
+ 7.00
2225
+ 7.33
2226
+ 8.55
2227
+ 15.00
2228
+ 10
2229
+ 6.78
2230
+ 7.05
2231
+ 8.32
2232
+ 16.10
2233
+ Notes. Reported half-light radii are at the central wavelengths
2234
+ of the interferometric bands.
2235
+ disc parameters between the H-, K-, and L-band and the N-band
2236
+ interferometric data (Sect. 6.3), the comparison to protoplane-
2237
+ tary discs around young stars (Sect. 6.4), and finally some future
2238
+ prospects (Sect. 6.5).
2239
+ 6.1. Constrained disc parameters and disc structure
2240
+ This disc structure constrains the physical processes in the disc.
2241
+ Our results show that five out of the seven disc parameters can
2242
+ be well constrained with the combination of photometric data
2243
+ and infrared interferometric data in four bands (see Fig. 6). The
2244
+ following five parameters are constrained: the two disc flaring
2245
+ parameters β and h0, the dust mass md, the index of the grain
2246
+ size distribution, q, and the presence or absence of metallic iron
2247
+ as an additional opacity source.
2248
+ The scale height of the disc is well constrained, with a strong
2249
+ preference for a flaring index β = 1.2 and a scale height at the
2250
+ inner rim of h0 = 1.40 au, indicating that the disc is more ver-
2251
+ tically extended than expected from the 2D hydrostatic equilib-
2252
+ rium model of Kluska et al. (2018) (i.e. our reference model,
2253
+ h0 = 0.99 au), starting at the disc inner rim. Moreover, a value
2254
+ of q = 2.75 is strongly preferred over larger values of q. This
2255
+ Article number, page 12 of 18
2256
+
2257
+ A. Corporaal et al.: What does a typical full-disc around a post-AGB binary look like?
2258
+ Fig. 7: Spectral energy distribution and visibility curves as in Fig. 1 for Model 1 from our family of best-fit models.
2259
+ Fig. 8: Half-light radii of Model 1 compared to those from the
2260
+ geometric models of Corporaal et al. (2021) at the central wave-
2261
+ lengths of the H-, K-, L-, and N-bands.
2262
+ indicates that large grains are present in the inner disc regions,
2263
+ where the infrared interferometric observations are sensitive (see
2264
+ also Sect. 6.3). The infrared interferometry also prefers lower
2265
+ dust masses on the order of md = 1.0 × 10−3 M⊙. This translates
2266
+ to dust densities on the order of 2.1 − 4.8 × 10−13g/cm3 at the
2267
+ inner rim for for models with metallic iron and models without
2268
+ metallic iron, respectively. Dust masses above ∼ 2.0 × 10−3 M⊙
2269
+ are ruled out at the assumed distance of the system. The final
2270
+ selection also prefers discs without metallic Fe. The opacity of
2271
+ metallic iron affects strongly the dust density at the inner rim,
2272
+ which we can constrain with our infrared interferometric obser-
2273
+ vations. The factor of two difference between this density with
2274
+ the addition of metallic iron and without this addition points to-
2275
+ ward a constrained inner rim dust density of 4.8 × 10−13g/cm3.
2276
+ Finally, the degree of dust settling, α, and the turn-over-radius,
2277
+ rmid, are not well constrained with our data set.
2278
+ To illustrate the structure of the disc model, we present the
2279
+ dust grain distribution, the dust density, and dust temperature of
2280
+ Model 1 at two values of the vertical scale height, z/r, in Fig. 10.
2281
+ We consider the fraction between large and small dust grains
2282
+ within the disc a good measure for the dust grain distribution
2283
+ throughout a disc.
2284
+ As expected, the number of large grains is higher in the mid-
2285
+ plane than at larger scale heights in the disc, as larger grains are
2286
+ settled towards the midplane. The dust density decreases verti-
2287
+ cally, as expected for these discs, as the small grains populate the
2288
+ surface layers and the large grains settle toward the midplane.
2289
+ The dust temperature increases vertically as the grains populat-
2290
+ ing the midplane are more shielded from direct stellar radiation.
2291
+ The radial kink in the dust density distribution at the turn-over
2292
+ radius results from the changing surface density distribution in
2293
+ our two-zone model (Eq. 3).
2294
+ The radial and vertical dust temperature structure is well
2295
+ constrained. The dust density profile, however, depends on rmid,
2296
+ which is not strongly constrained (larger values are slightly pre-
2297
+ ferred) with our photometric and infrared interferometric ob-
2298
+ servations, and on the dust mass in the disc. These are inter-
2299
+ twined, as the surface density changes, depending on the turn-
2300
+ over-radius which is also linked to the dust mass in the two zone
2301
+ model as the two zones are well connected. Within our family of
2302
+ best models, the dust density at the inner regions can differ by a
2303
+ factor up to two for larger values of rmid.
2304
+ 6.2. The missing over-resolved flux
2305
+ The excess of over-resolved flux in near-infrared VLTI data was
2306
+ noticed in previous modelling efforts of post-AGB discs (Hillen
2307
+ et al. 2014; Kluska et al. 2018; Kluska et al. 2019). None of
2308
+ the radiative transfer models in this work are able to reproduce
2309
+ the total over-resolved flux which makes that its origin is still
2310
+ unknown.
2311
+ We aim to investigate the origin of the over-resolved flux
2312
+ component by reproducing both the photometric fluxes up to
2313
+ 20 µm, and the short baselines squared visibilities V2
2314
+ small in the H-
2315
+ , K-, and L-bands. The N-band data are displayed in correlated
2316
+ flux and are therefore not sensitive to the over-resolved emission.
2317
+ In Sect. 5.2 we tested whether the disc geometry (flaring, ver-
2318
+ tical dust settling) could be the origin of the over-resolved flux.
2319
+ Our family of best-fit models shows that in the H-, K- and L-
2320
+ bands, ∼50% of the over-resolved flux that was missing in our
2321
+ reference model has been captured. Therefore, the disc geometry
2322
+ can only account for a part of the over-resolved flux component.
2323
+ Moreover, while our confidence levels of 20% and 40% in the
2324
+ near-IR and mid-IR bands, respectively, are reached for all bands
2325
+ in six out of ten models, there is a systematic overestimation of
2326
+ the visibility at small baselines. Clearly, some over-resolved flux
2327
+ is still missing.
2328
+ Similarly to Kluska et al. (2018), we modelled the over-
2329
+ resolved emission with a single temperature blackbody nor-
2330
+ malised to 2.2 µm, which is about the central wavelength over the
2331
+ H-, K-, and L-bands. We added this component to the interfer-
2332
+ ometry of our family of best-fit models. We fitted the following
2333
+ two parameters: the relative flux of the over-resolved component
2334
+ with respect to the total flux and its temperature. We made a grid
2335
+ Article number, page 13 of 18
2336
+
2337
+ V2
2338
+ V2
2339
+ V2
2340
+ Fcorr (ly)
2341
+ 0.9
2342
+ 1.0
2343
+ 100
2344
+ Model
2345
+ 10-6,
2346
+ Data
2347
+ 0.8
2348
+ 0.8
2349
+ 10-1,
2350
+ 102
2351
+ 0.7
2352
+ 10-8
2353
+ 0.6
2354
+ 0.6
2355
+ 10-2
2356
+ 0.5
2357
+ 0.4
2358
+ 101
2359
+ 0.4
2360
+ 10-3
2361
+ 10-12.
2362
+ 0.3
2363
+ 0.2
2364
+ 0.2
2365
+ 10-14
2366
+ 0.0
2367
+ 10-4
2368
+ 100
2369
+ 100
2370
+ 102
2371
+ 20
2372
+ 40
2373
+ 80
2374
+ 20
2375
+ 40
2376
+ 60
2377
+ 10
2378
+ 20
2379
+ 30
2380
+ 40
2381
+ 60
2382
+ 0
2383
+ 0
2384
+ 5
2385
+ 10
2386
+ 15
2387
+ Wavelength (μm)
2388
+ B (M^)
2389
+ B (M入)
2390
+ B (M入)
2391
+ B (M入)24
2392
+ 29.2
2393
+ Model 1
2394
+ Data
2395
+ 20
2396
+ 24.4
2397
+ 16
2398
+ 19.5
2399
+ hlr (mas)
2400
+ hlr (AU)
2401
+ 12
2402
+ 14.6
2403
+ 8
2404
+ 9.8
2405
+ 4
2406
+ 4.9
2407
+ 0
2408
+ 0.0
2409
+ 0
2410
+ 234
2411
+ 6
2412
+ 8
2413
+ 10
2414
+ 12
2415
+ Wavelength (μm)A&A proofs: manuscript no. main
2416
+ Fig. 9: Circumbinary disc images of Model 1 at the central wavelengths of the (from left to right) H-, K-, L- and N-bands. The
2417
+ fluxes of central stars are removed from the image to unveil the disc structures. The images are normalised to the total flux of each
2418
+ image.
2419
+ over these two parameters with temperatures in the range of Tback
2420
+ from 400 to 7000 K and flux contributions in the range of Fback
2421
+ 1 to 10%. For the photometry, we used a Levenberg-Marquardt
2422
+ fitting routine from the Python package lmfit and evaluated the
2423
+ median and range of the best-fit values to all the different models
2424
+ in the family of best models. For the interferometry, we evalu-
2425
+ ated the over-resolved emission by computing the reduced χ2 on
2426
+ the shortest baselines of the H-, K-, and L-band interferometric
2427
+ data. We quantify which combination of parameters reproduces
2428
+ the short baselines visibilities in all bands the best. We subse-
2429
+ quently selected 5% of the models with the lowest total reduced
2430
+ χ2 values in the grid and computed the median temperature of
2431
+ their contributions.
2432
+ We found a better fit to the photometric fluxes if an addi-
2433
+ tional flux component with a median temperature of 1470 K and
2434
+ a median relative contribution of 7% at 2.2 µm was added. The
2435
+ ranges in best-fit temperatures and relative flux contributions we
2436
+ fitted to the family of best models are 1120-2100 K and 2-10%,
2437
+ respectively. This relative flux component is not very well con-
2438
+ strained and depends on the individual model. For Model 1, it is
2439
+ estimated to Fback = 7 ± 4% in K with Tback = 1610 ± 450 K.
2440
+ This would not significantly decrease its χ2
2441
+ red,SED from 45 to 44
2442
+ and increase the photometric fluxes FH, FK, FL, and FN by 4%,
2443
+ 7%, 8%, and 3%, respectively, which brings them closer to the
2444
+ values of the data in H, K, and L.
2445
+ The short baselines are fitted better with an additional over-
2446
+ resolved component with a median temperature of 2100 K and
2447
+ a contribution of 10% to the relative flux in K, with a range in
2448
+ temperatures of 1400-3600 K and a relative contribution of 8-
2449
+ 10% within the family of best-fit models. The impact of this ad-
2450
+ dition on the short baseline interferometric observables is shown
2451
+ in Fig. 11. The V2 of the family of best-fit models are clearly ly-
2452
+ ing above the data for all bands. With the added component, the
2453
+ V2 can go down to the V2 of the data within the uncertainties in
2454
+ the H- and K-bands. For the L-band it reaches within V2 ∼ 0.6
2455
+ while it does not reach within the lower-lying V2 at B < 3.0Mλ.
2456
+ While photometry does not bring strong constraints to the
2457
+ extended emission, the interferometric data is clearly better re-
2458
+ produced with the addition of such a component. Its temperature
2459
+ of 2100 K (with a range between 1400 and 3600 K) points to-
2460
+ wards a mixed origin of photons, that may come both from the
2461
+ star (Teff of 7250 K) and the hot inner disk rim (Teff of ∼1250 K).
2462
+ The exact location and geometry of the component are, however,
2463
+ not constrained by our data and it is, thus, difficult to claim what
2464
+ would be the disk geometry or the morphology of an additional
2465
+ component that could reproduce our data.
2466
+ Several other possibilities have been discussed in Kluska
2467
+ et al. (2018) and should be tested in future studies. One such
2468
+ possibility is that the emission originates from the jet launched
2469
+ from the accretion disc around the secondary star. These jets
2470
+ are commonly observed in post-AGB binaries and are detected
2471
+ in absorption during orbital phases when the companion is in
2472
+ front of the post-AGB primary (Bollen et al. 2022, and refer-
2473
+ ences therein). Such a jet is also detected in IRAS 08544 (Kluska
2474
+ et al. 2018). It is, however, as yet unknown if also dust grains are
2475
+ ejected in these jets.
2476
+ 6.3. The N-band disagreement
2477
+ While we can obtain a good fit the multi-wavelength infrared
2478
+ interferometric data and the photometry at the same time, there
2479
+ seems to be a general disagreement with the N-band interfero-
2480
+ metric data. This is notable in both our second selection and the
2481
+ third selection of Sect. 5. The N-band data prefer models with 1)
2482
+ a scale height at the inner rim of h0 = 0.93 au to lower the ampli-
2483
+ tude of the second lobe, 2) the presence of metallic iron, and 3)
2484
+ a grain size distribution index of q = 3.0. Our global selection,
2485
+ however, rules out low h0 = 0.93 au and disfavours higher values
2486
+ for q and the presence of metallic iron. This is due to the finding
2487
+ that the H-, K-, and L-band interferometric data do not prefer
2488
+ these values.
2489
+ This N-band disagreement is best illustrated in Model 1.
2490
+ While it performs best in our total set of criteria, it has the worst
2491
+ value of the χ2 on the N-band interferometry. Moreover, while
2492
+ the wavelength dependent radial extent is always reached in the
2493
+ H-, K-, and L-bands for our ten best models, the N-band ex-
2494
+ tent is only reached in three out of ten models, in which there
2495
+ is still a systematic under prediction of the extent (see also Fig.
2496
+ 8). Here we want to comprehend what conditions cause this dis-
2497
+ agreement between the H-, K-, and L-bands, which probe the
2498
+ very inner disc regions close to the inner rim, and the N-band,
2499
+ which probes deeper into the disc.
2500
+ The best model for the N-band interferometry, independent
2501
+ of the photometric or other interferometric data, has a small scale
2502
+ height at the inner rim, h0 = 0.93 au, an α = 0.01, a dust mass of
2503
+ md = 1.0 M⊙, a turn-over radius of rmid = 3.5 × Rin, and a dust
2504
+ size distribution index q = 3.0 with metallic iron mixed with the
2505
+ silicates throughout the disc. This difference in scale height at
2506
+ the inner rim with respect to the family of best-fit models sig-
2507
+ nificantly alters the dust density at different vertical heights, as
2508
+ the a disc with a higher h0 has more volume to distribute the par-
2509
+ ticles of the same mass than a disc with a smaller h0. For this
2510
+ reason, the dust density at the midplane is higher for smaller h0
2511
+ and the dust temperature is lower. The systematic higher q in
2512
+ the best ranked models within the N-band compared to the other
2513
+ Article number, page 14 of 18
2514
+
2515
+ -40
2516
+ -40
2517
+ -40
2518
+ -40
2519
+ 1.0
2520
+ -30
2521
+ -30
2522
+ -30
2523
+ -30
2524
+ 0.8
2525
+ -20
2526
+ -20
2527
+ -20
2528
+ -20
2529
+ -10
2530
+ -10
2531
+ -10
2532
+ 0.6
2533
+ 01
2534
+ 0
2535
+ 0.
2536
+ 0.4
2537
+ 10
2538
+ 10
2539
+ 10
2540
+ 20
2541
+ 20
2542
+ 20
2543
+ 20
2544
+ 0.2
2545
+ 30
2546
+ 30
2547
+ 30
2548
+ 30
2549
+ 0.0
2550
+ 40.
2551
+ 10 0 -10 -20 -30 -40
2552
+ 40 30 20 10 0 -10
2553
+ -20 -30 -40
2554
+ △α (mas)
2555
+ Aα (mas)
2556
+ △α (mas)
2557
+ Aα (mas)A. Corporaal et al.: What does a typical full-disc around a post-AGB binary look like?
2558
+ Fig. 10: Cuts of the dust distribution, dust density, and dust tem-
2559
+ perature of Model 1 at the midplane and at z/r = 0.15. The dust
2560
+ distribution is quantified as a ratio of the number of large grains
2561
+ (> 1µm) and small grains (< 1µm) and is calculated as a num-
2562
+ ber density per unit mass. The vertical dashed line indicates the
2563
+ location of rmid. The dashed yellow, green, and purple lines in
2564
+ the bottom plot indicates temperature profiles with power-law
2565
+ indexes of -0.67, -0.75, and -0.89, respectively.
2566
+ bands indicates that the outer regions contain more small grains
2567
+ compared to the inner disc regions.
2568
+ For future works, we suggest to consider distinctions be-
2569
+ tween the inner and outer disc regions within the dust distribu-
2570
+ tion, the dust species and/or structural parameters. This cannot
2571
+ be achieved by changing one parameter as there should be a bal-
2572
+ ance between decreasing the N-band photometric flux (as it is
2573
+ systematically over-estimated in the family of best-fit models)
2574
+ and increasing the radial extent in N while the extents in H, K,
2575
+ and L remain unchanged.
2576
+ 6.4. Comparison with YSOs
2577
+ The family of best-fit models shows that a strong dust settling
2578
+ and a larger scale height starting at the inner rim are needed
2579
+ to explain part of the over-resolved flux component as well as
2580
+ the wavelength-dependent radial intensity profile. Flaring disc
2581
+ shapes in protoplanetary discs have been confirmed by various
2582
+ direct observations (e.g. Ginski et al. 2016; Pinte et al. 2018).
2583
+ Disc flaring in general is thought to be due to the radial internal
2584
+ temperature of the disc decreasing slower than r−1 (Kenyon &
2585
+ Hartmann 1987). 2D geometric modelling in the image plane of
2586
+ the near-IR and mid-IR interferometric data of IRAS 08544 con-
2587
+ firms that this is also the case for this circumbinary disc around
2588
+ an evolved binary system (Corporaal et al. 2021). In this work,
2589
+ we also show a temperature decrease with a power of −0.67 at
2590
+ the surface layers. The midplane temperature decreases with a
2591
+ power of −0.89 at the inner regions and with ∼ −0.75 at the
2592
+ outer regions (see Fig. 10).
2593
+ Strong turbulence mixing strengths (α = 0.1 and α = 0.01)
2594
+ are found in our disc modelling to explain the SED characteris-
2595
+ tics as well as the infrared interferometric visibilities. These are
2596
+ higher than found for most protoplanetary discs around YSOs
2597
+ for which values of α = 10−4 −10−2 are consistent with observa-
2598
+ tions (e.g. Mulders & Dominik 2012). These authors also show
2599
+ that this turbulent mixing strength depends on the adopted grain
2600
+ size distribution and gas-to-dust ratio. Higher turbulence param-
2601
+ eter values are found for a higher q or a lower gas-to-dust ratio.
2602
+ We note that α is not well constrained (see Fig. 6). While in H,
2603
+ K, and L lower values of q = 2.75 are preferred, higher values
2604
+ are preferred in N, indicating that the turbulence parameter could
2605
+ take different values in different disc zones and should be taken
2606
+ into consideration. In future studies, also differences in the gas-
2607
+ to-dust ratios in different zones of the disc could be taken into
2608
+ account. Observational these gas properties can be constrained
2609
+ using ALMA and JWST.
2610
+ The dust mass in the disc as constrained from the photometry
2611
+ and the infrared interferometry are on the order of ∼ 1×10−3 M⊙,
2612
+ which translates in a total mass of ∼ 0.1 M⊙ for the assumed gas-
2613
+ to-dust ratio. From an analysis on different star forming regions,
2614
+ Pascucci et al. (2016) found that the total protoplanetary disc
2615
+ masses range from about 0.1-1.0 M⊙ and that there is an increas-
2616
+ ing trend with stellar mass. From this, with our combined stellar
2617
+ mass of 2.4 M⊙, we could expect dust masses of ∼ 1 × 10−3 M⊙,
2618
+ which is aligned with our deduced dust masses. The combined
2619
+ stellar mass also makes them close to the average stellar mass of
2620
+ Herbig stars, which have an average dust mass of 4 × 10−4 up to
2621
+ 0.1 M⊙ (Stapper et al. 2022), with a generally lower dust mass
2622
+ for non-structured full discs (van der Marel & Mulders 2021).
2623
+ The inferred dust masses for the disc around IRAS 08544 are
2624
+ therefore very similar to the higher mass end of the Herbig stars
2625
+ and thus similar to the of the ones found in protoplanetary discs
2626
+ around YSOs.
2627
+ 6.5. Future prospects
2628
+ A limitation of our refined radiative transfer models presented
2629
+ here is that the system is assumed to be axisymmetric. Image
2630
+ reconstructions of the inner disc regions and the closure phase
2631
+ signal, however, reveal that the disc inner rim shows significant
2632
+ azimuthal variations (Hillen et al. 2016). In future modelling,
2633
+ the binary nature of the system needs to be taken into account to
2634
+ include the asymmetric illumination of the post-AGB star on the
2635
+ disc inner rim during orbital motion. The orbital phase of this
2636
+ asymmetric illumination will be important to constrain the inner
2637
+ rim structure. To fully constrain the physical processes in the
2638
+ disc, both the inner disc region and throughout the full disc, we
2639
+ need to combine high-angular resolution instruments at different
2640
+ spatial scales and at different orbital phases to obtain the full 3D
2641
+ orbit.
2642
+ Article number, page 15 of 18
2643
+
2644
+ 0.0040
2645
+ 0.0038
2646
+ n(large)
2647
+ n(small)
2648
+ 0.0036
2649
+ 0.0034
2650
+ 10-13
2651
+ m-
2652
+ cm
2653
+ Q 10-14
2654
+ midplane
2655
+ 103
2656
+ z/r = 0.15
2657
+ T α r-0.67
2658
+ Tα r-0.75
2659
+ T α r-0.89
2660
+ T
2661
+ 102
2662
+ 0
2663
+ 25
2664
+ 50
2665
+ 75
2666
+ 100
2667
+ 125
2668
+ 150
2669
+ 175
2670
+ r (au)A&A proofs: manuscript no. main
2671
+ Fig. 11: The range of squared visibilities at the shortest baselines of the family of ten best-fit models (shaded dark grey) and of those
2672
+ models with an addition of an over-resolved component with a relative contribution of 10% and a temperature of 2100 K (shaded
2673
+ light grey) for the (from left to right) H-, K-, and L-band.
2674
+ 7. Conclusion
2675
+ We present radiative transfer models for the circumbinary disc
2676
+ around the post-AGB binary system IRAS 08544 that are able to
2677
+ reproduce an extensive data set of photometric data and infrared
2678
+ interferometric visibilities from the H- to the N-band. The pa-
2679
+ rameterised passive disc models characterise well the structure
2680
+ of the inner regions of the circumbinary disc.
2681
+ We first explored the impact of the individual parameters on
2682
+ the observables and selected the seven parameters (i.e. turbu-
2683
+ lence mixing strength, the two scale height structural parameters,
2684
+ the dust mass, the dust size distribution power law index, the
2685
+ turn-over radius of the surface density, and metallic iron) hav-
2686
+ ing substantial effects on the geometry and the radial structure
2687
+ of the disc. These seven parameters were used for a thorough
2688
+ grid search to isolate models that reproduce the photometric and
2689
+ interferometric dataset. With combinations of these disc parame-
2690
+ ters we aimed to reproduce the characteristics of the data set with
2691
+ a focus on the over-resolved flux component, the radial structure,
2692
+ and the photometric features.
2693
+ Our radiative transfer modelling can indeed reproduce the
2694
+ infrared visibility data of the disc as well as the photometric fea-
2695
+ tures. We find that the disc has a flared geometry with a vertical
2696
+ extension starting at the disc inner rim. The H-, K-, and L-band
2697
+ interferometric data, which are sensitive to the inner parts of the
2698
+ disc, prefer a low grain-size distribution power law index or, sim-
2699
+ ilarly, more large grains, while the N-band data prefer higher
2700
+ values. This points toward evidence for dust grain growth in the
2701
+ inner disc regions. The dust masses of our preferred models are
2702
+ very similar to dust masses inferred from observations of proto-
2703
+ planetary discs around young stars.
2704
+ The disc geometry can explain ∼ 50% of the over-resolved
2705
+ flux component, indicating that scattering is playing a role in
2706
+ explaining this component but there is still some over-resolved
2707
+ flux missing. This missing component has a temperature on the
2708
+ order of 1400−3600 K, pointing toward thermal photons emitted
2709
+ from the inner rim that are scattered further away in the system
2710
+ (from a complex disc morphology or the presence of a halo). The
2711
+ location and geometry of this component is not constrained with
2712
+ our data set.
2713
+ We conclude that the circumbinary disc around IRAS08544
2714
+ is in many ways very similar to the discs around YSOs. This
2715
+ bright object is therefore a very good candidate to search for disc
2716
+ asymmetries and eventual signs of macroscopic structure forma-
2717
+ tion around evolved systems. A full analysis of the asymmetries
2718
+ as well as the gas and dust distributions will be subject to fu-
2719
+ ture research. A complete model of the disc with an additional
2720
+ extended dusty component, including the effect of the asym-
2721
+ metric illumination of the binary stars and an adequate connec-
2722
+ tion between the inner and outer disc, awaits systematic studies
2723
+ in which high-angular resolution data at different spatial scales
2724
+ are combined using observational constraints from the VLTI,
2725
+ SPHERE, and ALMA. Moreover, JWST will allow us to look
2726
+ for the gaseous species inside the dust sublimation radius.
2727
+ Acknowledgements. We thank the referee for their fast and constructive com-
2728
+ ments and suggestions that substantially improved the clarity of the paper.
2729
+ A.C. and H.V.W. acknowledge support from FWO under contract G097619N.
2730
+ J.K. acknowledges support from FWO under the senior postdoctoral fellow-
2731
+ ship (1281121N). DK acknowledges the support of the Australian Research
2732
+ Council (ARC) Discovery Early Career Research Award (DECRA) grant
2733
+ (DE190100813). DK is supported in part by the Australian Research Council
2734
+ Centre of Excellence for All Sky Astrophysics in 3 Dimensions (ASTRO 3D),
2735
+ through project number CE170100013. This work has made use of data from the
2736
+ European Space Agency (ESA) mission Gaia (https://www.cosmos.esa.int/gaia),
2737
+ processed by the Gaia Data Processing and Analysis Consortium (DPAC,
2738
+ https://www.cosmos.esa.int/web/gaia/dpac/consortium). Funding for the DPAC
2739
+ has been provided by national institutions, in particular the institutions partici-
2740
+ pating in the Gaia Multilateral Agreement.
2741
+ References
2742
+ Bollen, D., Kamath, D., De Marco, O., Van Winckel, H., & Wardle, M. 2020,
2743
+ A&A, 641, A175
2744
+ Bollen, D., Kamath, D., Van Winckel, H., & De Marco, O. 2019, A&A, 631,
2745
+ A53
2746
+ Bollen, D., Kamath, D., Van Winckel, H., et al. 2022, A&A, 666, A40
2747
+ Bollen, D., Van Winckel, H., & Kamath, D. 2017, A&A, 607, A60
2748
+ Bujarrabal, V., Alcolea, J., Van Winckel, H., Santander-García, M., & Castro-
2749
+ Carrizo, A. 2013a, A&A, 557, A104
2750
+ Bujarrabal, V., Castro-Carrizo, A., Alcolea, J., & Van Winckel, H. 2015, A&A,
2751
+ 575, L7
2752
+ Bujarrabal, V., Castro-Carrizo, A., Alcolea, J., et al. 2017, A&A, 597, L5
2753
+ Bujarrabal, V., Castro-Carrizo, A., Alcolea, J., et al. 2013b, A&A, 557, L11
2754
+ Bujarrabal, V., Castro-Carrizo, A., Van Winckel, H., et al. 2018, A&A, 614, A58
2755
+ Castelli, F. & Kurucz, R. L. 2003, in Modelling of Stellar Atmospheres, ed.
2756
+ N. Piskunov, W. W. Weiss, & D. F. Gray, Vol. 210, A20
2757
+ Corporaal, A., Kluska, J., Van Winckel, H., et al. 2021, A&A, 650, L13
2758
+ Cridland, A. J., Rosotti, G. P., Tabone, B., et al. 2022, A&A, 662, A90
2759
+ de Ruyter, S., van Winckel, H., Maas, T., et al. 2006, A&A, 448, 641
2760
+ Deroo, P., Acke, B., Verhoelst, T., et al. 2007, A&A, 474, L45
2761
+ Deroo, P., Van Winckel, H., Min, M., et al. 2006, A&A, 450, 181
2762
+ Gaia Collaboration, Prusti, T., de Bruijne, J. H. J., et al. 2016, A&A, 595, A1
2763
+ Gaia Collaboration, Vallenari, A., Brown, A. G. A., et al. 2022, arXiv e-prints,
2764
+ arXiv:2208.00211
2765
+ Article number, page 16 of 18
2766
+
2767
+ V2
2768
+ V2
2769
+ V2
2770
+ 2.45
2771
+ 0.9
2772
+ Data
2773
+ 0.60
2774
+ 1.75
2775
+ 3.8
2776
+ 0.80
2777
+ 0.8
2778
+ 0.55
2779
+ 2.40
2780
+ 1.70
2781
+ 3.6
2782
+ 0.75
2783
+ 0.7
2784
+ 0.50
2785
+ 2.35
2786
+ 1.65
2787
+ 0.6
2788
+ 0.45
2789
+ 3.4
2790
+ 0.70
2791
+ 2.30
2792
+ 0.5
2793
+ 1.60
2794
+ 0.40
2795
+ 3.2
2796
+ 0.65
2797
+ 0.4
2798
+ 0.35
2799
+ 2.25
2800
+ 1.55
2801
+ 0.60
2802
+ 3.0
2803
+ 0.3
2804
+ 4.50
2805
+ 4.75
2806
+ 5.00
2807
+ 5.25
2808
+ 4.6
2809
+ 4.8
2810
+ 5.0
2811
+ 2.5
2812
+ 3.0
2813
+ 3.5
2814
+ B (M入)
2815
+ B (M^)
2816
+ B (M入)A. Corporaal et al.: What does a typical full-disc around a post-AGB binary look like?
2817
+ Gallardo Cava, I., Gómez-Garrido, M., Bujarrabal, V., et al. 2021, A&A, 648,
2818
+ A93
2819
+ Gielen, C., Cami, J., Bouwman, J., Peeters, E., & Min, M. 2011, A&A, 536, A54
2820
+ Gielen, C., Van Winckel, H., Min, M., Waters, L. B. F. M., & Lloyd Evans, T.
2821
+ 2008, A&A, 490, 725
2822
+ Ginski, C., Stolker, T., Pinilla, P., et al. 2016, A&A, 595, A112
2823
+ Giridhar, S., Lambert, D. L., Reddy, B. E., Gonzalez, G., & Yong, D. 2005, ApJ,
2824
+ 627, 432
2825
+ Gorlova, N., Van Winckel, H., Gielen, C., et al. 2012, A&A, 542, A27
2826
+ Gorlova, N., Van Winckel, H., Ikonnikova, N. P., et al. 2015, MNRAS, 451, 2462
2827
+ Gravity Collaboration, Abuter, R., Accardo, M., et al. 2017, A&A, 602, A94
2828
+ Hillen, M., de Vries, B. L., Menu, J., et al. 2015, A&A, 578, A40
2829
+ Hillen, M., Kluska, J., Le Bouquin, J. B., et al. 2016, A&A, 588, L1
2830
+ Hillen, M., Menu, J., Van Winckel, H., et al. 2014, A&A, 568, A12
2831
+ Hillen, M., Van Winckel, H., Menu, J., et al. 2017, A&A, 599, A41
2832
+ Kamath, D., Wood, P. R., & Van Winckel, H. 2014, MNRAS, 439, 2211
2833
+ Kamath, D., Wood, P. R., & Van Winckel, H. 2015, MNRAS, 454, 1468
2834
+ Kenyon, S. J. & Hartmann, L. 1987, ApJ, 323, 714
2835
+ Kluska, J., Hillen, M., Van Winckel, H., et al. 2018, A&A, 616, A153
2836
+ Kluska, J., Van Winckel, H., Coppée, Q., et al. 2022, A&A, 658, A36
2837
+ Kluska, J., Van Winckel, H., Hillen, M., et al. 2019, A&A, 631, A108
2838
+ Lau, T. C. H., Dr˛a˙zkowska, J., Stammler, S. M., Birnstiel, T., & Dullemond, C. P.
2839
+ 2022, arXiv e-prints, arXiv:2211.04497
2840
+ Le Bouquin, J.-B., Berger, J.-P., Lazareff, B., et al. 2011, A&A, 535, A67
2841
+ Lopez, B., Lagarde, S., Jaffe, W., et al. 2014, The Messenger, 157, 5
2842
+ Lopez, B., Lagarde, S., Petrov, R. G., et al. 2022, A&A, 659, A192
2843
+ Maas, T., Van Winckel, H., & Lloyd Evans, T. 2005, A&A, 429, 297
2844
+ Maas, T., Van Winckel, H., Lloyd Evans, T., et al. 2003, A&A, 405, 271
2845
+ Mathis, J. S., Rumpl, W., & Nordsieck, K. H. 1977, ApJ, 217, 425
2846
+ Min, M., Dullemond, C. P., Dominik, C., de Koter, A., & Hovenier, J. W. 2009,
2847
+ A&A, 497, 155
2848
+ Min, M., Hovenier, J. W., & de Koter, A. 2005, A&A, 432, 909
2849
+ Mulders, G. D. & Dominik, C. 2012, A&A, 539, A9
2850
+ Oomen, G.-M., Van Winckel, H., Pols, O., & Nelemans, G. 2019, A&A, 629,
2851
+ A49
2852
+ Oomen, G.-M., Van Winckel, H., Pols, O., et al. 2018, A&A, 620, A85
2853
+ Palik, E. D. 1991, Handbook of optical constants of solids II
2854
+ Pascucci, I., Testi, L., Herczeg, G. J., et al. 2016, ApJ, 831, 125
2855
+ Pinte, C., Ménard, F., Duchêne, G., et al. 2018, A&A, 609, A47
2856
+ Sahai, R., Claussen, M. J., Schnee, S., Morris, M. R., & Sánchez Contreras, C.
2857
+ 2011, ApJ, 739, L3
2858
+ Segura-Cox, D. M., Schmiedeke, A., Pineda, J. E., et al. 2020, Nature, 586, 228
2859
+ Servoin, J. L. & Piriou, B. 1973, Physica Status Solidi B Basic Research, 55, 677
2860
+ Shakura, N. I. & Sunyaev, R. A. 1973, A&A, 500, 33
2861
+ Sheehan, P. D. & Eisner, J. A. 2018, ApJ, 857, 18
2862
+ Stapper, L. M., Hogerheijde, M. R., van Dishoeck, E. F., & Mentel, R. 2022,
2863
+ A&A, 658, A112
2864
+ van der Marel, N. & Mulders, G. D. 2021, AJ, 162, 28
2865
+ Van Winckel, H. 2003, ARA&A, 41, 391
2866
+ Van Winckel, H. 2017, in Planetary Nebulae: Multi-Wavelength Probes of Stellar
2867
+ and Galactic Evolution, ed. X. Liu, L. Stanghellini, & A. Karakas, Vol. 323,
2868
+ 231–234
2869
+ Van Winckel, H. 2018, arXiv e-prints, arXiv:1809.00871
2870
+ Van Winckel, H., Waelkens, C., & Waters, L. B. F. M. 1995, A&A, 293, L25
2871
+ Vassiliadis, E. & Wood, P. R. 1994, ApJS, 92, 125
2872
+ Woitke, P., Min, M., Pinte, C., et al. 2016, A&A, 586, A103
2873
+ Appendix A: Parametric study
2874
+ Similarly to Figs. 2 and 4, Figs. A.1 and A.2 show variations of
2875
+ the parameters but for those that have no significant impact on
2876
+ the SED, visibilities, and half-light-radii.
2877
+ Appendix B: Applied reddening
2878
+ In our modelling, we fitted the interstellar reddening to the pho-
2879
+ tosphere of the post-AGB star. The total reddening of the star
2880
+ consists of a circumstellar and an interstellar part. The circum-
2881
+ stellar reddening can change from model to model, as the disc
2882
+ geometry changes with different combinations of parameters
2883
+ within our parameters ranges affecting the reddening properties.
2884
+ The circumstellar reddening is taken into account in MCMax3D
2885
+ using the extinction law of the interstellar medium as a function
2886
+ of wavelength and the total opacity of the dust grains used in the
2887
+ models. For each model, the interstellar reddening component is
2888
+ not subject to change substantially, as we look at the disc almost
2889
+ pole-on and no additional structures are placed within the line
2890
+ of sight. Literature values of this interstellar reddening compo-
2891
+ nent show a large range of values due to the galactic latitude of
2892
+ IRAS 08544 of 0.3◦ locating the target close to the galactic plane.
2893
+ Due to the proximity to the galactic plane and the relatively large
2894
+ distance > 1 kpc, interstellar extinction maps do not give reliable
2895
+ results for IRAS 08544. The fitted total line-of-sight reddening,
2896
+ E(B − V), is between 1.36 mag and 1.43 mag for models with an
2897
+ acceptable χ2
2898
+ red,SED (< 90). The E(B − V) reaches values of up to
2899
+ 1.47 mag for a few models with a too flared geometry. Our fami-
2900
+ lies of best-fit models yield a E(B − V) = 1.366−1.38 mag. This
2901
+ is in agreement with the fit of Kluska et al. (2022) as expected
2902
+ for such a pole-on disc.
2903
+ Article number, page 17 of 18
2904
+
2905
+ A&A proofs: manuscript no. main
2906
+ Fig. A.1: Variations of the parameter study for the parameters that do not impact the observables significantly. From top to bottom:
2907
+ variations in amin, the gas-to-dust ratio, and pin
2908
+ Fig. A.2: Half-light-radius variations of the radial emission as a function of wavelength for the parameters that do not have significant
2909
+ effects on the photometric and/or on the interferometric observables. The half-light radii were calculated at the central wavelengths
2910
+ of the H-, K-, L-, and N-bands. Effect of changing amin (left), the gas-to-dust ratio (middle), and pin (right).
2911
+ Article number, page 18 of 18
2912
+
2913
+ V2
2914
+ V2
2915
+ V2
2916
+ Fcorr (ly)
2917
+ 0.9
2918
+ 1.0
2919
+ 10°
2920
+ amin = 0.1 μm
2921
+ 10-6.
2922
+ amin = 0.01 μm
2923
+ 0.8
2924
+ amin = 1.0 μm
2925
+ 0.8
2926
+ 102
2927
+ Data
2928
+ 0.7
2929
+ 10-8
2930
+ s
2931
+ cm-2 s
2932
+ 0.6
2933
+ 0.6
2934
+ 10-2
2935
+ 0.5
2936
+ 0.4
2937
+ 101
2938
+ 0.4
2939
+ 10-3
2940
+ 10-12
2941
+ 0.3
2942
+ 0.2
2943
+ 0.2
2944
+ 10-14
2945
+ 0.0
2946
+ 10-4
2947
+ 1001
2948
+ 100
2949
+ 102
2950
+ 0
2951
+ 20
2952
+ 40
2953
+ 60
2954
+ 80
2955
+ 0
2956
+ 20
2957
+ 40
2958
+ 60
2959
+ 0
2960
+ 10
2961
+ 20
2962
+ 30
2963
+ 0
2964
+ 10
2965
+ Wavelength (μm)
2966
+ B (M入)
2967
+ B (M)
2968
+ B (M入)
2969
+ B (M入)V2
2970
+ V2
2971
+ V2
2972
+ Fcorr (ly)
2973
+ 0.9
2974
+ 1.0
2975
+ 10°
2976
+ 00T = #snp/se6
2977
+ 10-6.
2978
+ 0.8
2979
+ gas/dust = 50
2980
+ 0.8
2981
+ gas/dust = 200
2982
+ 102
2983
+ Data
2984
+ 0.7
2985
+ 10-8
2986
+ s
2987
+ cm-2 s
2988
+ 0.6
2989
+ 0.6
2990
+ 10-2
2991
+ 0.5
2992
+ 0.4
2993
+ 101
2994
+ 0.4
2995
+ 10-3
2996
+ 10-12
2997
+ 0.3
2998
+ 0.2
2999
+ 0.2
3000
+ 10-14
3001
+ 0.0
3002
+ 10-4
3003
+ 1001
3004
+ 10°
3005
+ 102
3006
+ 0
3007
+ 20
3008
+ 40
3009
+ 60
3010
+ 80
3011
+ 0
3012
+ 20
3013
+ 40
3014
+ 60
3015
+ 0
3016
+ 10
3017
+ 20
3018
+ 30
3019
+ 0
3020
+ 5
3021
+ 10
3022
+ Wavelength (μm)
3023
+ B (M入)
3024
+ B (M)
3025
+ B (M入)
3026
+ B (M入)V2
3027
+ V2
3028
+ V2
3029
+ Fcorr (ly)
3030
+ 0.9
3031
+ 1.0
3032
+ 100
3033
+ 10-6,
3034
+ pin = -1.5
3035
+ 0.8
3036
+ pin = -1
3037
+ 0.8
3038
+ 10-
3039
+ 102
3040
+ 0.7
3041
+ Data
3042
+ 10-8
3043
+ s
3044
+ cm-2 s
3045
+ 0.6
3046
+ 0.6
3047
+ 10-2
3048
+ 0.5
3049
+ 101
3050
+ 0.4
3051
+ 10-3
3052
+ 10-12
3053
+ 0.3
3054
+ 0.2
3055
+ 0.2
3056
+ 10-14
3057
+ 0.0
3058
+ 10-4
3059
+ 1001
3060
+ 10°
3061
+ 102
3062
+ 0
3063
+ 20
3064
+ 40
3065
+ 60
3066
+ 80
3067
+ 0
3068
+ 20
3069
+ 40
3070
+ 60
3071
+ 0
3072
+ 10
3073
+ 20
3074
+ 30
3075
+ 0
3076
+ 10
3077
+ 5
3078
+ Wavelength (μm)
3079
+ B (M^)
3080
+ B (M)
3081
+ B (M入)
3082
+ B (M入)24
3083
+ 29.2
3084
+ amin = 0.01 μm
3085
+ amin =0.1 μm
3086
+ 20
3087
+ amin = 1.0 μm
3088
+ 24.4
3089
+ Data
3090
+ 16
3091
+ 19.5
3092
+ hlr (mas)
3093
+ hlr (AU)
3094
+ 12
3095
+ 14.6
3096
+ 8
3097
+ 9.8
3098
+ 4
3099
+ 4.9
3100
+ 0
3101
+ .0.0
3102
+ 0
3103
+ 2
3104
+ 3
3105
+ 4
3106
+ 6
3107
+ 8
3108
+ 10
3109
+ 12
3110
+ Wavelength (μm)24
3111
+ 29.2
3112
+ gas/dust = 100
3113
+ gas/dust = 200
3114
+ 20
3115
+ gas/dust = 50
3116
+ 24.4
3117
+ Data
3118
+ 16
3119
+ 19.5
3120
+ hlr (mas)
3121
+ hlr (AU)
3122
+ 12
3123
+ 14.6
3124
+ 8
3125
+ 9.8
3126
+ 4
3127
+ 4.9
3128
+ 0
3129
+ .0.0
3130
+ 0
3131
+ 2
3132
+ 3
3133
+ 4
3134
+ 6
3135
+ 8
3136
+ 10
3137
+ 12
3138
+ Wavelength (μum)24
3139
+ 29.2
3140
+ pin = -1.5
3141
+ Pin = -1
3142
+ 20
3143
+ 24.4
3144
+ pin = -2
3145
+ Data
3146
+ 16
3147
+ 19.5
3148
+ hlr (mas)
3149
+ hlr (AU)
3150
+ 12
3151
+ 14.6
3152
+ 8
3153
+ 9.8
3154
+ 4
3155
+ 4.9
3156
+ 0
3157
+ .0.0
3158
+ 0
3159
+ 2
3160
+ 3
3161
+ 4
3162
+ 6
3163
+ 8
3164
+ 10
3165
+ 12
3166
+ Wavelength (μm)
59E0T4oBgHgl3EQfvwFr/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5tFIT4oBgHgl3EQf8CtK/content/tmp_files/2301.11400v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
5tFIT4oBgHgl3EQf8CtK/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
7tE4T4oBgHgl3EQf2g0r/content/tmp_files/2301.05298v1.pdf.txt ADDED
@@ -0,0 +1,2262 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Open Case Studies: Statistics and Data Science Education
2
+ through Real-World Applications
3
+ Carrie Wright1, Qier Meng1, Michael R. Breshock2, Lyla Atta2, Margaret A. Taub 1, Leah R.
4
+ Jager 1, John Muschelli 1,3, and Stephanie C. Hicks1,*
5
+ 1Department of Biostatistics, Johns Hopkins Bloomberg School of Public Health
6
+ 2Department of Biomedical Engineering, Johns Hopkins University
7
+ 3Streamline Data Science
8
+ *Correspondence to [email protected]
9
+ Abstract
10
+ With unprecedented and growing interest in data
11
+ science education, there are limited educator materials
12
+ that provide meaningful opportunities for learners
13
+ to practice statistical thinking, as defined by Wild and
14
+ Pfannkuch [1], with messy data addressing real-world
15
+ challenges.
16
+ As a solution, Nolan and Speed [2] ad-
17
+ vocated for bringing applications to the forefront in
18
+ undergraduate statistics curriculum with the use of
19
+ in-depth case studies to encourage and develop statistical
20
+ thinking in the classroom. Limitations to this approach
21
+ include the significant time investment required to
22
+ develop a case study – namely, to select a motivating
23
+ question and to create an illustrative data analysis –
24
+ and the domain expertise needed.
25
+ As a result, case
26
+ studies based on realistic challenges, not toy examples,
27
+ are scarce.
28
+ To address this, we developed the Open
29
+ Case Studies (opencasestudies.org) project,
30
+ which
31
+ offers a new statistical and data science education
32
+ case study model.
33
+ This educational resource pro-
34
+ vides self-contained, multimodal, peer-reviewed, and
35
+ open-source guides (or case studies) from real-world
36
+ examples for active experiences of complete data
37
+ analyses. We developed an educator’s guide describing
38
+ how to most effectively use the case studies, how to
39
+ modify and adapt components of the case studies in
40
+ the classroom, and how to contribute new case studies.
41
+ (opencasestudies.org/OCS Guide).
42
+ Keywords: applied statistics, data science, statistical
43
+ thinking, case studies, education, computing
44
+ 1
45
+ Introduction
46
+ A major challenge in the practice of teaching data sci-
47
+ ence and statistics is the limited availability of courses
48
+ and course materials that provide meaningful opportu-
49
+ nities for students to practice and apply statistical think-
50
+ ing, as defined by Wild and Pfannkuch [1], with messy
51
+ data addressing real-world challenges across diverse
52
+ context domains. To address this problem, Nolan and
53
+ Speed [2] presented a model for developing case studies
54
+ (also known as ‘labs’) for use in undergraduate statistics
55
+ courses with a specific goal to “encourage and develop
56
+ statistical thinking”. Specifically, the model calls for each
57
+ case study to be:
58
+ “a substantial exercise with nontrivial solu-
59
+ tions that leave room for different analyses,
60
+ and for it to be a central part of the course. The
61
+ lab should offer motivation and a framework
62
+ for studying theoretical statistics, and it should
63
+ give students experience with how statistics
64
+ can be used to answer scientific questions. An
65
+ important goal of this approach is to encourage
66
+ and develop statistical thinking while impart-
67
+ ing knowledge in mathematical statistics.” [2]
68
+ In 2018, Hicks and Irizarry [3] stated that one of their
69
+ five principles for teaching data science was to “organize
70
+ the course around a set of diverse case studies” based
71
+ on the model by Nolan and Speed [2], with a goal of
72
+ practicing statistical thinking and bringing real-world
73
+ applications into the classroom. Case studies are also
74
+ being used in the classroom across a diverse set of fields,
75
+ including statistics [4–8], evolutionary biology [9], engi-
76
+ neering [10], and environmental science [11].
77
+ However, there are several limiting factors to scal-
78
+ ing up the use of case studies.
79
+ First, the process of
80
+ selecting motivating questions [12], finding real-world
81
+ and motivating data [13, 14], describing the context
82
+ around the data [15, 16], and preparing diverse didactic
83
+ data analyses requires a large initial investment in time
84
+ and effort [3]. Second, the individuals who are most
85
+ primed to develop effective and insightful case studies
86
+ are practitioner-instructors [17], or practicing applied
87
+ statisticians and data scientists, who teach and practice
88
+ in a field-specific context. For these individuals, success-
89
+ Wright et al. | 2023 | arXiv |
90
+ Page 1
91
+ arXiv:2301.05298v1 [stat.AP] 12 Jan 2023
92
+
93
+ fully constructing a diverse set of case studies across a
94
+ wide range of contextual topics may require collabora-
95
+ tion with individuals in other disciplines; this can be
96
+ hard without protected time and effort from their aca-
97
+ demic institutions [18]. Third, while there are rich repos-
98
+ itories of data sets [7], there are few collections of as-
99
+ sociated data analyses that show how the data can be
100
+ used to demonstrate fundamental data science and sta-
101
+ tistical concepts, potentially with unexpected outcomes
102
+ [19]. This is especially true for complex and messy data,
103
+ where analysis decisions must go beyond what can be
104
+ summarized in a brief summary about the data, such as
105
+ a README ��le [20, 21]. These challenges have resulted
106
+ in a scarcity of case studies based on real-world chal-
107
+ lenges instead of simple toy examples. Moreover, many
108
+ data repositories have different recommended process-
109
+ ing and analysis of subsets of data, which are commonly
110
+ used as ”the” analysis, without proper discussion of al-
111
+ ternative choices along the research pathway.
112
+ To address these challenges, we developed an open-
113
+ source educational resource, the Open Case Studies
114
+ (OCS) project (opencasestudies.org). This resource con-
115
+ tains in-depth, self-contained, multimodal, and peer-
116
+ reviewed experiential guides (or case studies) that
117
+ demonstrate illustrative data analyses covering a di-
118
+ verse range of statistical and data science topics to teach
119
+ learners how to effectively derive knowledge from data.
120
+ These guides can be used by instructors to bring appli-
121
+ cations to the forefront in the classroom or they can be
122
+ used by independent learners outside of the classroom.
123
+ Finally, we developed an educator’s guide describing
124
+ how to most effectively use the case studies, how to
125
+ modify and adapt components of the case studies in
126
+ the classroom, and how to contribute new case studies.
127
+ (opencasestudies.org/OCS Guide).
128
+ The rest of the manuscript is as follows. First, we pro-
129
+ vide an overview and discuss individual components of
130
+ the Open Case Studies model (Section 2), a new model
131
+ that extends the [2] case studies model. Second, we
132
+ describe the Open Case Studies educational resource
133
+ (Section 3). Third, we give guidance based on our expe-
134
+ rience about how others can create their own case stud-
135
+ ies (Section 4), including how to create interactive case
136
+ studies. We conclude with a summary about the utility
137
+ of such case studies inside and outside of the classroom
138
+ (Section 5).
139
+ 2
140
+ Putting OCS model into practice
141
+ 2.1
142
+ An overview of the Open Case Studies model
143
+ The case-studies model described by Nolan and Speed
144
+ [2] divides each case study into five main components:
145
+ (i) introduction, (ii) data description, (iii) background,
146
+ (iv) investigations, and (v) theory, with an optional sec-
147
+ tion for advanced analyses or related theoretical mate-
148
+ rial. In our Open Case Studies (OCS) model, we expand
149
+ upon these components to thirteen components. Table 1
150
+ describes the components of the OCS model as well as
151
+ the mapping between our model and the original model
152
+ of Nolan and Speed [2].
153
+ We highlight that while the structures of the two case-
154
+ study models are similar, our OCS model has a different
155
+ purpose than the one proposed by Nolan and Speed [2].
156
+ Briefly, Nolan and Speed [2] designed case studies to be
157
+ either (i) used in open-ended discussions in lecture or
158
+ (ii) used as open-ended lab exercises where students do
159
+ extensive analyses outside of class and write reports con-
160
+ taining their observations and solutions. In both appli-
161
+ cations, the case studies are designed to be open-ended;
162
+ the background may be initially discussed in class or
163
+ as part of an assignment, but students work indepen-
164
+ dently or in a group to create their own solutions and
165
+ summarize their own findings in a full-length report to
166
+ answer the original question. In contrast, we made a
167
+ design choice to build case studies that are full-length,
168
+ in-depth experiential guides that walk learners through
169
+ the entire process of data analysis, with an emphasis on
170
+ computing [22], starting from a motivating question and
171
+ ending with a summary of the results. Our goal is for
172
+ educators either to directly use an entire case study in
173
+ the classroom or to adapt a subset of the material for
174
+ their use. For example, an educator can choose to show
175
+ the solutions provided in the case study, show a differ-
176
+ ent solution, or leave the discussion open-ended. Our
177
+ reasoning for providing full-length guides is that it is
178
+ typically easier for an educator to remove or modify ma-
179
+ terial instead of creating it from scratch. In this way,
180
+ we aim to reach a broader audience than just educators
181
+ in a classroom, as any learner interested in a particular
182
+ topic can walk through the case study to see an example
183
+ of a complete data analysis. In addition, this method is
184
+ particularly helpful for instructors who may not feel con-
185
+ fident creating an analysis from scratch, especially if it is
186
+ outside their main area of expertise, as our case studies
187
+ built with domain experts and are peer-reviewed.
188
+ 2.2
189
+ Components of the Open Case Studies model
190
+ We will describe the thirteen individual components
191
+ of our Open Case Studies model (Table 1) using one
192
+ case study as an example.
193
+ Currently all of our case
194
+ studies showcase how to use the R statistical program-
195
+ ming language [23] for data analyses, although other
196
+ programming languages could be used with our model.
197
+ Here, we use the “Exploring CO2 emissions across time”
198
+ case study (opencasestudies.org/ocs-bp-co2-emissions),
199
+ which explores global and country level carbon dioxide
200
+ (CO2) emissions from the 1700s to 2014 (Figure 1). This
201
+ case study also investigates how CO2 emission rates
202
+ may relate to increasing temperatures and increasing
203
+ rates of natural disasters in the United States (US). We
204
+ also describe four other case studies (Table 2) and give
205
+ Wright et al. | 2023 | arXiv |
206
+ Page 2
207
+
208
+ Mapping of components between two case study models
209
+ Open Case Studies model
210
+ Case-study model of Nolan and Speed [2]
211
+ Component
212
+ Description
213
+ Component
214
+ Description
215
+ 1. Motivation
216
+ Motivating figure and text at the start of
217
+ the case study
218
+ 2. Main questions
219
+ Scientific question(s)
220
+ Introduction
221
+ Describes context of scientific
222
+ question and motivation
223
+ 3. Learning objectives
224
+ Both data science and statistics learning
225
+ objectives
226
+ 4. Context
227
+ Context of question(s) or data
228
+ 5. Limitations
229
+ Any limitations in case study or with
230
+ data used
231
+ Background
232
+ Information to put question in
233
+ context using non-technical
234
+ language
235
+ 6. What are the data?
236
+ Summary of where the data came from
237
+ and what the data contain
238
+ Data description
239
+ Documentation for data collected
240
+ to address the question
241
+ 7. Data import
242
+ Analyses for importing data
243
+ 8. Data wrangling and ex-
244
+ ploration
245
+ Analyses for wrangling and exploring
246
+ the data
247
+ 9. Data visualization
248
+ Analyses for data visualization
249
+ Investigations
250
+ Suggestions for answering the
251
+ question (varies in difficulty)
252
+ 10. Data analysis
253
+ Analyses containing statistical concepts
254
+ and methods to answer question(s)
255
+ Theory
256
+ Describes relevant statistical con-
257
+ cepts and methodologies to answer
258
+ the question
259
+ 11. Summary
260
+ Summary of results
261
+ 12. Suggested homework
262
+ Question(s) to explore further
263
+ 13. Additional information
264
+ Helpful links or packages used
265
+ Extended material
266
+ (optional)
267
+ Describes advanced analyses or
268
+ related theoretical material
269
+ Table 1. Components of an Open Case Study Descriptions of the components of our Open Case Studies
270
+ model (left) and their mapping to the components of the case studies model proposed by Nolan and Speed [2]
271
+ (right). We note that the model from Nolan and Speed [2] orders ‘Data description’ before ‘Background’.
272
+ However, Background is listed first here to more easily map to our Open Case Studies model.
273
+ example topics covered in all case studies (Table S1).
274
+ 1. Motivation. Each case study begins with a motivating
275
+ data visualization. This idea originated from Dr. Mine
276
+ C¸ etinkaya-Rundel’s talk entitled ‘Let Them Eat Cake
277
+ (First)!’, presented at the Harvard University Statistics
278
+ Department’s 2018 David K. Pickard Memorial Lecture
279
+ [24]. She argues that, similar to a recipe book about bak-
280
+ ing cakes, showing a learner a visualization first can be
281
+ motivating and give learners a sense of what they will
282
+ be doing. This practice of showing a visualization at the
283
+ start of a data analysis and then showing learners the
284
+ code for how to produce the data visualization enables
285
+ the learners to have a better sense of the final product
286
+ and can be motivating to learn the more challenging con-
287
+ cepts needed to make the visualization.
288
+ The motivating figure from the CO2 emissions case
289
+ study (Figure 1) is reproduced here. In the case studies,
290
+ we also include text explaining the motivation for the
291
+ case study.
292
+ Our case studies are often motivated by
293
+ a recent report or publication investigating a specific
294
+ scientific question. In this section, we explain why the
295
+ topic is of interest and define any terms that are needed
296
+ to understand the main questions of interest (described
297
+ in the next section).
298
+ 2. Main questions. In this section, we highlight and ex-
299
+ plicitly state a precise set of scientific question(s) or prob-
300
+ lem(s) before beginning the analysis [25]. When the case
301
+ study is motivated by a previous publication, these ques-
302
+ tions may not be exactly the same as what was originally
303
+ investigated in the paper or report. For example, a case
304
+ study may only investigate a small subset of the results
305
+ presented in the report or publication. Alternatively, a
306
+ case study may not investigate the same question(s) at
307
+ all, but rather use the data from the report or publication
308
+ to demonstrate a specific data science or statistics learn-
309
+ ing objective. This framework also reiterates that many
310
+ problems have a set of questions prior to analysis; find-
311
+ ing an answer and engineering the question post-doc
312
+ is not recommended. Data exploration is a large com-
313
+ ponent of the analysis framework and is shown in case
314
+ studies, but OCS impresses thoughtful questions should
315
+ be determined prior to analysis.
316
+ In the CO2 emissions case study, the scientific ques-
317
+ tions are:
318
+ 1. How have global CO2 emission rates changed over
319
+ time? In particular for the US, and how does the US
320
+ compare to other countries?
321
+ 2. Are CO2 emissions in the US, global temperatures,
322
+ and natural disaster rates in the US associated?
323
+ 3. Learning objectives. Each case study consists of a
324
+ set of didactic learning objectives. We categorize each
325
+ objective as related to either (i) data science or (ii) statis-
326
+ tics where the latter are concepts traditionally taught in
327
+ a statistics curriculum such as linear regression, multi-
328
+ ple testing correction, significance and the former are
329
+ Wright et al. | 2023 | arXiv |
330
+ Page 3
331
+
332
+ Figure 1. Example of a motivating figure in the “Exploring CO2 emissions across time” case study The complete case
333
+ study can be found at (opencasestudies.org/ocs-bp-co2-emissions). Top row: Line plot showing the increase in CO2
334
+ emissions over time (left). Longitudinal heatmap plot highlighting that the US has been one of the top emission
335
+ producing countries historically and currently (right). Bottom row: Scatter plots showing the trends between CO2
336
+ emissions and temperature across time.
337
+ concepts often appearing outside of a traditional statis-
338
+ tics course, such as re-coding data values, scraping data
339
+ from a website, or creating a dashboard for a data set.
340
+ Other categories could be considered depending on the
341
+ purpose of the case study. This separation also allows
342
+ for educators to adapt the material to other computa-
343
+ tional frameworks and languages other than R, such as
344
+ Python.
345
+ We include these learning objectives for three reasons:
346
+ (i) to help educators select a case study that meets the ob-
347
+ jectives they want to teach and (ii) to help learners select
348
+ a case study that demonstrates what they want to learn,
349
+ and (iii) to provide both educators and learners with a
350
+ clear understanding about the goals of a particular case
351
+ study. For example, a study of the use of learning ob-
352
+ jectives in an undergraduate science course found that
353
+ students find learning objectives helpful for narrowing
354
+ and organizing their studying [26].
355
+ For the CO2 emissions case study, we designed the
356
+ case study around the following learning objectives:
357
+ (i) Data Science Learning Objectives:
358
+ • Importing data from various types of Excel files and
359
+ CSV files
360
+ • Apply action verbs in dplyr [27] for data wran-
361
+ gling
362
+ • How to pivot between “long” and “wide” data sets
363
+ • Joining together multiple datasets using dplyr
364
+ • How to create effective longitudinal data visualiza-
365
+ tions with ggplot2 [28]
366
+ • How to add text, color, and labels to ggplot2 plots
367
+ • How to create faceted ggplot2 plots
368
+ (ii) Statistical Learning Objectives:
369
+ • Correlation coefficient as a summary statistic
370
+ Wright et al. | 2023 | arXiv |
371
+ Page 4
372
+
373
+ World CO2 Emissions per Year (1751-2014)
374
+ Top 10 CO2 Emission-producing Countries
375
+ Ordered by Emissions Produced in 2014
376
+ Emissions (Metric Tonnes)
377
+ China
378
+ 3e+07
379
+ United States:
380
+ India
381
+ Russia
382
+ 2e+07
383
+ Japan
384
+ Germany
385
+ 1e+07
386
+ Iran
387
+ Saudi Arabia -
388
+ South Korea'
389
+ 0e+00.
390
+ Canada
391
+ 1800
392
+ 1900
393
+ 2000
394
+ 50
395
+ 5
396
+
397
+ 5
398
+ 05050
399
+ 7
400
+ 80
401
+ 9900
402
+ 7
403
+ 99-
404
+ 9
405
+ 9
406
+ 9
407
+ gg~
408
+ 99
409
+ 0
410
+ Year
411
+ Limited to reporting countries
412
+ Ln(CO2 Emissions (Metric Tonnes))
413
+ 8
414
+ US CO2 Emissions and Temperature (1980-2014)
415
+ CO2 Emissions (Metric Tons)
416
+ 5500000
417
+ (Fahrenheit)
418
+ 2
419
+ 5000000
420
+ 4500000
421
+ Temperature
422
+ Temperature (Fahrenheit)
423
+ 55
424
+ 0
425
+ 54 -
426
+ led
427
+ 53
428
+ S
429
+ 52
430
+ .
431
+ 2
432
+ 1980
433
+ 1985
434
+ 1990
435
+ 1995
436
+ 2000
437
+ 2005
438
+ 2010
439
+ -2
440
+ .1
441
+ 0
442
+ Scaled Emissions (Metric Tonnes)Example case studies in the OCS resource
443
+ Topic
444
+ Question(s)
445
+ Data source(s)
446
+ Raw data
447
+ Data science skills
448
+ Statistical concepts
449
+ Air Pollution
450
+ [html]
451
+ Can we predict annual fine
452
+ particulate air pollution
453
+ concentrations using
454
+ predictors such as
455
+ population density,
456
+ urbanization, and satellite
457
+ data?
458
+ Gravimetric EPA air
459
+ pollution data (from
460
+ 2008) and predictor data
461
+ from NASA, the US
462
+ Census, and NCHS
463
+ Single
464
+ curated CSV
465
+ file
466
+ tidymodels, correlation
467
+ visualizations,
468
+ geospatial visualizations
469
+ machine learning, linear
470
+ regression, random
471
+ forest
472
+ Vaping [html]
473
+ How has tobacco / nicotine
474
+ product use by American
475
+ youths changed since 2015?
476
+ Is there a relationship
477
+ between e-cigarette /
478
+ vaping use and other
479
+ tobacco / nicotine product
480
+ use?
481
+ NYTS 2015-2019 survey
482
+ data
483
+ Excel files
484
+ and
485
+ codebooks
486
+ for each year
487
+ importing Excel files,
488
+ importing multiple files
489
+ efficiently, merging data,
490
+ writing functions,
491
+ functional
492
+ programming,
493
+ longitudinal
494
+ visualizations
495
+ survey weighting,
496
+ logistic regression with
497
+ survey weighting,
498
+ longitudinal data,
499
+ codebooks
500
+ CO2
501
+ Emissions
502
+ [html]
503
+ How have global CO2
504
+ emission rates changed
505
+ over time? In particular for
506
+ the US, and how does the
507
+ US compare to other
508
+ countries? // Are CO2
509
+ emissions in the US, global
510
+ temperatures, and natural
511
+ disaster rates in the US
512
+ associated?
513
+ CO2 emissions (from
514
+ 1751-2019, GDP and
515
+ energy use data from
516
+ gapminder. US
517
+ temperature and disaster
518
+ data form the NOAA
519
+ XLSX and
520
+ CSV files
521
+ importing data from
522
+ Excel files and CSV files,
523
+ data joining,
524
+ longitudinal data
525
+ visualizations, plots
526
+ with text and labels
527
+ correlation coefficient,
528
+ relationship between
529
+ correlation and linear
530
+ regression, correlation
531
+ vs. causation
532
+ US School
533
+ Shootings
534
+ [html]
535
+ What has been the yearly
536
+ rate of school shootings
537
+ and where in the country
538
+ have they occurred in the
539
+ last 50 years (from January
540
+ 1970 to June 2020)?
541
+ Open-source K-12 school
542
+ shooting database
543
+ (1970-2020)
544
+ single CSV
545
+ file, Google
546
+ sheets
547
+ importing Google sheets,
548
+ date formats, geocoding,
549
+ interactive tables, R
550
+ Markdown, maps,
551
+ interactive dashboards
552
+ calculating percentages
553
+ for data with missing
554
+ values
555
+ Table 2. Description of four example case studies in the OCS resource This table shows the topics covered
556
+ in four individual case studies, as well as information about the raw data. EPA = the US Environmental
557
+ Protection Agency, NASA = National Aeronautics and Space Administration, and NCHS = the National
558
+ Center for Health Statistics, NYTS = the National Youth Tobacco Survey, NOAA = National Oceanic and
559
+ Atmospheric Administration. CO2 emission data obtained from gapminder was originally from the World
560
+ Bank. School Shooting data was obtained from the Center for Homeland Defense and Security at the at the
561
+ Naval Postgraduate School (NPS).
562
+ • Relationship between correlation, linear regression
563
+ • Correlation is not causation
564
+ In addition, by stating these objectives within the
565
+ case studies, students may begin identify how they can
566
+ apply these concepts for future analyses. Finally, we
567
+ provide an interactive search table of learning objectives
568
+ on the Open Case Studies website (opencasestudies.org)
569
+ to make it easier to find a case study that would
570
+ demonstrate a particular technique, method, or concept
571
+ that an instructor or learner might be interested in.
572
+ 4. Context. The context section provides background
573
+ information needed to understand the context of the
574
+ question(s) of interest and the data that will be used to
575
+ answer the questions [15, 16]. This may include infor-
576
+ mation from the publication on which the case study is
577
+ based, but also additional background literature. For an
578
+ example from public health, the case study may describe
579
+ what is currently known (or not known) about the health
580
+ impact of the topic. This serves to demonstrate how the
581
+ specific question(s) fit into a larger scientific context.
582
+ For the CO2 case study, the context section includes
583
+ a discussion of the potential impacts of climate change
584
+ on human health, an overview of the likely progression
585
+ of warming in the coming years, and potential impacts
586
+ on other components of the environment such as ocean
587
+ acidity and rainfall quantities.
588
+ 5. Limitations. In addition to the motivation and context
589
+ for each case study, it is important to formally describe
590
+ limitations of the analysis presented as it provides im-
591
+ portant context for the educator or learner [7]. Examples
592
+ of limitations include (i) limitations due to the available
593
+ data, such as the use of surrogate variables or indica-
594
+ tors, (ii) limitations in the methods used, such as annual
595
+ average estimates for quantities that are likely to vary
596
+ daily or monthly, and (iii) selection biases due to sam-
597
+ pling of observed data. A key concept in data science
598
+ is that the conclusions from an analysis can only be as
599
+ good as the data that go into it and the methods used to
600
+ analyze them, so presenting these limitations provides
601
+ a valuable learning opportunity.
602
+ In the CO2 case study, we describe limitations about
603
+ how the data are incomplete because only certain
604
+ countries reported CO2 emissions for certain years. We
605
+ describe how additional emissions were also produced
606
+ Wright et al. | 2023 | arXiv |
607
+ Page 5
608
+
609
+ by countries that are not included in the data.
610
+ This
611
+ helps the learners to understand that while the data will
612
+ help us understand CO2 emissions, it will not provide
613
+ the full picture.
614
+ 6. What are the data? To provide transparency about the
615
+ data sources, we describe where and how the raw data
616
+ were obtained and used in the case study. If the data are
617
+ obtained from a website, survey or report, and where
618
+ possible, we also describe how the data were originally
619
+ collected. We typically describe what the variables are
620
+ in each dataset later in the case study to better match
621
+ the experience of the learners discovering the data after
622
+ they import and explore it.
623
+ The data sources for the CO2 case study are from
624
+ Gapminder (gapminder.org) (originally from the World
625
+ Bank) and the United States National Oceanic and
626
+ Atmospheric Administration.
627
+ In the case study, we
628
+ present a table with the different data sources and a
629
+ brief description of each one, including sources to cite.
630
+ 7. Data import. Next, we describe the steps and give
631
+ the code required to read the raw data into the analy-
632
+ sis environment. Currently, all of our case studies de-
633
+ scribe analyses in the R programming language. In some
634
+ cases, importing the raw data is fairly straightforward,
635
+ and this section is quite short. Other case studies have
636
+ longer and more involved data import sections that in-
637
+ volve scraping data from a PDF, accessing data using
638
+ an Application Programming Interface (API), or writing
639
+ functions to efficiently access data from multiple files
640
+ with the same format. Importantly, we describe all of
641
+ our use of code in the case studies in a literate program-
642
+ ming way [29], meaning that we describe each step in a
643
+ way that can be understandable by learners.
644
+ Since the data for the CO2 case study are stored in
645
+ Excel and comma-separated-variable (CSV) files, we use
646
+ standard data import functions read excel() from
647
+ the readxl package and read csv() from the readr
648
+ R package [30] to import our data.
649
+ 8. Data wrangling and exploration. Typically one of the
650
+ longest sections for many of our case studies is the wran-
651
+ gling section, which describes all of the steps required to
652
+ take the imported raw data and get it into a state that is
653
+ ready for analysis and creating visualizations. We also
654
+ demonstrate how to perform exploratory data analysis
655
+ [31].
656
+ For example in the CO2 case study, the raw data needs
657
+ to be converted from a “wide” to “long” format so that
658
+ each country-year observation is in a single row. After
659
+ wrangling the data from each source, we demonstrate
660
+ how to join together data sets from different sources by
661
+ matching on country-year combinations. Ultimately, we
662
+ create one large data set containing all the variables we
663
+ want to use for our analysis (in the columns) with one
664
+ record for each country-year combination (in the rows).
665
+ 9. Data visualization. We show both simple and com-
666
+ plex data visualizations to explore and demonstrate a
667
+ variety of graphical design choices, including plot type
668
+ and other aesthetic choices to best show the types of vari-
669
+ ables of interest. In addition, most case studies describe
670
+ how to facet or combine plots together so that all the ma-
671
+ jor findings of the case study are illustrated in a single
672
+ data visualization.
673
+ In the CO2 case study, we create data visualizations
674
+ for a subset of the variables. For example, we use line
675
+ plots to visualize how CO2 emissions, in metric tons,
676
+ have varied over time globally (Figure 1). We go into
677
+ detail around coloring and labeling the lines, zooming
678
+ in and out on the time-scale axis, as well as including
679
+ informative plot titles and axis labels. We demonstrate
680
+ that when looking at CO2 emissions from different
681
+ countries across time, special consideration for labeling
682
+ is required. We show that a heat map or tile plot does a
683
+ great job of illustrating top country differences in a less
684
+ overwhelming manner (Figure 1). We also demonstrate
685
+ the utility of faceted plots to simultaneously visualize
686
+ more variables over time. We also show how to start
687
+ looking for associations or trends in the data through
688
+ scatter plots with smoothed lines or linear regression
689
+ lines added.
690
+ 10. Data analysis. Our case studies are intended to intro-
691
+ duce how a particular statistical test or data science tech-
692
+ nique might be implemented and interpreted to answer
693
+ the scientific question(s) of interest. However, we walk
694
+ the learner through an unexpected outcome and how we
695
+ diagnosed it [19]. We provide background information
696
+ about statistical concepts and how these concepts apply
697
+ to our example analysis.
698
+ The main topic of the analysis section for our CO2
699
+ emissions Open Case Study is correlation and how
700
+ correlation is related to linear regression.
701
+ We dis-
702
+ cuss background information such as a description
703
+ about what summary statistics are, what the correlation
704
+ coefficient is, and how the correlation coefficient is math-
705
+ ematically calculated. We also describe the limitations
706
+ of correlation analysis and how correlation does not
707
+ imply causation. We demonstrate how to implement as-
708
+ sessments of correlation and how to interpret the results.
709
+ 11. Summary. In this section we provide a summary fig-
710
+ ure that visually indicates some of the major findings of
711
+ the case study. The goal of this visualization is to demon-
712
+ strate how to communicate the results of the analysis to
713
+ a broader audience [6]. This often involves combining
714
+ plots and adding annotations. This summary figure is
715
+ the motivating figure used at the beginning of the case
716
+ study. Along with this figure, we provide a synopsis
717
+ of the case study in which the motivation, context, and
718
+ Wright et al. | 2023 | arXiv |
719
+ Page 6
720
+
721
+ scientific questions are restated and summarized, while
722
+ the major steps of wrangling, data exploration, and anal-
723
+ ysis are described. The main findings of the analysis are
724
+ discussed, with emphasis on what these findings might
725
+ indicate for the larger context of the scientific question,
726
+ in addition to what still remains unknown.
727
+ In the CO2 emissions Open Case Study, the summary
728
+ figure (Figure 1) combines several of the plots from the
729
+ case study together to demonstrate the major findings.
730
+ The synopsis recaps what data we worked with (CO2
731
+ emissions for some countries from 1751- 2014) and what
732
+ we have shown in the analysis, including touching on
733
+ the learning objectives outlined at the beginning. We
734
+ give a simpler explanation about the statistical concepts
735
+ that were discussed in the analysis section, in this case
736
+ about correlation and regression.
737
+ We discuss more
738
+ about what we were able to answer or not answer in
739
+ terms of the questions of interest. We describe how we
740
+ discovered a dramatic increase in global CO2 emissions
741
+ over time and that some countries appear to be espe-
742
+ cially responsible. We discuss that although the data
743
+ suggests a relationship between temperature and CO2
744
+ emissions in the US, there are many other important fac-
745
+ tors to consider based on what we know about climate
746
+ change. These include: the influence of CO2 emissions
747
+ from other countries in the atmosphere, the influence of
748
+ other greenhouse gases, the fact that the already existing
749
+ CO2 in the atmosphere continues to trap heat for many
750
+ years, and the fact that heat trapped in the ocean
751
+ due to previous emissions causes delayed changes
752
+ in surface temperatures. We also point out what the
753
+ results of our analysis might mean for how we should
754
+ consider mitigating climate change effects and how
755
+ warming temperatures may impact society in the future.
756
+ 12. Suggested homework.
757
+ Each case study suggests
758
+ a homework activity for students to try on their own.
759
+ These activities typically require the students to use the
760
+ skills that they have learned on a new data set or to
761
+ expand the analysis to evaluate another subset of the
762
+ data. Students may also be asked to make visualizations
763
+ based on these analyses.
764
+ The suggested homework for the CO2 emissions Open
765
+ Case Study are to:
766
+ • Create a plot with labels showing the countries with
767
+ the lowest CO2 emission levels.
768
+ • Plot CO2 emissions and other variables (e.g. energy
769
+ use) on a scatter plot, calculate the Pearson’s corre-
770
+ lation coefficient, and discuss results.
771
+ These suggestions would require learners to practice
772
+ their visualization an analytic skills to further investi-
773
+ gate the data with less guidance.
774
+ 13. Additional information. This section includes addi-
775
+ tional information about the broader scientific topic of
776
+ the case study, the methods used to analyze the data,
777
+ and the specific data sets used in the analysis. Infor-
778
+ mation is provided as links to external online resources
779
+ such as blog posts, scientific articles, scientific reports,
780
+ and educational websites. We also provide links to doc-
781
+ umentation about the R packages used, as well as the
782
+ specific package versions that were used. We also link
783
+ to information about the specific subject-matter experts
784
+ who contributed to the development of the case study.
785
+ The CO2 emissions Open Case Study includes links
786
+ to resources for learning more about the various R pack-
787
+ ages used in the case study (such as here [32], readxl
788
+ [33], readr [30], dplyr [27], magrittr [34], stringr
789
+ [35], purrr [36], tidyr [37], tibble [38], forcats
790
+ [39], ggplot2 [28], directlabels [40], ggrepel [41],
791
+ broom [42], patchwork [43]) and how they were
792
+ used, as well as information about the statistical topics
793
+ touched on, including correlation, regression and time
794
+ series analysis. These go beyond some of the material
795
+ presented in the case study, to help point instructors or
796
+ learners to additional resources for topics of interest.
797
+ 3
798
+ The OCS educational resource
799
+ The OCS resource can be found online (opencasestud-
800
+ ies.org). In addition, we created an educator’s guide
801
+ describing how to most effectively use the case studies,
802
+ how to modify and adapt components of the case stud-
803
+ ies in the classroom, and how to contribute new case
804
+ studies. (opencasestudies.org/OCS Guide).
805
+ 3.1
806
+ Open Case Study website and search tool
807
+ Our case study resource is hosted on our Open Case
808
+ Studies (OCS) website (Figure 2). To navigate the case
809
+ studies, we provide an interactive search table, built us-
810
+ ing the DT package [44], that allows those interested to
811
+ search through our case studies by topic, statistical learn-
812
+ ing objective, data science learning objective, and R pack-
813
+ ages demonstrated. This table includes links to the code
814
+ and data for each case study, as well as a links to web-
815
+ sites that are rendered versions of each case study where
816
+ the entire analysis can be read in full.
817
+ 3.2
818
+ Open Case Studies on GitHub
819
+ The code and data for each case study are hosted in
820
+ a GitHub repository (Figure 2). Our case studies are
821
+ built in R Markdown, allowing text, images, and gifs
822
+ that describe the context and data analytic process to
823
+ be interspersed with code chunks that show the actual
824
+ code used in the analysis [29].
825
+ We developed these
826
+ prior to the release of the quarto publishing system
827
+ (quarto.org/quarto). These case studies are then “knit”
828
+ into rendered html-formatted files using GitHub actions
829
+ [45] for continuous integration and deployment. By con-
830
+ tinuous integration, we mean that changes are tracked
831
+ Wright et al. | 2023 | arXiv |
832
+ Page 7
833
+
834
+ Figure 2. An overview of the OCS educational resource The Open Case Studies website contains a searchable database
835
+ of all available case studies. Users can search by case study name, R packages used, learning objectives, and category.
836
+ Each case study links to a website with a rendered version of the entire analysis and to the Github repository. The Github
837
+ repository hosts the online lesson and all of the related code, data, image, plot, and document files needed to follow along
838
+ or conduct new analyses. Some case studies now have interactive versions that include live quizzes and coding tutorials.
839
+ Wright et al. | 2023 | arXiv |
840
+ Page 8
841
+
842
+ Open Case Studies: Mental Health of American
843
+ Code-
844
+ opencasestudies.org
845
+ Youth
846
+ OPEN
847
+ CASE
848
+ STUDIES
849
+ Thepe
850
+ e episodes (MDE) has
851
+ OPEN
852
+ CASE
853
+ STUDIES
854
+ Show10 entries
855
+ Search:
856
+ GitHub
857
+ Case Study
858
+ Packages
859
+ Objectives
860
+ Category
861
+ Repository
862
+ mental
863
+ All
864
+ All
865
+ All
866
+ All
867
+ Scrape data directly from a website (rvest),
868
+ Mental Health of
869
+ Subset and filter data (dplyr), Write
870
+ American Youth
871
+ functions to wrangle data repetitively, Work
872
+ Static Version:
873
+ cowplot,
874
+ with character strings (stringr), Reshape
875
+ directlabels, dplyr,
876
+ data into different formats (tidyr), Create
877
+ Static Version
878
+ forcats, ggplot2,
879
+ data visualizations (ggplot2) with labels
880
+ Repository
881
+ Bloomberg
882
+ OPE
883
+ ggthemes, here,
884
+ (directlabels)and facets for different groups,
885
+ magick, purrr,
886
+ Combine multiple plots (cowplot), Optional:
887
+ American Health
888
+ Interactive Version
889
+ Initiative
890
+ rstatix, rvest,
891
+ Create an animated gif (magick), Discuss
892
+ Repository
893
+ Interactive Version:
894
+ scales, stringr,
895
+ the impact of self-reporting bias on survey
896
+ tibble, tidyr
897
+ responses, Define and create a contingency
898
+ table, Implementation of a chi-squared test
899
+ for independence, Interpretation of a chi-
900
+ squared test for independence
901
+ Showing 1 to 1 of 1 entries (filtered from 12 total entries)
902
+ Previous
903
+ Next
904
+ Motivati
905
+ anul
906
+ innor_join()
907
+ Try Again
908
+ GitHub
909
+ · README.md
910
+ : Code
911
+ : Data
912
+ =
913
+ : Images
914
+ </>
915
+ ()
916
+ : Plots
917
+ : Documents
918
+ github.com/opencasestudies
919
+ Case Study Repositoryand a history of the code from various authors is saved
920
+ to a single main version [46] using Git and GitHub. By
921
+ continuous deployment, we mean that the website ver-
922
+ sions of the case studies are automatically rendered and
923
+ available to the public once a new version is established
924
+ on GitHub. These website versions of the case studies
925
+ are also hosted on GitHub. Currently our case studies
926
+ are all written using the R programming language, how-
927
+ ever our current format could be extended to support
928
+ tutorials using other programming languages as well.
929
+ Our case studies have a table of contents that allows in-
930
+ structors and learners to easily navigate from section to
931
+ section, so that they can focus on the materials most use-
932
+ ful for their needs. In addition, each case study starts
933
+ with a graphic or plot that describes the basic findings
934
+ of the case study. Each case study is organized with the
935
+ same basic structure so that learners can navigate case
936
+ studies more easily, and see patterns across case studies
937
+ on how analysis is performed (Figure S1).
938
+ 3.3
939
+ Open Case Study file structure
940
+ Each case-study repository has a similar file structure,
941
+ with a data directory containing both raw data and ver-
942
+ sions of the data in various processed forms to allow
943
+ instructors/learners to modularize the case studies for
944
+ their own purposes (Figure 3). For example, an instruc-
945
+ tor could skip the data import and wrangling sections
946
+ of the case study and focus on the visualizations and
947
+ analysis pieces using a fully cleaned data set. To sup-
948
+ port this modular style of instruction, each case study in-
949
+ cludes commands at the beginning of each section that
950
+ imports the data in the final state of the previous sec-
951
+ tion. These different stages of the data are organized in
952
+ a data folder with five categories: raw, imported, wran-
953
+ gled, simpler import, and extra. The raw data directory
954
+ includes files in their original unaltered condition and
955
+ in the original file format from the original data source
956
+ (in some cases raw files are CSV files, Excel files, PDFs
957
+ among other file formats). The imported data directory
958
+ includes files containing the data in a format that is di-
959
+ rectly compatible with R, such as RData files which are
960
+ often abbreviated as Rda. The wrangled data directory
961
+ also includes an RData file that contains a clean and tidy
962
+ version of the data that has been pre-processed and is
963
+ ready for analysis, as well as csv files for instructors that
964
+ wish to demonstrate a simpler version of data import.
965
+ The simpler import folder contains raw files that have
966
+ been converted to CSV file format or other formats that
967
+ can be more easily imported into R. The extra data folder
968
+ contains data files that allow for individuals to conduct
969
+ analyses beyond what was done in the case study (the
970
+ file format for these extra files varies). Each repository
971
+ also contains a README file [20, 21] that explains the
972
+ modular aspect of the case study, as well as other infor-
973
+ mation about how to use the case study for educational
974
+ purposes (Table S2).
975
+ 3.4
976
+ Interactive elements in Open Case Studies.
977
+ To make our case studies more experiential, we have
978
+ introduced interactive elements including quizzes and
979
+ coding exercises using the learnr [47] and gradethis
980
+ [48] packages.
981
+ We include a mix of multiple choice questions and
982
+ coding exercises in each case study. Coding exercises
983
+ are embedded throughout the content of the case stud-
984
+ ies and give students a chance to write code for a specific
985
+ step in the analysis. The answers to these exercises (the
986
+ code/output used in the case study to complete these
987
+ steps) is then hidden in a click-to-expand section right
988
+ after the exercise window. Students can compare their
989
+ own code and output with these answers. We also create
990
+ exercise subsections at the end of the main sections of
991
+ the case study. These exercise subsections include both
992
+ multiple choice questions and coding exercises.
993
+ Stu-
994
+ dents can use them to test their understanding of the
995
+ content in each section. All multiple-choice questions
996
+ provide real-time feedback, giving hints after wrong an-
997
+ swers and allowing students to retry the questions if
998
+ they submitted a wrong answer. For most of the coding
999
+ exercises, hints and/or solutions are available. With the
1000
+ help of the gradethis package, some of these coding
1001
+ problems also provide real-time feedback after students
1002
+ submit their code.
1003
+ 4
1004
+ Building your own case studies
1005
+ For educators interested in constructing their own case
1006
+ studies, in this next section, we describe our recommen-
1007
+ dations for the process based on our experiences and
1008
+ challenges throughout this project. We also describe
1009
+ these recommendations in our Educator’s guide (open-
1010
+ casestudies.org/OCS Guide).
1011
+ 4.1
1012
+ Identifying questions and data for case studies
1013
+ The process of choosing data sources and questions of
1014
+ interest is arguably the most important part of construct-
1015
+ ing a case study. We can either identify an interesting
1016
+ and publicly available data set and then ask a timely and
1017
+ engaging question about a topic related to the data, or
1018
+ we can identify an interesting question and then work
1019
+ to find publicly available data to answer this question.
1020
+ This process of linking a question to publicly available
1021
+ data often involves a bit of trial and error and reshaping
1022
+ of the question while keeping in mind and potentially
1023
+ adjusting what the case study is meant to demonstrate.
1024
+ In our experience developing case studies, we found
1025
+ that identifying a data set first was often easier than re-
1026
+ lying on finding a data set to answer a particular ques-
1027
+ tion. While many of our case studies were specifically
1028
+ designed to address a public health challenge, we some-
1029
+ times struggled to find publicly available data that was
1030
+ appropriate for the question or set of questions of inter-
1031
+ Wright et al. | 2023 | arXiv |
1032
+ Page 9
1033
+
1034
+ Figure 3. An overview of the data file structure on GitHub A tree illustrating the repository data directory structure.
1035
+ Each bubble describes the type of data files that can be found in the sub-folders.
1036
+ est. Collaboration with subject-matter experts can be
1037
+ especially helpful in addressing this challenge. For our
1038
+ case studies, we worked with public health experts in
1039
+ order to both identify interesting, timely, and testable
1040
+ questions and to find a public source of data to answer
1041
+ our questions.
1042
+ We found we could use the difficulty of obtaining data
1043
+ in a standard format (e.g., Excel, CSV) as a teaching op-
1044
+ portunity, and that being open-minded about the source
1045
+ of the data allowed us to demonstrate unconventional
1046
+ skills. For example, when we could not easily access
1047
+ the data stored in a table in a published report, we illus-
1048
+ trated the data science skill of pulling data directly from
1049
+ a PDF. As future data scientists, our students need the
1050
+ skills to be flexible to access data that cannot simply be
1051
+ read in or imported as-is into R.
1052
+ While we typically started developing each case study
1053
+ with a set of data science and statistical learning objec-
1054
+ tives in mind, there was sometimes a tension between
1055
+ finding a data set that would allow us to meet these spe-
1056
+ cific objectives and allowing the data to guide the direc-
1057
+ tion of the case study. We found that following opportu-
1058
+ nities presented by the data itself led us to give examples
1059
+ that were more authentic to a real-world data analysis
1060
+ situation. We recorded some of these challenges within
1061
+ the case studies themselves so students could better un-
1062
+ derstand the process of finding the right data to answer
1063
+ a question of interest (and the potential need to refocus a
1064
+ question). The limitations section in particular provides
1065
+ some of the most useful material for class discussions
1066
+ about the types of questions the data can and cannot an-
1067
+ swer and how sometimes we must simplify our analysis
1068
+ to reflect the limitations of the data available to us.
1069
+ As educators working during a time of reflection and
1070
+ social change around issues of gender and race in re-
1071
+ search, we also took care to point out some histori-
1072
+ cally overlooked aspects of our data sets.
1073
+ For exam-
1074
+ ple, collecting data with surveys that provide a lim-
1075
+ ited number of options about ethnicity or race or racial
1076
+ and gender intersections, limits our ability to accurately
1077
+ capture the diversity of the population being studied.
1078
+ As an example, we refer the reader to the case study
1079
+ about youth disconnection (opencasestudies.org/ocs-
1080
+ bp-youth-disconnection).
1081
+ Wright et al. | 2023 | arXiv |
1082
+ Page 10
1083
+
1084
+ Case study
1085
+ Repository
1086
+ data
1087
+ Processed
1088
+ Unprocessed
1089
+ data: clean,
1090
+ original source
1091
+ tidy and ready
1092
+ data.
1093
+ Data
1094
+ for analysis.
1095
+ formatted into
1096
+ an R data
1097
+ frame object.
1098
+ raw
1099
+ wrangled
1100
+ Files that
1101
+ Raw datain
1102
+ imported
1103
+ allow for
1104
+ otherformats
1105
+ additional
1106
+ for simple
1107
+ analyses
1108
+ importing
1109
+ simpler
1110
+ extra
1111
+ importFor some case studies, we focused on finding mostly
1112
+ clean and complete data to allow us to demonstrate cer-
1113
+ tain concepts, like machine learning or how to create a
1114
+ dashboard. In these case studies where we knew that
1115
+ the analytical material was going to get quite intensive
1116
+ and lengthy, we specifically sought to find data sets that
1117
+ would allow us to jump right in with little difficulty in
1118
+ terms of gathering, cleaning, and importing the data.
1119
+ Our overall suggestions for starting a case study are:
1120
+ • Be open-minded and flexible about data sources:
1121
+ Unlike performing a real analysis where an analyst
1122
+ might choose to avoid complications in accessing
1123
+ the data (when the option is available to go with a
1124
+ data set that is easier to access), such complications
1125
+ can provide teaching opportunities to prepare stu-
1126
+ dents for cases where they will not have a simpler
1127
+ option available.
1128
+ • Determine the level of flexibility based on the
1129
+ goals of the case study: If the case study is intended
1130
+ to demonstrate a specific statistical method or data
1131
+ import method, more effort may be required to find
1132
+ the right data to meet this specific teaching expecta-
1133
+ tion. In our case we knew we were planning to
1134
+ make several case studies, thus we were able to
1135
+ let some of the case studies naturally flow in di-
1136
+ rections we didn’t initially intend. This ultimately
1137
+ led to some teaching opportunities we did not ex-
1138
+ pect. However, for some of our case studies we
1139
+ were more rigid about our data needs.
1140
+ • Think about the scope of the case study: Keep in
1141
+ mind the 1) type of learners that the case study is
1142
+ intended for and 2) data analysis method goals that
1143
+ the case study is intended to demonstrate. Try to
1144
+ avoid a case study that is both intensive for data
1145
+ import/wrangling and intensive for data analysis.
1146
+ At a later point reevaluation of the overall direction
1147
+ and scope of the case study may be needed. If the
1148
+ case study is too long, consider splitting it into mul-
1149
+ tiple case studies.
1150
+ • Keep it simple: Explaining a process at a beginner
1151
+ level often involved more space within a case study
1152
+ than anticipated. Keeping case study plans simple
1153
+ can help as unexpected teaching opportunities may
1154
+ arise that may require more instruction.
1155
+ 4.2
1156
+ Do the analysis first but with a learner in mind
1157
+ To present an analysis narrative, it is necessary to first
1158
+ perform the analysis before working on the narrative
1159
+ description. However, the case study itself should not
1160
+ simply be a reproduction of the process used to analyze
1161
+ the data. Instead it should contain simplifications and
1162
+ modifications to create a clear and coherent presenta-
1163
+ tion for students. To do this, it is crucial to keep a good
1164
+ record of all the steps taken during this initial analysis,
1165
+ including explanations and comments to justify the anal-
1166
+ ysis choices made along the way. Special care should be
1167
+ taken to record exactly how the raw data is obtained.
1168
+ Often the way we would typically perform an anal-
1169
+ ysis ourselves might not always be the best for instruc-
1170
+ tion purposes. For example, an experienced data analyst
1171
+ might start by writing a function that wrangles multiple
1172
+ similar data files. However, this would not be the appro-
1173
+ priate way to start a case study for beginners. Instead
1174
+ one might choose to focus on wrangling a single specific
1175
+ file in great detail before trying to generalize the code
1176
+ as a function. Thus we try to determine an overall pro-
1177
+ cess of data import and wrangling for the intended level
1178
+ of audience before really generating the dialogue that
1179
+ describes this process.
1180
+ We also found that often the data exploration steps
1181
+ and the steps involved in the decision-making process
1182
+ of how to wrangle the data needed to be simplified for
1183
+ a case study. For example, we may ultimately decide
1184
+ to remove a data source from our analysis because we
1185
+ find errors in the data and dealing with these errors are
1186
+ beyond the scope for our intended audience. While it
1187
+ may be useful to tell students about these data errors
1188
+ [19] and how to address them, we also need to keep an
1189
+ appropriate level of detail so as not to overwhelm them.
1190
+ Another situation where we might modify the anal-
1191
+ ysis is if a process requires a considerable level of trial
1192
+ and error. Rather than showing the students all the itera-
1193
+ tions of the trial and error and all of the decisions around
1194
+ this process, we may only demonstrate a small portion
1195
+ so as not to make the case study too lengthy. In a case
1196
+ study about machine learning, for example, we aimed
1197
+ to achieve a certain level of performance so we spent a
1198
+ fair amount of time demonstrating how to optimize and
1199
+ tune parameters. While we briefly described our tuning
1200
+ strategy, we did not show all intermediate models, but
1201
+ ultimately showed two that were interesting and useful
1202
+ for describing parameter tuning.
1203
+ To conclude, we may have gone through a learning
1204
+ process in our own analysis, eventually arriving at a
1205
+ more refined approach. Instead of describing the entire
1206
+ process to get to this point, we would sometimes simply
1207
+ present the final approach, yet describe in the narrative
1208
+ that in practice more effort would be required. While we
1209
+ do want to present a realistic depiction of the data anal-
1210
+ ysis process, we also need to achieve clarity and focus.
1211
+ 4.3
1212
+ Creating the case study narrative
1213
+ Once an analyst has performed the analysis to address
1214
+ the questions of interest, it is time to start writing the
1215
+ narrative. First, we introduce and motivate the main
1216
+ topic by presenting some research related to the particu-
1217
+ lar question evaluated in the case study.
1218
+ First, we describe the data import, wrangling, and
1219
+ analysis processes. As mentioned above, this will likely
1220
+ not be a faithful reproduction of our own analysis pro-
1221
+ cess, but will be recreated to best meet the pedagogical
1222
+ goals of the case study. In terms of added narrative, we
1223
+ Wright et al. | 2023 | arXiv |
1224
+ Page 11
1225
+
1226
+ do our best to guide students through the new informa-
1227
+ tion we are presenting. The first time we use a function
1228
+ we describe what it does, its main arguments, and what
1229
+ packages it comes from. We describe the thoughts be-
1230
+ hind our decision making process from one step to the
1231
+ next, sometimes illustrating times where we try some-
1232
+ thing and it does not work to reflect a real-world data
1233
+ analysis.
1234
+ We also describe jargon and background information
1235
+ where possible with click-to-expand sections so as not
1236
+ to disrupt the general flow of the case study. For exam-
1237
+ ple, an expanded section would explain how ”piping”
1238
+ works, passing objects through a series of steps, to avoid
1239
+ slowing down students who are already familiar, while
1240
+ allowing us to not lose students that have never seen
1241
+ piping before. Other material for such expandable sec-
1242
+ tions includes describing the “grammar of graphics” for
1243
+ the ggplot2 package or providing background statis-
1244
+ tical information before performing a statistical test. In
1245
+ some cases we describe a concept at great length in an-
1246
+ other case study so we link to the description there, but
1247
+ in general we at least minimally describe most concepts
1248
+ and methods in each case study to keep them as self-
1249
+ contained as possible. Similarly, we found including
1250
+ portions of RStudio cheat sheets [49] to be very useful
1251
+ for certain topics, such as describing regular expressions
1252
+ or joining functions. In some cases we found it best to
1253
+ explain a concept or challenge with a simpler example
1254
+ first using a smaller data set imported into R or created
1255
+ in R ourselves. This material is also included in click-
1256
+ to-expand sections for students who might already be
1257
+ familiar with such concepts.
1258
+ While constructing the narrative, we think about
1259
+ where we can include question opportunities. These
1260
+ opportunities include places for an instructor to start a
1261
+ discussion about the analysis decision-making process,
1262
+ such as why a particular graph choice is not always ef-
1263
+ fective or why a wrangling method might not be repro-
1264
+ ducible. We may prompt students to try to remember
1265
+ how to perform a task that has already been shown in
1266
+ the case study previously. In our interactive case studies
1267
+ we also include quiz questions and coding exercises, as
1268
+ described in the Section 3.4.
1269
+ Finally, we end the narrative by summarizing how to
1270
+ communicate the major findings of the analysis [6]. We
1271
+ also describe how the results fit into the greater context
1272
+ of the field, what the implications are, the limitations of
1273
+ the study, and what is still unknown. We finish by going
1274
+ through the case study to create a list of all the resources
1275
+ shown throughout the case study.
1276
+ Through the process of creating this resource, we dis-
1277
+ covered a variety of challenges, as well as strategies that
1278
+ we used to overcome these challenges, as described in
1279
+ Table S3 and guidelines for creating new case studies
1280
+ (Supplemental Note S1).
1281
+ 4.4
1282
+ Creating interactive case studies
1283
+ We have also included interactive elements in a subset
1284
+ of our case studies using packages (learnr [47] and
1285
+ gradethis [48]) that build on the shiny [50] package
1286
+ which allows R users to more easily create web appli-
1287
+ cations.
1288
+ The learnr package allows users to create
1289
+ multiple choice questions and coding exercises, while
1290
+ gradethis allows for customization of the feedback
1291
+ divided to learners as they answer questions or perform
1292
+ exercises.
1293
+ There are two methods to do this. One method is
1294
+ to host each exercise as an individual Shiny application
1295
+ and then embed these applications in the case study us-
1296
+ ing inline frames (HTML ‘iframe‘). The second method
1297
+ is to create one single application that incorporates exer-
1298
+ cises within the case study (Supplemental Note S2 and
1299
+ Supplemental Note S3).
1300
+ 5
1301
+ Discussion and Conclusions
1302
+ In this paper, we introduce a model for creating fully
1303
+ open-source, peer-reviewed, and complete case stud-
1304
+ ies to create an archive of examples of best practices
1305
+ to guide students through data analyses involving real,
1306
+ complicated, messy, and interesting data. Our archive
1307
+ can be used in the classroom by instructors to guide stu-
1308
+ dents through any part of our case studies due to the
1309
+ easy navigation and common modularized architecture
1310
+ to structure the case studies. These can also be used
1311
+ by independent learners due to the thorough narrative,
1312
+ interactive elements, and complete analyses. Students
1313
+ and learners can learn about new topics or return to a
1314
+ case study to brush up on details of a particular method
1315
+ or technique. The data within our case studies and the
1316
+ narrated data analyses and data science methods can be
1317
+ used by instructors educating undergraduate and grad-
1318
+ uate students, as well as high school students in a vari-
1319
+ ety of topics including statistics, public health, program-
1320
+ ming, and data science. This provides an opportunity
1321
+ for instructors to use data that is relevant to current pub-
1322
+ lic health concerns and therefore of interest to a large
1323
+ variety of students without the work required to iden-
1324
+ tify such data or to determine what analyses are possible
1325
+ with such data. This will free instructors to focus on chal-
1326
+ lenging the students with more interactive discussions
1327
+ in class and allow students to learn more about the deci-
1328
+ sion processes required for analyzing data.
1329
+ In summary, OCS provides a consistent framework
1330
+ grounded by [2], is open, and additionally provides rec-
1331
+ ommendations on how to teach the material. With the
1332
+ OCS resources, educators can also make their own and
1333
+ expand OCS if they contribute back. We believe these ad-
1334
+ ditions try to bridge the gaps in the last mile of analysis
1335
+ education.
1336
+ Wright et al. | 2023 | arXiv |
1337
+ Page 12
1338
+
1339
+ Back Matter
1340
+ Author Contributions
1341
+ Contributions listed according to the CRediT system.
1342
+ • Conceptualization: CW, MAT, LRJ, SCH
1343
+ • Software: all co-authors
1344
+ • Formal analysis: all co-authors
1345
+ • Investigation: CW, SCH
1346
+ • Data Curation CW, SCH
1347
+ • Writing - Original Draft: CW, SCH
1348
+ • Writing - Review & Editing: all co-authors
1349
+ • Visualization: CW, MB
1350
+ • Supervision: CW, MAT, LRJ, SCH
1351
+ • Funding acquisition: CW, MAT, LRJ, SCH
1352
+ Acknowledgements
1353
+ We would like to thank the Johns Hopkins Data Science
1354
+ lab (jhudatascience.org), in particular Roger Peng, Jeff
1355
+ Leek, Brian Caffo, and Jessica Crowell for their support
1356
+ and valuable feedback on the Open Case Studies project.
1357
+ We would like to thank Ira Gooding for his feedback
1358
+ on incorproating case studies into the Coursera plat-
1359
+ form. In addition we would like to thank all the data
1360
+ science and statistics reviewers of our case studies, in-
1361
+ cluding: Shannon Ellis, Nicholas Horton, Leslie Myint,
1362
+ Mine C¸ etinkaya-Rundel, Michael Love, and Christina
1363
+ P. Knudson, as well as the following student reviewers:
1364
+ Jensen Stanton, Tina Trinh, and Ruby Ho. We would
1365
+ also like to acknowledge the topic reviewers including:
1366
+ Roger Peng, Tamar Mendelson, Brendan Saloner, Renee
1367
+ Johnson, Jessica Fanzo, Daniel Webster, Elizabeth Stuart,
1368
+ Aboozar Hadavand, Megan Latshaw, Kirsten Koehler,
1369
+ and Alexander McCourt.
1370
+ We would also like to ac-
1371
+ knowledge Ashkan Afshin and Erin Mullany for giving
1372
+ us access to the data for the case study titled ”Explor-
1373
+ ing global patterns of dietary behaviors associated with
1374
+ health risk.” We would also like to thank the Johns Hop-
1375
+ kins Bloomberg School of Public Health Department of
1376
+ Biostatistics for initially funding this project.
1377
+ Funding
1378
+ The Open Case Study project reported in this publica-
1379
+ tion was supported by a High-Impact Project grant in
1380
+ 2019-2020 by the Bloomberg American Health Initia-
1381
+ tive to create the majority of the case studies currently
1382
+ part of the project. A 2020 Digital Education & Learn-
1383
+ ing Technology Acceleration (DELTA) Grant from the
1384
+ Office of the Provost at the Johns Hopkins University
1385
+ supported the creation of interactive case studies and
1386
+ many of the tools that support their use, such as the
1387
+ search tool. The Open Case Studies guide was funded
1388
+ as an extension to funding for the Genomic Data Sci-
1389
+ ence Community Network (GDSCN). The GDSCN is
1390
+ supported through a contract to Johns Hopkins Uni-
1391
+ versity (75N92020P00235) NHGRI. JM was supported
1392
+ by Streamline Data Science, U24HG010263-01 (ANVIL),
1393
+ UL1TR003098 (NIH/NCATS): Institutional Clinical and
1394
+ Translational Science Award, and UE5CA254170.
1395
+ Conflict of Interest
1396
+ The co-authors Carrie Wright and Stephanie Hicks re-
1397
+ ceive royalties on a book available on Leanpub and a
1398
+ course on Coursera titled “Tidyverse Skills for Data Sci-
1399
+ ence”, both which incorporate three case studies from
1400
+ the Open Case Studies project.
1401
+ References
1402
+ [1] C. J. Wild and M. Pfannkuch. Statistical thinking
1403
+ in empirical enquiry. International Statistical Review,
1404
+ 67(3):223–248, 1999.
1405
+ [2] Deborah Nolan and Terry P.
1406
+ Speed.
1407
+ Teaching
1408
+ statistics theory through applications.
1409
+ The Amer-
1410
+ ican Statistician, 53:370, 1999.
1411
+ [3] Stephanie C. Hicks and Rafael A. Irizarry. A guide
1412
+ to teaching data science. The American Statistician,
1413
+ 72(4):382–391, 2018. PMID: 31105314.
1414
+ [4] Sharon
1415
+ Lawner Weinberg
1416
+ and Sarah
1417
+ Knapp
1418
+ Abramowitz.
1419
+ Making general principles come
1420
+ alive in the classroom using an active case stud-
1421
+ ies approach.
1422
+ Journal of Statistics Education,
1423
+ 8(2):null, 2000.
1424
+ doi:
1425
+ 10.1080/10691898.2000.
1426
+ 12131290.
1427
+ URL https://doi.org/10.1080/
1428
+ 10691898.2000.12131290.
1429
+ [5] Daniel W. Schafer and Fred L. Ramsey. Teaching
1430
+ the craft of data analysis. Journal of Statistics Educa-
1431
+ tion, 11(1):null, 2003. doi: 10.1080/10691898.2003.
1432
+ 11910692.
1433
+ [6] Davit Khachatryan and Nathaniel Karst.
1434
+ V
1435
+ for voice:
1436
+ Strategies for bolstering communi-
1437
+ cation skills in statistics.
1438
+ Journal of Statistics
1439
+ Education, 25(2):68–78, 2017.
1440
+ ISSN 1069-1898.
1441
+ doi:
1442
+ 10.1080/10691898.2017.1305261.
1443
+ URL
1444
+ https://www.tandfonline.com/doi/full/
1445
+ 10.1080/10691898.2017.1305261.
1446
+ [7] Roberto Rivera, Mario Marazzi, and Pedro A.
1447
+ Torres-Saavedra.
1448
+ Incorporating open data into
1449
+ introductory courses in statistics.
1450
+ Journal of
1451
+ Statistics Education, 27(3):198–207, 2019.
1452
+ ISSN
1453
+ 1069-1898.
1454
+ doi: 10.1080/10691898.2019.1669506.
1455
+ URL
1456
+ https://www.tandfonline.com/doi/
1457
+ full/10.1080/10691898.2019.1669506.
1458
+ [8] Thomas Donoghue, Bradley Voytek, and Shan-
1459
+ non E.
1460
+ Ellis.
1461
+ Teaching creative and practical
1462
+ data science at scale. Journal of Statistics and Data
1463
+ Science Education, 29(sup1):S27–S39, 2021.
1464
+ doi:
1465
+ 10.1080/10691898.2020.1860725.
1466
+ Wright et al. | 2023 | arXiv |
1467
+ Page 13
1468
+
1469
+ [9] Luna L. Sanchez Reyes and Emily Jane McTavish.
1470
+ Approachable case studies support learning and re-
1471
+ producibility in data science: An example from evo-
1472
+ lutionary biology. Journal of Statistics and Data Sci-
1473
+ ence Education, 30(3):304–310, 2022. doi: 10.1080/
1474
+ 26939169.2022.2099487.
1475
+ [10] R. Romero, A. Ferrer, C. Capilla, L. Zunica, S. Bal-
1476
+ asch, V. Serra, and R. Alcover. Teaching statistics to
1477
+ engineers: An innovative pedagogical experience.
1478
+ Journal of Statistics Education, 3(1):5, 1995.
1479
+ ISSN
1480
+ 1069-1898.
1481
+ doi: 10.1080/10691898.1995.11910481.
1482
+ URL
1483
+ https://www.tandfonline.com/doi/
1484
+ full/10.1080/10691898.1995.11910481.
1485
+ [11] Allison S. Theobold, Stacey A. Hancock, and Sara
1486
+ Mannheimer. Designing data science workshops
1487
+ for data-intensive environmental science research.
1488
+ Journal of Statistics and Data Science Education, 29
1489
+ (sup1):S83–S94, 2021. doi: 10.1080/10691898.2020.
1490
+ 1854636.
1491
+ [12] Pip Arnold and Christine Franklin. What makes
1492
+ a good statistical question? Journal of Statistics and
1493
+ Data Science Education, 29(1):122–130, 2021. ISSN
1494
+ 2693-9169.
1495
+ doi: 10.1080/26939169.2021.1877582.
1496
+ URL
1497
+ https://www.tandfonline.com/doi/
1498
+ full/10.1080/26939169.2021.1877582.
1499
+ [13] David
1500
+ L.
1501
+ Neumann,
1502
+ Michelle
1503
+ Hood,
1504
+ and
1505
+ Michelle M. Neumann. USING REAL-LIFE DATA
1506
+ WHEN TEACHING STATISTICS: STUDENT PER-
1507
+ CEPTIONS OF THIS STRATEGY IN AN INTRO-
1508
+ DUCTORY STATISTICS COURSE.
1509
+ STATISTICS
1510
+ EDUCATION RESEARCH JOURNAL, 12(2):59–70,
1511
+ 2013.
1512
+ ISSN 1570-1824.
1513
+ doi: 10.52041/serj.v12i2.
1514
+ 304. URL https://iase-web.org/ojs/SERJ/
1515
+ article/view/304.
1516
+ [14] David Donoho.
1517
+ 50 years of data science.
1518
+ Jour-
1519
+ nal of Computational and Graphical Statistics, 26(4):
1520
+ 745–766, 2017.
1521
+ doi:
1522
+ 10.1080/10618600.2017.
1523
+ 1384734.
1524
+ URL https://doi.org/10.1080/
1525
+ 10618600.2017.1384734.
1526
+ [15] Beverly L. Wood, Megan Mocko, Michelle Everson,
1527
+ Nicholas J. Horton, and Paul Velleman. Updated
1528
+ guidelines,
1529
+ updated curriculum:
1530
+ The GAISE
1531
+ college report and introductory statistics for the
1532
+ modern student.
1533
+ CHANCE, 31(2):53–59, April
1534
+ 2018. doi: 10.1080/09332480.2018.1467642. URL
1535
+ https://www.tandfonline.com/doi/full/
1536
+ 10.1080/09332480.2018.1467642.
1537
+ [16] Committee on Envisioning the Data Science Disci-
1538
+ pline: The Undergraduate Perspective, Computer
1539
+ Science and Telecommunications Board, Board on
1540
+ Mathematical Sciences and Analytics, Committee
1541
+ on Applied and Theoretical Statistics, Division on
1542
+ Engineering and Physical Sciences, Board on Sci-
1543
+ ence Education, Division of Behavioral and Social
1544
+ Sciences and Education, and National Academies
1545
+ of Sciences, Engineering, and Medicine.
1546
+ Data
1547
+ Science for Undergraduates: Opportunities and Op-
1548
+ tions.
1549
+ National Academies Press, 2018.
1550
+ ISBN
1551
+ 9780309475594. doi: 10.17226/25104. URL https:
1552
+ //www.nap.edu/catalog/25104.
1553
+ [17] Sean Kross and Philip J. Guo. Practitioners teach-
1554
+ ing data science in industry and academia: Expec-
1555
+ tations, workflows, and challenges. In Proceedings
1556
+ of the 2019 CHI Conference on Human Factors in Com-
1557
+ puting Systems, CHI ’19, page 1–14, New York, NY,
1558
+ USA, 2019. Association for Computing Machinery.
1559
+ ISBN 9781450359702.
1560
+ [18] Lance A.
1561
+ Waller.
1562
+ Documenting and evaluat-
1563
+ ing data science contributions in academic promo-
1564
+ tion in departments of statistics and biostatistics.
1565
+ The American Statistician, 72(1):11–19, 2018.
1566
+ doi:
1567
+ 10.1080/00031305.2017.1375988.
1568
+ [19] Roger D.
1569
+ Peng, Athena Chen, Eric Bridge-
1570
+ ford, Jeffrey T.
1571
+ Leek, and Stephanie C.
1572
+ Hicks.
1573
+ Diagnosing data analytic problems in the class-
1574
+ room.
1575
+ Journal of Statistics and Data Science
1576
+ Education, 29(3):267–276, 2021.
1577
+ ISSN 2693-9169.
1578
+ doi:
1579
+ 10.1080/26939169.2021.1971586.
1580
+ URL
1581
+ https://www.tandfonline.com/doi/full/
1582
+ 10.1080/26939169.2021.1971586.
1583
+ [20] Lars
1584
+ Vilhuber,
1585
+ Hyuk
1586
+ Harry
1587
+ Son,
1588
+ Meredith
1589
+ Welch, David N.
1590
+ Wasser, and Michael Darisse.
1591
+ Teaching
1592
+ for large-scale
1593
+ reproducibility
1594
+ veri-
1595
+ fication.
1596
+ Journal of Statistics and Data Science
1597
+ Education, 30(3):274–281, 2022.
1598
+ ISSN 2693-9169.
1599
+ doi:
1600
+ 10.1080/26939169.2022.2074582.
1601
+ URL
1602
+ https://www.tandfonline.com/doi/full/
1603
+ 10.1080/26939169.2022.2074582.
1604
+ [21] Mine
1605
+ Dogucu
1606
+ and Mine
1607
+ C¸ etinkaya
1608
+ Rundel.
1609
+ Tools
1610
+ and recommendations
1611
+ for reproducible
1612
+ teaching.
1613
+ Journal of Statistics and Data Science
1614
+ Education, 30(3):251–260, 2022.
1615
+ ISSN 2693-9169.
1616
+ doi:
1617
+ 10.1080/26939169.2022.2138645.
1618
+ URL
1619
+ https://www.tandfonline.com/doi/full/
1620
+ 10.1080/26939169.2022.2138645.
1621
+ [22] Deborah Nolan and Duncan Temple Lang. Com-
1622
+ puting in the statistics curricula.
1623
+ The American
1624
+ Statistician, 64(2):97–107, 2010.
1625
+ doi: 10.1198/tast.
1626
+ 2010.09132.
1627
+ [23] R Core Team. R: A Language and Environment for
1628
+ Statistical Computing. R Foundation for Statistical
1629
+ Computing, Vienna, Austria, 2021.
1630
+ URL https:
1631
+ //www.R-project.org/.
1632
+ Wright et al. | 2023 | arXiv |
1633
+ Page 14
1634
+
1635
+ [24] Mine C¸ etinkaya Rundel.
1636
+ Let Them Eat Cake
1637
+ (First)!
1638
+ [Video].
1639
+ YouTube.
1640
+ (2018, November
1641
+ 9), 2018.
1642
+ URL https://www.youtube.com/
1643
+ watch?v=RsVOrpXAPXo.
1644
+ [25] Simmi
1645
+ K.
1646
+ Ratan,
1647
+ Tanu
1648
+ Anand,
1649
+ and John
1650
+ Ratan.
1651
+ Formulation of Research Question –
1652
+ Stepwise Approach.
1653
+ Journal of Indian Associ-
1654
+ ation of Pediatric Surgeons, 24(1):15, March 2019.
1655
+ URL https://www.ncbi.nlm.nih.gov/pmc/
1656
+ articles/PMC6322175/.
1657
+ Publisher: Wolters
1658
+ Kluwer – Medknow Publications.
1659
+ [26] Bethany Osueke, Birook Mekonnen, and Julie Dan-
1660
+ gremond Stanton.
1661
+ How Undergraduate Sci-
1662
+ ence Students Use Learning Objectives to Study.
1663
+ Journal of Microbiology & Biology Education, 19
1664
+ (2),
1665
+ January 2018.
1666
+ ISSN 1935-7877,
1667
+ 1935-
1668
+ 7885. URL https://journals.asm.org/doi/
1669
+ 10.1128/jmbe.v19i2.1510.
1670
+ [27] Hadley Wickham, Romain Franc¸ois, Henry Lionel,
1671
+ and Kirill M¨uller. dplyr: A Grammar of Data Manip-
1672
+ ulation, 2022. URL https://CRAN.R-project.
1673
+ org/package=dplyr.
1674
+ [28] Hadley Wickham.
1675
+ ggplot2: Elegant Graphics for
1676
+ Data Analysis.
1677
+ Springer-Verlag New York, 2016.
1678
+ ISBN 978-3-319-24277-4. URL https://ggplot2.
1679
+ tidyverse.org.
1680
+ [29] D. E. Knuth. Literate Programming. The Computer
1681
+ Journal, 27(2):97–111, January 1984. ISSN 0010-4620.
1682
+ doi: 10.1093/comjnl/27.2.97. URL https://doi.
1683
+ org/10.1093/comjnl/27.2.97.
1684
+ [30] Hadley Wickham and Jim Hester.
1685
+ readr: Read
1686
+ Rectangular Text Data, 2020. URL https://CRAN.
1687
+ R-project.org/package=readr.
1688
+ [31] John W. Tukey. The Future of Data Analysis. The
1689
+ Annals of Mathematical Statistics, 33(1):1 – 67, 1962.
1690
+ [32] Kirill M¨uller. here: A Simpler Way to Find Your Files,
1691
+ 2020.
1692
+ URL https://CRAN.R-project.org/
1693
+ package=here. R package version 1.0.1.
1694
+ [33] Hadley Wickham and Jennifer Bryan.
1695
+ readxl:
1696
+ Read Excel Files, 2022.
1697
+ URL https://CRAN.
1698
+ R-project.org/package=readxl. R package
1699
+ version 1.4.0.
1700
+ [34] Stefan
1701
+ Milton
1702
+ Bache
1703
+ and Hadley
1704
+ Wickham.
1705
+ magrittr: A Forward-Pipe Operator for R, 2022. URL
1706
+ https://CRAN.R-project.org/package=
1707
+ magrittr. R package version 2.0.3.
1708
+ [35] Hadley Wickham.
1709
+ stringr:
1710
+ Simple,
1711
+ Con-
1712
+ sistent Wrappers for Common String Operations,
1713
+ 2022.
1714
+ URL https://CRAN.R-project.org/
1715
+ package=stringr. R package version 1.4.1.
1716
+ [36] Lionel Henry and Hadley Wickham. purrr: Func-
1717
+ tional Programming Tools, 2020.
1718
+ URL https:
1719
+ //CRAN.R-project.org/package=purrr.
1720
+ R
1721
+ package version 0.3.4.
1722
+ [37] Hadley Wickham and Maximilian Girlich.
1723
+ tidyr:
1724
+ Tidy Messy Data, 2022.
1725
+ URL https://CRAN.
1726
+ R-project.org/package=tidyr.
1727
+ R package
1728
+ version 1.2.0.
1729
+ [38] Kirill M¨uller and Hadley Wickham.
1730
+ tibble: Sim-
1731
+ ple Data Frames, 2022.
1732
+ URL https://CRAN.
1733
+ R-project.org/package=tibble. R package
1734
+ version 3.1.8.
1735
+ [39] Hadley Wickham.
1736
+ forcats: Tools for Working with
1737
+ Categorical Variables (Factors), 2021. URL https://
1738
+ CRAN.R-project.org/package=forcats.
1739
+ R
1740
+ package version 0.5.1.
1741
+ [40] Toby Dylan Hocking.
1742
+ directlabels: Direct Labels
1743
+ for Multicolor Plots, 2021.
1744
+ URL https://CRAN.
1745
+ R-project.org/package=directlabels.
1746
+ R
1747
+ package version 2021.1.13.
1748
+ [41] Kamil Slowikowski.
1749
+ ggrepel: Automatically Po-
1750
+ sition Non-Overlapping Text Labels with ’ggplot2’,
1751
+ 2021.
1752
+ URL https://CRAN.R-project.org/
1753
+ package=ggrepel. R package version 0.9.1.
1754
+ [42] David Robinson, Alex Hayes, and Simon Couch.
1755
+ broom: Convert Statistical Objects into Tidy Tibbles,
1756
+ 2022.
1757
+ URL https://CRAN.R-project.org/
1758
+ package=broom. R package version 1.0.0.
1759
+ [43] Thomas Lin Pedersen.
1760
+ patchwork: The Composer
1761
+ of Plots, 2020. URL https://CRAN.R-project.
1762
+ org/package=patchwork.
1763
+ R package version
1764
+ 1.1.1.
1765
+ [44] Yihui Xie, Joe Cheng, and Xianying Tan.
1766
+ DT:
1767
+ A Wrapper of the JavaScript Library ’DataTables’,
1768
+ 2021.
1769
+ URL https://CRAN.R-project.org/
1770
+ package=DT. R package version 0.17.
1771
+ [45] GitHub Actions, 2021.
1772
+ URL https://github.
1773
+ com/features/actions.
1774
+ [46] Mojtaba Shahin,
1775
+ Muhammad Ali Babar,
1776
+ and
1777
+ Liming Zhu.
1778
+ Continuous Integration,
1779
+ De-
1780
+ livery and Deployment:
1781
+ A Systematic Review
1782
+ on Approaches, Tools, Challenges and Practices.
1783
+ IEEE Access, 5:3909–3943, 2017.
1784
+ ISSN 2169-
1785
+ 3536.
1786
+ URL http://ieeexplore.ieee.org/
1787
+ document/7884954/.
1788
+ [47] Barret Schloerke, JJ Allaire, and Barbara Borges.
1789
+ learnr: Interactive Tutorials for R, 2020. URL https:
1790
+ //CRAN.R-project.org/package=learnr. R
1791
+ package version 0.10.1.
1792
+ Wright et al. | 2023 | arXiv |
1793
+ Page 15
1794
+
1795
+ [48] Garrick Aden-Buie, Daniel Chen, Garrett Grole-
1796
+ mund, and Barret Schloerke.
1797
+ gradethis:
1798
+ Auto-
1799
+ mated Feedback for Student Exercises in ’learnr’ Tuto-
1800
+ rials, 2021. URL https://pkgs.rstudio.com/
1801
+ gradethis/.
1802
+ [49] RStudio Cheatsheets, 2022.
1803
+ URL https://
1804
+ rstudio.com/resources/cheatsheets/.
1805
+ [50] Winston Chang, Joe Cheng, JJ Allaire, Carson
1806
+ Sievert, Barret Schloerke, Yihui Xie, Jeff Allen,
1807
+ Jonathan McPherson, Alan Dipert, and Barbara
1808
+ Borges.
1809
+ shiny: Web Application Framework for R,
1810
+ 2021.
1811
+ URL https://CRAN.R-project.org/
1812
+ package=shiny. R package version 1.6.0.
1813
+ [51] Desir´ee De Leon.
1814
+ Interactive tutorial win-
1815
+ dows for your R Markdown Site, 2022.
1816
+ URL
1817
+ https://desiree.rbind.io/blog/
1818
+ learnr-iframes/.
1819
+ Wright et al. | 2023 | arXiv |
1820
+ Page 16
1821
+
1822
+ Supplementary Materials
1823
+ Open Case Studies: Statistics and Data Science Education through Real-World
1824
+ Applications
1825
+ Carrie Wright, Qier Meng, Michael Breshock, Margaret A. Taub, Leah R. Jager, John Muschelli,
1826
+ Stephanie C. Hicks∗
1827
+ ∗Correspondence to [email protected]
1828
+ Contents
1829
+ 1. Supplemental Table S1-S3.
1830
+ 2. Supplemental Figures S1-S5.
1831
+ 3. Supplemental Notes S1-S3.
1832
+ Wright et al. | 2023 | arXχiv |
1833
+ Page S1
1834
+
1835
+ Supplemental Tables
1836
+ Diversity of topics in the Open Case Study resource
1837
+ Question
1838
+ How does something change over time?
1839
+ How do groups compare?
1840
+ Types
1841
+ How do groups compare over time?
1842
+ How do paired groups compare?
1843
+ Are certain groups or subgroups more
1844
+ vulnerable?
1845
+ How does something compare across regions?
1846
+ How to predict outcomes for new data?
1847
+ Does this influence my data?
1848
+ Are variables related to one another?
1849
+ How to display this data?
1850
+ Data
1851
+ Multiple files
1852
+ PDF
1853
+ Types
1854
+ CSV
1855
+ Excel
1856
+ Website
1857
+ Image text
1858
+ API
1859
+ Google Sheets
1860
+ Survey data / Codebooks
1861
+ Wrangling
1862
+ Extracting data from a PDF
1863
+ Geocoding data
1864
+ Methods
1865
+ Recoding data
1866
+ Joining data
1867
+ Modifying data
1868
+ Working with text
1869
+ Reshaping data
1870
+ Repetitive process
1871
+ Data
1872
+ Formatted Table
1873
+ Scatter plot
1874
+ Visualizations
1875
+ Line plot
1876
+ Bar plot
1877
+ Box plots
1878
+ Pie chart / Waffle plot
1879
+ Heat map
1880
+ Correlation plots
1881
+ Missing data plots
1882
+ Maps
1883
+ Advanced
1884
+ Matching a plot style
1885
+ Faceted plots
1886
+ Visualizations
1887
+ Direct group labels
1888
+ Emphasizing a group
1889
+ Plot annotations
1890
+ Plot error bars
1891
+ Combining plots
1892
+ Interactive plots
1893
+ Interactive maps
1894
+ Interactive tables
1895
+ Adding images to plots
1896
+ Interactive dashboard
1897
+ Analysis
1898
+ t-tests
1899
+ ANOVA
1900
+ Concepts
1901
+ Linear Regression
1902
+ Logistic Regression
1903
+ and
1904
+ Mann-Kendall Trend Test
1905
+ Machine Learning
1906
+ Methods
1907
+ Chi-Squared Test of Independence
1908
+ Wilcoxon Signed-Rank Test
1909
+ Calculating percentages with missing data
1910
+ Wilcoxon Rank Sum Test
1911
+ Supplementary Table S1. Example topics in the OCS resource An example of how these are applied in an
1912
+ example case studies is provided in Table 2.
1913
+ Examples of modular case-study use
1914
+ User
1915
+ Example Use
1916
+ Data Folder
1917
+ Student
1918
+ Data science students looking for
1919
+ open source data for a class project
1920
+ raw
1921
+ Student
1922
+ Public health student practicing data
1923
+ wrangling and visualization
1924
+ imported
1925
+ Educator
1926
+ Course instructor assigns homework
1927
+ using related but new data that
1928
+ expands beyond the case study
1929
+ extra
1930
+ Educator
1931
+ Data analysis instructor who wants
1932
+ students to practice some simple
1933
+ data import, but has limited time
1934
+ simpler import
1935
+ Self-Learner
1936
+ Researcher looking for analysis
1937
+ examples
1938
+ wrangled
1939
+ Supplementary Table S2. Examples of modular case-study use Examples of potential uses for case studies,
1940
+ beyond demonstrating the full case study in a class or as a learner following along.
1941
+ Wright et al. | 2023 | arXχiv |
1942
+ Page S2
1943
+
1944
+ Challenges of creating case studies in the OCS resource
1945
+ Challenge
1946
+ A Suggested Solution
1947
+ Finding the appropriate scope, data, and questions for the
1948
+ intended audience
1949
+ Be open minded about data sources, be flexible about revising or
1950
+ removing data
1951
+ Balancing the teaching goals with the teaching opportunities
1952
+ presented by the data
1953
+ Keeping the plan simple to allow room for unexpected teaching
1954
+ opportunities
1955
+ Showing the right amount of the data science process
1956
+ Performing the analysis first, then curating what will be included
1957
+ Balancing an assumption of some prior knowledge with making
1958
+ the case study self-contained
1959
+ Click-to-expand sections for additional information and links to
1960
+ other case studies and resources
1961
+ Catering to multiple audience types
1962
+ Modularizing case studies to allow different users to use only
1963
+ certain parts of the case studies and including click-to-expand
1964
+ sections for students that need more background
1965
+ Modularization of case studies
1966
+ Saving the data after each section and loading at the beginning
1967
+ of each section
1968
+ Supplementary Table S3. Challenges of creating case studies in the OCS resource A list of the major
1969
+ challenges that we experienced and suggested solutions.
1970
+ Wright et al. | 2023 | arXχiv |
1971
+ Page S3
1972
+
1973
+ Supplemental Figures
1974
+ Supplementary Figure S1. Case Study Structure An image of the top of a case study showing the interactive table of
1975
+ contents to the left and a image summarizing the main findings of the case study.
1976
+ Supplementary Figure S2. Creating a Multiple Choice Quiz with learnr An example code chunk used to create a
1977
+ multiple choice quiz in the CO2 Emissions case study.
1978
+ Wright et al. | 2023 | arXχiv |
1979
+ Page S4
1980
+
1981
+ Open Case Studies: Exploring global patterns of
1982
+ Code-
1983
+ IOPEN
1984
+ CASE
1985
+ Select Languagev
1986
+ STUDIES
1987
+ Powered by Google Translate
1988
+ A
1989
+ Mean National BMIl overtime
1990
+ B
1991
+ Change in BMI by region
1992
+ 1985
1993
+ 2017
1994
+ Men
1995
+ Women
1996
+ Motivation
1997
+ 35
1998
+ 6
1999
+ Main Questions
2000
+ 0
2001
+ LearningObjectives
2002
+ 0
2003
+ Obesity
2004
+ Context
2005
+ 30
2006
+ 4
2007
+ to 2017)
2008
+ Mean BMI
2009
+ USA)
2010
+ USA
2011
+ Limitations
2012
+ USA
2013
+ USA
2014
+ 88
2015
+ SA
2016
+ USA
2017
+ What are the data?
2018
+ USA
2019
+ (1985 t
2020
+ Data Import
2021
+ 25
2022
+ USA
2023
+ Data Wrangling
2024
+ Data Exploration
2025
+ 0
2026
+ Data Analysis
2027
+ 20
2028
+ Data Visualization
2029
+ Summary
2030
+ Suggested Homework
2031
+ Rur
2032
+ Jrban
2033
+ Additional Information*r dw_quiz,
2034
+ echo = FALSE}
2035
+ quiz(caption =
2036
+ question("which one of the following functions in the 'dplyr'
2037
+ package allows us to see all of the variables (columns) at once.
2038
+ where several values of those columns are shown on the right of the variable names?"
2039
+ answer("'slice_head()
2040
+ "this function allows us to see the rows at the end of the data."),
2041
+ answer ("*glimpse()*
2042
+ , correct = TRUE),
2043
+ allow_retry =
2044
+ TRUE,
2045
+ random_answer_order = TRUE
2046
+ question("which one of the pipe operators (from the 'magrittr' package) should be used right after a variable name if we want to
2047
+ perform a sequence of operations on that variable, and meanwhile, assign the final output to that variable (without redefining that
2048
+ variable using
2049
+ =?"
2050
+ answer("*%>%*"
2051
+ allow_retry = TRUE,
2052
+ random_answer_order = TRUE
2053
+ function in the ‘dplyr' package do? (more than one correct answers)"
2054
+ answer("select certain variables(columns) of the data.", message =
2055
+ "seiecting certain variables(columns) of the data is the
2056
+ answer("Rename a variable."
2057
+ message = "Renaming a variable is the function of the
2058
+ ‘renameO*
2059
+ function."),
2060
+ answer("Modify an existing variable.", correct = TRUE),
2061
+ allow_retry
2062
+ TRUE,
2063
+ random_answer_order = TRUESupplementary Figure S3. Multiple Choice Quiz Rendered in Case Study The multiple choice quiz in the CO2
2064
+ Emissions case study created using the code in Figure S2.
2065
+ Wright et al. | 2023 | arXχiv |
2066
+ Page S5
2067
+
2068
+ Which one of the following functions in the
2069
+ dplyr package allows us to see al of the
2070
+ variables (columns) at once, where severa
2071
+ values of those columns are shown on the
2072
+ right of the variable names?
2073
+ O glimpse()
2074
+ O slice_sample()
2075
+ O
2076
+ slice_tail()
2077
+ slice_head()
2078
+ Submit Answer
2079
+ Which one of the pipe operators (from the
2080
+ magrittr package) should be used right
2081
+ after a variable name if we want to perform a
2082
+ sequence of operations on that variable, and
2083
+ meanwhile, assign the final output to that
2084
+ variable (without redefining that variable
2085
+ using <- or =)?
2086
+ %<1% 0
2087
+ %<>%
2088
+ %<%
2089
+ %%
2090
+ Submit Answer
2091
+ Which of the following can the mutate()
2092
+ function in the dplyr package do? (more
2093
+ than one correct answers)
2094
+ O Create a new variable.
2095
+ O Rename a variable.
2096
+ O Select certain variablesicolumns) of the
2097
+ data.
2098
+ O Modify an existing variable
2099
+ Submit AnswerSupplementary Figure S4. Creating a Coding Exercise with learnr An example of the code chunks used to create a
2100
+ coding exercise in the Obesity case study.
2101
+ Wright et al. | 2023 | arXχiv |
2102
+ Page S6
2103
+
2104
+ However,
2105
+ we can also do the same thing in a single step, where we replace the 'women
2106
+ dataset
2107
+ and then we split
2108
+ the data by
2109
+ Women"
2110
+ to create a new dataset all within the same chunk of code. write this code
2111
+ yourself!
2112
+ r,echo=FALSE7
2113
+ save(rural_urban, file = here::here("www", "exercise", "dw_code2.rda"))
2114
+ fr dw_code2-setup}
2115
+ .
2116
+ 1ibrary(tidyverse)
2117
+ library(magrittr)
2118
+ load(here: :here("www"
2119
+ "exercise"
2120
+ "dw_code2.rda"))
2121
+ fr dw_code2. exercise=TRUE7
2122
+ country_split
2123
+ {r dw_code2-hint-1}
2124
+ country_split <
2125
+ str_subset(string = rural_urban
2126
+ pattern = "women") %>%
2127
+ r dw_code2-solutionf
2128
+ country_split <-
2129
+ str_subset(string = rural_urban,
2130
+ pattern = "women")
2131
+ %>%
2132
+ stringr::str_split(pattern=
2133
+ Women") %>%
2134
+ unlist()
2135
+ # view the first rows of the data
2136
+ head(country_split)Supplementary Figure S5. Coding Exercise Rendered in Case Study The coding exercise rendered in the Obesity
2137
+ case study created using the code in Figure S4. Top: The exercise prompt. Bottom: Displays the hint function that can be
2138
+ used when stuck. The hints are made also with learnr.
2139
+ Wright et al. | 2023 | arXχiv |
2140
+ Page S7
2141
+
2142
+ However, we can also do the same thing in a single step, where we replace the Women dataset with the code we used to create that
2143
+ dataset, so first, we select the "wiomen" and then we split the data by " women'" to create a new dataset all within the same chunk of
2144
+ code. Write this code yourself!
2145
+ R Code
2146
+ S start Over
2147
+ Q Hints
2148
+ Run Code
2149
+ country_split <-
2150
+ 2
2151
+ 3
2152
+ Hints
2153
+ Next Hint >
2154
+ Li Copy to Clipboard
2155
+ country_split <
2156
+ 2
2157
+ str_subset(string = rural urban,
2158
+ m
2159
+ pattern = "Women") %>%
2160
+ R Code
2161
+ S Start Over
2162
+ Q Hints
2163
+ Run Code
2164
+ country split <-
2165
+ 2mSupplemental Notes
2166
+ Supplemental Note S1
2167
+ Guidelines for a creating case study in the OCS collection
2168
+ To preserve the integrity of the core ideas of our resource we suggest the following guidelines for case studies to
2169
+ be included in the Open Case Studies collection:
2170
+ • Case studies should be written in open source programming languages.
2171
+ • Case studies should use data that is publicly available or can be made publicly available. Please ensure that
2172
+ the data can be made public if it is not already.
2173
+ • Case studies should include disclaimers and appropriate license agreements.
2174
+ • Effort should be made to describe the original source of the data with transparency.
2175
+ • All included images (that are not original to the case study) should include a source.
2176
+ • Core sections of the case study are required: Motivation, Main Questions, Learning Objectives, Limitations
2177
+ (outlining the limitations of the data), What are the Data?, and Summary (including limitations for the analysis
2178
+ presented).
2179
+ • Case studies should aim to describe the decision making process involved in performing data-science related
2180
+ tasks.
2181
+ • Links to literature or other sources to motivate the scientific topic of the case study should be included where
2182
+ possible.
2183
+ • Despite often being motivated by articles, case studies are not intended to demonstrate the methods of a paper.
2184
+ They are intended as an educational resource where users are guided through the data science process.
2185
+ Supplemental Note S2
2186
+ Technical aspects of the two methods for creating interactive case
2187
+ studies
2188
+ In this note we describe how we implemented the two options for creating interactive case studies: 1) hosting each
2189
+ exercise as an individual Shiny application and then embedding these applications in the case study or 2) creating
2190
+ one single application that incorporates exercises within the case study by creating the case study as a learnr
2191
+ tutorial.
2192
+ Approach 1 - Embedding interactive elements.
2193
+ We did this by adapting the method of De Leon [51]. Building
2194
+ upon the iFrame Resizer JavaScript library, De Leon introduced the use of an HTML file that resizes the learnr
2195
+ tutorial windows in real time. This HTML file is included in the YAML header of the R Markdown file for the
2196
+ exercise, along with div tags in the last line to indicate the end of the content for the iFrame Resizer. We also
2197
+ added this feature by creating another HTML file containing the iFrame Resizer JavaScript and including it in
2198
+ the YAML header. Then, each exercise Shiny application is added to the case studies as an ‘iframe‘ with class
2199
+ “interactive”. This is done by creating the learnr exercises in separate R Markdown files. Each exercise is
2200
+ then published as an individual Shiny app online. Once published, the exercises now each have a unique URL
2201
+ address where they are hosted. The exercises can now be rendered within re-sizable windows inside the case study
2202
+ itself by nesting iFrame HTML code chunks within the case study R Markdown file using the exercise URLs as
2203
+ inputs. At the end of each case study R Markdown, an HTML tag specifying the application of the resizer only
2204
+ to class “interactive” is added. R knitr has an include app() function to embed Shiny applications, but De
2205
+ Leon’s method better accommodates the aesthetics of the website as well as the pop-ups in the tutorials like hints,
2206
+ solutions, and feedback.
2207
+ Approach 2 - Single interactive case study application.
2208
+ The second option is to make the entire case study a
2209
+ learnr tutorial, where exercises can be directly created in the case study R Markdown document. To do this, we
2210
+ add runtime: shiny prerendered to the YAML header of this document. In order to publish the single case
2211
+ study application, all of the files needed to render the case study (data, images, CSS style code, etc.) need to be put
2212
+ in a www/ sub-directory. This folder will be published along with the index.Rmd file to Shiny. The quizzes can
2213
+ be created inside a single R code chunk using the quiz(), question(), and answer() functions from learnr
2214
+ (Figures S2-S3). The coding exercises must be created using multiple R chunks. One chunk is written for each of
2215
+ the following: exercise setup, hints, solutions, and the exercise prompt (Figure S4). In the rendered case study,
2216
+ these individual chunks are combined into a single coding exercise element (Figure S5). Eventually, this document
2217
+ is published as a single Shiny application (opencasestudies.org/ocs-make-interactive-tutorial).
2218
+ Wright et al. | 2023 | arXχiv |
2219
+ Page S8
2220
+
2221
+ Differences between the approaches.
2222
+ This first approach of creating interactive elements is beneficial as it is
2223
+ generally easier to maintain. If one exercise breaks, we can readily identify which exercise is broken. However,
2224
+ the method can be inefficient as multiple Shiny applications are needed for a single case study and since each
2225
+ application stands alone, the data in the case study cannot be directly passed into the exercise. Thus, when the
2226
+ exercise involves using the data from the case study at a specific point in the analysis, the setup can become more
2227
+ complicated.
2228
+ The second approach is more efficient because the entire case study is written in a single file. However, the
2229
+ startup of a Shiny application is required to be under 60 seconds. For case studies that take longer to render, some
2230
+ of the data analysis results need to be stored separately to reduce the startup time. Also, since a single file is more
2231
+ difficult to maintain, it is important to keep detailed maintenance notes for the case study.
2232
+ We decided to go with the second approach, because we created many exercises and this would have resulted in
2233
+ tens of Shiny applications. The first approach involves making each exercise question a learnr tutorial, which is
2234
+ then published as a Shiny application or with Posit Connect. With this approach, the actual rendered version of the
2235
+ interactive case study is still hosted on GitHub, but each exercise is embedded in the website as its own window
2236
+ using HTML ‘iframe‘. The second approach, that we we ultimately adopted, involves making the interactive case
2237
+ study a single learnr tutorial and in this case, instead of the rendered website version being hosted on GitHub, it
2238
+ is published as a Shiny application. In our case, we chose to use Posit Connect for this which does involve some
2239
+ payment. Currently, Shiny allows users to publish up to 5 applications for free for a single individual.
2240
+ Supplemental Note S3
2241
+ Examples of of interactive questions in case studies
2242
+ We included a couple of types of interactive elements. The first are coding exercises as part of the analysis in the
2243
+ case study. These exercises are placed where the analysis repeats what is already done with another data set. The
2244
+ students apply what they learned, while staying in the context of the case study. The second type are multiple
2245
+ choice quiz questions and coding exercises at the end of case study sections.
2246
+ As an example of the first type, if there are two similar data sets that need to have their variable names changed,
2247
+ we might demonstrate how to do it with one data set and ask the student to change the variable names of the
2248
+ other. Other circumstances for these exercises include, for instance, where an argument for a function is introduced.
2249
+ The exercise window can be used to explore the function of that argument by implementing the code with or
2250
+ without such argument. For example, when introducing the set.seed() function, the exercise window allows
2251
+ the students to experiment on how using a different seed would change the output.
2252
+ The second type of interactive elements are to assist with learners assessing their knowledge using quiz questions
2253
+ and coding exercises at the end of case study sections. We include these exercises in a separate subsection so that
2254
+ they are easy to navigate to. Instead of focusing on a specific step of the analysis, these problems integrate the
2255
+ content of the entire section. The multiple-choice questions test the students’ understanding of the concepts
2256
+ introduced. For example, they may be asked what the key assumptions of a linear regression model are, what an
2257
+ R function can do, etc. The coding questions check the students’ abilities to implement the R functions in data
2258
+ analyses. For example, they could be asked to convert a made-up data set from wide format to long format, to
2259
+ build a machine learning model using an R built-in data set, etc.
2260
+ Wright et al. | 2023 | arXχiv |
2261
+ Page S9
2262
+
7tE4T4oBgHgl3EQf2g0r/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BNE5T4oBgHgl3EQfTA98/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,219 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf,len=218
2
+ page_content='Investigation of radiation hardness of silicon semiconductor detectors under irradiation with fission products of 252Cf nuclide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
3
+ page_content=' N V Bazlov1,2, A V Derbin1, I S Drachnev1, I M Kotina1, O I Konkov1,3, I S Lomskaya1, M S Mikulich1, V N Muratova1, D A Semenov1, M V Trushin1 and E V Unzhakov1 1 NRC "Kurchatov Institute" - PNPI, Gatchina, Russia 2 Saint-Petersburg State University, Universitetskaya nab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
4
+ page_content=' 7/9, St.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
5
+ page_content=' Petersburg, Russia 3 Ioffe Physical-Technical Institute of the Russian Academy of Sciences, St.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
6
+ page_content=' Petersburg, Russia e-mail: trushin_mv@pnpi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
7
+ page_content='nrcki.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
8
+ page_content='ru Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
9
+ page_content=' Influence of the prolonged irradiation by fission products of 252Cf radionuclide on the operational parameters of silicon-lithium Si(Li) p-i-n detectors, Si surface barrier detectors and Si planar p+n detector was investigated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
10
+ page_content=' The obtained results revealed a linear shift of the fission fragment peaks positions towards the lower energies with increase of the irradiation dose for all investigated detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
11
+ page_content=' The rate of the peaks shift was found to depend strongly on the detector type and the strength of the electric field in the detector’s active region, but not on the temperature of irradiation (room or liquid nitrogen temperature).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
12
+ page_content=' Based on the obtained results, the possibility of integration of the investigated types of Si semiconductor detectors in a radionuclide neutron calibration source is considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
13
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
14
+ page_content=' Introduction Heavy nuclides subjected to spontaneous fission decay accompanied by emission of several fast neutrons can be utilized as a compact neutron calibration source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
15
+ page_content=' The most common spontaneous fission source is 252Cf which undergoes α-decay and spontaneous fission with a branching ratio of 97:3, whereas each spontaneous fission event liberates 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
16
+ page_content='8 neutrons and 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
17
+ page_content='7 gamma-ray photons on average [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
18
+ page_content=' The timing of the moment of neutron production can be fixed by detecting the fission fragments signal with a semiconductor detector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
19
+ page_content=' Semiconductor detectors possess sufficiently high energy resolution for detection of the high- energy heavy ions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
20
+ page_content=' The main obstacle for the integration of such detectors in the neutron calibration source could be their limited lifetime under the influence of the nuclide radiation [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
21
+ page_content=' Degradation of the detector’s operational parameters effectively proceeds just in case of irradiation by alpha particles and fission fragments (FF), which are capable of transferring a significant fraction of their energy to the atoms of the detector lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
22
+ page_content=' Therefore, the degradation of the semiconductor detector will limit the maximum neutron source activity and/or the source expiration period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
23
+ page_content=' This article is devoted to the investigations of degradation of the operational parameters of several types of silicon semiconductor detectors under prolonged irradiation with fission products of 252Cf (\uf061- particles and fission fragments).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
24
+ page_content=' The main issue was to study the rate of degradation of different detector types under irradiation by 252Cf fission products at various irradiation conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
25
+ page_content=' Irradiation was performed at room and liquid nitrogen temperatures as well as with different detector’s operational biases, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
26
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
27
+ page_content=' with different electric field strength in the detectors active regions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
28
+ page_content=' Results of the preceding investigations were presented in previous articles [3-5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
29
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
30
+ page_content=' Detectors and experimental setup Three types of silicon semiconductor detectors were under investigations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
31
+ page_content=' Detectors of the first type are SiLi p-i-n detectors produced from p-type silicon ingot with resistivity of 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
32
+ page_content='5 kΩ×cm and carrier lifetime of 1000 µs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
33
+ page_content=' Two similar detectors with a sensitive region of 20 mm in diameter and 4 mm thick were produced using standard Li drift technology [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
34
+ page_content=' The thickness of the undrifted p-type layer in these detectors (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
35
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
36
+ page_content=' the entrance window thickness) usually amounts to 300-500 nm [7], which is kept to suppress the excessive growth of the leakage current at high operation reverse voltage [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
37
+ page_content=' Detectors of the second type were two surface-barrier (SB) detectors fabricated from p-type boron- doped silicon wafer of (111) orientation and 10 mm in diameter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
38
+ page_content=' The resistivity and the carrier lifetime were 1 kΩ×cm and 1000 µs, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
39
+ page_content=' The front side of the wafers was covered by a thin layer of amorphous silicon which served as a passivation coating [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
40
+ page_content=' The ohmic contact was made by sputtering of Pd layer on the whole rear side of the wafer, whereas the rectifying one – by evaporation of Al dot with diameter of 7 mm in the center of the wafer’s front side.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
41
+ page_content=' Detector of the third type was p+n planar detector with the thickness of 300 \uf06dm produced in Ioffe Physical-Technical Institute (entrance window thickness was about 50 nm and the voltage of full depletion – nearly 150 V).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
42
+ page_content=' Irradiation by a 252Cf source was performed in vacuum cryostat typically during 10-20 days.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
43
+ page_content=' The source representing a stainless steel substrate covered by an active layer under the thin protective coating was mounted 1 cm above the detector front surface that was collimated in order to exclude side surface effects of incomplete charge collection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
44
+ page_content=' The spectra of the fission products of 252Cf were recorded continuously during the whole irradiation period in short 1-hour series, what allowed us to observe the spectra evolution directly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
45
+ page_content=' Detector reverse current was also monitored during the whole irradiation period on 5-second basis with the following averaging on 1-hour measurement series.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
46
+ page_content=' Details of the measurement setup were presented in [3-5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
47
+ page_content=' Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
48
+ page_content=' (a) The first and the last spectra measured by SB2 detector in the beginning and at the end of the prolonged irradiation period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
49
+ page_content=' The following peaks are marked: constant amplitude generator peak (g), peak of \uf061-particles at 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
50
+ page_content='118 MeV (\uf061), peak at doubled energy of \uf061-particles (2\uf061) and the peaks due to FFs of light (LF) and heavy (HF) groups.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
51
+ page_content=' (b) Dependence of the light and heavy FF peaks visible energies on exposure by FFs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
52
+ page_content=' a) 106 α first spectrum last spectrum g 105 Counts per hour 104 103 2α HF 102 101 100 0 20 40 60 80 100 Energy, MeVb) Heavy Fragments 80 Light Fragments Peak Position, MeV 75 70 65 60 55 0 1 2 3 4 Exposure, FF 107 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
53
+ page_content=' Experimental results In order to study the influence of temperature of irradiation on the degradation of the detector’s parameters, the irradiation of identical SiLi detectors was performed at room (SiLi1 detector) and liquid nitrogen (SiLi2 detector) temperature, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
54
+ page_content=' To study the influence of external electric field strength on the detector’s parameters degradation, two identical SB detectors were subjected to the irradiation with different applied reverse biases, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
55
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
56
+ page_content=' with different electric field strengths in their active regions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
57
+ page_content=' The operating biases applied to the respective detector during the irradiation period, the corresponding surface electric field strengths and the total exposures are collected in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
58
+ page_content=' For all investigated detectors the similar signs of operational parameters degradation as a result of the prolonged irradiation by 252Cf fission products were revealed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
59
+ page_content=' As an example, Figure 1a represents the spectra recorded by SB2 detector at the beginning and at the end of the prolonged irradiation period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
60
+ page_content=' The peak at 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
61
+ page_content='1 MeV corresponding to α-particles and another peak at doubled energy of the α- particles caused by their accidental coincidences were used as reference points for the calibration of the energy scale.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
62
+ page_content=' Two broad unresolved peaks appearing at higher energies correspond to fission fragments of light and heavy groups, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
63
+ page_content=' The main effect of the detector degradation is a gradual shift of fission fragments visible energy towards the lower values, see Figure 1a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
64
+ page_content=' The positions of the peaks corresponding to heavy (HF) and light (LF) fission fragments were approximated using the Gaussian function for each 1-hour series.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
65
+ page_content=' The dependences of the peaks positions with exposure by fission fragments can be well described by linear functions (Figure 1b) for any masses of fission fragments and for all investigated detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
66
+ page_content=' The obtained slope coefficients are summarized in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
67
+ page_content=' It is interesting to note, that the obtained coefficients for the peaks of light and heavy fission fragments groups differ approximately by the factor of 2 – this holds for all types of investigated detectors and for all irradiation conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
68
+ page_content=' In more details this fact will be discussed separately in the next paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
69
+ page_content=' A similar approximation of the positions of α-peaks didn’t reveal any measurable shift with the irradiation dose for all studied detectors [4-5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
70
+ page_content=' Another sign of the detector’s operational parameters degradation under irradiation is the rapid increase of the leakage current which proceeds linear with the number of absorbed fission products [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
71
+ page_content=' The obtained slope coefficients of the leakage current growth are also collected in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
72
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
73
+ page_content=' Discussion It could be noted in Figure 1 that the peak energies of light and heavy groups of fission fragments are below the predicted values of 104 MeV and 79 MeV [10], respectively, even on the spectrum measured by non-irradiated detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
74
+ page_content=' The same is true for all other investigated detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
75
+ page_content=' This effect is known as pulse-height defect (PHD) in heavy charged particles spectroscopy by semiconductor detectors implying that the measured pulse height amplitude for heavy charged particles is somewhat lower than that for \uf061-particles of the same energy [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
76
+ page_content=' It is generally considered that PHD is caused by a combination of energy losses (i) in the detector dead layer/entrance window, (ii) due to the atomic collisions and (iii) due to recombination of the electron-hole pairs created by the incident heavy particle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
77
+ page_content=' Whereas energy losses by (i) and (ii) mechanisms are well understood, the full understanding of the charge losses due to recombination is still missing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
78
+ page_content=' Two models were suggested supposing that enhanced carrier recombination proceeds either in the bulk region on the radiation-induced defects created by incident FFs [11], or at the surface states of the semiconductor [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
79
+ page_content=' The later model is consistent with the TRIM [13] simulation results (Figure 2) showing that the density of electron-hole pairs generated by fission fragments reaches the maximum in the near-surface region of the detector and then gradually drops down towards the bulk, suggesting therefore that decisive influence on PHD would have the carrier recombination at the surface states.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
80
+ page_content=' Previously, the PHD of about 7-10 MeV was reported for 252Cf fission fragments detection by semiconductor detectors not subjected to the prolonged irradiation [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
81
+ page_content=' These PHD values are close to those ones obtained for the investigated planar and SB1 detectors operated at high reverse bias – see Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
82
+ page_content=' We believe, that higher PHD values in non-irradiated SiLi are related with rather thick entrance window in these detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
83
+ page_content=' Whereas the increase of PHD for SB2 detector operated at lower Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
84
+ page_content=' Irradiation conditions and the degradation of the operational parameters of the investigated detectors: Ub – applied bias during irradiation;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
85
+ page_content=' Fs – surface electric field strength;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
86
+ page_content=' PHDLF/ PHDHF – pulse-height defects for light and heavy fragments peaks registered by non-irradiated detectors;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
87
+ page_content=' NFF and N\uf061 – exposure by fission fragments and \uf061-particles, respectively;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
88
+ page_content=' ∆EHF/∆NFF – slope coefficient describing the linear shift of heavy fission fragment maximum;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
89
+ page_content=' ∆ELF/∆NFF – slope coefficient describing the linear shift of light fission fragment maximum;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
90
+ page_content=' ∆I/∆N – rate of the reverse current increase relative to the total number of the registered fission products (wasn’t measured for SiLi2 detector);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
91
+ page_content=' NFFmax – maximal permissible exposure by fission fragments;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
92
+ page_content=' t – expected active operation period of the detector in a neutron source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
93
+ page_content=' p+n planar SB1 SB2 SiLi1 SiLi2 Ub, V 150 200 30 400 400 Fs, kV/cm 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
94
+ page_content='5 40 17 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
95
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
96
+ page_content='5 PHDLF/PHDHF, MeV 8/10 9/11 18/19 28/29 35/37 NFF 108 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
97
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
98
+ page_content='45 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
99
+ page_content='43 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
100
+ page_content='4 1 N\uf061\uf020\uf020 \uf031\uf030\uf031\uf030 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
101
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
102
+ page_content='20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
103
+ page_content='19 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
104
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
105
+ page_content='44 ∆EHF/∆NFF 10 5, keV/FF 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
106
+ page_content='9 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
107
+ page_content='8 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
108
+ page_content='9 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
109
+ page_content='6 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
110
+ page_content='7 ∆ELF/∆NFF 10 5, keV/FF 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
111
+ page_content='9 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
112
+ page_content='9 20 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
113
+ page_content='2 12 ∆I/∆N 10 16, A/ion\uf020 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
114
+ page_content='9 14 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
115
+ page_content='0 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
116
+ page_content='4 NFFmax 108 22 12 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
117
+ page_content='2 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
118
+ page_content='9 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
119
+ page_content='7 t, years 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
120
+ page_content='6 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
121
+ page_content='3 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
122
+ page_content='2 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
123
+ page_content='6 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
124
+ page_content='5 electric field (Table 1) reflects the influence of the electric field strength on the charge carrier collection efficiency, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
125
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
126
+ page_content=' on the recombination of the generated electron-hole pairs (note that the active layer thickness in SB2 detector exceeds the projection range of incident FFs even at 30V).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
127
+ page_content=' As a result of the prolonged irradiation by 252Cf fission products, the linear shift of FF peaks positions, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
128
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
129
+ page_content=' the linear increase of PHD for fission fragments peaks, was revealed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
130
+ page_content=' Since the task of semiconductor detector operating as a part of neutron calibration source is the reliable detection of fission fragments signal, the irradiated detector could be considered to be "degraded" when the spectrum of the heavy fission fragment overlaps with much more intense signal at double energy of α- peak, what prevents us from discrimination between them [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
131
+ page_content=' The values of maximal “permissible” exposure by fission fragments NFFmax corresponding to the beginning of the peaks overlap at three standard deviations from their maxima were estimated for each detector using the corresponding slope coefficients derived for HF peak and the results are presented in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
132
+ page_content=' Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
133
+ page_content=' TRIM simulated vacancies distribution profiles (solid lines) and linear densities of electron-hole pairs (dashed lines) generated by light and heavy FFs with mean energies and masses of 104 MeV and 79 MeV, 106 amu and 142 amu, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
134
+ page_content=' Heavy Fragments 300 2 Light Fragments 250 200 150 100 50 0 0 0 5 10 15 20 Depth, μm Permissible exposure values NFFmax for the investigated detectors appeared to vary approximately by one order of magnitude.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
135
+ page_content=' The highest NFFmax values were found for planar and SB1 detector operated at 200V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
136
+ page_content=' Reduction of the operating bias and thus the electric field strength in case of SB2 detector has led to considerable decrease of the expected permissible exposure value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
137
+ page_content=' Therefore, the electric field strength affects not only the PHD on non-irradiated detector, but also the value of the expected maximal exposure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
138
+ page_content=' However the NFFmax exposure values for SiLi detectors – which operated with lowest electric field as compared with other detectors – are significantly higher than that for SB2 detector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
139
+ page_content=' Thus the expected maximal exposure appeared to be more sensitive to the electric field strength in the surface barrier detectors and less sensitive in SiLi and planar detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
140
+ page_content=' It follows then that not only the electric field strength, but also a detector’s internal structure defines the PHD growth under irradiation and the maximal permissible exposure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
141
+ page_content=' According to TRIM simulations, irradiation of Si detectors by fission fragments will lead to the creation of vacancy-interstitial pairs and therefore to the formation of high density of radiation- induced defects in the region from detector surface till the depth of 17 μm with the maxima at 14-16 μm (Figure 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
142
+ page_content=' Additionally TRIM indicates, that the energy of FFs is high enough to damage the detector surface by sputtering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
143
+ page_content=' Therefore, prolonged irradiation with fission fragments will lead to an increase of the carrier recombination rate both in Si bulk and on the surface of the semiconductor, thus contributing to the PHD growth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
144
+ page_content=' The transition region in the detectors produced by planar and by SiLi technology (p+n and p-i transition regions, respectively) is located inside the crystalline matrix at the typical depths of 50-500 nm from the surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
145
+ page_content=' Apparently, the contribution of the surface recombination to the charge carrier losses will be more significant for surface-barrier detectors than for SiLi and planar ones, whereas the contribution of bulk defects – approximately similar in all detectors, what may be the reason for different sensitivity of NFFmax exposure to the electric field strength in these detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
146
+ page_content=' Additional investigations are needed to determine the dominant charge loss channel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
147
+ page_content=' Suggested neutron calibration source should operate also at cryogenic temperatures (liquid nitrogen or slightly above).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
148
+ page_content=' Performed irradiation of SiLi2 detector at liquid nitrogen temperature has shown, that in contrast to the electric field, temperature of irradiation seems to have no or only minor influence on the expected value of maximal exposure as it could be concluded from the comparable NFFmax values obtained for SiLi detectors irradiated at different temperatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
149
+ page_content=' Somewhat smaller NFFmax exposure obtained for SiLi2 detector is probably related with thicker entrance window in this detector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
150
+ page_content=' Knowing the maximal expected exposure values NFFmax, it is possible to estimate the duration of active “lifetime” of neutron calibration source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
151
+ page_content=' For the operation of neutron calibration source the reasonable neutron activity would be the around 20 neutrons/s and taking into account that each spontaneous fission releases in average 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
152
+ page_content='7 fast neutrons, the activity of 20 neutrons/s would correspond to ~6 spontaneous fissions per second.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
153
+ page_content=' Therefore, considering the maximal exposure value from Table 1, the duration of active “lifetime” of such neutron calibration source will be 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
154
+ page_content='2-11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
155
+ page_content='6 years (without taking into account the decay of the radiation source).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
156
+ page_content=' During this operation period, a significant increase of leakage current up to ~100 μA can be expected at room temperature, as can be calculated from the obtained coefficients of leakage current growth (Table 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
157
+ page_content=' Such high reverse current is unacceptable and therefore the detector cooling in order to reduce the reverse current during the neutron source operation will be required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
158
+ page_content=' The coefficients of current growth upon irradiation by fission products of 252Cf appeared to be an order of magnitude higher than the corresponding coefficients of 7-17×10–17 A/α determined by us earlier for the identical detectors subjected to long-term irradiation by \uf061-particles [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
159
+ page_content=' This fact confirms that prolonged irradiation by FFs leads to the creation of the effective recombination-generation defect centers participating in charge carrier recombination and the reverse current growth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
160
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
161
+ page_content=' Conclusions Prolonged irradiation of three different types of Si semiconductor detectors by fission products of 252Cf nuclide has led to a gradual increase of pulse-height defect for the fission fragments peaks in all investigated detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
162
+ page_content=' This will eventually lead to the overlap with more intense \uf061-peak and therefore to the impossibility of further reliable detection of fission fragments by the semiconductor detector and thus to the limitation of the operation period of neutron calibration source.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
163
+ page_content=' Obtained experimental results suggest, that in order to assure the longest operation period of the neutron calibration source it is worth to use the semiconductor detectors with lowest surface recombination rate and with highest possible electric field strength in their active region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
164
+ page_content=' Among the investigated detectors, the planar one most fully meets these requirements, whereas in relatively thick SiLi detectors it is difficult to achieve the high electric field strength and surface-barrier detectors may suffer from high surface recombination.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
165
+ page_content=' With properly chosen semiconductor detector the expected active operation period of 252Cf-based neutron calibration source may reach up to 12 years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
166
+ page_content=' Acknowledgements The reported study was funded by RFBR, project number 20-02-00571 References [1] Knoll G F 2000 Radiation Detection and Measurement, 3rd ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
167
+ page_content=' (New York: John Wiley and Sons) ISBN 978-0-471-07338-3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
168
+ page_content=' 978-0-471-07338-3 [2] Moll M 2018 IEEE Transactions on Nuclear Science 65 1561–1582 [3] Bakhlanov S V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
169
+ page_content=' Derbin A V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
170
+ page_content=' Drachnev I S,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
171
+ page_content=' Konkov O I,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
172
+ page_content=' Kotina I M,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
173
+ page_content=' Kuzmichev A M,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
174
+ page_content=' Lomskaya I S,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
175
+ page_content=' Mikulich M S,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
176
+ page_content=' Muratova N V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
177
+ page_content=' Niyazova N V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
178
+ page_content=' Semenov D A,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
179
+ page_content=' Trushin M V and Unzhakov E V 2021 Journal of Physics: Conference Series 2103 012138 [4] Bakhlanov S V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
180
+ page_content=' Bazlov N V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
181
+ page_content=' Chernobrovkin I D,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
182
+ page_content=' Derbin A V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
183
+ page_content=' Drachnev I S,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
184
+ page_content=' Kotina I M,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
185
+ page_content=' Konkov O I,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
186
+ page_content=' Kuzmichev A M,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
187
+ page_content=' Mikulich M S,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
188
+ page_content=' Muratova N V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
189
+ page_content=' Trushin M V and Unzhakov E V 2021 Journal of Physics: Conference Series 2103 012139 [5] Bazlov N V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
190
+ page_content=' Bakhlanov S V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
191
+ page_content=' Derbin A V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
192
+ page_content=' Drachnev I S,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
193
+ page_content=' Eremin V K,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
194
+ page_content=' Kotina I M,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
195
+ page_content=' Muratova V N,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
196
+ page_content=' Pilipenko N V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
197
+ page_content=' Semenov D A,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
198
+ page_content=' Unzhakov E V and Chmel E A 2018 Instruments and Experimental Techniques 61 323 [6] Bazlov N V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
199
+ page_content=' Bakhlanov S V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
200
+ page_content=' Derbin A V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
201
+ page_content=' Drachnev I S,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
202
+ page_content=' Izegov G A,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
203
+ page_content=' Kotina I M,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
204
+ page_content=' Muratova V N,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
205
+ page_content=' Niyazova N V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
206
+ page_content=' Semenov D A,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
207
+ page_content=' Trushin M V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
208
+ page_content=' Unzhakov E V,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
209
+ page_content=' Chmel E A 2020 Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
210
+ page_content=' Exp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
211
+ page_content=' Tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
212
+ page_content=' 63(1) 25 [7] Alekseev I E, Bakhlanov S V, Derbin A V, Drachnev I S, Kotina I M, Lomskaya I S, Muratova V N, Niyazova N V, Semenov D A, Trushin M V, Unzhakov E V 2020 Physical Review C 102 064329 [8] Kozai M, Fuke H, Yamada M, Perez K, Erjavec T, Hailey C J, Madden N, Rogers F, Saffold N, Seyler D, Shimizu Y, Tokuda K, Xiao M 2019 Nuclear Inst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
213
+ page_content=' and Methods in Physics Research A 947 162695 [9] Kotina I M, Danishevskii A M, Konkov O I, Terukov E I, Tuhkonen L M 2014 Semiconductors 48(9) 1167 [10] Paasch K, Krause H, Scobel W 1984 Nuclear Inst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
214
+ page_content=' and Methods in Physics Research 221 558 [11] Eremin V K, Il’yashenko I N, Strokan N B, Shmidt B 1995 Fiz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
215
+ page_content=' Tekh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
216
+ page_content=' Poluprovodn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
217
+ page_content=' 29(1) 79 [in Russian] [12] Tsyganov Y S 2013 Physics of Particles and Nuclei 44(1) 92 [13] Ziegler J F, Biersack J P, Ziegler M D SRIM – Stopping and Range of Ions in Matter www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
218
+ page_content='srim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
219
+ page_content='org (accessed: May 2022)' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/BNE5T4oBgHgl3EQfTA98/content/2301.05533v1.pdf'}
C9E1T4oBgHgl3EQfWATV/content/tmp_files/2301.03110v1.pdf.txt ADDED
@@ -0,0 +1,2742 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ RobArch: Designing Robust Architectures against Adversarial Attacks
2
+ ShengYun Peng1, Weilin Xu2, Cory Cornelius2, Kevin Li1, Rahul Duggal1,
3
+ Duen Horng Chau1, and Jason Martin2
4
+ 1Georgia Institute of Technology, Atlanta, GA, USA
5
+ {speng65,kevin.li,rahulduggal,polo}@gatech.edu
6
+ 2 Intel Corporation, Hillsboro, OR, USA
7
+ {weilin.xu,cory.cornelius,jason.martin}@intel.com
8
+ Abstract
9
+ Adversarial Training is the most effective approach for
10
+ improving the robustness of Deep Neural Networks (DNNs).
11
+ However, compared to the large body of research in optimiz-
12
+ ing the adversarial training process, there are few investi-
13
+ gations into how architecture components affect robustness,
14
+ and they rarely constrain model capacity. Thus, it is unclear
15
+ where robustness precisely comes from. In this work, we
16
+ present the first large-scale systematic study on the robust-
17
+ ness of DNN architecture components under fixed parame-
18
+ ter budgets. Through our investigation, we distill 18 action-
19
+ able robust network design guidelines that empower model
20
+ developers to gain deep insights.
21
+ We demonstrate these
22
+ guidelines’ effectiveness by introducing the novel Robust
23
+ Architecture (RobArch) model that instantiates the guide-
24
+ lines to build a family of top-performing models across
25
+ parameter capacities against strong adversarial attacks.
26
+ RobArch achieves the new state-of-the-art AutoAttack accu-
27
+ racy on the RobustBench ImageNet leaderboard. The code
28
+ is available at https://github.com/ShengYun-Peng/RobArch.
29
+ 1. Introduction
30
+ Deep Neural Networks (DNNs) are vulnerable to adver-
31
+ sarial attacks [6,17,29,32,47]. Many defense methods have
32
+ been proposed to mitigate this pitfall [2,10,44,50,58,59,64],
33
+ and among them, Adversarial Training (AT) [36] is the most
34
+ effective way to defend against adversarial attacks. Com-
35
+ pared to the large body of research devoted to improving
36
+ the loss function [23, 31] and optimizing the AT proce-
37
+ dure [14, 54, 64], few studies investigate how architectural
38
+ components affect robustness despite its importance.
39
+ Yet DNN architectures have been dominating general-
40
+ ization improvements [16, 19, 34].
41
+ Recent research has
42
+ started to highlight the potential significant impact architec-
43
+ ture choices could have on robustness [13,46], and showed
44
+ 20
45
+ 40
46
+ 60
47
+ 80
48
+ 100
49
+ Number of Parameters (Millions)
50
+ 25
51
+ 30
52
+ 35
53
+ 40
54
+ 45
55
+ 50
56
+ ResNet-18
57
+ ResNet-50
58
+ XCiT-S12
59
+ XCiT-M12
60
+ WideResNet50-2
61
+ WideResNet50-2+DiffPure
62
+ Swin-B
63
+ XCiT-L12
64
+ RobArch-S
65
+ RobArch-M
66
+ RobArch-L
67
+ DeiT-S
68
+ +DiffPure
69
+ ResNet-50+DiffPure
70
+ ResNet-50+GELU
71
+ PoolFormer
72
+ -M12
73
+ DeiT-S
74
+ RobArch-L Achieves SOTA AutoAttack Accuracy
75
+ RobArch family outperforms ConvNets and Transformers with similar #param
76
+ AutoAttack
77
+ Accuracy (%)
78
+ Figure 1.
79
+ Our RobArch model family outperforms the SOTA
80
+ XCiT family on RobustBench ImageNet leaderboard [7]. Every
81
+ RobArch model outperforms its XCiT counterparts at a similar
82
+ capacity. RobArch-S outperforms ResNet-50 by 9.18 percentage
83
+ points, and is even more robust than WideResNet50-2 despite hav-
84
+ ing 2.6× fewer parameters. The robustness continues to increase
85
+ as capacity increases. RobArch-L achieves the new SOTA AA ac-
86
+ curacy on RobustBench. Table 3 presents accuracy details.
87
+ that adjusting widths [55] or depths [26] could robustify a
88
+ network.
89
+ However, those studies did not constrain the model ca-
90
+ pacity, making it hard to attribute the robustness gains to
91
+ those adjustments, because increasing model capacity alone
92
+ could already improve robustness [26, 36]. Thus, control-
93
+ ling for model capacity while assessing robustness is im-
94
+ portant, and recent research has provided supporting evi-
95
+ dence. For example, despite the popular belief that trans-
96
+ former models might be more robust than CNNs [5, 42],
97
+ Bai et al. [3] demonstrated that Data-efficient image Trans-
98
+ 1
99
+ arXiv:2301.03110v1 [cs.CV] 8 Jan 2023
100
+
101
+ formers (DeiT) [49] and ResNet [19] with Gaussian Error
102
+ Linear Unit (GELU) activations [21] attained comparable
103
+ robustness if the model scales were balanced. Therefore, it
104
+ remains unclear how these previously studied architectural
105
+ components precisely affect robustness. Our research filled
106
+ this critical research gap by making three key contributions:
107
+ • The first large-scale systematic study on the robust-
108
+ ness of DNN architecture components. To the best of
109
+ our knowledge, our work is the first to comprehensively
110
+ investigate and compare the robustness impacts of a wide
111
+ range of architecture components on a large dataset such
112
+ as ImageNet. Advancing over prior work, we carefully
113
+ constrain the parameter budget to isolate and hone in on
114
+ the benefit of each component. Such a systematic study
115
+ enables us to discover a family of new architectures that
116
+ outperform state-of-the-art (SOTA) networks. (Figure 1).
117
+ • 18 actionable robust network design guidelines.
118
+ Our systematic investigation for component robustness,
119
+ through training over 150 models on ImageNet [12], en-
120
+ ables us to distill 18 generalizable, actionable guidelines
121
+ that empower model developers to gain deep insights and
122
+ design networks with higher robustness. The guidelines
123
+ present significant new knowledge and discoveries for our
124
+ computer vision community. For example, we have dis-
125
+ covered (1) deepening a network is more effective than
126
+ widening it, and there is a sweet spot; (2) specific mod-
127
+ ifications such as adding Squeeze and Excitation (SE)
128
+ block, removing the first normalization layer in a block,
129
+ and reducing the downsampling factor in the stem stage
130
+ effectively boosts robustness; and (3) architecture designs
131
+ that harm robustness include inverted bottleneck, large di-
132
+ lation factor, Instance Normalization (IN), parametric ac-
133
+ tivation functions [9], and reducing activation layers.
134
+ • Top performance against strong adversarial attacks.
135
+ We demonstrate our guidelines’ effectiveness by intro-
136
+ ducing the novel Robust Architecture (RobArch) model
137
+ that instantiates the guidelines to build a family of top-
138
+ performing models across parameter capacities against
139
+ strong adversarial attacks. In particular, we compare our
140
+ RobArch family with the Cross-Covariance Image Trans-
141
+ formers (XCiT) family [1] that is the SOTA on Robust-
142
+ Bench [7]. Every RobArch model outperform its XCiT
143
+ counterpart with a similar model capacity (Figure 1).
144
+ RobArch-S surpasses ResNet-50’s AutoAttack (AA) ac-
145
+ curacy by 9.18 percentage points, and is even more robust
146
+ than WideResNet50-2 despite having 2.6× fewer param-
147
+ eters. The robustness continues to increase as capacity
148
+ increases. RobArch-L achieves the new SOTA AutoAt-
149
+ tack (AA) [8] accuracy on the RobustBench ImageNet
150
+ leaderboard. RobArch’s performance advantage extrap-
151
+ olates to the Projected Gradient Descent (PGD) attack.
152
+ Overall, the proposed RobArchs outperform both Con-
153
+ vNets and Transformers with similar total parameters.
154
+ 2. Robust Architecture Design
155
+ We carefully select architectural components from off-
156
+ the-shelf DNNs (ResNet [19], RegNet [40], DenseNet [25],
157
+ and ConvNeXt [34]) that improve generalization accuracy.
158
+ Based on the commonalities in these network designs, we
159
+ group the components into three modification categories:
160
+ • Network-level: depth, width
161
+ • Stage-level: stem stage, dense connection
162
+ • Block-level: kernel size, dilation, activation, SE, nor-
163
+ malization
164
+ Since ResNet [19] is a milestone in the history of DNN
165
+ architecture, we choose its most popular instantiation,
166
+ ResNet-50 (∼26M parameters) as the base architecture,
167
+ which consists of a stem stage, n = 4 body stages, and a
168
+ classifier head, as our starting point. Each body stage con-
169
+ tains multiple residual blocks with various depth and width
170
+ configurations. Appendix A provides details of ResNet-50
171
+ configurations.
172
+ Notation and symbols used throughout this paper.
173
+ • We denote D-d1-...-dn as the depth of each stage in an
174
+ n-stage network (n ∈ {3, 4, 5, 6}).
175
+ • For stage i, wi and wbi are the numbers of channels in the
176
+ pointwise and non-pointwise convolutions, respectively.
177
+ • Bottleneck multiplier bi is the ratio of channels in point-
178
+ wise to non-pointwise convolution, bi = wi/wbi.
179
+ • Assuming wgi is the group convolution width, gi is the
180
+ total number of groups in the non-pointwise convolution
181
+ layer: gi = ⌊wbi/wgi⌉ = ⌊wi/ (bi × wgi)⌉.
182
+ • Width expansion ratio is e = wi+1/wi, i ≤ n − 1.
183
+ • We use W-w1-...-wn, G-g1-...-gn, BM-b1-...-bn to rep-
184
+ resent the number of channels, group convolution groups,
185
+ and bottleneck multiplier in an n-stage network.
186
+ Experimental settings.
187
+ We train all models on Ima-
188
+ geNet [12] with the recipes specified in Sec. 2.1. When
189
+ studying a single architecture component (Sec. 2.2 - 2.4)
190
+ and building cumulative networks (Sec.
191
+ 3.1 & 3.2), we
192
+ use 10-step PGD (PGD10) with different attack budgets
193
+ ϵ (ϵ ∈ {2, 4, 8}) for fast evaluations. After finalizing the
194
+ model structures of the RobArch, we test all RobArchs
195
+ against PGD100 and AA.
196
+ All attacks are ℓ∞ bounded.
197
+ To control for the effect of model capacity, we constrain
198
+ the networks’ total parameters, i.e., similar to ResNet-50
199
+ (∼26M), throughout the exploration.
200
+ 2.1. Training Techniques
201
+ Standard-AT. Adversarial Training (AT) is the most reli-
202
+ able defense to obtain robust DNNs [17, 36]. Standard-AT
203
+ is formulated as a min-max optimization framework [36].
204
+ Given a network fθ parameterized by θ, a dataset with sam-
205
+ ples (xi, yi), and a loss function L, the robust optimization
206
+ 2
207
+
208
+ 3-Stage
209
+ 4-Stage
210
+ 5-Stage
211
+ 6-Stage
212
+ 5
213
+ 10
214
+ 15
215
+ 20
216
+ GMAC
217
+ Natural
218
+ Accuracies
219
+ PGD10-4
220
+ Accuracies
221
+ 20
222
+ 30
223
+ 40
224
+ 50
225
+ 60
226
+ 4-Stage Networks Provides
227
+ Top Accuracies at Moderate GMACs
228
+ (a) 4-stage networks attain top accuracies at much
229
+ lower Giga Multiply–Accumulates (GMACs) than 3-
230
+ stage networks. 5-stage and 6-stage networks are sig-
231
+ nificantly less robust.
232
+ PGD10-8
233
+ 10
234
+ 20
235
+ 30
236
+ 40
237
+ 50
238
+ 60
239
+ Not Followed
240
+ Accuracy
241
+ Natural
242
+ PGD10-2
243
+ PGD10-4
244
+ Guideline 2 Followed
245
+ Guideline 2 Followed
246
+ For a 4-stage network,
247
+ set d1 <d2 <d3
248
+ dn
249
+ (b) Higher accuracy when guideline 2 is fol-
250
+ lowed: depth rule d1 < d2 < d3 > c × d4.
251
+ We plot the mean accuracy (solid line) and
252
+ 95% confidence interval (the shading).
253
+ Width
254
+ Larger circle means higher PGD10-4 accuracy
255
+ 0
256
+ 10
257
+ 20
258
+ 30
259
+ 40
260
+ 50
261
+ Depth
262
+ 200
263
+ 400
264
+ 600
265
+ 800
266
+ 1000
267
+ 1200
268
+ 1400
269
+ 1600
270
+ D-5-8-13-1
271
+ W-512-768-1152-1728
272
+ D-8-12-20-2
273
+ W-424-632-944-1416
274
+ Stage 1
275
+ Stage 2
276
+ Stage 3
277
+ Robustness Generally Improves
278
+ As Depth Increases & Width Decreases
279
+ (c) Robustness generally improves in all stages as
280
+ depth increases and width decreases, until catas-
281
+ trophic overfitting happens with significantly re-
282
+ duced robustness.
283
+ Figure 2. For network-level design, following guideline 2 to increase depth and decrease width in a 4-stage network provides optimal
284
+ robustness. We study (a) how the number of stages affects accuracies, (b) stage depth settings, and (c) depth-width trade-off. We only
285
+ plot the first three stages of a 4-stage network in (c) for better visualization since the last stage is much shallower as per the optimal depth
286
+ configurations in guideline 2. These observations also apply to other PGD attack budgets, as shown in Appendix D.
287
+ problem is formulated as:
288
+ argmin
289
+ θ
290
+ E(xi,yi)∼D
291
+
292
+ max
293
+ x′ L (fθ, x′, y)
294
+
295
+ ,
296
+ (1)
297
+ The inner adversarial example x′ is generated on the fly dur-
298
+ ing the training process, which aims to find an adversarial
299
+ perturbation of a given data point x that achieves a high loss,
300
+ x′
301
+ k+1 =
302
+
303
+ x+∆
304
+ (x′
305
+ k + αsgn (∇xL(θ, x′
306
+ k, y))) .
307
+ (2)
308
+ sgn(·) is the sign function, α is the step size, x′
309
+ k is the ad-
310
+ versarial example generated after k steps (1 ≤ k ≤ K),
311
+ ∆ = {δ : ∥δ∥∞ ≤ ϵ} is the threat mode, and �
312
+ x+∆ is a
313
+ projection operation that clips the perturbation back to the
314
+ ϵ-ball centered on x if it goes beyond the attack budget.
315
+ Fast-AT. Fast-AT speeds up the Standard-AT and can ro-
316
+ bustify a ResNet-50 in under 13 hours [54]. It not only
317
+ adopts Fast Gradient Sign Method (FGSM) [17] to gener-
318
+ ate adversarial samples during the training but also incorpo-
319
+ rates a cyclic learning rate [43] and mixed-precision arith-
320
+ metic [37] to fully accelerate the AT with just 15 epochs. A
321
+ line of research improves the performance and mitigates the
322
+ catastrophic overfitting problem discovered in the Fast-AT,
323
+ e.g., YOPO [63], GradAlign [2], GAT [45], Sub-AT [30],
324
+ etc., but there are limited explorations on whether these
325
+ recipes are compatible with the full ImageNet [12].
326
+ Although Fast-AT provides competitive PGD results, its
327
+ resulting robustness on ResNet-50 is inferior to that of
328
+ Standard-AT’s as per the AA accuracy on the RobustBench
329
+ leaderboard [7]. Therefore, we use Fast-AT as a rapid in-
330
+ dicator while exploring different architecture components
331
+ and building the RobArch family, and use Standard-AT to
332
+ robustify all members in the RobArch family.
333
+ 2.2. Network-level Design
334
+ Depth. In the standard ResNet-50 (D-3-4-6-3), each stage
335
+ downsamples the input features by 2. The downsampling
336
+ in the first stage is replaced by a max-pooling layer in the
337
+ stem stage. We sample 36 architectures based on the depth
338
+ relationship between each pair of stages, i.e., di ≤ di+1
339
+ and di > di+1. The widths in all stages are the same as
340
+ ResNet-50, and when n > 4, we reuse the width in stage
341
+ 4. For n = 6, even setting di = 1, i ≤ n leads to 1.83M
342
+ more parameters than ResNet-50. Hence, there is only 1
343
+ data point for the 6-stage network, and we do not continue
344
+ increasing the total stages. Fig. 2a shows the results af-
345
+ ter AT. 4-stage networks attain top natural and adversarial
346
+ accuracies at much lower GMACs than 3-stage networks.
347
+ 5-stage and 6-stage networks are significantly less robust.
348
+ These results are expected since shallow stages, in general,
349
+ compute on higher resolutions, and the depth of a 3-stage
350
+ network in shallow stages is deeper than a 4-stage network
351
+ by a large margin for similar total parameters. Hence, we
352
+ select 4-stage networks and further explore the depth rela-
353
+ tionship between stages.
354
+ Huang et al. [26] found that reducing depth in the last
355
+ stage of a 3-stage WideResNet34-10 improves robustness.
356
+ Upon further inspection of our 4-stage models, we observe
357
+ that increasing the stage depths di along with i, then sig-
358
+ nificantly decreasing the depth in the last stage, leads to
359
+ higher robustness. Fig. 2b shows that following such a rule
360
+ (d1 < d2 < d3 > c × d4) leads to a higher accuracy than
361
+ not following it. We set c = 3 and leave the finetuning of
362
+ a larger c to further research. RegNet [40] first discovered
363
+ the depth pattern and applied it to improve benign accuracy.
364
+ Our results extend this discovery to adversarial settings and
365
+ 3
366
+
367
+ show that it helps robustify architectures without incurring
368
+ extra parameters. Overall, we found the optimal stage depth
369
+ ratio is D-5-8-13-1 and listed its performance in Table 1 row
370
+ 2.
371
+ Guideline 1: 3-stage ≈ 4-stage > 5-stage ≫ 6-stage
372
+ network in terms of robustness.
373
+ Guideline 2: For a 4-stage network, set d1 < d2 <
374
+ d3 ≫ dn, and D-5-8-13-1 provides the optimal robustness.
375
+ Width. Factors that affect the stage width are pointwise
376
+ convolution channels wi, group convolution groups gi, and
377
+ bottleneck multiplier bi. The width configurations of the
378
+ standard ResNet-50 are W-256-512-1024-2048, G-1-1-1-1,
379
+ BM-0.25-0.25-0.25-0.25. Unless otherwise specified, all
380
+ configurations are kept consistent with ResNet-50 when
381
+ studying one of the factors.
382
+ For bi ∈ {0.125, 0.25, 0.5, 1, 2, 4}, we first test a con-
383
+ stant bi = b in all stages. The accuracy reaches the peak
384
+ when b = 0.25 or 0.5 and significantly decreases when in-
385
+ creasing b from 0.5 to 4, which shows the inverted bottle-
386
+ neck is harmful to robustness. b = 0.25 (ResNet-50) has
387
+ higher natural and PGD10-2 accuracy, while b = 0.5 has
388
+ higher PGD10-4 and PGD10-8 accuracy. Both results are
389
+ shown in Table 1 (rows 1 and 3). Then, we vary bi for dif-
390
+ ferent stages, b1,2 < b3,4 and b1,2 > b3,4. The robustness
391
+ of BM-0.25-0.25-2-2 is better than bi = 2 but worse than
392
+ bi = 0.25. Surprisingly, BM-4-4-0.25-0.25 outperforms
393
+ both bi = 0.25 and bi = 4. We further combine the two op-
394
+ timal bottleneck multipliers and set b1,2 = 0.5, b3,4 = 0.25.
395
+ As shown in Table 1 row 4, this setting attains higher accu-
396
+ racy than both bi = 0.5 and 0.25.
397
+ Next, we study the group convolution groups gi
398
+
399
+ {1, 2, 4, 8, 16, wbi}. gi = wbi is equivalent to the depth con-
400
+ volution. The pointwise convolution width wi is adjusted to
401
+ reach the controlled parameter budget, but bi is always 0.25.
402
+ For a constant gi = g, we observe a significant increase
403
+ from g = 1 (ResNet-50) to g = 2, but then the accuracy
404
+ gradually decreases if we continue to increase g. Similar
405
+ to the bottleneck multiplier study, we vary gi for different
406
+ stages. However, there is no further robustness gain. We list
407
+ the results of g = 2 in Table 1 row 5.
408
+ For the width expansion ratio, we evaluate e
409
+
410
+ {1, 1.5, 2, 2.5, 3}.
411
+ The robustness rises and saturates at
412
+ e = 1.5 and falls for a larger e. We show e = 1.5 in Ta-
413
+ ble 1 row 6. Finally, we combine the optimal configurations
414
+ for all three factors, i.e., b1,2 = 0.5, b3,4 = 0.25, gi = g =
415
+ 2, e = 1.5. However, the robustness is inferior to that of just
416
+ using the individual optimal settings. After a close look at
417
+ all the results, we find setting a constant bi = b = 0.25
418
+ works favorably with g and e.
419
+ In addition, we observe
420
+ g = 2, e = 2 and g = 1, e = 1.5 achieve the best two ac-
421
+ curacies. The phenomenon also demonstrates that directly
422
+ combining multiple individual optimal architectural settings
423
+ does not transfer to a better model.
424
+ Guideline 3: Inverted bottleneck harms robustness, es-
425
+ pecially when added to deeper stages.
426
+ Guideline 4:
427
+ For a single modification, b1,2
428
+ =
429
+ 0.5, b3,4 = 0.25, gi = 2, and e = 1.5 all show promising
430
+ improvements. However, merging all three configurations
431
+ makes the model less robust, and the optimal width config-
432
+ urations are e = 2, g = 2 or e = 1.5, g = 1 with b = 0.25.
433
+ Combining Depth and Width. In this part, we answer the
434
+ following question: Under a fixed model capacity, does in-
435
+ creasing widths while decreasing depths, or vice versa, im-
436
+ prove robustness?
437
+ We use the optimal depth ratio, D-5-8-13-1. To provide a
438
+ more general understanding and avoid overfitting to specific
439
+ optimal settings, we cross-select e = 1.5, g = 2, b = 0.25
440
+ from the two optimal width configurations from guideline
441
+ 4. We proportionally adjust depths and widths to accom-
442
+ modate the fixed budget.
443
+ Fig.
444
+ 2c displays the relation-
445
+ ship between depths and widths using PGD10 accuracy. A
446
+ larger bubble size means higher accuracy. The results show
447
+ that increasing depth while decreasing width improves ro-
448
+ bustness in all stages. It is important to note that if we
449
+ continue the trend, catastrophic overfitting [2] occurs dur-
450
+ ing training. Since catastrophic overfitting drastically de-
451
+ creases the robustness, we should deepen the network but
452
+ balance the depth and the width to stabilize the AT pro-
453
+ cess.
454
+ Comparing the top 2 models (dotted lines), both
455
+ PGD10-2 and PGD10-4 accuracies of the deeper model are
456
+ 0.10pp (percentage points) higher, but the PGD10-8 accu-
457
+ racy is 0.49pp lower, which is a sign of unstable training.
458
+ Overall, D-5-8-13-1 is selected as the starting point of our
459
+ cumulative model in Sec. 3.1. Compared to ResNet-50
460
+ (D-3-4-6-3), D-5-8-13-1 is much deeper and slimmer with
461
+ significantly higher robustness: ↑ 1.15pp for natural accu-
462
+ racy, ↑ 2.03pp for PGD10-2, ↑ 2.62pp for PGD10-4, and
463
+ ↑ 2.75pp for PGD10-8. We observe a similar depth-width
464
+ relationship when scaling up the model in Sec. 3.2.
465
+ Guideline 5: Under a fixed model capacity, first increase
466
+ the network depth proportionally to the optimal depth until
467
+ catastrophic overfitting happens, i.e., a sudden drop in loss
468
+ and increase in training accuracy. The width is adjusted to
469
+ fill the total parameter budget.
470
+ 2.3. Stage-level Design
471
+ Stem Stage. The stem stage in a standard ResNet-50 con-
472
+ sists of a convolution layer and a max-pooling layer, each
473
+ of which has a downsampling factor of 2. All 4 tandemly-
474
+ connected body stages downsample the input resolution by
475
+ 2 except the first stage. The convolution layer uses a 7 × 7
476
+ kernel and outputs 64-layer features.
477
+ In the stem stage, we modify the following architec-
478
+ tural components: channel width, kernel size, “patchify”
479
+ stem, and downsampling factor. First, we test channel width
480
+ ∈ {32, 64, 96} and kernel size ∈ {3, 5, 7}. With less than
481
+ 4
482
+
483
+ Table 1. PGD10 robustness of architecture components. All con-
484
+ figurations trained with Fast-AT and evaluated on full ImageNet
485
+ validation set. We provide ResNet-50 as baseline. Appendix D
486
+ shows detailed results, including PGD10-2 and PGD10-8.
487
+ Idx.
488
+ Configurations
489
+ Natural
490
+ PGD10-4
491
+ 1
492
+ ResNet-50
493
+ 56.09%
494
+ 30.43%
495
+ Network-level Design
496
+ 2
497
+ D-5-8-13-1
498
+ 57.35%
499
+ 33.33%
500
+ 3
501
+ BM-0.5-0.5-0.5-0.5
502
+ 55.31%
503
+ 30.52%
504
+ 4
505
+ BM-0.5-0.5-0.25-0.25
506
+ 56.11%
507
+ 31.26%
508
+ 5
509
+ G-2-2-2-2
510
+ 57.31%
511
+ 32.09%
512
+ 6
513
+ W-512-768-1152-1728
514
+ 57.17%
515
+ 32.04%
516
+ 7
517
+ G-2-2-2-2
518
+ 56.64%
519
+ 31.04%
520
+ BM-05-05-025-025
521
+ W-512-768-1152-1728
522
+ Stage-level Design
523
+ 8
524
+ Stem width 96
525
+ 57.29%
526
+ 32.06%
527
+ 9
528
+ Move down (↓) downsampling
529
+ 57.08%
530
+ 33.08%
531
+ 10
532
+ Dense ratio 2
533
+ 55.93%
534
+ 30.73%
535
+ Block-level Design
536
+ 11
537
+ Kernel size 5
538
+ 56.73%
539
+ 32.77%
540
+ 12
541
+ Kernel size 7
542
+ 59.70%
543
+ 34.67%
544
+ 13
545
+ Dilation 2
546
+ 52.98%
547
+ 28.38%
548
+ 14
549
+ Dilation 3
550
+ 52.10%
551
+ 27.97%
552
+ 15
553
+ Act. GELU
554
+ 57.48%
555
+ 33.12%
556
+ 16
557
+ Act. SiLU
558
+ 58.19%
559
+ 34.07%
560
+ 17
561
+ Act. PSiLU
562
+ 56.38%
563
+ 33.76%
564
+ 18
565
+ SE (ReLU)
566
+ 57.83%
567
+ 32.64%
568
+ 19
569
+ Norm-BN-BN-0
570
+ 54.15%
571
+ 29.59%
572
+ 20
573
+ Norm-BN-0-BN
574
+ 56.04%
575
+ 31.34%
576
+ 21
577
+ Norm-0-BN-BN
578
+ 56.18%
579
+ 31.61%
580
+ 0.01M increase in total parameters, switching convolution
581
+ layer width from 32 to 64 and 64 to 96 improve the PGD10-
582
+ 4 accuracy by 0.7 and 1.65 percentage points, respectively.
583
+ The “stem width 96” is located in Table 1 row 8. For kernel
584
+ size = 3 or = 5, the training overfits to FGSM and leads
585
+ to a completely non-robust model. The original kernel size
586
+ is 7 in ResNet-50, and increasing it to 9 improves the PGD
587
+ accuracy but leads to a drop in the natural accuracy.
588
+ We study the downsampling factor next. RegNet [40]
589
+ is built based on ResNet, but the max-pooling layer in the
590
+ stem stage is replaced by a stride 2 convolution shortcut
591
+ connection in the first stage. We denote this operation as
592
+ “move down (↓) downsampling.” The evaluation result (Ta-
593
+ ble 1 row 9) manifests 0.99 and 2.65 percentage points in-
594
+ crements in natural and PGD10-4 accuracy. We further dis-
595
+ assemble the operation by only discarding the max-pooling
596
+ layer without adding the stride 2 convolution shortcut. Al-
597
+ though the robustness is slightly lower than “move ↓ down-
598
+ sampling,” it still outperforms ResNet-50 by a large margin.
599
+ Vision Transformer (ViT) [16] first introduced the
600
+ “patchify stem,” and ConvNeXt [34] also incorporated the
601
+ design to improve generalization.
602
+ Motivated by those
603
+ works, we replace the original stem with a 4 × 4 patch, i.e.,
604
+ kernel size = stride = 4, and observe a slight increment
605
+ in robustness. Since moving down the downsampling layer
606
+ boosts robustness, we continue to test a smaller 2×2 patch.
607
+ The accuracy increases as expected, but the gain is slightly
608
+ lower than directly moving down the downsampling layer in
609
+ a ResNet-style stem. Since a small kernel size in the early
610
+ convolution layer leads to a smaller receptive field, a mod-
611
+ erate kernel size of 7 × 7 is preferred. Overall, we select
612
+ “stem width 96” and “move ↓ downsampling” as potential
613
+ candidates while building the cumulative model in Sec. 3.1.
614
+ Guideline 6: Replacing the max-pooling in the stem
615
+ stage with a downsampling shortcut in the first stage sig-
616
+ nificantly improves robustness.
617
+ Guideline 7:
618
+ For the convolution layer in the stem
619
+ stage, directly replacing it with a “patchify” stem design
620
+ contributes to the robustness. However, the optimal con-
621
+ figurations are increasing the channel width and setting
622
+ kernel size = 7.
623
+ Dense Connection. Huang et al. [25] introduced the dense
624
+ connection in DenseNet that concatenates the feature maps
625
+ of all preceding blocks within the stage as the input to the
626
+ current block.
627
+ We extend the definition and experiment
628
+ with different dense ratios i (i ∈ {1, 2, 3, 4, 5}), i.e., i pre-
629
+ ceding feature maps are used to construct the input. Only
630
+ i = 2 shows minor improvements in PGD accuracy, and
631
+ no strong benefits are observed (Table 1 row 10). We fur-
632
+ ther remove the last Rectified Linear Unit (ReLU) since the
633
+ original DenseNet uses the Pre-Activation (PreAct) opera-
634
+ tion [20]. However, the robustness is further degraded, and
635
+ we assume the poor performance of reducing the last acti-
636
+ vation itself (discussed in 2.4) is a potential reason.
637
+ Guideline 8: Dense connection is not beneficial to ro-
638
+ bustness.
639
+ 2.4. Block-level Design
640
+ Kernel Size. In this part, we study the kernel size in all
641
+ body stages. Inspired by the large local window size in
642
+ Swin-T [33], ConvNeXt [34] boosts the generalization ac-
643
+ curacy via increasing the kernel size from 3 × 3 to 7 × 7.
644
+ A large kernel size can extract more semantic informa-
645
+ tion but implicitly increases the attack area during back-
646
+ propagation. It is unclear whether a larger kernel size can
647
+ bring higher robustness. We evaluate kernel size ∈ {3, 5, 7}
648
+ and find the accuracy grows along with the kernel size (Ta-
649
+ ble 1 row 1, 11 and 12), but the total parameters also in-
650
+ crease significantly: kernel = 3 (25.56M), kernel = 5
651
+ (45.68M), and kernel = 7 (75.86M). Thus, using a large
652
+ kernel size is a potential candidate to optimize the robust-
653
+ 5
654
+
655
+ ness when scaling up the model. We will revisit the design
656
+ in Sec. 3.2.
657
+ Guideline 9: Purely increasing the kernel size raises the
658
+ model capacity but improves robustness significantly. Thus,
659
+ it is a prospective option when scaling up the network.
660
+ Dilation. Dilated convolution supports the exponential ex-
661
+ pansion of the receptive field without loss of resolution [62].
662
+ The operation offers a wider field of view at a similar com-
663
+ putational cost. However, the results in Table 1 (row 1, 13
664
+ and 14) show that a larger dilation factor significantly de-
665
+ creases both natural and PGD accuracy after AT. Connect-
666
+ ing to the previous kernel size section, we hypothesize that a
667
+ larger receptive field facilitates the attacker. We still observe
668
+ the robustness gain in using a large kernel size because the
669
+ huge model capacity mitigates the effect, yet the accuracy
670
+ drops when adjusting dilation since the operation does not
671
+ change the model capacity. In Sec. 3.2, we also notice the
672
+ kernel size is not effective in optimizing robustness if all
673
+ other modifications are considered at the same scale.
674
+ Guideline 10: Increasing dilation factor enlarges the at-
675
+ tacking area, which leads to inferior robustness.
676
+ Activation. We study two factors in the activation layer:
677
+ the activation function and the number of activation layers
678
+ in a block. For the activation function, we replace ReLU,
679
+ which is used in ResNet-50, with two smoother functions,
680
+ GELU and Sigmoid Linear Unit (SiLU). GELU alone sig-
681
+ nificantly improves the robustness (Table 1 row 15), which
682
+ echoes the result in [3]. SiLU further improves the accu-
683
+ racy (Table 1 row 16), which echoes the result in [57]. Re-
684
+ cently, Dai et al. [9] added learnable parameters to origi-
685
+ nal non-parametric functions, and proposed the parametric
686
+ counterparts, e.g., ReLU to Parametric ReLU (PReLU) and
687
+ SiLU to Parametric SiLU (PSiLU) or Parametric Shifted
688
+ SiLU (PSSiLU).
689
+ These parametric functions outperform
690
+ the non-parametric ones on CIFAR-10 [28]. We test these
691
+ functions on ImageNet and observed PSiLU has the high-
692
+ est robustness among all parametric functions, as shown in
693
+ Table 1 row 17. However, compared to the non-parametric
694
+ versions, all parametric functions are less robust. Since the
695
+ original paper only tested on the small-scale dataset, we be-
696
+ lieve such learnable functions are not compatible with the
697
+ large-scale dataset. Next, we reduce the activation layers in
698
+ each block. Neither reducing one nor reducing two activa-
699
+ tion layers show extra benefits to the robustness. The more
700
+ activation layer we reduce, the worse the performance is.
701
+ Guideline 11: Activation function significantly affects
702
+ robustness. The non-parametric SiLU provides a competi-
703
+ tive improvement.
704
+ Guideline 12: Reducing activation layers in a residual
705
+ block severely hurts the robustness.
706
+ Squeeze and Excitation (SE).
707
+ Hu et al. [24] first
708
+ introduced the SE block that explicitly explored inter-
709
+ dependencies between channels, and adaptively recali-
710
+ brated channel-wise feature responses. Inspired by RegNet
711
+ [40], we place the SE block between the last two convolu-
712
+ tions in each block and set the reduction ratio as 1/4. Com-
713
+ pared to ResNet-50, Table 1 row 18 shows that adding SE
714
+ significantly improves the robustness. Directly adding the
715
+ SE module slightly increases the model capacity by 2.17M,
716
+ but in Sec. 3.1, we show that sacrificing the parameters in
717
+ other components by adopting the SE module can still im-
718
+ prove the robustness, which proves the effectiveness of SE.
719
+ Since switching activation functions shows significant
720
+ differences, we also replace ReLU in the SE block with
721
+ SiLU, GELU and their parametric versions. We still ob-
722
+ serve that non-parametric activation functions are better
723
+ than their parametric counterparts. The SiLU is again the
724
+ optimal activation for SE module. However, in Sec. 3.1,
725
+ we find that replacing the activation function in activation
726
+ layers and SE at the same time causes inferior robustness.
727
+ Guideline 13: The SE module significantly contributes
728
+ to robustness.
729
+ Guideline 14: The robustness improves if we just replace
730
+ the activation function in the SE block. But the modification
731
+ does not work favorably with switching the activation func-
732
+ tion in the residual block.
733
+ Normalization. Similar to the activation layer, we exam-
734
+ ine both normalization functions and the number of nor-
735
+ malization layers in a block. For the normalization func-
736
+ tion, we switch the original Batch Normalization (BN) [27]
737
+ in ResNet-50 to IN [51]. The training is extremely hard to
738
+ converge and thus leading to an almost non-robust model
739
+ (PGD10-4: 8.54%). Then, we attempt to reduce the total
740
+ normalization layers in a residual block. In Table 1, row 19
741
+ to 21 show that reducing the first normalization layer in a
742
+ residual block optimizes the robustness. We keep reducing
743
+ 2 BNs, and no further benefits are observed.
744
+ Guideline 15: Switching BN to IN harms robustness.
745
+ Guideline 16: Reducing the first BN in a residual block
746
+ benefits robustness.
747
+ 3. Experiments
748
+ In this section, we provide a roadmap that outlines the
749
+ path we take to construct the RobArch using the guidelines
750
+ in Sec. 2. Our roadmap combines architecture components
751
+ such that for each combination we only keep components
752
+ that increase robustness. Then, we scale up the resulting
753
+ model and proposed a family of RobArch models. Finally,
754
+ we compare RobArch with other SOTA architectures. See
755
+ Appendix B for the full experimental setup. We also ablate
756
+ Fast-AT and Standard-AT in Appendix C.
757
+ 3.1. A Roadmap from ResNet-50 to RobArch-S
758
+ In this section, we cumulatively construct RobArch-S
759
+ from ResNet-50 based on the proposed guidelines. Table
760
+ 6
761
+
762
+ Table 2.
763
+ The roadmap outlines the path we take to cumula-
764
+ tively improve the robustness and construct RobArch-S (∼26M),
765
+ RobArch-M (∼46M), and RobArch-L (∼104M) based on our
766
+ guidelines. PGD10-2 and PGD10-8 show a similar trend of ac-
767
+ curacy improvement as PGD10-4, and detailed results are shown
768
+ in Appendix E.
769
+ Configurations
770
+ Natural PGD10-4
771
+ Small: ResNet-50 → RobArch-S (S7)
772
+ S0
773
+ ResNet-50
774
+ 56.09%
775
+ 30.43%
776
+ S1
777
+ S0 + D-5-8-13-1
778
+ 57.35%
779
+ 33.33%
780
+ S2a
781
+ S1 + g = 2, e = 2, b = 0.25
782
+ 57.98%
783
+ 33.94%
784
+ S2b
785
+ S1 + g = 1, e = 1.5, b = 0.25
786
+ 57.52%
787
+ 32.83%
788
+ S3
789
+ S2a + Stem width 96
790
+ 57.82%
791
+ 34.86%
792
+ + Move down (↓) downsampling
793
+ S4
794
+ S3 + SE (ReLU)
795
+ 60.57%
796
+ 36.61%
797
+ S5
798
+ S4 + Act. SiLU
799
+ 62.04%
800
+ 39.48%
801
+ S6
802
+ S5 + SE (SiLU)
803
+ 60.32%
804
+ 38.24%
805
+ S7
806
+ S5 + Norm-0-BN-BN
807
+ 62.27%
808
+ 39.88%
809
+ Medium: RobArch-S (S7) → RobArch-M (M2)
810
+ M1
811
+ S7 + Kernel size 5
812
+ 63.82%
813
+ 41.00%
814
+ M2
815
+ S7 + D-7-11-18-1
816
+ 64.40%
817
+ 42.06%
818
+ M3
819
+ S7 + W-384-760-1504-2944
820
+ 63.52%
821
+ 41.43%
822
+ Large: RobArch-M (M2) → RobArch-L (L2)
823
+ L1
824
+ M2 + Kernel size 7
825
+ 64.08%
826
+ 40.70%
827
+ L2
828
+ M2 + W-512-1024-2016-4032
829
+ 66.08%
830
+ 43.81%
831
+ L3
832
+ M2 + D-8-13-21-2
833
+ 64.91%
834
+ 43.09%
835
+ L4
836
+ M2 + D-10-16-26-2
837
+ 65.28%
838
+ 42.85%
839
+ 2 (upper) presents the procedures and results at each step
840
+ of network modification. We start with network depth and
841
+ width. Combining guideline 2 and guideline 5, model S1
842
+ selects the optimal depth configuration D-5-8-13-1.
843
+ For
844
+ width, we test the two optimal width configurations in
845
+ guideline 4 and select g = 2, e = 2 (S2a). For the stem
846
+ stage, model S3 increases the width to 96 and replace the
847
+ max-pooling in the stem stage with a downsampling short-
848
+ cut in the first stage according to guidelines 6 and 7. Then,
849
+ we optimize the block settings in each stage. Guideline 13
850
+ suggests inserting a SE block between the last 2 convolu-
851
+ tions. To accommodate the extra parameters in the modi-
852
+ fication, we reduce the width in all stages and build model
853
+ S4. Next, S5 substitutes SiLU for ReLU in all 3 activation
854
+ layers. However, we find that continuing to replace the acti-
855
+ vation function in the SE block lowers the robustness. Thus,
856
+ we discard the modification, reduce the first BN layer, and
857
+ construct S7. The resulting model is named RobArch-S.
858
+ The guidelines are verified by the consistent increase in ro-
859
+ bustness along the network construction process. The total
860
+ model capacity is comparable to ResNet-50, but both natu-
861
+ ral and PGD-4 accuracies have increased by 6.18 and 9.45
862
+ percentage points, respectively.
863
+ 40
864
+ 45
865
+ 50
866
+ 55
867
+ 60
868
+ 65
869
+ Natural Accuracy
870
+ 20
871
+ 25
872
+ 30
873
+ 35
874
+ 40
875
+ 45 PGD10-4
876
+ Accuracy
877
+ All networks trained with Fast-AT
878
+ RobArch Outperforms SOTA Architectures
879
+ ResNet-18 (12M)
880
+ ResNet-50 (26M)
881
+ ResNet-101 (45M)
882
+ ResNet-152 (60M)
883
+ WideResNet50-2 (69M)
884
+ WideResNet101-2 (127M)
885
+ EfficientNet-B0 (5M)
886
+ EfficientNet-B5 (30M)
887
+ EfficientNetV2-S (21M)
888
+ DenseNet-121 (8M)
889
+ DenseNet-161 (29M)
890
+ MobileNet V2 (4M)
891
+ ResNeXt-50 32x4d (25M)
892
+ RegNetY-3.2GF (19M)
893
+ RegNetY-8GF (39M)
894
+ RegNetX-3.2GF (15M)
895
+ RegNetX-8GF (40M)
896
+ Swin-T (28M)
897
+ RobArch-S (26M)
898
+ RobArch-M (46M)
899
+ RobArch-L (104M)
900
+ Figure 3. Our RobArch model family outperforms SOTA archi-
901
+ tectures under the same Fast-AT training method. With a simi-
902
+ lar model capacity, RobArch-S outperforms ResNet-50 [19] and
903
+ ResNeXt-50 32×4d [61] by 9.45 and 6.80 percentage points, re-
904
+ spectively. RobArch-M outperforms ResNet-101 by 8.16 per-
905
+ centage points. Compared to the models with larger parameters,
906
+ RobArch-S is even more robust than WideResNet101-2 despite
907
+ having 4.85× fewer parameters (highlighted in black). Appendix
908
+ E shows detailed results, including other PGD attack budgets.
909
+ 3.2. Scaling Up: The RobArch Family
910
+ We extend our investigation to optimize the robustness
911
+ when scaling up the parameter budget. The budgets align
912
+ with the XCiT [1] family since it is the current SOTA on
913
+ the RobustBench ImageNet leaderboard [7]. Guideline 9
914
+ suggests increasing kernel size as a potential improvement
915
+ when scaling up the model.
916
+ Increasing total depth and
917
+ width are another 2 promising directions [26, 60]. For the
918
+ medium-sized budget (∼46M), model M1 enlarges the ker-
919
+ nel size from 3 to 5, model M2 proportionally deepens
920
+ the network by a factor of 1.4, and model M3 widens the
921
+ channels while keeping the depth same as RobArch-S. The
922
+ training results of M1, M2 and M3 are shown in Table
923
+ 2 (middle). In general, all three models are more robust
924
+ than RobArch-S. But in terms of accuracy, increasing depth
925
+ (M2) > increasing width (M3) > increasing kernel size
926
+ (M1). Therefore, we set M2 as RobArch-M.
927
+ For the large-sized budget (∼104M), model L1 increases
928
+ the kernel size from 3 to 7, but leads to a drop in robustness,
929
+ as shown in Table 2 (bottom). RobArch-M increases the
930
+ depth of S7, and according to the depth-width trade-off in
931
+ Fig. 2c, consistently increasing the depth can lead to un-
932
+ stable training. Therefore, model L2 increases the width
933
+ in RobArch-M, and the robustness rises by a large margin.
934
+ 7
935
+
936
+ Table 3. Our RobArch model outperforms ConvNets and Trans-
937
+ formers with similar total parameters against ℓ∞ = 4/255 AA.
938
+ Using the same training configurations as Salman et al. [41], our
939
+ model outperforms both ResNet-50 and WideResNet50-2. Every
940
+ RobArch model outperforms its XCiT counterpart at a similar ca-
941
+ pacity. Appendix F.2 shows the detailed results including PGD100
942
+ for ϵ ∈ {2, 4, 8}.
943
+ Architecture
944
+ #Param
945
+ AutoAttack
946
+ Natural
947
+ ResNet-18 [41]
948
+ 12M
949
+ 25.32%
950
+ 52.49%
951
+ PoolFormer-M12 [11]
952
+ 22M
953
+ 34.72%
954
+ 66.16%
955
+ DeiT-S [3]
956
+ 22M
957
+ 35.50%
958
+ 66.50%
959
+ DeiT-S+DiffPure [39]
960
+ 22M
961
+ 43.18%
962
+ 73.63%
963
+ ResNet-50 [41]
964
+ 26M
965
+ 34.96%
966
+ 63.87%
967
+ ResNet-50+DiffPure [39]
968
+ 26M
969
+ 40.93%
970
+ 67.79%
971
+ ResNet-50+GELU [3]
972
+ 26M
973
+ 35.51%
974
+ 67.38%
975
+ XCiT-S12 [11]
976
+ 26M
977
+ 41.78%
978
+ 72.34%
979
+ RobArch-S
980
+ 26M
981
+ 44.14%
982
+ 70.17%
983
+ XCiT-M12 [11]
984
+ 46M
985
+ 45.24%
986
+ 74.04%
987
+ RobArch-M
988
+ 46M
989
+ 46.26%
990
+ 71.88%
991
+ WideResNet50-2 [41]
992
+ 69M
993
+ 38.14%
994
+ 68.41%
995
+ WideResNet50-2
996
+ 69M
997
+ 44.39%
998
+ 71.16%
999
+ +DiffPure [39]
1000
+ Swin-B [38]
1001
+ 88M
1002
+ 38.61%
1003
+ 74.36%
1004
+ XCiT-L12 [11]
1005
+ 104M
1006
+ 47.60%
1007
+ 73.76%
1008
+ RobArch-L
1009
+ 104M
1010
+ 48.94%
1011
+ 73.44%
1012
+ We further deepen L2 to explore whether guideline 5 holds
1013
+ true when scaling up the model budget. L3 and L4 increase
1014
+ the depth by 1.6× and 2× and reduce the width to fit the
1015
+ total parameters. The results in Table 2 (bottom) show a
1016
+ decline in accuracy along with an increase in depth. The
1017
+ phenomenon extends guideline 5 that the depth-width rela-
1018
+ tionship also applies to scaling up the models. Finally, we
1019
+ set L2 as RobArch-L based on the above discussions, and
1020
+ provide the following guidelines:
1021
+ Guideline 17: When scaling up the model, increasing
1022
+ the kernel size, depth, and width all contribute to the ro-
1023
+ bustness. But proportionally increasing the optimal depth
1024
+ configuration is most effective.
1025
+ Guideline 18: There exists a saturation point for purely
1026
+ increasing the depth to fill the parameter budget. We should
1027
+ enlarge channel widths when such a degradation happens.
1028
+ 3.3. Results
1029
+ In Fig. 3, we compare RobArch with a series of SOTA
1030
+ architectures.
1031
+ All architectures are trained with Fast-AT
1032
+ for a fair comparison, and we discover a similar trend for
1033
+ PGD10-2, PGD10-4, and PGD10-8. Below we provide a
1034
+ few observations based on PGD10-4 accuracy:
1035
+ 1) Under a similar model capacity, RobArch-S outper-
1036
+ forms ResNet-50 [19] and ResNeXt-50 32×4d [61] by 9.45
1037
+ and 6.80 percentage points, respectively. RobArch-M out-
1038
+ performs ResNet-101 by 8.16 percentage points.
1039
+ 2) Compared to the models with larger parameters,
1040
+ RobArch-S is even more robust than WideResNet101-2 de-
1041
+ spite having 4.85× fewer parameters.
1042
+ 3) Increasing the total parameters in general leads to higher
1043
+ robustness, and the natural accuracy is positively correlated
1044
+ with the adversarial accuracy after AT. Lightweight mod-
1045
+ els, e.g., MobileNet V2 and SqueezeNet-1.1, are among the
1046
+ least robust. The accuracies of RobArchs consistently grow
1047
+ when scaling up the model sizes.
1048
+ 4) Transformers, e.g., Swin-T [33], and Transformer-based
1049
+ architectures, e.g., ConvNeXt-T [34], are non-robust us-
1050
+ ing Fast-AT.
1051
+ The phenomenon can be attributed to the
1052
+ differences in optimizers and learning rates, where most
1053
+ Transformer-related architectures use AdamW [35] and tiny
1054
+ learning rates.
1055
+ As introduced in Sec. 2.1, we then train all RobArchs
1056
+ using Standard-AT. All three RobArchs outperform their
1057
+ XCiT [1] counterparts (Table 3).
1058
+ Using the same train-
1059
+ ing configurations as Salman et al. [41], RobArch-S sur-
1060
+ passes ResNet-50 AA accuracy by 9.18 percentage points,
1061
+ and is even more robust than WideResNet50-2 with 2.6×
1062
+ fewer parameters.
1063
+ The robustness continues to improve
1064
+ when scaling up the model, and RobArch-L achieves the
1065
+ new SOTA AA [8] accuracy on RobustBench. RobArch’s
1066
+ performance advantage also extrapolates to the PGD attack.
1067
+ Overall, the proposed RobArchs outperform both ConvNets
1068
+ and Transformers with similar total parameters.
1069
+ 4. Related Work
1070
+ A huge number of AT variants have been proposed,
1071
+ e.g., TRADES [64], AWP [56], ADT [15], DART [52],
1072
+ MART [53], CAS [4], Max-Margin AT [14], etc. For the ro-
1073
+ bust DNN research, only a few studies explored how archi-
1074
+ tectures affect robustness [13, 36, 46, 48], e.g., depths [60],
1075
+ widths [55] and activation functions [9, 57]. However, the
1076
+ total model capacity is unconstrained along with the archi-
1077
+ tecture modifications. Besides, simply combining multiple
1078
+ individual optimal architectures does not transfer to a bet-
1079
+ ter model, e.g., Huang et al. [26] studied depths and widths,
1080
+ and found the combination of the optimal depth and width
1081
+ ratios is less robust than just using the optimal width ratio.
1082
+ 5. Conclusion
1083
+ In this work, we present the first large-scale system-
1084
+ atic study on the robustness of architecture components un-
1085
+ der fixed parameter budgets.
1086
+ Through our investigation,
1087
+ we distill 18 actionable robust network design guidelines
1088
+ that empower model developers to gain deep insights. Our
1089
+ RobArch models instantiate the guidelines to build a fam-
1090
+ ily of top-performing models across parameter capacities
1091
+ against strong adversarial attacks.
1092
+ 8
1093
+
1094
+ References
1095
+ [1] Alaaeldin Ali, Hugo Touvron, Mathilde Caron, Piotr Bo-
1096
+ janowski, Matthijs Douze, Armand Joulin, Ivan Laptev, Na-
1097
+ talia Neverova, Gabriel Synnaeve, Jakob Verbeek, et al. Xcit:
1098
+ Cross-covariance image transformers. Advances in neural
1099
+ information processing systems, 34:20014–20027, 2021.
1100
+ [2] Maksym Andriushchenko and Nicolas Flammarion. Under-
1101
+ standing and improving fast adversarial training. Advances
1102
+ in Neural Information Processing Systems, 33:16048–16059,
1103
+ 2020.
1104
+ [3] Yutong Bai, Jieru Mei, Alan L Yuille, and Cihang Xie. Are
1105
+ transformers more robust than cnns?
1106
+ Advances in Neural
1107
+ Information Processing Systems, 34:26831–26843, 2021.
1108
+ [4] Yang Bai, Yuyuan Zeng, Yong Jiang, Shu-Tao Xia, Xingjun
1109
+ Ma, and Yisen Wang.
1110
+ Improving adversarial robustness
1111
+ via channel-wise activation suppressing.
1112
+ arXiv preprint
1113
+ arXiv:2103.08307, 2021.
1114
+ [5] Srinadh Bhojanapalli, Ayan Chakrabarti, Daniel Glasner,
1115
+ Daliang Li, Thomas Unterthiner, and Andreas Veit. Under-
1116
+ standing robustness of transformers for image classification.
1117
+ In Proceedings of the IEEE/CVF International Conference
1118
+ on Computer Vision, pages 10231–10241, 2021.
1119
+ [6] Tom B Brown, Dandelion Man´e, Aurko Roy, Mart´ın Abadi,
1120
+ and Justin Gilmer.
1121
+ Adversarial patch.
1122
+ arXiv preprint
1123
+ arXiv:1712.09665, 2017.
1124
+ [7] Francesco Croce, Maksym Andriushchenko, Vikash Se-
1125
+ hwag, Edoardo Debenedetti, Nicolas Flammarion, Mung
1126
+ Chiang, Prateek Mittal, and Matthias Hein. Robustbench:
1127
+ a standardized adversarial robustness benchmark.
1128
+ arXiv
1129
+ preprint arXiv:2010.09670, 2020.
1130
+ [8] Francesco Croce and Matthias Hein.
1131
+ Reliable evalua-
1132
+ tion of adversarial robustness with an ensemble of diverse
1133
+ parameter-free attacks. In International conference on ma-
1134
+ chine learning, pages 2206–2216. PMLR, 2020.
1135
+ [9] Sihui Dai, Saeed Mahloujifar, and Prateek Mittal. Parameter-
1136
+ izing activation functions for adversarial robustness. In 2022
1137
+ IEEE Security and Privacy Workshops (SPW), pages 80–87.
1138
+ IEEE, 2022.
1139
+ [10] Nilaksh Das, Sheng-Yun Peng, and Duen Horng Chau.
1140
+ Skelevision:
1141
+ Towards
1142
+ adversarial
1143
+ resiliency
1144
+ of
1145
+ per-
1146
+ son tracking with multi-task learning.
1147
+ arXiv preprint
1148
+ arXiv:2204.00734, 2022.
1149
+ [11] Edoardo Debenedetti, Vikash Sehwag, and Prateek Mittal.
1150
+ A light recipe to train robust vision transformers.
1151
+ arXiv
1152
+ preprint arXiv:2209.07399, 2022.
1153
+ [12] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li,
1154
+ and Li Fei-Fei. Imagenet: A large-scale hierarchical image
1155
+ database. In 2009 IEEE conference on computer vision and
1156
+ pattern recognition, pages 248–255. Ieee, 2009.
1157
+ [13] Chaitanya Devaguptapu, Devansh Agarwal, Gaurav Mittal,
1158
+ Pulkit Gopalani, and Vineeth N Balasubramanian. On adver-
1159
+ sarial robustness: A neural architecture search perspective.
1160
+ In Proceedings of the IEEE/CVF International Conference
1161
+ on Computer Vision, pages 152–161, 2021.
1162
+ [14] Gavin Weiguang Ding, Yash Sharma, Kry Yik Chau Lui, and
1163
+ Ruitong Huang. Mma training: Direct input space margin
1164
+ maximization through adversarial training. arXiv preprint
1165
+ arXiv:1812.02637, 2018.
1166
+ [15] Yinpeng Dong, Zhijie Deng, Tianyu Pang, Jun Zhu, and
1167
+ Hang Su. Adversarial distributional training for robust deep
1168
+ learning. Advances in Neural Information Processing Sys-
1169
+ tems, 33:8270–8283, 2020.
1170
+ [16] Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov,
1171
+ Dirk Weissenborn, Xiaohua Zhai, Thomas Unterthiner,
1172
+ Mostafa Dehghani, Matthias Minderer, Georg Heigold, Syl-
1173
+ vain Gelly, et al. An image is worth 16x16 words: Trans-
1174
+ formers for image recognition at scale.
1175
+ arXiv preprint
1176
+ arXiv:2010.11929, 2020.
1177
+ [17] Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy.
1178
+ Explaining and harnessing adversarial examples.
1179
+ arXiv
1180
+ preprint arXiv:1412.6572, 2014.
1181
+ [18] Minghao Guo, Yuzhe Yang, Rui Xu, Ziwei Liu, and Dahua
1182
+ Lin.
1183
+ When nas meets robustness: In search of robust ar-
1184
+ chitectures against adversarial attacks.
1185
+ In Proceedings of
1186
+ the IEEE/CVF Conference on Computer Vision and Pattern
1187
+ Recognition, pages 631–640, 2020.
1188
+ [19] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun.
1189
+ Deep residual learning for image recognition. In Proceed-
1190
+ ings of the IEEE conference on computer vision and pattern
1191
+ recognition, pages 770–778, 2016.
1192
+ [20] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun.
1193
+ Identity mappings in deep residual networks. In European
1194
+ conference on computer vision, pages 630–645. Springer,
1195
+ 2016.
1196
+ [21] Dan Hendrycks and Kevin Gimpel.
1197
+ Gaussian error linear
1198
+ units (gelus). arXiv preprint arXiv:1606.08415, 2016.
1199
+ [22] Jonathan Ho, Ajay Jain, and Pieter Abbeel. Denoising diffu-
1200
+ sion probabilistic models. Advances in Neural Information
1201
+ Processing Systems, 33:6840–6851, 2020.
1202
+ [23] Ramtin Hosseini, Xingyi Yang, and Pengtao Xie.
1203
+ Dsrna:
1204
+ Differentiable search of robust neural architectures. In Pro-
1205
+ ceedings of the IEEE/CVF Conference on Computer Vision
1206
+ and Pattern Recognition, pages 6196–6205, 2021.
1207
+ [24] Jie Hu, Li Shen, and Gang Sun. Squeeze-and-excitation net-
1208
+ works. In Proceedings of the IEEE conference on computer
1209
+ vision and pattern recognition, pages 7132–7141, 2018.
1210
+ [25] Gao Huang, Zhuang Liu, Laurens Van Der Maaten, and Kil-
1211
+ ian Q Weinberger.
1212
+ Densely connected convolutional net-
1213
+ works. In Proceedings of the IEEE conference on computer
1214
+ vision and pattern recognition, pages 4700–4708, 2017.
1215
+ [26] Hanxun Huang, Yisen Wang, Sarah Erfani, Quanquan Gu,
1216
+ James Bailey, and Xingjun Ma. Exploring architectural in-
1217
+ gredients of adversarially robust deep neural networks. Ad-
1218
+ vances in Neural Information Processing Systems, 34:5545–
1219
+ 5559, 2021.
1220
+ [27] Sergey Ioffe and Christian Szegedy. Batch normalization:
1221
+ Accelerating deep network training by reducing internal co-
1222
+ variate shift. In International conference on machine learn-
1223
+ ing, pages 448–456. PMLR, 2015.
1224
+ [28] Alex Krizhevsky, Geoffrey Hinton, et al. Learning multiple
1225
+ layers of features from tiny images. 2009.
1226
+ [29] Alexey Kurakin, Ian Goodfellow, and Samy Bengio. Ad-
1227
+ versarial machine learning at scale.
1228
+ arXiv preprint
1229
+ arXiv:1611.01236, 2016.
1230
+ 9
1231
+
1232
+ [30] Tao Li, Yingwen Wu, Sizhe Chen, Kun Fang, and Xiaolin
1233
+ Huang. Subspace adversarial training. In Proceedings of
1234
+ the IEEE/CVF Conference on Computer Vision and Pattern
1235
+ Recognition, pages 13409–13418, 2022.
1236
+ [31] Chen Liu, Mathieu Salzmann, Tao Lin, Ryota Tomioka,
1237
+ and Sabine S¨usstrunk. On the loss landscape of adversar-
1238
+ ial training: Identifying challenges and how to overcome
1239
+ them. Advances in Neural Information Processing Systems,
1240
+ 33:21476–21487, 2020.
1241
+ [32] Xin Liu, Huanrui Yang, Ziwei Liu, Linghao Song, Hai Li,
1242
+ and Yiran Chen.
1243
+ Dpatch: An adversarial patch attack on
1244
+ object detectors. arXiv preprint arXiv:1806.02299, 2018.
1245
+ [33] Ze Liu, Yutong Lin, Yue Cao, Han Hu, Yixuan Wei, Zheng
1246
+ Zhang, Stephen Lin, and Baining Guo. Swin transformer:
1247
+ Hierarchical vision transformer using shifted windows. In
1248
+ Proceedings of the IEEE/CVF International Conference on
1249
+ Computer Vision, pages 10012–10022, 2021.
1250
+ [34] Zhuang Liu, Hanzi Mao, Chao-Yuan Wu, Christoph Feicht-
1251
+ enhofer, Trevor Darrell, and Saining Xie. A convnet for the
1252
+ 2020s. In Proceedings of the IEEE/CVF Conference on Com-
1253
+ puter Vision and Pattern Recognition, pages 11976–11986,
1254
+ 2022.
1255
+ [35] Ilya Loshchilov and Frank Hutter. Decoupled weight decay
1256
+ regularization. arXiv preprint arXiv:1711.05101, 2017.
1257
+ [36] Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt,
1258
+ Dimitris Tsipras, and Adrian Vladu. Towards deep learn-
1259
+ ing models resistant to adversarial attacks. In International
1260
+ Conference on Learning Representations, 2018.
1261
+ [37] Paulius Micikevicius, Sharan Narang, Jonah Alben, Gregory
1262
+ Diamos, Erich Elsen, David Garcia, Boris Ginsburg, Michael
1263
+ Houston, Oleksii Kuchaiev, Ganesh Venkatesh, et al. Mixed
1264
+ precision training. arXiv preprint arXiv:1710.03740, 2017.
1265
+ [38] Yichuan Mo, Dongxian Wu, Yifei Wang, Yiwen Guo, and
1266
+ Yisen Wang. When adversarial training meets vision trans-
1267
+ formers:
1268
+ Recipes from training to architecture.
1269
+ arXiv
1270
+ preprint arXiv:2210.07540, 2022.
1271
+ [39] Weili Nie, Brandon Guo, Yujia Huang, Chaowei Xiao, Arash
1272
+ Vahdat, and Anima Anandkumar.
1273
+ Diffusion models for
1274
+ adversarial purification. arXiv preprint arXiv:2205.07460,
1275
+ 2022.
1276
+ [40] Ilija Radosavovic, Raj Prateek Kosaraju, Ross Girshick,
1277
+ Kaiming He, and Piotr Doll´ar. Designing network design
1278
+ spaces. In Proceedings of the IEEE/CVF conference on com-
1279
+ puter vision and pattern recognition, pages 10428–10436,
1280
+ 2020.
1281
+ [41] Hadi Salman, Andrew Ilyas, Logan Engstrom, Ashish
1282
+ Kapoor, and Aleksander Madry. Do adversarially robust im-
1283
+ agenet models transfer better? Advances in Neural Informa-
1284
+ tion Processing Systems, 33:3533–3545, 2020.
1285
+ [42] Rulin Shao, Zhouxing Shi, Jinfeng Yi, Pin-Yu Chen, and
1286
+ Cho-Jui Hsieh. On the adversarial robustness of vision trans-
1287
+ formers. arXiv preprint arXiv:2103.15670, 2021.
1288
+ [43] Leslie N Smith. Cyclical learning rates for training neural
1289
+ networks. In 2017 IEEE winter conference on applications
1290
+ of computer vision (WACV), pages 464–472. IEEE, 2017.
1291
+ [44] Yang Song, Taesup Kim, Sebastian Nowozin, Stefano Er-
1292
+ mon, and Nate Kushman. Pixeldefend: Leveraging genera-
1293
+ tive models to understand and defend against adversarial ex-
1294
+ amples. arXiv preprint arXiv:1710.10766, 2017.
1295
+ [45] Gaurang Sriramanan, Sravanti Addepalli, Arya Baburaj,
1296
+ et al. Guided adversarial attack for evaluating and enhanc-
1297
+ ing adversarial defenses. Advances in Neural Information
1298
+ Processing Systems, 33:20297–20308, 2020.
1299
+ [46] Dong Su, Huan Zhang, Hongge Chen, Jinfeng Yi, Pin-Yu
1300
+ Chen, and Yupeng Gao. Is robustness the cost of accuracy?–
1301
+ a comprehensive study on the robustness of 18 deep image
1302
+ classification models. In Proceedings of the European Con-
1303
+ ference on Computer Vision (ECCV), pages 631–648, 2018.
1304
+ [47] Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan
1305
+ Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus.
1306
+ Intriguing properties of neural networks.
1307
+ arXiv preprint
1308
+ arXiv:1312.6199, 2013.
1309
+ [48] Shiyu Tang, Ruihao Gong, Yan Wang, Aishan Liu, Jiakai
1310
+ Wang, Xinyun Chen, Fengwei Yu, Xianglong Liu, Dawn
1311
+ Song, Alan Yuille, et al. Robustart: Benchmarking robust-
1312
+ ness on architecture design and training techniques. arXiv
1313
+ preprint arXiv:2109.05211, 2021.
1314
+ [49] Hugo Touvron, Matthieu Cord, Matthijs Douze, Francisco
1315
+ Massa, Alexandre Sablayrolles, and Herv´e J´egou. Training
1316
+ data-efficient image transformers & distillation through at-
1317
+ tention. In International Conference on Machine Learning,
1318
+ pages 10347–10357. PMLR, 2021.
1319
+ [50] James Tu, Mengye Ren, Sivabalan Manivasagam, Ming
1320
+ Liang, Bin Yang, Richard Du, Frank Cheng, and Raquel
1321
+ Urtasun. Physically realizable adversarial examples for li-
1322
+ dar object detection. In Proceedings of the IEEE/CVF Con-
1323
+ ference on Computer Vision and Pattern Recognition, pages
1324
+ 13716–13725, 2020.
1325
+ [51] Dmitry Ulyanov, Andrea Vedaldi, and Victor Lempitsky. In-
1326
+ stance normalization: The missing ingredient for fast styliza-
1327
+ tion. arXiv preprint arXiv:1607.08022, 2016.
1328
+ [52] Yisen Wang, Xingjun Ma, James Bailey, Jinfeng Yi, Bowen
1329
+ Zhou, and Quanquan Gu. On the convergence and robustness
1330
+ of adversarial training.
1331
+ arXiv preprint arXiv:2112.08304,
1332
+ 2021.
1333
+ [53] Yisen Wang, Difan Zou, Jinfeng Yi, James Bailey, Xingjun
1334
+ Ma, and Quanquan Gu. Improving adversarial robustness
1335
+ requires revisiting misclassified examples. In International
1336
+ Conference on Learning Representations, 2019.
1337
+ [54] Eric Wong, Leslie Rice, and J Zico Kolter. Fast is better
1338
+ than free: Revisiting adversarial training.
1339
+ arXiv preprint
1340
+ arXiv:2001.03994, 2020.
1341
+ [55] Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, and Quan-
1342
+ quan Gu. Do wider neural networks really help adversar-
1343
+ ial robustness? Advances in Neural Information Processing
1344
+ Systems, 34:7054–7067, 2021.
1345
+ [56] Dongxian Wu, Shu-Tao Xia, and Yisen Wang. Adversarial
1346
+ weight perturbation helps robust generalization. Advances
1347
+ in Neural Information Processing Systems, 33:2958–2969,
1348
+ 2020.
1349
+ [57] Cihang Xie, Mingxing Tan, Boqing Gong, Alan Yuille, and
1350
+ Quoc V Le.
1351
+ Smooth adversarial training.
1352
+ arXiv preprint
1353
+ arXiv:2006.14536, 2020.
1354
+ 10
1355
+
1356
+ [58] Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, and
1357
+ Alan Yuille. Mitigating adversarial effects through random-
1358
+ ization. arXiv preprint arXiv:1711.01991, 2017.
1359
+ [59] Cihang Xie, Yuxin Wu, Laurens van der Maaten, Alan L
1360
+ Yuille, and Kaiming He. Feature denoising for improving ad-
1361
+ versarial robustness. In Proceedings of the IEEE/CVF con-
1362
+ ference on computer vision and pattern recognition, pages
1363
+ 501–509, 2019.
1364
+ [60] Cihang Xie and Alan Yuille.
1365
+ Intriguing properties of ad-
1366
+ versarial training at scale. In International Conference on
1367
+ Learning Representations, 2019.
1368
+ [61] Saining Xie, Ross Girshick, Piotr Doll´ar, Zhuowen Tu, and
1369
+ Kaiming He. Aggregated residual transformations for deep
1370
+ neural networks. In Proceedings of the IEEE conference on
1371
+ computer vision and pattern recognition, pages 1492–1500,
1372
+ 2017.
1373
+ [62] Fisher Yu and Vladlen Koltun.
1374
+ Multi-scale context
1375
+ aggregation by dilated convolutions.
1376
+ arXiv preprint
1377
+ arXiv:1511.07122, 2015.
1378
+ [63] Dinghuai Zhang, Tianyuan Zhang, Yiping Lu, Zhanxing
1379
+ Zhu, and Bin Dong. You only propagate once: Accelerat-
1380
+ ing adversarial training via maximal principle. Advances in
1381
+ Neural Information Processing Systems, 32, 2019.
1382
+ [64] Hongyang Zhang, Yaodong Yu, Jiantao Jiao, Eric Xing, Lau-
1383
+ rent El Ghaoui, and Michael Jordan. Theoretically principled
1384
+ trade-off between robustness and accuracy. In International
1385
+ conference on machine learning, pages 7472–7482. PMLR,
1386
+ 2019.
1387
+ 11
1388
+
1389
+ A. Network Configurations
1390
+ A.1. Overview of ResNet-style ConvNets
1391
+ A standard ResNet-style ConvNet includes a stem stage,
1392
+ several body stages, and a classification head, as shown in
1393
+ Fig. 4. A typical body stage consists of multiple resid-
1394
+ ual blocks, where each of them has a shortcut connection
1395
+ that skips other layers and feeds the output of the previous
1396
+ layer to the current output of the block [19]. The stem stage
1397
+ proceeds the input image through a convolution layer and a
1398
+ max-pooling that downsample the resolution by 4 in total.
1399
+ The final classification head passes the extracted features
1400
+ from body stages through an average pooling and a linear
1401
+ layer that outputs the predictions. Table 4 lists ResNet-50
1402
+ configurations written in notations defined in the paper.
1403
+ A.2. RobArch Architecture
1404
+ The RobArch follows the ResNet-style ConvNet design.
1405
+ We display block designs for ResNet-50 and RobArch-S in
1406
+ Fig. 5. Following the RegNet design [40], we add the SE
1407
+ block after the 3 × 3 convolution layer in each block. The
1408
+ SE reduction ratio is 0.25.
1409
+ Stage 1
1410
+ Block 1
1411
+ Block 3
1412
+ Block 2
1413
+ Stage 2
1414
+ Input (224x224x3)
1415
+ 7x7, 64, /2
1416
+ 3x3 Max-Pool, /2
1417
+ Avg-Pool
1418
+ Linear
1419
+ Predictions
1420
+ Stage 3
1421
+ Stage 4
1422
+ ResNet-style ConvNets
1423
+ Body Stages
1424
+ Stem
1425
+ Stage
1426
+ Body
1427
+ Stages
1428
+ Classification
1429
+ Head
1430
+ Block 1
1431
+ Block 3
1432
+ Block 2
1433
+ ...
1434
+ Figure 4. An overview of ResNet-style ConvNet design, which in-
1435
+ cludes a stem stage, several body stages, and a classification head.
1436
+ B. Experimental Settings
1437
+ We use Fast-AT as a rapid indicator while exploring dif-
1438
+ ferent architecture components and building the RobArch
1439
+ Table 4. ResNet-50 configurations written in notations defined in
1440
+ the paper. The left column lists architecture components, and the
1441
+ right column shows notations. ResNet-50 does not have SE block,
1442
+ so the configuration is “N/A”. For activation, ReLU-ReLU-ReLU
1443
+ represents the three activation layers in a residual block. The same
1444
+ also applies to normalization.
1445
+ Notation
1446
+ Depth
1447
+ D-3-4-6-3
1448
+ Width
1449
+ W-256-512-1024-2048
1450
+ G-1-1-1-1
1451
+ BM-0.25-0.25-0.25-0.25
1452
+ Stem stage
1453
+ Stem width 64
1454
+ Stem kernel 7
1455
+ Downsample factor 4
1456
+ Dense connection
1457
+ Dense ratio 1
1458
+ Kernel size
1459
+ Kernel size 3
1460
+ Dilation
1461
+ Dilation 1
1462
+ Activation
1463
+ Act. ReLU
1464
+ ReLU-ReLU-ReLU
1465
+ SE
1466
+ N/A
1467
+ Normalization
1468
+ Norm. BN
1469
+ BN-BN-BN
1470
+ ResNet Block
1471
+ RobArch Block
1472
+ 1x1, 64
1473
+ 3x3, 64
1474
+ 1x1, 256
1475
+ BN, ReLU
1476
+ BN, ReLU
1477
+ ReLu
1478
+ 256
1479
+ BN
1480
+ 1x1, 288
1481
+ BN
1482
+ 1x1, 72
1483
+ 3x3, 72, g = 2
1484
+ 1x1, 72
1485
+ Scale
1486
+ SiLU
1487
+ BN, SiLU
1488
+ SiLU
1489
+ ReLU
1490
+ 288
1491
+ Sigmoid
1492
+ Global pooling
1493
+ 1x1, 72
1494
+ Figure 5. Block designs for a ResNet and a RobArch. For simplic-
1495
+ ity, “1 × 1, 64” means pointwise convolution with 64-layer output
1496
+ channels. “g = 2” means 2 group convolution groups, and the
1497
+ default group is 1.
1498
+ family. We follow the same 3-phase training as proposed in
1499
+ the Fast-AT paper [54]. Fast-AT sets training ϵ = 1.25×
1500
+ test ϵ and finds catastrophic overfitting happens when train-
1501
+ ing ϵ goes beyond 10.
1502
+ Therefore, we set training ϵ ∈
1503
+ {2.5, 5.0, 7.5} corresponding to test ϵ ∈ {2, 4, 6} and show
1504
+ 12
1505
+
1506
+ Table 5. Determine training ϵ for Fast-AT using ResNet-50. Train-
1507
+ ing ϵ = 2.5 shows the highest natural and PGD10-2 accuracies,
1508
+ while training ϵ = 7.5 shows the highest PGD10-8 accuracy.
1509
+ Overall, training ϵ = 5.0 is selected for all Fast-AT experiments
1510
+ since it exhibits a balanced performance on all natural and attack
1511
+ budgets.
1512
+ Training ϵ
1513
+ Natural
1514
+ PGD10-2
1515
+ PGD10-4
1516
+ PGD10-8
1517
+ 2.5
1518
+ 60.04%
1519
+ 43.06%
1520
+ 25.34%
1521
+ 6.49%
1522
+ 5.0
1523
+ 56.09%
1524
+ 42.66%
1525
+ 30.43%
1526
+ 12.61%
1527
+ 7.5
1528
+ 49.80%
1529
+ 36.86%
1530
+ 26.95%
1531
+ 13.87%
1532
+ the results in Table 5. Larger training ϵ exhibits higher ro-
1533
+ bustness against strong attacks at the cost of lowering the
1534
+ accuracies of natural and weak attacks. We select training
1535
+ ϵ = 5.0 for its balanced performance on natural and various
1536
+ attack budgets. We use Standard-AT to robustify all mem-
1537
+ bers in the RobArch family, and follow the same training
1538
+ configurations as Salman et al. [41].
1539
+ Our RobArchs are evaluated against the two strongest
1540
+ adversarial attacks, PGD [36] and AA [8]. All PGD attacks
1541
+ are tested on the full ImageNet validation set. AA is an en-
1542
+ semble of four different parameter-free attacks, three white-
1543
+ and one black-box. We use the same 5000 ImageNet valida-
1544
+ tion subset provided by the RobustBench [7] for AA com-
1545
+ parison.
1546
+ C. Ablations on Adversarial Training
1547
+ We ablate Fast-AT and Standard-AT for two purposes:
1548
+ 1) verify the robustness order is consistent under two dif-
1549
+ ferent AT methods, 2) compute whether the two approaches
1550
+ exhibit comparable robustness increases when subjected to
1551
+ the same ablation.
1552
+ Since Standard-AT incurs longer training time, we ran-
1553
+ domly select one small budget model S4 and show the re-
1554
+ sults in Table 6. For natural, PGD10-4 and AA runs, S4
1555
+ outperforms ResNet-50 but is inferior to RobArch-S, which
1556
+ demonstrates the robustness order is consistent under Fast-
1557
+ AT and Standard-AT.
1558
+ Then, we compute the robustness
1559
+ gain using PGD10-4 as an example. From ResNet-50, S4 to
1560
+ RobArch-S, accuracy increases by 6.18 and 3.27 percentage
1561
+ points under Fast-AT, and increases by 6.01 and 2.52 per-
1562
+ centage points under Standard-AT. Both training methods
1563
+ show comparable robustness increases on the same archi-
1564
+ tecture against the same attack. The observation also extrap-
1565
+ olates to natural and AA accuracies. As expected, Standard-
1566
+ AT displays higher robustness than Fast-AT. Hence, we
1567
+ conclude that Fast-AT serves as a good indicator when ex-
1568
+ ploring different architecture components and building the
1569
+ RobArch family. Standard-AT can fully robustify all mem-
1570
+ bers in the RobArch family after finalizing the architectures.
1571
+ Table 6. Ablations on Fast-AT and Standard-AT. We randomly
1572
+ select one small budget model S4 from the roadmap and train it
1573
+ with both methods. The results show that the robustness order
1574
+ is consistent under two different AT methods, and the scales of
1575
+ robustness increment are also comparable.
1576
+ Model
1577
+ Fast-AT
1578
+ Standard-AT
1579
+ Natural PGD10-4
1580
+ Natural PGD10-4
1581
+ AA
1582
+ S0 (ResNet-50)
1583
+ 56.09%
1584
+ 30.43% 63.87%
1585
+ 39.66% 34.96%
1586
+ S4
1587
+ 60.57%
1588
+ 36.61% 68.88%
1589
+ 45.67% 41.44%
1590
+ S7 (RobArch-S) 62.27%
1591
+ 39.88% 70.17%
1592
+ 48.19% 44.14%
1593
+ Table 7. Our RobArch model family outperforms SOTA archi-
1594
+ tectures under the same Fast-AT training method. The results are
1595
+ consistent across natural and different attack budgets. We high-
1596
+ light all three RobArchs for easy comparisons.
1597
+ Architecture
1598
+ #Param Natural PGD10-2 PGD10-4 PGD10-8
1599
+ SqueezeNet 1.1
1600
+ 1 M
1601
+ 0.10 %
1602
+ 0.10 %
1603
+ 0.10 %
1604
+ 0.10 %
1605
+ MobileNet V2
1606
+ 4 M 41.60%
1607
+ 31.23%
1608
+ 21.89%
1609
+ 8.94 %
1610
+ EfficientNet-B0
1611
+ 5 M 48.78%
1612
+ 37.74%
1613
+ 26.90%
1614
+ 10.92%
1615
+ ShuffleNet V2 2.0× 7 M 49.99%
1616
+ 0.01 %
1617
+ 0.01 %
1618
+ 0.02 %
1619
+ DenseNet-121
1620
+ 8 M 52.29%
1621
+ 40.06%
1622
+ 28.72%
1623
+ 12.23%
1624
+ ResNet-18
1625
+ 12 M 46.59%
1626
+ 35.05%
1627
+ 24.64%
1628
+ 9.95 %
1629
+ RegNetX-3.2GF
1630
+ 15 M 57.26%
1631
+ 45.74%
1632
+ 33.85%
1633
+ 15.37%
1634
+ RegNetY-3.2GF
1635
+ 19 M 59.15%
1636
+ 47.09%
1637
+ 34.82%
1638
+ 15.51%
1639
+ EfficientNetV2-S 21 M 57.64%
1640
+ 45.89%
1641
+ 33.48%
1642
+ 14.03%
1643
+ ResNeXt-50
1644
+ 25M 57.33%
1645
+ 45.46%
1646
+ 33.08%
1647
+ 14.45%
1648
+ 32×4d
1649
+ ResNet-50
1650
+ 26 M 56.09%
1651
+ 42.66%
1652
+ 30.43%
1653
+ 12.61%
1654
+ RobArch-S
1655
+ 26 M 62.27%
1656
+ 51.67%
1657
+ 39.88%
1658
+ 18.99%
1659
+ Swin-T
1660
+ 28 M 38.83%
1661
+ 28.08%
1662
+ 18.49%
1663
+ 6.20 %
1664
+ ConvNeXt-T
1665
+ 29 M 21.35%
1666
+ 15.39%
1667
+ 10.51%
1668
+ 4.07 %
1669
+ DenseNet-161
1670
+ 29 M 59.80%
1671
+ 47.60%
1672
+ 35.35%
1673
+ 15.77%
1674
+ EfficientNet-B5
1675
+ 30 M 55.90%
1676
+ 44.80%
1677
+ 33.26%
1678
+ 14.53%
1679
+ RegNetY-8GF
1680
+ 39 M 63.61%
1681
+ 52.26%
1682
+ 40.15%
1683
+ 19.21%
1684
+ RegNetX-8GF
1685
+ 40 M 60.26%
1686
+ 48.98%
1687
+ 36.89%
1688
+ 17.22%
1689
+ ResNet-101
1690
+ 45 M 58.04%
1691
+ 45.72%
1692
+ 33.90%
1693
+ 15.93%
1694
+ RobArch-M
1695
+ 46 M 64.40%
1696
+ 53.97%
1697
+ 42.06%
1698
+ 20.98%
1699
+ ResNet-152
1700
+ 60 M 61.55%
1701
+ 48.50%
1702
+ 35.85%
1703
+ 15.87%
1704
+ WideResNet50-2
1705
+ 69 M 60.66%
1706
+ 46.99%
1707
+ 34.10%
1708
+ 15.37%
1709
+ RobArch-L
1710
+ 104M 66.08%
1711
+ 55.52%
1712
+ 43.81%
1713
+ 22.50%
1714
+ WideResNet101-2127M 61.63%
1715
+ 49.10%
1716
+ 36.23%
1717
+ 16.14%
1718
+ D. Robust Architecture Design Results
1719
+ This section presents the detailed results for all architec-
1720
+ ture components, using five tables. In each table, we use a
1721
+ bold font to highlight the results that have been presented
1722
+ in the paper, and in the caption, we describe the additional
1723
+ information that we are introducing here. Table 8 is depth-
1724
+ only, Table 13 is width-only, Table 14 is depth-width com-
1725
+ bination, Table 9 includes all stage-level designs, and Table
1726
+ 10 includes all block-level designs. For each component, its
1727
+ table includes architecture configurations, total parameters,
1728
+ 13
1729
+
1730
+ Table 8. PGD10 robustness of depth. Bold font means the re-
1731
+ sults have been presented in the paper.
1732
+ All configurations are
1733
+ trained with Fast-AT and evaluated on full ImageNet validation
1734
+ set. ResNet-50 serves as the baseline. We presented D-5-8-13-1
1735
+ in the main paper, and provide results for all 3-, 4-, 5- and 6-stage
1736
+ networks here.
1737
+ Config
1738
+ #Param Natural PGD10-2 PGD10-4 PGD10-8
1739
+ ResNet-50
1740
+ 25.56M 56.09%
1741
+ 42.66%
1742
+ 30.43%
1743
+ 12.61%
1744
+ 3-stage Network
1745
+ D-16-16-16
1746
+ 25.02M 57.15%
1747
+ 41.35%
1748
+ 29.57%
1749
+ 14.37%
1750
+ D-10-18-16
1751
+ 25.15M 56.47%
1752
+ 43.32%
1753
+ 31.52%
1754
+ 14.57%
1755
+ D-3-22-16
1756
+ 25.78M 56.77%
1757
+ 44.99%
1758
+ 33.24%
1759
+ 15.14%
1760
+ D-16-25-14
1761
+ 25.30M 56.69%
1762
+ 44.53%
1763
+ 32.63%
1764
+ 14.39%
1765
+ D-2-16-18
1766
+ 26.26M 57.31%
1767
+ 44.97%
1768
+ 32.72%
1769
+ 14.00%
1770
+ D-3-29-14
1771
+ 25.51M 57.27%
1772
+ 44.74%
1773
+ 33.02%
1774
+ 14.88%
1775
+ D-3-4-20
1776
+ 25.21M 57.69%
1777
+ 45.27%
1778
+ 32.95%
1779
+ 14.46%
1780
+ D-8-2-20
1781
+ 25.00M 57.12%
1782
+ 44.32%
1783
+ 31.90%
1784
+ 13.50%
1785
+ 4-stage Network
1786
+ D-1-5-6-3
1787
+ 25.70M 55.98%
1788
+ 43.54%
1789
+ 31.46%
1790
+ 13.54%
1791
+ D-5-2-6-3
1792
+ 25.14M 52.93%
1793
+ 40.41%
1794
+ 29.14%
1795
+ 12.60%
1796
+ D-1-4-7-3
1797
+ 26.53M 56.60%
1798
+ 43.62%
1799
+ 31.51%
1800
+ 13.76%
1801
+ D-6-4-4-3
1802
+ 23.53M 54.19%
1803
+ 42.11%
1804
+ 30.40%
1805
+ 13.30%
1806
+ D-3-5-2-4
1807
+ 25.83M 53.98%
1808
+ 41.44%
1809
+ 30.08%
1810
+ 13.13%
1811
+ D-4-3-10-2
1812
+ 25.35M 55.62%
1813
+ 43.15%
1814
+ 31.32%
1815
+ 14.03%
1816
+ D-2-7-13-1
1817
+ 25.22M 57.19%
1818
+ 44.16%
1819
+ 31.91%
1820
+ 13.89%
1821
+ D-2-9-13-1
1822
+ 25.78M 57.89%
1823
+ 45.08%
1824
+ 32.84%
1825
+ 14.63%
1826
+ D-2-13-8-2
1827
+ 25.78M 55.86%
1828
+ 42.91%
1829
+ 30.96%
1830
+ 13.40%
1831
+ D-1-1-15-1
1832
+ 25.71M 55.74%
1833
+ 43.41%
1834
+ 31.45%
1835
+ 13.51%
1836
+ D-2-5-14-1
1837
+ 25.78M 56.49%
1838
+ 44.13%
1839
+ 32.58%
1840
+ 14.73%
1841
+ D-5-8-13-1
1842
+ 25.71M 57.35%
1843
+ 44.83%
1844
+ 33.33%
1845
+ 15.46%
1846
+ D-2-12-12-1
1847
+ 25.51M 55.89%
1848
+ 43.39%
1849
+ 31.45%
1850
+ 13.56%
1851
+ D-4-8-1-4
1852
+ 25.62M 54.84%
1853
+ 42.44%
1854
+ 30.23%
1855
+ 12.86%
1856
+ D-1-4-2-4
1857
+ 25.41M 52.46%
1858
+ 40.25%
1859
+ 28.80%
1860
+ 12.22%
1861
+ D-2-1-3-4
1862
+ 25.76M 53.23%
1863
+ 41.50%
1864
+ 29.76%
1865
+ 12.51%
1866
+ D-3-24-5-2
1867
+ 25.58M 57.41%
1868
+ 44.66%
1869
+ 32.65%
1870
+ 14.42%
1871
+ D-2-8-5-3
1872
+ 25.49M 56.43%
1873
+ 43.65%
1874
+ 31.70%
1875
+ 13.62%
1876
+ D-6-4-2-4
1877
+ 25.76M 53.48%
1878
+ 42.04%
1879
+ 31.07%
1880
+ 13.70%
1881
+ D-10-6-5-3
1882
+ 25.49M 57.17%
1883
+ 43.65%
1884
+ 31.45%
1885
+ 13.25%
1886
+ D-10-2-2-4
1887
+ 25.48M 53.03%
1888
+ 41.01%
1889
+ 30.32%
1890
+ 13.45%
1891
+ D-1-2-3-4
1892
+ 25.97M 53.68%
1893
+ 41.05%
1894
+ 29.21%
1895
+ 11.92%
1896
+ 5-stage Network
1897
+ D-1-1-3-1-2
1898
+ 25.42M 48.85%
1899
+ 36.89%
1900
+ 25.98%
1901
+ 10.37%
1902
+ D-1-1-3-2-1
1903
+ 25.42M 50.14%
1904
+ 37.33%
1905
+ 26.11%
1906
+ 10.35%
1907
+ D-3-6-2-2-1
1908
+ 25.85M 51.64%
1909
+ 39.12%
1910
+ 28.23%
1911
+ 12.24%
1912
+ D-2-3-7-1-1
1913
+ 26.06M 52.16%
1914
+ 39.79%
1915
+ 28.40%
1916
+ 11.72%
1917
+ D-3-4-6-2-1
1918
+ 29.76M 53.67%
1919
+ 41.25%
1920
+ 29.88%
1921
+ 12.65%
1922
+ 6-stage Network
1923
+ D-1-1-1-1-1-1 27.39M 40.82%
1924
+ 29.46%
1925
+ 20.00%
1926
+ 7.52%
1927
+ natural, PGD10-2, PGD10-4, and PGD10-8 accuracies.
1928
+ Table 9. PGD10 robustness of all stage-level designs. Bold font
1929
+ means the results have been presented in the paper. All configu-
1930
+ rations are trained with Fast-AT and evaluated on full ImageNet
1931
+ validation set. ResNet-50 serves as the baseline. We presented
1932
+ “Stem width 96” and “Move down (↓) downsampling” for the stem
1933
+ stage, and “Dense ratio 2” for the dense connection in the main pa-
1934
+ per. We complete the results by providing all other configurations,
1935
+ and PGD attack budgets here.
1936
+ Config
1937
+ #Param Natural PGD10-2 PGD10-4 PGD10-8
1938
+ ResNet-50
1939
+ 25.56M 56.09%
1940
+ 42.66%
1941
+ 30.43%
1942
+ 12.61%
1943
+ Stem Stage
1944
+ Stem width 32
1945
+ 25.54M 55.89%
1946
+ 41.64%
1947
+ 29.73%
1948
+ 13.25%
1949
+ Stem width 96
1950
+ 25.57M 57.29%
1951
+ 44.55%
1952
+ 32.06%
1953
+ 13.74%
1954
+ Stem kernel 3
1955
+ 25.55M 38.93%
1956
+ 0.46%
1957
+ 0.55%
1958
+ 0.30%
1959
+ Stem kernel 5
1960
+ 25.55M 59.59%
1961
+ 0.38%
1962
+ 0.09%
1963
+ 0.04%
1964
+ Stem kernel 9
1965
+ 25.56M 55.75%
1966
+ 43.00%
1967
+ 31.19%
1968
+ 13.63%
1969
+ Move down (↓) 25.56M 57.08%
1970
+ 45.19%
1971
+ 33.08%
1972
+ 14.50%
1973
+ downsampling
1974
+ Downsample
1975
+ 25.56M 56.03%
1976
+ 44.48%
1977
+ 32.86%
1978
+ 14.71%
1979
+ factor 2
1980
+ “Patchify 4”
1981
+ 25.55M 55.40%
1982
+ 43.45%
1983
+ 31.68%
1984
+ 13.80%
1985
+ “Patchify 2”
1986
+ 25.55M 56.38%
1987
+ 44.21%
1988
+ 31.91%
1989
+ 13.48%
1990
+ Dense Connection
1991
+ Dense ratio 2
1992
+ 25.56M 55.93%
1993
+ 42.85%
1994
+ 30.73%
1995
+ 12.67%
1996
+ Dense ratio 3
1997
+ 25.56M 53.45%
1998
+ 40.70%
1999
+ 29.39%
2000
+ 12.84%
2001
+ Dense ratio 4
2002
+ 25.56M 55.02%
2003
+ 42.44%
2004
+ 30.52%
2005
+ 12.98%
2006
+ Dense ratio 5
2007
+ 25.56M 54.45%
2008
+ 41.96%
2009
+ 30.07%
2010
+ 12.49%
2011
+ Dense ratio 5
2012
+ 25.56M 49.68%
2013
+ 37.32%
2014
+ 26.15%
2015
+ 10.28%
2016
+ ReLU-ReLU-0
2017
+ E. Roadmap Results
2018
+ This section presents detailed results for the roadmap
2019
+ we take to construct the RobArch family using Table 11.
2020
+ We demonstrate each architecture component in the cumu-
2021
+ lative RobArch construction process improves natural and
2022
+ PGD10-4 in the main paper. In Table 11, we show that the
2023
+ accuracy gain is also consistent on PGD10-2 and PGD10-8.
2024
+ F. SOTA Architecture Comparisons
2025
+ F.1. Fast-AT Comparisons
2026
+ This section presents the detailed results of RobArch and
2027
+ other SOTA architectures after Fast-AT using Table 7. With
2028
+ a similar model capacity, RobArch-S outperforms ResNet-
2029
+ 50 and ResNeXt-50 43×4d, and RobArch-M outperforms
2030
+ ResNet-101. Compared to models with larger parameters,
2031
+ RobArch-S is even more robust than WideResNet101-2 de-
2032
+ spite having 4.85× fewer parameters. The accuracy con-
2033
+ tinues to increase while scaling up the RobArch models,
2034
+ with RobArch-L achieving the highest natural and adver-
2035
+ sarial accuracies.
2036
+ 14
2037
+
2038
+ Table 10. PGD10 robustness of all block-level designs. Bold font
2039
+ means the results have been presented in the paper. All configu-
2040
+ rations are trained with Fast-AT and evaluated on full ImageNet
2041
+ validation set. ResNet-50 serves as the baseline. Bold means re-
2042
+ sults have already appeared in the main paper. We complete the
2043
+ results by providing all other configurations and PGD attack bud-
2044
+ gets here. For activation, 0-0-ReLU means only the last activation
2045
+ layer is preserved in a block and the first two are discarded. The
2046
+ same also applies to normalization.
2047
+ Config
2048
+ #Param Natural PGD10-2 PGD10-4 PGD10-8
2049
+ ResNet-50
2050
+ 25.56M 56.09%
2051
+ 42.66%
2052
+ 30.43%
2053
+ 12.61%
2054
+ Kernel Size
2055
+ Kernel size 5
2056
+ 45.68M 56.73%
2057
+ 44.55%
2058
+ 32.77%
2059
+ 14.62%
2060
+ Kernel size 7
2061
+ 75.86M 59.70%
2062
+ 47.28%
2063
+ 34.67%
2064
+ 14.99%
2065
+ Dilation
2066
+ Dilation 2
2067
+ 25.56M 52.98%
2068
+ 40.38%
2069
+ 28.38%
2070
+ 11.79%
2071
+ Dilation 3
2072
+ 25.56M 52.10%
2073
+ 39.69%
2074
+ 27.97%
2075
+ 11.05%
2076
+ Activation
2077
+ Act. GELU
2078
+ 25.56M 57.48%
2079
+ 45.05%
2080
+ 33.12%
2081
+ 14.80%
2082
+ Act. SiLU
2083
+ 25.56M 58.19%
2084
+ 46.21%
2085
+ 34.07%
2086
+ 14.68%
2087
+ Act. PReLU
2088
+ 25.56M 55.81%
2089
+ 42.52%
2090
+ 30.38%
2091
+ 12.76%
2092
+ Act. PSiLU
2093
+ 25.56M 56.38%
2094
+ 44.90%
2095
+ 33.76%
2096
+ 15.40%
2097
+ Act. PSSiLU
2098
+ 25.56M 57.43%
2099
+ 44.44%
2100
+ 32.22%
2101
+ 13.71%
2102
+ ReLU-ReLU-0 25.56M 51.54%
2103
+ 38.69%
2104
+ 27.05%
2105
+ 10.94%
2106
+ ReLU-0-ReLU 25.56M 53.91%
2107
+ 41.22%
2108
+ 29.62%
2109
+ 12.30%
2110
+ 0-ReLU-ReLU 25.56M 54.81%
2111
+ 42.10%
2112
+ 30.34%
2113
+ 12.86%
2114
+ 0-0-ReLU
2115
+ 25.56M 51.03%
2116
+ 39.12%
2117
+ 28.15%
2118
+ 12.09%
2119
+ 0-ReLU-0
2120
+ 25.56M 47.18%
2121
+ 34.85%
2122
+ 24.12%
2123
+ 9.51%
2124
+ ReLU-0-0
2125
+ 25.56M 44.21%
2126
+ 32.34%
2127
+ 22.24%
2128
+ 8.77%
2129
+ Squeeze and Excitation (SE)
2130
+ SE (ReLU)
2131
+ 27.73M 57.83%
2132
+ 45.09%
2133
+ 32.64%
2134
+ 14.01%
2135
+ SE (SiLU)
2136
+ 27.73M 58.49%
2137
+ 45.79%
2138
+ 33.63%
2139
+ 14.51%
2140
+ SE (GELU)
2141
+ 27.73M 58.27%
2142
+ 45.66%
2143
+ 33.55%
2144
+ 14.56%
2145
+ SE (PSiLU)
2146
+ 27.73M 56.98%
2147
+ 44.19%
2148
+ 32.19%
2149
+ 13.68%
2150
+ SE (PSSiLU)
2151
+ 27.73M 57.55%
2152
+ 45.27%
2153
+ 33.33%
2154
+ 14.73%
2155
+ Normalization
2156
+ Norm. IN
2157
+ 25.51M 17.15%
2158
+ 12.49%
2159
+ 8.54%
2160
+ 3.55%
2161
+ BN-BN-0
2162
+ 25.53M 54.15%
2163
+ 41.12%
2164
+ 29.59%
2165
+ 12.36%
2166
+ BN-0-BN
2167
+ 25.55M 56.04%
2168
+ 43.29%
2169
+ 31.34%
2170
+ 13.37%
2171
+ 0-BN-BN
2172
+ 25.55M 56.18%
2173
+ 43.64%
2174
+ 31.61%
2175
+ 13.47%
2176
+ 0-0-BN
2177
+ 25.54M 54.47%
2178
+ 41.91%
2179
+ 30.13%
2180
+ 12.65%
2181
+ 0-BN-0
2182
+ 25.52M 54.55%
2183
+ 41.94%
2184
+ 30.06%
2185
+ 12.62%
2186
+ BN-0-0
2187
+ 25.52M 54.44%
2188
+ 41.47%
2189
+ 29.72%
2190
+ 12.50%
2191
+ F.2. Standard-AT Comparisons
2192
+ This section compares our RobArchs with other SOTA
2193
+ models against both PGD and AA in Table 12.
2194
+ For
2195
+ AA, all three RobArchs outperform their XCiT counter-
2196
+ parts. Using the same training configurations as Salman
2197
+ et al. [41], RobArch-S surpasses ResNet-50 AA accuracy
2198
+ by 9.18 percentage points, and is even more robust than
2199
+ WideResNet50-2 with 2.6× fewer parameters. The robust-
2200
+ ness continues to scale with model capacity, and RobArch-
2201
+ L achieves the new SOTA AA accuracy on the Robust-
2202
+ Bench leaderboard.
2203
+ It is important to note that ResNet-
2204
+ 50+DiffPure [39] designed a novel AT method via using
2205
+ diffusion models [22] for adversarial purification. Although
2206
+ the method improves the AA accuracy by 5.97 percent-
2207
+ age points, our architecture modifications show stronger ro-
2208
+ bustness even without finetuning the Standard-AT method.
2209
+ We believe a carefully designed training recipe can further
2210
+ improve RobArchs’ robustness. For PGD, the RobArch-
2211
+ S again outperforms ResNet-50 and even WideResNet50-
2212
+ 2 using the same Standard-AT configurations.
2213
+ Overall,
2214
+ our RobArchs outperform both ConvNets and Transformers
2215
+ with similar total parameters.
2216
+ 15
2217
+
2218
+ Table 11. The roadmap outlines the path we take to cumulatively improve the robustness and construct RobArch-S (∼26M), RobArch-M
2219
+ (∼46M), and RobArch-L (∼104M) based on our guidelines. Natural and PGD10-4 accuracies were already shown in the main paper.
2220
+ PGD10-2 and PGD10-8 show similar trends of accuracy improvement as PGD10-4.
2221
+ Configurations
2222
+ #Param
2223
+ Natural
2224
+ PGD10-2
2225
+ PGD10-4
2226
+ PGD10-8
2227
+ Small: ResNet-50 → RobArch-S (S7)
2228
+ S0
2229
+ ResNet-50
2230
+ 25.71M
2231
+ 56.09%
2232
+ 42.66%
2233
+ 30.43%
2234
+ 12.61%
2235
+ S1
2236
+ S0 + D-5-8-13-1
2237
+ 25.56M
2238
+ 57.35%
2239
+ 44.83%
2240
+ 33.33%
2241
+ 15.46%
2242
+ S2a
2243
+ S1 + g = 2, e = 2, b = 0.25
2244
+ 25.84M
2245
+ 57.98%
2246
+ 46.00%
2247
+ 33.94%
2248
+ 15.27%
2249
+ S2b
2250
+ S1 + g = 1, e = 1.5, b = 0.25
2251
+ 25.53M
2252
+ 57.52%
2253
+ 44.60%
2254
+ 32.83%
2255
+ 14.23%
2256
+ S3
2257
+ S2a + Stem width 96 + Move down (↓) downsampling
2258
+ 25.85M
2259
+ 57.82%
2260
+ 46.37%
2261
+ 34.86%
2262
+ 15.92%
2263
+ S4
2264
+ S3 + SE (ReLU)
2265
+ 26.15M
2266
+ 60.57%
2267
+ 49.05%
2268
+ 36.61%
2269
+ 16.43%
2270
+ S5
2271
+ S4 + Act. SiLU
2272
+ 26.15M
2273
+ 62.04%
2274
+ 51.41%
2275
+ 39.48%
2276
+ 18.95%
2277
+ S6
2278
+ S5 + SE (SiLU)
2279
+ 26.15M
2280
+ 60.32%
2281
+ 49.74%
2282
+ 38.24%
2283
+ 18.18%
2284
+ S7
2285
+ S5 + Norm-0-BN-BN
2286
+ 26.14M
2287
+ 62.27%
2288
+ 51.67%
2289
+ 39.88%
2290
+ 18.99%
2291
+ Medium: RobArch-S (S7) → RobArch-M (M2)
2292
+ M1
2293
+ S7 + Kernel size 5
2294
+ 45.95M
2295
+ 63.82%
2296
+ 52.89%
2297
+ 41.00%
2298
+ 19.90%
2299
+ M2
2300
+ S7 + D-7-11-18-1
2301
+ 45.90M
2302
+ 64.40%
2303
+ 53.97%
2304
+ 42.06%
2305
+ 20.98%
2306
+ M3
2307
+ S7 + W-384-760-1504-2944
2308
+ 46.16M
2309
+ 63.52%
2310
+ 53.11%
2311
+ 41.43%
2312
+ 20.27%
2313
+ Large: RobArch-M (M2) → RobArch-L (L2)
2314
+ L1
2315
+ M2 + Kernel size 7
2316
+ 103.89M
2317
+ 64.08%
2318
+ 52.92%
2319
+ 40.70%
2320
+ 19.61%
2321
+ L2
2322
+ M2 + W-512-1024-2016-4032
2323
+ 104.07M
2324
+ 66.08%
2325
+ 55.52%
2326
+ 43.81%
2327
+ 22.50%
2328
+ L3
2329
+ M2 + D-8-13-21-2
2330
+ 104.13M
2331
+ 64.91%
2332
+ 54.64%
2333
+ 43.09%
2334
+ 21.81%
2335
+ L4
2336
+ M2 + D-10-16-26-2
2337
+ 104.14M
2338
+ 65.28%
2339
+ 54.49%
2340
+ 42.85%
2341
+ 21.42%
2342
+ Table 12. Our RobArch model outperforms ConvNets and Transformers with similar total parameters against ℓ∞ = 4/255 AA and
2343
+ ℓ∞ = 2/255, 4/255, 8/255 PGD attacks. Using the same training configurations as Salman et al. [41], our model outperforms both
2344
+ ResNet-50 and WideResNet50-2. Every RobArch model outperforms its XCiT counterpart at a similar capacity.
2345
+ Architecture
2346
+ #Param
2347
+ Natural
2348
+ AA
2349
+ PGD10-4
2350
+ PGD50-4
2351
+ PGD100-4
2352
+ PGD100-2
2353
+ PGD100-8
2354
+ ResNet-18 [41]
2355
+ 12M
2356
+ 52.49%
2357
+ 25.32%
2358
+ 30.06%
2359
+ 29.61%
2360
+ 29.61%
2361
+ 40.98%
2362
+ 11.57%
2363
+ RobNet-large [18]
2364
+ 13M
2365
+ 61.26%
2366
+ -
2367
+ 37.16%
2368
+ 37.15%
2369
+ 37.14%
2370
+ -
2371
+ -
2372
+ PoolFormer-M12 [11]
2373
+ 22M
2374
+ 66.16%
2375
+ 34.72%
2376
+ -
2377
+ -
2378
+ -
2379
+ -
2380
+ -
2381
+ DeiT-S [3]
2382
+ 22M
2383
+ 66.50%
2384
+ 35.50%
2385
+ 41.03%
2386
+ 40.34%
2387
+ 40.32%
2388
+ -
2389
+ -
2390
+ DeiT-S+DiffPure [39]
2391
+ 22M
2392
+ 73.63%
2393
+ 43.18%
2394
+ -
2395
+ -
2396
+ -
2397
+ -
2398
+ -
2399
+ ResNet-50 [41]
2400
+ 26M
2401
+ 63.87%
2402
+ 34.96%
2403
+ 39.66%
2404
+ 38.98%
2405
+ 38.96%
2406
+ 52.15%
2407
+ 15.83%
2408
+ ResNet-50+DiffPure [39]
2409
+ 26M
2410
+ 67.79%
2411
+ 40.93%
2412
+ -
2413
+ -
2414
+ -
2415
+ -
2416
+ -
2417
+ ResNet50+SiLU [57]
2418
+ 26M
2419
+ 69.70%
2420
+ -
2421
+ 43.00%
2422
+ 41.90%
2423
+ -
2424
+ -
2425
+ -
2426
+ ResNet50+GELU [3]
2427
+ 26M
2428
+ 67.38%
2429
+ 35.51%
2430
+ 40.98%
2431
+ 40.28%
2432
+ 40.27%
2433
+ -
2434
+ -
2435
+ ResNet-50-R [26]
2436
+ 26M
2437
+ 56.63%
2438
+ -
2439
+ -
2440
+ 31.14%
2441
+ -
2442
+ -
2443
+ -
2444
+ XCiT-S12 [11]
2445
+ 26M
2446
+ 72.34%
2447
+ 41.78%
2448
+ -
2449
+ -
2450
+ -
2451
+ -
2452
+ -
2453
+ RobArch-S
2454
+ 26M
2455
+ 70.17%
2456
+ 44.14%
2457
+ 48.19%
2458
+ 47.78%
2459
+ 47.77%
2460
+ 60.06%
2461
+ 21.77%
2462
+ XCiT-M12 [11]
2463
+ 46M
2464
+ 74.04%
2465
+ 45.24%
2466
+ -
2467
+ -
2468
+ -
2469
+ -
2470
+ -
2471
+ RobArch-M
2472
+ 46M
2473
+ 71.88%
2474
+ 46.26%
2475
+ 49.84%
2476
+ 49.32%
2477
+ 49.30%
2478
+ 61.89%
2479
+ 23.01%
2480
+ WideResNet50-2 [41]
2481
+ 69M
2482
+ 68.41%
2483
+ 38.14%
2484
+ 42.51%
2485
+ 41.33%
2486
+ 41.24%
2487
+ 55.86%
2488
+ 16.29%
2489
+ WideResNet50-2+DiffPure [39]
2490
+ 69M
2491
+ 71.16%
2492
+ 44.39%
2493
+ -
2494
+ -
2495
+ -
2496
+ -
2497
+ -
2498
+ Swin-B [38]
2499
+ 88M
2500
+ 74.36%
2501
+ 38.61%
2502
+ -
2503
+ -
2504
+ -
2505
+ -
2506
+ -
2507
+ XCiT-L12 [11]
2508
+ 104M
2509
+ 73.76%
2510
+ 47.60%
2511
+ -
2512
+ -
2513
+ -
2514
+ -
2515
+ -
2516
+ RobArch-L
2517
+ 104M
2518
+ 73.44%
2519
+ 48.94%
2520
+ 51.72%
2521
+ 51.04%
2522
+ 51.03%
2523
+ 63.49%
2524
+ 25.31%
2525
+ 16
2526
+
2527
+ Table 13. PGD10 robustness of width. Bold font means the results have been presented in the paper. All configurations are trained with Fast-
2528
+ AT and evaluated on full ImageNet validation set. ResNet-50 serves as the baseline. In the main paper, we presented BM-0.5-0.5-0.5-0.5
2529
+ and BM-0.5-0.5-0.25-0.25 for bottleneck multiplier, G-2-2-2-2 for group convolution groups, W-512-768-1152-1728 for expansion
2530
+ ratio, and the combined model. We complete the results by providing all other configurations, and PGD attack budgets here.
2531
+ Channel
2532
+ Group
2533
+ Bottleneck Multiplier
2534
+ #Param
2535
+ Natural PGD10-2 PGD10-4 PGD10-8
2536
+ ResNet-50
2537
+ 25.56M
2538
+ 56.09%
2539
+ 42.66%
2540
+ 30.43%
2541
+ 12.61%
2542
+ Bottleneck Multiplier
2543
+ W-320-672-1456-3136
2544
+ G-1-1-1-1
2545
+ BM-0.125-0.125-0.125-0.125
2546
+ 25.47M 53.47%
2547
+ 41.42%
2548
+ 30.11%
2549
+ 13.40%
2550
+ W-128-256-568-1304
2551
+ G-1-1-1-1
2552
+ BM-0.5-0.5-0.5-0.5
2553
+ 25.57M 55.31%
2554
+ 42.48%
2555
+ 30.52%
2556
+ 13.23%
2557
+ W-64-144-320-720
2558
+ G-1-1-1-1
2559
+ BM-1-1-1-1
2560
+ 25.61M 53.07%
2561
+ 40.93%
2562
+ 29.54%
2563
+ 12.70%
2564
+ W-32-72-168-384
2565
+ G-1-1-1-1
2566
+ BM-2-2-2-2
2567
+ 25.72M 51.17%
2568
+ 38.79%
2569
+ 27.32%
2570
+ 11.22%
2571
+ W-16-32-88-200
2572
+ G-1-1-1-1
2573
+ BM-4-4-4-4
2574
+ 26.19M 47.67%
2575
+ 35.93%
2576
+ 25.30%
2577
+ 10.32%
2578
+ W-256-512-168-384
2579
+ G-1-1-1-1
2580
+ BM-0.25-0.25-2-2
2581
+ 26.42M 52.33%
2582
+ 39.79%
2583
+ 28.52%
2584
+ 12.30%
2585
+ W-24-48-1024-2048
2586
+ G-1-1-1-1
2587
+ BM-4-4-0.25-0.25
2588
+ 25.20M 55.78%
2589
+ 43.09%
2590
+ 30.79%
2591
+ 12.89%
2592
+ W-128-256-1024-2048
2593
+ G-1-1-1-1
2594
+ BM-0.5-0.5-0.25-0.25
2595
+ 24.83M 56.11%
2596
+ 43.38%
2597
+ 31.26%
2598
+ 13.47%
2599
+ Group Convolution Groups
2600
+ W-256-512-1080-2504
2601
+ G-2-2-2-2
2602
+ BM-0.25-0.25-0.25-0.25
2603
+ 26.02M 57.31%
2604
+ 44.25%
2605
+ 32.09%
2606
+ 13.91%
2607
+ W-288-576-1248-2592
2608
+ G-4-4-4-4
2609
+ BM-0.25-0.25-0.25-0.25
2610
+ 25.58M 56.28%
2611
+ 44.00%
2612
+ 31.52%
2613
+ 13.33%
2614
+ W-256-512-1280-2816
2615
+ G-8-8-8-8
2616
+ BM-0.25-0.25-0.25-0.25
2617
+ 25.81M 56.54%
2618
+ 42.49%
2619
+ 30.07%
2620
+ 12.86%
2621
+ W-256-576-1344-2816
2622
+ G-16-16-16-16
2623
+ BM-0.25-0.25-0.25-0.25
2624
+ 25.61M 54.83%
2625
+ 42.92%
2626
+ 31.03%
2627
+ 13.28%
2628
+ W-304-640-1384-2848
2629
+ G-76-160-337-712
2630
+ BM-0.25-0.25-0.25-0.25
2631
+ 25.52M 55.17%
2632
+ 42.34%
2633
+ 30.45%
2634
+ 12.72%
2635
+ W-256-512-1040-2112
2636
+ G-8-8-1-1
2637
+ BM-0.25-0.25-0.25-0.25
2638
+ 26.13M 55.49%
2639
+ 42.42%
2640
+ 30.78%
2641
+ 12.82%
2642
+ W-256-512-1248-2784
2643
+ G-1-1-8-8
2644
+ BM-0.25-0.25-0.25-0.25
2645
+ 25.69M 55.94%
2646
+ 43.28%
2647
+ 31.15%
2648
+ 13.92%
2649
+ W-256-512-1248-2592
2650
+ G-2-2-4-4
2651
+ BM-0.25-0.25-0.25-0.25
2652
+ 25.41M 57.13%
2653
+ 43.88%
2654
+ 31.44%
2655
+ 13.48%
2656
+ Channel / Expansion Ratio
2657
+ W-1112-1112-1112-1112
2658
+ G-1-1-1-1
2659
+ BM-0.25-0.25-0.25-0.25
2660
+ 25.70M 56.77%
2661
+ 43.18%
2662
+ 31.08%
2663
+ 13.68%
2664
+ W-512-768-1152-1728
2665
+ G-1-1-1-1
2666
+ BM-0.25-0.25-0.25-0.25
2667
+ 25.95M 57.17%
2668
+ 44.05%
2669
+ 32.04%
2670
+ 14.06%
2671
+ W-144-360-904-2264
2672
+ G-1-1-1-1
2673
+ BM-0.25-0.25-0.25-0.25
2674
+ 26.01M 53.89%
2675
+ 41.83%
2676
+ 30.33%
2677
+ 13.38%
2678
+ W-88-264-792-2376
2679
+ G-1-1-1-1
2680
+ BM-0.25-0.25-0.25-0.25
2681
+ 25.81M 52.39%
2682
+ 40.60%
2683
+ 29.36%
2684
+ 12.58%
2685
+ Combined
2686
+ W-512-768-1152-1728
2687
+ G-2-2-2-2
2688
+ BM-0.5-0.5-0.25-0.25
2689
+ 24.43M 56.64%
2690
+ 43.56%
2691
+ 31.04%
2692
+ 13.17%
2693
+ Table 14. PGD10 robustness of combining depth and width. We use a bold font to highlight results that have been presented in the paper.
2694
+ Specifically, the paper uses a scatter plot to visualize how the PGD10-4 accuracy changes as we vary depth and width. Here, we additionally
2695
+ show the results for PGD10-2 and PGD10-8. All configurations are trained with Fast-AT and evaluated on full ImageNet validation set.
2696
+ Depth
2697
+ Width
2698
+ #Param Natural PGD10-2 PGD10-4 PGD10-8
2699
+ D-1-2-4-1
2700
+ W-768-1152-1712-2560
2701
+ 25.69M 54.28%
2702
+ 41.16%
2703
+ 29.10%
2704
+ 11.83%
2705
+ D-2-4-7-1
2706
+ W-648-968-1456-2160
2707
+ 25.55M 57.25%
2708
+ 43.60%
2709
+ 31.52%
2710
+ 13.59%
2711
+ D-4-6-10-1
2712
+ W-576-848-1280-1904
2713
+ 25.51M 57.08%
2714
+ 44.18%
2715
+ 32.32%
2716
+ 14.46%
2717
+ D-5-8-13-1
2718
+ W-512-768-1152-1728
2719
+ 25.18M 57.24%
2720
+ 44.69%
2721
+ 33.05%
2722
+ 15.36%
2723
+ D-8-12-20-2
2724
+ W-424-632-944-1416
2725
+ 25.37M 57.74%
2726
+ 44.79%
2727
+ 33.15%
2728
+ 14.87%
2729
+ D-10-16-26-2
2730
+ W-376-568-856-1280
2731
+ 25.56M 61.36%
2732
+ 44.92%
2733
+ 27.23%
2734
+ 5.67%
2735
+ D-20-32-52-4
2736
+ W-272-416-616-928
2737
+ 25.52M 55.76%
2738
+ 43.28%
2739
+ 31.31%
2740
+ 13.03%
2741
+ 17
2742
+
C9E1T4oBgHgl3EQfWATV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CdFQT4oBgHgl3EQfOTbk/content/tmp_files/2301.13275v1.pdf.txt ADDED
@@ -0,0 +1,451 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ On selfconsistency in quantum field theory
2
+ K. Scharnhorst†
3
+ Vrije Universiteit Amsterdam, Faculty of Sciences, Department of Physics and
4
+ Astronomy, De Boelelaan 1081, 1081 HV Amsterdam, The Netherlands
5
+ Abstract
6
+ A bootstrap approach to the effective action in quantum field theory is dis-
7
+ cussed which entails the invariance under quantum fluctuations of the effective
8
+ action describing physical reality (via the S-matrix).
9
+ †E-mail: [email protected],
10
+ ORCID: http://orcid.org/0000-0003-3355-9663
11
+ arXiv:2301.13275v1 [hep-th] 30 Jan 2023
12
+
13
+ 1
14
+ Introduction
15
+ These are times of contemplation and reorientation in quantum field theory. With
16
+ the experimental detection of the Higgs boson in 2012 finally the finishing stone of
17
+ the Standard Model of elementary particle physics [1] surfaced. On the theoretical
18
+ side, the Standard Model is based on the concept of renormalized local quantum field
19
+ theory. The confidence in this concept originally and primarily relies on the extraor-
20
+ dinary success of the centerpiece of the Standard Model, quantum electrodynamics
21
+ (QED), which exhibits an impressive agreement between theory and experiment
22
+ (Cf., e.g., [2], for more comprehensive reviews see [3].). The successful application
23
+ of renormalized local quantum field theory to the other components of the Standard
24
+ Model, the electroweak theory and to quantum chromodynamics (QCD), have fur-
25
+ ther advanced this confidence. On the other hand, many practicing quantum field
26
+ theorists are aware of the many shortcomings and deficiencies of the concept of renor-
27
+ malized local quantum field theory which, by the way, has changed and developed in
28
+ a multifold way in the decades since its birth at the end of the 1940’s. To name a few
29
+ of these issues we mention here the occurrence of ultraviolet (UV) divergencies, the
30
+ cosmological constant problem, hierarchy and naturalness problems, Haag’s theo-
31
+ rem (For an instructive illustration of the views of a number of well-known quantum
32
+ field theorist see, e.g., the conference volume [4].). It should, however, be pointed
33
+ out that in the quantum field theory community there is no unified view which of
34
+ these issues constitute features and which are problematic aspects of renormalized
35
+ local quantum field theory. Correspondingly, opinions on which direction should be
36
+ chosen for the future conceptual and technical development of quantum field theory
37
+ are diverse (For a recent account of the current situation see [5].). While many
38
+ active researchers might favour new ideas which have not been discussed in the past
39
+ a certain fraction of the quantum field theory community might be willing to not
40
+ completely disregard past ideas which have largely been bypassed so far. In the
41
+ present article, it is our intention to bring together a couple of thoughts and ideas
42
+ (supplemented by the corresponding references) that have emerged in the past. We
43
+ hope that the collection of this information in a single place will be beneficial to
44
+ those readers who consider voices from the past as an inspiration for future research
45
+ rather than purely as a matter for historians of science.
46
+ Let us start with pointing out that with reference to the UV divergency prob-
47
+ lem in QED some of the very fathers of this theory have repeatedly expressed their
48
+ dissatisfaction with their own creation up to the end of their lives. So, Richard
49
+ Feynman stated 1965 in his Nobel Prize speech quite frankly : “. . . , I believe there
50
+ is really no satisfactory quantum electrodynamics, but I’m not sure. . . . , I think
51
+ that the renormalization theory is simply a way to sweep the difficulties of the di-
52
+ vergences of electrodynamics under the rug.” ([6], Science p. 707, Phys. Today pp.
53
+ 43/44, Prix Nobel p. 189, Nobel Lectures p. 176, Selected Papers p. 30). Now one
54
+ might think that Feynman has later, after the development of the Wilsonian view
55
+ on renormalization in the early 1970’s and the emergence of the effective field theory
56
+ 2
57
+
58
+ concept changed his view. However, this seems not to be the case and one can read
59
+ in Feynman’s popular science book “QED – The Strange Theory of Light and Mat-
60
+ ter” the passage (𝑛 and 𝑗 are the bare counter parts of the physical electron mass 𝑚
61
+ and electron charge 𝑒, respectively.): “The shell game that we play to find 𝑛 and 𝑗 is
62
+ technically called “renormalization.” But no matter how clever the word, it is what
63
+ I would call a dippy process! Having to resort to such hocus-pocus has prevented
64
+ us from proving that the theory of quantum electrodynamics is mathematically self-
65
+ consistent. It’s surprising that the theory still hasn’t been proved self-consistent
66
+ one way or the other by now; I suspect that renormalization is not mathematically
67
+ legitimate. What is certain is that we do not have a good mathematical way to
68
+ describe the theory of quantum electrodynamics: such a bunch of words to describe
69
+ the connection between 𝑛 and 𝑗 and 𝑚 and 𝑒 is not good mathematics.” ([7], 1st ed.
70
+ 1985, pp. 128/129, 2nd ed. 2006, p. 127/128). In a similar way Paul Dirac stated
71
+ in a lecture in 1975 (published 1978): “Hence most physicists are very satisfied with
72
+ the situation. They say: “Quantum electrodynamics is a good theory, and we do
73
+ not have to worry about it any more.” I must say that I am very dissatisfied with
74
+ the situation, because this so called “good theory” does involve neglecting infinities
75
+ which appear in its equations, neglecting them in an arbitrary way. This is just not
76
+ sensible mathematics. Sensible mathematics involves neglecting a quantity when it
77
+ turns out to be small – not neglecting it just because it is infinitely great and you do
78
+ not want it.” ([8], p. 36). Few years later, in 1980 (published in 1983), Dirac repeats
79
+ his critical view: “Some new relativistic equations are needed; new kinds of interac-
80
+ tions must be brought into play. When these new equations and new interactions
81
+ are thought out, the problems that are now bewildering to us will get automatically
82
+ explained, and we should no longer have to make use of such illogical processes as
83
+ infinite renormalization. This is quite nonsense physically, and I have always been
84
+ opposed to it. It is just a rule of thumb that gives results. In spite of its successes,
85
+ one should be prepared to abandon it completely and look on all the successes that
86
+ have been obtained by using the usual forms of quantum electrodynamics with the
87
+ infinities removed by artificial processes as just accidents when they give the right
88
+ answers, in the same way as the successes of the Bohr theory are considered merely
89
+ as accidents when they turn out to be correct.” ([9], p. 55). The weight one might
90
+ be tempted to assign to these views certainly will depend on the scientific taste of
91
+ each theoretician, however, at least one should take note of them.
92
+ It often happens in the course of the development of science that early consid-
93
+ erations and ideas are more fundamental than those emerging later. This is easily
94
+ explainable by the fact that at the early stages of the development of a subject
95
+ one enters largely unchartered territory and simple and structural ideas are then
96
+ needed to choose the right road to scientific progress. Sometimes conflicting ideas
97
+ are competing with each other. Initial dominance of one idea does not necessarily
98
+ mean that less successful concepts should be written off. It happens from time to
99
+ time that these disregarded concepts make a surprising return for one reason or
100
+ the other. Consequently, a look into the past (science history) may be helpful for
101
+ 3
102
+
103
+ shaping the future. For the following considerations, we will depart from such an
104
+ element of science history.
105
+ 2
106
+ Extending early thoughts of Wolfgang Pauli
107
+ Let us start our concrete discussion with a statement made by Wolfgang Pauli in
108
+ a private letter (in German) to Victor Weisskopf (by then, assistant to Wolfgang
109
+ Pauli at the ETH Zurich) in 1935. The comment of Wolfgang Pauli concerns the
110
+ self-energy of the electron in QED, a theory which was under development in those
111
+ days. In the context of the struggle with the UV divergencies of QED Wolfgang
112
+ Pauli expresses the following conviction (English translation in brackets: K. S.):
113
+ “. . . (Ich glaube allerdings, daß in einer vernünftigen Theorie die Selbstenergie nicht
114
+ nur endlich, sondern Null sein muß . . . [. . . (However, I believe that in a sensible the-
115
+ ory the self-energy has not only to be finite but zero . . . ]” ([10], p. 779 of: Letter
116
+ [425b] of December 14, 1935 from Pauli to Weisskopf. Part of: Nachtrag zu Band
117
+ I: 1919–1929 und II: 1930–1939, pp. 733-826). How can we understand this expec-
118
+ tation of a future correct quantum electrodynamical theory expressed by Wolfgang
119
+ Pauli? If one starts quantizing the theory (in this case, charged fermions interacting
120
+ with the electromagnetic field) on the basis of a Lagrangian with the physical (i.e.,
121
+ measured) value of the mass of the fermions inserted all physical processes that can
122
+ conceivably have an impact on that mass have effectively been taken into account
123
+ already. Consequently, the total impact of all physical processes taken into account
124
+ in the (theoretical) process of quantization (i.e., taking into account quantum fluc-
125
+ tuations) on the mass of these fermions should vanish (nonrenormalization). This
126
+ statement can be reformulated by saying that the fermion mass should not receive
127
+ any radiative corrections under quantization. One can now extend this early point of
128
+ view of Wolfgang Pauli and consider starting quantization not only with the physical
129
+ value of the fermion mass in the initial Lagrangian but choosing as initial Lagrangian
130
+ (in an arbitrary theory now) the (effective) Lagrangian which describes the physi-
131
+ cal world (with all its – infinitely many – nonlocal and nonpolynomial terms). In
132
+ principle (in theory, not in practice, of course), this can be read off from scattering
133
+ experiments (For the connection between the scattering matrix and the effective
134
+ action see, e.g., [11], sec. 2.4, [12].). If one now starts the process of quantization
135
+ with this “true” Lagrangian all radiative corrections to it should vanish because any
136
+ quantum fluctuations described by this Lagrangian have already been taken into ac-
137
+ count in this Lagrangian. Consequently, the physical (effective) Lagrangian should
138
+ be invariant under the process of quantization, all radiative corrections should van-
139
+ ish. This view of the process of quantization amounts to bootstrapping the effective
140
+ action of a theory. Quantities denoted within standard local renormalizable quan-
141
+ tum field theory as bare and renormalized ones, respectively, then coincide.
142
+ Before continuing our verbal discussion, let us make the above statements more
143
+ 4
144
+
145
+ precise in terms of equations. We consider within a path integral framework La-
146
+ grangian quantum field theory in flat (𝑛-dimensional Minkowski) space-time and
147
+ a (one-component) scalar field theory to pursue the discussion (for the following
148
+ equations cf., e.g., [13], chap. 9). A generalization to more complicated theories
149
+ is straightforward. The generating functional of Green functions of the scalar field
150
+ 𝜑(𝑥) is given by the equation
151
+ 𝑍[𝐽] = 𝐶
152
+ ∫︁
153
+ 𝐷𝜑 e 𝑖Γ0[𝜑] + 𝑖
154
+ ∫︁
155
+ 𝑑𝑛𝑥 𝐽(𝑥)𝜑(𝑥)
156
+ ,
157
+ (1)
158
+ where Γ0[𝜑] is the so-called classical action of the theory and 𝐶 some fixed normal-
159
+ ization constant. Then, the generating functional of the connected Green functions
160
+ is
161
+ 𝑊[𝐽] = −𝑖 ln 𝑍[𝐽]
162
+ .
163
+ (2)
164
+ The effective action Γ[¯𝜑], which also is the generating functional of the one-particle-
165
+ irreducible (1PI) Green functions, is obtained as the first Legendre transform of
166
+ 𝑊[𝐽],
167
+ Γ[¯𝜑] = 𝑊[𝐽] −
168
+ ∫︁
169
+ 𝑑𝑛𝑥 𝐽(𝑥)¯𝜑(𝑥)
170
+ .
171
+ (3)
172
+ Here
173
+ ¯𝜑(𝑥) = 𝛿𝑊[𝐽]
174
+ 𝛿𝐽(𝑥)
175
+ (4)
176
+ which in turn leads to
177
+ 𝛿Γ[¯𝜑]
178
+ 𝛿 ¯𝜑(𝑥) = − 𝐽(𝑥)
179
+ (5)
180
+ in analogy to the classical field equation for Γ0[𝜑]. Equivalently, using the above
181
+ expressions
182
+ e 𝑖Γ[¯𝜑]
183
+ = 𝐶
184
+ ∫︁
185
+ 𝐷𝜑 e 𝑖Γ0[𝜑 + ¯𝜑] + 𝑖
186
+ ∫︁
187
+ 𝑑𝑛𝑥 𝐽(𝑥)𝜑(𝑥)
188
+ (6)
189
+ can be considered as the defining relation for the effective action, where the r.h.s.
190
+ of the above equation has to be calculated using a current 𝐽(𝑥), given by Eq. (5),
191
+ which is a functional of ¯𝜑. Eq. (1) defines a map, 𝑔1 : Γ0[𝜑] −→ 𝑍[𝐽], from the class
192
+ of functionals called classical actions to the class of functionals 𝑍. Furthermore,
193
+ we have mappings, 𝑔2 : 𝑍[𝐽] −→ 𝑊[𝐽], (Eq. (2)) and 𝑔3 : 𝑊[𝐽] −→ Γ[¯𝜑] (Eq.
194
+ (3)). These three maps together define a map 𝑔3 ∘ 𝑔2 ∘ 𝑔1 = 𝑓 : Γ0[𝜑] −→ Γ[¯𝜑] (Eq.
195
+ (6)) from the set of so-called classical actions to the set of effective actions. It is
196
+ understood that in order to properly define the map a regularization scheme for the
197
+ scalar field theory is applied. Up to renormalization effects, the classical action Γ0[𝜑]
198
+ determines the effective action Γ[¯𝜑] uniquely via the map 𝑓 which encodes quantum
199
+ 5
200
+
201
+ principles. In this standard scheme, the (quantum) effective action is built directly
202
+ from classical physics and exhibits no independence in its own right.
203
+ The terms of the difference ∆Γ[¯𝜑] = Γ[¯𝜑] − Γ0[¯𝜑] are denoted as ’radiative correc-
204
+ tions’. The above verbal reasoning in generalization of early thoughts of Wolfgang
205
+ Pauli leads to the equation
206
+ ∆Γ[¯𝜑] = 0 ,
207
+ (7)
208
+ expressing the vanishing of all radiative corrections, i.e.,
209
+ Γ[¯𝜑] = Γ0[¯𝜑] .
210
+ (8)
211
+ The equation for the complete effective action which is equivalent to the fixed point
212
+ condition for the map 𝑓 reads (𝐶′ is some normalization constant)
213
+ e 𝑖Γ[¯𝜑]
214
+ = 𝐶′
215
+ ∫︁
216
+ 𝐷𝜑 e 𝑖Γ[𝜑 + ¯𝜑] + 𝑖
217
+ ∫︁
218
+ 𝑑𝑛𝑥 𝐽(𝑥)𝜑(𝑥)
219
+ ,
220
+ (9)
221
+ where
222
+ 𝐽(𝑥) = − 𝛿Γ[¯𝜑]
223
+ 𝛿 ¯𝜑(𝑥)
224
+ .
225
+ (10)
226
+ The above selfconsistency equation (9) defines the (finite) effective action (including
227
+ its coupling constants and mass ratios) without any reference to classical physics ex-
228
+ clusively via quantum principles encoded in the map 𝑓. The fixed points of the map
229
+ 𝑓 then describe physical reality. From out this perspective, the standard formulation
230
+ of quantum field theory represented by eq. (1) can roughly be understood as the first
231
+ step of an iterative solution of the nonlinear functional integro-differential equation
232
+ (9) by applying the map 𝑓 to some initial (in this case ‘classical’) action Γ0[𝜑]. For
233
+ the first time, the above equation (9) to be taken as basis of quantum field theory
234
+ has been proposed in 1972 by L. V. Prokhorov [14]. Not being aware of the earlier
235
+ work by Prokhorov, the same proposal has been made by the present author in 1993
236
+ [15]. In a somewhat different (Hamiltonian) setting (coupled cluster methods), J. S.
237
+ Arponen has expressed similar ideas in 1990 ([16], p. 173, paragraph starting with
238
+ the words: “The possible solution corresponds to a system which suffers no change
239
+ under quantization.”).
240
+ 3
241
+ Further discussion
242
+ Given the mature state of standard renormalizable quantum field theory, the above
243
+ point of view (defining the effective action as a fixed point of the map 𝑓) faces
244
+ myriads of objections. Some of them may be misunderstandings, others are com-
245
+ pletely justified concerns, others yet are possibly prejudices. Misunderstandings can
246
+ 6
247
+
248
+ be dealt with most easily – by clarifications. For example, one might ask: Given
249
+ the crucial role of radiative corrections within the standard formulation of quantum
250
+ field theory in correctly describing physical reality (for example, in QED) how could
251
+ one ever possibly think of a theory of physical reality characterized by the vanishing
252
+ of all radiative corrections (in an interacting theory)? The difficulty here, however,
253
+ is just a terminological one. Of course, also a modified formulation of quantum field
254
+ theory needs to deliver those kind of terms in the effective action we denote as ra-
255
+ diative corrections within the established standard approach. While the analytical
256
+ expression yielded from a modified formulation of quantum field theory may differ
257
+ from those within the standard formulation, the numerical results for experimentally
258
+ accessible quantities (e.g., the anomalous magnetic moment of the electron) need to
259
+ be (almost – within experimental limits) the same. The point is that in the modified
260
+ view of quantum field theory represented by eq. (9) those terms denoted in the stan-
261
+ dard formulation as radiative corrections are already incorporated in the action to
262
+ be quantized. But, as the action to be quantized is supposed to be invariant under
263
+ quantization (according to eq. (9)) no new terms may emerge, consequently, in the
264
+ modified formulation of quantum field theory no radiative corrections (relative to
265
+ the initial action to be quantized) occur.
266
+ Certainly, one elementary and justified concern with respect to eq. (9) consists in
267
+ the question of whether eq. (9) allows any non-trivial (i.e., non-Gaussian) solutions
268
+ (Free field theories, of course, always obey eq. (9).). In fact, it has been shown by
269
+ example in a finite-dimensional Grassmann algebra analogue of eq. (9) (i.e., within
270
+ a fermionic zero-dimensional field theory) that eq. (9) has exact non-trivial (i.e.,
271
+ non-Gaussian) solutions [17]. For an (bosonic) example from standard analysis see
272
+ [18]. Of course, as has been pointed out by Prokhorov [14] from the outset eq. (9)
273
+ represents a very complicated equation and presently very little can be said about
274
+ its eventual non-trivial solutions in general. Experience from effective action studies
275
+ in quantum field theory tells us that non-trivial solutions of eq. (9) can be expected
276
+ to be nonlocal and nonpolynomial functionals of fields. Whether these nonlocal and
277
+ nonpolynomial actions Γ solving eq. (9) preserve unitarity and causality can only be
278
+ decided once they are found. However, it has been shown for a wide class of nonlo-
279
+ cal and nonpolynomial (scalar) quantum field theories in the past [19, 20] that they
280
+ respect these two principles – a fact, from which one may derive certain optimism.
281
+ It is of course conceivable that the general version of eq. (9) (written down for an
282
+ arbitrary but fixed collection of fluctuating fields) does not have any non-Gaussian
283
+ solution at all for the certain field content one has chosen. If this was the case the
284
+ existence of a non-Gaussian solution to the generalised version of eq. (9) could be
285
+ applied as a theory selection criterion perhaps in the same way as the (stationary)
286
+ Schrödinger equation selects energy (eigen)values of quantum mechanical systems.
287
+ In a certain sense, at the end of the day only non-Gaussian solutions of eq. (9) are
288
+ physical ones because only they provide the interactions for the structures we ob-
289
+ serve in physical reality. Away from the rigid concept discussed above of the effective
290
+ action as a fixed point of the map 𝑓 non-Gaussian solutions of eq. (9) may be con-
291
+ 7
292
+
293
+ sidered also interesting within the standard lore. While usually perturbation theory
294
+ is built around a Gaussian solution of eq. (9), choosing a non-Gaussian solution of
295
+ eq. (9) as starting point for perturbation theory may also be of some interest. For
296
+ a discussion in this direction see [21].
297
+ From a methodological point of view, the largest difference of the approach rep-
298
+ resented by eq. (9) to the established approach in standard quantum field theory
299
+ consists in the following. Standard local renormalizable quantum field theory starts
300
+ (among other things, e.g., choosing the space-time dimensionality) with the choice
301
+ of the field content of the theory under consideration and the functional form of the
302
+ (classical/bare) action Γ0 (cf. eq. (1)), a quantity which, in principle, is unobservable
303
+ (due to the existence of radiative corrections). This is also true in the different ver-
304
+ sions of the Wilsonian approach to quantum field theory (inspired by the theory of
305
+ phase transitions in statistical mechanics). While in a statistical mechanical system
306
+ (e.g., a spin system modelling a certain microscopic condensed matter structure) the
307
+ structure of the Hamiltonian defined on a lattice with fixed lattice spacing can in
308
+ principle be linked to experimental data, this is not the case within quantum field
309
+ theory where the bare action is not related to observation (For a related discussion
310
+ see, e.g., [22].). Consequently, in the established standard approach to quantum
311
+ field theory the theoretical description of physical reality (i.e., the effective action
312
+ Γ) is inferred from quantities not accessible to experiment in principle. In contrast,
313
+ within the approach represented by eq. (9) only the field content of the quantum
314
+ fluctuations can be chosen, the functional form of the effective action Γ is selfcon-
315
+ sistently restricted by its property to be a solution of this equation. Beyond free
316
+ field theories, i.e., for non-Gaussian solutions of eq. (9), this can be expected to be
317
+ highly restrictive.
318
+ Acknowledgement
319
+ Kind hospitality at the Department of Physics and Astronomy of the Vrije Univer-
320
+ siteit Amsterdam is gratefully acknowledged.
321
+ 8
322
+
323
+ References
324
+ [1] J. F. Donoghue, E. Golowich, B. R. Holstein:
325
+ Dynamics of the Standard
326
+ Model. 1. ed.: Cambridge Monographs on Particle Physics, Nuclear Physics
327
+ and Cosmology, Vol. 2. Cambridge University Press, Cambridge, 1992 (DOI:
328
+ 10.1017/CBO9780511524370); 2. ed.:
329
+ Cambridge Monographs on Particle
330
+ Physics, Nuclear Physics and Cosmology, Vol. 35. Cambridge University Press,
331
+ Cambridge, 2014 (DOI: 10.1017/CBO9780511524370).
332
+ [2] P. Mohr, B. Taylor: Tests of fundamental physics. In: G. W. F. Drake (Ed.):
333
+ Springer Handbook of Atomic, Molecular, and Optical Physics. Springer-Verlag,
334
+ New York, NY, 2006, pp. 429-447 (DOI: 10.1007/978-0-387-26308-3_28).
335
+ [3] T. Kinoshita (Ed.): Quantum Electrodynamics. World Scientific, Singapore,
336
+ 1990. Advanced Series on Directions in High Energy Physics, Vol. 7. (DOI:
337
+ 10.1142/0495).
338
+ [4] Tian Yu Cao (Ed.): Conceptual Foundations of Quantum Field Theory. Cam-
339
+ bridge University Press, Cambridge, 1999, 2004, 2009
340
+ (DOI: 10.1017/CBO9780511470813).
341
+ [5] D. Poland, L. Rastelli: Snowmass Topical Summary: Formal QFT. To ap-
342
+ pear in the Proceedings of the US Community Study on the Future of Par-
343
+ ticle Physics (Snowmass 2021). [arXiv:2210.03128 (https://arxiv.org/
344
+ abs/2210.03128)].
345
+ [6] R. P. Feynman: The development of the space-time view of quantum electrody-
346
+ namics. Science 153:3737(1966)699-708 (DOI: 10.1126/science.153.3737.699);
347
+ Physics
348
+ Today
349
+ 19:8(1966)31-44
350
+ (DOI:
351
+ 10.1063/1.3048404).
352
+ The
353
+ text
354
+ is
355
+ freely available online at the Nobel Foundation URL: http://nobelprize.
356
+ org/nobel_prizes/physics/laureates/1965/feynman-lecture.html. Also
357
+ printed in: 1. Nobelstiftelsen (Nobel Foundation): Les Prix Nobel en 1965.
358
+ Almqvist & Wiksell International, Stockholm, 1966, pp. 172-191. 2. No-
359
+ belstiftelsen (Nobel Foundation):
360
+ Nobel Lectures, Including Presentation
361
+ Speeches and Laureates’ Biographies: Physics, 1963-1970. Elsevier, Amster-
362
+ dam, 1972, pp. 155-178. Reprinted: World Scientific Publishing, Singapore,
363
+ 1998 (DOI: 10.1142/3729). 3. Laurie M. Brown (Ed.):
364
+ Selected Papers of
365
+ Richard Feynman, with Commentary. World Scientific Series in 20th Century
366
+ Physics, Vol. 27. World Scientific Publishing, Singapore, 2000, pp. 9-32 (DOI:
367
+ 9789812385468_0002).
368
+ [7] R. P. Feynman: QED – The Strange Theory of Light and Matter. Alix G.
369
+ Mautner Memorial Lectures. Princeton University Press, Princeton, NJ, 1985,
370
+ 1988; Penguin Books, London, 1985, 1990, 2008; expanded 2. ed., Princeton
371
+ Science Library, 2006, 2013, 2014.
372
+ 9
373
+
374
+ [8] P. A. M. Dirac: Directions in Physics. John Wiley & Sons, New York, 1978.
375
+ [9] P. A. M. Dirac: The origin of quantum field theory. In: L. M. Brown, L.
376
+ Hoddeson (Eds.): The Birth of Particle Physics. Cambridge University Press,
377
+ Cambridge, 1983, pp. 39-55.
378
+ [10] K. von Meyenn (Ed.): Wolfgang Pauli. Wissenschaftlicher Briefwechsel mit
379
+ Bohr, Einstein, Heisenberg u.a.. Band III: 1940-1949. Scientific Correspon-
380
+ dence with Bohr, Einstein, Heisenberg a.o.. Volume III: 1940-1949. Sources in
381
+ the History of Mathematics and Physical Sciences, Vol. 11. Springer-Verlag,
382
+ Berlin, 1993, 2014 (DOI: 10.1007/978-3-540-78802-7).
383
+ [11] Л. Д. Фаддеев [L. D. Faddeev], А. А. Славнов [A. A. Slavnov]: Введение
384
+ в квантовую теорию калибровочных полей [Vvedenie v kvantovuyu teoriyu
385
+ kalibrovochnykh pole˘ı]. Наука [Nauka], Moscow, 1. ed.: 1978, 2. rev. & ext. ed.:
386
+ 1988; УРСС [URSS], Moscow, 2022. [in Russian] English translation: Gauge
387
+ Fields: Introduction to Quantum Theory. Frontiers in Physics, 1. ed.: Vol. 50,
388
+ 2nd rev. & ext. ed., Vol. 83. 1. ed.: Benjamin/Cummings Publ., Reading, MA,
389
+ 1980, 2nd rev. & ext. ed.: Addison-Wesley, Redwood City, CA, 1990; Westview
390
+ Press, Boulder, CO, 1991; CRC Press, Boca Raton, FL, 2018, 2019 (DOI:
391
+ 10.1201/9780429493829).
392
+ [12] A. Jevicki, C. Lee: The S-matrix generating functional and effective action.
393
+ Physical Review D 37:6(1988)1485-1491 (DOI: 10.1103/PhysRevD.37.1485)
394
+ [Brown University report BROWN-HET-634].
395
+ [13] C. Itzykson, J.-B. Zuber: Quantum field theory. International Series in Pure
396
+ and Applied Physics. McGraw-Hill, New York, 1980, 1985, 1986, 1987, 1988,
397
+ 1990. Reprint: Dover Books on Physics. Dover Publications, Mineola, NY, 2005,
398
+ 2006, 2012.
399
+ [14] Л. В. Прохоров [L. V. Prokhorov]: Уравнения для эффективных лагранжи-
400
+ анов [Uravneniya dlya èffektivnykh lagranzhianov]. Ядерная Физика [Yader-
401
+ naya Fizika] 16:4(1972)854-862. [in Russian] English translation: Equations for
402
+ effective Lagrangians. Soviet Journal of Nuclear Physics 16:4(1973)473-477.
403
+ [15] K. Scharnhorst: Functional integral equation for the complete effective ac-
404
+ tion in quantum field theory. International Journal of Theoretical Physics
405
+ 36:2(1997)281-343 (DOI: 10.1007/BF02435737)
406
+ [University of Leipzig report NTZ-16-1993, arXiv:hep-th/9312137 (https:
407
+ //arxiv.org/abs/hep-th/9312137)].
408
+ [16] J. S. Arponen: Independent-cluster methods as mappings of quantum theory
409
+ into classical mechanics. Theoretica Chimica Acta 80:2-3(1991)149-179 (DOI:
410
+ 10.1007/BF01119618) [University of Helsinki report HU-TFT-90-75].
411
+ 10
412
+
413
+ [17] K. Scharnhorst:
414
+ A Grassmann integral equation. Journal of Mathematical
415
+ Physics 44:11(2003)5415-5449 (DOI: 10.1063/1.1612896, errata sheet at the
416
+ URL: http://www.nat.vu.nl/~scharnh/mea30.pdf)
417
+ [arXiv:math-ph/0206006 (https://arxiv.org/abs/math-ph/0206006)].
418
+ [18] B. Pioline: Cubic free field theory. In: L. Baulieu, E. Rabinovici, J. Harvey,
419
+ B. Pioline, P. Windey (Eds.): Progress in String, Field and Particle Theory.
420
+ Proceedings of the NATO Advanced Study Institute, Cargèse, Corsica, France,
421
+ May 27-June 8, 2002. NATO Science Series II: Mathematics, Physics and Chem-
422
+ istry, Vol. 104. Kluwer Academic Publishers, Dordrecht, 2003, pp. 453-456
423
+ (DOI: 0.1007/978-94-010-0211-0_37) [LPTHE Paris preprint LPTHE-P03-01,
424
+ arXiv:hep-th/0302043 (https://arxiv.org/abs/hep-th/0302043)].
425
+ [19] V. A. Alebastrov, G. V. Efimov:
426
+ A proof of the unitarity of S-matrix in
427
+ a nonlocal quantum field theory. Communications in Mathematical Physics
428
+ 31:1(1973)1-24 (DOI: 10.1007/BF01645588,
429
+ the article is freely available online from the Project Euclid website:
430
+ http://projecteuclid.org/euclid.cmp/1103858926)
431
+ [Institute of Theoretical Physics, Kiev, report ИТФ-72-110Р [ITF-72-110R] [in
432
+ Russian]].
433
+ [20] V. A. Alebastrov, G. V. Efimov: Causality in quantum field theory with non-
434
+ local interaction. Communications in Mathematical Physics 38:1(1974)11-28
435
+ (DOI: 10.1007/BF01651546,
436
+ the article is freely available online from the Project Euclid website:
437
+ http://projecteuclid.org/euclid.cmp/1103859964)
438
+ [Joint Institute of Nuclear Resarch, Dubna, report Р2-7572 [R2-7572] [in Rus-
439
+ sian]].
440
+ [21] T. Kühn, M. Helias: Expansion of the effective action around non-Gaussian the-
441
+ ories. Journal of Physics A: Mathematical and Theoretical 51:37(2018)375004,
442
+ 35 pp. (DOI: 10.1088/1751-8121/aad52e), erratum ibid. 51:45(2018)459502, 1
443
+ p. (DOI: 10.1088/1751-8121/aae1d7) [arXiv:1711.05599 (https://arxiv.
444
+ org/abs/1711.05599)].
445
+ [22] J. Rosaler, R. Harlander: Naturalness, Wilsonian renormalization, and “fun-
446
+ damental parameters” in quantum field theory. Studies in History and Philos-
447
+ ophy of Modern Physics 66(2019)118-134 (DOI: 10.1016/j.shpsb.2018.12.003)
448
+ [RWTH Aachen report TTK-19-04, ELHC research group report ELHC_2018-
449
+ 005, arXiv:1809.09489 (https://arxiv.org/abs/1809.09489)].
450
+ 11
451
+
CdFQT4oBgHgl3EQfOTbk/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,484 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf,len=483
2
+ page_content='On selfconsistency in quantum field theory K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
3
+ page_content=' Scharnhorst† Vrije Universiteit Amsterdam, Faculty of Sciences, Department of Physics and Astronomy, De Boelelaan 1081, 1081 HV Amsterdam, The Netherlands Abstract A bootstrap approach to the effective action in quantum field theory is dis- cussed which entails the invariance under quantum fluctuations of the effective action describing physical reality (via the S-matrix).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
4
+ page_content=' †E-mail: k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
5
+ page_content='scharnhorst@vu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
6
+ page_content='nl, ORCID: http://orcid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
7
+ page_content='org/0000-0003-3355-9663 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
8
+ page_content='13275v1 [hep-th] 30 Jan 2023 1 Introduction These are times of contemplation and reorientation in quantum field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
9
+ page_content=' With the experimental detection of the Higgs boson in 2012 finally the finishing stone of the Standard Model of elementary particle physics [1] surfaced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
10
+ page_content=' On the theoretical side, the Standard Model is based on the concept of renormalized local quantum field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
11
+ page_content=' The confidence in this concept originally and primarily relies on the extraor- dinary success of the centerpiece of the Standard Model, quantum electrodynamics (QED), which exhibits an impressive agreement between theory and experiment (Cf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
12
+ page_content=', e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
13
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
14
+ page_content=', [2], for more comprehensive reviews see [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
15
+ page_content=').' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
16
+ page_content=' The successful application of renormalized local quantum field theory to the other components of the Standard Model, the electroweak theory and to quantum chromodynamics (QCD), have fur- ther advanced this confidence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
17
+ page_content=' On the other hand, many practicing quantum field theorists are aware of the many shortcomings and deficiencies of the concept of renor- malized local quantum field theory which, by the way, has changed and developed in a multifold way in the decades since its birth at the end of the 1940’s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
18
+ page_content=' To name a few of these issues we mention here the occurrence of ultraviolet (UV) divergencies, the cosmological constant problem, hierarchy and naturalness problems, Haag’s theo- rem (For an instructive illustration of the views of a number of well-known quantum field theorist see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
19
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
20
+ page_content=', the conference volume [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
21
+ page_content=').' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
22
+ page_content=' It should, however, be pointed out that in the quantum field theory community there is no unified view which of these issues constitute features and which are problematic aspects of renormalized local quantum field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
23
+ page_content=' Correspondingly, opinions on which direction should be chosen for the future conceptual and technical development of quantum field theory are diverse (For a recent account of the current situation see [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
24
+ page_content=').' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
25
+ page_content=' While many active researchers might favour new ideas which have not been discussed in the past a certain fraction of the quantum field theory community might be willing to not completely disregard past ideas which have largely been bypassed so far.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
26
+ page_content=' In the present article, it is our intention to bring together a couple of thoughts and ideas (supplemented by the corresponding references) that have emerged in the past.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
27
+ page_content=' We hope that the collection of this information in a single place will be beneficial to those readers who consider voices from the past as an inspiration for future research rather than purely as a matter for historians of science.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
28
+ page_content=' Let us start with pointing out that with reference to the UV divergency prob- lem in QED some of the very fathers of this theory have repeatedly expressed their dissatisfaction with their own creation up to the end of their lives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
29
+ page_content=' So, Richard Feynman stated 1965 in his Nobel Prize speech quite frankly : “.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
30
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
31
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
32
+ page_content=' , I believe there is really no satisfactory quantum electrodynamics, but I’m not sure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
33
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
34
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
35
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
36
+ page_content=' , I think that the renormalization theory is simply a way to sweep the difficulties of the di- vergences of electrodynamics under the rug.” ([6], Science p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
37
+ page_content=' 707, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
38
+ page_content=' Today pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
39
+ page_content=' 43/44, Prix Nobel p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
40
+ page_content=' 189, Nobel Lectures p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
41
+ page_content=' 176, Selected Papers p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
42
+ page_content=' 30).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
43
+ page_content=' Now one might think that Feynman has later, after the development of the Wilsonian view on renormalization in the early 1970’s and the emergence of the effective field theory 2 concept changed his view.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
44
+ page_content=' However, this seems not to be the case and one can read in Feynman’s popular science book “QED – The Strange Theory of Light and Mat- ter” the passage (𝑛 and 𝑗 are the bare counter parts of the physical electron mass 𝑚 and electron charge 𝑒, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
45
+ page_content=' ): “The shell game that we play to find 𝑛 and 𝑗 is technically called “renormalization.” But no matter how clever the word, it is what I would call a dippy process!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
46
+ page_content=' Having to resort to such hocus-pocus has prevented us from proving that the theory of quantum electrodynamics is mathematically self- consistent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
47
+ page_content=' It’s surprising that the theory still hasn’t been proved self-consistent one way or the other by now;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
48
+ page_content=' I suspect that renormalization is not mathematically legitimate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
49
+ page_content=' What is certain is that we do not have a good mathematical way to describe the theory of quantum electrodynamics: such a bunch of words to describe the connection between 𝑛 and 𝑗 and 𝑚 and 𝑒 is not good mathematics.” ([7], 1st ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
50
+ page_content=' 1985, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
51
+ page_content=' 128/129, 2nd ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
52
+ page_content=' 2006, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
53
+ page_content=' 127/128).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
54
+ page_content=' In a similar way Paul Dirac stated in a lecture in 1975 (published 1978): “Hence most physicists are very satisfied with the situation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
55
+ page_content=' They say: “Quantum electrodynamics is a good theory, and we do not have to worry about it any more.” I must say that I am very dissatisfied with the situation, because this so called “good theory” does involve neglecting infinities which appear in its equations, neglecting them in an arbitrary way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
56
+ page_content=' This is just not sensible mathematics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
57
+ page_content=' Sensible mathematics involves neglecting a quantity when it turns out to be small – not neglecting it just because it is infinitely great and you do not want it.” ([8], p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
58
+ page_content=' 36).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
59
+ page_content=' Few years later, in 1980 (published in 1983), Dirac repeats his critical view: “Some new relativistic equations are needed;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
60
+ page_content=' new kinds of interac- tions must be brought into play.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
61
+ page_content=' When these new equations and new interactions are thought out, the problems that are now bewildering to us will get automatically explained, and we should no longer have to make use of such illogical processes as infinite renormalization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
62
+ page_content=' This is quite nonsense physically, and I have always been opposed to it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
63
+ page_content=' It is just a rule of thumb that gives results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
64
+ page_content=' In spite of its successes, one should be prepared to abandon it completely and look on all the successes that have been obtained by using the usual forms of quantum electrodynamics with the infinities removed by artificial processes as just accidents when they give the right answers, in the same way as the successes of the Bohr theory are considered merely as accidents when they turn out to be correct.” ([9], p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
65
+ page_content=' 55).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
66
+ page_content=' The weight one might be tempted to assign to these views certainly will depend on the scientific taste of each theoretician, however, at least one should take note of them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
67
+ page_content=' It often happens in the course of the development of science that early consid- erations and ideas are more fundamental than those emerging later.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
68
+ page_content=' This is easily explainable by the fact that at the early stages of the development of a subject one enters largely unchartered territory and simple and structural ideas are then needed to choose the right road to scientific progress.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
69
+ page_content=' Sometimes conflicting ideas are competing with each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
70
+ page_content=' Initial dominance of one idea does not necessarily mean that less successful concepts should be written off.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
71
+ page_content=' It happens from time to time that these disregarded concepts make a surprising return for one reason or the other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
72
+ page_content=' Consequently, a look into the past (science history) may be helpful for 3 shaping the future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
73
+ page_content=' For the following considerations, we will depart from such an element of science history.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
74
+ page_content=' 2 Extending early thoughts of Wolfgang Pauli Let us start our concrete discussion with a statement made by Wolfgang Pauli in a private letter (in German) to Victor Weisskopf (by then, assistant to Wolfgang Pauli at the ETH Zurich) in 1935.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
75
+ page_content=' The comment of Wolfgang Pauli concerns the self-energy of the electron in QED, a theory which was under development in those days.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
76
+ page_content=' In the context of the struggle with the UV divergencies of QED Wolfgang Pauli expresses the following conviction (English translation in brackets: K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
77
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
78
+ page_content='): “.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
79
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
80
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
81
+ page_content=' (Ich glaube allerdings, daß in einer vernünftigen Theorie die Selbstenergie nicht nur endlich, sondern Null sein muß .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
82
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
83
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
84
+ page_content=' [.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
85
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
86
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
87
+ page_content=' (However, I believe that in a sensible the- ory the self-energy has not only to be finite but zero .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
88
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
89
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
90
+ page_content=' ]” ([10], p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
91
+ page_content=' 779 of: Letter [425b] of December 14, 1935 from Pauli to Weisskopf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
92
+ page_content=' Part of: Nachtrag zu Band I: 1919–1929 und II: 1930–1939, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
93
+ page_content=' 733-826).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
94
+ page_content=' How can we understand this expec- tation of a future correct quantum electrodynamical theory expressed by Wolfgang Pauli?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
95
+ page_content=' If one starts quantizing the theory (in this case, charged fermions interacting with the electromagnetic field) on the basis of a Lagrangian with the physical (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
96
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
97
+ page_content=', measured) value of the mass of the fermions inserted all physical processes that can conceivably have an impact on that mass have effectively been taken into account already.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
98
+ page_content=' Consequently, the total impact of all physical processes taken into account in the (theoretical) process of quantization (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
99
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
100
+ page_content=', taking into account quantum fluc- tuations) on the mass of these fermions should vanish (nonrenormalization).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
101
+ page_content=' This statement can be reformulated by saying that the fermion mass should not receive any radiative corrections under quantization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
102
+ page_content=' One can now extend this early point of view of Wolfgang Pauli and consider starting quantization not only with the physical value of the fermion mass in the initial Lagrangian but choosing as initial Lagrangian (in an arbitrary theory now) the (effective) Lagrangian which describes the physi- cal world (with all its – infinitely many – nonlocal and nonpolynomial terms).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
103
+ page_content=' In principle (in theory, not in practice, of course), this can be read off from scattering experiments (For the connection between the scattering matrix and the effective action see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
104
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
105
+ page_content=', [11], sec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
106
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
107
+ page_content='4, [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
108
+ page_content=').' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
109
+ page_content=' If one now starts the process of quantization with this “true” Lagrangian all radiative corrections to it should vanish because any quantum fluctuations described by this Lagrangian have already been taken into ac- count in this Lagrangian.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
110
+ page_content=' Consequently, the physical (effective) Lagrangian should be invariant under the process of quantization, all radiative corrections should van- ish.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
111
+ page_content=' This view of the process of quantization amounts to bootstrapping the effective action of a theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
112
+ page_content=' Quantities denoted within standard local renormalizable quan- tum field theory as bare and renormalized ones, respectively, then coincide.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
113
+ page_content=' Before continuing our verbal discussion, let us make the above statements more 4 precise in terms of equations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
114
+ page_content=' We consider within a path integral framework La- grangian quantum field theory in flat (𝑛-dimensional Minkowski) space-time and a (one-component) scalar field theory to pursue the discussion (for the following equations cf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
115
+ page_content=', e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
116
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
117
+ page_content=', [13], chap.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
118
+ page_content=' 9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
119
+ page_content=' A generalization to more complicated theories is straightforward.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
120
+ page_content=' The generating functional of Green functions of the scalar field 𝜑(𝑥) is given by the equation 𝑍[𝐽] = 𝐶 ∫︁ 𝐷𝜑 e 𝑖Γ0[𝜑] + 𝑖 ∫︁ 𝑑𝑛𝑥 𝐽(𝑥)𝜑(𝑥) , (1) where Γ0[𝜑] is the so-called classical action of the theory and 𝐶 some fixed normal- ization constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
121
+ page_content=' Then, the generating functional of the connected Green functions is 𝑊[𝐽] = −𝑖 ln 𝑍[𝐽] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
122
+ page_content=' (2) The effective action Γ[¯𝜑], which also is the generating functional of the one-particle- irreducible (1PI) Green functions, is obtained as the first Legendre transform of 𝑊[𝐽], Γ[¯𝜑] = 𝑊[𝐽] − ∫︁ 𝑑𝑛𝑥 𝐽(𝑥)¯𝜑(𝑥) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
123
+ page_content=' (3) Here ¯𝜑(𝑥) = 𝛿𝑊[𝐽] 𝛿𝐽(𝑥) (4) which in turn leads to 𝛿Γ[¯𝜑] 𝛿 ¯𝜑(𝑥) = − 𝐽(𝑥) (5) in analogy to the classical field equation for Γ0[𝜑].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
124
+ page_content=' Equivalently, using the above expressions e 𝑖Γ[¯𝜑] = 𝐶 ∫︁ 𝐷𝜑 e 𝑖Γ0[𝜑 + ¯𝜑] + 𝑖 ∫︁ 𝑑𝑛𝑥 𝐽(𝑥)𝜑(𝑥) (6) can be considered as the defining relation for the effective action, where the r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
125
+ page_content='h.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
126
+ page_content='s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
127
+ page_content=' of the above equation has to be calculated using a current 𝐽(𝑥), given by Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
128
+ page_content=' (5), which is a functional of ¯𝜑.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
129
+ page_content=' Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
130
+ page_content=' (1) defines a map, 𝑔1 : Γ0[𝜑] −→ 𝑍[𝐽], from the class of functionals called classical actions to the class of functionals 𝑍.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
131
+ page_content=' Furthermore, we have mappings, 𝑔2 : 𝑍[𝐽] −→ 𝑊[𝐽], (Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
132
+ page_content=' (2)) and 𝑔3 : 𝑊[𝐽] −→ Γ[¯𝜑] (Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
133
+ page_content=' (3)).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
134
+ page_content=' These three maps together define a map 𝑔3 ∘ 𝑔2 ∘ 𝑔1 = 𝑓 : Γ0[𝜑] −→ Γ[¯𝜑] (Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
135
+ page_content=' (6)) from the set of so-called classical actions to the set of effective actions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
136
+ page_content=' It is understood that in order to properly define the map a regularization scheme for the scalar field theory is applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
137
+ page_content=' Up to renormalization effects, the classical action Γ0[𝜑] determines the effective action Γ[¯𝜑] uniquely via the map 𝑓 which encodes quantum 5 principles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
138
+ page_content=' In this standard scheme, the (quantum) effective action is built directly from classical physics and exhibits no independence in its own right.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
139
+ page_content=' The terms of the difference ∆Γ[¯𝜑] = Γ[¯𝜑] − Γ0[¯𝜑] are denoted as ’radiative correc- tions’.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
140
+ page_content=' The above verbal reasoning in generalization of early thoughts of Wolfgang Pauli leads to the equation ∆Γ[¯𝜑] = 0 , (7) expressing the vanishing of all radiative corrections, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
141
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
142
+ page_content=', Γ[¯𝜑] = Γ0[¯𝜑] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
143
+ page_content=' (8) The equation for the complete effective action which is equivalent to the fixed point condition for the map 𝑓 reads (𝐶′ is some normalization constant) e 𝑖Γ[¯𝜑] = 𝐶′ ∫︁ 𝐷𝜑 e 𝑖Γ[𝜑 + ¯𝜑] + 𝑖 ∫︁ 𝑑𝑛𝑥 𝐽(𝑥)𝜑(𝑥) , (9) where 𝐽(𝑥) = − 𝛿Γ[¯𝜑] 𝛿 ¯𝜑(𝑥) .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
144
+ page_content=' (10) The above selfconsistency equation (9) defines the (finite) effective action (including its coupling constants and mass ratios) without any reference to classical physics ex- clusively via quantum principles encoded in the map 𝑓.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
145
+ page_content=' The fixed points of the map 𝑓 then describe physical reality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
146
+ page_content=' From out this perspective, the standard formulation of quantum field theory represented by eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
147
+ page_content=' (1) can roughly be understood as the first step of an iterative solution of the nonlinear functional integro-differential equation (9) by applying the map 𝑓 to some initial (in this case ‘classical’) action Γ0[𝜑].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
148
+ page_content=' For the first time, the above equation (9) to be taken as basis of quantum field theory has been proposed in 1972 by L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
149
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
150
+ page_content=' Prokhorov [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
151
+ page_content=' Not being aware of the earlier work by Prokhorov, the same proposal has been made by the present author in 1993 [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
152
+ page_content=' In a somewhat different (Hamiltonian) setting (coupled cluster methods), J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
153
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
154
+ page_content=' Arponen has expressed similar ideas in 1990 ([16], p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
155
+ page_content=' 173, paragraph starting with the words: “The possible solution corresponds to a system which suffers no change under quantization.”).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
156
+ page_content=' 3 Further discussion Given the mature state of standard renormalizable quantum field theory, the above point of view (defining the effective action as a fixed point of the map 𝑓) faces myriads of objections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
157
+ page_content=' Some of them may be misunderstandings, others are com- pletely justified concerns, others yet are possibly prejudices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
158
+ page_content=' Misunderstandings can 6 be dealt with most easily – by clarifications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
159
+ page_content=' For example, one might ask: Given the crucial role of radiative corrections within the standard formulation of quantum field theory in correctly describing physical reality (for example, in QED) how could one ever possibly think of a theory of physical reality characterized by the vanishing of all radiative corrections (in an interacting theory)?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
160
+ page_content=' The difficulty here, however, is just a terminological one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
161
+ page_content=' Of course, also a modified formulation of quantum field theory needs to deliver those kind of terms in the effective action we denote as ra- diative corrections within the established standard approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
162
+ page_content=' While the analytical expression yielded from a modified formulation of quantum field theory may differ from those within the standard formulation, the numerical results for experimentally accessible quantities (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
163
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
164
+ page_content=', the anomalous magnetic moment of the electron) need to be (almost – within experimental limits) the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
165
+ page_content=' The point is that in the modified view of quantum field theory represented by eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
166
+ page_content=' (9) those terms denoted in the stan- dard formulation as radiative corrections are already incorporated in the action to be quantized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
167
+ page_content=' But, as the action to be quantized is supposed to be invariant under quantization (according to eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
168
+ page_content=' (9)) no new terms may emerge, consequently, in the modified formulation of quantum field theory no radiative corrections (relative to the initial action to be quantized) occur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
169
+ page_content=' Certainly, one elementary and justified concern with respect to eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
170
+ page_content=' (9) consists in the question of whether eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
171
+ page_content=' (9) allows any non-trivial (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
172
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
173
+ page_content=', non-Gaussian) solutions (Free field theories, of course, always obey eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
174
+ page_content=' (9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
175
+ page_content=').' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
176
+ page_content=' In fact, it has been shown by example in a finite-dimensional Grassmann algebra analogue of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
177
+ page_content=' (9) (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
178
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
179
+ page_content=', within a fermionic zero-dimensional field theory) that eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
180
+ page_content=' (9) has exact non-trivial (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
181
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
182
+ page_content=', non-Gaussian) solutions [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
183
+ page_content=' For an (bosonic) example from standard analysis see [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
184
+ page_content=' Of course, as has been pointed out by Prokhorov [14] from the outset eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
185
+ page_content=' (9) represents a very complicated equation and presently very little can be said about its eventual non-trivial solutions in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
186
+ page_content=' Experience from effective action studies in quantum field theory tells us that non-trivial solutions of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
187
+ page_content=' (9) can be expected to be nonlocal and nonpolynomial functionals of fields.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
188
+ page_content=' Whether these nonlocal and nonpolynomial actions Γ solving eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
189
+ page_content=' (9) preserve unitarity and causality can only be decided once they are found.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
190
+ page_content=' However, it has been shown for a wide class of nonlo- cal and nonpolynomial (scalar) quantum field theories in the past [19, 20] that they respect these two principles – a fact, from which one may derive certain optimism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
191
+ page_content=' It is of course conceivable that the general version of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
192
+ page_content=' (9) (written down for an arbitrary but fixed collection of fluctuating fields) does not have any non-Gaussian solution at all for the certain field content one has chosen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
193
+ page_content=' If this was the case the existence of a non-Gaussian solution to the generalised version of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
194
+ page_content=' (9) could be applied as a theory selection criterion perhaps in the same way as the (stationary) Schrödinger equation selects energy (eigen)values of quantum mechanical systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
195
+ page_content=' In a certain sense, at the end of the day only non-Gaussian solutions of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
196
+ page_content=' (9) are physical ones because only they provide the interactions for the structures we ob- serve in physical reality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
197
+ page_content=' Away from the rigid concept discussed above of the effective action as a fixed point of the map 𝑓 non-Gaussian solutions of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
198
+ page_content=' (9) may be con- 7 sidered also interesting within the standard lore.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
199
+ page_content=' While usually perturbation theory is built around a Gaussian solution of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
200
+ page_content=' (9), choosing a non-Gaussian solution of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
201
+ page_content=' (9) as starting point for perturbation theory may also be of some interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
202
+ page_content=' For a discussion in this direction see [21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
203
+ page_content=' From a methodological point of view, the largest difference of the approach rep- resented by eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
204
+ page_content=' (9) to the established approach in standard quantum field theory consists in the following.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
205
+ page_content=' Standard local renormalizable quantum field theory starts (among other things, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
206
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
207
+ page_content=', choosing the space-time dimensionality) with the choice of the field content of the theory under consideration and the functional form of the (classical/bare) action Γ0 (cf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
208
+ page_content=' eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
209
+ page_content=' (1)), a quantity which, in principle, is unobservable (due to the existence of radiative corrections).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
210
+ page_content=' This is also true in the different ver- sions of the Wilsonian approach to quantum field theory (inspired by the theory of phase transitions in statistical mechanics).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
211
+ page_content=' While in a statistical mechanical system (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
212
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
213
+ page_content=', a spin system modelling a certain microscopic condensed matter structure) the structure of the Hamiltonian defined on a lattice with fixed lattice spacing can in principle be linked to experimental data, this is not the case within quantum field theory where the bare action is not related to observation (For a related discussion see, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
214
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
215
+ page_content=', [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
216
+ page_content=').' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
217
+ page_content=' Consequently, in the established standard approach to quantum field theory the theoretical description of physical reality (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
218
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
219
+ page_content=', the effective action Γ) is inferred from quantities not accessible to experiment in principle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
220
+ page_content=' In contrast, within the approach represented by eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
221
+ page_content=' (9) only the field content of the quantum fluctuations can be chosen, the functional form of the effective action Γ is selfcon- sistently restricted by its property to be a solution of this equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
222
+ page_content=' Beyond free field theories, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
223
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
224
+ page_content=', for non-Gaussian solutions of eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
225
+ page_content=' (9), this can be expected to be highly restrictive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
226
+ page_content=' Acknowledgement Kind hospitality at the Department of Physics and Astronomy of the Vrije Univer- siteit Amsterdam is gratefully acknowledged.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
227
+ page_content=' 8 References [1] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
228
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
229
+ page_content=' Donoghue, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
230
+ page_content=' Golowich, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
231
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
232
+ page_content=' Holstein: Dynamics of the Standard Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
233
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
234
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
235
+ page_content=' : Cambridge Monographs on Particle Physics, Nuclear Physics and Cosmology, Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
236
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
237
+ page_content=' Cambridge University Press, Cambridge, 1992 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
238
+ page_content='1017/CBO9780511524370);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
239
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
240
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
241
+ page_content=' : Cambridge Monographs on Particle Physics, Nuclear Physics and Cosmology, Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
242
+ page_content=' 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
243
+ page_content=' Cambridge University Press, Cambridge, 2014 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
244
+ page_content='1017/CBO9780511524370).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
245
+ page_content=' [2] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
246
+ page_content=' Mohr, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
247
+ page_content=' Taylor: Tests of fundamental physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
248
+ page_content=' In: G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
249
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
250
+ page_content=' F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
251
+ page_content=' Drake (Ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
252
+ page_content=' ): Springer Handbook of Atomic, Molecular, and Optical Physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
253
+ page_content=' Springer-Verlag, New York, NY, 2006, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
254
+ page_content=' 429-447 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
255
+ page_content='1007/978-0-387-26308-3_28).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
256
+ page_content=' [3] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
257
+ page_content=' Kinoshita (Ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
258
+ page_content=' ): Quantum Electrodynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
259
+ page_content=' World Scientific, Singapore, 1990.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
260
+ page_content=' Advanced Series on Directions in High Energy Physics, Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
261
+ page_content=' 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
262
+ page_content=' (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
263
+ page_content='1142/0495).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
264
+ page_content=' [4] Tian Yu Cao (Ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
265
+ page_content=' ): Conceptual Foundations of Quantum Field Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
266
+ page_content=' Cam- bridge University Press, Cambridge, 1999, 2004, 2009 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
267
+ page_content='1017/CBO9780511470813).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
268
+ page_content=' [5] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
269
+ page_content=' Poland, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
270
+ page_content=' Rastelli: Snowmass Topical Summary: Formal QFT.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
271
+ page_content=' To ap- pear in the Proceedings of the US Community Study on the Future of Par- ticle Physics (Snowmass 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
272
+ page_content=' [arXiv:2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
273
+ page_content='03128 (https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
274
+ page_content='org/ abs/2210.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
275
+ page_content='03128)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
276
+ page_content=' [6] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
277
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
278
+ page_content=' Feynman: The development of the space-time view of quantum electrody- namics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
279
+ page_content=' Science 153:3737(1966)699-708 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
280
+ page_content='1126/science.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
281
+ page_content='153.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
282
+ page_content='3737.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
283
+ page_content='699);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
284
+ page_content=' Physics Today 19:8(1966)31-44 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
285
+ page_content='1063/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
286
+ page_content='3048404).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
287
+ page_content=' The text is freely available online at the Nobel Foundation URL: http://nobelprize.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
288
+ page_content=' org/nobel_prizes/physics/laureates/1965/feynman-lecture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
289
+ page_content='html.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
290
+ page_content=' Also printed in: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
291
+ page_content=' Nobelstiftelsen (Nobel Foundation): Les Prix Nobel en 1965.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
292
+ page_content=' Almqvist & Wiksell International, Stockholm, 1966, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
293
+ page_content=' 172-191.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
294
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
295
+ page_content=' No- belstiftelsen (Nobel Foundation): Nobel Lectures, Including Presentation Speeches and Laureates’ Biographies: Physics, 1963-1970.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
296
+ page_content=' Elsevier, Amster- dam, 1972, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
297
+ page_content=' 155-178.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
298
+ page_content=' Reprinted: World Scientific Publishing, Singapore, 1998 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
299
+ page_content='1142/3729).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
300
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
301
+ page_content=' Laurie M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
302
+ page_content=' Brown (Ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
303
+ page_content=' ): Selected Papers of Richard Feynman, with Commentary.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
304
+ page_content=' World Scientific Series in 20th Century Physics, Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
305
+ page_content=' 27.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
306
+ page_content=' World Scientific Publishing, Singapore, 2000, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
307
+ page_content=' 9-32 (DOI: 9789812385468_0002).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
308
+ page_content=' [7] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
309
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
310
+ page_content=' Feynman: QED – The Strange Theory of Light and Matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
311
+ page_content=' Alix G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
312
+ page_content=' Mautner Memorial Lectures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
313
+ page_content=' Princeton University Press, Princeton, NJ, 1985, 1988;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
314
+ page_content=' Penguin Books, London, 1985, 1990, 2008;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
315
+ page_content=' expanded 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
316
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
317
+ page_content=', Princeton Science Library, 2006, 2013, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
318
+ page_content=' 9 [8] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
319
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
320
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
321
+ page_content=' Dirac: Directions in Physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
322
+ page_content=' John Wiley & Sons, New York, 1978.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
323
+ page_content=' [9] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
324
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
325
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
326
+ page_content=' Dirac: The origin of quantum field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
327
+ page_content=' In: L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
328
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
329
+ page_content=' Brown, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
330
+ page_content=' Hoddeson (Eds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
331
+ page_content=' ): The Birth of Particle Physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
332
+ page_content=' Cambridge University Press, Cambridge, 1983, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
333
+ page_content=' 39-55.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
334
+ page_content=' [10] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
335
+ page_content=' von Meyenn (Ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
336
+ page_content=' ): Wolfgang Pauli.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
337
+ page_content=' Wissenschaftlicher Briefwechsel mit Bohr, Einstein, Heisenberg u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
338
+ page_content='a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
339
+ page_content='. Band III: 1940-1949.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
340
+ page_content=' Scientific Correspon- dence with Bohr, Einstein, Heisenberg a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
341
+ page_content='o.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
342
+ page_content='. Volume III: 1940-1949.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
343
+ page_content=' Sources in the History of Mathematics and Physical Sciences, Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
344
+ page_content=' 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
345
+ page_content=' Springer-Verlag, Berlin, 1993, 2014 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
346
+ page_content='1007/978-3-540-78802-7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
347
+ page_content=' [11] Л.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
348
+ page_content=' Д.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
349
+ page_content=' Фаддеев [L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
350
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
351
+ page_content=' Faddeev], А.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
352
+ page_content=' А.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
353
+ page_content=' Славнов [A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
354
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
355
+ page_content=' Slavnov]: Введение в квантовую теорию калибровочных полей [Vvedenie v kvantovuyu teoriyu kalibrovochnykh pole˘ı].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
356
+ page_content=' Наука [Nauka], Moscow, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
357
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
358
+ page_content=' : 1978, 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
359
+ page_content=' rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
360
+ page_content=' & ext.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
361
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
362
+ page_content=' : 1988;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
363
+ page_content=' УРСС [URSS], Moscow, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
364
+ page_content=' [in Russian] English translation: Gauge Fields: Introduction to Quantum Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
365
+ page_content=' Frontiers in Physics, 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
366
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
367
+ page_content=' : Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
368
+ page_content=' 50, 2nd rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
369
+ page_content=' & ext.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
370
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
371
+ page_content=', Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
372
+ page_content=' 83.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
373
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
374
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
375
+ page_content=' : Benjamin/Cummings Publ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
376
+ page_content=', Reading, MA, 1980, 2nd rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
377
+ page_content=' & ext.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
378
+ page_content=' ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
379
+ page_content=' : Addison-Wesley, Redwood City, CA, 1990;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
380
+ page_content=' Westview Press, Boulder, CO, 1991;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
381
+ page_content=' CRC Press, Boca Raton, FL, 2018, 2019 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
382
+ page_content='1201/9780429493829).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
383
+ page_content=' [12] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
384
+ page_content=' Jevicki, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
385
+ page_content=' Lee: The S-matrix generating functional and effective action.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
386
+ page_content=' Physical Review D 37:6(1988)1485-1491 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
387
+ page_content='1103/PhysRevD.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
388
+ page_content='37.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
389
+ page_content='1485) [Brown University report BROWN-HET-634].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
390
+ page_content=' [13] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
391
+ page_content=' Itzykson, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
392
+ page_content='-B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
393
+ page_content=' Zuber: Quantum field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
394
+ page_content=' International Series in Pure and Applied Physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
395
+ page_content=' McGraw-Hill, New York, 1980, 1985, 1986, 1987, 1988, 1990.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
396
+ page_content=' Reprint: Dover Books on Physics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
397
+ page_content=' Dover Publications, Mineola, NY, 2005, 2006, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
398
+ page_content=' [14] Л.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
399
+ page_content=' В.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
400
+ page_content=' Прохоров [L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
401
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
402
+ page_content=' Prokhorov]: Уравнения для эффективных лагранжи- анов [Uravneniya dlya èffektivnykh lagranzhianov].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
403
+ page_content=' Ядерная Физика [Yader- naya Fizika] 16:4(1972)854-862.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
404
+ page_content=' [in Russian] English translation: Equations for effective Lagrangians.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
405
+ page_content=' Soviet Journal of Nuclear Physics 16:4(1973)473-477.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
406
+ page_content=' [15] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
407
+ page_content=' Scharnhorst: Functional integral equation for the complete effective ac- tion in quantum field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
408
+ page_content=' International Journal of Theoretical Physics 36:2(1997)281-343 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
409
+ page_content='1007/BF02435737) [University of Leipzig report NTZ-16-1993, arXiv:hep-th/9312137 (https: //arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
410
+ page_content='org/abs/hep-th/9312137)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
411
+ page_content=' [16] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
412
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
413
+ page_content=' Arponen: Independent-cluster methods as mappings of quantum theory into classical mechanics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
414
+ page_content=' Theoretica Chimica Acta 80:2-3(1991)149-179 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
415
+ page_content='1007/BF01119618) [University of Helsinki report HU-TFT-90-75].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
416
+ page_content=' 10 [17] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
417
+ page_content=' Scharnhorst: A Grassmann integral equation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
418
+ page_content=' Journal of Mathematical Physics 44:11(2003)5415-5449 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
419
+ page_content='1063/1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
420
+ page_content='1612896, errata sheet at the URL: http://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
421
+ page_content='nat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
422
+ page_content='vu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
423
+ page_content='nl/~scharnh/mea30.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
424
+ page_content='pdf) [arXiv:math-ph/0206006 (https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
425
+ page_content='org/abs/math-ph/0206006)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
426
+ page_content=' [18] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
427
+ page_content=' Pioline: Cubic free field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
428
+ page_content=' In: L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
429
+ page_content=' Baulieu, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
430
+ page_content=' Rabinovici, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
431
+ page_content=' Harvey, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
432
+ page_content=' Pioline, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
433
+ page_content=' Windey (Eds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
434
+ page_content=' ): Progress in String, Field and Particle Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
435
+ page_content=' Proceedings of the NATO Advanced Study Institute, Cargèse, Corsica, France, May 27-June 8, 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
436
+ page_content=' NATO Science Series II: Mathematics, Physics and Chem- istry, Vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
437
+ page_content=' 104.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
438
+ page_content=' Kluwer Academic Publishers, Dordrecht, 2003, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
439
+ page_content=' 453-456 (DOI: 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
440
+ page_content='1007/978-94-010-0211-0_37) [LPTHE Paris preprint LPTHE-P03-01, arXiv:hep-th/0302043 (https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
441
+ page_content='org/abs/hep-th/0302043)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
442
+ page_content=' [19] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
443
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
444
+ page_content=' Alebastrov, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
445
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
446
+ page_content=' Efimov: A proof of the unitarity of S-matrix in a nonlocal quantum field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
447
+ page_content=' Communications in Mathematical Physics 31:1(1973)1-24 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
448
+ page_content='1007/BF01645588, the article is freely available online from the Project Euclid website: http://projecteuclid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
449
+ page_content='org/euclid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
450
+ page_content='cmp/1103858926) [Institute of Theoretical Physics, Kiev, report ИТФ-72-110Р [ITF-72-110R] [in Russian]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
451
+ page_content=' [20] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
452
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
453
+ page_content=' Alebastrov, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
454
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
455
+ page_content=' Efimov: Causality in quantum field theory with non- local interaction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
456
+ page_content=' Communications in Mathematical Physics 38:1(1974)11-28 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
457
+ page_content='1007/BF01651546, the article is freely available online from the Project Euclid website: http://projecteuclid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
458
+ page_content='org/euclid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
459
+ page_content='cmp/1103859964) [Joint Institute of Nuclear Resarch, Dubna, report Р2-7572 [R2-7572] [in Rus- sian]].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
460
+ page_content=' [21] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
461
+ page_content=' Kühn, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
462
+ page_content=' Helias: Expansion of the effective action around non-Gaussian the- ories.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
463
+ page_content=' Journal of Physics A: Mathematical and Theoretical 51:37(2018)375004, 35 pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
464
+ page_content=' (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
465
+ page_content='1088/1751-8121/aad52e), erratum ibid.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
466
+ page_content=' 51:45(2018)459502, 1 p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
467
+ page_content=' (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
468
+ page_content='1088/1751-8121/aae1d7) [arXiv:1711.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
469
+ page_content='05599 (https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
470
+ page_content=' org/abs/1711.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
471
+ page_content='05599)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
472
+ page_content=' [22] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
473
+ page_content=' Rosaler, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
474
+ page_content=' Harlander: Naturalness, Wilsonian renormalization, and “fun- damental parameters” in quantum field theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
475
+ page_content=' Studies in History and Philos- ophy of Modern Physics 66(2019)118-134 (DOI: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
476
+ page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
477
+ page_content='shpsb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
478
+ page_content='2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
479
+ page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
480
+ page_content='003) [RWTH Aachen report TTK-19-04, ELHC research group report ELHC_2018- 005, arXiv:1809.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
481
+ page_content='09489 (https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
482
+ page_content='org/abs/1809.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
483
+ page_content='09489)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
484
+ page_content=' 11' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/CdFQT4oBgHgl3EQfOTbk/content/2301.13275v1.pdf'}
CtAyT4oBgHgl3EQfR_f1/content/2301.00079v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:416f0059d21e594e8ea9a62dce0935144719a4547807333046b6e05ff4b046c1
3
+ size 1257398
DNAzT4oBgHgl3EQfTvz-/content/tmp_files/2301.01257v1.pdf.txt ADDED
@@ -0,0 +1,1115 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Correct-by-Design Teamwork Plans for Multi-Agent Systems⋆
2
+ Yehia Abd Alrahman and Nir Piterman
3
+ University of Gothenburg, Gothenburg, Sweden
4
+ {yehia.abd.alrahman,nir.piterman}@gu.se
5
+ Abstract. We propose Teamwork Synthesis, a version of the distributed synthesis problem with
6
+ application to teamwork multi-agent systems. We reformulate the distributed synthesis question
7
+ by dropping the fixed interaction architecture among agents as input to the problem. Instead, our
8
+ synthesis engine tries to realise the goal given the initial specifications; otherwise it automatically
9
+ introduces minimal interactions among agents to ensure distribution. Thus, teamwork synthesis
10
+ mitigates a key difficulty in deciding algorithmically how agents should interact so that each obtains
11
+ the required information to fulfil its goal. We show how to apply teamwork synthesis to provide a
12
+ distributed solution.
13
+ 1
14
+ Introduction
15
+ Synthesis [24] of correct-by-design multi-agent systems is still one of the most intriguing challenges in
16
+ the field. Traditionally, synthesis techniques targeted Reactive Systems – systems that maintain contin-
17
+ uous interactions with hostile environments. A synthesis algorithm is used to automatically produce a
18
+ monolithic reactive system that is able to satisfy its goals no matter what the environment does. Syn-
19
+ thesis algorithms have been also extended for other domains, e.g., to support rational environments [13],
20
+ cooperation [17,7], knowledge [12], etc.
21
+ A major deficiency of traditional synthesis algorithms is that they produce a monolithic program, and
22
+ thus fail to deal with distribution [8]. In fact, the distributed synthesis problem is undecidable, except
23
+ for specific configurations [25,8]. This is disappointing when the problem we set out to solve is only
24
+ meaningful in a vibrant distributed domain, such as multi-agent systems.
25
+ In this paper, we mount a direct attack on the latter, and especially Teamwork Multi-Agent Systems
26
+ (or Teamwork MAS) [21,26]. Teamwork MAS consist of a set of autonomous agents that share an execution
27
+ context in which they collaborate to achieve joint goals. They are a natural evolution of reactive systems,
28
+ where an agent has to additionally collaborate with team members to jointly maintain correct reactions
29
+ to inputs from the context. Thus, being reactive requires being prepared to respond to inputs coming
30
+ from the context and interactions from the team.
31
+ The context is uncontrolled and can introduce uncertainties for individuals that may disrupt the joint
32
+ behaviour of the team. For instance, a change in sensor readings of agentk that some other agentj cannot
33
+ observe, but is required to react to, etc. Thus, maintaining correct (and joint) reactions to contextual
34
+ changes requires a highly flexible coordination structure [29]. This implies that fixing all interactions
35
+ within the team in advance is not useful, simply because the required level of connectivity changes
36
+ dynamically.
37
+ Despite that flexible coordination mechanisms are undeniably effective to counter uncertainties, the
38
+ literature on distributed synthesis and control is primarily focused on fixed coordination, e.g., Distributed
39
+ synthesis [25,8]), Decentralised supervision [30,27], and Zielonka synthesis [31,9]. This reality, however,
40
+ is due to the fact that there is no canonical model to describe distributed computations, and hence the
41
+ focus is on well-known models with fixed structures. It is widely agreed that the undecidability result is
42
+ mainly due to partial (or lack of) information. The latter can also be rephrased as “lack of coordination”.
43
+ Note that the decidability of a distributed synthesis problem is conditioned on the right match between
44
+ the given concurrency model and its formulation [20].
45
+ We are left in the middle of these extremes: Distributed synthesis [25,8], Zielonka synthesis [31,9], and
46
+ Decentralised supervision [30]. All are undecidable except for specific configurations. Zielonka synthesis
47
+ is decidable if synchronising agents are allowed to share their entire state, and this produces agents that
48
+ are exponential in the size of the joint deterministic specification.
49
+ We propose Teamwork Synthesis, a decidable reformulation of the distributed synthesis problem.
50
+ We reformulate the synthesis question by dropping the fixed interaction architecture among agents.
51
+ ⋆ This work is funded by the Swedish research council grant: SynTM (No. 2020-03401) (Led by the first author)
52
+ and the ERC consolidator grant D-SynMA (No. 772459)(Led by the second author).
53
+ arXiv:2301.01257v1 [cs.LO] 3 Jan 2023
54
+
55
+ 2
56
+ Y. Abd Alrahman and N. Piterman
57
+ Instead, our approach dynamically introduces minimal interactions when needed to maintain correctness.
58
+ Teamwork synthesis consider a set of agent interfaces, an environment model that specifies assumptions
59
+ on the context and (possibly) partial interactions among agents, and a formula over the joint goal of the
60
+ team within the context. A solution for teamwork synthesis is a set of reconfigurable programs, one per
61
+ agent such that their dynamic composition satisfies the formula under the environment model.
62
+ The contributions in this paper are threefold:
63
+ (i) we introduce the Shadow transition system (or
64
+ Shadow TS for short) which distills the essential features of reconfigurable multicast from CTS [3],
65
+ augments, and disciplines them to support teamwork synthesis;
66
+ (ii) we propose a novel parametric
67
+ bisimulation that is able to abstract unnecessary interactions, and thus helps producing Shadow TSs with
68
+ least amount of coordinations, and with size that is, in the worst case, equivalent to the joint deterministic
69
+ specification. This is a major improvement on the Zielonka approach and with less coordination;
70
+ (iii)
71
+ lastly, we present teamwork synthesis and show how to reduce it to a single-agent synthesis. The solution
72
+ is used to construct an equivalent loosely-coupled distributed one. Our synthesis engine will try realise
73
+ the goal given the initial specifications, otherwise it will automatically introduce additional required
74
+ interactions among agents to ensure distributed realisability. Note that those additional interactions are
75
+ strategic, i.e., they are introduced dynamically when needed and disappear otherwise. Thus, teamwork
76
+ synthesis will enable us to mitigate a key difficulty in deciding algorithmically how agents should interact
77
+ so that each obtains the required information to carry out its functionality.
78
+ The paper’s structure is as follows: In Sect. 2, we give an overview on teamwork synthesis. In Sect. 3,
79
+ we present a short background materials, and later in Sect. 4, we present a case study to illustrate our
80
+ approach. In Sect. 5, we present the Shadow TS and the corresponding bisimulation. In Sect. 6, we present
81
+ teamwork synthesis and in Sect. 7, we report our concluding remarks.
82
+ 2
83
+ Teamwork Synthesis in a nutshell
84
+ We consider a team of K autonomous agents that execute in a shared context, and pursue a joint goal.
85
+ A context can be a physical space or an external entity that may impact the joint goal.
86
+ Interaction among team members is established based on a set of channels (or event names), denoted
87
+ Y and partitioned among all members. An agent, say agentk, can locally control a subset of event names
88
+ (Yk ⊆ Y ) by being responsible of sending all messages with channels from Yk while other agents may be
89
+ eligible to receive.
90
+ We assume that every agentk, partially observes its context by means of reading local sensor observa-
91
+ tion values xk ∈ Xk. Moreover, agentk may react to new inputs from Xk or messages (with channels from
92
+ other agents, i.e., in (Y \Yk)) by generating local actuation signals o ∈ Ok. That is, the signals agentk
93
+ uses to control its state, e.g., a robot sends signals to its motor to change direction.
94
+ Message exchange is established in a reconfigurable multicast fashion. That is, agentk may send
95
+ messages to interested team members, i.e., agents that currently listen to the sending channel. A receiving
96
+ agent, agentj for j ̸= k, can adjust its actuation signals Oj accordingly. Agents can connect/disconnect
97
+ channels dynamically based on need. An agent only receives messages on channels that listens to in its
98
+ current state, and cannot observe others.
99
+ Agentk starts from a fixed initial state, and in every future execution step it either: observes a new
100
+ sensor input from Xk; receives a message on a channel from (Y \Yk) that agentk listens to in the current
101
+ state; or sends a message on a channel from Yk to interested members. In all cases, agentk may trigger
102
+ individual actuation signals Ok accordingly.
103
+ As a team, every team execution starts from a fixed initial state. Moreover, in every execution step the
104
+ team either observes an aggregate sensor input – some members (i.e., a subset of K) observe an input – or
105
+ exposes a message on channel from Y originated exactly from one member. In both cases, the team may
106
+ trigger an aggregate actuation signal O. Formally, the set of aggregate sensor inputs over {Xk}k∈K is
107
+ X = {x : K �→ �
108
+ k Xk | x(k) /∈ �
109
+ j̸=k Xj and ∃ k ∈ K, s.t. x(k) is defined}. That is, a global observation
110
+ corresponds to having new sensor values for some of the agents. Note that x is a partial function. Similarly,
111
+ the set of aggregate actuation signals over {Ok}k∈K is O = {o : K �→ �
112
+ k Ok | o(k) /∈ �
113
+ j̸=k Oj}. Note
114
+ that unlike X, the set of aggregate output signals O can be empty.
115
+ Thus, teamwork synthesis only requires that aggregate observations X and interactions on channels
116
+ from Y interleave [18] after initialisation θi, see the assumption automaton (A) below:
117
+ The rationale is that we start from an environment model E that specifies both aggregate context
118
+ observations X and (possibly) interactions on channels from Y , i.e., the environment model E may
119
+ centrally specify an interaction protocol on channels from Y . Then we are given a set of agent interfaces
120
+ {⟨Xk, Yk, Ok⟩}k∈K such that X is the set of aggregate observations over {Xk}k∈K, O is the set of
121
+
122
+ Correct-by-Design Teamwork Plans for Multi-Agent Systems
123
+ 3
124
+ Fig. 1: Execution Assumption
125
+ aggregate actuation signals over {Ok}k∈K as defined before, and Y = �
126
+ k Yk; and a formula ϕ over the
127
+ joint goal of the team within E (i.e., the language of ϕ is in ((Y ∪ X) × O)ω).
128
+ Our synthesis engine will try realise the goal given the initial protocol description (which can also
129
+ be empty) on Y , and if this is not possible, it will automatically introduce additional required interac-
130
+ tions among agents to ensure distributed realisability. We use the Shadow TS, with essential features of
131
+ reconfigurable multicast, as the underlying distributed model for teamwork synthesis.
132
+ Formally, a solution for teamwork Synthesis T = ⟨E ∩ A, ϕ, O⟩ is a set of |K|-Shadow TSs, one for
133
+ each ⟨Xk, Yk, Ok⟩ such that their team composition satisfies ϕ under E ∩A, where E ∩A is the standard
134
+ automata intersection of E and the execution assumption A depicted above. We show that the teamwork
135
+ synthesis problem can be reduced to a single-agent synthesis. The solution of the latter can be efficiently
136
+ decomposed into a set of equivalent shadow TSs.
137
+ 3
138
+ Background
139
+ We present the background material on symbolic automata for environment’s specifications and linear
140
+ temporal logic (ltl).
141
+ Definition 1 (Environment model). An environment model E is a deterministic symbolic automaton
142
+ of the form E = ⟨Q, Σ, Ψ, q0, ρ⟩,
143
+ • Q is a set of states and q0 ∈ Q is the initial state.
144
+ • Σ is a structured alphabet of the form (Y ∪ X).
145
+ • Ψ is a set of predicates over Σ such that every predicate ψ ∈ Ψ is interpreted as follow: �·� : Ψ →
146
+ (Y ∪ X).
147
+ • ρ : Q × Ψ → Q is the transition function, s.t. for all transitions (q, ψ, q′), (q, ψ′, q′′) ∈ ρ, if ψ ∧ ψ′ is
148
+ satisfiable then q′ = q′′.
149
+ The language of E, denoted by LE, is a set of infinite sequences of letters in (Y ∪ X)ω. Two environ-
150
+ ment models E1 and E2 can be composed by means of standard automata intersection (E1 ∩ E2).
151
+ For goal specifications, we use ltl to specify the goals of individual agents and their joint goals. We
152
+ assume an alphabet of the form (Y ∪ X) × O) as defined before. A model σ for a formula ϕ is an infinite
153
+ sequence of letters in (Y ∪X)×O), i.e., it is in ((Y ∪X)×O))ω. Given a model σ = σ0, σ1, . . ., we denote
154
+ by σi the letter at position i.
155
+ LTL formulas are constructed using the following grammar.
156
+ ϕ ::= v ∈
157
+
158
+ k
159
+ (Xk ∪ Ok) | y ∈ Y | ¬ϕ | ϕ1 ∨ ϕ2 | Xϕ | ϕ1 U ϕ2
160
+ For a formula ϕ and a position i ≥ 0, ϕ holds at position i of σ, written σ, i |= ϕ, where σi = (v, o), if:
161
+ • For xk ∈ Xk we have σ, i |= xk iff v ∈ X and and v(k) = xk. That is, xk is satisfied if v(k) is defined
162
+ and equal to xk.1
163
+ • For ok ∈ Ok we have σ, i |= ok iff o(k) = ok
164
+ • For y ∈ Y we have σ, i |= y iff v = y
165
+ • σ, i |= ¬ϕ iff σ, i ̸|= ϕ
166
+ • σ, i |= ϕ ∨ ψ iff σ, i |= ϕ or σ, i |= ψ
167
+ • σ, i |= Xϕ iff σ, i + 1 |= ϕ
168
+ • σ, i |= ϕ U ψ iff there exists k ≥ i such that σ, k |= ψ and σ, j |= ϕ for all j, i ≤ j < k
169
+ If σ, 0 |= ϕ, then ϕ holds on σ (written σ |= ϕ). A set of models M satisfies ϕ, denoted M |= ϕ, if every
170
+ model in M satisfies ϕ. A formula is satisfiable if the set of models satisfying it is not empty.
171
+ We use the usual abbreviations of the Boolean connectives ∧, →, and ↔ and the usual definitions
172
+ for true and false. We introduce the following temporal abbreviations Fφ = true U φ, Gφ = ¬F¬φ, and
173
+ φ1Rφ2 = ¬(¬φ1U¬φ2).
174
+ 1 It is possible to say v(k) is defined and not equal to xk by �
175
+ xk̸=x∈Xk x.
176
+
177
+ 0
178
+ Y4
179
+ Y. Abd Alrahman and N. Piterman
180
+ 4
181
+ Distributed Product Line Scenario
182
+ We use a distributed product line scenario to illustrate Teamwork Synthesis and its underlying principles.
183
+ The product line, in our scenario, is operated by three robot arms: (i) the tray arm that observes
184
+ inputs on the input-tray and forwards them for processing;
185
+ (ii) the proc arm that is responsible for
186
+ processing the inputs; (iii) and the pkg arm that packages and delivers the final product.
187
+ The operator of the product line is an uncontrollable human, adding inputs, denoted by (in), to the
188
+ input-tray. The operator serves as the execution context in which the three robot arms operate. Only the
189
+ tray arm can observe the input (in).
190
+ The specifications of the robot arms are as follows: The interface of the tray is of the form Inttray =
191
+ ⟨{in}, {fwd}, {rFwd}⟩. That is, the tray arm can observe the input in on the input-tray, it can also send
192
+ a message on channel fwd, and it has one actuation signal rFwd to instruct its motor to get ready to
193
+ forward the input. The f-automaton below specifies its part of the interaction protocol.
194
+ That is, the tray arm can forward by sending a message on fwd only after it observes an input in.
195
+ The safety goals of the tray are:
196
+ ϕ1 = G(in → rFwd) &
197
+ G((rFwd ∧ (X¬fwd)) → (XrFwd))
198
+ That is, the motor gets ready to forward whenever an input is observed. Moreover, the motor remains
199
+ ready to forward as long as forwarding did not happen.
200
+ The
201
+ interface
202
+ of
203
+ the
204
+ proc
205
+ arm
206
+ is
207
+ of
208
+ the
209
+ form
210
+ Intproc
211
+ =
212
+ ⟨∅, {proc}, {rProc}⟩ . That is, the proc arm cannot observe any input, but it can send a message on
213
+ proc, and it has one actuation signal rProc to instruct its motor to get ready to process the input. The
214
+ p-automaton below and the ltl formula pd specify the arm part in the interaction protocol.
215
+ pd = G((proc ∧ (Xin) ∧ (XXfwd)) → X(dlv R¬proc))
216
+ Namely, the proc arm can process by sending a message on proc only after a forward has happened.
217
+ Moreover, the arm cannot process twice in row without a deliver in between. We will use A(pd) to denote
218
+ the automaton representing pd.
219
+ The safety goals of the proc arm are as follows:
220
+ ϕ2 = G(fwd → rProc) &
221
+ G((rProc ∧ (X¬proc)) → (XrProc))
222
+ That is, the motor gets ready to process whenever forward happens. Moreover, the motor remains
223
+ ready to process as long as processing did not happen.
224
+ The interface of the pkg arm is Intpkg = ⟨∅, {dlv}, {rDlv}⟩ . That is, the pkg arm cannot observe
225
+ any input, but it can deliver by sending a message on dlv, and it has one actuation signal rDlv to instruct
226
+ its motor to get ready to package and deliver the input. The d-automaton below specifies its part of the
227
+ interaction protocol.
228
+ The pkg arm can send a message on dlv only after processing has happened. The safety and liveness
229
+ goals of the pkg arm are:
230
+ ϕ3 = G(proc → rDlv) &
231
+ G((rDlv ∧ (X¬dlv)) → (XrDlv))
232
+ That is, the motor gets ready to deliver whenever process happens. Moreover, the motor remains
233
+ ready to deliver as long as delivering did not happen. We also require GF(rDlv), i.e., the motor must also
234
+ be ready to delivering infinitely often.
235
+
236
+ ifwaaim
237
+ 1.
238
+ Rwd0
239
+ 1
240
+ pxroxcpnox
241
+ dl ajpoxc
242
+ 0)
243
+ 1
244
+ dlyCorrect-by-Design Teamwork Plans for Multi-Agent Systems
245
+ 5
246
+ We have the following assumption on the operator op:
247
+ Namely, after a first input the operator waits for processing to happen before it puts a new input.
248
+ Finally, we require GF(in), i.e., the operator must supply input infinitely often.
249
+ We assume that all signals are initially off. That is:
250
+ θ = ¬in ∧ ¬fwd ∧ ¬proc ∧ ¬dlv ∧ ¬rFwd ∧ ¬rProc ∧ ¬rDlv
251
+ Notice that these specifications are written from a central point of view. For instance, the formula pd
252
+ of the proc arm predicates on (in, fwd, and dlv) even if it cannot observe them. To be able to enforce
253
+ this formula, we need to be able to automatically introduce strategic and minimal interactions among
254
+ agents at run-time, only when needed (!), and this is the role of teamwork synthesis.
255
+ The instance of teamwork synthesis T = ⟨E ∩ A, ϕ, O⟩ is:
256
+ (i) E = f ∩ p ∩ d ∩ A(pd) ∩ op
257
+ (ii) A = is an instance of the automaton depicted in Fig. 1
258
+ (iii) ϕ = θ ∧ ϕ1 ∧ ϕ2 ∧ ϕ3 ∧ (GF(in) → GF(rDlv))
259
+ (iv) O =
260
+
261
+
262
+
263
+
264
+
265
+
266
+
267
+
268
+
269
+
270
+
271
+
272
+
273
+
274
+
275
+ ∅, {(tray �→ rFwd)},
276
+ {(proc �→ rProc)}, {(pkg �→ rDlv)},
277
+ {(tray �→ rFwd), (proc �→ rProc)},
278
+ {(tray �→ rFwd), (pkg �→ rDlv)},
279
+ {(proc �→ rProc), (pkg �→ rDlv)},
280
+ {(tray �→ rFwd), (proc �→ rProc), (pkg �→ rDlv)}
281
+
282
+
283
+
284
+
285
+
286
+
287
+
288
+
289
+
290
+
291
+
292
+
293
+
294
+
295
+
296
+ A solution for T = ⟨E ∩ A, ϕ, O⟩ is a 3-Shadow TSs, one for each ⟨Xk, Yk, Ok⟩k∈{1,2,3} such that
297
+ T1∥T2∥T3 |= ϕ under E ∩ A.
298
+ We will revisit the scenario, at the end of Sect. 6, to show the distributed realisation of this problem
299
+ and its features.
300
+ 5
301
+ Shadow Transition Systems
302
+ We formally present the Shadow Transition System and we use it to define the behaviour of individual
303
+ agents. We also define how to compose different agents to form a team.
304
+ Definition 2 (Shadow TS). A shadow TS is of the form Tk = ⟨Sk, Intk, Actk, ∆k
305
+ e, ∆k, Lk, lsk, sk
306
+ 0⟩,
307
+ where:
308
+ • Sk is the set of states of Tk and sk
309
+ 0 ∈ Sk its initial state.
310
+ • Intk = ⟨Xk, chk, Ok⟩ is the interface of Tk, where
311
+ • Xk is an observation alphabet, chk is a set of interaction channels, and Ok is an output (or
312
+ actuation) alphabet. We use i to range over elements in Xk or chk;
313
+ • lsk : Sk → 2chk is a channel listening function. That is, lsk defines (per state) the channels that
314
+ Tk listens to.
315
+ • Actk ⊆ (chk ×{!, ?}×Υk) is the set of messages. Intuitively, a message consists of a channel ch ∈ chk,
316
+ a type (send ! or receive ?), and a load (or contents) υ ∈ Υk.
317
+ • Lk : Sk → (chk ∪ (Xk ⊎ {⊥})) × (Ok ⊎ {⊥}) is a labelling function where ⊥ denotes undefined label,
318
+ i.e., Lk labels states with input (output) letters that were observed (correspondingly produced).
319
+ • ∆k
320
+ e ⊆ Sk × (chk ∪ Xk) denotes the environment potential moves from Sk, i.e., ∆k
321
+ e can be thought of as
322
+ a ghost transition relation denoting the instantaneous perception of Tk of its environment.
323
+ • ∆k ⊆ Sk × Actk × Sk is the transition relation of Tk. The relation ∆k can be thought of as a shadow
324
+ transition relation of ∆k
325
+ e. That is, for every potential move in ∆k
326
+ e, there must be a corresponding shadow
327
+ transition in ∆k as follows:
328
+ • For every state s ∈ Sk and every letter i ∈ (chk∪Xk), if (s, i) ∈ ∆k
329
+ e then there exists o ∈ Ok, s′ ∈ Sk
330
+ such that Lk(s′) = (i, o) and (s, a, s′) ∈ ∆k for some a ∈ Actk
331
+
332
+ 0
333
+ iin,6
334
+ Y. Abd Alrahman and N. Piterman
335
+ • For any state s ∈ Sk, if for every letter i ∈ (chk ∪ Xk), (s, i) /∈ ∆k
336
+ e and there exists o ∈ Ok, s′ ∈ Sk
337
+ such that (s, a, s′) ∈ ∆k for some a ∈ Actk then a must be a receive.
338
+ Shadow TSs can be composed to form a team as in Def. 3 below. We use projx
339
+ k to denote the projection
340
+ of a team label into Xk of agentk, and similarly for projch
341
+ k and projo
342
+ k, i.e., for projection on chk and OK
343
+ respectively. We use ⊥ to denote that the projection is undefined.
344
+ Definition 3 (Team). Given a set K = {1, . . . , n} of shadow TSs Tk = ⟨Sk, Intk, Actk, ∆k
345
+ e, ∆k, Lk, lsk, sk
346
+ 0⟩
347
+ where k ∈ K, their composition ∥kTk is the team T = ⟨S, Int, Act, ∆e, ∆, L, ls, s0⟩,
348
+ • S = (s1, . . . , sn),
349
+ s0 = (s1
350
+ 0, . . . , sn
351
+ 0),
352
+ Act = �
353
+ k Actk,
354
+ Υ = �
355
+ k Υk
356
+ • Int = ⟨X, ch, O⟩ such that ch = �
357
+ k chk,
358
+ X = {x : K �→ �
359
+ k Xk | x(k) /∈ �
360
+ j̸=k Xj},
361
+ and O = {o : K �→ �
362
+ k Ok | o(k) /∈ �
363
+ j̸=k Oj}
364
+ ∆ =
365
+
366
+
367
+
368
+
369
+
370
+ (s1, . . . , sn),
371
+ (c, !, υ),
372
+ (s′
373
+ 1, . . . , s′
374
+ n)
375
+
376
+
377
+ ������
378
+ ∃k ∈ {1, n} . (sk, (c, !, υ), s′
379
+ k) ∈ ∆k and ∀j ̸= k.
380
+ (1) (sj, (c, ?, υ), s′
381
+ j) ∈ ∆j and c ∈ lsj(sj) or
382
+ (2) c /∈ lsj(sj) and s′
383
+ j = sj
384
+
385
+
386
+
387
+ ∆e =
388
+
389
+
390
+
391
+ �(s1, . . . , sn), i�
392
+ ������
393
+ ((s1, . . . , sn), (c, !, υ), (s′
394
+ 1, . . . , s′
395
+ n)) ∈ ∆
396
+ for some (c, !, υ) ∈ Act such that
397
+ L((s′
398
+ 1, . . . , s′
399
+ n)) = (i, o) for some o ∈ O
400
+
401
+
402
+
403
+ • Given a state (s1, . . . , sn), let x = �
404
+ k{k �→ projx
405
+ k(Lk(sk)) | projx
406
+ k(Lk(sk)) ̸= ⊥}, ch = �
407
+ k projch
408
+ k (Lk(sk)),
409
+ and
410
+ o = �
411
+ k{k �→ projo
412
+ k(Lk(sk)) |
413
+ projo
414
+ k(Lk(sk)) ̸= ⊥}, then L((s1, . . . , sn)) = (x, o) if x ̸= ∅ and
415
+ (ch, o) otherwise. In the systems we construct we achieve that ch is always a unique value in ch.
416
+ • ls((s1, . . . , sn)) = �
417
+ k lsk(sk)
418
+ Note that the composition in Def. 3 does not necessarily produce a shadow TS. However, our synthesis
419
+ engine will generate a set of shadow TSs such that their composition is also a shadow TS.
420
+ Intuitively, multicast channels are blocking. That is, if there exists an agentk with a send transition
421
+ (sk, (c, !, v), s′
422
+ k) ∈ ∆k on channel c then every other parallel agentj, s.t.j ̸= k (that listens to c in its current
423
+ state, i.e., c ∈ ls(sj)) must supply a matching receive transition (sj, (c, ?, v), s′
424
+ j) ∈ ∆j or otherwise the
425
+ sender is blocked. Other parallel agents that do not listen to c simply cannot observe the interaction,
426
+ and thus cannot block it. We restrict attention to the set of shadow TSs T that satisfy the following
427
+ property:
428
+ Property 1 (Local broadcast). ∀T ∈ T , s ∈ ST , we have thatc ∈ ls(s) iff (s, (c, ?, υ), s′) ∈ ∆T for all
429
+ c ∈ ch and υ ∈ Υ.
430
+ Thus, a shadow TS cannot block a message send by listening to its channel and not supplying a
431
+ corresponding receive transition. This reduces the semantics to asynchronous local broadcast. That is,
432
+ message sending cannot be blocked, and is sent on local broadcast channels rather than a unique public
433
+ channel (⋆) as in CTS [3].
434
+ A run of T is the infinite sequence r = s0a0s1a1s2 . . . such that for all k ≥ 0 : (sk, ak, sk+1) ∈ ∆ and
435
+ s0 is the initial state. An execution of T is the projection of a run r to state labels. That is, for a run
436
+ r = s0a0s1a1s2 . . . , there is an execution w induced by r such that w = L(s0)L(s1)L(s2) . . . . We use LT
437
+ to denote the language of T, i.e., the set of all executions of T. For a specification spec ⊆ ((X ∪ch)×O)ω,
438
+ we say that T satisfies spec if and only if LT ⊆ spec. Note that the key idea in our work is that we use a
439
+ specification that only refers to aggregate input and output, and is totally insensitive to messages. As we
440
+ will see later, the latter will be used by a synthesis engine to ensure distributed realisability.
441
+ Lemma 1. The composition operator is a commutative monoid.
442
+ Proof. The proof follows directly by Property 1 and the definition of ∥. There, the existential and universal
443
+ quantifications on k are insensitive to the location of sk in (s1, . . . , sn) for k ∈ {1, n}. A sink state, denoted
444
+ by 0, (i.e., a state with zero outgoing transitions and empty listening function, i.e., ls(0) = ∅) is the Id-
445
+ element of ∥ because it cannot influence the composition.
446
+ We define a notion of parameterised bisimulation that we use to efficiently decompose a Shadow TS.
447
+
448
+ Correct-by-Design Teamwork Plans for Multi-Agent Systems
449
+ 7
450
+ E -Bisimulation Consider the TS T with a finite state space S = {s1, . . . , sn} that is composed with the
451
+ TS C (that we call the parameter TS). The latter has a finite state space E = {ϵ1, . . . , ϵm} and will be
452
+ used as the basis to minimise the former. That is, TS C is only agent that T can interact with. This is the
453
+ only bisimulation used in this paper. When we write bisimulation we mean parameterised bisimulation.
454
+ We first introduce some notations:
455
+ • (ϵ
456
+ a
457
+ −→ ϵ′): a parameter state ϵ permits message a = (c, !, υ) iff ϵ can receive a, does not listen to c, or
458
+ is the sender. Formally,
459
+ (i)
460
+ c ∈ ls(ϵ) and (ϵ, (c, ?, υ), ϵ′) ∈ ∆E or
461
+ (ii)
462
+ c ̸∈ ls(ϵ) and (ϵ = ϵ′) or
463
+ (iii)
464
+ (ϵ, (c, !, υ), ϵ′) ∈ ∆E
465
+ Note that this item and Property 1 ensure that message send is autonomous and cannot be restricted
466
+ by the parameter TS.
467
+ • (s
468
+ a!
469
+ −−→ s′) : s sends message a = (c, !, υ) iff (s, (c, !, υ), s′) ∈ ∆
470
+ • (s
471
+ a?
472
+ −−→ s′) : s receives message a = (c, !, υ) and updates iff c ∈ ls(s), (s, (c, ?, υ), s′) ∈ ∆, L(s) ̸= L(s′).
473
+ • (s
474
+ τa
475
+ −−→ s′) : s can discard iff a = (c, !, υ), c ∈ ls(s), (s, (c, ?, υ), s′) ∈ ∆, L(s) = L(s′). Note the state’s
476
+ label did not change by receiving. We drop the name a from τa when a is arbitrary.
477
+ Note that all kinds of receives (
478
+ τa
479
+ −−→ or
480
+ a?
481
+ −−→) cannot happen without a joint message-send.
482
+ • We use (
483
+ τ−→⋆)ϵ′
484
+ ϵ to denote a sequence (possibly empty) of arbitrary discards (
485
+ τa
486
+ −−→ for any a), starting
487
+ when the parameter state is ϵ and ending with ϵ′. We define a family of transitive closures as the
488
+ minimal relations satisfying: (i) s (
489
+ τ−→⋆)ϵ′
490
+ ϵ s; and (ii) if s1 (
491
+ τ−→⋆)ϵ2
492
+ ϵ1 s2, (s2
493
+ τa
494
+ −−→ s3), (ϵ2
495
+ a
496
+ −→ ϵ3), and
497
+ s3 (
498
+ τ−→⋆)ϵ4
499
+ ϵ3 s4 then s1 (
500
+ τ−→⋆)ϵ4
501
+ ϵ1 s4.
502
+ These are the reflexive and transitive closure of
503
+ τ
504
+ −→ while making sure that also the parameter supplies
505
+ the sends that are required.
506
+ • We will use (s
507
+ a
508
+ −→) when s has a transition, and (s ̸
509
+ a
510
+ −→) when s has no a transitions.
511
+ Definition 4 (E -Bisimulation). Let the shadow TS C with finite state space E = {ϵ1, . . . , ϵm} be a
512
+ parameter TS. An E -bisimulation relation R is a symmetric E -indexed family of relations Rϵ ⊆ S × S
513
+ for ϵ ∈ E , such that whenever (s1, s2) ∈ Rϵ then L(s1) = L(s2), and for all a ∈ Act, if ϵ
514
+ a
515
+ −→ ϵ′ then
516
+ 1.
517
+ s1
518
+ a!
519
+ −−→ s′
520
+ 1
521
+ implies
522
+ ∃s′
523
+ 2, s2
524
+ a!
525
+ −−→ s′
526
+ 2 and (s′
527
+ 1, s′
528
+ 2) ∈ Rϵ′;
529
+ 2.
530
+ s1
531
+ a?
532
+ −−→ s′
533
+ 1
534
+ implies
535
+ s2 ̸
536
+ τa
537
+ −−→
538
+ and
539
+
540
+ if
541
+ s2
542
+ a?
543
+ −−→
544
+ then ∃s′
545
+ 2,
546
+ s2
547
+ a?
548
+ −−→ s′
549
+ 2 and (s′
550
+ 1, s′
551
+ 2) ∈ Rϵ′
552
+ else ∃s′
553
+ 2, s′′
554
+ 2, ϵ′′,
555
+ s2 (
556
+ τ−→⋆)ϵ
557
+ ϵ′′ s′′
558
+ 2
559
+ a?
560
+ −−→ s′
561
+ 2, and (s′
562
+ 1, s′
563
+ 2) ∈ Rϵ′
564
+
565
+ 3.
566
+ s1
567
+ τa
568
+ −−→ s′
569
+ 1
570
+ implies
571
+ s2 ̸
572
+ a?
573
+ −−→
574
+ and
575
+
576
+ if s2
577
+ τa
578
+ −−→
579
+ then ∃s′
580
+ 2,
581
+ s2
582
+ τa
583
+ −−→ s′
584
+ 2 and (s′
585
+ 1, s′
586
+ 2) ∈ Rϵ′
587
+ else
588
+ ∃s′
589
+ 2, ϵ′′,
590
+ s2 (
591
+ τ−→⋆)ϵ
592
+ ϵ′′ s′
593
+ 2 and (s′
594
+ 1, s′
595
+ 2) ∈ Rϵ′
596
+
597
+ Two states s1 and s2 are equivalent with respect to a parameter state ϵ ∈ E , written s1 ∼ϵ s2, iff there
598
+ exists an E -bisimulatin R such that (s1, s2) ∈ Rϵ. Please note that R is symmetric.
599
+ Def. 4 equates two states with same labelling with respect to the current parameter state ϵ if: (1) they
600
+ supply the same send transitions; (2) they supply same receive transitions or one can discard a number
601
+ of messages and reach a state in which it can supply a matching receive; (3) is similar to (2) except for
602
+ the “else” part where one state can supply an arbitrary number of discard (possibly none). In all cases,
603
+ both states are required to evolve to equivalent states under the next parameter state ϵ′.
604
+ Note that case 2 and 3 (and their symmetrics) in Def. 4 allow an agent to avoid participating in
605
+ interactions that do not affect it.
606
+ We use ∼0 to denote the equivalence under the empty parameter O. That is, O has a singleton sink
607
+ state 0. The parallel composition ∥ in Def. 3 is a commutative monoid, and 0 is the id-element. Thus, we
608
+ have that (s, 0) is equivalent to s for all s ∈ S.
609
+ We need to prove that ∼ϵ is closed under the parallel composition in Def. 3 within a composite
610
+ parameter C . That is, a parameter C of the form C1∥ . . . ∥Cn for some n. For a composite state ϵ =
611
+ (ϵ1, . . . , ϵn) and w = {i1, . . . , ij}, we use (ϵi1, . . . , ϵij) to denote a w-cut of ϵ. That is, a projection of ϵ on
612
+ states (ϵi1, . . . , ϵij). Moreover, we use ϵ\p to denote ϵ without cut p.
613
+
614
+ 8
615
+ Y. Abd Alrahman and N. Piterman
616
+ Theorem 1 (∼ϵ is closed under ∥). For all states s1, s2 of a shadow TS, all composite parameter
617
+ states ϵ ∈ E of the form ϵ = (ϵ1, . . . , ϵn), and all cuts p of length w ≤ n, we have that:
618
+ s1 ∼ϵ s2 implies (s1, p) ∼ϵ\p (s2, p)
619
+ Proof. It is sufficient to prove that for every composite parameter state ϵ, the following relation:
620
+ Rϵ\p = {((s1, p), (s2, p)) | for all states s1, s2, s.t. (s1 ∼ϵ s2)}
621
+ is a (ϵ\p)-bisimulation.
622
+ Recall that ∥ is a commutative monoid, and thus it is closed under commutativity, associativity, and
623
+ Id-element. Thus, the rest of the proof is by induction on the length (w) of the projection with respect to
624
+ the history of the parameter TS. The key idea of the proof is that send actions of the form (c, !, υ) can
625
+ only originate from within the composition, i.e., can be sent by s1 (or s2) or ϵ. Moreover, a receive action
626
+ of the form (c, ?, υ) can only happen jointly with a corresponding send while the latter is autonomous.
627
+ 6
628
+ Teamwork Synthesis
629
+ Given an environment model E that specifies both aggregate context observations X and scheduled
630
+ interactions on channels from Y , the execution assumption A automaton depicted in Fig. 1, a formula
631
+ ϕ over the joint goal of the team within E (i.e., L (ϕ) ⊆ ((Y ∪ X) × O)ω), a set of agent interfaces
632
+ {⟨Xk, Yk, Ok⟩}k∈K such that X is the set of aggregate observations of {Xk}k∈K, O is the set of aggregate
633
+ actuation signals of {Ok}k∈K as defined in Sect. 2, and Y = �
634
+ k Yk, a solution for teamwork Synthesis
635
+ T = ⟨E ∩ A, ϕ, O⟩ is a set of |K| of Shadow TSs, one for each ⟨Xk, Yk, Ok⟩ such that T1∥ . . . ∥Tk |= ϕ
636
+ under E ∩ A.
637
+ We show that the teamwork synthesis problem can be reduced to a single-agent synthesis. The so-
638
+ lution of the latter can be efficiently decomposed into a set of loosely coupled shadow TSs, where their
639
+ composition is an equivalent implementation.
640
+ Theorem 2. Teamwork Synthesis whose specification ϕ is a gr(1) formula [5] of the form θ ∧ Gφ ∧
641
+ (�n
642
+ i=1 GF λi → �m
643
+ i=1 GF γi) can be solved with effort O(m.n.(|E ∩ A|.|O|)2), where |E ∩ A| is the number
644
+ of transitions in E ∩ A.
645
+ Proof. We construct ˆE = ⟨ ˆQ,
646
+ ˆΣ, ˆΨ, ˆq0, ˆρ⟩ that extends E ∩ A = ⟨Q, Σ, Ψ, q0, ρ⟩ to include the
647
+ set of aggregate signals in O. To simplify the notations, we freely use o ∈ O to mean the predicate that
648
+ characterises it. The components of ˆE in relation to E ∩ A are:
649
+
650
+ ˆQ = Q,
651
+ ˆq0 = q0,
652
+ ˆΣ = Σ × O
653
+ • We extend the interpretation function �·� to include variables in O. That is, �·� : ˆΨ → (Y ∪ X) × O
654
+ • ˆρ =��(q0, θ ∧ θi, q)� �� (q0, θi, q) ∈ ρ �
655
+
656
+ ��(q, ψ ∧ o, q′)� �� q ̸= q0, (q, ψ, q′) ∈ ρ and o ∈ O �
657
+ We use the construction above to construct a symbolic fairness-free ds [5]. We transform ˆE into an
658
+ equivalent fairness-free symbolic discrete system ds D = ⟨Vd, ρd, θd⟩ in the obvious way. We use the
659
+ variables X′ where |X′| = �
660
+ k⌈log |Xk|⌉ to encode observations, the variables Y ′ where |Y ′| = log |Y | to
661
+ encode channels, the variables O′ where |O′| = �
662
+ k⌈log |Ok|⌉ to encode outputs, and the variable st2 to
663
+ encode the states ˆQ. That is, D = ⟨Vd, ρd, θd⟩, where:
664
+ • Vd = (X′ ∪ Y ′ ∪ O′ ∪ {st})
665
+ • We define ρd(Vd, Vd
666
+ ′) which is a predicate on the current assignment to Vd in relation to the next
667
+ assignment. We use the primed copy Vd
668
+ ′ to refer to the next assignment of Vd.
669
+ ρd =
670
+
671
+ (q1,ψ1,q2), (q2,ψ2,q3)∈ρ′ ψ1 ∧ (ψ2)′ ∧ (st = q1) ∧ (st′ = q2)
672
+ • θd = θ ∧ (st = q0)
673
+ For a state (s, q) ∈ 2(X′∪Y ′∪O′) × Q where Q is the domain of st, we say that (s, q) |= v iff v ∈ s.
674
+ We naturally generalise satisfaction to boolean combination of (Vd) and (Vd
675
+ ′). Now, given a Teamwork
676
+ Synthesis problem T = ⟨D( ˆE), ϕ, O⟩, where D = ⟨Vd, ρd, θd⟩, ϕ is a gr(1) formula divided into a
677
+ liveness assumption �n
678
+ i=1 GF λi, a liveness goal �m
679
+ i=1 GF γi, and a safety goal Gφ, we construct a gr(1)
680
+ game G = ⟨V, X, O, θe, θs, ρe, ρs, ϕg⟩ as follows:
681
+ 2 To simplify the notation we will consider st to be a non-boolean variable.
682
+
683
+ Correct-by-Design Teamwork Plans for Multi-Agent Systems
684
+ 9
685
+ We use φ in the safety goal to prune any transition in ρd with condition on O that is in conflict with φ
686
+ ( it is unsafe). That is, we construct ρ′
687
+ d from ρd by removing all transitions t ∈ ρd such that ¬(t → φ). The
688
+ initial transitions from state q0 are not subject to check against φ. Clearly, (Xρ′
689
+ d) → Gφ. Moreover, ρ′
690
+ d
691
+ also encodes the environment safety by definition. Now, our game is as follows: G = ⟨Vd, (X′ ∪Y ′), (O′ ∪
692
+ {st}), true, θd, true, ρ′
693
+ d, ϕg⟩, where ϕg = �n
694
+ i=1 GF λi → �m
695
+ i=1 GF γi
696
+ To support response formulas of the form G(x → Fy) and general ltl safety formulas instead, the
697
+ complexity is adjusted as follows: O((m+g).(n+a).(|E ∩ A|.|O|.|ϕ(s)|.2(a+g))2), where m, n are adjusted
698
+ by adding the number of response assumptions a and response guarantees g while |ϕ(s)| is the size of the
699
+ safety goal. This is because the disciplined environment model E ∩ A will be intersected with the safety
700
+ goal and each response formula. A response formula can be encoded in a two-state automaton [23].
701
+ The solution of the gr(1) game can be used to construct a Mealy machine with interface ⟨X, Y, O⟩
702
+ as defined below:
703
+ Definition 5 (Mealy Machine). A Mealy machine M is of the form M = ⟨Q, I, O, q0, δ⟩, where:
704
+ • Q is the set of states of M and q0 ∈ Q is the initial state.
705
+ • I = (X ∪ Y ) is an alphabet, partitioned into a set of aggregate sensor inputs X and a set of channels
706
+ Y , and O is the aggregate output alphabet.
707
+ • δ : Q × (Y ∪ X) → Q × O is the transition function of M.
708
+ The language of M, denoted by LM, is the set of infinite sequences ((Y ∪X)×O)ω that M generates.
709
+ We will use M to build a corresponding shadow TS. Namely, we construct a language equivalent
710
+ shadow TS T with set of states S = δ as shown below. Note that the constructed mealy machine in the
711
+ previous step has exactly one outgoing transition from the initial state q0, i.e., |(q0, (i, o), q) ∈ δ| = 1.
712
+ This is ensured by the execution assumption A automaton depicted in Fig. 1.
713
+ Lemma 2 (From Mealy to Shadow TS). Given the constructed Mealy machine M = ⟨Q, I, O, q0, δ⟩
714
+ then we use a function f : δ → Act, a load Υ, and channels ch to construct a shadow TS T =
715
+ ⟨S, Int, Act, ∆e, ∆, L, ls, s0⟩ with |δ| many states, and LT = LM.
716
+ Proof. We construct T as follows:
717
+ • S = {(q, (i, o), q′) | (q, (i, o), q′) ∈ δ}
718
+ • s0 = (q0, (i, o), q) for the unique q ∈ Q, s.t. (q0, (i, o), q) ∈ δ
719
+ • L((q, (i, o), q′)) = (i, o)
720
+ • Int = ⟨X, ch, O⟩ where X = {x : K �→ �
721
+ k Xk |
722
+ x(k) /∈ �
723
+ j̸=k Xj}; ch ⊆ (2K)\{∅} ∪ Y , i.e., the
724
+ maximal set of channels that agent may use to interact, where K is the set of agent identities; and
725
+ O = {o : K �→ �
726
+ k Ok | o(k) /∈ �
727
+ j̸=k Oj}
728
+ • ls(s) = ∅ for all s ∈ S and Act ⊆ (ch × {!} × Υ) where Υ ⊆ X ∪ {∅}. Note that Act is restricted to
729
+ send messages.
730
+ • ∆ =
731
+
732
+
733
+
734
+
735
+
736
+ (q, (i, o), q′),
737
+ a,
738
+ (q′, (i′, o′), q′′)
739
+
740
+
741
+ ����
742
+ (q, (i, o), q′) ∈ δ, (q′, (i′, o′), q′′) ∈ δ
743
+ and a = f((q′, (i′, o′), q′′))
744
+
745
+
746
+
747
+ • We use projx
748
+ k(i) to project i on Xk, s.t. function f is:
749
+ f((s, (i, o), s′)) =
750
+
751
+ (i, !, ∅)
752
+ if i ∈ Y
753
+ (ids, !, i)
754
+ if i ∈ X, ids = {k | projx
755
+ k(i) ̸= ⊥}
756
+ • ∆e =
757
+ ��(q, (i, o), q′), i′ � ��(q, (i, o), q′), a, (q′, (i′, o′), q′′)) ∈ ∆ �
758
+ It is not hard to see that LT = LM.
759
+ Lemma 3 (Decomposition).
760
+ A
761
+ shadow
762
+ TS
763
+ T
764
+ =
765
+ ⟨S,
766
+ Int,
767
+ Act,
768
+ ∆e, ∆, L, ls, s0⟩, as constructed in Lemma 2, can be decomposed into a set of TSs {Tk}k for k ∈ {1, n},
769
+ s.t. T ∼0 (T1∥ . . . ∥Tn).
770
+ Proof. We construct the components of each Tk as follows:
771
+ • Sk = S,
772
+ sk
773
+ 0 = s0
774
+ • For each s ∈ S, (s, (c, !, υ), s′) ∈ ∆, and each Tk, we have that
775
+
776
+ 10
777
+ Y. Abd Alrahman and N. Piterman
778
+ 1. if k ∈ c and |c| = 1 then (s, (c, !, υ), s′) ∈ ∆k
779
+ 2. if
780
+ k
781
+
782
+ c
783
+ and
784
+ |c|
785
+ >
786
+ 1
787
+ then
788
+ (s, (c, !, υ), s′)
789
+
790
+ ∆k
791
+ and
792
+ (s, (c, ?, υ), s′)
793
+ ∈ ∆k
794
+ 3. if y = c for some y ∈ Yk then (s, (c, !, υ), s′) ∈ ∆k
795
+ 4. otherwise (s, (c, ?, υ), s′) ∈ ∆k
796
+ • ∆k
797
+ e = {(s, i) | (s, (c, !, υ), s′) ∈ ∆k, Lk(s′) = (i, o)}
798
+ • Actk = {a | (s, a, s′) ∈ ∆k}
799
+ • Lk(s) = projk(L(s)), i.e., the projection of L(s) on Agentk
800
+ • lsk(s) = {c | (s, (c, ?, υ), s′) ∈ ∆k}
801
+ It is sufficient to prove that s0 of T is equivalent to s′
802
+ 0 of the composition (T ′ = T1∥ . . . ∥Tn) under the
803
+ empty parameter state 0, and that each Tk is indeed a shadow TS. The key idea of the proof is that
804
+ the construction creates isomorphic shadow TSs that are fully synchronous. That is, they have the same
805
+ states and transition structure, and only differ in state labelling, listening function, and transition role
806
+ (send ! or receive ?). Thus, every send in ∆ of T is divided into a set of one (or more sends) ! and exactly
807
+ (n − 1)-receives ?. In case of more than one send (as in item (2)), then for each Tk that implements such
808
+ send there must be a matching receive with same source and target states. By Def. 3, we can reconstruct
809
+ T ′ that is isomorphic to T with ls(s) = ch for all s ∈ S. However, we only need to prove T ∼0 T ′ under
810
+ the O-parameter which cannot interact, and thus ls(s) is not important after constructing T ′.
811
+ Lemma 3 provides an upper bound on number of communications each agent Tk must participate in
812
+ within the team. We will use the E -Bisimulation in Sect. 5 to reduce such number with respect to the
813
+ rest of the composition (or team). That is, given a set K = {1, . . . , n} of agents and for each agentk,
814
+ we minimise the corresponding Tk with respect to the parameter T = ∥j∈(K\{k})Tj. Note that Lemma 3
815
+ produces agents that are of the same size of the deterministic specification. Size wise, we recall that in
816
+ Zielonka synthesis [31,9]) agents are exponential in the size of the deterministic specification. We will
817
+ reduce this size even more by constructing the quotient shadow TS of Tk:
818
+ Definition 6 (Quotient Shadow TS). For a shadow TS Tk = ⟨Sk, Intk, Actk, ∆k
819
+ e, ∆k, Lk, lsk, sk
820
+ 0⟩,
821
+ E the state-space of ∥
822
+ j̸=k
823
+ Tj, and E -bisimulation, the quotient shadow TS [Tk]∼ = ⟨S′
824
+ k, Int′
825
+ k,Act′
826
+ k, ∆k���
827
+ e , ∆′
828
+ k, Lk, lsk′, sk′
829
+ 0 ⟩
830
+ • S′
831
+ k = {s∼ | s ∈ Sk} with s∼ = {s′ ∈ Sk | s ∼e s′ for e ∈ E }
832
+ • sk′
833
+ 0 = sk
834
+ 0∼
835
+ • ∆′
836
+ k =��s∼, (c, !, υ), s′
837
+
838
+ � �� (s, (c, !, υ), s′) ∈ ∆k
839
+
840
+
841
+ ��s∼, (c, ?, υ), s′
842
+
843
+ � �� s∼ ̸= s′
844
+ ∼, (s, (c, ?, υ), s′) ∈ ∆k
845
+
846
+ • ∆k′
847
+ e = {(s, i) | (s, (c, !, υ), s′) ∈ ∆′
848
+ k, Lk(s′) = (i, o)}
849
+ • Act′
850
+ k = {a | (s, a, s′) ∈ ∆′
851
+ k}
852
+ • lsk′(s) = {c | (s, (c, ?, υ), s′) ∈ ∆′
853
+ k}
854
+ The definition of E -Bisimulation in Sect. 5 can be easily converted to an algorithm (see [22]) that
855
+ efficiently (almost linear) computes E -Bisimulation as the largest fixed point.
856
+ Scenario Revisited The distributed realisation of the teamwork synthesis instance, in Sect. 4, is
857
+ depicted in Fig. 2, where each arm is supplied with a shadow TS that represents its correct behaviour.
858
+ For a shortcut, we only use the “first letter” of a channel name y ∈ Yk and the “first two letters” of an
859
+ output letter name o ∈ Ok in the figures, e.g., we use the shortcuts f for fwd, rF for rFwd, etc.
860
+ Note that every state of Tk for k ∈ {1, 2, 3} is labelled with input/output letter and a set of channels
861
+ that Tk listens to in this state, e.g., T1 in Fig. 2 (i) initially has empty input/output letter (the initial
862
+ state is labelled with ⊥/⊥) and is not listening to any channel (the listening function is initially ∅).
863
+ Moreover, T2 and T3 in Fig. 2 (i) and (ii) are initially listening to channel f and respectively p.
864
+ Transitions are labelled with either message send (!) or receive (?). For instance, T1 can initially send
865
+ the message ({1}, !, in) on channel {1} independently and move alone to the next state in which T1 reads
866
+ the letter (in) from the input-tray, and consequently signals its motor to get ready to forward, i.e., by
867
+ signalling (rF). Recall that this is a shadow transition of the potential trigger of the environment from
868
+ the initial state. This is akin to say that once T1 senses a trigger from the environment, it immediately
869
+
870
+ Correct-by-Design Teamwork Plans for Multi-Agent Systems
871
+ 11
872
+ (i) T1: The Tray Arm Agent
873
+ (ii) T2: The processing Arm Agent
874
+ (iii) T3: The Packaging Arm Agent
875
+ Fig. 2: The distributed Realisation of the Product line
876
+ permits it by providing a shadowing transition. Note that T2 and T3 are initially busy waiting to receive
877
+ a message on f and respectively on p to kick start their executions.
878
+ Clearly, message ({1}, !, in) on channel {1} is a strategic interaction that our synthesis engine added
879
+ to ensure distributed realisability. Notice that T2 and T3 do not initially listen to {1} and they cannot
880
+ observe the interaction on it, but later they will listen to it when they need (e.g., after (p, !, ∅)).
881
+ By composition, as defined in Def. 3, initially T1 move independently, and from the next state T1 sends
882
+ the message (f, !, ∅) in which T2 participates while T3 stays disconnected. Indeed, T3 only gets involved in
883
+ the third step. Notice how the listening functions of these TSs change dynamically during execution, and
884
+ allowing for loosely coupled distributed implementation. The latter has a feature that in every execution
885
+ step one can send a message, and the others are either involved (i.e., they receive) or they cannot observe
886
+ it (i.e., they do not listen).
887
+ Recall that state labels are the elements of executions and the transition labels are complimented by
888
+ the synthesis engine to ensure distributed realisability. As one can see, all TSs initially start from states
889
+ that satisfy the initial condition θ. Indeed, there is no signal initially enabled. Moreover, the composite
890
+ labelling of states in future execution steps satisfies the formula ϕ under the environment model E and
891
+ the execution assumption A.
892
+ Note that the machines in Fig. 2 is everything we need. That is, unlike supervisory control [27] where
893
+ the centralised controller is finally composed with the environment model, and the composition is checked
894
+ against the goal, we do not have such requirement. Indeed, the machines in Fig. 2 fully distribute the
895
+ control.
896
+ The results in this paper are unique, and aspire to unlock distributed synthesis for multi-agent systems
897
+ for the first time.
898
+ 7
899
+ Concluding Remarks
900
+ We introduced teamwork synthesis which reformulates the original distributed synthesis problem [25,8]
901
+ and casts it on teamwork multi-agent systems. Our synthesis technique relies on a flexible coordination
902
+ model, named Shadow TS, that allow agents to co-exist and interact based on need, and thus limits the
903
+ interaction to interested agents (or agents that require information to proceed).
904
+
905
+ (0)
906
+ L/dF
907
+ (0)
908
+ f/.
909
+ p?
910
+ (p?
911
+ (d.?0)
912
+ in/R
913
+ ..0
914
+ 作/ 1
915
+ (d.?D
916
+ (p)
917
+ (d)
918
+ 1d.7
919
+ (p.?.O)
920
+ (p)/cP
921
+ L/P
922
+ f.?.O
923
+ Q.
924
+ .U0
925
+ 10/
926
+ L
927
+ dt
928
+ J儿/P
929
+ /rD
930
+ ((1),?n)
931
+ (d,)
932
+ /p
933
+ (f?0)
934
+ /rD
935
+ LrD
936
+ (p)
937
+ (f,?)
938
+ O..
939
+ /p)12
940
+ Y. Abd Alrahman and N. Piterman
941
+ Unlike the existing distributed synthesis problems, our formulation is decidable, and can be reduced to
942
+ a single-agent synthesis. We efficiently decompose the solution of the latter and minimise it for individual
943
+ agents using a novel notion of parametric bisimulation. We minimise both the state space and the set
944
+ of interactions each agent requires to fulfil its goals. The rationale behind teamwork synthesis is that we
945
+ reformulate the original synthesis question by dropping the fixed interaction architecture among agents as
946
+ input to the problem. Instead, our synthesis engine tries to realise the goal given the initial specifications;
947
+ otherwise it automatically introduces minimal interactions among agents to ensure distributed realisabil-
948
+ ity. Teamwork synthesis shows algorithmically how agents should interact so that each is well-informed
949
+ and fulfils its goal.
950
+ Related works We report on related works with regards to concurrency models used for distributed
951
+ synthesis, bisimulation relations, and also other formulations of distributed synthesis.
952
+ Shadow TS adopts the reconfigurable semantics approach from CTS [3,4,2], but it is actually weaker in
953
+ terms of synchronisation. Indeed, the requirement in Property 1 lifts out the blocking nature of multicast,
954
+ and thus the semantics of the Shadow TS is reduced to a local broadcast. That is, message sending can no
955
+ longer be blocked, and is broadcasted on local channels rather than a unique public channel ⋆ (broadcast
956
+ to all) as in CTS [3]. The advantage is that the semantics of Shadow TS is asynchronous and no agent can
957
+ force other agents to wait for it. It is definitely weaker than shared memory models as in [25,8] and it is
958
+ also weaker than the synchronous automata of supervision [27] and Zielonka automata [31,9]. Note that
959
+ the last two adopt the multi-way synchronisation (or blocking rendezvous) of Hoare’s CSP calculus [11].
960
+ Thus, the synchronisation dependencies are lifted out in our model. Intuitively, an agent can, at most,
961
+ block itself to wait for a message from another agent, but in no way can block the executions of others
962
+ unwillingly.
963
+ Our notion of bisimulation in Def. 4 is novel with respect to existing literatures on bisimulation [6,19,28].
964
+ To the best of our knowledge, it is the only bisimulation that is able to abstract actual messages, and
965
+ thus reduce synchronisations. It treats receive transitions in a sophisticated way that allows it to judge
966
+ when a receive or a discard transition can be abstracted safely. It has a branching nature like in [10], but
967
+ is stronger because the former cannot distinguish different τ transitions. It is parametric like in [15], but
968
+ is weaker in that it can abstract actual receive transitions.
969
+ When it comes to distributed synthesis, there is a plethora of formulations. Here, we only relate to the
970
+ ones that consider hostile environments. These are: Distributed synthesis [25,8], Zielonka synthesis [31,9],
971
+ and Decentralised supervision
972
+ [30]. Unlike teamwork synthesis, all are, in general, undecidable except
973
+ for specific configurations (mostly with a tower of exponentials [14,16]). Zielonka synthesis is decidable if
974
+ synchronising agents are allowed to share their entire state, and this produces agents that are exponential
975
+ in the size of the joint deterministic specification. Teamwork synthesis produces agents that are, in the
976
+ worst case, the size of the joint deterministic specification.
977
+ Future works We want to generalise the execution assumption A of teamwork synthesis depicted in
978
+ Fig. 1 to a more balanced scheduling between interaction events Y and context events X, inspired by RTC
979
+ control [1]. That is, we want to provide a more relaxed built-in transfer of control between the interaction
980
+ and the context events. The latter would majorly simplify writing specifications. We want also to extend
981
+ the Shadow TS to allow multithreaded agents, and thus eliminates interaction among co-located threads.
982
+ Clearly, the positive results in this paper makes it feasible to provide tool support for Teamwork
983
+ synthesis, and with a more user-friendly interface.
984
+ References
985
+ 1. Abd Alrahman, Y., Braberman, V.A., D’Ippolito, N., Piterman, N., Uchitel, S.: Synthesis of run-to-completion
986
+ controllers for discrete event systems. In: 2021 American Control Conference, ACC 2021, New Orleans,
987
+ LA, USA, May 25-28, 2021. pp. 4892–4899. IEEE (2021). https://doi.org/10.23919/ACC50511.2021.9482704,
988
+ https://doi.org/10.23919/ACC50511.2021.9482704
989
+ 2. Abd Alrahman, Y., Perelli, G., Piterman, N.: Reconfigurable interaction for MAS modelling. In: Seghrouchni,
990
+ A.E.F., Sukthankar, G., An, B., Yorke-Smith, N. (eds.) Proceedings of the 19th International Conference on
991
+ Autonomous Agents and Multiagent Systems, AAMAS ’20, Auckland, New Zealand, May 9-13, 2020. pp.
992
+ 7–15. International Foundation for Autonomous Agents and Multiagent Systems (2020)
993
+ 3. Abd Alrahman, Y., Piterman, N.: Modelling and verification of reconfigurable multi-agent systems. Auton.
994
+ Agents Multi Agent Syst. 35(2), 47 (2021). https://doi.org/10.1007/s10458-021-09521-x, https://doi.org/
995
+ 10.1007/s10458-021-09521-x
996
+
997
+ Correct-by-Design Teamwork Plans for Multi-Agent Systems
998
+ 13
999
+ 4. Alrahman, Y.A., Azzopardi, S., Piterman, N.: R-check: A model checker for verifying reconfigurable mas
1000
+ (2022)
1001
+ 5. Bloem, R., Jobstmann, B., Piterman, N., Pnueli, A., Sa’ar, Y.: Synthesis of reactive(1) designs. J. Comput.
1002
+ Syst. Sci. 78(3), 911–938 (2012). https://doi.org/10.1016/j.jcss.2011.08.007
1003
+ 6. Castellani,
1004
+ I.,
1005
+ Hennessy,
1006
+ M.:
1007
+ Distributed
1008
+ bisimulations.
1009
+ J.
1010
+ ACM
1011
+ 36(4),
1012
+ 887–911
1013
+ (1989).
1014
+ https://doi.org/10.1145/76359.76369, https://doi.org/10.1145/76359.76369
1015
+ 7. Ehlers, R., K¨onighofer, R., Bloem, R.: Synthesizing cooperative reactive mission plans. In: 2015 IEEE/RSJ
1016
+ International Conference on Intelligent Robots and Systems, IROS 2015, Hamburg, Germany, September 28
1017
+ - October 2, 2015. pp. 3478–3485. IEEE (2015). https://doi.org/10.1109/IROS.2015.7353862, https://doi.
1018
+ org/10.1109/IROS.2015.7353862
1019
+ 8. Finkbeiner, B., Schewe, S.: Uniform distributed synthesis. In: 20th IEEE Symposium on Logic in Computer
1020
+ Science (LICS 2005), 26-29 June 2005, Chicago, IL, USA, Proceedings. pp. 321–330. IEEE Computer Society
1021
+ (2005). https://doi.org/10.1109/LICS.2005.53, https://doi.org/10.1109/LICS.2005.53
1022
+ 9. Genest, B., Gimbert, H., Muscholl, A., Walukiewicz, I.: Optimal zielonka-type construction of deterministic
1023
+ asynchronous automata. In: Abramsky, S., Gavoille, C., Kirchner, C., auf der Heide, F.M., Spirakis, P.G. (eds.)
1024
+ Automata, Languages and Programming, 37th International Colloquium, ICALP 2010, Bordeaux, France,
1025
+ July 6-10, 2010, Proceedings, Part II. Lecture Notes in Computer Science, vol. 6199, pp. 52–63. Springer
1026
+ (2010). https://doi.org/10.1007/978-3-642-14162-1 5, https://doi.org/10.1007/978-3-642-14162-1_5
1027
+ 10. van Glabbeek, R.J., Weijland, W.P.: Branching time and abstraction in bisimulation semantics. J. ACM
1028
+ 43(3), 555–600 (1996). https://doi.org/10.1145/233551.233556, https://doi.org/10.1145/233551.233556
1029
+ 11. Hoare, C.A.R.: Communicating sequential processes. In: Jones, C.B., Misra, J. (eds.) Theories of Pro-
1030
+ gramming: The Life and Works of Tony Hoare, pp. 157–186. ACM / Morgan & Claypool (2021).
1031
+ https://doi.org/10.1145/3477355.3477364, https://doi.org/10.1145/3477355.3477364
1032
+ 12. Jones, A.V., Knapik, M., Penczek, W., Lomuscio, A.: Group synthesis for parametric temporal-epistemic
1033
+ logic. In: van der Hoek, W., Padgham, L., Conitzer, V., Winikoff, M. (eds.) International Conference on
1034
+ Autonomous Agents and Multiagent Systems, AAMAS 2012, Valencia, Spain, June 4-8, 2012 (3 Volumes).
1035
+ pp. 1107–1114. IFAAMAS (2012), http://dl.acm.org/citation.cfm?id=2343855
1036
+ 13. Kupferman, O., Shenwald, N.: The complexity of LTL rational synthesis. In: Fisman, D., Rosu, G. (eds.)
1037
+ Tools and Algorithms for the Construction and Analysis of Systems - 28th International Conference,
1038
+ TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS
1039
+ 2022, Munich, Germany, April 2-7, 2022, Proceedings, Part I. Lecture Notes in Computer Science, vol.
1040
+ 13243, pp. 25–45. Springer (2022). https://doi.org/10.1007/978-3-030-99524-9 2, https://doi.org/10.1007/
1041
+ 978-3-030-99524-9_2
1042
+ 14. Kupferman, O., Vardi, M.Y.: Synthesizing distributed systems. In: 16th Annual IEEE Symposium on Logic in
1043
+ Computer Science, Boston, Massachusetts, USA, June 16-19, 2001, Proceedings. pp. 389–398. IEEE Computer
1044
+ Society (2001). https://doi.org/10.1109/LICS.2001.932514, https://doi.org/10.1109/LICS.2001.932514
1045
+ 15. Larsen, K.G.: A context dependent equivalence between processes. Theor. Comput. Sci. 49, 184–215 (1987).
1046
+ https://doi.org/10.1016/0304-3975(87)90007-7, https://doi.org/10.1016/0304-3975(87)90007-7
1047
+ 16. Madhusudan, P., Thiagarajan, P.S.: Distributed controller synthesis for local specifications. In: Orejas, F.,
1048
+ Spirakis, P.G., van Leeuwen, J. (eds.) Automata, Languages and Programming, 28th International Col-
1049
+ loquium, ICALP 2001, Crete, Greece, July 8-12, 2001, Proceedings. Lecture Notes in Computer Science,
1050
+ vol. 2076, pp. 396–407. Springer (2001). https://doi.org/10.1007/3-540-48224-5 33, https://doi.org/10.
1051
+ 1007/3-540-48224-5_33
1052
+ 17. Majumdar, R., Piterman, N., Schmuck, A.: Environmentally-friendly GR(1) synthesis. In: Vojnar, T., Zhang,
1053
+ L. (eds.) Tools and Algorithms for the Construction and Analysis of Systems - 25th International Conference,
1054
+ TACAS 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS
1055
+ 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings, Part II. Lecture Notes in Computer Science,
1056
+ vol. 11428, pp. 229–246. Springer (2019). https://doi.org/10.1007/978-3-030-17465-1 13, https://doi.org/
1057
+ 10.1007/978-3-030-17465-1_13
1058
+ 18. Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, II. Inf. Comput. 100(1), 41–77 (1992).
1059
+ https://doi.org/10.1016/0890-5401(92)90009-5
1060
+ 19. Milner, R., Sangiorgi, D.: Barbed bisimulation. In: Kuich, W. (ed.) Automata, Languages and Programming,
1061
+ 19th International Colloquium, ICALP92, Vienna, Austria, July 13-17, 1992, Proceedings. Lecture Notes in
1062
+ Computer Science, vol. 623, pp. 685–695. Springer (1992). https://doi.org/10.1007/3-540-55719-9 114, https:
1063
+ //doi.org/10.1007/3-540-55719-9_114
1064
+ 20. Muscholl, A.: Automated synthesis of distributed controllers. In: Halld´orsson, M.M., Iwama, K., Kobayashi,
1065
+ N., Speckmann, B. (eds.) Automata, Languages, and Programming - 42nd International Colloquium,
1066
+ ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part II. Lecture Notes in Computer Science,
1067
+ vol. 9135, pp. 11–27. Springer (2015). https://doi.org/10.1007/978-3-662-47666-6 2, https://doi.org/10.
1068
+ 1007/978-3-662-47666-6_2
1069
+ 21. Nair, R., Tambe, M., Marsella, S.: The role of emotions in multiagent teamwork. In: Fellous, J., Arbib, M.A.
1070
+ (eds.) Who Needs Emotions? - The brain meets the robot, pp. 311–330. Series in affective science, Oxford
1071
+ University Press (2005). https://doi.org/10.1093/acprof:oso/9780195166194.003.0011, https://doi.org/10.
1072
+ 1093/acprof:oso/9780195166194.003.0011
1073
+
1074
+ 14
1075
+ Y. Abd Alrahman and N. Piterman
1076
+ 22. Paige, R., Tarjan, R.E.: Three partition refinement algorithms. SIAM Journal on Computing 16(6), 973–989
1077
+ (1987). https://doi.org/10.1137/0216062, https://doi.org/10.1137/0216062
1078
+ 23. Piterman, N., Pnueli, A., Sa’ar, Y.: Synthesis of reactive(1) designs. In: Emerson, E.A., Namjoshi, K.S.
1079
+ (eds.) Verification, Model Checking, and Abstract Interpretation, 7th International Conference, VMCAI 2006,
1080
+ Charleston, SC, USA, January 8-10, 2006, Proceedings. Lecture Notes in Computer Science, vol. 3855, pp.
1081
+ 364–380. Springer (2006). https://doi.org/10.1007/11609773 24, https://doi.org/10.1007/11609773_24
1082
+ 24. Pnueli, A., Rosner, R.: On the synthesis of a reactive module. In: Conference Record of the Sixteenth Annual
1083
+ ACM Symposium on Principles of Programming Languages, Austin, Texas, USA, January 11-13, 1989. pp.
1084
+ 179–190. ACM Press (1989). https://doi.org/10.1145/75277.75293, https://doi.org/10.1145/75277.75293
1085
+ 25. Pnueli, A., Rosner, R.: Distributed reactive systems are hard to synthesize. In: 31st Annual Symposium
1086
+ on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume II. pp. 746–
1087
+ 757. IEEE Computer Society (1990). https://doi.org/10.1109/FSCS.1990.89597, https://doi.org/10.1109/
1088
+ FSCS.1990.89597
1089
+ 26. Pynadath, D.V., Tambe, M.: An automated teamwork infrastructure for heterogeneous software agents and
1090
+ humans. Auton. Agents Multi Agent Syst. 7(1-2), 71–100 (2003). https://doi.org/10.1023/A:1024176820874,
1091
+ https://doi.org/10.1023/A:1024176820874
1092
+ 27. Ramadge, P., Wonham, W.: The control of discrete event systems. Proceedings of the IEEE 77(1), 81–98
1093
+ (1989). https://doi.org/10.1109/5.21072
1094
+ 28. Sangiorgi, D.: A theory of bisimulation for the pi-calculus. In: Best, E. (ed.) CONCUR ’93, 4th International
1095
+ Conference on Concurrency Theory, Hildesheim, Germany, August 23-26, 1993, Proceedings. Lecture Notes in
1096
+ Computer Science, vol. 715, pp. 127–142. Springer (1993). https://doi.org/10.1007/3-540-57208-2 10, https:
1097
+ //doi.org/10.1007/3-540-57208-2_10
1098
+ 29. Tambe,
1099
+ M.:
1100
+ Towards
1101
+ flexible
1102
+ teamwork.
1103
+ J.
1104
+ Artif.
1105
+ Intell.
1106
+ Res.
1107
+ 7,
1108
+ 83–124
1109
+ (1997).
1110
+ https://doi.org/10.1613/jair.433, https://doi.org/10.1613/jair.433
1111
+ 30. Thistle, J.G.: Undecidability in decentralized supervision. Syst. Control. Lett. 54(5), 503–509 (2005).
1112
+ https://doi.org/10.1016/j.sysconle.2004.10.002, https://doi.org/10.1016/j.sysconle.2004.10.002
1113
+ 31. Zielonka, W.: Notes on finite asynchronous automata. RAIRO Theor. Informatics Appl. 21(2), 99–135 (1987).
1114
+ https://doi.org/10.1051/ita/1987210200991, https://doi.org/10.1051/ita/1987210200991
1115
+
DNAzT4oBgHgl3EQfTvz-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
EdE4T4oBgHgl3EQffQ16/content/tmp_files/2301.05106v1.pdf.txt ADDED
@@ -0,0 +1,557 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Citation
2
+ R. Benkert, M. Prabhushankar, and G. AlRegib, “Forgetful Active Learning With Switch Events: Efficient Sampling for
3
+ Out-of-Distribution Data,” in IEEE International Conference on Image Processing (ICIP), Bordeaux, France, Oct. 16-19
4
+ 2022
5
+ Review
6
+ Date of acceptance: June 2022
7
+ Bib
8
+ @ARTICLE{benkert2022 ICIP,
9
+ author={R. Benkert, M. Prabhushankar, and G. AlRegib},
10
+ journal={IEEE International Conference on Image Processing},
11
+ title={Forgetful Active Learning With Switch Events: Efficient Sampling for Out-of-Distribution Data},
12
+ year={2022}
13
+ Copyright
14
+ ©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses,
15
+ in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,
16
+ creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of
17
+ this work in other works.
18
+ Contact
19
20
+ http://ghassanalregib.info/
21
+ arXiv:2301.05106v1 [cs.LG] 12 Jan 2023
22
+
23
+ FORGETFUL ACTIVE LEARNING WITH SWITCH EVENTS: EFFICIENT SAMPLING FOR
24
+ OUT-OF-DISTRIBUTION DATA
25
+ Ryan Benkert, Mohit Prabhushankar, and Ghassan AlRegib
26
+ OLIVES at the Center for Signal and Information Processing,
27
+ School of Electrical and Computer Engineering,
28
+ Georgia Institute of Technology,
29
+ Atlanta, GA, 30332-0250, USA
30
+ {rbenkert3, mohit.p, alregib}@gatech.edu
31
+ ABSTRACT
32
+ This paper considers deep out-of-distribution active learning.
33
+ In practice, fully trained neural networks interact randomly
34
+ with out-of-distribution (OOD) inputs and map aberrant sam-
35
+ ples randomly within the model representation space. Since
36
+ data representations are direct manifestations of the training
37
+ distribution, the data selection process plays a crucial role in
38
+ outlier robustness.
39
+ For paradigms such as active learning,
40
+ this is especially challenging since protocols must not only
41
+ improve performance on the training distribution most effec-
42
+ tively but further render a robust representation space. How-
43
+ ever, existing strategies directly base the data selection on the
44
+ data representation of the unlabeled data which is random
45
+ for OOD samples by definition. For this purpose, we intro-
46
+ duce forgetful active learning with switch events (FALSE) -
47
+ a novel active learning protocol for out-of-distribution active
48
+ learning. Instead of defining sample importance on the data
49
+ representation directly, we formulate ”informativeness” with
50
+ learning difficulty during training. Specifically, we approxi-
51
+ mate how often the network “forgets” unlabeled samples and
52
+ query the most “forgotten” samples for annotation. We report
53
+ up to 4.5% accuracy improvements in over 270 experiments,
54
+ including four commonly used protocols, two OOD bench-
55
+ marks, one in-distribution benchmark, and three different ar-
56
+ chitectures.
57
+ Index Terms— Active Learning, Forgetting Events, Out-
58
+ of-Distribution.
59
+ 1. INTRODUCTION
60
+ A major issue in neural network deployment is their sensitiv-
61
+ ity to unknown inputs [1, 2, 3, 4]. Within the context of deep
62
+ learning, unknown inputs typically refer to samples originat-
63
+ ing from acquisition setups that significantly differ from the
64
+ training environment. Due to the probabilistic nature of neu-
65
+ ral network predictions, samples originating from the training
66
+ environment are called in-distribution while unknown inputs
67
+ are called out-of-distribution, or OOD in short. In practice,
68
+ OOD samples result in unpredictable or even random predic-
69
+ tions and represent a major challenge for real-world deploy-
70
+ ment [5, 6]. The root cause of the perceived unpredictabil-
71
+ ity lies within the structure of the model representation [7].
72
+ During training, the structure is established by imposing con-
73
+ straints (through e.g. a loss function) on known training sam-
74
+ ples and the training distribution is mapped to distinguish-
75
+ able targets. During test phase, the model maps known in-
76
+ distribution samples to their respective targets if they origi-
77
+ nate from the same training distribution. In contrast, OOD
78
+ samples are not constrained during training and the target rep-
79
+ resentation is undefined. This results in unpredictable behav-
80
+ ior at the test phase.
81
+ Fig. 1. Toy example of out-of-distribution (OOD) samples
82
+ within an active learning setting. In both active learning pro-
83
+ tocols the model exhibits similar test performance. However,
84
+ the accuracy on the out-of-distribution samples significantly
85
+ improves when the training set is selected with a different pro-
86
+ tocol.
87
+
88
+ A field in which OOD properties are especially impor-
89
+ tant is active learning. Active learning is a machine learning
90
+ paradigm in which the model iteratively selects the training
91
+ set from an unlabeled data pool to improve annotation effi-
92
+ ciency. Due to its intuitive practicality, active learning is es-
93
+ pecially popular in applications where annotations are costly
94
+ and has been successfully deployed in various industrial sec-
95
+ tors [8]. In active learning, out-of-distribution performance
96
+ is especially relevant because it is not directly apparent from
97
+ the target performance. For instance, a model may perform
98
+ significantly better on OOD data if the training set contains
99
+ samples that impose constraints on outliers (Figure 1). For
100
+ this purpose, active learning protocols must not only maxi-
101
+ mize performance on in-distribution data but further insure
102
+ robustness on outlier distributions.
103
+ Despite the high relevance for the field, existing active
104
+ learning approaches rarely consider OOD settings. In fact,
105
+ most strategies select the next set of training samples based
106
+ on importance metrics directly derived from the model rep-
107
+ resentation. Since model representations for OOD data are
108
+ undefined by definition, this trait poses a clear inefficiency
109
+ for OOD test performance. For this purpose, we introduce
110
+ FALSE - a novel query strategy that not only shows favor-
111
+ able performance on in-distribution data but is further robust
112
+ to OOD samples.
113
+ Instead of directly defining sample im-
114
+ portance on model representations directly, we define impor-
115
+ tance with statistics gathered from the model during training.
116
+ Specifically, we approximate how often unlabeled samples
117
+ are “forgotten” by the model and consider the “most forgot-
118
+ ten” samples as the most informative. We benchmark our
119
+ method against four commonly used active learning proto-
120
+ cols on two popular OOD benchmarks, as well as one in-
121
+ distribution benchmark with three architectures. Overall, we
122
+ note a significant improvement in terms of test accuracy on
123
+ in-distribution, as well as out-of-distribution data.
124
+ 2. BACKGROUND AND RELATED WORK
125
+ 2.1. Active learning
126
+ In active learning [9], the goal is to maximize generalization
127
+ performance with minimal data annotations. We consider a
128
+ dataset D, an initial training set Dtrain, as well as an unla-
129
+ beled data pool Dpool from which we select the next sam-
130
+ ple batch for the training set. For batch active learning, the
131
+ algorithm selects a batch of b samples X∗ = {x∗
132
+ 1, ..., x∗
133
+ b}
134
+ that are the most informative based on a predefined defini-
135
+ tion. The selection of X∗ is called the query strategy and typ-
136
+ ically queries the batch that maximizes the acquisition func-
137
+ tion a(x1, ..., xb|fw), where fw represents the deep neural
138
+ network with parameters w. In active learning, the definition
139
+ of importance is encoded within the acquisition function a.
140
+ In this regard, typical approaches involve querying samples
141
+ that are the most difficult for generalization [10, 11], maxi-
142
+ mize data diversity [12, 13], or perform a mixture of general-
143
+ ization difficulty and data diversity [14, 15]. Even though a
144
+ large variety of strategies exist, they define sample importance
145
+ on the representation manifold directly. Since representations
146
+ are notoriously unpredictable for OOD data this characteris-
147
+ tic represents a clear inefficiency. Apart from rare exceptions
148
+ [16], out-of-distribution active learning settings are not con-
149
+ sidered in existing literature.
150
+ 2.2. Forgetting Events
151
+ Our approach most closely relates to the study of continual
152
+ learning or more specifically catastrophic forgetting [17, 18,
153
+ 19, 20]. While several papers study forgetting in the con-
154
+ text of different target tasks [18, 19], other papers focus on
155
+ forgetting within a single task [17]. Within the context of
156
+ active learning, we define informativeness with learning dif-
157
+ ficulty. Specifically, we say a sample is informative if it was
158
+ “forgotten” frequently during the training process and there-
159
+ fore difficult to learn. Within the context of deep learning, a
160
+ sample is considered “forgotten” if it was correctly classified
161
+ (“learned”) at time t and misclassified (“forgotten”) at a later
162
+ time t′ > t. More formally, we consider recognition tasks
163
+ where the model calculates a prediction ˜yi for each sample xi
164
+ where the model prediction is correct when ˜yi is equal to the
165
+ ground truth label yi. The accuracy of a sample at epoch t can
166
+ be expressed as
167
+ ct
168
+ i = 1˜yt
169
+ i=yi.
170
+ (1)
171
+ Here, 1˜yt
172
+ i=yi represents a binary variable that reduces to
173
+ one if the model prediction is correct and zero otherwise.
174
+ We further define a sample as “forgotten” if the accuracy de-
175
+ creases in two subsequent epochs:
176
+ et
177
+ i = int(ct
178
+ i < ct−1
179
+ i
180
+ ) ∈ 1, 0
181
+ (2)
182
+ Similar to [17], we call the binary event et
183
+ i a forgetting
184
+ event. Within the context of active learning, we quantify in-
185
+ formativeness by the amount of forgetting events that occur
186
+ for a given sample each active learning round. In contrast to
187
+ existing literature, our definition of sample importance is not
188
+ directly dependent on the data representation of the model but
189
+ relies on artifacts from representation shifts. We reason that
190
+ this characteristic is potentially favorable for out-of distribu-
191
+ tion active learning.
192
+ 3. FORGETFUL ACTIVE LEARNING WITH
193
+ SWITCH EVENTS
194
+ Even though forgetting events are simple to formulate and do
195
+ not rely on the representation directly, the computation is not
196
+ tractable in practice. Speci��cally, the accuracy evaluation in
197
+ Equation 1 requires labels which are not present in Dpool by
198
+ definition. To alleviate this issue, we approximate forgetting
199
+
200
+ Fig. 2. Workflow of FALSE. Within the active learning round N, we gather switch events for every samples in Dpool and
201
+ aggregate them over all epochs K. Subsequently. we query b samples with the most switch events.
202
+ events with prediction switches. A prediction switch occurs
203
+ when the prediction of the model changes between two sub-
204
+ sequent epochs. Formally, we write
205
+ st
206
+ i = int(˜yt
207
+ i ̸= ˜yt−1
208
+ i
209
+ ) ∈ 1, 0.
210
+ (3)
211
+ Similar to our previous definition, we call the binary event
212
+ st
213
+ i a switch event at time t. Since samples with a larger amount
214
+ of switch events are considered more informative, we select
215
+ the batch X∗ with the most switch events in each round:
216
+ X∗ =
217
+ argmax
218
+ x1,...,xb∈Dpool
219
+ Σb
220
+ i=1ΣK
221
+ t=1st
222
+ i
223
+ (4)
224
+ Here, K refers to the total amount of epochs during an
225
+ active learning round. We call our method Forgetful Active
226
+ Learning with Switch Events or FALSE in short. We show
227
+ the workflow during each active learning round in Figure 2.
228
+ First, we count the switch events for every sample in Dpool
229
+ occurring within round N. Subsequently, we select b samples
230
+ with the most switch events and append them to the training
231
+ set Dtrain.
232
+ 4. EXPERIMENTS
233
+ 4.1. Experimental Setup
234
+ We compare FALSE to four popular strategies in active learn-
235
+ ing literature: Entropy sampling [10], coreset [12], least con-
236
+ fidence sampling [10], and active learning by learning [15].
237
+ We choose this constellation as it contains two strategies
238
+ based on generalization difficulty (entropy and least confi-
239
+ dence sampling), one based on data diversity (coreset), and
240
+ a hybrid protocol that combines generalization difficulty and
241
+ Algorithms
242
+ CIFAR10-C
243
+ CINIC10
244
+ CIFAR10
245
+ ResNet-18
246
+ FALSE
247
+ 21.85
248
+ 18.06
249
+ 21.80
250
+ ALBL [15]
251
+ 10.19
252
+ 5.66
253
+ 7.25
254
+ Coreset [12]
255
+ -41.87
256
+ -35.07
257
+ -41.04
258
+ Entropy [10]
259
+ 7.83
260
+ 8.58
261
+ 0.45
262
+ L. Conf. [10]
263
+ 16.23
264
+ 13.47
265
+ 9.93
266
+ DenseNet-121
267
+ FALSE
268
+ 13.92
269
+ 16.50
270
+ 15.47
271
+ ALBL [15]
272
+ 7.69
273
+ 6.67
274
+ 3.28
275
+ Coreset [12]
276
+ -23.40
277
+ -14.36
278
+ -21.74
279
+ Entropy [10]
280
+ 1.77
281
+ 2.52
282
+ -7.76
283
+ L. Conf. [10]
284
+ -0.20
285
+ 3.81
286
+ -3.57
287
+ ResNet-34
288
+ FALSE
289
+ 22.20
290
+ 23.30
291
+ 27.45
292
+ ALBL [15]
293
+ 7.56
294
+ 9.67
295
+ 13.96
296
+ Coreset [12]
297
+ -8.25
298
+ -7.18
299
+ -5.21
300
+ Entropy [10]
301
+ 14.80
302
+ 15.31
303
+ 12.51
304
+ L. Conf. [10]
305
+ 17.52
306
+ 16.60
307
+ 15.99
308
+ Table 1. Area under difference curve with reference to ran-
309
+ dom sampling over several datasets, query strategies, and ar-
310
+ chitectures. Positive, and higher numbers are better. Negative
311
+ numbers imply that the strategy has a lower accuracy curve
312
+ than the random baseline.
313
+ data diversity by switching between the coreset and least con-
314
+ fidence strategy (active learning by learning). For our OOD
315
+ experiments, we consider CIFAR10-C [1] (a corrupted ver-
316
+ sion of CIFAR10), as well as CINIC10 [21] (a larger dataset
317
+ with the same classes as CIFAR10). In addition, we validate
318
+ on the CIFAR10 in-distribution test set. In all experiments,
319
+ we train on the CIFAR10 training set. For CIFAR10-C, we
320
+ test on all corruptions except ”labels”, ”shot noise”, and
321
+ ”speckle noise”, and consider the difficulty levels 2 and 5.
322
+
323
+ st = int(yt ±yt-1)Fig. 3. FALSE in comparison to different query strategies on the level 2 CIFAR10-C [1] corruptions “JPEG Compression”,
324
+ “Elastic Transform”, and “Implulse Noise”. We compare FALSE to active learning by learning (ALBL), coreset, least confi-
325
+ dence sampling (Least Conf.), and entropy sampling (Entropy).
326
+ We choose this setup as it considers 17 realistic corruptions at
327
+ an intermediate, as well as high difficulty. For CINIC10, we
328
+ test on the CINIC10 test set. We start with an initial training
329
+ pool size of randomly chosen 128 samples and query 1024
330
+ samples each round. Since query strategy performance can
331
+ be sensitive to architecture choices, we perform our experi-
332
+ ments on resnet-18, resnet-34, as well as densenet-121. We
333
+ optimize with the adam variant of SGD with a learning rate of
334
+ 1e − 4 and train our models until a training accuracy of 98%
335
+ is reached. Furthermore, we use pretrained model weights
336
+ each round as this represents a realistic practical scenario
337
+ where data may be redundant in one domain but scarce in an-
338
+ other. Finally, we retrain our model form scratch each round
339
+ to prevent warm starting [22]. Due to space limitations, we
340
+ show the learning curves of three level 2 corruptions of the
341
+ CIFAR10-C dataset in Figure 3. Additionally, we summarize
342
+ the performance of each protocol over the first 20 rounds by
343
+ calculating the curve distance to randomly selecting samples
344
+ each round (Table 1). For each experiment constellation, we
345
+ subtract the accuracy curve of the respective strategy from
346
+ the random selection baseline curve and calculate the area
347
+ under the difference curve. In other words, the table shows
348
+ the distance of each strategy to randomly selecting samples
349
+ each round.
350
+ A negative result implies that the strategy is
351
+ overall worse than random selection, while a higher score
352
+ means that the respective strategy outperforms random selec-
353
+ tion by a larger margin over the first 20 rounds. All results
354
+ are averaged over five random seeds. In total, this amounts to
355
+ 270 separate active learning experiments.
356
+ 4.2. Discussion
357
+ From both Figure 3 and Table 1 we observe that FALSE is
358
+ a good choice for OOD active learning.
359
+ In particular, we
360
+ observe that FALSE is especially favorable in early rounds
361
+ where few labeled data samples are available for training.
362
+ We reason that the lack of training samples results in insuffi-
363
+ ciently calibrated representations and the importance rankings
364
+ are more inaccurate when defined on the representation di-
365
+ rectly. For later rounds, enough training samples are available
366
+ to learn a more conclusive representation and FALSE outper-
367
+ forms by a smaller margin (Figure 3). On average, we observe
368
+ up to 4.5% improvements in accuracy across existing strate-
369
+ gies. We further note, that FALSE is more robust to different
370
+ datasets and architectures for both in-distribution and OOD
371
+ experiments.
372
+ In Table 1, we see that FALSE consistently
373
+ outperforms random selection by a large margin over differ-
374
+ ent datasets and architectures. This is evident in the consis-
375
+ tent large area under the difference curve. In contrast several
376
+ strategies, outperform random selection on some datasets or
377
+ architectures but match or underperform the baseline in other
378
+ settings. For instance, least confidence sampling exhibits a
379
+ high area score on CIFAR10-C when resnet-34 is used, but
380
+ slightly underperforms the random baseline with densenet-
381
+ 121. Furthermore, entropy sampling performs well on the in-
382
+ distribution test set when resnet-34 is used but underperforms
383
+ random by a significant margin when densenet-121 is used.
384
+ We further observe, that FALSE also shows the strongest per-
385
+ formance overall. This is evident in the largest area across all
386
+ settings in Table 1.
387
+ 5. CONCLUSION
388
+ In this paper, we introduced FALSE as a novel query strat-
389
+ egy for OOD active learning. Specifically, we derived ”infor-
390
+ mativeness” from the learning dynamics during training time.
391
+ We approximated how often the network ”forgot” unlabeled
392
+ samples by counting switch events during each active learn-
393
+ ing round. We empirically analyzed our method with exhaus-
394
+ tive experiments, and noted a clear improvement over existing
395
+ methods in in-distribution, and out-of-distribution settings.
396
+
397
+ 60
398
+ 55
399
+ 50
400
+ FALSE
401
+ FALSE
402
+ FALSE
403
+ ALBL
404
+ ALBL
405
+ ALBL
406
+ 55
407
+ 50
408
+ Coreset
409
+ 45
410
+ Coreset
411
+ Coreset
412
+ Entropy
413
+ Entropy
414
+ Entropy
415
+ 50
416
+ Least Conf.
417
+ 45
418
+ Least Conf.
419
+ Least Conf.
420
+ 40
421
+ 45
422
+ Accuracy
423
+ 35
424
+ 35
425
+ 30
426
+ 30
427
+ 30
428
+ 25
429
+ 25
430
+ 25
431
+ 20
432
+ 20
433
+ 20
434
+ 1000
435
+ 2000
436
+ 3000
437
+ 4000
438
+ 5000
439
+ 6000
440
+ 1000
441
+ 2000
442
+ 3000
443
+ 4000
444
+ 5000
445
+ 6000
446
+ 1000
447
+ 2000
448
+ 3000
449
+ 4000
450
+ 5000
451
+ 6000
452
+ Samples
453
+ Samples
454
+ Samples6. REFERENCES
455
+ [1] Dan Hendrycks and Thomas Dietterich, “Benchmarking
456
+ neural network robustness to common corruptions and
457
+ perturbations,” Proceedings of the International Con-
458
+ ference on Learning Representations, 2019.
459
+ [2] Gukyeong Kwon, Mohit Prabhushankar, Dogancan
460
+ Temel, and Ghassan AlRegib,
461
+ “Backpropagated gra-
462
+ dient representations for anomaly detection,” in Euro-
463
+ pean Conference on Computer Vision. Springer, 2020,
464
+ pp. 206–226.
465
+ [3] Jinsol Lee and Ghassan AlRegib, “Gradients as a mea-
466
+ sure of uncertainty in neural networks,” in 2020 IEEE
467
+ International Conference on Image Processing (ICIP).
468
+ IEEE, 2020, pp. 2416–2420.
469
+ [4] Gukyeong Kwon, Mohit Prabhushankar, Dogancan
470
+ Temel, and Ghassan AlRegib,
471
+ “Novelty detection
472
+ through model-based characterization of neural net-
473
+ works,” in 2020 IEEE International Conference on Im-
474
+ age Processing (ICIP). IEEE, 2020, pp. 3179–3183.
475
+ [5] Mohit Prabhushankar and Ghassan AlRegib,
476
+ “Con-
477
+ trastive reasoning in neural networks,” arXiv preprint
478
+ arXiv:2103.12329, 2021.
479
+ [6] Dogancan Temel,
480
+ Gukyeong Kwon,
481
+ Mohit Prab-
482
+ hushankar, and Ghassan AlRegib, “Cure-tsr: Challeng-
483
+ ing unreal and real environments for traffic sign recog-
484
+ nition,” arXiv preprint arXiv:1712.02463, 2017.
485
+ [7] Charles Lehman, Dogancan Temel, and Ghassan Al-
486
+ Regib, “On the structures of representation for the ro-
487
+ bustness of semantic segmentation to input corruption,”
488
+ in 2020 IEEE International Conference on Image Pro-
489
+ cessing (ICIP). IEEE, 2020, pp. 3239–3243.
490
+ [8] Ahmad Mustafa and Ghassan AlRegib,
491
+ “Man-recon:
492
+ Manifold learning for reconstruction with deep autoen-
493
+ coder for smart seismic interpretation,” in 2021 IEEE
494
+ International Conference on Image Processing (ICIP),
495
+ 2021, pp. 2953–2957.
496
+ [9] David A Cohn, Zoubin Ghahramani, and Michael I Jor-
497
+ dan, “Active learning with statistical models,” Journal
498
+ of artificial intelligence research, vol. 4, pp. 129–145,
499
+ 1996.
500
+ [10] Dan Wang and Yi Shang, “A new active labeling method
501
+ for deep learning,” in 2014 International joint confer-
502
+ ence on neural networks (IJCNN). IEEE, 2014, pp. 112–
503
+ 119.
504
+ [11] Neil Houlsby, Ferenc Husz´ar, Zoubin Ghahramani, and
505
+ M´at´e Lengyel,
506
+ “Bayesian active learning for clas-
507
+ sification and preference learning,”
508
+ arXiv preprint
509
+ arXiv:1112.5745, 2011.
510
+ [12] Ozan Sener and Silvio Savarese, “Active learning for
511
+ convolutional neural networks: A core-set approach,”
512
+ arXiv preprint arXiv:1708.00489, 2017.
513
+ [13] Daniel Gissin and Shai Shalev-Shwartz, “Discrimina-
514
+ tive active learning,” arXiv preprint arXiv:1907.06347,
515
+ 2019.
516
+ [14] Jordan T Ash, Chicheng Zhang, Akshay Krishnamurthy,
517
+ John Langford, and Alekh Agarwal, “Deep batch active
518
+ learning by diverse, uncertain gradient lower bounds,”
519
+ arXiv preprint arXiv:1906.03671, 2019.
520
+ [15] Wei-Ning Hsu and Hsuan-Tien Lin, “Active learning by
521
+ learning,” in Twenty-Ninth AAAI conference on artificial
522
+ intelligence, 2015.
523
+ [16] Suraj Kothawade, Nathan Beck, Krishnateja Killam-
524
+ setty, and Rishabh Iyer, “Similar: Submodular informa-
525
+ tion measures based active learning in realistic scenar-
526
+ ios,” Advances in Neural Information Processing Sys-
527
+ tems, vol. 34, pp. 18685–18697, 2021.
528
+ [17] Mariya Toneva, Alessandro Sordoni, Remi Tachet des
529
+ Combes, Adam Trischler, Yoshua Bengio, and Geof-
530
+ frey J Gordon,
531
+ “An empirical study of example for-
532
+ getting during deep neural network learning,”
533
+ arXiv
534
+ preprint arXiv:1812.05159, 2018.
535
+ [18] Hippolyt Ritter, Aleksandar Botev, and David Barber,
536
+ “Online structured laplace approximations for overcom-
537
+ ing catastrophic forgetting,” in Advances in Neural In-
538
+ formation Processing Systems, 2018, pp. 3738–3748.
539
+ [19] James Kirkpatrick, Razvan Pascanu, Neil Rabinowitz,
540
+ Joel Veness, Guillaume Desjardins, Andrei A Rusu,
541
+ Kieran Milan, John Quan, Tiago Ramalho, Agnieszka
542
+ Grabska-Barwinska, et al., “Overcoming catastrophic
543
+ forgetting in neural networks,” Proceedings of the na-
544
+ tional academy of sciences, vol. 114, no. 13, pp. 3521–
545
+ 3526, 2017.
546
+ [20] Ryan Benkert, Oluwaseun Joseph Aribido, and Ghassan
547
+ AlRegib, “Explaining deep models through forgettable
548
+ learning dynamics,” in 2021 IEEE International Con-
549
+ ference on Image Processing (ICIP). IEEE, 2021, pp.
550
+ 3692–3696.
551
+ [21] Luke Nicholas Darlow, Elliot J. Crowley, Antreas Anto-
552
+ niou, and Amos J. Storkey, “CINIC-10 is not imagenet
553
+ or CIFAR-10,” CoRR, vol. abs/1810.03505, 2018.
554
+ [22] Jordan T. Ash and Ryan P. Adams, “On the difficulty
555
+ of warm-starting neural network training,” CoRR, vol.
556
+ abs/1910.08475, 2019.
557
+
EdE4T4oBgHgl3EQffQ16/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,277 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf,len=276
2
+ page_content='Citation R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
3
+ page_content=' Benkert, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
4
+ page_content=' Prabhushankar, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
5
+ page_content=' AlRegib, “Forgetful Active Learning With Switch Events: Efficient Sampling for Out-of-Distribution Data,” in IEEE International Conference on Image Processing (ICIP), Bordeaux, France, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
6
+ page_content=' 16-19 2022 Review Date of acceptance: June 2022 Bib @ARTICLE{benkert2022 ICIP, author={R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
7
+ page_content=' Benkert, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
8
+ page_content=' Prabhushankar, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
9
+ page_content=' AlRegib}, journal={IEEE International Conference on Image Processing}, title={Forgetful Active Learning With Switch Events: Efficient Sampling for Out-of-Distribution Data}, year={2022} Copyright ©2022 IEEE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
10
+ page_content=' Personal use of this material is permitted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
11
+ page_content=' Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
12
+ page_content=' Contact rbenkert3@gatech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
13
+ page_content='edu OR alregib@gatech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
14
+ page_content='edu http://ghassanalregib.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
15
+ page_content='info/ arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
16
+ page_content='05106v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
17
+ page_content='LG] 12 Jan 2023 FORGETFUL ACTIVE LEARNING WITH SWITCH EVENTS: EFFICIENT SAMPLING FOR OUT-OF-DISTRIBUTION DATA Ryan Benkert, Mohit Prabhushankar, and Ghassan AlRegib OLIVES at the Center for Signal and Information Processing, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA, 30332-0250, USA {rbenkert3, mohit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
18
+ page_content='p, alregib}@gatech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
19
+ page_content='edu ABSTRACT This paper considers deep out-of-distribution active learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
20
+ page_content=' In practice, fully trained neural networks interact randomly with out-of-distribution (OOD) inputs and map aberrant sam- ples randomly within the model representation space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
21
+ page_content=' Since data representations are direct manifestations of the training distribution, the data selection process plays a crucial role in outlier robustness.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
22
+ page_content=' For paradigms such as active learning, this is especially challenging since protocols must not only improve performance on the training distribution most effec- tively but further render a robust representation space.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
23
+ page_content=' How- ever, existing strategies directly base the data selection on the data representation of the unlabeled data which is random for OOD samples by definition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
24
+ page_content=' For this purpose, we intro- duce forgetful active learning with switch events (FALSE) - a novel active learning protocol for out-of-distribution active learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
25
+ page_content=' Instead of defining sample importance on the data representation directly, we formulate ”informativeness” with learning difficulty during training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
26
+ page_content=' Specifically, we approxi- mate how often the network “forgets” unlabeled samples and query the most “forgotten” samples for annotation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
27
+ page_content=' We report up to 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
28
+ page_content='5% accuracy improvements in over 270 experiments, including four commonly used protocols, two OOD bench- marks, one in-distribution benchmark, and three different ar- chitectures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
29
+ page_content=' Index Terms— Active Learning, Forgetting Events, Out- of-Distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
30
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
31
+ page_content=' INTRODUCTION A major issue in neural network deployment is their sensitiv- ity to unknown inputs [1, 2, 3, 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
32
+ page_content=' Within the context of deep learning, unknown inputs typically refer to samples originat- ing from acquisition setups that significantly differ from the training environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
33
+ page_content=' Due to the probabilistic nature of neu- ral network predictions, samples originating from the training environment are called in-distribution while unknown inputs are called out-of-distribution, or OOD in short.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
34
+ page_content=' In practice, OOD samples result in unpredictable or even random predic- tions and represent a major challenge for real-world deploy- ment [5, 6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
35
+ page_content=' The root cause of the perceived unpredictabil- ity lies within the structure of the model representation [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
36
+ page_content=' During training, the structure is established by imposing con- straints (through e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
37
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
38
+ page_content=' a loss function) on known training sam- ples and the training distribution is mapped to distinguish- able targets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
39
+ page_content=' During test phase, the model maps known in- distribution samples to their respective targets if they origi- nate from the same training distribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
40
+ page_content=' In contrast, OOD samples are not constrained during training and the target rep- resentation is undefined.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
41
+ page_content=' This results in unpredictable behav- ior at the test phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
42
+ page_content=' Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
43
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
44
+ page_content=' Toy example of out-of-distribution (OOD) samples within an active learning setting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
45
+ page_content=' In both active learning pro- tocols the model exhibits similar test performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
46
+ page_content=' However, the accuracy on the out-of-distribution samples significantly improves when the training set is selected with a different pro- tocol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
47
+ page_content=' A field in which OOD properties are especially impor- tant is active learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
48
+ page_content=' Active learning is a machine learning paradigm in which the model iteratively selects the training set from an unlabeled data pool to improve annotation effi- ciency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
49
+ page_content=' Due to its intuitive practicality, active learning is es- pecially popular in applications where annotations are costly and has been successfully deployed in various industrial sec- tors [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
50
+ page_content=' In active learning, out-of-distribution performance is especially relevant because it is not directly apparent from the target performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
51
+ page_content=' For instance, a model may perform significantly better on OOD data if the training set contains samples that impose constraints on outliers (Figure 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
52
+ page_content=' For this purpose, active learning protocols must not only maxi- mize performance on in-distribution data but further insure robustness on outlier distributions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
53
+ page_content=' Despite the high relevance for the field, existing active learning approaches rarely consider OOD settings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
54
+ page_content=' In fact, most strategies select the next set of training samples based on importance metrics directly derived from the model rep- resentation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
55
+ page_content=' Since model representations for OOD data are undefined by definition, this trait poses a clear inefficiency for OOD test performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
56
+ page_content=' For this purpose, we introduce FALSE - a novel query strategy that not only shows favor- able performance on in-distribution data but is further robust to OOD samples.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
57
+ page_content=' Instead of directly defining sample im- portance on model representations directly, we define impor- tance with statistics gathered from the model during training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
58
+ page_content=' Specifically, we approximate how often unlabeled samples are “forgotten” by the model and consider the “most forgot- ten” samples as the most informative.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
59
+ page_content=' We benchmark our method against four commonly used active learning proto- cols on two popular OOD benchmarks, as well as one in- distribution benchmark with three architectures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
60
+ page_content=' Overall, we note a significant improvement in terms of test accuracy on in-distribution, as well as out-of-distribution data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
61
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
62
+ page_content=' BACKGROUND AND RELATED WORK 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
63
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
64
+ page_content=' Active learning In active learning [9], the goal is to maximize generalization performance with minimal data annotations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
65
+ page_content=' We consider a dataset D, an initial training set Dtrain, as well as an unla- beled data pool Dpool from which we select the next sam- ple batch for the training set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
66
+ page_content=' For batch active learning, the algorithm selects a batch of b samples X∗ = {x∗ 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
67
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
68
+ page_content=', x∗ b} that are the most informative based on a predefined defini- tion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
69
+ page_content=' The selection of X∗ is called the query strategy and typ- ically queries the batch that maximizes the acquisition func- tion a(x1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
70
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
71
+ page_content=', xb|fw), where fw represents the deep neural network with parameters w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
72
+ page_content=' In active learning, the definition of importance is encoded within the acquisition function a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
73
+ page_content=' In this regard, typical approaches involve querying samples that are the most difficult for generalization [10, 11], maxi- mize data diversity [12, 13], or perform a mixture of general- ization difficulty and data diversity [14, 15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
74
+ page_content=' Even though a large variety of strategies exist, they define sample importance on the representation manifold directly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
75
+ page_content=' Since representations are notoriously unpredictable for OOD data this characteris- tic represents a clear inefficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
76
+ page_content=' Apart from rare exceptions [16], out-of-distribution active learning settings are not con- sidered in existing literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
77
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
78
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
79
+ page_content=' Forgetting Events Our approach most closely relates to the study of continual learning or more specifically catastrophic forgetting [17, 18, 19, 20].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
80
+ page_content=' While several papers study forgetting in the con- text of different target tasks [18, 19], other papers focus on forgetting within a single task [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
81
+ page_content=' Within the context of active learning, we define informativeness with learning dif- ficulty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
82
+ page_content=' Specifically, we say a sample is informative if it was “forgotten” frequently during the training process and there- fore difficult to learn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
83
+ page_content=' Within the context of deep learning, a sample is considered “forgotten” if it was correctly classified (“learned”) at time t and misclassified (“forgotten”) at a later time t′ > t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
84
+ page_content=' More formally, we consider recognition tasks where the model calculates a prediction ˜yi for each sample xi where the model prediction is correct when ˜yi is equal to the ground truth label yi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
85
+ page_content=' The accuracy of a sample at epoch t can be expressed as ct i = 1˜yt i=yi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
86
+ page_content=' (1) Here, 1˜yt i=yi represents a binary variable that reduces to one if the model prediction is correct and zero otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
87
+ page_content=' We further define a sample as “forgotten” if the accuracy de- creases in two subsequent epochs: et i = int(ct i < ct−1 i ) ∈ 1, 0 (2) Similar to [17], we call the binary event et i a forgetting event.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
88
+ page_content=' Within the context of active learning, we quantify in- formativeness by the amount of forgetting events that occur for a given sample each active learning round.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
89
+ page_content=' In contrast to existing literature, our definition of sample importance is not directly dependent on the data representation of the model but relies on artifacts from representation shifts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
90
+ page_content=' We reason that this characteristic is potentially favorable for out-of distribu- tion active learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
91
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
92
+ page_content=' FORGETFUL ACTIVE LEARNING WITH SWITCH EVENTS Even though forgetting events are simple to formulate and do not rely on the representation directly, the computation is not tractable in practice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
93
+ page_content=' Specifically, the accuracy evaluation in Equation 1 requires labels which are not present in Dpool by definition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
94
+ page_content=' To alleviate this issue, we approximate forgetting Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
95
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
96
+ page_content=' Workflow of FALSE.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
97
+ page_content=' Within the active learning round N, we gather switch events for every samples in Dpool and aggregate them over all epochs K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
98
+ page_content=' Subsequently.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
99
+ page_content=' we query b samples with the most switch events.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
100
+ page_content=' events with prediction switches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
101
+ page_content=' A prediction switch occurs when the prediction of the model changes between two sub- sequent epochs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
102
+ page_content=' Formally, we write st i = int(˜yt i ̸= ˜yt−1 i ) ∈ 1, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
103
+ page_content=' (3) Similar to our previous definition, we call the binary event st i a switch event at time t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
104
+ page_content=' Since samples with a larger amount of switch events are considered more informative, we select the batch X∗ with the most switch events in each round: X∗ = argmax x1,.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
105
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
106
+ page_content=',xb∈Dpool Σb i=1ΣK t=1st i (4) Here, K refers to the total amount of epochs during an active learning round.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
107
+ page_content=' We call our method Forgetful Active Learning with Switch Events or FALSE in short.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
108
+ page_content=' We show the workflow during each active learning round in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
109
+ page_content=' First, we count the switch events for every sample in Dpool occurring within round N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
110
+ page_content=' Subsequently, we select b samples with the most switch events and append them to the training set Dtrain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
111
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
112
+ page_content=' EXPERIMENTS 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
113
+ page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
114
+ page_content=' Experimental Setup We compare FALSE to four popular strategies in active learn- ing literature: Entropy sampling [10], coreset [12], least con- fidence sampling [10], and active learning by learning [15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
115
+ page_content=' We choose this constellation as it contains two strategies based on generalization difficulty (entropy and least confi- dence sampling), one based on data diversity (coreset), and a hybrid protocol that combines generalization difficulty and Algorithms CIFAR10-C CINIC10 CIFAR10 ResNet-18 FALSE 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
116
+ page_content='85 18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
117
+ page_content='06 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
118
+ page_content='80 ALBL [15] 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
119
+ page_content='19 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
120
+ page_content='66 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
121
+ page_content='25 Coreset [12] 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
122
+ page_content='87 35.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
123
+ page_content='07 41.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
124
+ page_content='04 Entropy [10] 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
125
+ page_content='83 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
126
+ page_content='58 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
127
+ page_content='45 L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
128
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
129
+ page_content=' [10] 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
130
+ page_content='23 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
131
+ page_content='47 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
132
+ page_content='93 DenseNet-121 FALSE 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
133
+ page_content='92 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
134
+ page_content='50 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
135
+ page_content='47 ALBL [15] 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
136
+ page_content='69 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
137
+ page_content='67 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
138
+ page_content='28 Coreset [12] 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
139
+ page_content='40 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
140
+ page_content='36 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
141
+ page_content='74 Entropy [10] 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
142
+ page_content='77 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
143
+ page_content='52 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
144
+ page_content='76 L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
145
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
146
+ page_content=' [10] 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
147
+ page_content='20 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
148
+ page_content='81 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
149
+ page_content='57 ResNet-34 FALSE 22.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
150
+ page_content='20 23.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
151
+ page_content='30 27.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
152
+ page_content='45 ALBL [15] 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
153
+ page_content='56 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
154
+ page_content='67 13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
155
+ page_content='96 Coreset [12] 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
156
+ page_content='25 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
157
+ page_content='18 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
158
+ page_content='21 Entropy [10] 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
159
+ page_content='80 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
160
+ page_content='31 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
161
+ page_content='51 L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
162
+ page_content=' Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
163
+ page_content=' [10] 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
164
+ page_content='52 16.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
165
+ page_content='60 15.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
166
+ page_content='99 Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
167
+ page_content=' Area under difference curve with reference to ran- dom sampling over several datasets, query strategies, and ar- chitectures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
168
+ page_content=' Positive, and higher numbers are better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
169
+ page_content=' Negative numbers imply that the strategy has a lower accuracy curve than the random baseline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
170
+ page_content=' data diversity by switching between the coreset and least con- fidence strategy (active learning by learning).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
171
+ page_content=' For our OOD experiments, we consider CIFAR10-C [1] (a corrupted ver- sion of CIFAR10), as well as CINIC10 [21] (a larger dataset with the same classes as CIFAR10).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
172
+ page_content=' In addition, we validate on the CIFAR10 in-distribution test set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
173
+ page_content=' In all experiments, we train on the CIFAR10 training set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
174
+ page_content=' For CIFAR10-C, we test on all corruptions except ”labels”, ”shot noise”, and ”speckle noise”, and consider the difficulty levels 2 and 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
175
+ page_content=' st = int(yt ±yt-1)Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
176
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
177
+ page_content=' FALSE in comparison to different query strategies on the level 2 CIFAR10-C [1] corruptions “JPEG Compression”, “Elastic Transform”, and “Implulse Noise”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
178
+ page_content=' We compare FALSE to active learning by learning (ALBL), coreset, least confi- dence sampling (Least Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
179
+ page_content=' ), and entropy sampling (Entropy).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
180
+ page_content=' We choose this setup as it considers 17 realistic corruptions at an intermediate, as well as high difficulty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
181
+ page_content=' For CINIC10, we test on the CINIC10 test set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
182
+ page_content=' We start with an initial training pool size of randomly chosen 128 samples and query 1024 samples each round.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
183
+ page_content=' Since query strategy performance can be sensitive to architecture choices, we perform our experi- ments on resnet-18, resnet-34, as well as densenet-121.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
184
+ page_content=' We optimize with the adam variant of SGD with a learning rate of 1e − 4 and train our models until a training accuracy of 98% is reached.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
185
+ page_content=' Furthermore, we use pretrained model weights each round as this represents a realistic practical scenario where data may be redundant in one domain but scarce in an- other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
186
+ page_content=' Finally, we retrain our model form scratch each round to prevent warm starting [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
187
+ page_content=' Due to space limitations, we show the learning curves of three level 2 corruptions of the CIFAR10-C dataset in Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
188
+ page_content=' Additionally, we summarize the performance of each protocol over the first 20 rounds by calculating the curve distance to randomly selecting samples each round (Table 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
189
+ page_content=' For each experiment constellation, we subtract the accuracy curve of the respective strategy from the random selection baseline curve and calculate the area under the difference curve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
190
+ page_content=' In other words, the table shows the distance of each strategy to randomly selecting samples each round.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
191
+ page_content=' A negative result implies that the strategy is overall worse than random selection, while a higher score means that the respective strategy outperforms random selec- tion by a larger margin over the first 20 rounds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
192
+ page_content=' All results are averaged over five random seeds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
193
+ page_content=' In total, this amounts to 270 separate active learning experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
194
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
195
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
196
+ page_content=' Discussion From both Figure 3 and Table 1 we observe that FALSE is a good choice for OOD active learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
197
+ page_content=' In particular, we observe that FALSE is especially favorable in early rounds where few labeled data samples are available for training.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
198
+ page_content=' We reason that the lack of training samples results in insuffi- ciently calibrated representations and the importance rankings are more inaccurate when defined on the representation di- rectly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
199
+ page_content=' For later rounds, enough training samples are available to learn a more conclusive representation and FALSE outper- forms by a smaller margin (Figure 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
200
+ page_content=' On average, we observe up to 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
201
+ page_content='5% improvements in accuracy across existing strate- gies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
202
+ page_content=' We further note, that FALSE is more robust to different datasets and architectures for both in-distribution and OOD experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
203
+ page_content=' In Table 1, we see that FALSE consistently outperforms random selection by a large margin over differ- ent datasets and architectures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
204
+ page_content=' This is evident in the consis- tent large area under the difference curve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
205
+ page_content=' In contrast several strategies, outperform random selection on some datasets or architectures but match or underperform the baseline in other settings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
206
+ page_content=' For instance, least confidence sampling exhibits a high area score on CIFAR10-C when resnet-34 is used, but slightly underperforms the random baseline with densenet- 121.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
207
+ page_content=' Furthermore, entropy sampling performs well on the in- distribution test set when resnet-34 is used but underperforms random by a significant margin when densenet-121 is used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
208
+ page_content=' We further observe, that FALSE also shows the strongest per- formance overall.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
209
+ page_content=' This is evident in the largest area across all settings in Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
210
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
211
+ page_content=' CONCLUSION In this paper, we introduced FALSE as a novel query strat- egy for OOD active learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
212
+ page_content=' Specifically, we derived ”infor- mativeness” from the learning dynamics during training time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
213
+ page_content=' We approximated how often the network ”forgot” unlabeled samples by counting switch events during each active learn- ing round.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
214
+ page_content=' We empirically analyzed our method with exhaus- tive experiments, and noted a clear improvement over existing methods in in-distribution, and out-of-distribution settings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
215
+ page_content=' 60 55 50 FALSE FALSE FALSE ALBL ALBL ALBL 55 50 Coreset 45 Coreset Coreset Entropy Entropy Entropy 50 Least Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
216
+ page_content=' 45 Least Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
217
+ page_content=' Least Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
218
+ page_content=' 40 45 Accuracy 35 35 30 30 30 25 25 25 20 20 20 1000 2000 3000 4000 5000 6000 1000 2000 3000 4000 5000 6000 1000 2000 3000 4000 5000 6000 Samples Samples Samples6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
219
+ page_content=' REFERENCES [1] Dan Hendrycks and Thomas Dietterich, “Benchmarking neural network robustness to common corruptions and perturbations,” Proceedings of the International Con- ference on Learning Representations, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
220
+ page_content=' [2] Gukyeong Kwon, Mohit Prabhushankar, Dogancan Temel, and Ghassan AlRegib, “Backpropagated gra- dient representations for anomaly detection,” in Euro- pean Conference on Computer Vision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
221
+ page_content=' Springer, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
222
+ page_content=' 206–226.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
223
+ page_content=' [3] Jinsol Lee and Ghassan AlRegib, “Gradients as a mea- sure of uncertainty in neural networks,” in 2020 IEEE International Conference on Image Processing (ICIP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
224
+ page_content=' IEEE, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
225
+ page_content=' 2416–2420.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
226
+ page_content=' [4] Gukyeong Kwon, Mohit Prabhushankar, Dogancan Temel, and Ghassan AlRegib, “Novelty detection through model-based characterization of neural net- works,” in 2020 IEEE International Conference on Im- age Processing (ICIP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
227
+ page_content=' IEEE, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
228
+ page_content=' 3179–3183.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
229
+ page_content=' [5] Mohit Prabhushankar and Ghassan AlRegib, “Con- trastive reasoning in neural networks,” arXiv preprint arXiv:2103.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
230
+ page_content='12329, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
231
+ page_content=' [6] Dogancan Temel, Gukyeong Kwon, Mohit Prab- hushankar, and Ghassan AlRegib, “Cure-tsr: Challeng- ing unreal and real environments for traffic sign recog- nition,” arXiv preprint arXiv:1712.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
232
+ page_content='02463, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
233
+ page_content=' [7] Charles Lehman, Dogancan Temel, and Ghassan Al- Regib, “On the structures of representation for the ro- bustness of semantic segmentation to input corruption,” in 2020 IEEE International Conference on Image Pro- cessing (ICIP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
234
+ page_content=' IEEE, 2020, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
235
+ page_content=' 3239–3243.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
236
+ page_content=' [8] Ahmad Mustafa and Ghassan AlRegib, “Man-recon: Manifold learning for reconstruction with deep autoen- coder for smart seismic interpretation,” in 2021 IEEE International Conference on Image Processing (ICIP), 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
237
+ page_content=' 2953–2957.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
238
+ page_content=' [9] David A Cohn, Zoubin Ghahramani, and Michael I Jor- dan, “Active learning with statistical models,” Journal of artificial intelligence research, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
239
+ page_content=' 4, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
240
+ page_content=' 129–145, 1996.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
241
+ page_content=' [10] Dan Wang and Yi Shang, “A new active labeling method for deep learning,” in 2014 International joint confer- ence on neural networks (IJCNN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
242
+ page_content=' IEEE, 2014, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
243
+ page_content=' 112– 119.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
244
+ page_content=' [11] Neil Houlsby, Ferenc Husz´ar, Zoubin Ghahramani, and M´at´e Lengyel, “Bayesian active learning for clas- sification and preference learning,” arXiv preprint arXiv:1112.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
245
+ page_content='5745, 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
246
+ page_content=' [12] Ozan Sener and Silvio Savarese, “Active learning for convolutional neural networks: A core-set approach,” arXiv preprint arXiv:1708.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
247
+ page_content='00489, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
248
+ page_content=' [13] Daniel Gissin and Shai Shalev-Shwartz, “Discrimina- tive active learning,” arXiv preprint arXiv:1907.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
249
+ page_content='06347, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
250
+ page_content=' [14] Jordan T Ash, Chicheng Zhang, Akshay Krishnamurthy, John Langford, and Alekh Agarwal, “Deep batch active learning by diverse, uncertain gradient lower bounds,” arXiv preprint arXiv:1906.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
251
+ page_content='03671, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
252
+ page_content=' [15] Wei-Ning Hsu and Hsuan-Tien Lin, “Active learning by learning,” in Twenty-Ninth AAAI conference on artificial intelligence, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
253
+ page_content=' [16] Suraj Kothawade, Nathan Beck, Krishnateja Killam- setty, and Rishabh Iyer, “Similar: Submodular informa- tion measures based active learning in realistic scenar- ios,” Advances in Neural Information Processing Sys- tems, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
254
+ page_content=' 34, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
255
+ page_content=' 18685–18697, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
256
+ page_content=' [17] Mariya Toneva, Alessandro Sordoni, Remi Tachet des Combes, Adam Trischler, Yoshua Bengio, and Geof- frey J Gordon, “An empirical study of example for- getting during deep neural network learning,” arXiv preprint arXiv:1812.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
257
+ page_content='05159, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
258
+ page_content=' [18] Hippolyt Ritter, Aleksandar Botev, and David Barber, “Online structured laplace approximations for overcom- ing catastrophic forgetting,” in Advances in Neural In- formation Processing Systems, 2018, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
259
+ page_content=' 3738–3748.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
260
+ page_content=' [19] James Kirkpatrick, Razvan Pascanu, Neil Rabinowitz, Joel Veness, Guillaume Desjardins, Andrei A Rusu, Kieran Milan, John Quan, Tiago Ramalho, Agnieszka Grabska-Barwinska, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
261
+ page_content=', “Overcoming catastrophic forgetting in neural networks,” Proceedings of the na- tional academy of sciences, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
262
+ page_content=' 114, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
263
+ page_content=' 13, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
264
+ page_content=' 3521– 3526, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
265
+ page_content=' [20] Ryan Benkert, Oluwaseun Joseph Aribido, and Ghassan AlRegib, “Explaining deep models through forgettable learning dynamics,” in 2021 IEEE International Con- ference on Image Processing (ICIP).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
266
+ page_content=' IEEE, 2021, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
267
+ page_content=' 3692–3696.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
268
+ page_content=' [21] Luke Nicholas Darlow, Elliot J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
269
+ page_content=' Crowley, Antreas Anto- niou, and Amos J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
270
+ page_content=' Storkey, “CINIC-10 is not imagenet or CIFAR-10,” CoRR, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
271
+ page_content=' abs/1810.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
272
+ page_content='03505, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
273
+ page_content=' [22] Jordan T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
274
+ page_content=' Ash and Ryan P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
275
+ page_content=' Adams, “On the difficulty of warm-starting neural network training,” CoRR, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
276
+ page_content=' abs/1910.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
277
+ page_content='08475, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/EdE4T4oBgHgl3EQffQ16/content/2301.05106v1.pdf'}
FdE3T4oBgHgl3EQfVwo4/content/tmp_files/2301.04462v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
FdE3T4oBgHgl3EQfVwo4/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ItE4T4oBgHgl3EQfIgwL/content/tmp_files/2301.04912v1.pdf.txt ADDED
@@ -0,0 +1,789 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04912v1 [astro-ph.SR] 12 Jan 2023
2
+ MNRAS 000, 1–5 (2022)
3
+ Preprint 13 January 2023
4
+ Compiled using MNRAS LATEX style file v3.0
5
+ δ Scuti pulsations in the bright Pleiades eclipsing binary HD 23642
6
+ John Southworth 1, S. J. Murphy2, K. Pavlovski3
7
+ 1 Astrophysics Group, Keele University, Staffordshire, ST5 5BG, UK
8
+ 2 Centre for Astrophysics, University of Southern Queensland, Toowoomba, QLD 4350, Australia
9
+ 3 Department of Physics, Faculty of Science, University of Zagreb, Bijenicka cesta 32, 10000 Zagreb, Croatia
10
+ Accepted XXX. Received YYY; in original form ZZZ
11
+ ABSTRACT
12
+ We announce the discovery of pulsations in HD 23642, the only bright eclipsing system in the Pleiades, based on light curves
13
+ from the Transiting Exoplanet Survey Satellite (TESS). We measure 46 pulsation frequencies and attribute them to δ Scuti
14
+ pulsations in the secondary component. We find four ℓ = 1 doublets, three of which have frequency splittings consistent with
15
+ the rotation rate of the star. The dipole mode amplitude ratios are consistent with a high stellar inclination angle and the stellar
16
+ rotation period agrees with the orbital period. Together, these suggest that the spin axis of the secondary is aligned with the
17
+ orbital axis. We also determine precise effective temperatures and a spectroscopic light ratio, and use the latter to determine the
18
+ physical properties of the system alongside the TESS data and published radial velocities. We measure a distance to the system
19
+ in agreement with the Gaia parallax, and an age of 170 ± 20 Myr based on a comparison to theoretical stellar evolutionary
20
+ models.
21
+ Key words: stars: fundamental parameters — stars: binaries: eclipsing — stars: oscillations
22
+ 1 INTRODUCTION
23
+ The Pleiades is one of the closest and most extensively studied star
24
+ clusters, containing ∼1300 stars at a distance of 136 pc (Melis et al.
25
+ 2014; Heyl et al. 2022). It is a benchmark for studying theoreti-
26
+ cal modelling (e.g. Vandenberg & Bridges 1984) the kinematics of
27
+ star clusters (Lodieu et al. 2019), binarity (Torres et al. 2021), pul-
28
+ sations (Murphy et al. 2022), rotation (Rebull et al. 2016), and the
29
+ connection between rotation, lithium depletion and stellar inflation
30
+ (Somers & Pinsonneault 2015; Bouvier et al. 2018).
31
+ Eclipsing binary stars (EBs) are another crucial research area
32
+ for improving our understanding of stellar evolution (Torres et al.
33
+ 2010). The masses, radii and effective temperatures (Teffs)
34
+ of stars can be determined to precisions approaching 0.2%
35
+ (Maxted et al. 2020; Miller et al. 2020), allowing their use as checks
36
+ and calibrators of theoretical models (e.g. Claret & Torres 2018;
37
+ Tkachenko et al. 2020). In particular, EBs in open clusters are entic-
38
+ ing targets for multiple scientific goals (e.g. Southworth et al. 2004a;
39
+ Brogaard et al. 2011; Torres et al. 2018).
40
+ A third phenomenon well suited to extending our understanding
41
+ of stellar physics is that of pulsations. δ Scuti stars pulsate in pres-
42
+ sure modes of low radial order (n ∼ 1 . . . 10) that are mostly sen-
43
+ sitive to the stellar envelope (Aerts et al. 2010; Kurtz 2022). These
44
+ modes probe the stellar density, making them good indicators of age
45
+ (Aerts 2015), especially when mass and/or metallicity are already
46
+ constrained. Recently, the discovery that δ Scuti stars pulsate in reg-
47
+ ular patterns (Bedding et al. 2020) has allowed pulsation modes to
48
+ be identified in many stars (e.g. Kerr et al. 2022; Currie et al. 2022),
49
+ including five members of the Pleiades (Murphy et al. 2022), facili-
50
+ tating detailed asteroseismic modelling. In some cases, this confers
51
+ an age precision better than 10% (Murphy et al. 2021).
52
+ HD 23642 (V1229 Tau, HII 1431) was found to be a double-
53
+ lined spectroscopic binary by Pearce (1957) and Abt (1958). Its
54
+ eclipsing nature was announced independently by Miles (1999)
55
+ and Torres (2003) using data from the Hipparcos satellite. De-
56
+ tailed analyses of the system using ground-based data have been
57
+ presented by Griffin (1995); Torres (2003); Munari et al. (2004);
58
+ Southworth et al. (2005) and Groenewegen et al. (2007). HD 23642
59
+ was observed in long cadence mode by the K2 satellite (Howell et al.
60
+ 2014) in Campaign 41. An analysis of these data was presented by
61
+ David et al. (2016).
62
+ In this work we present the discovery of δ Scuti pulsations in this
63
+ important EB and determine the physical properties of the system to
64
+ high precision for the first time. We note that independent detections
65
+ are presented by Chen et al. (2022) without detailed analysis, and
66
+ by Bedding et al. (2023). Section 2 in the current work outlines the
67
+ observations used, Sections 3 and 4 present our spectroscopic and
68
+ photometric analyses, Section 5 is dedicated to the pulsation analy-
69
+ sis, and our work is concluded in Section 6.
70
+ 2 OBSERVATIONS
71
+ HD 23642 was observed using the TESS mission (Ricker et al.
72
+ 2015) in three consecutive sectors (42–44) covering 76 days
73
+ (2021/08/20 to 2021/11/06), at a cadence of 120 s. We downloaded
74
+ the data from the Mikulski Archive for Space Telescopes (MAST)
75
+ archive and extracted the simple aperture photometry (SAP) from
76
+ the FITS files (Jenkins et al. 2016); the PDCSAP data are practically
77
+ identical. We included only the data with a QUALITY flag of zero,
78
+ totalling 44 438 points, and converted them into differential magni-
79
+ tude. The data errors were not used as they were much smaller than
80
+ 1 HD 23642 was requested as a target by nine Guest Observer proposals
81
+ including GO4028 (PI Southworth) and GO4035 (PI Murphy).
82
+ © 2022 The Authors
83
+
84
+ 2
85
+ Southworth et al.
86
+ Figure 1. TESS simple aperture photometry (SAP) light curve of HD 23642. The sectors are labelled.
87
+ the scatter of the measurements. The full TESS data are shown in
88
+ Fig. 1.
89
+ We observed HD 23642 during two observing runs in Novem-
90
+ ber 2006 using the Nordic Optical Telescope (NOT) and its FIbre
91
+ Echelle Spectrograph (FIES). A total of 27 échelle spectra were ob-
92
+ tained using the medium-resolution fibre in bundle A, which covered
93
+ 364–736 nm with a resolving power of R ≈ 47 000. Exposure times
94
+ of 600 s yielded a signal to noise ratio (S/N) of approximately 200,
95
+ although some spectra had a lower S/N due to cloudy conditions.
96
+ The data were reduced using IRAF échelle package routines, with
97
+ particular care taken in the normalisation and merging of the échelle
98
+ orders (Kolbas et al. 2015).
99
+ 3 SPECTROSCOPIC ANALYSIS
100
+ We first sought to measure the spectroscopic parameters of the two
101
+ stars, in particular their Teffs and light ratio. To do this we applied
102
+ the method of spectral disentangling (Simon & Sturm 1994) using
103
+ the Fourier approach (Hadrava 1995) and concentrating on the 650-
104
+ 670 nm spectral range which includes the Hα line. This wavelength
105
+ interval is contaminated by telluric lines, which we removed before
106
+ the disentangling process. We used the FDBINARY code (Iliji´c et al.
107
+ 2004) and our standard methods (Pavlovski & Hensberge 2010;
108
+ Pavlovski et al. 2018). We also fixed the velocity amplitudes of the
109
+ stars to the values measured by Torres et al. (2021), so effectively
110
+ ran in spectral separation mode.
111
+ The Hα profiles of the two stars were then modelled to deter-
112
+ mine the Teffs and light ratio. We fixed the surface gravities and ro-
113
+ tational velocities of the stars to the values determined in Section 4,
114
+ thus avoiding the degeneracy between Teff and log g present in the
115
+ Balmer lines of hot stars. This approach required us to iterate our
116
+ analysis with that described in Section 4 to ensure internal consis-
117
+ tency; the iteration converged within one step. Optimal fitting was
118
+ performed with the STARFIT code (Kolbas et al. 2015), which uses a
119
+ genetic algorithm to search for the best fit within a grid of synthetic
120
+ spectra pre-calculated using the UCLSYN code (Smalley et al. 2001).
121
+ The fractional light contributions of the two components were forced
122
+ to sum to unity (Tamajo et al. 2011) and only the wings of the Hα
123
+ line were fitted (with metallic lines masked). The uncertainties were
124
+ calculated using the MCMC approach described in Pavlovski et al.
125
+ (2018).
126
+ We found Teffs of 10 200 ± 90 K and 7670 ± 85 K for the two
127
+ stars, and a light ratio of ℓB/ℓA(Hα) = 0.313±0.010. HD 23642 A
128
+ is known to be chemically peculiar: Abt & Levato (1978) classified
129
+ its spectrum as A0Vp(Si) + Am. Our light ratio should not be af-
130
+ fected by this because it was obtained from only the Hα line. We
131
+ propagated it to the TESS passband using BT-Settl theoretical spec-
132
+ tra (Allard et al. 2012) to obtain ℓB/ℓA(TESS) = 0.328 ± 0.011
133
+ where the errorbar includes the contributions from ℓB/ℓA(Hα) and
134
+ both Teffs.
135
+ 4 LIGHT CURVE AND PHYSICAL PROPERTIES
136
+ The light curve of HD 23642 shows shallow partial eclipses and
137
+ clear reflection and ellipsoidal effects. The stars are well-separated
138
+ and the system is suitable for analysis with the JKTEBOP code
139
+ (Southworth et al. 2004b; Southworth 2013), for which we used ver-
140
+ sion 43. We fitted for the fractional radii of the stars in the form of
141
+ their sum (rA + rB) and ratio (k = rB/rA), the orbital inclina-
142
+ tion (i), the central surface brightness ratio of the two stars (J), the
143
+ amount of third light (L3), the reference time of mid-eclipse (T0),
144
+ and the orbital period (P). Limb darkening was included using the
145
+ power-2 law (Hestroffer 1997) with the scaling coefficient for each
146
+ star (c1 and c2) fitted and the power-law coefficients (α1 and α2)
147
+ fixed at values from Claret & Southworth (2022). We also included
148
+ one quadratic function per TESS half-sector to normalise the light
149
+ curve to zero differential magnitude, to allow for the possibility of
150
+ slow drifts in brightness for either instrumental or astrophysical rea-
151
+ sons. The pulsations are of much lower amplitude than the eclipses
152
+ so were treated as red noise. A circular orbit was assumed.
153
+ Our initial solutions gave measurements of the fractional radii
154
+ to a disappointing precision. This is caused by the ratio of the
155
+ radii being poorly determined for shallow partial eclipses, a well-
156
+ known phenomenon that has been noted before for this system
157
+ (Southworth et al. 2005; David et al. 2016). We therefore imposed
158
+ the spectroscopic light ratio from Section 3 as a Gaussian prior in
159
+ our solution. This significantly improved the precision of the fitted
160
+ parameters, and is the only viable approach in a system like this
161
+ with shallow partial eclipses and a noise limit set by the presence of
162
+ pulsations. Uncertainties in the fitted parameters were determined
163
+ by Monte Carlo and residual-permutation simulations (Southworth
164
+ 2008), taking the larger of the two options for each quantity. The
165
+ values and uncertainties of the parameters are given in Table 1. We
166
+ have added an extra uncertainty of ±0.0010 in quadrature to the un-
167
+ certainties in rA and rB to account for the variations in these param-
168
+ MNRAS 000, 1–5 (2022)
169
+
170
+ Pulsations in Pleiades eclipsing binary HD 23642
171
+ 3
172
+ Figure 2. A short section of the TESS light curve, chosen at random, is shown (blue points) along with the JKTEBOP best fit (red line). The residuals are
173
+ displayed offset to the base of the figure and magnified by a factor of 5 to make the pulsations visible.
174
+ Table 1. Properties of the HD 23642 system. The velocity amplitudes K are
175
+ from Torres et al. (2021).
176
+ Quantity and unit
177
+ Star A
178
+ Star B
179
+ Spectroscopic parameters:
180
+ K ( km s−1)
181
+ 100.07 ± 0.23
182
+ 142.60 ± 0.28
183
+ Teff (K)
184
+ 10200 ± 90
185
+ 7670 ± 85
186
+ Light ratio at Hα
187
+ 0.313 ± 0.010
188
+ Light ratio in TESS passband
189
+ 0.328 ± 0.011
190
+ JKTEBOP analysis:
191
+ rA + rB
192
+ 0.2664 ± 0.0011
193
+ k
194
+ 0.784 ± 0.012
195
+ i (◦)
196
+ 78.63 ± 0.09
197
+ J
198
+ 0.5561 ± 0.0011
199
+ ℓ3
200
+ 0.029 ± 0.014
201
+ c
202
+ 0.52 fixed
203
+ 0.63 fixed
204
+ α
205
+ 0.45 fixed
206
+ 0.42 fixed
207
+ P (d)
208
+ 2.46113223 ± 0.00000060
209
+ T0 (BJDTDB)
210
+ 2459509.282357 ± 0.000007
211
+ Fractional radii
212
+ 0.1494 ± 0.0016
213
+ 0.1171 ± 0.0017
214
+ Physical properties:
215
+ Mass (MN
216
+ ⊙)
217
+ 2.273 ± 0.011
218
+ 1.595 ± 0.008
219
+ Radius (MN
220
+ ⊙)
221
+ 1.799 ± 0.019
222
+ 1.410 ± 0.021
223
+ log g (c.g.s.)
224
+ 4.285 ± 0.009
225
+ 4.342 ± 0.13
226
+ Vsynch ( km s−1)
227
+ 36.98 ± 0.40
228
+ 28.99 ± 0.42
229
+ Luminosity log(L/LN
230
+ ⊙)
231
+ 1.499 ± 0.018
232
+ 0.792 ± 0.023
233
+ Reddening EB−V (mag)
234
+ 0.040 ± 0.010
235
+ K-band distance (pc)
236
+ 134.7 ± 2.0
237
+ eters between different model choices, specifically about whether or
238
+ not to fit for L3 or limb darkening.
239
+ We determined the physical properties of the system from the re-
240
+ sults of the JKTEBOP analysis and the velocity amplitudes of the
241
+ stars measured by Torres et al. (2021). This was done using the JK-
242
+ TABSDIM code (Southworth et al. 2005) modified to report results
243
+ on the IAU scale (Prša et al. 2016). The full set of measured sys-
244
+ tem properties are given in Table 1. Our masses are in good agree-
245
+ ment with those found by other authors, with minor differences due
246
+ to the newer velocity amplitudes adopted. The rotational velocities
247
+ of the stars determined by Southworth et al. (2005), 37 ± 2 and
248
+ 33 ± 3 km s−1, are in agreement with the synchronous values, sug-
249
+ gesting that both stars are rotating synchronously.
250
+ The measured radii, however, are significantly different from
251
+ previous
252
+ values
253
+ (Munari et al.
254
+ 2004;
255
+ Southworth et al.
256
+ 2005;
257
+ Groenewegen et al. 2007; David et al. 2016) in the sense that RA
258
+ is larger and RB is smaller. This solves an existing problem with
259
+ HD 23642 B, which was previously found to be significantly larger
260
+ than predicted by theoretical evolutionary models for the Pleiades’
261
+ age and metallicity. We attribute this change to differences in the
262
+ spectroscopic light ratios adopted in those studies, which are slightly
263
+ larger than the one measured in the current work. Both components
264
+ of HD 23642 are known to be chemically peculiar so light ratios de-
265
+ termined from metal lines are unreliable. Our new light ratio should
266
+ be preferred because it is based on the Hα line so is not affected by
267
+ the chemical peculiarity, and is also close to the wavelengths trans-
268
+ mitted by the TESS passband. A visual comparison of the masses,
269
+ radii and Teffs of the primary star to predictions from the PAR-
270
+ SEC evolutionary models (Bressan et al. 2012) for solar metallicity
271
+ shows good agreement for an age of 170 ± 20 Myr. We note that
272
+ this is at the upper limit of accepted ages of the Pleiades cluster
273
+ (Gossage et al. 2018; Murphy et al. 2022). The secondary compo-
274
+ nent is 1.5σ smaller than expected: further investigation is needed to
275
+ understand this.
276
+ To determine the distance (d) and interstellar reddening (EB−V )
277
+ to the system we used the BV apparent magnitudes from the Ty-
278
+ cho satellite (Høg et al. 2000), the JHKs apparent magnitudes
279
+ from 2MASS (Skrutskie et al. 2006) converted into the Johnson
280
+ system using transformations from Carpenter (2001), and bolomet-
281
+ ric corrections from Girardi et al. (2002). We determined the value
282
+ of EB−V that results in consistent distances across the BV JHK
283
+ bands, finding EB−V
284
+ =
285
+ 0.040 ± 0.010 and d
286
+ =
287
+ 134.7 ±
288
+ 2.0 pc. This distance is slightly shorter than the 138.3 ± 0.1 pc
289
+ determined by simple inversion of the parallax from Gaia EDR3
290
+ (Gaia Collaboration 2021). This EB−V is specific to HD 23642, is
291
+ consistent with previous studies (Taylor 2008), and is not affected
292
+ by reddening variations between Pleiades members.
293
+ 5 ANALYSIS OF THE PULSATIONS
294
+ The residual light curve after subtraction of the JKTEBOP model
295
+ shows several pulsation modes at the 0.1 mmag level (Fig. 3). We
296
+ used the PERIOD04 code (Lenz & Breger 2004) to extract 46 pulsa-
297
+ tions at frequencies f > 20 d−1 down to 0.015 mmag amplitude,
298
+ and used non-linear least squares to optimise the frequencies. The
299
+ table of frequencies is given in the Appendix. From the frequencies
300
+ MNRAS 000, 1–5 (2022)
301
+
302
+ 4
303
+ Southworth et al.
304
+ Figure 3. Fourier transform of the light curve residuals, after subtracting the eclipse model, revealing several pulsations at the 0.1 mmag level. Mode identifica-
305
+ tions (Section 5) are overlaid, showing radial modes as well as a series of rotationally split dipole modes.
306
+ and Teffs of the stars we deduce that they represent δ Scuti pulsa-
307
+ tions in the secondary component, as the primary is hotter than the
308
+ δ Scuti instability strip.
309
+ We used the ECHELLE package (Hey & Ball 2020) to manu-
310
+ ally find values of the asteroseismic large spacing, ∆ν, that give
311
+ vertical patterns in an échelle diagram. At ∆ν
312
+ =
313
+ 6.97 d−1,
314
+ there are two parallel ridges on the left-hand side of the échelle
315
+ (Fig. 4), at an x-location suggestive of ℓ = 1 modes (Bedding et al.
316
+ 2020; Murphy et al. 2021). With the same ∆ν, part of a radial
317
+ mode series can also be identified, with period ratios consistent
318
+ with low-order radial modes (Netzel et al. 2022). It is notewor-
319
+ thy that the independently-determined ∆ν is consistent with the
320
+ value of five other δ Scuti stars in the Pleiades (6.82–6.99 d−1;
321
+ Murphy et al. 2022), and also suggests that the system is relatively
322
+ young (≲200 Myr).
323
+ Since ℓ
324
+ =
325
+ 1 doublets are seen, which are interpretable as
326
+ m = ±1 pairs, the inclination of the pulsating star is not small
327
+ (Gizon & Solanki 2003). However, at some orders, most notably at
328
+ n = 3, there is a peak slightly offset from halfway between the
329
+ two identified ℓ = 1 modes that could be a central component, after
330
+ second-order effects of rotation are accounted for. To evaluate this
331
+ possibility would require the calculation of rotating evolutionary and
332
+ pulsation models. If confirmed, it implies that the stellar inclination
333
+ is also not completely edge-on and, given the measured orbital incli-
334
+ nation, implies that the spin and orbital axes of the pulsating star are
335
+ aligned.
336
+ The identification of four ℓ = 1 doublets offers the chance of a
337
+ consistency check on the mode identification. If the doublets all have
338
+ approximately the same splitting, it strengthens the proposed mode
339
+ identifications. For the doublets at n = 6, 3, 2, and 1 we measure
340
+ splittings of 0.813, 0.813, 0.812, and 0.586 d−1, respectively. Thus,
341
+ the n = 6, 3, and 2 doublets seem secure, but the n = 1 doublet does
342
+ not. Since the Ledoux constant, Cn,ℓ, is close to zero for p modes,
343
+ we can estimate the stellar rotation rate, Ω, to first order based on
344
+ these frequency splittings (Aerts et al. 2010):
345
+ νn,ℓ,m = ν0 + mΩ(1 − Cn,ℓ),
346
+ (1)
347
+ where ν0 is the rest-frame frequency of the pulsation mode (we
348
+ adopt the convention that prograde modes have positive m). The
349
+ stellar rotation frequency is therefore 0.41 d−1, corresponding to a
350
+ rotation period of 2.46 d. This is equal to the orbital period of the sys-
351
+ tem, and the stars are known to rotate approximately synchronously
352
+ (see Section 4), so this supports our inference of the stellar rotational
353
+ inclination.
354
+ Figure 4. Échelle diagram for HD 23642, marked with mode identifications.
355
+ Radial modes are shown as circles, dipole modes are triangles. Modes with-
356
+ out an identifications are shown as crosses, some of which may belong to the
357
+ other star; most will be modes of higher degree (ℓ ≥ 2).
358
+ 6 SUMMARY AND CONCLUSIONS
359
+ HD 23642 has it all: youth, eclipses, pulsations, chemical peculiar-
360
+ ity, and membership of the Pleiades. We establish its physical prop-
361
+ erties to high precision for the first time, helped particularly by the
362
+ measurement of a spectroscopic light ratio immune to the chemical
363
+ peculiarity. We determine a distance and interstellar reddening to the
364
+ system in good agreement with previous measurements, and infer an
365
+ age of 170±20 Myr for the Pleiades by comparison to PARSEC evo-
366
+ lutionary model predictions.
367
+ A total of 46 pulsation frequencies are detected to high signifi-
368
+ cance from the three consecutive sectors of TESS photometry. We
369
+ attribute them to δ Scuti pulsations in the secondary star. We use an
370
+ MNRAS 000, 1–5 (2022)
371
+
372
+ obs1=0
373
+ 80
374
+ obsl=1
375
+ X
376
+ unidentified
377
+ 70
378
+ 60
379
+ Frequency (d-1)
380
+ 50
381
+ 40
382
+ X4
383
+ XX
384
+ X双XQ
385
+ XXXX
386
+ XLX
387
+ X
388
+ XX
389
+ XX
390
+ 30
391
+ XXX X
392
+ XXXXX
393
+ X
394
+ X
395
+ X
396
+ X
397
+ 20
398
+ X
399
+ 10
400
+ AV = 6.97 i
401
+ 0
402
+ 1
403
+ 2
404
+ 3
405
+ 4
406
+ 5
407
+ 6
408
+ 7
409
+ 8
410
+ Frequency mod Av (d-1)0.200
411
+ radial
412
+ 0.175
413
+ prograde
414
+ retrograde
415
+ 0.125
416
+ e
417
+ 0.100
418
+ litud
419
+ 0.075
420
+ idw
421
+ A
422
+ 0.050
423
+ 0.025
424
+ 0.000
425
+ 10
426
+ 20
427
+ 30
428
+ 40
429
+ 50
430
+ 60
431
+ 70
432
+ 0
433
+ Frequency, d-1Pulsations in Pleiades eclipsing binary HD 23642
434
+ 5
435
+ échelle diagram to assign modes to 11 of the pulsations, based on the
436
+ identification of ℓ = 1 doublets. An asteroseismic large spacing of
437
+ ∆ν = 6.97 d−1 allows identification of a series of radial modes with
438
+ period ratios consistent with other δ Scuti stars in the Pleiades. The
439
+ stellar rotation rate we find from the mode splittings is in agreement
440
+ with the spectroscopic v sin i and the orbital period of the system.
441
+ This implies that the spin axis of the pulsating secondary compo-
442
+ nent is aligned with the orbital axis of the system. HD 23642 is well
443
+ suited to detailed analysis with evolutionary and pulsation models
444
+ including rotation.
445
+ DATA AVAILABILITY
446
+ The TESS data used in this work are available in the MAST archive
447
+ (https://mast.stsci.edu/portal/Mashup/Clients/Mast/Portal.html).
448
+ The FIES spectra are available in reduced form from the NOT
449
+ archive (http://www.not.iac.es/archive/).
450
+ ACKNOWLEDGEMENTS
451
+ We thank Dominic Bowman and Hiromoto Shibahashi for useful
452
+ discussions. The TESS data presented in this paper were obtained
453
+ from the Mikulski Archive for Space Telescopes (MAST) at the
454
+ Space Telescope Science Institute (STScI). STScI is operated by the
455
+ Association of Universities for Research in Astronomy, Inc. Support
456
+ to MAST for these data is provided by the NASA Office of Space
457
+ Science. Funding for the TESS mission is provided by the NASA
458
+ Explorer Program. SJM was supported by the Australian Research
459
+ Council through Future Fellowship FT210100485.
460
+ REFERENCES
461
+ Abt H. A., 1958, ApJ, 128, 139
462
+ Abt H. A., Levato H., 1978, PASP, 90, 201
463
+ Aerts C., 2015, AN, 336, 477
464
+ Aerts C., Christensen-Dalsgaard J., Kurtz D. W., 2010, Asteroseismology.
465
+ Astron. and Astroph. Library, Springer Netherlands, Amsterdam
466
+ Allard F., Homeier D., Freytag B., 2012, Philosophical Transactions of the
467
+ Royal Society of London Series A, 370, 2765
468
+ Bedding T. R., et al., 2020, Nature, 581, 147
469
+ Bedding T. R., et al., 2023, AAS journals submitted, arXiv:2212.12087
470
+ Bouvier J., et al., 2018, A&A, 613, A63
471
+ Bressan A., Marigo P., Girardi L., Salasnich B., Dal Cero C., Rubele S.,
472
+ Nanni A., 2012, MNRAS, 427, 127
473
+ Brogaard K., Bruntt H., Grundahl F., Clausen J. V., Frandsen S., Vandenberg
474
+ D. A., Bedin L. R., 2011, A&A, 525, A2
475
+ Carpenter J. M., 2001, AJ, 121, 2851
476
+ Chen X., et al., 2022, ApJS, 263, 34
477
+ Claret A., Southworth J., 2022, A&A, 664, A128
478
+ Claret A., Torres G., 2018, ApJ, 859, 100
479
+ Currie T., et al., 2022, arXiv:2212.00034
480
+ David T. J., et al., 2016, AJ, 151, 112
481
+ Gaia Collaboration 2021, A&A, 649, A1
482
+ Girardi L., Bertelli G., Bressan A., Chiosi C., Groenewegen M. A. T., Marigo
483
+ P., Salasnich B., Weiss A., 2002, A&A, 391, 195
484
+ Gizon L., Solanki S. K., 2003, ApJ, 589, 1009
485
+ Gossage S., Conroy C., Dotter A., Choi J., Rosenfield P., Cargile P., Dolphin
486
+ A., 2018, ApJ, 863, 67
487
+ Griffin R. F., 1995, JRASC, 89, 53
488
+ Groenewegen M. A. T., Decin L., Salaris M., De Cat P., 2007, A&A, 463, 579
489
+ Hadrava P., 1995, A&AS, 114, 393
490
+ Hestroffer D., 1997, A&A, 327, 199
491
+ Hey D., Ball W., 2020, Echelle: dynamic echelle diagrams for asteroseismol-
492
+ ogy, doi:10.5281/zenodo.3629933
493
+ Heyl J., Caiazzo I., Richer H. B., 2022, ApJ, 926, 132
494
+ Høg E., et al., 2000, A&A, 355, L27
495
+ Howell S. B., et al., 2014, PASP, 126, 398
496
+ Iliji´c S., Hensberge H., Pavlovski K., Freyhammer L. M., 2004, in Hilditch
497
+ R. W., Hensberge H., Pavlovski K., eds, ASP Conf. Ser. Vol. 318, Spec-
498
+ troscopically and Spatially Resolving the Components of the Close Bi-
499
+ nary Stars. pp 111–113
500
+ Jenkins J. M., et al., 2016, in Proc. SPIE. p. 99133E
501
+ Kerr R., Kraus A. L., Murphy S. J., Krolikowski D. M., Offner S. S. R.,
502
+ Tofflemire B. M., Rizzuto A. C., 2022, ApJ, 941, 49
503
+ Kolbas V., et al., 2015, MNRAS, 451, 4150
504
+ Kurtz D. W., 2022, ARA&A, 60, 31
505
+ Lenz P., Breger M., 2004, in J. Zverko, J. Žižnovsky, S. J. Adelman, &
506
+ W. W. Weiss ed., IAU Symposium Vol. 224, The A-Star Puzzle, Cam-
507
+ bridge University Press, Cambridge, UK.. pp 786–790
508
+ Lodieu N., Pérez-Garrido A., Smart R. L., Silvotti R., 2019, A&A, 628, A66
509
+ Maxted P. F. L., et al., 2020, MNRAS, 498, 332
510
+ Melis C., Reid M. J., Mioduszewski A. J., Stauffer J. R., Bower G. C., 2014,
511
+ Science, 345, 1029
512
+ Miles R., 1999, Journal of the British Astronomical Association, 109, 106
513
+ Miller N. J., Maxted P. F. L., Smalley B., 2020, MNRAS, 497, 2899
514
+ Munari U., Dallaporta S., Siviero A., Soubiran C., Fiorucci M., Girard P.,
515
+ 2004, A&A, 418, L31
516
+ Murphy S. J., Joyce M., Bedding T. R., White T. R., Kama M., 2021, MN-
517
+ RAS, 502, 1633
518
+ Murphy S. J., Bedding T. R., White T. R., Li Y., Hey D., Reese D., Joyce M.,
519
+ 2022, MNRAS, 511, 5718
520
+ Netzel H., Pietrukowicz P., Soszy´nski I., Wrona M., 2022, MNRAS,
521
+ 510, 1748
522
+ Pavlovski K., Hensberge H., 2010, in Prša A., Zejda M., eds, Astronomical
523
+ Society of the Pacific Conference Series Vol. 435, Binaries – Key to
524
+ Comprehension of the Universe. p. 207
525
+ Pavlovski K., Southworth J., Tamajo E., 2018, MNRAS, 481, 3129
526
+ Pearce J. A., 1957, Publications of the Dominion Astrophysical Observatory
527
+ Victoria, 10, 435
528
+ Prša A., et al., 2016, AJ, 152, 41
529
+ Rebull L. M., et al., 2016, AJ, 152, 113
530
+ Ricker G. R., et al., 2015, JATIS, 1, 014003
531
+ Simon K. P., Sturm E., 1994, A&A, 281, 286
532
+ Skrutskie M. F., et al., 2006, AJ, 131, 1163
533
+ Smalley B., Smith K. C., Dworetsky M. M., 2001, UCLSYN Userguide
534
+ Somers G., Pinsonneault M. H., 2015, MNRAS, 449, 4131
535
+ Southworth J., 2008, MNRAS, 386, 1644
536
+ Southworth J., 2013, A&A, 557, A119
537
+ Southworth J., Maxted P. F. L., Smalley B., 2004a, MNRAS, 349, 547
538
+ Southworth J., Maxted P. F. L., Smalley B., 2004b, MNRAS, 351, 1277
539
+ Southworth J., Maxted P. F. L., Smalley B., 2005, A&A, 429, 645
540
+ Tamajo E., Pavlovski K., Southworth J., 2011, A&A, 526, A76
541
+ Taylor B. J., 2008, AJ, 136, 1388
542
+ Tkachenko A., et al., 2020, A&A, 637, A60
543
+ Torres G., 2003, Informational Bulletin on Variable Stars, 5402
544
+ Torres G., Andersen J., Giménez A., 2010, A&ARv, 18, 67
545
+ Torres G., Curtis J. L., Vanderburg A., Kraus A. L., Rizzuto A., 2018, ApJ,
546
+ 866, 67
547
+ Torres G., Latham D. W., Quinn S. N., 2021, ApJ, 921, 117
548
+ Vandenberg D. A., Bridges T. J., 1984, ApJ, 278, 679
549
+ APPENDIX A: MEASURED PULSATION FREQUENCIES
550
+ IN HD 23642
551
+ This paper has been typeset from a TEX/LATEX file prepared by the author.
552
+ MNRAS 000, 1–5 (2022)
553
+
554
+ 6
555
+ Southworth et al.
556
+ Table A1. Extracted frequencies with corresponding amplitudes and provi-
557
+ sional mode identifications for the pulsating component of HD 23642.
558
+ f (d−1)
559
+ amplitude (mmag)
560
+ n
561
+
562
+ m
563
+ 57.2112
564
+ 0.0175
565
+ 6
566
+ 1
567
+ 1
568
+ 56.3981
569
+ 0.0161
570
+ 6
571
+ 1
572
+ −1
573
+ 36.2304
574
+ 0.1029
575
+ 3
576
+ 1
577
+ 1
578
+ 35.4177
579
+ 0.0768
580
+ 3
581
+ 1
582
+ −1
583
+ 29.3618
584
+ 0.0483
585
+ 2
586
+ 1
587
+ 1
588
+ 28.5496
589
+ 0.0431
590
+ 2
591
+ 1
592
+ −1
593
+ 22.4772
594
+ 0.1365
595
+ 1
596
+ 1
597
+ 1
598
+ 21.8913
599
+ 0.1713
600
+ 1
601
+ 1
602
+ −1
603
+ 39.3467
604
+ 0.0938
605
+ 4
606
+ 0
607
+ 0
608
+ 33.1444
609
+ 0.0869
610
+ 3
611
+ 0
612
+ 0
613
+ 26.9261
614
+ 0.0260
615
+ 2
616
+ 0
617
+ 0
618
+ 53.5132
619
+ 0.0188
620
+
621
+
622
+
623
+ 39.4291
624
+ 0.0302
625
+
626
+
627
+
628
+ 39.1434
629
+ 0.0157
630
+
631
+
632
+
633
+ 39.0450
634
+ 0.0199
635
+
636
+
637
+
638
+ 38.7352
639
+ 0.0514
640
+
641
+
642
+
643
+ 38.6162
644
+ 0.0407
645
+
646
+
647
+
648
+ 38.5353
649
+ 0.0362
650
+
651
+
652
+
653
+ 38.3290
654
+ 0.0296
655
+
656
+
657
+
658
+ 37.9217
659
+ 0.0272
660
+
661
+
662
+
663
+ 37.8036
664
+ 0.1171
665
+
666
+
667
+
668
+ 36.1084
669
+ 0.0165
670
+
671
+
672
+
673
+ 35.8956
674
+ 0.0370
675
+
676
+
677
+
678
+ 35.2961
679
+ 0.0289
680
+
681
+
682
+
683
+ 34.1939
684
+ 0.0286
685
+
686
+
687
+
688
+ 33.8544
689
+ 0.0206
690
+
691
+
692
+
693
+ 32.3307
694
+ 0.0221
695
+
696
+
697
+
698
+ 29.4768
699
+ 0.0239
700
+
701
+
702
+
703
+ 29.4484
704
+ 0.0198
705
+
706
+
707
+
708
+ 29.1269
709
+ 0.0368
710
+
711
+
712
+
713
+ 28.6681
714
+ 0.0302
715
+
716
+
717
+
718
+ 28.3104
719
+ 0.0203
720
+
721
+
722
+
723
+ 28.1144
724
+ 0.0378
725
+
726
+
727
+
728
+ 28.0038
729
+ 0.0230
730
+
731
+
732
+
733
+ 27.7391
734
+ 0.0347
735
+
736
+
737
+
738
+ 27.3022
739
+ 0.0181
740
+
741
+
742
+
743
+ 26.1835
744
+ 0.0203
745
+
746
+
747
+
748
+ 25.3700
749
+ 0.0252
750
+
751
+
752
+
753
+ 24.9365
754
+ 0.0264
755
+
756
+
757
+
758
+ 24.5100
759
+ 0.0159
760
+
761
+
762
+
763
+ 24.2900
764
+ 0.0160
765
+
766
+
767
+
768
+ 23.7500
769
+ 0.0281
770
+
771
+
772
+
773
+ 22.9355
774
+ 0.0181
775
+
776
+
777
+
778
+ 22.0604
779
+ 0.0403
780
+
781
+
782
+
783
+ 20.3501
784
+ 0.0157
785
+
786
+
787
+
788
+ MNRAS 000, 1–5 (2022)
789
+
ItE4T4oBgHgl3EQfIgwL/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
JdAyT4oBgHgl3EQffviy/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3e19913da67f2efd57f7b25029669698239cabd1967c673913bc3d49f4eac0ef
3
+ size 2228269
JtE2T4oBgHgl3EQfAQZo/content/tmp_files/2301.03589v1.pdf.txt ADDED
@@ -0,0 +1,1992 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ACCEPTED VERSION
2
+ 1
3
+ Explainable, Physics Aware, Trustworthy AI
4
+ Paradigm Shift for Synthetic Aperture Radar
5
+ Mihai Datcu, Fellow, IEEE , Zhongling Huang†, Andrei Anghel, Juanping Zhao, Remus Cacoveanu
6
+ Abstract—The recognition or understanding of the scenes
7
+ observed with a SAR system requires a broader range of cues,
8
+ beyond the spatial context. These encompass but are not limited
9
+ to: imaging geometry, imaging mode, properties of the Fourier
10
+ spectrum of the images or the behavior of the polarimetric
11
+ signatures. In this paper, we propose a change of paradigm for
12
+ explainability in data science for the case of Synthetic Aperture
13
+ Radar (SAR) data to ground the explainable AI for SAR. It aims
14
+ to use explainable data transformations based on well-established
15
+ models to generate inputs for AI methods, to provide knowledge-
16
+ able feedback for training process, and to learn or improve high-
17
+ complexity unknown or un-formalized models from the data.
18
+ At first, we introduce a representation of the SAR system with
19
+ physical layers: i) instrument and platform, ii) imaging formation,
20
+ iii) scattering signatures and objects, that can be integrated with
21
+ an AI model for hybrid modeling. Successively, some illustrative
22
+ examples are presented to demonstrate how to achieve hybrid
23
+ modeling for SAR image understanding. The perspective of
24
+ trustworthy model and supplementary explanations are discussed
25
+ later. Finally, we draw the conclusion and we deem the proposed
26
+ concept has applicability to the entire class of coherent imaging
27
+ sensors and other computational imaging systems.
28
+ Index Terms—SAR image understanding, explainable artificial
29
+ intelligence, deep neural networks, knowledge inspired data
30
+ science
31
+ I. MOTIVATION AND SIGNIFICANCE
32
+ The Earth is facing unprecedented climatic, geomorpho-
33
+ logic, environmental or anthropogenic changes, which require
34
+ global scale, long term observation with Earth Observation
35
+ (EO) sensors. SAR sensors, due to their observation capability
36
+ during day and night and independence on atmospheric effects,
37
+ are the only EO technology to insure global and continuous
38
+ observations. Meanwhile, the SAR observations of Sentinel-1
39
+ satellites in the frame of the European Copernicus program,
40
+ are worldwide freely and openly accessible. This is immensely
41
+ enlarging the SAR Data Science and applications, covering
42
+ a multitude of areas as: urbanization, agriculture, forestry,
43
+ geology, tectonics, oceanography, polar surveys, or biomass
44
+ estimation, only to enumerate a few. Copernicus Open Access
45
+ Hub provides more than 457.59 PB data of satellites covering
46
+ the Earth for more than 570,000 users all around the world. 1
47
+ SAR is a pioneer technology in the field of computational
48
+ sensing and imaging, of which the imaging mechanism is to-
49
+ tally different from optical sensors. A radar instrument carried
50
+ by an airborne or spaceborne platform illuminates the scene by
51
+ side-looking or forward-looking, which allows to discriminate
52
+ objects in the range direction. As the platform moving along
53
+ † Corresponding author ([email protected])
54
+ 1https://scihub.copernicus.eu/reportsandstats/
55
+ ground range
56
+ synthetic aperture
57
+ azimuth
58
+ chirp
59
+ signal
60
+ slant range
61
+ dielectric property
62
+ surface / geometry
63
+ terrain & object
64
+ wavelength / bandwidth
65
+ polarization / inc. angle
66
+ sensor & platform
67
+ echo processing
68
+ azimuth focusing
69
+ imaging system
70
+ Doppler variation
71
+ echo
72
+ Knowledge
73
+ Data
74
+ Fig. 1: A simple illustration of how SAR images the world
75
+ (Stripmap Mode). SAR society is facing the big data challenge
76
+ but with limited ground truth. In the meanwhile, the knowledge
77
+ of SAR is equally important. This is also the motivation of the
78
+ physical layers in this paper.
79
+ its track, the SAR sensor is constantly transmitting a sequence
80
+ of chirp signals and receiving echos reflected from objects
81
+ on the ground, as depicted in Fig. 1. When recording all
82
+ individual acquisitions with a short physical antenna and
83
+ mathematically combining them into a synthetic image, a
84
+ much larger synthesized aperture is formed. This allows high
85
+ capacity to distinguish objects in azimuth despite a physically
86
+ small antenna [1]. A high resolution “image” can be processed
87
+ by applying SAR focusing principle, e.g., matching filtering
88
+ [2].
89
+ A deluge of SAR sensors have increased the data availabil-
90
+ ity for various SAR applications. The allure of data-driven
91
+ learning stems from the ability of automatically extracting ab-
92
+ stract features from large data volumes [3]–[6], and therefore,
93
+ many deep learning studies for SAR applications have been
94
+ developed in recent years [7]–[10]. Current popular paradigm
95
+ predominantly follows the blue part in Fig. 2 (a), where SAR
96
+ image data is all that is required to operate an intelligent
97
+ arXiv:2301.03589v1 [eess.IV] 9 Jan 2023
98
+
99
+
100
+ ::ACCEPTED VERSION
101
+ 2
102
+ Fig. 2: a The conventional data-driven paradigm for intelligent SAR image understanding based on deep neural networks and
103
+ the proposed paradigm shift integrated and interacted with physical knowledge of SAR. b A bridge can be imaged as multiple
104
+ bright lines, similar as a couple of bridges imaged in the other SAR image, depending on the observation parameters and
105
+ orientations. This positions the load and outmost difficulty of SAR image understanding. c The multipath scattering formation
106
+ in the SAR image.
107
+ network. In addition to data, however, the physical model and
108
+ principles of SAR sensor should not be neglected. In the upper
109
+ example of Fig. 2 (b), A bridge over a placid river that is
110
+ illuminated perpendicular to its primary orientation appears as
111
+ many brilliant lines, resembling the lower SAR image in which
112
+ several bridges are imaged from a different viewing angle. The
113
+ phenomena can be explicable by multi-path scattering [11],
114
+ [12], as illustrated in Fig. 2 (c). Apart from the direct scattering
115
+ from the bridge, the double bounce reflection between the
116
+ bridge and water or vice versa occurs at the corner reflector
117
+ spanned from the smooth vertical bridge facets facing the
118
+ sensor and the water surface. In addition, the triple-bounce
119
+ reflection and maybe some five-path scattering would happen
120
+ between the horizontal plane of bridge and water surface.
121
+ Thus, SAR image implies the causality of multi-path scattering
122
+ phenomena and object characteristics. This positions the load
123
+ of SAR image understanding, and the outmost challenge of
124
+ data science, as new and particular paradigm of Artificial
125
+ Intelligence (AI).
126
+ So far, some researches have discussed the paradigm that
127
+ attempts to bring scientific knowledge and data science models
128
+ together, applied to a broad range of research themes such as
129
+ partial differential equation solving [13] and Earth sciences
130
+ [14]–[16]. In particular for SAR community, however, this
131
+ topic has rarely been systematically analyzed and illustrated.
132
+ Thus, we aim to prospect the hybrid modeling paradigm for
133
+ intelligent SAR image understanding, where deep learning
134
+ is integrated and interacted with SAR physical models and
135
+ principles, to achieve explainability, physics awareness, and
136
+ trustworthiness.
137
+ Explainable AI is a broad concept. A scientific understand-
138
+ ing of explainability is the capacity to clarify the results
139
+ in the context of domain knowledge. The algorithms still
140
+ remain a black box. A different approach is the algorithmic
141
+ explainability. This is constructed such that the results of
142
+ the used model can be described algorithmically. To obtain
143
+ a higher degree of explainability, we aim at the synergy
144
+ of the paradigms: algorithmic and scientific explainability.
145
+
146
+ Physical Models and Principles of SAR
147
+ a
148
+ Rg/Az FFT & IFFT
149
+ SAR
150
+ Polarization
151
+ Incident angle
152
+ Image Formation
153
+ platform
154
+ Wavelength
155
+ Focused
156
+ image
157
+ ausality
158
+ scattering analysis
159
+ Shape
160
+ Dielectric
161
+ Roughness
162
+ terrain / object
163
+ integrated and interactive
164
+ (LULC, object, etc)
165
+ (SLC, GRD, etc)
166
+ Deep Neural
167
+ Network
168
+ prediction
169
+ image data
170
+ Data-Driven Learning Paradigm
171
+ b
172
+ Ilumination direction
173
+ c
174
+ → Direct scattering
175
+ > Double bouncing
176
+ → Triple/five path scattering
177
+ height
178
+ -
179
+ bridge
180
+ 1-2-1
181
+ 3
182
+ 1-2-3-2-1
183
+ SAR image
184
+ Optical image
185
+ RangeACCEPTED VERSION
186
+ 3
187
+ Fig. 3: Physical layer (i): Sensor and Platform. a: The moving platform creates Doppler variations and synthesizes large virtual
188
+ aperture; PolSAR transmits and receives diverse polarized wave, and SAR polarimetric characteristics are depicted. b: Based
189
+ on the physics behind the platform and sensor, the physical layer produces SAR specific representations such as sub-aperture
190
+ synthesis image and polarimetric feature, with specified physical parameters.
191
+ Algorithmic explainability lies in the guarantee of transparency
192
+ to understand how the machine learning algorithm works by
193
+ participation of SAR physical models and principles. Scientific
194
+ explainability ensures the physical consistency of AI output, as
195
+ well as learning of trustworthy results with physical meaning.
196
+ To ground this, we first lay out a representation of SAR
197
+ physical layer in the context of SAR domain knowledge, as
198
+ presented in Section II. Further, we describe how to integrate
199
+ and interact them with popular neural networks to build a
200
+ hybrid and translucent model for SAR applications using illus-
201
+ trative examples, demonstrated in Section III. The perspective
202
+ of trustworthy models and supplementary explanation for SAR
203
+ community are discussed in Section IV and V. The conclusion
204
+ and perspectives are finally given in Section VI.
205
+ II. SAR PHYSICAL LAYERS
206
+ Other than the neural network layers equipped with a
207
+ number of learnable parameters, SAR physical layers are ones
208
+ embedded with physical knowledge of SAR, well-established,
209
+ interpretable, and supported by domain theories. The concept
210
+ of ”physical layer” apart from ”neural network layer” arose in
211
+ literature [16] to make the model more physically realistic. As
212
+ motivated in Fig. 1, three SAR physical layers are highlighted
213
+ specific for SAR applications in this paper, i.e., (i) sensor
214
+ and platform: referring to antenna characteristics and moving
215
+ satellite/aircraft, (ii) imaging system: figuring image formation
216
+ with focusing process and (iii) scattering signature: reflecting
217
+ the physical properties of terrain and objects.
218
+ A. Sensor and Platform
219
+ Fig. 3 demonstrates the physical layer of sensor and plat-
220
+ form that indicates the physics behind the SAR acquisition
221
+ principle, such as aperture synthesizing with moving platform
222
+ and various characteristics of antenna.
223
+ Existing spaceborne EO SAR missions work in a monostatic
224
+ or quasi-monostatic configuration. The simplest illumination
225
+ mode of a SAR system is the stripmap mode in which the
226
+ antenna pointing direction is constant throughout the acqui-
227
+ sition, as shown in Fig. 3 a. The moving platform leads to
228
+ a sliding Doppler spectrum that impacts the complex SAR
229
+ image. Knowing the behaviour of the Doppler centroid to
230
+ create sub-looks is essential for exploiting look angle diversity
231
+ of the input data, especially for very high-resolution SAR
232
+ images.
233
+ It is well-known that in high-resolution SAR image where
234
+ the signals are performed over a broad bandwidth and wide
235
+ angular aperture, the targets are no longer isotropic and non-
236
+ dispersive. Instead, it is more plausible to infer that the
237
+ target’s backscattering is dependent on illumination angle
238
+ and frequencies [17]. The sub-aperture processing can be
239
+ applied to analyze the target scattering variations. Fig. 3 b
240
+ gives an example of a synthesized pseudo color SAR image
241
+ via sub-aperture processing. The complex-valued SAR image
242
+ is first transformed to the azimuth spectral domain by a
243
+ one-dimensional Fourier transform. Then, the full Doppler
244
+ spectrum is equally split into three intervals, named sub-
245
+ apertures or sub-looks, each containing 1/3 range of azimuth
246
+
247
+ a
248
+ Full aperture
249
+ b
250
+ +Sub-aperture
251
+ 1
252
+ 1
253
+ 1
254
+ sub-aperture features
255
+ Azimuthdirection
256
+ 1
257
+ 1
258
+ R: sub-look 1
259
+ 1
260
+ G: sub-look 2
261
+ B: sub-look 3
262
+ 1
263
+ Target
264
+ 1
265
+ or
266
+ moving platform
267
+ polarimetric features
268
+ 1
269
+ Transmitter
270
+ R: [HH-W/2
271
+ Horizontal
272
+ 0
273
+ 0
274
+ 0
275
+ G: 2|HV|2
276
+ 1
277
+ B: [HH+VWV/2
278
+ Vertical
279
+ 0
280
+ 1
281
+ Receiver
282
+ or
283
+ HH
284
+ HV HHHVHH
285
+ Horizontal
286
+ 1
287
+ physical params:
288
+ 1
289
+ 1
290
+ Doppler centroid, beamwidth, Entropy,
291
+ Vertical
292
+ 1
293
+ height, incidence angle, etc.
294
+ 1
295
+ 1
296
+ phase
297
+ backscattering
298
+ 1
299
+ 1
300
+ complex
301
+ coefficient
302
+ 1
303
+ image
304
+ polarimetric sensor
305
+ 1ACCEPTED VERSION
306
+ 4
307
+ Fig. 4: Physical layer (ii): Image Formation. a. Targets are characterized by sliding bandpass filtering in the Fourier domain. b.
308
+ On the basis of image formation principle and target scattering model, the physical layer generates the rich target description
309
+ with physical meaning.
310
+ angles. Finally, the three sub-apertures are transformed back
311
+ to time-domain using an inverse Fourier transform, coded as
312
+ the R, G, and B channels, respectively. Red, Green, and Blue
313
+ targets respond mainly on the first, second, and third sub-looks,
314
+ respectively, whilst gray targets indicate that they respond
315
+ equivalently in different sub-looks. The pseudo-colored image
316
+ well demonstrates the particular behavior of some targets.
317
+ Given the precise knowledge of the parameters related to
318
+ Doppler variations (e.g., orbit, azimuth steering rate, radiation
319
+ pattern, incidence angle), the physical layer can generate sub-
320
+ look data deterministically and there is no need to design
321
+ a neural network that should learn to create sub-looks from
322
+ various types of SAR training data.
323
+ Sensor characteristics, such as polarization, interferometry
324
+ and tomography, construct physical layer as well. Fig. 3
325
+ b presents a Pauli pseudo RGB image, where R, G, and
326
+ B channels are formed with |HH − V V |2, 2|HV |2, and
327
+ |HH+V V |2, respectively, indicating the polarimetric relation.
328
+ Several physical layers can be stacked to represent rich physics
329
+ of SAR sensor and platform. Early in literature [18], the diver-
330
+ sity in the polarimetric features with the azimuthal look angle
331
+ was exploited. Thus, the moving platform and polarimetric
332
+ sensor are both characterized. Similarly, the stacked physical
333
+ layers can represent polarimetric and interferometric properties
334
+ of PolInSAR data, or any other combinations.
335
+ B. Imaging System
336
+ The second physical layer we suppose delineates the physics
337
+ behind SAR image formation with an imaging system. The
338
+ selected exemplars are illustrated in Fig. 4.
339
+ A pulse-based radar or a frequency modulated continuous
340
+ wave (FMCW) radar is usually used in a SAR system,
341
+ where a range profile is obtained for each transmitted/received
342
+ waveform, either by range compression in the case of a pulse-
343
+ based radar or by applying a Fourier transform to the beat
344
+ signal in the case of an FMCW radar [19]. By a coherent
345
+ processing of the range profiles, the azimuth focusing process
346
+ outputs a SAR image representing a two-dimensional complex
347
+ reflectivity map of the illuminated area. SAR processing,
348
+ taking a simple point target as example, aims to collect the
349
+ dispersed signal energy in range and azimuth into a single
350
+ pixel. Many traditional imaging algorithms are in terms of a
351
+ Fourier synthesis framework [20], as such, Fourier transform
352
+ provides a specific physical meaning for SAR image. This kind
353
+ of physical layer assists AI model to better depict the target
354
+ scattering beyond the ”image” domain.
355
+ Fig. 4 (a) first shows a simple time-frequency analysis of
356
+ target with short-time Fourier transform [21], [22], charac-
357
+ terizing the backscattering intensity variations in 2-D range
358
+ and azimuth frequency domain. Four kinds of backscattering
359
+ behaviors observed in SAR were defined in literature [23], re-
360
+ lated to different objects shown in Fig. 4. In the high-resolution
361
+ case (wide bandwidth chirp signal and broad angular aperture),
362
+ the complex amplitude of a target is frequency and aspect
363
+ dependent [17]. Thus, the image formation can be extended to
364
+ four dimension (called hyperimage) with wavelet transform,
365
+ providing a concise physically relevant description of target
366
+ scattering. This frequency and angular energy response pattern
367
+ is proved useful for discriminating different scatterers, offering
368
+ valuable prior information to AI model, depicted in Fig. 4 b.
369
+ C. Scattering Signatures of Objects
370
+ Thirdly, we introduce the physical layer regarding the scat-
371
+ tering signatures of objects, in which the causality of target
372
+ characteristics and scattering behaviors is involved.
373
+ For optical images, what you see is what you receive, that
374
+ is, the objects depicted on the optical image are in accord
375
+ with human cognition. Targets in SAR images are reflected by
376
+ scattering characteristics, yet they include a wealth of physical
377
+ information that the human eye cannot immediately identify.
378
+ Fig. 5 a shows example of two typical SAR targets of bridge
379
+ and building. The scattering phenomenon that shows several
380
+ parallel lines over the river can be interpreted as single, double,
381
+ and multiple scattering of the bridge based on the domain
382
+ knowledge. The building, with scattering signatures of layover,
383
+ shadow, single and secondary scattering in the high-resolution
384
+ SAR image, can also be reflected as only layover and shadow
385
+ [24], depending on the building orientation and shape. Similar
386
+
387
+ Optical
388
+ SAR
389
+ Radar
390
+ a
391
+ image
392
+ image
393
+ spectrogram
394
+ Stable Targets
395
+ 4D hyperimage
396
+ Data transform:
397
+ Unstable Targets
398
+ SLC
399
+ Wavelet, Fourier,
400
+ data
401
+ or
402
+ Wigner-Ville
403
+ freguency-anguler
404
+ energy response
405
+ physicalparams:
406
+ Azimuth Variant Targets
407
+ frequency,angle,
408
+ wavenumber, ...
409
+ or.
410
+ Range Variant Targets
411
+ Target description with physical meaningACCEPTED VERSION
412
+ 5
413
+ Fig. 5: Physical layer (iii): Scattering Signatures of Objects. a. The Golden Gate Bridge revealing multipath scattering
414
+ characteristics in a Gaofen-3 quad-pol SAR image, and a typical single building representing different scattering regions
415
+ in a high-resolution (1m) SAR image [24]. b. The scattering mechanisms indicated by the H/α plane for full-polarized SAR
416
+ data point out the land-use and land-cover classes [25]. c. The physical layer describes the relationship and reasoning between
417
+ the scattering characteristics seen in the SAR image and the object’s features, such as its shape, structure, or even semantics.
418
+ research by Ferro et al. [26] investigated the relationship
419
+ between double bounce and the orientation of buildings in
420
+ VHR SAR images. Fig. 5 b demonstrates the relations between
421
+ the scattering mechanism of H/α plane and the semantics
422
+ of land-cover and land-use classes [25]. Likewise, one can
423
+ deduce the scattering center position and the specific shape
424
+ of distributed target from a SAR image by applying some
425
+ scattering models [27].
426
+ The conventional data-driven convolutional neural network
427
+ can capture the image contents as we ”see” in the SAR image,
428
+ whereas it is not equipped with the ability to ”interpret” the
429
+ scattering phenomenon as we discussed before. This indicates
430
+ the knowledge gap between SAR scattering signatures and hu-
431
+ man vision cognition. The physical layer delivering semantic
432
+ understanding behind the SAR scattering signature permits a
433
+ more thorough interpretation of the SAR image. As shown in
434
+ Fig. 5 c, the physical layer defines the association between
435
+ the scattering characteristics of a SAR image and the object’s
436
+ qualities, such as shape, structure, or semantics. It can be
437
+ written as an objective function or a regularization term that
438
+ constrains the training of neural networks. This will improve
439
+ the intelligence of AI model to master some causality between
440
+ scattering signatures and the object nature.
441
+ III. HYBRID MODELING WITH SAR PHYSICAL LAYERS
442
+ The integration and interaction of neural network layers
443
+ and physical layers construct the hybrid modeling for SAR
444
+ image interpretation. In view of algorithmic explainability, the
445
+ explainable physical models and domain knowledge improves
446
+ the transparency. For scientific explainability, the hybrid mod-
447
+ eling ensures the physical meaning of output in physical
448
+ layers and the prediction can maintain the physical consis-
449
+ tency. In this section, we demonstrate several hybrid modeling
450
+ approaches with SAR physical layer to achieve explainability
451
+ and physics awareness.
452
+ A. Insert for Substitution
453
+ The introduced physical layer can be inserted in a deep
454
+ neural network for substitution, extracting explainable and
455
+ meaningful features, either as the input of a DNN or fused
456
+ with DNN features in intermediate layers. A common way is
457
+ to insert a physical layer into the input layer to obtain the
458
+ polarimetric features for PolSAR image classification, includ-
459
+ ing the elements of coherency matrix, Pauli decomposition
460
+ features, etc [31], [32]. Similarly, the sub-aperture images are
461
+ generated as the input for target detection [33]. The other
462
+ usage of physical layer is for feature fusion, where the features
463
+ obtained by well-established physical model and deep neural
464
+ networks are combined [34], [35].
465
+ Our recent work, a deep learning framework named Deep
466
+ SAR-Net (DSN) [28], addressed both aspects that inserts the
467
+ physical layer into the input and the intermediate position of
468
+ deep model. As shown in Fig. 6, DSN was proposed for clas-
469
+ sifying SAR images with complex values. Instead of the entire
470
+ data-driven method, i.e. the complex-valued convolutional
471
+ neural networks (CV-CNN), the designed DSN encompasses
472
+ three shallow neural network modules and two physical layers.
473
+ The first physical layer generates the high-dimensional radar
474
+ spectrogram based on time-frequency analysis. The second one
475
+ handles the features of the 2-D projection along the frequency
476
+ axises [22] to maintain the location constraint, making it possi-
477
+ ble to be fused with spatial features from intensity image. DSN
478
+ outperformed CV-CNN especially with limited labeled training
479
+ data, and had a remarkable performance in discriminating the
480
+ man-made target scenes compared with the traditional CNN. It
481
+ demonstrates the Fourier process on single-look complex SAR
482
+ image embedded the knowledge like synthesizing the antenna
483
+
484
+ α()
485
+ 1
486
+ a
487
+ 90 [
488
+ Scattering Mechanisms
489
+ Range direction
490
+ Range direction
491
+ 80
492
+ Low entropy scattering
493
+ Low entropy dipole
494
+ Single scattering
495
+ 70
496
+ Low entropy surface
497
+ 60
498
+ Medium entropy multiple scattering
499
+ double
500
+ Shadoi
501
+ Medium entropy dipole scattering
502
+ scatterino
503
+ Medium entropy surface scattering
504
+ High entropy double bounce
505
+ 40
506
+ High entropy multiple scattering
507
+ -
508
+ Azimuth direction
509
+ 30
510
+
511
+ 20
512
+ Land Cover Types
513
+ 10
514
+ Multiple
515
+ 1
516
+ △ water
517
+ ★ landslide
518
+ ■ farmland
519
+ scattering
520
+ forest
521
+ 口 snow
522
+ 0
523
+ 0.5
524
+ 0.91
525
+ I b
526
+ Entropy(H)
527
+ Bridge
528
+ Building
529
+ I c
530
+ Relation and Reasoning
531
+ Scattering
532
+ object
533
+ -
534
+ phenomenon
535
+ property
536
+ shape, orientation,
537
+ scattering center,
538
+ structure, position, ..
539
+ scattering mechanism,
540
+
541
+ 一ACCEPTED VERSION
542
+ 6
543
+ Physical Layer
544
+ complex-valued
545
+ SAR image
546
+ Sub-look
547
+ frequency signals
548
+ intensity
549
+ Deep
550
+ Network 2
551
+ Deep
552
+ Network 1
553
+ Deep
554
+ Network 3
555
+ feature
556
+ fusion
557
+ semantic labels
558
+ An example of Physical Layer (i) with AI model
559
+ Deep SAR-Net
560
+ (Huang et al. 2020)
561
+ complex-
562
+ valued SAR
563
+ image
564
+ 2D projection in
565
+ frequency domain
566
+ intensity image
567
+ Deep
568
+ Network 2
569
+ Deep
570
+ Network 1
571
+ Deep
572
+ Network 3
573
+ spatial
574
+ features
575
+ frequency
576
+ features
577
+ target position
578
+ constraint
579
+ feature
580
+ fusion
581
+ {
582
+ semantic labels
583
+ Physical Layer
584
+ Physical Layer
585
+ TFA
586
+ Fig. 6: Our recent work Deep SAR-Net (DSN) [28] for SAR image classification can be regarded as a typical example of
587
+ inserting the physical layers into a deep model.
588
+ Fig. 7: a. Unsupervised HDEC-TFA method [29]. It automatically discovered the radar spectrogram patterns more than the
589
+ four defined in [23] with deep neural networks. b. Learning the polarimetric features from single-polarized SAR image,
590
+ supervised by Entropy-Alpha-Anisotropy generated from full-pol data [30]. c. The physical layers in a and b play the role of
591
+ input transform (blue) and supervision generation (green) in hybrid modeling. In addition, the physical layer (red) can act as
592
+ feedback to restrict learning and produce physically consistent outcomes.
593
+ well characterizes the physical property of SAR target, and
594
+ the usages of physical layer cut down unnecessary parameters
595
+ in neural network layers to improve the model performance
596
+ with limited ground truth.
597
+ B. Compensation for Imperfect Knowledge with Feedback
598
+ In condition of unknown/inconclusive physical models or
599
+ incomplete knowledge, it is difficult to extract perfect physical
600
+ parameters or physical scattering characteristics of SAR via
601
+ model-based methods. For instance, obtaining the polarimetric
602
+ features from dual-pol, or even single-polarized SAR image.
603
+ Thus, the physical layer interacted with deep neural network
604
+ take effect.
605
+ 1) Target Character Identification:
606
+ Some researches have analyzed the energy response pattern
607
+ in frequency dimensions of target varied in SAR image,
608
+ and discussed the nonstationary targets [18], [36]. Spigai
609
+ et al. [23] pointed out four canonical targets with a rough
610
+ definition shown in Fig. 4 a. However, it remains unknown
611
+ for many complicated scene and objects. Fig. 7 show our
612
+ related work of using physical layer and deep neural network
613
+ for compensation of imperfect knowledge. The first is the
614
+ unsupervised hierarchical deep embedding clustering based
615
+ on time-frequency analysis (HDEC-TFA) [29], which was
616
+ proposed to automatically characterize the radar spectrogram
617
+ (or the sub-band scattering pattern defined in [29]) basically
618
+ in urban area, discovering the various scattering pattern more
619
+ than the four specific classes defined in [23]. It offered a
620
+ new perspective to describe the physical properties of single-
621
+ polarized SAR. Furthermore, we used two stacked physical
622
+ layers to obtain the polarimetric and time-frequency patterns
623
+ and analyzed with deep neural network in reference [37].
624
+
625
+ a
626
+ C
627
+ Physical Layer
628
+ Deep Embedding Clustering
629
+ TFA
630
+ Physical Layer
631
+ Loss = KL(pllq)
632
+ supervision
633
+ SAR image
634
+ Radar
635
+ NN
636
+ Cluster
637
+ weights
638
+ Result map
639
+ spectrogram
640
+ centers
641
+ loss
642
+ Feedback loss
643
+ Update parameters
644
+ b
645
+ Physical Layer
646
+ Physical Layer
647
+ output
648
+ Ground Truth
649
+ Deep Neural Network
650
+ generation
651
+ Flattening
652
+ ImprovedCost
653
+ Measurement
654
+ CXN
655
+ Physical Layer
656
+ 610x10
657
+ ×12×4xN
658
+ One-hot Labels
659
+ SAR inputoriginal slc
660
+ fr=BWr/2,fa=BWa/2
661
+ X=N/2,y=N/2
662
+ X=N/2,fr=BWr/2
663
+ y=N/2,fa=BWa/2
664
+ y=N/2,fr=BWr/2
665
+ X=N/2,fa=BWa/2
666
+ 0
667
+ 0
668
+ 20
669
+ 10
670
+ 10
671
+ 10
672
+ 10
673
+ 40
674
+ 20
675
+ 20
676
+ 20-
677
+ 20
678
+ 20
679
+ 20
680
+ 30
681
+ 60
682
+ 30
683
+ 30
684
+ 30
685
+ 30
686
+ 30
687
+ 0
688
+ 25
689
+ 50
690
+ 0
691
+ 20
692
+ o
693
+ 20
694
+ 0
695
+ 20
696
+ 0
697
+ 20
698
+ 0
699
+ 20
700
+ 20original slc
701
+ fr=BWr/2.fa=BWa/2
702
+ X=N/2,y=N/2
703
+ X=N/2,fr=BWr/2
704
+ y=N/2,fa=BWa/2
705
+ y=N/2,fr=BWr/2
706
+ X=N/2,fa=BWa/2
707
+ 20
708
+ 40
709
+ 20
710
+ 60
711
+ 30
712
+ 0
713
+ 25
714
+ 50
715
+ 0
716
+ 20
717
+ 20
718
+ 20
719
+ 20
720
+ 20
721
+ 20original slc
722
+ fr=BWr/2,fa=BWa/2
723
+ X=N/2,y=N/2
724
+ X=N/2,fr=BWr/2
725
+ y=N/2,fa=BWa/2
726
+ y=N/2,fr=BWr/2
727
+ X=N/2,fa=BWa/2
728
+ 0
729
+ 0
730
+ 0
731
+ 0
732
+ 20
733
+ 10
734
+ 10
735
+ 10
736
+ 10
737
+ 10
738
+ 10
739
+ 40
740
+ 20-
741
+ 20
742
+ 20-
743
+ 20
744
+ 20
745
+ 60
746
+ 30
747
+ 30
748
+ 0
749
+ 25
750
+ 50
751
+ 0
752
+ 20
753
+ o
754
+ 20
755
+ 0
756
+ 20
757
+ 0
758
+ 20
759
+ 0
760
+ 20
761
+ 0
762
+ 20original slc
763
+ fr=BWr/2,fa=BWa/2
764
+ X=N/2,y=N/2
765
+ X=N/2,fr=BWr/2
766
+ y=N/2,fa=BWa/2
767
+ y=N/2,fr=BWr/2
768
+ X=N/2,fa=BWa/2
769
+ 20
770
+ 10
771
+ 20
772
+ 20-
773
+ 60
774
+ 30
775
+ 30
776
+ 30
777
+ 0
778
+ 25
779
+ 50
780
+ 0
781
+ 20
782
+ 0
783
+ 20
784
+ 0
785
+ 20
786
+ 0
787
+ 20
788
+ 0
789
+ 20
790
+ 20original slc
791
+ fr=BWr/2,fa=BWa/2
792
+ X=N/2,y=N/2
793
+ X=N/2,fr=BWr/2
794
+ y=N/2,fa=BWa/2
795
+ y=N/2,fr=BWr/2
796
+ X=N/2,fa=BWa/2
797
+ 0
798
+ 0
799
+ 20
800
+ 10
801
+ 10
802
+ LO
803
+ 10
804
+ 10
805
+ 40
806
+ 20
807
+ 20
808
+ 20
809
+ 20
810
+ 20+
811
+ 20
812
+ 60
813
+ 30
814
+ 30
815
+ 30
816
+ C
817
+ 30
818
+ 0
819
+ 25
820
+ 50
821
+ 0
822
+ 20
823
+ 0
824
+ 20
825
+ 0
826
+ 20
827
+ 20
828
+ 20
829
+ 20original slc
830
+ fr=BWr/2,fa=BWa/2
831
+ X=N/2,y=N/2
832
+ X=N/2,fr=BWr/2
833
+ y=N/2,fa=BWa/2
834
+ y=N/2,fr=BWr/2
835
+ X=N/2,fa=BWa/2
836
+ 20
837
+ 10
838
+ 10
839
+ 0
840
+ 10
841
+ 40
842
+ 20
843
+ 20
844
+ 20
845
+ 60
846
+ 30
847
+ 0
848
+ 25
849
+ 50
850
+ 0
851
+ 20
852
+ 0
853
+ 20
854
+ 0
855
+ 20
856
+ 0
857
+ 20
858
+ 20ACCEPTED VERSION
859
+ 7
860
+ SOLEIL
861
+ synchrotron
862
+ “L”-shape
863
+ building
864
+ “H”-shape
865
+ building
866
+ “I”-shape
867
+ building
868
+ Google Earth
869
+ HDEC-TFA
870
+ GD-Wishart
871
+ Quad-Pol
872
+ HH Channel
873
+ Fig. 8: The SOLEIL synchrotron in France and the surrounding buildings with different shapes are depicted in the Gaofen-3
874
+ SAR image. Both the GD-Wishart [38] result on Quad-Polarization SAR data and the HDEC-TFA [29] result on HH channel
875
+ single-polarized SAR can capture the special scattering characteristics of the objects.
876
+ Fig. 8 demonstrates the result compared with the polarimet-
877
+ ric physical model. The SOLEIL synchrotron in France, shown
878
+ as the round building in the Google Earth remote sensing
879
+ image, is surrounded by three different shapes of buildings.
880
+ The HDEC-TFA method can capture the special characteristics
881
+ of the architectures even in single HH channel SAR image, as
882
+ much as the physical model based method GD-Wishart [38]
883
+ on quad-pol SAR. Some other man-made targets examples
884
+ characterized by time-frequency model with neural networks
885
+ are given in [39]. Our experiments in [29] demonstrated
886
+ the trained model varies with different imaging conditions
887
+ since the sub-band scattering pattern is influenced by several
888
+ imaging parameters, which should be taken into consideration
889
+ when transferring the AI model to other situations.
890
+ 2) Polarimetric Parameter Extraction:
891
+ By transmitting and receiving waves that are both horizon-
892
+ tally and vertically polarized, the full-pol SAR image captures
893
+ abundant physical characteristics of the imaged objects that
894
+ can lead to various physical parameters. In contrast, single-
895
+ pol and dual-pol SAR data are less informative for physical
896
+ feature extraction. If only one polarization channel is obtained,
897
+ one cannot derive the other polarization channels in principle.
898
+ Once the objects are known, i.e., once the characteristics of
899
+ targets such as geometry, surface roughness, etc, are identified,
900
+ deep learning can be employed to transfer the knowledge
901
+ learned from physical models to reconstruct the physical
902
+ parameters of objects. As shown in Fig. 7 b, Zhao et al. [30]
903
+ proposed a complex-CNN model to learn physical parameters
904
+ (entropy H and α angle) with transfer learning from single-pol
905
+ and dual-pol SAR data, supervised by features obtained with
906
+ a physical layer. Some similar studies include but not limit to
907
+ [40], [41]. Song et al. [40] addressed ”radar image coloriza-
908
+ tion” issue to reconstruct the polarimetric covariance matrix
909
+ with a designed deep neural network, where the supervision
910
+ was also generated with a physical layer.
911
+ When training a data-driven deep neural network, some
912
+ physical consistencies may not be guaranteed. The authors
913
+ pointed that the reconstructed covariance matrix may not be
914
+ positive semi-definite [40], and they proposed an algorithm to
915
+ correct it. In this case, the additional physical layer embedded
916
+ prior constraint acts as post-processing to revise the physically
917
+ inconsistent result of DNNs. Furthermore, this type of physical
918
+ layer is suggested to provide feedbacks during training, as
919
+ demonstrated in Fig. 7 c, the red part. The feedback of physical
920
+ layer aims to prevent the model from learning the physical
921
+ inconsistency.
922
+ The classification results vary
923
+ with different imaging conditions
924
+ The same area under
925
+ different imaging conditions
926
+ HDEC-TFA (Huang et al. 2021, TGRS)
927
+ Deep Neural Network
928
+ Physical Layer
929
+ SAR
930
+ image
931
+ Different
932
+ representations
933
+ x1
934
+ x2
935
+ xn
936
+ SSL loss
937
+ SAR
938
+ image
939
+ Deep Neural Network
940
+ Physical Layer
941
+ (i) or (ii)
942
+ Representation-2
943
+ Representation-1
944
+ Relations
945
+ SSL loss
946
+ a
947
+ b
948
+ Physical Layer (iii)
949
+ Fig. 9: The SAR physical layer can be integrated in a self-
950
+ supervised learning framework to guide the neural network
951
+ training without ground truth. a. The physical layer generates
952
+ various modalities of SAR image using well-established physi-
953
+ cal models, such as sub-aperture images, different polarimetric
954
+ features, etc. The self-supervised learning can be conducted
955
+ with contrastive learning paradigm. b. The physical layer
956
+ produces a physical representation of image, serving as a
957
+ guided signal that drives the neural network to learn a similar
958
+ representation.
959
+
960
+ DeepEmbeddingClustering
961
+ TFA
962
+ Loss=KL(pllq)
963
+ SARimage
964
+ Radar
965
+ NN
966
+ Cluster
967
+ Result map
968
+ spectrogram
969
+ weights
970
+ centers
971
+ Update parameters7.0
972
+ 6.5
973
+ 6.0
974
+ 5.5
975
+ 5.0
976
+ 4.5
977
+ 4.0
978
+ 3.5
979
+ 1.0
980
+ 0.8
981
+ 0.0
982
+ 0.
983
+ 0.4
984
+ range
985
+ 0.6
986
+ 0.8
987
+ 0.0
988
+ 206.5
989
+ 6.0
990
+ 5.5
991
+ 5.0
992
+ 4.5
993
+ 4.0
994
+ 0.0
995
+ 0.2
996
+ .
997
+ 8'0
998
+ 1.05.5
999
+ 5.0
1000
+ 4.5
1001
+ 4.0
1002
+ 3.5
1003
+ 3.0
1004
+ 2.5
1005
+ L.0
1006
+ 0.8
1007
+ 0.0
1008
+ 2.
1009
+ 0.2
1010
+ 0.4
1011
+ range
1012
+ 0.6
1013
+ 0.8
1014
+ 0.2
1015
+ 0.0 6.5
1016
+ 6.0
1017
+ 5.5
1018
+ 5.0
1019
+ 4.5
1020
+ 4.0
1021
+ 3.5
1022
+ 0.0
1023
+ 0.2
1024
+ 0.4
1025
+ azimuth
1026
+ 0.6
1027
+ 0.8
1028
+ 1.0ACCEPTED VERSION
1029
+ 8
1030
+ 3) SAR Image Generation/Simulation:
1031
+ This paradigm can be popularized to other SAR appli-
1032
+ cations. SAR target image generation (or simulation) based
1033
+ on deep generative model (such as variational auto-encoder
1034
+ [44] and generative adversarial network [45]) has attracted
1035
+ much attention in recent years. The generated SAR images
1036
+ are expected to be used as data supplements to support target
1037
+ identification. The authenticity and interpretability of current
1038
+ deep SAR image generation is a substantial obstacle that has
1039
+ a significant impact on subsequent tasks [46]. Many latest
1040
+ studies input important physical parameters into the deep
1041
+ generative model or use them as supervision at the output
1042
+ layer, such as depression angle and target orientation, that
1043
+ facilitated more reliable outcomes [47], [48]. We consider
1044
+ them physical layer as shown in Fig. 7 c, the green and blue
1045
+ part.
1046
+ Coupling the physical layer as a feedback in neural network
1047
+ for SAR image generation has yet to be explored. When
1048
+ generative model produces a pseudo SAR image, a physical
1049
+ layer will be applied to verify whether it is consistent with the
1050
+ knowledge base of SAR, e.g. physical parameters derived from
1051
+ a well-established model. If not, the current generative model
1052
+ will revise the pseudo result to minimize the inconsistency.
1053
+ There are some examples to learn from in the field of fluid
1054
+ simulation [49], [50]. As such, the physical layer is used for
1055
+ constructing physical inconsistency as a feedback that explic-
1056
+ itly constrain the generative model to fulfill some quantitative
1057
+ conditions, so as to guarantee authenticity. Referred to some
1058
+ latest studies in other fields, physical model as a feedback
1059
+ or constraint in the loop of deep learning is also applied to
1060
+ under water image enhancement [51] and seismic impedance
1061
+ inversion [52].
1062
+ C. Self Supervised Learning Guidance
1063
+ Self supervised learning has been attracted much attention
1064
+ in recent years, since it can help reduce the required amount of
1065
+ labeling. One can pre-train a model on unlabeled data and fine-
1066
+ tune it on a small labeled dataset. It offers great opportunity for
1067
+ SAR community where big data volume is available while the
1068
+ ground truth is usually difficult to obtain. There is a remarkable
1069
+ potential for SAR physical layer to apply for self-supervised
1070
+ learning.
1071
+ As shown in Fig. 9, two self-supervised learning paradigms
1072
+ are given. The physical layer helps to establish a pretext task
1073
+ for SAR image. In Fig. 9 a, different SAR image represen-
1074
+ tations are generated by physical layer, for instance, the sub-
1075
+ aperture images, various polarimetric feature images, etc. As
1076
+ similar to SimCLR [53] that conducted the contrastive learning
1077
+ based on data-augmentation, or NPID [54] that learned the
1078
+ optimal feature via instance-level discrimination, the surrogate
1079
+ task can be built to form a self-supervised learning. An
1080
+ illustrative example is in reference [55].
1081
+ Fig. 9 b illustrates a second line of thought, which we refer
1082
+ to as physics guided learning. Firstly, the physical layer is
1083
+ used for generating meaningful physical representations, like
1084
+ scattering mechanisms (physical layer (i) and (ii) can both
1085
+ achieve this). Meanwhile, the neural network extracts hierar-
1086
+ chical spatial features from SAR image. The crucial point is
1087
+ how to establish a connection between physical properties and
1088
+ image features. We propose to exploit physical layer (iii) to
1089
+ reveal relationships and thereby design an objective function
1090
+ for self-supervised learning.
1091
+ Our recent work [37], [42], [43] details the paradigm in
1092
+ Fig. 9 b. A physics guided network (PGN) for SAR image
1093
+ feature learning was proposed as shown in Fig. 10. First,
1094
+ a physical layer is deployed at the beginning, where the
1095
+ physical scattering properties are derived. Based on the crucial
1096
+ assumption that SAR image features and the abstract physical
1097
+ scattering mechanisms should share common attributes in
1098
+ semantic level, a surrogate task was established via the other
1099
+ physical layer that defines a loss function. The inspiration is
1100
+ from reference [56], which indicated the abstract topic mixture
1101
+ on scattering properties and the high-level image features are
1102
+ with similar semantics. Thus, we built the relation between the
1103
+ image semantics and SAR scattering characteristics. A novel
1104
+ objective function was designed to instruct self-supervised
1105
+ learning guided by physical scattering mechanisms.
1106
+ The advantages of this kind of learning paradigm lie in
1107
+ two aspects. First, the training process takes all labeled and
1108
+ unlabeled data so that the learned features generalize well in
1109
+ test set. Second, the guidance of physical information leads
1110
+ to physics awareness of features learned by neural networks,
1111
+ i.e., the DNN feature maintains physical consistency. In a
1112
+ word, the prior physical knowledge is embedded in the neural
1113
+ network. The experiments in [43] verified this quantitatively
1114
+ and qualitatively.
1115
+ Additionally, the outputs of the physically interpretable
1116
+ deep model can be further explained, which in turn inspires
1117
+ algorithm improvement. We illustrate with an example of
1118
+ sea-ice classification in polar area [42]. The physics guided
1119
+ learning is driven by physical signals that reflect the scattering
1120
+ properties of SAR image. The guided physical signals are
1121
+ visualized with t-sne in Fig. 11, where different colors in
1122
+ (a) represent semantic labels of sea-ice and each color in (b)
1123
+ indicates samples with similar physical scattering properties.
1124
+ One characteristic that can be seen is that young ice and
1125
+ water bodies have extremely similar physical representations,
1126
+ which would impede semantic discrimination. It can explain
1127
+ the physics guided learning result in [42] that about 23% test
1128
+ samples in water bodies class were predicted as young ice.
1129
+ The explanation will motivate us to improve the algorithm by,
1130
+ for instance, relaxing the physical constraints between the two
1131
+ classes.
1132
+ Similarly, a very recent work [57] was proposed for SAR
1133
+ target recognition inspired by our work [43]. The authors
1134
+ proposed a CNN under the guidance of SAR target physi-
1135
+ cal model, attributed scattering center (ASC), to extract the
1136
+ significant target features, that were successively injected into
1137
+ the classification network for more robust and interpretable
1138
+ results.
1139
+ IV. TRUSTWORTHY MODELING
1140
+ A. Why Trustworthy Modeling Needed
1141
+ The results obtained by applying AI techniques in SAR
1142
+ processing can be validated using in situ measurements of
1143
+
1144
+ ACCEPTED VERSION
1145
+ 9
1146
+ An example of Physical Layer (iii) with AI model
1147
+ image contents
1148
+ (Computer vision
1149
+ understanding)
1150
+ CNN
1151
+ Latent
1152
+ Dirichlet
1153
+ Allocation
1154
+ Scattering
1155
+ characteristics
1156
+ (Expert knowledge)
1157
+ Physics guided network (Huang et al. 2021, IGARSS)
1158
+ Topic mixture
1159
+ loss
1160
+ function
1161
+ High-level
1162
+ image features
1163
+ ResBlk-1
1164
+ ConvBlk
1165
+ Topic Model
1166
+ Phy. Info
1167
+ Physics-Aware
1168
+ Features
1169
+ Physical Model
1170
+ ResBlk-2
1171
+ ResBlk-3
1172
+ Phy. Attr.
1173
+ x
1174
+ Semantic
1175
+ Relation
1176
+ Physics-Guided Learning (Explainable and Learnable)
1177
+
1178
+
1179
+
1180
+
1181
+ SAR
1182
+ Amplitude
1183
+ SAR
1184
+ complex
1185
+ conv 3x3 -512
1186
+ BN + ReLU
1187
+ fc 512xTk
1188
+ 64
1189
+ 64
1190
+ 128
1191
+ 256
1192
+ 512
1193
+ Physical Layer
1194
+ Physical Layer
1195
+ Fig. 10: A physics guided network was proposed [42], [43] where a novel deep learning paradigm and loss function were
1196
+ designed to associate the SAR scattering characteristics with image semantics.
1197
+ (a)
1198
+ (b)
1199
+ Fig. 11: Visualization of physics guided signals on test data by t-sne. (a) Different colors represent semantic labels of sea-
1200
+ ice. (b) The physics guided signals are grouped into eight clusters, where each color indicates samples with similar physical
1201
+ scattering properties.
1202
+ known targets. For example, a common approach for calibra-
1203
+ tion/validation of SAR data is to employ an electronic target
1204
+ (transponder) that receives a signal, applies a controllable time
1205
+ delay, and transmits the delayed signal towards the receiver
1206
+ of the bistatic/monostatic system. Such a target can be used
1207
+ to validate results related to deformation measurements (e.g.,
1208
+ atmospheric corrections) or polarimetric analysis.
1209
+ Some real world applications of SAR requires the measure-
1210
+ ment of reliability and uncertainty. One example is the sea-
1211
+ ice classification in the untraversed polar regions where the
1212
+ ice is always promptly changeable, that would result in the
1213
+ difficulty for annotation and the lack of reference data. In this
1214
+ case, the predictions in unknown polar areas obtained by AI
1215
+ model need to be trusted by humans. Strong robustness and
1216
+ plausible degree of confidence of ML system prediction are
1217
+ equally as important as its accuracy.
1218
+ Fig. 12 a indicates building orientations have a great impact
1219
+ on polarization orientation angles [58] and scattering mech-
1220
+ anisms [38]. The zoomed-in region mainly contains ortho
1221
+ buildings buildings where φ1 is close to 0◦ and orientated
1222
+ buildings with a larger φ2. The polarization orientation angles
1223
+ of ortho buildings are obviously smaller than those of oriented
1224
+ buildings. Ortho built-up areas mainly depict double scattering
1225
+ (DS) and mixed scattering (MS) where the double scattering
1226
+ dominates. The oriented buildings are with volume scattering
1227
+ (VS). Fig. 12 b shows limited robustness of recognition
1228
+ performance as the angle of test data varies when training with
1229
+ a small range of angles. A trustworthy model is expected to
1230
+ perceive SAR scattering variations with a variety of physical
1231
+ parameters and be perturbation-tolerant.
1232
+ B. Trustworthy Modeling with Uncertainty Quantification
1233
+ The development of Bayesian deep learning [59] has caught
1234
+ much attention in recent years, where the posterior distribution
1235
+ over parameters are obtained instead of the point estimation.
1236
+ A crucial property of the Bayesian method is its ability to
1237
+ quantify uncertainty, to the benefit of constructing trustworthy
1238
+ model.
1239
+ In the case of Fig. 12 b, the performance of deep neural
1240
+ networks drops dramatically when testing SAR targets of very
1241
+ different orientation angles with training data. The model is
1242
+ over-confident about some uncertain data that cannot be per-
1243
+ ceived by frequentist method. Bayesian deep neural network,
1244
+ instead, is able to calibrate the output score and measure
1245
+ the uncertainty of the prediction. Some recent studies applied
1246
+
1247
+ Young Ice
1248
+ Glacier
1249
+ First year ice
1250
+ Water bodies
1251
+ Iceberg
1252
+ Floating ice
1253
+ Old icePhy. Scat 0
1254
+ Phy. Scat 1
1255
+ Phy. Scat 2
1256
+ Phy. Scat 3
1257
+ Phy. Scat 4
1258
+ Phy. Scat 5
1259
+ Phy. Scat 6
1260
+ Phy. Scat 71.0
1261
+ 0.8
1262
+ 0.6
1263
+ 0.4 -
1264
+ 0.2
1265
+ 0.0
1266
+ 0
1267
+ 25
1268
+ 50
1269
+ 75
1270
+ 100
1271
+ 125
1272
+ 150
1273
+ 175ACCEPTED VERSION
1274
+ 10
1275
+ Fig. 12: A trustworthy model should perceive the SAR scattering variations with a variety of physical parameters and be
1276
+ perturbation-tolerant. a Differently oriented buildings reflect various polarization orientation angles and scattering mechanisms
1277
+ in a PolSAR image. b SAR targets vary violently with orientation angles. When training with a small range of angles, limited
1278
+ robustness of recognition performance is observed as the angle of test data varies.
1279
+ Bayesian deep learning for SAR sea-ice segmentation [60]–
1280
+ [62], as well as target discrimination [63]. The generated
1281
+ uncertainty map can serve as a guideline for the experts in
1282
+ annotation and improve trust between users and the model.
1283
+ Some approximation strategies of Bayesian deep neural net-
1284
+ work, such as Monte Carlo Dropout [64] and Deep ensembles
1285
+ [65], are promising for different SAR applications.
1286
+ We give an example of SAR ship detection for demonstra-
1287
+ tion. The limited labeled training data, and the interference
1288
+ of complex scattering from target itself or the inshore back-
1289
+ ground, would strongly restricted the detection performance.
1290
+ The ship detection result on some selected SAR images from
1291
+ AIR-SARShip-1.0 dataset [66], obtained by FCOS detection
1292
+ algorithm [67], are shown in the first row of Fig. 13. Compared
1293
+ with the ground truth annotation in the third row, the detection
1294
+ result appears many false alarms. It is crucial to estimate the
1295
+ model uncertainty, which is basically brought by inadequate
1296
+ training data, to evaluate the reliability of SAR ship detection
1297
+ model and provide more trustworthy predictions.
1298
+ When we apply the Monte Carlo (MC) Dropout training
1299
+ strategy to approximate the Bayesian inference [64], it captures
1300
+ the uncertainty from the existing deep model for SAR ship
1301
+ detection. The results with high uncertainty and very low
1302
+ classification scores are discarded, with only the trustworthy
1303
+ predictions preserved. The results are shown in the second row
1304
+ of Fig. 13, where the false alarms are evidently reduced. In
1305
+ the fourth and fifth SAR image, the localization uncertainty
1306
+ of two large ships visualized with circles around the corner
1307
+ of the predicted bounding box is relatively high. Intuitively,
1308
+ we can infer the reason for the weak capability of the trained
1309
+ model in detecting such kind of targets is probably the lack
1310
+ of the large size ships in the training set. The feedback from
1311
+ the uncertainty estimation should further inspire the follow-
1312
+ up studies to improve the algorithm and build trustworthier
1313
+ models.
1314
+ V. SUPPLEMENTARY EXPLANATIONS
1315
+ Beyond the hybrid and trustworthy modeling, extra expla-
1316
+ nations and other interpretable models are as well required to
1317
+ assist with developing more transparent AI model for SAR.
1318
+ The explainable artificial intelligence (XAI) techniques, such
1319
+ as gradient based, attention based, and occlusion based expla-
1320
+ nation methods, are helpful to demonstrate the effectiveness
1321
+ of integrating physical layers to achieve explainability.
1322
+ The transparent machine learning models, such as linear
1323
+ regression, decision trees, and Bayesian models, are inter-
1324
+ pretable [68]. The algorithm itself provides explanations, for
1325
+ example, Latent Dirichlet Allocation (LDA) builds a three-
1326
+ level hierarchical Bayesian model to describe the underlying
1327
+ relationship among document-topic-word. That is, the docu-
1328
+ ment can be explained with a set of topic, where each topic in
1329
+ turn, is represented by a distribution over words. Karmakar et
1330
+ al. [69] used the LDA model for SAR image data mining to
1331
+ generate the topic compositions and group them into semantic
1332
+ classes, which were fused with domain knowledge obtained
1333
+ by active learning from experts. The transparent model can
1334
+ be also integrated in a deep learning framework to approach
1335
+ the explainability. Huang et al. [42], [43] applied the LDA
1336
+ model to generate the physical attributes representation as the
1337
+ guided physics signals, rather than directly using the physical
1338
+ scattering characteristic labels to train the physics guided
1339
+ network. That is because the learned physics-aware features
1340
+ are expected to the benefit of semantic label prediction, but the
1341
+ semantic gap actually exists between the physical scattering
1342
+ characteristics and the semantic annotation. Consequently, the
1343
+ LDA model enables the guided signals to gain the abstract
1344
+ semantics and be explained with physical scattering properties.
1345
+ The other purpose for approaching the explainability lies in
1346
+ the applications of transfer learning. The manual annotation
1347
+ in SAR domain is difficult and the deficiency of labeled
1348
+ data basically restricts the development of data-driven meth-
1349
+
1350
+ PolSAR image
1351
+ Built-up area
1352
+ Scattering mechanism
1353
+ ib
1354
+ a
1355
+ -Ss
1356
+ -DS
1357
+ HMS
1358
+ 150°
1359
+ ±180°
1360
+ +150°
1361
+ -120°
1362
+ 1VS
1363
+ 0
1364
+ -30
1365
+ 30
1366
+ Polarization orientation angle map
1367
+ ZSU234
1368
+ Range
1369
+ 09-
1370
+ 60
1371
+ ZIL131
1372
+ d.
1373
+
1374
+ D7
1375
+ BRDM2
1376
+ -90
1377
+
1378
+ 2S1
1379
+ dt:
1380
+ 90
1381
+
1382
+ BTR60
1383
+ T72
1384
+ 120
1385
+ BTR70
1386
+ -120
1387
+
1388
+ BMP2
1389
+ Azimuth
1390
+ Building orientations
1391
+ -150
1392
+ 150
1393
+ ±180
1394
+ Test performance of different anglesACCEPTED VERSION
1395
+ 11
1396
+ FCOS result
1397
+ Ground Truth
1398
+ FCOS-MC Dropout
1399
+ Fig. 13: The SAR ship detection result on AIR-SARShip-1.0 dataset [66], obtained by the detection deep learning algorithm
1400
+ FCOS [67]. Many false alarms appear in the detection result, due to the limited training data and the interference of complex
1401
+ scattering. The prediction uncertainty is estimated by MC-Dropout [64] and the uncertain results are discard to achieve a better
1402
+ performance.
1403
+ ods. Facing a wide variety of launched SAR platforms with
1404
+ various frequency bands and resolutions, as well as other
1405
+ multi-spectral, hyper-spectral, optical remote sensing sensors,
1406
+ it is of vital importance for elucidating the transferability
1407
+ of ML models among inhomogeneous data. Arrieta et al.
1408
+ [68] indicated the transferability is one of the goals toward
1409
+ reaching the explainability. Although many researches have
1410
+ explored different deep transfer learning methods in SAR
1411
+ domain [46], [70], [71], the inner transfer mechanisms of deep
1412
+ learning model still need explanation of insight. An insufficient
1413
+ understanding of the model may mislead the user toward
1414
+ inappropriate design of algorithm and fatal consequences, i.e.
1415
+ the negative transfer. Based on SAR target recognition, we
1416
+ proposed to analyze the transferability of features in DNN,
1417
+ which contributed to explaining what, where, and how to
1418
+ transfer more effectively for SAR images [72]. The inspiration
1419
+ also motivates the follow-up studies, including the SAR-
1420
+ specific pretrained model [73], the application in detection task
1421
+ [74], and the interpretability analysis of deep learning model
1422
+ in radar image [75].
1423
+ VI. CONCLUSION AND PERSPECTIVES
1424
+ In this paper, we prospect an AI paradigm shift for SAR
1425
+ applications that is explainable, physics aware and trustwor-
1426
+ thy. To ground this, SAR physical layers embedded with
1427
+ domain knowledge are introduced, which are supposed to
1428
+ be integrated and interacted with neural networks for hy-
1429
+ brid modeling. Some illustrative examples are provided to
1430
+ demonstrate the general patterns, showing algorithmic and
1431
+ scientific explainability. In addition, we emphasize the impor-
1432
+ tance and approaches of trustworthy modeling with Bayesian
1433
+ deep learning, as well as illustrating some other techniques
1434
+ such as interpretable machine learning method, explainable
1435
+ techniques, and model transferability, that would assist with
1436
+ developing more transparent AI model for SAR. In fact, this
1437
+ field belonging to interdisciplinary research is still largely
1438
+ undeveloped. To our best knowledge, such approaches have
1439
+ not been formulated in the past years. So far, only some plain
1440
+ attempts have been made. Significant questions and challenges
1441
+ remain, e.g., the feasible representation of SAR physical layer,
1442
+ the optimized form of physical constraint, and hybrid modeling
1443
+ optimization.
1444
+ Currently there are several smart sensing techniques in the
1445
+ SAR community that can be exploited as pre-processing steps
1446
+ of data fed into DNNs, e.g., multi-aperture focusing in bistatic
1447
+ configurations [76], monostatic/bistatic tomography, polari-
1448
+ metric decomposition, deformation time series. The outputs
1449
+ of these techniques can expose features that probably cannot
1450
+ be directly extracted by a DNN, especially when using a
1451
+ small training data set. The newly introduced AI paradigms
1452
+ can apply to the broad class of coherent imaging systems. A
1453
+ few examples can be enumerated: computer tomography, THz
1454
+ imaging, echographs in medicine or industrial applications,
1455
+ sonar or seismic observations in Earth sciences, or radio-
1456
+ telescope data in astrophysics.
1457
+ ACKNOWLEDGMENT
1458
+ This work was supported by the National Natural Science
1459
+ Foundation of China under Grant 62101459, China Post-
1460
+ doctoral Science Foundation under Grant BX2021248, the
1461
+ Fundamental Research Funds for the Central Universities
1462
+ under Grant G2021KY05104, and a grant of the Romanian
1463
+ Ministry of Education and Research, CNCS - UEFISCDI,
1464
+ project number PN-III-P4-ID-PCE-2020-2120, within PNCDI
1465
+ III. We would like to thank the associate editor and the
1466
+ anonymous reviewers for their great contribution to this article.
1467
+
1468
+ baseline
1469
+ Our method
1470
+ U:0.0001
1471
+ GACCEPTED VERSION
1472
+ 12
1473
+ REFERENCES
1474
+ [1] A. Moreira, P. Prats-Iraola, M. Younis, G. Krieger, I. Hajnsek, and
1475
+ K. P. Papathanassiou, “A tutorial on synthetic aperture radar,” IEEE
1476
+ Geoscience and remote sensing magazine, vol. 1, no. 1, pp. 6–43, 2013.
1477
+ [2] A. Meta, P. Hoogeboom, and L. P. Ligthart, “Signal processing for fmcw
1478
+ sar,” IEEE Transactions on Geoscience and Remote Sensing, vol. 45,
1479
+ no. 11, pp. 3519–3532, 2007.
1480
+ [3] M. Amrani, A. Bey, and A. Amamra, “New sar target recognition
1481
+ based on yolo and very deep multi-canonical correlation analysis,”
1482
+ International Journal of Remote Sensing, pp. 1–20, 2021.
1483
+ [4] M. Amrani, F. Jiang, Y. Xu, S. Liu, and S. Zhang, “Sar-oriented visual
1484
+ saliency model and directed acyclic graph support vector metric based
1485
+ target classification,” IEEE Journal of Selected Topics in Applied Earth
1486
+ Observations and Remote Sensing, vol. 11, no. 10, pp. 3794–3810, 2018.
1487
+ [5] M. Amrani, K. Yang, D. Zhao, X. Fan, and F. Jiang, “An efficient
1488
+ feature selection for sar target classification,” in Pacific Rim Conference
1489
+ on Multimedia.
1490
+ Springer, 2017, pp. 68–78.
1491
+ [6] M. Amrani and F. Jiang, “Deep feature extraction and combination for
1492
+ synthetic aperture radar target classification,” Journal of Applied Remote
1493
+ Sensing, vol. 11, no. 4, p. 042616, 2017.
1494
+ [7] X.
1495
+ Zhu,
1496
+ S.
1497
+ Montazeri,
1498
+ M.
1499
+ Ali,
1500
+ Y.
1501
+ Hua,
1502
+ Y.
1503
+ Wang,
1504
+ L.
1505
+ Mou,
1506
+ Y.
1507
+ Shi,
1508
+ F.
1509
+ Xu,
1510
+ and
1511
+ R.
1512
+ Bamler,
1513
+ “Deep
1514
+ Learning
1515
+ Meets
1516
+ SAR:
1517
+ Concepts, Models, Pitfalls, and Perspectives,” IEEE Geoscience and
1518
+ Remote
1519
+ Sensing
1520
+ Magazine,
1521
+ pp.
1522
+ 0–0,
1523
+ 2021.
1524
+ [Online].
1525
+ Available:
1526
+ https://ieeexplore.ieee.org/document/9351574/
1527
+ [8] F.
1528
+ Lattari,
1529
+ B.
1530
+ Gonzalez
1531
+ Leon,
1532
+ F.
1533
+ Asaro,
1534
+ A.
1535
+ Rucci,
1536
+ C.
1537
+ Prati,
1538
+ and M. Matteucci, “Deep learning for sar image despeckling,”
1539
+ Remote Sensing, vol. 11, no. 13, 2019. [Online]. Available: https:
1540
+ //www.mdpi.com/2072-4292/11/13/1532
1541
+ [9] L. H. Hughes, D. Marcos, S. Lobry, D. Tuia, and M. Schmitt, “A
1542
+ deep learning framework for matching of sar and optical imagery,”
1543
+ ISPRS Journal of Photogrammetry and Remote Sensing, vol. 169,
1544
+ pp. 166–179, 2020. [Online]. Available: https://www.sciencedirect.com/
1545
+ science/article/pii/S0924271620302598
1546
+ [10] D. Xiang, Y. Xie, J. Cheng, Y. Xu, H. Zhang, and Y. Zheng, “Optical
1547
+ and sar image registration based on feature decoupling network,” IEEE
1548
+ Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1–13,
1549
+ 2022.
1550
+ [11] Y. Zhang, C. Ding, X. Qiu, and F. Li, “The Characteristics of the
1551
+ Multipath Scattering and the Application for Geometry Extraction in
1552
+ High-Resolution SAR Images,” IEEE Transactions on Geoscience and
1553
+ Remote Sensing, vol. 53, no. 8, pp. 4687–4699, Aug. 2015.
1554
+ [12] U. Soergel, A. Thiele, H. Gross, and U. Thoennessen, “Extraction of
1555
+ Bridge Features from high-resolution InSAR Data and optical Images,”
1556
+ in 2007 Urban Remote Sensing Joint Event.
1557
+ Paris, France: IEEE, Apr.
1558
+ 2007, pp. 1–6.
1559
+ [13] G. E. Karniadakis, I. G. Kevrekidis, L. Lu, P. Perdikaris, S. Wang, and
1560
+ L. Yang, “Physics-informed machine learning,” Nature Reviews Physics,
1561
+ vol. 3, no. 6, pp. 422–440, Jun. 2021.
1562
+ [14] A. Karpatne, G. Atluri, J. H. Faghmous, M. Steinbach, A. Banerjee,
1563
+ A. Ganguly, S. Shekhar, N. Samatova, and V. Kumar, “Theory-Guided
1564
+ Data Science: A New Paradigm for Scientific Discovery from Data,”
1565
+ IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 10,
1566
+ pp. 2318–2331, Oct. 2017.
1567
+ [15] A. Karpatne, I. Ebert-Uphoff, S. Ravela, H. A. Babaie, and V. Kumar,
1568
+ “Machine Learning for the Geosciences: Challenges and Opportunities,”
1569
+ IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 8,
1570
+ pp. 1544–1554, Aug. 2019.
1571
+ [16] M. Reichstein, G. Camps-Valls, B. Stevens, M. Jung, J. Denzler,
1572
+ N. Carvalhais, and Prabhat, “Deep learning and process understanding
1573
+ for data-driven Earth system science,” Nature, vol. 566, no. 7743,
1574
+ pp. 195–204, 2019. [Online]. Available: http://dx.doi.org/10.1038/
1575
+ s41586-019-0912-1
1576
+ [17] M. Tria, J. Ovarlez, L. Vignaud, J. Castelli, and M. Benidir, “Discrimi-
1577
+ nating real objects in radar imaging by exploiting the squared modulus
1578
+ of the continuous wavelet transform,” IET Radar, Sonar & Navigation,
1579
+ vol. 1, no. 1, p. 27, 2007.
1580
+ [18] L. Ferro-Famil, A. Reigber, E. Pottier, and W.-M. Boerner, “Scene
1581
+ characterization using subaperture polarimetric sar data,” vol. 41,
1582
+ no. 10, pp. 2264–2276. [Online]. Available: http://ieeexplore.ieee.org/
1583
+ document/1237388/
1584
+ [19] A. Anghel, G. Vasile, R. Cacoveanu, C. Ioana, and S. Ciochina, “Short-
1585
+ range wideband fmcw radar for millimetric displacement measure-
1586
+ ments,” IEEE Transactions on Geoscience and Remote Sensing, vol. 52,
1587
+ no. 9, pp. 5633–5642, 2014.
1588
+ [20] C. Oliver, “Synthetic-aperture radar imaging,” Journal of Physics D:
1589
+ Applied Physics, vol. 22, no. 7, p. 871, 1989.
1590
+ [21] M. Spigai, C. Tison, and J.-C. Souyris, “Time-frequency analysis of
1591
+ point target behaviour in high resolution single polarization sar images,”
1592
+ in 7th European Conference on Synthetic Aperture Radar.
1593
+ VDE, 2008,
1594
+ pp. 1–4.
1595
+ [22] J. Singh and M. Datcu, “Sar target analysis based on multiple-sublook
1596
+ decomposition: a visual exploration approach,” IEEE Geoscience and
1597
+ Remote Sensing Letters, vol. 9, no. 2, pp. 247–251, 2011.
1598
+ [23] M. Spigai, C. Tison, and J.-c. Souyris, “Time-Frequency Analysis in
1599
+ High-Resolution SAR Imagery,” IEEE Transactions on Geoscience and
1600
+ Remote Sensing, vol. 49, no. 7, pp. 2699–2711, 2011.
1601
+ [24] J. Chen, X. Qiu, C. Ding, and Y. Wu, “CVCMFF Net: Complex-Valued
1602
+ Convolutional and Multifeature Fusion Network for Building Semantic
1603
+ Segmentation of InSAR Images,” IEEE Transactions on Geoscience and
1604
+ Remote Sensing, pp. 1–14, 2021.
1605
+ [25] C. Yonezawa, M. Watanabe, and G. Saito, “Polarimetric Decomposition
1606
+ Analysis of ALOS PALSAR Observation Data before and after a
1607
+ Landslide Event,” Remote Sensing, pp. 2314–2328, 2012.
1608
+ [26] A. Ferro, D. Brunner, L. Bruzzone, and G. Lemoine, “On the relationship
1609
+ between double bounce and the orientation of buildings in VHR SAR
1610
+ images,” IEEE Geoscience and Remote Sensing Letters, vol. 8, no. 4,
1611
+ pp. 612–616, 2011.
1612
+ [27] L. C. Potter and R. L. Moses, “Attributed scattering centers for SAR
1613
+ ATR,” IEEE Transactions on Image Processing, vol. 6, no. 1, pp. 79–91,
1614
+ 1997.
1615
+ [28] Z. Huang, M. Datcu, Z. Pan, and B. Lei, “Deep sar-net: Learning
1616
+ objects from signals,” ISPRS Journal of Photogrammetry and Remote
1617
+ Sensing,
1618
+ vol.
1619
+ 161,
1620
+ pp.
1621
+ 179
1622
+
1623
+ 193,
1624
+ 2020.
1625
+ [Online].
1626
+ Available:
1627
+ http://www.sciencedirect.com/science/article/pii/S0924271620300162
1628
+ [29] Z. Huang, M. Datcu, Z. Pan, X. Qiu, and B. Lei, “HDEC-TFA: An
1629
+ Unsupervised Learning Approach for Discovering Physical Scattering
1630
+ Properties of Single-Polarized SAR Image,” IEEE Transactions on
1631
+ Geoscience and Remote Sensing, vol. 59, no. 4, pp. 3054–3071, 2021.
1632
+ [Online]. Available: https://ieeexplore.ieee.org/document/9169671/
1633
+ [30] J. Zhao, M. Datcu, Z. Zhang, H. Xiong, and W. Yu, “Contrastive-
1634
+ regulated cnn in the complex domain: A method to learn physical
1635
+ scattering signatures from flexible polsar images,” IEEE Transactions
1636
+ on Geoscience and Remote Sensing, vol. 57, no. 12, pp. 10 116–10 135,
1637
+ 2019.
1638
+ [31] Z. Zhang, H. Wang, S. Member, F. Xu, and S. Member, “Complex-
1639
+ Valued Convolutional Neural Network and Its Application in Polarimet-
1640
+ ric SAR Image Classification,” vol. 55, no. 12, pp. 7177–7188, 2017.
1641
+ [32] P. Vinayaraj, R. Sugimoto, R. Nakamura, and Y. Yamaguchi, “Transfer
1642
+ Learning With CNNs for Segmentation of PALSAR-2 Power Decompo-
1643
+ sition Components,” IEEE Journal of Selected Topics in Applied Earth
1644
+ Observations and Remote Sensing, vol. 13, pp. 6352–6361, 2020.
1645
+ [33] S. Lei, X. Qiu, C. Ding, and S. Lei, “A Feature Enhancement Method
1646
+ Based on the Sub-Aperture Decomposition for Rotating Frame Ship
1647
+ Detection in SAR Images,” in 2021 IEEE International Geoscience and
1648
+ Remote Sensing Symposium IGARSS, Jul. 2021, pp. 3573–3576, iSSN:
1649
+ 2153-7003.
1650
+ [34] J.
1651
+ Zhang,
1652
+ M.
1653
+ Xing,
1654
+ and
1655
+ Y.
1656
+ Xie,
1657
+ “FEC:
1658
+ A
1659
+ Feature
1660
+ Fusion
1661
+ Framework for SAR Target Recognition Based on Electromagnetic
1662
+ Scattering Features and Deep CNN Features,” IEEE Transactions on
1663
+ Geoscience and Remote Sensing, pp. 1–14, 2020. [Online]. Available:
1664
+ https://ieeexplore.ieee.org/document/9127111/
1665
+ [35] S. Feng, K. Ji, L. Zhang, X. Ma, and G. Kuang, “SAR Target
1666
+ Classification Based on Integration of ASC Parts Model and Deep
1667
+ Learning Algorithm,” IEEE Journal of Selected Topics in Applied Earth
1668
+ Observations and Remote Sensing, pp. 1–1, 2021. [Online]. Available:
1669
+ https://ieeexplore.ieee.org/document/9556630/
1670
+ [36] J.-P. Ovarlez, L. Vignaud, J.-C. Castelli, M. Tria, and M. Benidir,
1671
+ “Analysis of SAR images by multidimensional wavelet transform,” IEE
1672
+ Proceedings - Radar, Sonar and Navigation, vol. 150, no. 4, p. 234,
1673
+ 2003.
1674
+ [37] Z.
1675
+ Huang,
1676
+ M.
1677
+ Datcu,
1678
+ Z.
1679
+ Pan,
1680
+ and
1681
+ B.
1682
+ Lei,
1683
+ “A
1684
+ Hybrid
1685
+ and
1686
+ Explainable Deep Learning Framework for SAR Images,” in IGARSS
1687
+ 2020 - 2020 IEEE International Geoscience and Remote Sensing
1688
+ Symposium.
1689
+ IEEE, sep 2020, pp. 1727–1730. [Online]. Available:
1690
+ https://ieeexplore.ieee.org/document/9323845/
1691
+ [38] D. Ratha, A. Bhattacharya, and A. C. Frery, “Unsupervised classification
1692
+ of PolSAR data using a scattering similarity measure derived from
1693
+ a geodesic distance,” IEEE Geoscience and Remote Sensing Letters,
1694
+ vol. 15, no. 1, pp. 151–155, 2018.
1695
+ [39] Z. Huang and M. Datcu, “Urban Area Analysis in Single-polarized SAR
1696
+ Images Based on Unsupervised Deep Learning,” Proceedings of the
1697
+
1698
+ ACCEPTED VERSION
1699
+ 13
1700
+ European Conference on Synthetic Aperture Radar, EUSAR, vol. 2021-
1701
+ March, pp. 469–473, 2021.
1702
+ [40] Q.
1703
+ Song,
1704
+ F.
1705
+ Xu,
1706
+ and
1707
+ Y.-Q.
1708
+ Jin,
1709
+ “Radar
1710
+ Image
1711
+ Colorization:
1712
+ Converting Single-Polarization to Fully Polarimetric Using Deep
1713
+ Neural Networks,” IEEE Access, vol. 6, pp. 1647–1661, 2018. [Online].
1714
+ Available: http://ieeexplore.ieee.org/document/8141881/
1715
+ [41] J. Qu, X. Qiu, and C. Ding, “A Study of Recovering Polsar Information
1716
+ from Single-Polarized Data Using DNN,” in 2021 IEEE International
1717
+ Geoscience and Remote Sensing Symposium IGARSS, Jul. 2021, pp.
1718
+ 812–815, iSSN: 2153-7003.
1719
+ [42] Z. Huang, C. O. Dumitru, and J. Ren, “Physics-aware feature learning
1720
+ of sar images with deep neural networks : A case study,” IGARSS 2021
1721
+ - 2021 IEEE International Geoscience and Remote Sensing Symposium,
1722
+ pp. 1–4, 2021.
1723
+ [43] Z. Huang, X. Yao, Y. Liu, C. O. Dumitru, M. Datcu, and J. Han,
1724
+ “Physically explainable cnn for sar image classification,” ISPRS Journal
1725
+ of Photogrammetry and Remote Sensing, vol. 190, pp. 25–37, 2022.
1726
+ [44] X. Hu, W. Feng, Y. Guo, and Q. Wang, “Feature Learning for SAR
1727
+ Target Recognition with Unknown Classes by Using CVAE-GAN,”
1728
+ Remote Sensing, vol. 13, no. 18, p. 3554, Jan. 2021. [Online]. Available:
1729
+ https://www.mdpi.com/2072-4292/13/18/3554
1730
+ [45] J. Guo, B. Lei, C. Ding, and Y. Zhang, “Synthetic aperture radar image
1731
+ synthesis by using generative adversarial nets,” IEEE Geoscience and
1732
+ Remote Sensing Letters, vol. 14, no. 7, pp. 1111–1115, 2017.
1733
+ [46] D. Malmgren-Hansen, A. Kusk, J. Dall, A. A. Nielsen, R. Engholm, and
1734
+ H. Skriver, “Improving sar automatic target recognition models with
1735
+ transfer learning from simulated data,” IEEE Geoscience and remote
1736
+ sensing Letters, vol. 14, no. 9, pp. 1484–1488, 2017.
1737
+ [47] Q. Song, F. Xu, and Y.-Q. Jin, “SAR Image Representation Learning
1738
+ With Adversarial Autoencoder Networks,” in IGARSS 2019 - 2019 IEEE
1739
+ International Geoscience and Remote Sensing Symposium, Jul. 2019, pp.
1740
+ 9498–9501, iSSN: 2153-7003.
1741
+ [48] J. Oh and M. Kim, “PeaceGAN: A GAN-Based Multi-Task Learning
1742
+ Method for SAR Target Image Generation with a Pose Estimator and
1743
+ an Auxiliary Classifier,” Remote Sensing, vol. 13, no. 19, p. 3939,
1744
+ Jan. 2021. [Online]. Available: https://www.mdpi.com/2072-4292/13/
1745
+ 19/3939
1746
+ [49] M. Chu, N. Thuerey, H.-P. Seidel, C. Theobalt, and R. Zayer, “Learning
1747
+ meaningful controls for fluids,” ACM Trans. Graph., vol. 40, no. 4, jul
1748
+ 2021. [Online]. Available: https://doi.org/10.1145/3450626.3459845
1749
+ [50] Y. O. U. Xie, E. Franz, M. Chu, and N. Thuerey, “tempoGAN :
1750
+ A Temporally Coherent , Volumetric GAN for Super-resolution Fluid
1751
+ Flow,” vol. 37, no. 4, 2018.
1752
+ [51] Y. Zhou, K. Yan, and X. Li, “Underwater Image Enhancement via
1753
+ Physical-Feedback Adversarial Transfer Learning,” IEEE Journal of
1754
+ Oceanic Engineering, vol. 47, no. 1, pp. 76–87, Jan. 2022.
1755
+ [52] Y. Wang, Q. Wang, W. Lu, and H. Li, “Physics-constrained seismic
1756
+ impedance inversion based on deep learning,” IEEE Geoscience and
1757
+ Remote Sensing Letters, vol. 19, pp. 1–5, 2022.
1758
+ [53] T. Chen, S. Kornblith, M. Norouzi, and G. Hinton, “A simple framework
1759
+ for contrastive learning of visual representations,” in Proceedings of the
1760
+ 37th International Conference on Machine Learning, ser. Proceedings
1761
+ of Machine Learning Research, H. D. III and A. Singh, Eds., vol.
1762
+ 119.
1763
+ PMLR, 13–18 Jul 2020, pp. 1597–1607. [Online]. Available:
1764
+ https://proceedings.mlr.press/v119/chen20j.html
1765
+ [54] Z. Wu, Y. Xiong, S. X. Yu, and D. Lin, “Unsupervised feature learning
1766
+ via non-parametric instance discrimination,” in Proceedings of the IEEE
1767
+ Conference on Computer Vision and Pattern Recognition (CVPR), June
1768
+ 2018.
1769
+ [55] B. Ren, Y. Zhao, B. Hou, J. Chanussot, and L. Jiao, “A mutual
1770
+ information-based self-supervised learning model for polsar land cover
1771
+ classification,” IEEE Transactions on Geoscience and Remote Sensing,
1772
+ vol. 59, no. 11, pp. 9224–9237, 2021.
1773
+ [56] R. T˘anase, R. Bahmanyar, G. Schwarz, and M. Datcu, “Discovery of
1774
+ semantic relationships in polsar images using latent dirichlet allocation,”
1775
+ IEEE Geoscience and Remote Sensing Letters, vol. 14, no. 2, pp. 237–
1776
+ 241, 2017.
1777
+ [57] S. Feng, K. Ji, F. Wang, L. Zhang, X. Ma, and G. Kuang, “Electro-
1778
+ magnetic scattering feature (esf) module embedded network based on
1779
+ asc model for robust and interpretable sar atr,” IEEE Transactions on
1780
+ Geoscience and Remote Sensing, 2022.
1781
+ [58] D. Xiang, T. Tang, Y. Ban, Y. Su, and G. Kuang, “Unsupervised polari-
1782
+ metric sar urban area classification based on model-based decomposition
1783
+ with cross scattering,” ISPRS Journal of Photogrammetry and Remote
1784
+ Sensing, vol. 116, pp. 86–100, 2016.
1785
+ [59] A. G. Wilson and P. Izmailov, “Bayesian deep learning and a proba-
1786
+ bilistic perspective of generalization,” Advances in neural information
1787
+ processing systems, vol. 33, pp. 4697–4708, 2020.
1788
+ [60] A. Hartmann, A. Davari, T. Seehaus, M. Braun, A. Maier, and
1789
+ V. Christlein, “Bayesian u-net for segmenting glaciers in SAR imagery,”
1790
+ in 2021 IEEE International Geoscience and Remote Sensing Symposium
1791
+ IGARSS, 2021, pp. 3479–3482.
1792
+ [61] N. Saberi, K. A. Scott, and C. Duguay, “Incorporating aleatoric
1793
+ uncertainties in lake ice mapping using radarsat-2 sar images and
1794
+ cnns,” Remote Sensing, vol. 14, no. 3, 2022. [Online]. Available:
1795
+ https://www.mdpi.com/2072-4292/14/3/644
1796
+ [62] N. Asadi, K. A. Scott, A. S. Komarov, M. Buehner, and D. A. Clausi,
1797
+ “Evaluation of a neural network with uncertainty for detection of ice and
1798
+ water in sar imagery,” IEEE Transactions on Geoscience and Remote
1799
+ Sensing, vol. 59, no. 1, pp. 247–259, 2021.
1800
+ [63] N. Blomerus, P. de Villiers, and W. Nel, “Improved explainability
1801
+ through uncertainty estimation in automatic target recognition of sar
1802
+ images,” in 2021 IEEE 24th International Conference on Information
1803
+ Fusion (FUSION), 2021, pp. 1–6.
1804
+ [64] Y. Gal and Z. Ghahramani, “Dropout as a bayesian approximation:
1805
+ Representing model uncertainty in deep learning,” in international
1806
+ conference on machine learning.
1807
+ PMLR, 2016, pp. 1050–1059.
1808
+ [65] B. Lakshminarayanan, A. Pritzel, and C. Blundell, “Simple and
1809
+ Scalable Predictive Uncertainty Estimation using Deep Ensembles,”
1810
+ arXiv:1612.01474 [cs, stat], Nov. 2017.
1811
+ [66] X.
1812
+ Sun,
1813
+ Z.
1814
+ Wang,
1815
+ Y.
1816
+ Sun,
1817
+ W.
1818
+ Diao,
1819
+ Y.
1820
+ Zhang,
1821
+ and
1822
+ K.
1823
+ Fu,
1824
+ “AIR-SARShip-1.0: High-resolution SAR Ship Detection Dataset (in
1825
+ English),” p. 852, 2019. [Online]. Available: http://radars.ie.ac.cn/en/
1826
+ article/doi/10.12000/JR19097
1827
+ [67] Z. Tian, C. Shen, H. Chen, and T. He, “Fcos: Fully convolutional one-
1828
+ stage object detection,” in Proceedings of the IEEE/CVF international
1829
+ conference on computer vision, 2019, pp. 9627–9636.
1830
+ [68] A. Barredo Arrieta, N. D´ıaz-Rodr´ıguez, J. Del Ser, A. Bennetot,
1831
+ S. Tabik, A. Barbado, S. Garcia, S. Gil-Lopez, D. Molina, R. Benjamins,
1832
+ R. Chatila, and F. Herrera, “Explainable artificial intelligence (xai):
1833
+ Concepts, taxonomies, opportunities and challenges toward responsible
1834
+ ai,” Information Fusion, vol. 58, pp. 82–115, 2020. [Online]. Available:
1835
+ https://www.sciencedirect.com/science/article/pii/S1566253519308103
1836
+ [69] C. Karmakar, C. O. Dumitru, G. Schwarz, and M. Datcu, “Feature-free
1837
+ explainable data mining in sar images using latent dirichlet allocation,”
1838
+ IEEE Journal of Selected Topics in Applied Earth Observations and
1839
+ Remote Sensing, 2020.
1840
+ [70] Z. Huang, Z. Pan, and B. Lei, “Transfer learning with deep convolutional
1841
+ neural network for SAR target classification with limited labeled data,”
1842
+ Remote Sensing, vol. 9, no. 9, pp. 1–21, 2017.
1843
+ [71] M. Rostami, S. Kolouri, E. Eaton, and K. Kim, “Deep transfer learning
1844
+ for few-shot sar image classification,” Remote Sensing, vol. 11, no. 11,
1845
+ p. 1374, 2019.
1846
+ [72] Z. Huang, Z. Pan, and B. Lei, “What, Where, and How to Transfer in
1847
+ SAR Target Recognition Based on Deep CNNs,” IEEE Transactions on
1848
+ Geoscience and Remote Sensing, vol. 58, no. 4, pp. 2324–2336, 2020.
1849
+ [73] Z.
1850
+ Huang,
1851
+ C.
1852
+ O.
1853
+ Dumitru,
1854
+ Z.
1855
+ Pan,
1856
+ B.
1857
+ Lei,
1858
+ and
1859
+ M.
1860
+ Datcu,
1861
+ “Classification of Large-Scale High-Resolution SAR Images With
1862
+ Deep Transfer Learning,” IEEE Geoscience and Remote Sensing
1863
+ Letters, vol. 18, no. 1, pp. 107–111, jan 2021. [Online]. Available:
1864
+ https://ieeexplore.ieee.org/document/8966281/
1865
+ [74] Q. An, Z. Pan, H. You, and Y. Hu, “Transitive transfer learning-based
1866
+ anchor free rotatable detector for sar target detection with few samples,”
1867
+ IEEE Access, vol. 9, pp. 24 011–24 025, 2021.
1868
+ [75] Y. L. X. L. C. Weijie LI, Wei YANG, “Research and exploration on
1869
+ interpretability of deep learning model in radar image,” SCIENTIA
1870
+ SINICA Informationis, pp. 1–21, 2021.
1871
+ [76] F. Rosu, A. Anghel, R. Cacoveanu, B. Rommen, and M. Datcu,
1872
+ “Multiaperture focusing for spaceborne transmitter/ground-based re-
1873
+ ceiver bistatic sar,” IEEE Journal of Selected Topics in Applied Earth
1874
+ Observations and Remote Sensing, vol. 13, pp. 5823–5832, 2020.
1875
+
1876
+ ACCEPTED VERSION
1877
+ 14
1878
+ PLACE
1879
+ PHOTO
1880
+ HERE
1881
+ Mihai Datcu (DLR - German Aerospace Center
1882
+ (DLR), Oberpfaffenhofen, Wesling 82234, Germany,
1883
+ and University POLITEHNICA of Bucharest (UPB),
1884
+ [email protected]). His research interests include
1885
+ explainable and physics aware AI, smart radar sen-
1886
+ sors design, and quantum machine learning with
1887
+ applications in Earth Observation (EO). He holds
1888
+ a Professor position in AI and information theory
1889
+ with UPB, and he is Senior Scientist with DLR. He
1890
+ elaborated AI4EO programs and systems for CNES,
1891
+ DLR, EC, ESA, NASA, ROSA. He was the recipient
1892
+ of the Chaire d’excellence internationale Blaise Pascal 2017 for international
1893
+ recognition in the field of Data Science in Earth Observation. He is IEEE
1894
+ Fellow.
1895
+ PLACE
1896
+ PHOTO
1897
+ HERE
1898
+ Zhongling
1899
+ Huang
1900
+ (Northwestern
1901
+ Polytechnical
1902
+ University,
1903
+ Xi’an,
1904
+ China.
1905
1906
+ She
1907
+ received
1908
+ the B.Sc. degree in electronic information science
1909
+ and technology from Beijing Normal University,
1910
+ Beijing, China, in 2015, and the Ph.D. degree
1911
+ from
1912
+ the
1913
+ University
1914
+ of
1915
+ Chinese
1916
+ Academy
1917
+ of
1918
+ Sciences (UCAS) and the Aerospace Information
1919
+ Research Institute, Chinese Academy of Sciences,
1920
+ Beijing, China, in 2020. She served as a visiting
1921
+ scholar in German Aerospace Center (DLR) during
1922
+ 2018-2019, funded by UCAS. She is currently working in the BRain
1923
+ and Artificial INtelligence Lab (BRAIN LAB), School of Automation,
1924
+ Northwestern Polytechnical University, Xi’an, China. Her research interests
1925
+ include explainable deep learning for synthetic aperture radar (XAI4SAR),
1926
+ SAR image interpretation, deep learning, and remote sensing data mining.
1927
+ PLACE
1928
+ PHOTO
1929
+ HERE
1930
+ Andrei
1931
+ Anghel
1932
+ (University
1933
+ POLITEHNICA
1934
+ of
1935
+ Bucharest
1936
+ (UPB),
1937
+ 313
1938
+ Splaiul
1939
+ Independentei,
1940
+ Bucharest
1941
+ 060042,
1942
+ Romania,
1943
+ andrei.anghelatmunde.pub.ro).
1944
+ His
1945
+ current
1946
+ research
1947
+ interests
1948
+ include
1949
+ remote
1950
+ sensing,
1951
+ smart radar, microwaves and signal processing.
1952
+ Between 2012 and 2015, he worked as a PhD
1953
+ researcher with Grenoble Image Speech Signal
1954
+ Automatics
1955
+ Laboratory
1956
+ (GIPSA-lab),
1957
+ Grenoble,
1958
+ France. Presently he is Associate Professor in
1959
+ telecommunications at UPB designing bistatic SAR
1960
+ systems for ESA. He is IEEE Senior Member.
1961
+ PLACE
1962
+ PHOTO
1963
+ HERE
1964
+ Juanping Zhao (School of Electronic Information
1965
+ and Electrical Engineering, Shanghai Jiao Tong Uni-
1966
+ versity, Shanghai 200240, China, juanpingzhaoat-
1967
+ sjtu.edu.cn). Her research interests include AI for
1968
+ SAR and PolSAR image interpretation, pattern
1969
+ recognition, and machine learning. From 2018 to
1970
+ 2019, she was a visiting Ph.D. student with German
1971
+ Aerospace Center (DLR), Oberpfaffenhofen, Ger-
1972
+ many.
1973
+ PLACE
1974
+ PHOTO
1975
+ HERE
1976
+ Remus
1977
+ Cacoveanu
1978
+ (University
1979
+ POLIEHNICA
1980
+ of Bucharest (UPB), 313 Splaiul Independentei,
1981
+ Bucharest 060042, Romania, rcacoveanu at ya-
1982
+ hoo.com). His main field of expertise is in the
1983
+ wireless communication systems, antennas, radar
1984
+ sensors, propagation, and microwave circuits. He
1985
+ holds an Associate Professor position in telecommu-
1986
+ nications with UPB. For more than 10 years he was
1987
+ the technical lead of the Redline Communications’
1988
+ Romanian branch and between 2011-2015 he was
1989
+ technical consultant for Blinq Networks Canada.
1990
+ One of the designed products received the “Best of WiMAX World EMEA
1991
+ 2008 Industry Choice Award”, Munich Germany May 21st 2008.
1992
+
JtE2T4oBgHgl3EQfAQZo/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LdAzT4oBgHgl3EQfkf0t/content/tmp_files/2301.01531v1.pdf.txt ADDED
@@ -0,0 +1,976 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
2
+ 1
3
+ MoBYv2AL: Self-supervised Active Learning
4
+ for Image Classification
5
+ Razvan Caramalau1
6
7
+ Binod Bhattarai2
8
9
+ Danail Stoyanov2
10
11
+ Tae-Kyun Kim1,3
12
13
+ 1 Imperial College London, UK
14
+ 2 University College London, UK
15
+ 3 School of Computing,
16
+ KAIST, Daejeon, South Korea
17
+ Abstract
18
+ Active learning(AL) has recently gained popularity for deep learning(DL) models.
19
+ This is due to efficient and informative sampling, especially when the learner requires
20
+ large-scale labelled datasets. Commonly, the sampling and training happen in stages
21
+ while more batches are added. One main bottleneck in this strategy is the narrow repre-
22
+ sentation learned by the model that affects the overall AL selection.
23
+ We present MoBYv2AL, a novel self-supervised active learning framework for im-
24
+ age classification. Our contribution lies in lifting MoBY – one of the most successful
25
+ self-supervised learning algorithms to the AL pipeline. Thus, we add the downstream
26
+ task-aware objective function and optimize it jointly with contrastive loss. Further, we
27
+ derive a data-distribution selection function from labelling the new examples. Finally,
28
+ we test and study our pipeline robustness and performance for image classification tasks.
29
+ We successfully achieved state-of-the-art results when compared to recent AL methods.
30
+ Code available: https://github.com/razvancaramalau/MoBYv2AL
31
+ 1
32
+ Introduction
33
+ Active Learning (AL) [1, 3, 6, 13, 21, 22, 32, 42] has recently gained more popularity in
34
+ the research community. The goal of AL is to sample the most informative and diverse
35
+ examples from a large pool of unlabelled data to query their labels. The existing AL meth-
36
+ ods can be grouped into two based on the selection criteria. The first group is uncertainty-
37
+ based algorithms [12, 15, 42] that select the challenging and informative examples. Whereas
38
+ representative-based algorithms select the most diverse examples from the data set. To select
39
+ diverse examples, existing methods first project the images into a feature space followed by
40
+ applying sampling techniques such as CoreSet [28]. Our work falls in the latter category.
41
+ Prominent works on representative-based methods for AL in the past few years have tack-
42
+ led a wide range of architectures to learn the image representations such as Convolutional
43
+ Neural Network [42], Graph Convolutional Neural Networks [6], Bayesian Network [5],
44
+ © 2022. The copyright of this document resides with its authors.
45
+ It may be distributed unchanged freely in print or electronic forms.
46
+ arXiv:2301.01531v1 [cs.CV] 4 Jan 2023
47
+
48
+ 2
49
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
50
+ Variational Auto-Encoders [21, 32], and too few to mention. These works have proven that
51
+ the learned features of the images have directly influenced the performance of the pipeline.
52
+ However, these methods suffer from cold-start problem. As we know, in the early selection
53
+ stage, we have limited annotated examples, and the above-mentioned architectures are hard
54
+ to train with the small number of training examples. Thus, the features extracted from such
55
+ models get biased from the beginning and continue to become sub-optimal in the subsequent
56
+ selection stages. This problem is commonly known as cold-start problem. To address such a
57
+ problem, recent works in AL have explored self-supervised learning methods [3, 13, 17, 20].
58
+ Self-supervised learning methods [4, 7, 16, 19, 41] have made tremendous progress in
59
+ generating discriminative representations of the images. Some methods have even come
60
+ close to supervised methods in generalization [10, 16, 41]. One of the earliest works in this
61
+ direction [13] employed consistency loss between the input image and its geometrically aug-
62
+ mented versions along with the objective of downstream tasks. However, this method limits
63
+ augmentation methods in the primitive form. Similarly, J. Bengar et al. [3] introduced con-
64
+ trastive learning in AL, but the self-supervised method and end-task objective are optimised
65
+ in multi-stage form. This makes the model sub-optimal, affecting the features’ representa-
66
+ tiveness during selection. Simple random labelling overpasses any AL criteria. Thus, the
67
+ existing works in this direction show explicit limitations.
68
+ To address the issues of those methods, we introduce contrastive learning as MoBYv2
69
+ (from its predecessor MoBY [41]) in our AL pipeline, MoBYv2AL, and jointly train the
70
+ learner. We choose MoBY SSL because it addresses the computational complexities and
71
+ shortcomings of other previous methods, such as SimCLR [8] or BYOL[16]. MoBY has two
72
+ branches (as shown in Figure 1). One updates with gradient (query encoder) and another
73
+ with momentum (key encoder). The parameters of the momentum encoder are updated in
74
+ slow-moving averages with the query one. Moreover, the memory bank of keys from the mo-
75
+ mentum encoder keeps long dependencies with several mini-batches. Apart from minimising
76
+ a contrastive loss, another advantage consists in the asymmetric structure of BYOL that cap-
77
+ tures distances from mean representation. The AL process of MoBYv2AL culminates with
78
+ the concept-aware selection function, CoreSet.
79
+ We state our contributions and achievements with the following:
80
+ • a task-aware self-supervised method jointly trained with the learner - MoBYv2;
81
+ • a quantitative evaluation with MoBYv2AL on multiple image classification bench-
82
+ marks such as: CIFAR-10/100[24], SVHN[14] and FashionMNIST [40];
83
+ • state-of-the-art performance over the existing AL baselines.
84
+ 2
85
+ Related Works
86
+ Recent Advances in Active Learning. Recent advancement in AL are either uncertainty-
87
+ oriented [5, 12, 15, 30, 32, 42] or data representativeness [1, 28, 35]; and some of them are
88
+ the mixture of both [2, 6, 13, 21].
89
+ Under the pool-based setting [29], deep active learning has been initially tackled with un-
90
+ certainty estimation. For classification tasks, this was addressed from the maximum entropy
91
+ of the posterior or through Bayesian approximation with Monte Carlo (MC) Dropout[5, 12,
92
+ 15]. Concurrently, methods that used latent representations to sample have outperformed
93
+ the ones that explored uncertainty. From these works, we recognise CoreSet [28] as the
94
+
95
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
96
+ 3
97
+ most revised and competitive baseline. However, more recently, a new trend shifted the
98
+ AL acquisition process to parameterised modules. The first work, Learning Loss [42] opti-
99
+ mises a predictor for the loss of the learner. Still tracking uncertainty, VAAL [32] deploys
100
+ a dedicated variational auto-encoder (VAE) to adversarial distinguish between labelled and
101
+ unlabelled images. CoreGCN[6] and CDAL [1], on the other hand, proposed to improve
102
+ data representativeness with graph convolutional networks and categorical contextual diver-
103
+ sity, respectively. We test these methods in the experiments section and we further detail
104
+ them in the Supplementary. Given the shared selection criteria with CoreSet, our MoBYv2
105
+ AL framework falls in the representativeness-based category.
106
+ Self-supervised Learning (SSL). For the past years, a new pillar, SSL, has arisen in unsu-
107
+ pervised environments with linked goals to AL. Learning generalised concepts from large-
108
+ scale data is critical for further expansion to various vision applications. We can divide
109
+ the SSL in two approaches: consistency-based [4, 7, 33, 34] and contrastive energy-based
110
+ [8, 10, 16, 19, 25, 41]. Consistency regularisation looks to preserve the class of unlabelled
111
+ data even after a series of augmentations. For example, both MixMatch [4] and DINO [7]
112
+ sharpen the averaged pseudo-labelled predictions. Conversely, contrastive learning generally
113
+ demands pairs of positive and negative examples while optimising the similarity/contrast
114
+ between them. Dual networks are usually deployed to evaluate these losses either within
115
+ the batch (as in SimCLR [8]) or within a dictionary of keys (for methods like MoCo[19],
116
+ MoBY[41]). Because contrastive learning is foundational to our proposal, we revise these
117
+ techniques in Sec. 3.
118
+ AL with self-supervision. In the beginning, SSL and AL evolved in parallel. Only re-
119
+ cently, these fields have merged to further progress data sampling. Although SSL brings
120
+ better visual constructs, there is still the question of which labelled information to allocate.
121
+ By leveraging the unlabelled data behaviour, CSAL [13] firstly integrated MixMatch in the
122
+ AL training and selection. We follow a similar strategy, but our end-to-end training learns
123
+ contrastive representations. Despite this, CSAL is included in the SSL-based experiment
124
+ as it is directly comparable. Two new works tackle contrastive learning either in acquiring
125
+ language samples, CAL [26], or by adapting the sequential SSL SimSiam [9] in [3]. CAL is
126
+ task-dependent on natural language processing. In [3], the multi-stage AL selection has no
127
+ effect against random sampling. To this extent, we omit these works in our analysis.
128
+ 3
129
+ Methodology
130
+ In this section, we explain our pipeline in detail. First, we introduce deep active learning for
131
+ image classification in general, followed by our contributions.
132
+ Standard AL requires an online environment where the task learner selects and optimises
133
+ simultaneously. We consider a large unlabelled pool of data DU from which we uniformly
134
+ random sample and label an initial subset S0
135
+ L << DU. Let (xL,yL) ∈ S0
136
+ L be the available
137
+ images and their corresponding classes. Commonly, we deploy a learner by a DL model
138
+ comprising of a feature encoder f and a class discriminator g. The objective loss for the
139
+ learner is the categorical cross-entropy defined as Lclassi fication = −∑S0
140
+ L yL ·logg(f(xL)).
141
+ Following the AL objective, we decide upon the exploration-exploitation trade-off in
142
+ conjunction with our classification performance. Thus, we set up the exploitation rate through
143
+ a budget b across DU/ S0
144
+ L guided by a selection criteria. Consequently, we label the new
145
+ sampled subset S1
146
+ L and re-train our learner. The exploration factor is expressed by the num-
147
+ ber of stages S0...N
148
+ L
149
+ we repeat this loop according to the targeted performance. While we may
150
+
151
+ 4
152
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
153
+ Query Feature
154
+ Encoder
155
+ Keys Feature
156
+ Encoder
157
+ MLP
158
+ Projector
159
+ MLP
160
+ Projector
161
+ Queue
162
+ of
163
+ Keys
164
+ Queries
165
+ Discriminator
166
+ Contrastive
167
+ Loss
168
+ Task Optimiser
169
+ Update
170
+ Exponential moving
171
+ average update
172
+ Task
173
+ Discriminator
174
+ Cross-Entropy
175
+ Loss
176
+ strong/weak
177
+ augmentation
178
+ strong/weak
179
+ augmentation
180
+ Contrastive Optimiser
181
+ Update
182
+ Active Learning Selection
183
+ New
184
+ Labelled
185
+ Batch
186
+ Learner
187
+ Figure 1: SSL-AL training framework under the proposed MoBYv2AL configuration. The
188
+ query feature encoder plays two roles: to map the features to the task discriminator for classi-
189
+ fication; to capture contrastive visual representation with the asymmetry of the query and key
190
+ modules. For unlabelled data, the blue lines show the back-propagation of contrastive loss
191
+ and its exponential moving average (dashed). The green lines also include the cross-entropy
192
+ loss during training when the annotation is available. Once training ends, the unlabelled
193
+ samples pass through the learner for AL selection.
194
+ limit the exploration cycles, in our proposal, we primarily focus on exploitation.
195
+ Contrastive Semi-supervised learning framework. We tackle the contrastive unsupervised
196
+ learning approach compared to previous semi-supervised AL techniques [13, 17, 20] that rely
197
+ on consistency measurement. Here, we briefly re-introduce the key aspects of the previous
198
+ SSL techniques. These are constituent to our MoBYv2AL proposal.
199
+ The goal of self-supervised learning aligns with the AL problem, where there is plenty
200
+ of unlabelled data and a costly annotation procedure. However, the former tends to learn
201
+ generalised visual representation in aid of the objective task. For contrastive learning, the
202
+ main approach to obtaining these representations is by analysing the similarity (dissimilarity)
203
+ within the data space. From the most successful works [7, 8, 16, 19, 41], we can broadly
204
+ form the contrastive learning process of these main parts: data augmentation with or without
205
+ dual encoder, feature-vector projections, and similarity approximation by a dedicated loss
206
+ function.
207
+ We design the self-supervision framework according to MoBY [41]. This method com-
208
+ bines two innovative prior works MoCo[19] and BYOL[16] on visual transformers [11, 38].
209
+ MoCo[19] pioneers contrastive learning by addressing the similarity between an image and
210
+ a specific dictionary of samples. To deploy the loss, positive examples are required through
211
+ data augmentation of the input query together with the other negative keys from the dictio-
212
+ nary. The self-supervision training pipeline consists of two feature encoders and two MLP
213
+ projectors for mapping the query and the keys. Consequently, the keys are permuted in a
214
+ large memory bank, while the positive examples are inferred through the online encoder.
215
+ The gradient over the dictionary of keys needs a slower update. Thus, a gradual momentum
216
+ update is implemented.
217
+ BYOL[16], on the other hand, has a different approach for contrastive self-supervision.
218
+
219
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
220
+ 5
221
+ It simplifies MoCo by relying only on positive examples. In this way, the memory bank can
222
+ be discarded. The InfoNCE[27] loss is also replaced with a l2 loss given the new setting. The
223
+ contrastive learning strategy of BYOL is indirectly obtained through batch normalisation. To
224
+ achieve this, further modifications are proposed. Thus, the architecture of the dual encoders
225
+ is asymmetric in regard to MoCo, and BYOL adds a prediction module to the projector of the
226
+ online encoder. Following only positive examples, the inputs to the two networks are strong-
227
+ augmented versions of the same image. Finally, BYOL preserves the common mode from
228
+ the data and inherits contrastive learning when passing a slow exponential moving average
229
+ from the online to the momentum encoder. We intuitively explore the contrastive learning
230
+ strategies from both MoCo and BYOL and align the self-supervision with MoBY[41]. We
231
+ further present the combined pipeline depicted in 1.
232
+ From a design perspective, we adopt the asymmetric dual encoders from BYOL as shown
233
+ in Fig. 1. The top branch in Figure 1 culminates with a discriminator gq to match the outputs
234
+ from the bottom. Despite this, both branches consist of the same feature extractor archi-
235
+ tecture followed by an MLP projector (f
236
+
237
+ q,f
238
+
239
+ k for query and key, respectively). Distinctively
240
+ from MoBY, we tackle convolutional neural networks (CNNs) as feature encoders. More-
241
+ over, we reduce the MLP projectors and the query discriminator to a single layer with batch
242
+ normalisation and ReLU activation.
243
+ The asymmetric pipeline helps to mimic the contrastive learning principle of BYOL.
244
+ However, to include the concepts from MoCo, we minimise our objective with the InfoNCE
245
+ loss. In this case, we will also need to keep the memory bank for the queue of keys. We
246
+ define the contrastive loss as a sum of InfoNCE from two augmented versions of a query
247
+ {q,q′} and of a different key {k,k′}:
248
+ Lcontrastive = −log
249
+ exp(q·k
250
+ ′/τ)
251
+ ∑m
252
+ i=0 exp(q·k
253
+
254
+ i/τ) −log
255
+ exp(q
256
+ ′ ·k/τ)
257
+ ∑m
258
+ i=0 exp(q
259
+ ′ ·ki/τ)),
260
+ (1)
261
+ where m is the size of the memory bank and τ is the adjusting temperature [39]. During
262
+ training, the online query encoder branch is updated by gradient while the key encoder takes
263
+ the slow-moving average with momentum. We ensure with this combined design the preser-
264
+ vation of both MoCo and BYOL representation concepts. On the one hand, the asymmetric
265
+ structure indirectly finds discrepancies from the average image with moving average and
266
+ batch normalisation. On the other hand, the contrastive loss with the queue of different keys
267
+ maintains the direct distinctiveness between the images.
268
+ The standard SSL techniques MoCo, BYOL and MoBY demand the supervision stage
269
+ where the pre-trained models are fine-tuned for the task objective. Such multi-stage pipelines
270
+ seem ineffective in AL [3]. In this paper, we extended the SSL pipeline of MoBY to minimise
271
+ both the self-supervised objective and downstream task objective jointly.
272
+ Joint Objective. A final step to clarify before presenting the joint training procedure is
273
+ data augmentation. MoBY derives the augmentation strategy from BYOL, where the inputs
274
+ suffer strong transformations. In our proposal, we choose an alternation between strong and
275
+ weak augmentation, similarly to MoCov2[10]. This change boosted the performance of its
276
+ predecessor [19]. We also observed in our experiments that using only strong augmentations
277
+ can affect the optimisation of the task-aware branch. The weak augmentations comprise
278
+ horizontal flips and random crops. In addition, the strong transformation includes colour
279
+ jitter (on brightness, contrast, saturation, hue), Gaussian blur, grayscale conversion and pixel
280
+ inversion (solarise). From equation 1, {q,k} can be referred as the weak transformations of
281
+ query and key, and {q
282
+ ′,k
283
+ ′} their corresponding stronger versions.
284
+
285
+ 6
286
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
287
+ With all these elements in place, we can change the learner from the existing AL frame-
288
+ work with the modified MoBY and train jointly the pipeline. Starting from the first cycle, we
289
+ consider the available labelled samples (xL,yL) ∈ S0
290
+ L and the remaining unlabelled xU ∈ DU
291
+ as queries and keys. A strong augmentation is marked as {˜xL
292
+ q, ˜xL
293
+ k}, while a weak is rep-
294
+ resented with {¯xL
295
+ q, ¯xL
296
+ k}. When training, we alternate between batches of labelled and unla-
297
+ belled data with every inference. Therefore, we back-propagate only the contrastive loss for
298
+ the unlabelled to 1. In this context, given the pipeline from Figure 1 for this contrastive loss
299
+ LU
300
+ contrastive(q,q
301
+ ′;k,k
302
+ ′), {q,k} and {q
303
+ ′,k
304
+ ′} can be obtained so:
305
+ {q,q
306
+ ′} = gq (f
307
+
308
+ q (fq({¯xU
309
+ q , ˜xU
310
+ q }))),
311
+ (2)
312
+ {k,k
313
+ ′} = f
314
+
315
+ k (fk ({¯xU
316
+ k , ˜xU
317
+ k })).
318
+ (3)
319
+ Similarly, we can compute LL
320
+ contrastive, the contrastive loss for the labelled images. In
321
+ addition, we also minimise the categorical cross-entropy, Lclassification, with the output from
322
+ the task discriminator. Once computed, we back-propagate both the contrastive and the
323
+ classification loss. Therefore, the combined loss, adjusted by a scaling factor λc, can be
324
+ expressed as:
325
+ LL
326
+ combined = Lclassi fication +λcLL
327
+ contrastive
328
+ (4)
329
+ While the contrastive loss is computed continuously regarding the classification loss, we de-
330
+ cide to reduce its influence over the gradients with λc = 0.5. Finally, it is worth mentioning
331
+ that the exponential moving average and the queue of keys are updated on the bottom branch
332
+ for both labelled and unlabelled samples.
333
+ Unlabelled samples selection. We emphasise that our proposal minimises the self-supervised
334
+ loss inspired by MoBY. With this, the end-task objective jointly enriches the visual repre-
335
+ sentations of the data compared to the standard AL strategy. AL selection methods that rely
336
+ on the learner’s data distribution will perform better. CoreSet [28] has been proven to be
337
+ effective in such scenario. To this extent, we primarily choose this selection function with
338
+ MoBYv2AL. Briefly, CoreSet aims to find a subset of data points where a constant radius
339
+ bounds the loss difference with the entire data space. This technique is approximated with
340
+ k-Centre Greedy algorithm [37] in the euclidean space of our feature encoder outputs fq(x).
341
+ A thorough visual selection of different AL selection approaches together with CoreSet in
342
+ presented in the Supplementary.
343
+ 4
344
+ Experiments
345
+ Datasets.For the quantitative evaluation, we put forward four well-known image classifica-
346
+ tion datasets: CIFAR-10, CIFAR-100 [24], SVHN[14] and FashionMNIST[40].
347
+ Models. We mentioned in 3 that we use different CNNs for feature encoders. To show
348
+ that MoBYv2AL is robust to architectural changes, we opt for VGG-16 [31] in the CIFAR-
349
+ 10/100 quantitative experiments and for ResNet-18 [18] in SVHN and FashionMNIST.
350
+ Training settings. We train at every selection stage for 200 epochs, and we keep the batch
351
+ size at 128. The dictionary size for the keys m is set up as in MoBY at 4096. We noticed
352
+ in our experiments that the contrastive and cross-entropy loss converge together after 200
353
+ epochs. The learning rate starts at 0.01, and it follows a schedule for the queue encoder and
354
+
355
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
356
+ 7
357
+ Figure 2: Evaluations on CIFAR-10 (left), CIFAR-100 (right) [Zoom in for better view]
358
+ Figure 3: Evaluations on SVHN (left), FashionMNIST (right) [Zoom in for better view]
359
+ task discriminator that decreases ten times at 120 and 160 epochs. However, we keep the
360
+ momentum scheduler update in the key bottom branch (gradual momentum increment from
361
+ 0.99). In the contrastive loss, for both queues, we fix the temperature parameter to 0.2.
362
+ AL settings. We followed the AL settings of VAAL[32], CDAL[1] and CoreGCN[6]. For
363
+ more details, please see Supplementary.
364
+ Baselines. We compared our method MoBYv2AL with a wide range of methods in active
365
+ learning such as: MC Dropout [15], DBAL [12], Learning Loss[42], VAAL[32], , Learning
366
+ Loss [42], CoreGCN[6] and CDAL[1].
367
+ 4.1
368
+ Quantitative experiments
369
+ CIFAR10/100. To maintain a fair comparison, in Figure 2, we report the performance charts
370
+ obtained by CDAL[1] and VAAL[32]. All methods use VGG-16 for the feature encoder.
371
+ MoBYv2AL has a considerable advantage with the proposed SSL framework in the CIFAR-
372
+ 10/100 experiments from the first selection stage. In both scenarios, we gain 20% testing
373
+ accuracy over standard learning (62% and 28% on CIFAR-10/100). This justifies the impor-
374
+ tance of the joint training framework from MoBYv2AL.
375
+ Our pipeline’s more refined visual representations direct helpful information to the Core-
376
+ Set selection method. Thus, we notice a gradual increase in Figure 2, where after 7 cy-
377
+ cles, with 40% labelled data, MoBYv2AL achieves 89.6% mean accuracy on CIFAR-10
378
+ and 63.1% on CIFAR-100. Another observation in the CIFAR-10 experiment is that the AL
379
+ performance saturates faster than in CIFAR-100. This effect occurs due to a large initial
380
+ labelled pool in relation to the complexity of the task. MoBYv2 exploits more contrastive
381
+ information, and it limits the exploratory potential in the next stages.
382
+
383
+ Testing performance on CIFAR-10
384
+ 90
385
+ (mean of 5 trials)
386
+ 85
387
+ 80
388
+ 75
389
+ Test accuracy (
390
+ 70
391
+ Random
392
+ VAAL
393
+ MC Dropout
394
+ CDAL
395
+ 65
396
+ DBAL
397
+ MoBYv2AL
398
+ CoreSet
399
+ 60
400
+ 10
401
+ 15
402
+ 20
403
+ 25
404
+ 30
405
+ 35
406
+ 40
407
+ Percentage [%l of labelledTesting performance on CIFAR-100
408
+ 65
409
+ 60
410
+ 55
411
+ 50
412
+ 45
413
+ 40
414
+ Random
415
+ VAAL
416
+ 35
417
+ MC Dropout
418
+ CDAL
419
+ DBAL
420
+ MoBYv2AL
421
+ 30
422
+ CoreSet
423
+ 10
424
+ 15
425
+ 20
426
+ 25
427
+ 30
428
+ 35
429
+ 40
430
+ Percentage [%l of labelledTesting performance on SVHN
431
+ 95
432
+ trials)
433
+ 90
434
+ 85
435
+ 80
436
+ Random
437
+ UncertainGCN
438
+ 75
439
+ VAAL
440
+ Learning Loss
441
+ 70
442
+ CoreSet
443
+ CoreGCN
444
+ MoBYv2AL
445
+ 65
446
+ 1000
447
+ 2000
448
+ 3000
449
+ 4000
450
+ 5000
451
+ 6000
452
+ 7000
453
+ 8000
454
+ 9000
455
+ 10000
456
+ Number of labelled samplesTesting accuracy on FashionMNIST
457
+ 94
458
+ (mean of 5 trials)
459
+ 92
460
+ 90
461
+ 88
462
+ Test accuracy (
463
+ 86
464
+ Random
465
+ CoreSet
466
+ 84
467
+ UncertainGCN
468
+ CoreGCN
469
+ VAAL
470
+ MoBYv2AL
471
+ 82
472
+ Learning Loss
473
+ 1000
474
+ 2000
475
+ 3000
476
+ 4000
477
+ 5000
478
+ 6000
479
+ 7000
480
+ 8000
481
+ 9000
482
+ 10000
483
+ Number of labelled samples8
484
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
485
+ SVHN/FashionMNIST. We can deduct, from Figure 3 as well, that MoBYv2AL balances
486
+ the exploration-exploitation trade-off when the initial labelled set is relatively low to the
487
+ number of classes. The dark dashed line displays the supervised baseline training on the
488
+ entire labelled set. While on CIFAR-10/100 and FashionMNIST, MoBYv2AL reaches com-
489
+ parable performance, by the end of the cycles, on SVHN, it surpasses after the sixth one
490
+ (95%). Here, we emphasise the relevance of the strong/weak augmentations in enriching the
491
+ discrete data distribution. Furthermore, grayscale data (as in FashionMNIST) can also ben-
492
+ efit from the proposed AL framework. In Figure 3, we keep the same results of the previous
493
+ baselines from CoreGCN[6]. Even under these settings, we outperform the state-of-the-arts
494
+ with a noticeable consistent margin: for SVHN and FashionMNIST a gap of at least 2% -
495
+ 3%.
496
+ SSL-AL method vs percentages of labelled
497
+ 10%
498
+ 15%
499
+ 20%
500
+ 25%
501
+ 30%
502
+ CSAL
503
+ 58.1
504
+ 63.76
505
+ 67.13
506
+ 69.28
507
+ 70.08
508
+ MoBYv2AL
509
+ 67.66
510
+ 68.24
511
+ 68.49
512
+ 68.57
513
+ 70.11
514
+ Table 1: Comparison with the SSL-AL method CSAL on CIFAR-100 with a WideResNet-28
515
+ learner
516
+ Comparison with other SSL-AL. MoBYv2 leverages unlabelled data for contrastive learn-
517
+ ing in the AL framework. Previously, we chose this amount of data equal to the avail-
518
+ able labelled samples. Therefore, at every AL cycle, this size increases with the newly
519
+ selected data. Another recent SSL-AL baseline CSAL[13], however, deployed the consis-
520
+ tency measurements from MixMatch[4] on the entire unlabelled data. We could identify
521
+ that MoBYv2AL over-exploits as CSAL the captured representation under these conditions.
522
+ We further compare the 2 methods on CIFAR-100 in Table 1 and adjust the feature encoder
523
+ to WideResNet-28[43]. In this experiment, MoBYv2AL maintains the initial performance
524
+ gain.
525
+ Imbalanced dataset experiment. Apart from SVHN, all the previous experiments have
526
+ a uniform distribution over the classes. This rarely occurs during real-world acquisition
527
+ scenarios. Therefore, as in CoreGCN, we simulate an imbalanced CIFAR-10 unlabelled set.
528
+ Each of the ten classes has originally 5000 training examples. We decide to reduce 5 of
529
+ the classes to 500 images (resulting in a pool of 27500). The learner contains a ResNet-18
530
+ encoder, and it is trained with an initial set of 1000 labelled examples. We apply MoBYv2AL
531
+ together with the other baselines from CoreGCN[6] for 7 cycles. Figure 4(left) presents
532
+ the ability of MoBYv2AL to outperform the previous methods even in possible real-world
533
+ environments. Investigation of long-tail distributions is still part of our future work.
534
+ Figure 4: CIFAR-10 imbalanced dataset experiment(left); Mitigating the distribution shift
535
+ with MoBYv2AL(right) [Zoom in for better view]
536
+
537
+ Testing performance on CIFAR-1O imbalanced
538
+ 80
539
+ 70
540
+ 60
541
+ 50
542
+ Random
543
+ CoreSet
544
+ UncertainGCN
545
+ CoreGCN
546
+ VAAL
547
+ MoBYv2AL
548
+ 40
549
+ Learning Loss
550
+ 1000
551
+ 2000
552
+ 3000
553
+ 4000
554
+ 5000
555
+ 6000
556
+ 7000
557
+ Number of labelled samplesCIFAR1O - Distribution shift - Random vs Lowest contrastive loss unlabelled during training
558
+ First Stage 1000 labeled images
559
+ Second Stage 2000 labeled images
560
+ Second Stage 20o0 labeled images without Distribution Shift
561
+ 100
562
+ 90
563
+ 90
564
+ 88
565
+ 89
566
+ 84
567
+ 85
568
+ 83.85
569
+ 83
570
+ 81
571
+ 80
572
+ 80
573
+ 81
574
+ 81
575
+ 80
576
+ 78
577
+ 72
578
+ 70
579
+ 67
580
+ 67
581
+ 65
582
+ 63
583
+ 63
584
+ 61
585
+ 60
586
+ 56
587
+ 54
588
+ 51
589
+ 50
590
+ 46
591
+ 39
592
+ 40
593
+ 36
594
+ 30
595
+ airplane
596
+ car
597
+ bird
598
+ cat
599
+ deer
600
+ dog
601
+ frog
602
+ horse
603
+ ship
604
+ truckCARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
605
+ 9
606
+ 4.2
607
+ Distribution shift discussion
608
+ In deep AL, the cyclical process of re-training the learner with the new labelled data may
609
+ result in optimising to different local minima. Therefore, the exploration and exploitation of
610
+ the AL method will be affected by this distribution shift at every stage. During experiments,
611
+ this is commonly shown through jaggy curves (especially for uncertainty-based methods like
612
+ MC Dropout[15], DBAL[12] or UncertainGCN[6]). To address this known issue [23], we
613
+ analyse MoBYv2AL performance on the entire CIFAR-10 training set when providing 1000
614
+ and 2000 samples.
615
+ The dark blue bars of each class in Figure 4 (right) level the corresponding classification
616
+ accuracy with the first 1000 random samples. Tracking the performance on the entire set
617
+ challenges the learner to prefer certain classes. We continue to select with MoBYv2AL
618
+ another set of images. Consequently, the resulted accuracy is displayed by the cyan bar. We
619
+ can clearly observe that the minima shifted in a different direction where only some classes
620
+ improved at the expense of the others. To mitigate this shift, we investigated what impact
621
+ the unlabelled samples have in our end-to-end training. These samples play a key role in
622
+ building up the dictionary of keys. Our insight is that the CoreSet selection on MoBYv2
623
+ data representation targets primarily high contrastive samples. We can control this effect by
624
+ customising the unlabelled set deployed in training our learners. To this extent, we propose
625
+ to use the unlabelled data with the lowest contrastive loss. In Figure 4 (right), we displayed
626
+ on green bars the performance with this mechanism. From an initial 1000 set accuracy
627
+ (dark blue) we get an effective linear increase for all the 10 classes. This effect is consistent
628
+ throughout all the previous quantitative experiments as well.
629
+ 4.3
630
+ SSL modules variation and ablation study
631
+ We continue to motivate the proposed design of MoBYv2AL with a set of ablation experi-
632
+ ments and by varying its SSL module. On the left side of Table 2, we swap in the end-to-end
633
+ training pipeline the original version of MoBY [41] and the preceding SSL state-of-the-arts,
634
+ MoCov2 [10] and BYOL [16]. Apart from MoBY, the learner did not converge on any selec-
635
+ tion cycle with the other SSL modules. Thus, the setup of large batches and specific training
636
+ conditions (low learning rates, cosine scheduler) and learners can hardly adapt to this semi-
637
+ supervision configuration. For MoBYv2AL, the weak-augmented inferences to the learner
638
+ stabilise its performance in regard to the original version. Furthermore, our method distances
639
+ by 4% class accuracy with each AL cycle. One can argue that our SSL framework comprises
640
+ SSL model / No. of labelled
641
+ 1000
642
+ 2000
643
+ 3000
644
+ MoCov2
645
+ 11.62±.9
646
+ 11.92±.6
647
+ 12.89±.6
648
+ BYOL
649
+ 12.32±.7
650
+ 11.72±.4
651
+ 11.47±.2
652
+ MoBY
653
+ 62.62±.4
654
+ 72±.5
655
+ 76.43±.1
656
+ MoBYv2AL (Ours)
657
+ 63.06±.5
658
+ 76.04±.6
659
+ 80.63±.3
660
+ MoBYv2AL / No. of labelled
661
+ 1000
662
+ 2000
663
+ 3000
664
+ w/o Discriminator
665
+ 60.44±.4
666
+ 72.53±.8
667
+ 77.89±.3
668
+ w/o MLP Projector
669
+ 58.57±.6
670
+ 71.96±.5
671
+ 77.02±.6
672
+ w/o Strong Augmentation
673
+ 47.7±.4
674
+ 58±.5
675
+ 64.85±.5
676
+ MoBYv2AL (Ours)
677
+ 63.06±.5
678
+ 76.04±.6
679
+ 80.63±.3
680
+ Table 2: Variation of SSL pipeline (left) and ablation study of MoBYv2AL (right). Average
681
+ testing performance (5 trials) on CIFAR-10 for 3 AL cycles with ResNet-18 encoder
682
+ several building blocks, and its implementation can deter developers. While we value the
683
+ significant dominance of MoBYv2 in AL selection, we still motivate the relevance of each
684
+ part in Table 2 (right). In the ablation evaluation, we successfully remove the queue Discrim-
685
+ inator and the MLP projectors. As a result, we detect a continuous accuracy drop. Projecting
686
+ larger features and simulating the asymmetry brings the advantage of contrastive learning in
687
+ MoBYv2. Moreover, strong augmentations also play a crucial role in the SSL pipeline.
688
+
689
+ 10
690
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
691
+ MoBYv2AL
692
+ 1000
693
+ 2000
694
+ 3000
695
+ Multi-stage semi supervised
696
+ 34.8±.1
697
+ 34.96±.2
698
+ 35.09±.1
699
+ Jointly with end-task
700
+ 63.06±.5
701
+ 76.04±.6
702
+ 80.63±.3
703
+ SSL method
704
+ Supervised
705
+ MoCov2
706
+ BYOL
707
+ DINO
708
+ MoBYv2AL
709
+ CIFAR-10 Test accuracy
710
+ 90.08
711
+ 76.7
712
+ 77.89
713
+ 81.2
714
+ 88.62
715
+ Table 3: Multi-stage SSL-AL vs Jointly end-task AL (left). Semi-supervised learning com-
716
+ parison (right). Testing performance on CIFAR-10 with ResNet-18 encoder
717
+ 4.4
718
+ SSL results and multi-stage AL
719
+ MoBYv2 SSL for AL strategy is designed in a joint manner with the end task. Despite this,
720
+ the recent work [3] that proposes contrastive learning with SimSiam[9] adopts multi-stage
721
+ learning for the learner. The pipeline proposed fails to sample better than random in the
722
+ AL paradigm. In Table 3(left), we experiment with MoBYv2 the multi-stage training (with
723
+ unsupervised contrastive learning and second task fine-tuning) for CIFAR-10. We observe
724
+ that the performance suffers in context to the end-task, where limited labelled examples are
725
+ used. Similarly to [3], we also notice a minor improvement when adding more selected data
726
+ with CoreSet. To this extent, we decided to use the entire training set during fine-tuning. We
727
+ re-iterated the same experiment for SSL cross-validation with MoCov2[10], DINO[7] and
728
+ BYOL[16].
729
+ 5
730
+ Limitations and Conclusions
731
+ Although we can adapt MoBYv2AL to other applications, we expect further research on the
732
+ effects of the augmentations and the momentum encoder. Another limiting factor should
733
+ be analysed at the first AL selection stage, where developers may tune the exploration-
734
+ exploitation ratio to avoid saturation.
735
+ We have presented an SSL-based AL framework for image classification. The main
736
+ contributions lie in the task-aware contrastive learning pipeline. MoBYv2AL retains the
737
+ higher visual concepts and aligns them with the downstream task. The joint training is
738
+ efficient and modular, allowing diverse backbones and sampling functions. We conduct
739
+ quantitative experiments and demonstrate the state-of-the-art on four datasets. Our method
740
+ shows robustness even in simulated class-imbalanced data pools.
741
+ 6
742
+ Acknowledgements
743
+ This work is in part sponsored by KAIA grant (22CTAP-C163793-02, MOLIT), NST grant
744
+ (CRC 21011, MSIT), KOCCA grant (R2022020028, MCST) and the Samsung Display cor-
745
+ poration. BB and DS are funded in whole, or in part, by the Wellcome/EPSRC Centre for
746
+ Interventional and Surgical Sciences (WEISS) [203145/Z/16/Z]; the Engineering and Phys-
747
+ ical Sciences Research Council (EPSRC) [EP/P027938/1, EP/R004080/1, EP/P012841/1];
748
+ and the Royal Academy of Engineering Chair in Emerging Technologies Scheme; and En-
749
+ doMapper project by Horizon 2020 FET (GA 863146).
750
+ References
751
+ [1] Sharat Agarwal, Himanshu Arora, Saket Anand, and Chetan Arora. Contextual diver-
752
+ sity for active learning. In ECCV, 2020.
753
+
754
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
755
+ 11
756
+ [2] William H Beluch Bcai, Andreas Nürnberger, and Jan M Köhler Bcai. The power of
757
+ ensembles for active learning in image classification. In CVPR, 2018.
758
+ [3] Javad Zolfaghari Bengar, Joost van de Weijer, Bartlomiej Twardowski, and Bogdan
759
+ Raducanu. Reducing label effort: Self-supervised meets active learning. In ICCVW,
760
+ pages 1631–1639, 2021.
761
+ [4] David Berthelot, Nicholas Carlini, Ian Goodfellow, Avital Oliver, Nicolas Papernot,
762
+ and Colin Raffel. Mixmatch: A holistic approach to semi-supervised learning. In
763
+ NeurIPS, 2019.
764
+ [5] Razvan Caramalau, Binod Bhattarai, and Tae-Kyun Kim. Active learning for bayesian
765
+ 3d hand pose estimation. In WACV, 2021.
766
+ [6] Razvan Caramalau, Binod Bhattarai, and Tae-Kyun Kim. Sequential graph convolu-
767
+ tional network for active learning. In CVPR, 2021.
768
+ [7] Mathilde Caron, Hugo Touvron, Ishan Misra, Hervé Jégou, Julien Mairal, Piotr Bo-
769
+ janowski, and Armand Joulin. Emerging properties in self-supervised vision trans-
770
+ formers. In ICCV, 2021.
771
+ [8] Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey E. Hinton. A simple
772
+ framework for contrastive learning of visual representations. In ICML, 2020.
773
+ [9] Xinlei Chen and Kaiming He. Exploring simple siamese representation learning. In
774
+ CVPR, 2021.
775
+ [10] Xinlei Chen, Haoqi Fan, Ross Girshick, and Kaiming He. Improved baselines with
776
+ momentum contrastive learning. arXiv preprint arXiv:2003.04297, 2020.
777
+ [11] Alexey Dosovitskiy, Lucas Beyer, Alexander Kolesnikov, Dirk Weissenborn, Xiaohua
778
+ Zhai, Thomas Unterthiner, Mostafa Dehghani, Matthias Minderer, Georg Heigold, Syl-
779
+ vain Gelly, Jakob Uszkoreit, and Neil Houlsby. An image is worth 16x16 words: Trans-
780
+ formers for image recognition at scale, 2020.
781
+ [12] Yarin Gal and Zoubin Ghahramani. Dropout as a Bayesian Approximation: Represent-
782
+ ing Model Uncertainty in Deep Learning. In ICML, 2016.
783
+ [13] Mingfei Gao, Zizhao Zhang, Guo Yu, Sercan Arık, Larry Davis, and Tomas Pfister.
784
+ Consistency-based semi-supervised active learning: Towards minimizing labeling cost.
785
+ In ECCV, 2020.
786
+ [14] Ian J Goodfellow, Yaroslav Bulatov, Julian Ibarz, Sacha Arnoud, and Vinay Shet.
787
+ Multi-digit Number Recognition from Street View Imagery using Deep Convolutional
788
+ Neural Networks, 2013. 1312.6082v4.
789
+ [15] Marc Gorriz, Axel Carlier, Emmanuel Faure, and Xavier Giró-i-Nieto. Cost-effective
790
+ active learning for melanoma segmentation. CoRR, abs/1711.09168, 2017.
791
+ [16] Jean-Bastien Grill, Florian Strub, Florent Altché, Corentin Tallec, Pierre Richemond,
792
+ Elena Buchatskaya, Carl Doersch, Bernardo Avila Pires, Zhaohan Guo, Mohammad
793
+ Gheshlaghi Azar, Bilal Piot, koray kavukcuoglu, Remi Munos, and Michal Valko.
794
+ Bootstrap your own latent - a new approach to self-supervised learning. In NeurIPS,
795
+ 2020.
796
+
797
+ 12
798
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
799
+ [17] Jiannan Guo, Haochen Shi, Yangyang Kang, Kun Kuang, Siliang Tang, Zhuoren Jiang,
800
+ Changlong Sun, Fei Wu, and Yueting Zhuang. Semi-supervised active learning for
801
+ semi-supervised models: Exploit adversarial examples with graph-based virtual labels.
802
+ In ICCV, 2021.
803
+ [18] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for
804
+ image recognition. In CVPR, 2016.
805
+ [19] Kaiming He, Haoqi Fan, Yuxin Wu, Saining Xie, and Ross B. Girshick. Momentum
806
+ contrast for unsupervised visual representation learning. In CVPR, 2020.
807
+ [20] Siyu Huang, Tianyang Wang, Haoyi Xiong, Jun Huan, and Dejing Dou.
808
+ Semi-
809
+ supervised active learning with temporal output discrepancy. In ICCV, 2021.
810
+ [21] Kwanyoung Kim, Dongwon Park, Kwang In Kim, and Se Young Chun. Task-aware
811
+ variational adversarial active learning. In CVPR, pages 8166–8175, 2021.
812
+ [22] Seong Tae Kim, Farrukh Mushtaq, and Nassir Navab. Confident Coreset for Active
813
+ Learning in Medical Image Analysis, 2020. 2004.02200v1.
814
+ [23] Andreas Kirsch, Tom Rainforth, and Yarin Gal. Test distribution-aware active learning:
815
+ A principled approach against distribution shift and outliers. 2021.
816
+ [24] Alex Krizhevsky. Learning multiple layers of features from tiny images. University of
817
+ Toronto, 05 2012.
818
+ [25] Junnan Li, Caiming Xiong, and Steven C.H. Hoi. Semi-supervised learning with con-
819
+ trastive graph regularization. In ICCV, 2021.
820
+ [26] Katerina Margatina, Giorgos Vernikos, Loïc Barrault, and Nikolaos Aletras. Active
821
+ learning by acquiring contrastive examples. In EMNLP, 2021.
822
+ [27] Aaron van den Oord, Yazhe Li, and Oriol Vinyals. Representation learning with con-
823
+ trastive predictive coding. arXiv.org perpetual, non-exclusive license, 2018.
824
+ [28] Ozan Sener and Silvio Savarese. Active Learning for Convolutional Neural Networks:
825
+ A Core-set approach. In ICLR, 2018.
826
+ [29] Burr Settles. Active learning literature survey. Computer Sciences Technical Report
827
+ 1648, University of Wisconsin–Madison, 2009.
828
+ [30] H. S. Seung, M. Opper, and H. Sompolinsky. Query by committee. In Proceedings
829
+ of the Fifth Annual Workshop on Computational Learning Theory, COLT ’92, page
830
+ 287–294, New York, NY, USA, 1992. Association for Computing Machinery. ISBN
831
+ 089791497X. doi: 10.1145/130385.130417.
832
+ [31] Karen Simonyan and Andrew Zisserman. Very Deep Convolutional Network for Large-
833
+ scale image recognition. In ICLR, 2015.
834
+ [32] Samarth Sinha, Sayna Ebrahimi, and Trevor Darrell. Variational Adversarial Active
835
+ Learning. In ICCV, 2019.
836
+
837
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
838
+ 13
839
+ [33] Kihyuk Sohn, David Berthelot, Chun-Liang Li, Zizhao Zhang, Nicholas Carlini,
840
+ Ekin D. Cubuk, Alex Kurakin, Han Zhang, and Colin Raffel. Fixmatch: Simplifying
841
+ semi-supervised learning with consistency and confidence. In NeurIPS2020, 2020.
842
+ [34] Antti Tarvainen and Harri Valpola. Mean teachers are better role models: Weight-
843
+ averaged consistency targets improve semi-supervised deep learning results.
844
+ In
845
+ NeurIPS, 2017.
846
+ [35] Ivor W. Tsang, James T. Kwok, and Pak-Ming Cheung. Core vector machines: Fast
847
+ svm training on very large data sets. JMLR, 2005.
848
+ [36] Laurens van der Maaten and Geoffrey Hinton.
849
+ Visualizing data using t-sne, 2008.
850
+ JMLR.
851
+ [37] Gert Wolf. Facility location: concepts, models, algorithms and case studies. In Contri-
852
+ butions to Management Science, 2011.
853
+ [38] Bichen Wu, Chenfeng Xu, Xiaoliang Dai, Alvin Wan, Peizhao Zhang, Zhicheng Yan,
854
+ Masayoshi Tomizuka, Joseph Gonzalez, Kurt Keutzer, and Peter Vajda. Visual trans-
855
+ formers: Token-based image representation and processing for computer vision, 2020.
856
+ [39] Zhirong Wu, Yuanjun Xiong, X Yu Stella, and Dahua Lin. Unsupervised feature learn-
857
+ ing via non-parametric instance discrimination. In CVPR, 2018.
858
+ [40] Han Xiao, Kashif Rasul, and Roland Vollgraf. Fashion-MNIST: a Novel Image Dataset
859
+ for Benchmarking Machine Learning Algorithms, 2017. 1708.07747v2.
860
+ [41] Zhenda Xie, Yutong Lin, Zhuliang Yao, Zheng Zhang, Qi Dai, Yue Cao, and Han Hu.
861
+ Self-supervised learning with swin transformers. arXiv preprint arXiv:2105.04553,
862
+ 2021.
863
+ [42] Donggeun Yoo and In So Kweon. Learning Loss for Active Learning. In CVPR, 2019.
864
+ [43] Sergey Zagoruyko and Nikos Komodakis. Wide residual networks. In BMVC, 2016.
865
+
866
+ 14
867
+ CARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
868
+ A
869
+ Detailed settings for the AL experiments on
870
+ MoBYv2AL
871
+ Datasets.For the quantitative evaluation, we put forward four well-known image classifica-
872
+ tion datasets: CIFAR-10, CIFAR-100 [24], SVHN[14] and FashionMNIST[40]. CIFAR-10
873
+ and CIFAR-100 contain the same 50000 training examples but with different labelling sys-
874
+ tems (10 and 100 classes). SVHN and FashionMNIST are separated into ten classes each
875
+ as CIFAR-10. However, both datasets are larger, with 73257 coloured street numbers and
876
+ 60000 grayscale images for FashionMNIST. Although CIFAR-10/100 and FashionMNIST
877
+ have class-balanced data, this is not the case for SVHN. From another perspective, deploying
878
+ grayscale images from FashionMNIST challenges our contrastive learning approach, previ-
879
+ ously customised to RGB data.
880
+ Models. We mentioned in the Methodology that we use different CNNs for feature en-
881
+ coders.
882
+ To show that MoBYv2 is robust to architectural changes, we opt for VGG-16
883
+ [31] in the CIFAR-10/100 quantitative experiments and for ResNet-18 [18] in SVHN and
884
+ FashionMNIST. Moreover, for the SSL comparison with CSAL we align the encoder with
885
+ WideResNet-28[43].
886
+ AL settings. Under the exploration-exploitation trade-off, we characterise the budget to se-
887
+ lect as an exploiting factor while the exploration is captured in the number selection cycles.
888
+ The initial random-sampled labelled dataset varies between the CIFAR-10/100 experiments
889
+ and SVHN/FashionMNIST. For CIFAR-10/100, we consider 10% (5000) of the entire train-
890
+ ing set as labelled and the rest as unlabelled data. The budget is limited to 5% (2500) samples
891
+ for selection, and we repeat this cycle seven times. In the second set of experiments, we test
892
+ our method in a more restrictive environment with a starting set of 1000 labelled and a sim-
893
+ ilar fixed budget. Despite this, we expanded the exploration to 10 cycles reaching 10000
894
+ labelled data. As a performance measurement, we evaluate the average of 5 trials testing
895
+ accuracy in the AL framework.
896
+ B
897
+ Selection function analysis
898
+ Figure B.1: Quantitative evaluation with different selection functions for CIFAR-10 (left),
899
+ CIFAR-100 (right) [Zoom in for better view]
900
+ Our proposed pipeline, MoBYv2AL, can easily adapt to multiple selection methods.
901
+ Here, we quantitatively motivate the choice of CoreSet from section 3. Therefore, we re-
902
+
903
+ Different selection functions for MoBYv2 on CIFAR-1O
904
+ 90
905
+ 88
906
+ 86
907
+ 84
908
+ Random
909
+ High Contrastive Loss
910
+ Max Entropy
911
+ CoreSet
912
+ 82
913
+ 10
914
+ 15
915
+ 20
916
+ 25
917
+ 30
918
+ 35
919
+ 40
920
+ Percentage
921
+ 「%l of labelledDifferent selection functions for MoBYv2 on CIFAR-1o0
922
+ 65.0
923
+ Test accuracy (mean of 5 trials)
924
+ 62.5
925
+ 60.0
926
+ 57.5
927
+ 55.0
928
+ 52.5
929
+ 50.0
930
+ 47.5
931
+ Max Entropy
932
+ High Contrastive Loss
933
+ 45.0
934
+ High Contrastive Feauture variance
935
+ CoreSet
936
+ 10
937
+ 15
938
+ 20
939
+ 25
940
+ 30
941
+ 35
942
+ 40
943
+ Percentage [%l of labelledCARAMALAU ET AL.: MOBYV2AL: SELF-SUPERVISED ACTIVE LEARNING
944
+ 15
945
+ evaluate MoBYv2AL on CIFAR-10/100 benchmarks in Figure B.1. We vary the selection of
946
+ the new budget between random, maximum class entropy and CoreSet. Intuitively, we also
947
+ analyse the effect of selecting unlabelled examples with high contrastive loss.
948
+ In both benchmarks, sampling with random or max entropy benefits the less MoBYv2AL
949
+ pipeline. On the other hand, a representativeness-oriented method like CoreSet suits our
950
+ hypothesis better. When sampling with high contrastive loss, we detected repetitive examples
951
+ from some specific classes. This can be explained by higher contextual variance in that
952
+ category. Specifically, on CIFAR-10, animal classes (cat, deer, dog), with stronger patterns,
953
+ were more preferred than the vehicle ones (car, truck, ship).
954
+ For a better visual analysis, we have simulated a toy-set experiment with the first five
955
+ classes from SVHN. Here, we take t-SNE[36] representations of the MoBYv2AL query en-
956
+ coder outputs of unlabelled data. In Figure B.2, the samples marked with crosses construct
957
+ the new labelled set. The selection behaviour of the Max Entropy and CoreSet can be inter-
958
+ Max Entropy
959
+ Highest contrastive loss
960
+ CoreSet
961
+ Figure B.2: Qualitative AL selection analysis on MoBYv2. t-SNE representations at the first
962
+ selection stage for 5 classes of SVHN. [Zoom in for better view]
963
+ preted as expected: on the left side, the uncertainty-based technique tracks the most class-
964
+ variant images; CoreSet, on the right side, samples both in and out-of-distribution according
965
+ to the Euclidean space.
966
+
967
+ 0
968
+ 1
969
+ 2
970
+ 3
971
+ 4-
972
+ 40
973
+ 20
974
+ 0
975
+ 20
976
+ 40
LdAzT4oBgHgl3EQfkf0t/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LtE3T4oBgHgl3EQfYQrP/content/tmp_files/2301.04487v1.pdf.txt ADDED
@@ -0,0 +1,2863 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04487v1 [stat.ME] 11 Jan 2023
2
+ Testing separability for continuous functional data
3
+ Holger Dette, Gauthier Dierickx, Tim Kutta
4
+ January 12, 2023
5
+ Abstract
6
+ Analyzing the covariance structure of data is a fundamental task of statistics.
7
+ While this task is
8
+ simple for low-dimensional observations, it becomes challenging for more intricate objects, such as
9
+ multivariate functions.
10
+ Here, the covariance can be so complex that just saving a non-parametric
11
+ estimate is impractical and structural assumptions are necessary to tame the model. One popular
12
+ assumption for space-time data is separability of the covariance into purely spatial and temporal
13
+ factors.
14
+ In this paper, we present a new test for separability in the context of dependent functional time
15
+ series. While most of the related work studies functional data in a Hilbert space of square integrable
16
+ functions, we model the observations as objects in the space of continuous functions equipped with
17
+ the supremum norm. We argue that this (mathematically challenging) setup enhances interpretability
18
+ for users and is more in line with practical preprocessing. Our test statistic measures the maximal
19
+ deviation between the estimated covariance kernel and a separable approximation. Critical values are
20
+ obtained by a non-standard multiplier bootstrap for dependent data. We prove the statistical validity
21
+ of our approach and demonstrate its practicability in a simulation study and a data example.
22
+ Keywords: Dependent multiplier bootstrap; space-time data; separability; Banach space; functional time
23
+ series.
24
+ MSC: 62G10; 62R10.
25
+ 1
26
+ Introduction
27
+ Over the last decades, the analysis of high-dimensional space-time data has become a cornerstone of geo-
28
+ statistics. New technologies allow the collection of high-frequency and high-resolution measurements for
29
+ variables such as temperature, magnetic fields or pollutant concentrations (see, for example, Gromenko et al.
30
+ (2012); Aue et al. (2018); King et al. (2018)). One way to analyze such data, is to smooth it over space
31
+ and time, which yields time series of spatio-temporal processes. This approach of reconstructing and ana-
32
+ lyzing random functions follows the paradigm of functional data analysis (FDA) and has recently gained
33
+ attraction in the geostatistical community (for overviews see, e.g., Martínez-Hernández and Genton (2020)
34
+ and the monograph of Mateu and Giraldo (2022)).
35
+ While the analysis of such processes promises deep scientific insights, their high complexity can push
36
+ statistical methods to their limit. For example, commonly used tools such as PCA and Kriging hinge on
37
+ 1
38
+
39
+ an approximation of the processes’ covariance operator - an object that can be too massive to be stored or
40
+ to be inverted for the purpose of prediction. For a concise overview of these computational challenges, we
41
+ refer to Table 1 in Masak et al. (2020). To reduce complexity, many works impose structural assumptions
42
+ on the covariance, one of them being separability.
43
+ Roughly speaking, separability states that the covariance of a space-time process can be decomposed
44
+ into a purely temporal and a purely spatial component. The implied elimination of space-time interactions
45
+ cuts the number of model parameters and makes the covariance tractable again (see Genton (2007)).
46
+ Besides, separability entails a product structure for the principal components, facilitating the construction
47
+ of estimators and inference methods (see Gromenko et al. (2012, 2016)). To rigorously define separability,
48
+ consider a stochastic process {X(s, t) | s ∈ K1, t ∈ K2}, with one argument in a spatial domain K1 and one
49
+ in a temporal domain K2. Then, under suitable conditions (see, for example, Janson and Kaijser (2015)),
50
+ its covariance operator can be defined point-wise as
51
+ C(s, t, s′, t′) := E [(X(s, t) − EX(s, t))(X(s′, t′) − EX(s′, t′))] .
52
+ We call C separable, if there exist two functions C1 (spatial), C2 (temporal), such that
53
+ C(s, t, s′, t′) = C1(s, s′) · C2(t, t′)
54
+ ∀s, s′ ∈ K1, t, t′ ∈ K2.
55
+ As pointed out before, the product structure of separability prunes model parameters, making the model
56
+ statistically and computationally more tractable.
57
+ However, separability is not a free lunch for space-time data. Indeed, erroneously assuming a sep-
58
+ arable model can lead to inconsistent estimates and biased inference results. This point is crucial, as
59
+ separability is rarely self-evident, as noticed by many authors (see Scaccia and Martin (2005); Genton
60
+ (2007); Aston et al. (2017), among many others).
61
+ To address this issue, statistical tests have been
62
+ proposed to examine separability, such as for finite dimensional data by Matsuda and Yajima (2004);
63
+ Scaccia and Martin (2005); Fuentes (2006); Crujeiras et al. (2010). More recently, nonparametric methods
64
+ tailored to functional observations have been devised by Aston et al. (2017); Constantinou et al. (2017,
65
+ 2018); Bagchi and Dette (2020); Dette et al. (2022).
66
+ While these latter works differ in terms of their
67
+ inference strategies, they share the mathematical setup of modelling observations in a space of square inte-
68
+ grable functions. This approach is standard in FDA (see the monographs of Horváth and Kokoszka (2012);
69
+ Hsing and Eubank (2015)) and provides the most immediate extension of finite dimensional methodology
70
+ to function spaces. Nevertheless, the choice of L2-spaces is usually more informed by mathematical con-
71
+ venience, than by practicability. Indeed, as many undergraduate textbooks point out, the L2-distance
72
+ is hard to geometrically interpret and often stuns the novice by its unintuitive notion of convergence.
73
+ More specific to FDA, basing a theory on L2-spaces usually ignores structural features of the functions,
74
+ such as continuity. Notice that the bulk of FDA relies on continuous, non-parametric curve estimation as
75
+ preprocessing. In such cases, insisting on an L2-framework can feel disjoint from a user’s intuition and
76
+ defy heuristic interpretations of results.
77
+ Following recent work of Degras (2011); Cao et al. (2012); Degras (2017) and Dette et al. (2020), we
78
+ opt instead to conduct FDA on the in our opinion more natural space of continuous functions equipped
79
+ with the supremum norm. On this more intricate space, we study functional space-time processes and
80
+ advance a new test for separability of the covariance, which is based on an estimate of the maximum
81
+ 2
82
+
83
+ deviation between the covariance operator and an approximation by a covariance operator from a separable
84
+ process. We combine the profound theory of weak convergence of stochastic processes (see, for example,
85
+ van der Vaart and Wellner (1996) or Giné and Nickl (2016) among many others) with new differentiability
86
+ results for these separability measures to study the asymptotic properties of the corresponding estimates.
87
+ To improve the finite sample properties and to avoid the estimation of complicated nuisance parameters
88
+ we propose a multiplier bootstrap for dependent data as a more practicable alternative. In particular, our
89
+ results hold under weaker dependence and stationarity assumptions compared to previous works.
90
+ The rest of this paper is organized as follows. Section 2 provides a brief introduction to random
91
+ variables on the space of continuous functions and the notion of separability. Subsequently, we discuss
92
+ three methods from the related literature to approximate a covariance kernel C by a separable version (we
93
+ develop theory for all three approximations at a later point). In Section 3, we present the test statistic for
94
+ the hypothesis of separability and prove its weak convergence. To approximate the limiting distribution,
95
+ we discuss a non-standard multiplier bootstrap for dependent data. Section 4 is dedicated to the finite
96
+ sample properties of our test, which we study by virtue of simulations as well as a data example. Finally,
97
+ all proofs and technical details are deferred to the Appendix.
98
+ 2
99
+ Mathematical concepts
100
+ In this section, we lay the mathematical foundations of FDA in the space of continuous functions. Sec-
101
+ tion 2.1 begins with a review of random, continuous functions, as well as basic concepts, such as functional
102
+ expectations and covariance kernels. Subsequently, we define the model assumption of separability, which
103
+ is the focus of our below statistical analysis. In Section 2.2, we discuss three methods to approximate a
104
+ kernel A by a separable version Ax and show that each approximation map (A �→ Ax) is well-defined and
105
+ differentiable (see Theorem 2.2).
106
+ 2.1
107
+ Mathematical preliminaries
108
+ Let
109
+ C(K) :=
110
+
111
+ f : K → R | f continuous
112
+
113
+ ,
114
+ denote the space of continuous, real valued functions defined on a non-empty, compact set K ⊂ Rd, which
115
+ equipped with the common supremum norm (or "sup-norm" for short)
116
+ ∥f∥ := sup
117
+ t∈K
118
+ |f(t)|
119
+ (2.1)
120
+ is a Banach space. If there is no danger of confusion, we sometimes refer to a function f ∈ C(K) by its
121
+ evaluation f(t). Moreover, we also use the notation ∥ · ∥ to refer to the max-norm (maximum absolute
122
+ entry) for matrices or vectors (corresponding to a finite set K in (2.1)).
123
+ Letting (Ω, A, P) denote a complete probability space, we call a map X : (Ω, A, P) → C(K) a
124
+ random C(K)-valued function, if X is Borel-measurable w.r.t. the sup-norm. We point out that Borel-
125
+ measurability of X (as a Banach space valued function) is equivalent to measurability of the real valued
126
+ marginals X(t) : (Ω, A, P) → R for all t ∈ K. Supposing that the first absolute moment of X exists, in the
127
+ sense that E∥X∥ < ∞, the expectation of X is well-defined (in the Bochner sense), with EX ∈ C(K) and
128
+ 3
129
+
130
+ equal to the point-wise expectation E[X(t)] for any t ∈ K. If the stronger moment condition E∥X∥2 < ∞
131
+ holds, we can define the expectation of the product function {(X(s)− EX(s))(X(t)− EX(t))}s,t∈K on the
132
+ space C(K2) := C(K × K). We call this the covariance kernel and define it point-wise as
133
+ C(s, t) := E[X(s) − EX(s)][X(t) − EX(t)].
134
+ For further details on defining moment of Banach space valued random variables we refer to Janson and Kaijser
135
+ (2015). As common in the study of functional data, we sometimes consider for a continuous kernel function
136
+ A ∈ C(K2) the corresponding integral operator {f(t)}t∈K �→ {
137
+
138
+ K A(s, t)f(s)ds}t∈K. For ease of notation,
139
+ we usually identify the integral operator with the associated kernel (notice that the relation is one-one) and
140
+ define the expression A[f] := {
141
+
142
+ K A(s, t)f(s)ds}t∈K. In particular, we call the integral operator associated
143
+ with C the covariance operator. Finally, we observe that C(K) can be understood as a subspace of L2(K),
144
+ the space of square integrable functions, equipped with the canonical semi-norm ∥f∥L2 := {
145
+
146
+ K f(s)2ds}1/2.
147
+ Recall that the L2-topology is weaker than the uniform topology, since we consider functions with compact
148
+ support.
149
+ In the next step, we consider the mathematical property of separability. Let K1 ⊂ Rd, K2 ⊂ Rq be
150
+ compact and non-empty sets. Then we say that a kernel A ∈ C((K1 × K2)2) is separable, if there exist
151
+ kernels Ai ∈ C(K2
152
+ i ) for i = 1, 2, s.t.
153
+ A(s, t, s′, t′) = A1(s, s′) A2(t, t′)
154
+ ∀s, s′ ∈ K1, t, t′ ∈ K2.
155
+ Later, we will study the case of a separable covariance kernel C of a random function X. In order to
156
+ assess separability, we will employ an estimator ˆCN and compare it to a separable approximation. The
157
+ construction of such separable approximations is the subject of the next section.
158
+ 2.2
159
+ Separable approximations
160
+ In this section, we discuss the approximation of a kernel function A ∈ C((K1 × K2)2) by the (separable)
161
+ product of two functions B = A1 · A2 with Ai ∈ C(K2
162
+ i ) and i = 1, 2. This approximation is key to our
163
+ subsequent analysis, as it characterizes separability by the vanishing goodness-of-fit measure ∥A−B∥ = 0.
164
+ How then should we construct a separable approximation? The most natural way might be to optimize
165
+ over all separable maps w.r.t. the norm ∥ · ∥, i.e., to find
166
+ Bopt ∈ argmin{∥A − B∥ : B separable}.
167
+ Unfortunately, this type of approximation is computationally infeasible. To illustrate this point, let us
168
+ consider the analogue problem of finding an optimal separable approximation for a d × d-matrix w.r.t.
169
+ to the max-norm (also denoted by ∥ · ∥).
170
+ This problem reflects the search for an optimal, separable
171
+ approximation for discretized a version of A (as it would be saved on a computer in a real application).
172
+ In the following Lemma "⊗" denotes the well-known Kronecker product for matrices.
173
+ Remark 2.1. Let M ∈ Rd×d be a real valued matrix with d = pq and p, q ∈ N. Then the problem of
174
+ finding a solution to the following minimization problem
175
+ “minimize ∥M − M1 ⊗ M2∥
176
+ with M1 ∈ Rp×p,
177
+ M2 ∈ Rq×q”,
178
+ is NP-complete.
179
+ 4
180
+
181
+ Proof. The problem of finding optimal rank-1-approximations with regard to the max-norm is an NP-
182
+ complete problem, according to Gillis and Shitov (2017). According to Section 2 of Genton (2007) the
183
+ problem of finding separable approximations is equivalent to finding rank-1-approximations.
184
+ The notion of NP-completeness in the above Remark 2.1 refers to a set of problems which are (by today’s
185
+ knowledge) not efficiently solvable (for details, see Garey and Johnson (1979)).
186
+ Evidently, if it is not
187
+ feasible to find max-norm approximations for matrices, it has a fortiori to be true for continuous kernels
188
+ (which then cannot be optimally approximated by a separable kernel even on a grid with reasonable effort).
189
+ This insight suggests to use different, suboptimal, but computationally feasible approximation methods. In
190
+ the following, we discuss three procedures which have been applied previously in the study of separability
191
+ for L2-functions.
192
+ 2.2.1
193
+ Partial trace approximations
194
+ Let A ∈ C((K1 × K2)2) be a kernel function. We can then define the marginal kernels Atr
195
+ 1 ∈ C(K2
196
+ 1) and
197
+ Atr
198
+ 2 ∈ C(K2
199
+ 2) point-wise as
200
+ Atr
201
+ 1 (s, s′) :=
202
+
203
+ K2
204
+ A(s, w, s′, w)dw
205
+ and
206
+ Atr
207
+ 2 (t, t′) =
208
+
209
+ K1
210
+ A(u, t, u, t′)du
211
+ (2.2)
212
+ and therewith the separable approximation Atr of A as
213
+ Atr(s, t, s′, t′) :=
214
+ Atr
215
+ 1 (s, s′)Atr
216
+ 2 (t, t′)
217
+
218
+ K1
219
+
220
+ K2 A(u, w, u, w)du dw .
221
+ (2.3)
222
+ Notice that Atr is well-defined, if the denominator in (2.3) is non-zero. For a covariance kernel (sym-
223
+ metric and positive semidefinite) this is automatically satisfied, unless the kernel is trivial. Partial trace
224
+ approximations are well-known from quantum physics (see Bhatia (2003) and references therein) and have
225
+ recently been applied for separability tests of space-time processes in L2-spaces (see Constantinou et al.
226
+ (2017), Aston et al. (2017)). In a recent work of Masak et al. (2020) generalizations of partial traces have
227
+ been investigated in the context of “almost separable matrices”.
228
+ 2.2.2
229
+ Partial product approximations
230
+ Closely related to the notion of partial traces are partial products. The partial product approximation
231
+ depends on a user determined function ψ ∈ C(K2
232
+ 2), where typical choices are discussed in Bagchi and Dette
233
+ (2020) (one being the constant 1). We then define for A ∈ C((K1 × K2)2) point-wise the marginal kernels
234
+ Apr
235
+ 1 (s, s′) :=
236
+
237
+ K2
238
+ 2
239
+ A(s, w, s′, w′)ψ(w, w′)dw dw′
240
+ and
241
+ Apr
242
+ 2 (t, t′) :=
243
+
244
+ K2
245
+ 1
246
+ A(u, t, u′, t′)Apr
247
+ 1 (u, u′)du du′
248
+ (2.4)
249
+ and therewith the separable approximation Apr as
250
+ Apr(s, t, s′, t′) :=
251
+ Apr
252
+ 1 (s, s′)Apr
253
+ 2 (t, t′)
254
+
255
+ K2
256
+ 1 (Apr
257
+ 1 (u, u′))2 du du′ .
258
+ (2.5)
259
+ As for partial traces, the approximation is well-defined for a non-vanishing numerator, i.e., for
260
+ Apr
261
+ 1 ̸= 0.
262
+ (2.6)
263
+ 5
264
+
265
+ This condition is fulfilled if A ̸= 0 for an appropriate the choice of ψ. Recently, partial products have been
266
+ used in Dette et al. (2022) for the quantification of separability in L2-spaces and more recently for the
267
+ efficient derivation of optimal separable approximations w.r.t. the L2-norm in Masak et al. (2020). These
268
+ latter approximations are discussed next.
269
+ 2.2.3
270
+ SPCA approximations
271
+ SPCA (separable principal component analysis) provides the last approximation method that we want to
272
+ investigate. With respect to the L2-norm, SPCA-approximations are optimal, whereas for the sup-norm
273
+ they do not occupy this special position (see Remark 2.1). SPCA-approximations have been known in
274
+ finite dimensions for several decades (Van Loan and Pitsianis (1993); Genton (2007)) and have recently
275
+ been generalized to infinite-dimensional Hilbert spaces by Dette et al. (2022).
276
+ The name “SPCA” has
277
+ been introduced by Masak et al. (2020), who proposed an efficient algorithm for the calculation of these
278
+ approximations by virtue of the partial product (see Section 2.2.2 in this reference). Consider the kernels
279
+ ˜APCA
280
+ 1
281
+ (s, s′, ¯s, ¯s′) :=
282
+
283
+ K2
284
+ 2
285
+ A(s, w, s′, w′)A(¯s, w′, ¯s′, w)dw dw′
286
+ and
287
+ ˜APCA
288
+ 2
289
+ (t, t′, ¯t, ¯t′) :=
290
+
291
+ K2
292
+ 1
293
+ A(u, t, u′, t′)A(u′, ¯t, u, ¯t′)du du′,
294
+ both of which are continuous, symmetric (w.r.t. to the first and second pair of components) and positive
295
+ definite. According to Mercer’s theorem (Theorem 4.49 in Steinwart and Christmann (2008)) we can write
296
+ them down as
297
+ ˜APCA
298
+ 1
299
+ (s, s′, ¯s, ¯s′) =
300
+
301
+ i≥1
302
+ λivi(s, s′)vi(¯s, ¯s′),
303
+ ˜APCA
304
+ 2
305
+ (t, t′, ¯t, ¯t′) =
306
+
307
+ i≥1
308
+ λiui(t, t′)ui(¯t, ¯t′).
309
+ Here {λi, vi}i∈N and {λi, ui}i∈N are the eigensystems of the respective integral operators and the eigen-
310
+ values are supposed to be in descending order. It is not difficult to show that if the strict inequality
311
+ λ1 > λ2
312
+ (2.7)
313
+ holds, the eigenfunction v1, u1 are well-defined (up to sign) and continuous (see for both results Ap-
314
+ pendix A.3). Supposing that this is true, we define the marginals
315
+ APCA
316
+ 1
317
+ (s, s′) =
318
+
319
+ λ1v1(s, s′),
320
+ APCA
321
+ 2
322
+ (t, t′) =
323
+
324
+ λ1u1(t, t′)
325
+ and therewith the SPCA approximation
326
+ APCA(s, t, s′, t′) = APCA
327
+ 1
328
+ (s, s′)APCA
329
+ 2
330
+ (t, t′).
331
+ (2.8)
332
+ We conclude this section with a general result regarding the approximation maps A �→ Ax, for every
333
+ x ∈ {tr, pr, PCA}. We demonstrate that each of these maps is well-defined (in the sense that the resulting
334
+ kernels are indeed continuous and positive definite). Moreover, we conclude that the approximation maps
335
+ are Fréchet-differentiable, which is critical for the subsequent application of the functional Delta-method
336
+ (see, for instance, Section 3.9 in van der Vaart and Wellner (1996)).
337
+ 6
338
+
339
+ Theorem 2.2. Let K1 ⊂ Rp, K2 ⊂ Rq be compact, non-empty sets and let ˜A ∈ C((K1 × K2)2) be a
340
+ covariance kernel with ˜A ̸= 0. Moreover, suppose that equation (2.6) and (2.7) are satisfied. Then the
341
+ maps
342
+
343
+
344
+
345
+ Fx
346
+ i : C((K1 × K2)2) → C(K2
347
+ i ) : A �→ Ax
348
+ i
349
+ Fx : C((K1 × K2)2) → C((K1 × K2)2) : A �→ Ax
350
+ are for i = 1, 2 and x ∈ {tr, pr, PCA} well-defined in a sufficiently small, open neighborhood of ˜A and
351
+ Fréchet differentiable in ˜A. Moreover, Fx
352
+ i [ ˜A] and Fx[ ˜A] are again covariance kernels.
353
+ The proof of this Theorem can be found in Appendix A, where we also state the explicit form of the
354
+ derivatives. In the next section, we will use this result in the context of statistical inference for spatio-
355
+ temporal data.
356
+ 3
357
+ Testing separability for a continuous covariance kernel
358
+ In this section, we develop a statistical test for the hypothesis of a separable covariance kernel in the space
359
+ of continuous functions. First, we specify the statistical framework in Section 3.1 and, second, investigate
360
+ test statistics for the hypothesis of separability in Section 3.2. Lemma 3.5 entails weak convergence of
361
+ these test statistics to suprema of Gaussian processes (under the null hypothesis) and hence provides the
362
+ theoretical tools for separability tests. To approximate the asymptotic quantiles of the test statistics, we
363
+ present in Section 3.3 a multiplier bootstrap for dependent data.
364
+ 3.1
365
+ Notations and assumptions
366
+ Let K1 ⊂ Rp and K2 ⊂ Rq be compact, non-empty sets and (Xn)n∈Z be a time series of random functions
367
+ in the Banach space C(K1 × K2) (for a definition, see Section 2.1). In the following, we will assume that
368
+ (Xn)n∈Z satisfies fourth order stationarity, in the sense that for any indices (n1, . . . , n4) ��� Z4 and k ∈ Z
369
+ the vectors (Xn1, . . . , Xn4) and (Xn1+k, . . . , Xn4+k) have the same distribution. In particular, supposing
370
+ that E∥X1∥2 < ∞, both the mean function EXn(s, t) and the covariance
371
+ C(s, t, s′, t′) := E [Xn(s, t)Xn(s′, t′)] − E [Xn(s, t)] E [Xn(s′, t′)]
372
+ do not depend on n and are well-defined on the spaces C(K1 × K2) and C((K1 × K2)2) respectively. In
373
+ the following, we want to construct a test for the hypothesis of a separable covariance operator, i.e.,
374
+ H0 : C is separable
375
+ vs.
376
+ H1 : C is not separable,
377
+ (3.1)
378
+ where separability is defined in Section 2.1. For this purpose, suppose that we observe a sample of N
379
+ random functions X1, . . . , XN (from the time series (Xn)n∈Z). For estimating C we use the (standard)
380
+ empirical covariance estimator defined as:
381
+ ˆCN(s, t, s′, t′) := 1
382
+ N
383
+ N
384
+
385
+ n=1
386
+
387
+ Xn(s, t) − XN(s, t)
388
+ � �
389
+ Xn(s′, t′) − XN(s′, t′)
390
+
391
+ ,
392
+ (3.2)
393
+ where XN(s, t) := 1
394
+ N
395
+ �N
396
+ n=1 Xn(s, t), (s, t) ∈ K1 ×K2, denotes the sample mean estimator function. In the
397
+ next section, we will construct a test statistic for the hypothesis H0, by comparing ˆCN with a separable
398
+ 7
399
+
400
+ approximation. The use of this statistic is motivated by the fact that, under suitable assumptions on the
401
+ dependence structure, ˆCN is a consistent estimator of C by the law of large numbers (on Banach spaces).
402
+ In order to quantify dependence, we introduce the popular concept of α-mixing sequences.
403
+ Definition 3.1. Let (Xn)n∈Z be a sequence of random variables on some Banach space. For index sets
404
+ I, J ⊂ Z we define the set distance
405
+ dist(I, J ) = min{|i − j| : i ∈ I, j ∈ J }
406
+ and use the notation FI := σ ({Xi : i ∈ I}) for the σ−algebra generated by the family of random variables
407
+ {Xi : i ∈ I}. For r ∈ N0 the r-th α-mixing coefficient is then defined as
408
+ α(r) = sup {|P(A ∩ B) − P(A)P(B)| : A ∈ FI, B ∈ FJ , dist(I, J ) ≥ r, I, J ⊂ Z} .
409
+ The sequence (Xn)n∈Z is called α-mixing if α(r) → 0, as r → ∞.
410
+ We can now state the theoretical assumptions for the separability test, developed in this section.
411
+ Assumptions 3.2.
412
+ i) The sequence (Xn)n∈Z consists of centered, random functions in C(K1 × K2) and is fourth order
413
+ stationary.
414
+ ii) There exists a non-negative random variable M, parameters β ∈ (0, 1] and J ≥ 0 with the constraint
415
+ Jβ > ⌈2(dim(K1) + dim(K2))⌉ + 1 such that
416
+ E(∥X1∥JM J) < ∞,
417
+ and
418
+ |Xn(s, t) − Xn(s′, t′)| ≤ M max{∥s − s′∥β, ∥t − t′∥β},
419
+ (3.3)
420
+ holds (almost surely) for all (s, t), (s′, t′) ∈ K1 × K2 and all n ∈ Z.
421
+ iii) For some γ > max{J, 8} it holds that E∥X1∥γ < ∞.
422
+ iv) The sequence (Xn)n∈Z is α-mixing in the sense of Definition (3.1), with α(r) ≤ κ/(1 + r)a, where
423
+ κ > 0 is some constant and a > 2γ/(γ − 8).
424
+ We briefly discuss each of these Assumptions.
425
+ Remark 3.3.
426
+ i) We require second order stationarity s.t. the empirical mean XN and the empirical covariance oper-
427
+ ator ˆCN are consistent estimators. The stronger assumption of fourth order stationarity guarantees
428
+ existence of the long-run variance operator of
429
+
430
+ N( ˆCN − C). An examination of our proofs shows
431
+ that these assumptions can be further relaxed to conditions on the moments of Xn. However, for par-
432
+ simony of presentation, we do not discuss these mathematically weaker (but harder to understand)
433
+ adaptions. Our stationarity assumption is weaker than those in the related literature (both in L2-
434
+ and C-spaces), where either independence or strict stationarity is considered (see Constantinou et al.
435
+ (2017); Aston et al. (2017); Bagchi and Dette (2020); Dette and Kokot (2022)).
436
+ 8
437
+
438
+ ii) To devise asymptotic tests for separability, we derive a CLT on the Banach space of continuous
439
+ functions. Such results require the validation of tightness conditions, which depend on the geometry
440
+ of the underlying space (reflected by the entropy rate). In the case of i.i.d. observations, sufficient
441
+ conditions for a CLT can be found in Jain and Marcus (1975), and for the dependent case (under α-
442
+ and φ-mixing) in Dmitrovskii et al. (1984). More specifically, Theorem 1 of Jain and Marcus (1975)
443
+ requires a random Lipschitz condition, which together with an entropy condition entails a functional
444
+ CLT on C(K). In this paper, we further relax this assumption by requiring only a random β-Hölder
445
+ condition. This condition specifically includes sample paths of the Brownian motion, that are almost
446
+ surely β-Hölder continuous, for β < 1/2. However, additional smoothness helps to reduce moment
447
+ conditions imposed on the data (see the next assumption).
448
+ iii) − iv) The existence of sufficiently many moments is the key to proving our CLT (and its bootstrap variant).
449
+ As might be expected, stronger moment conditions can be traded off against weaker smoothness
450
+ assumptions for the data functions, as well as milder conditions on temporal dependence. We quantify
451
+ dependence by the decay rate of strong mixing coefficients, where a slower decay expresses stronger
452
+ time-dependence. In comparison to the related literature, our mixing conditions are rather weak and
453
+ include large classes of dependent time series.
454
+ 3.2
455
+ Central limit theorems in C((K1 × K2)2)
456
+ We begin our theoretical derivations by proving weak convergence of the standardized empirical covariance
457
+ operator
458
+
459
+ N( ˆCN − C) to a Gaussian process G. This result, together with the corresponding bootstrap
460
+ convergence, is of independent interest for the statistical investigation of the covariance on the space of
461
+ continuous functions (notice that Theorem 3.4 is a special consequence of Theorem 3.6).
462
+ Theorem 3.4. Suppose that Assumption 3.2 holds. Then there exists a centered Gaussian process G on
463
+ the space C((K1 × K2)2) such that
464
+
465
+ N
466
+ � ˆCN − C
467
+
468
+ d→ G.
469
+ We now combine weak convergence of the empirical covariance with the Fréchet-differentiability of the
470
+ separable approximation maps (Theorem 2.2). This yields weak convergence of the empirical separability
471
+ measure ∥ ˆCN − ˆCx
472
+ N∥ for any one of the approximation types x ∈ {tr, pr, PCA}, considered in Sections A.2-
473
+ A.3.
474
+ Lemma 3.5. Suppose our Assumption 3.2 holds, that C ̸= 0 is separable and that (2.6), (2.7) are satisfied.
475
+ Then under the hypothesis H0 (defined in (3.1), it holds that
476
+
477
+ N
478
+
479
+ ˆCN − ˆCx
480
+ N
481
+
482
+ d→ (Id −DCFx)G
483
+ (3.4)
484
+ for all x ∈ {tr, pr, PCA}. Here, DCFx is the derivative of the separable approximation map (see Section 2),
485
+ Id the identity operator and G the Gaussian process from Theorem 3.4. In particular, it holds under H0
486
+ (separability), that
487
+
488
+ N
489
+ ��� ˆCN − ˆCx
490
+ N
491
+ ���
492
+ d→ ∥(Id −DCFx)[G]∥
493
+ (3.5)
494
+ and under H1 (non-separability) that
495
+
496
+ N
497
+ ��� ˆCN − ˆCx
498
+ N
499
+ ���
500
+ d→ ∞.
501
+ 9
502
+
503
+ The weak convergence in (3.4) follows by a version of the Delta-method (see for instance Section 3.9 in
504
+ van der Vaart and Wellner (1996)) applied to the process
505
+
506
+ N( ˆCN −C). The statement in (3.5) is a direct
507
+ consequence of this, using the continuous mapping theorem (see Theorem 1.3.6 in van der Vaart and Wellner
508
+ (1996)). Finally, divergence under H1 is entailed by consistency of ˆCN and ˆCx
509
+ N.
510
+ Lemma 3.5 implies a straightforward test for the hypothesis H0: If the Gaussian process G (or equivalently
511
+ its covariance) were known, we could easily approximate the upper (1 − α) quantile q1−α of the limiting
512
+ distribution and reject whenever
513
+
514
+ N
515
+ ��� ˆCN − ˆCx
516
+ N
517
+ ��� > q1−α.
518
+ Unfortunately, the covariance CG of G is unknown and extremely difficult to approximate. Notice that it
519
+ is defined on the product space C((K1 × K2)4), making it nearly impossible: either to calculate or save
520
+ (recall that our discussion is motivated by the intractability of C, and CG consumes the squared amount
521
+ of memory space). In the literature on L2-tests, Aston et al. (2017); Constantinou et al. (2018) have tried
522
+ to evade this problem by using projection methods. While this approach is viable for functional data with
523
+ a discrete spatial component, it seems less effective in the case of continuous spatial data (see also our
524
+ simulations in Section 4.1). As a more practicable and fully functional alternative, we therefore discuss a
525
+ multiplier bootstrap for dependent data in the next section.
526
+ 3.3
527
+ A multiplier bootstrap
528
+ In order to approximate the distribution of
529
+
530
+ N( ˆCN − C) we propose a multiplier bootstrap for dependent
531
+ data, which is inspired by the methodology of Bücher and Kojadinovic (2013) and has recently been
532
+ adapted to functional data by Dette et al. (2020). While various alternative bootstraps exist for functional
533
+ data (an important example for the covariance is Paparoditis and Sapatinas (2016)), their validity is
534
+ usually demonstrated in an L2-framework, making them inapplicable in our setup.
535
+ We begin our discussion by fixing a number r ∈ N of bootstrap replicates. For 1 ≤ k ≤ r, we consider
536
+ vectors of random weights (w(k)
537
+ 1,N, . . . , w(k)
538
+ N,N) ∈ RN, which are independent of the data X1, . . . , XN and
539
+ independent across k. We assume that each weight-vector follows a multivariate normal distribution. More
540
+ precisely, the variables w(k)
541
+ i,N are supposed to be centered with unit variance, and (lN − 1)-dependent with
542
+ E[w(k)
543
+ i,Nw(k)
544
+ j,N] = (1 − |i − j|/lN)
545
+ for any |i − j| ≤ lN.
546
+ Here lN ∈ N is a bandwidth parameter, comparable to the block-length in a
547
+ block bootstrap (see, for instance, Theorem 2.1 in Bücher and Kojadinovic (2013)). We then define the
548
+ bootstrapped process B(k)
549
+ N
550
+ point-wise as
551
+ B(k)
552
+ N (s, t, s′, t′) := 1
553
+ N
554
+ N
555
+
556
+ n=1
557
+ w(k)
558
+ n,N
559
+
560
+ [Xn(s, t) − XN(s, t)][Xn(s′, t′) − XN(s′, t′)] − ˆCN(s, t, s′, t′)
561
+
562
+ (3.6)
563
+ for 1 ≤ k ≤ r.
564
+ Theorem 3.6 (Multiplier Bootstrap). Suppose that Assumption 3.2 holds and that lN satisfies both re-
565
+ strictions lN → ∞ and lN/
566
+
567
+ N → 0. Then for any r ∈ N the weak convergence
568
+
569
+ N
570
+
571
+ ˆCN − C, B(1)
572
+ N , . . . , B(r)
573
+ N
574
+
575
+ d→
576
+
577
+ G, G(1), . . . , G(r)�
578
+ (3.7)
579
+ holds, where G is the Gaussian process from Theorem 3.4 and G(1), . . . , G(r) are i.i.d. copies of G.
580
+ 10
581
+
582
+ A detailed proof of Theorem 3.6 is given in the Appendix, but let us briefly give some arguments why (3.7)
583
+ holds. First, notice that due to independence of the weights (of the data and among themselves across
584
+ k), we have uncorrelatedness of B(k)
585
+ N
586
+ with ˆCN − C and with any other B(k′)
587
+ N
588
+ . Hence, if these objects are
589
+ (jointly) normal in the limit, they also have to be independent. This leaves open the questions, why B(k)
590
+ N
591
+ is normal and why it has the right covariance structure. On a high level, asymptotic normality of B(k)
592
+ N
593
+ is obvious, as it is a sum of weakly dependent random variables. A closer look reveals that dependence
594
+ in (3.6) is governed by the bandwidth lN, which cannot increase too fast for a CLT to hold (this will
595
+ be reflected in the assumption lN = o(
596
+
597
+ N)). On the other hand, lN has to diverge for N → ∞, s.t.
598
+ B(k)
599
+ N
600
+ has the same asymptotic covariance as G. As lN grows, neighboring terms in B(k)
601
+ N
602
+ have (almost)
603
+ identical weights. Consequently, their covariance is (almost) identical to that of the terms in ˆCN, without
604
+ a multiplier.
605
+ By Theorem 3.6 the bootstrap variable B(k)
606
+ N
607
+ mimics the random fluctuations of the empirical covariance
608
+ ˆCN around C. Thus, it can help us to approximate the distribution of the separability measure ∥ ˆCN − ˆCx
609
+ N∥;
610
+ the actual object of interest. To make this clear, we use the representation
611
+ ∥ ˆCN − ˆCx
612
+ N∥ = ∥{ ˆCN − C} − ([C + { ˆCN − C}]x − C)∥.
613
+ To give a bootstrap approximation, we can replace { ˆCN − C} by B(k)
614
+ N .
615
+ Furthermore, since we want
616
+ to approximate the distribution under the null, we have to replace C by the separable estimator ˆCx
617
+ N
618
+ everywhere else. This gives us the bootstrap version
619
+ B∞,(k)
620
+ N
621
+ := ∥B(k)
622
+ N − ([ ˆCx
623
+ N + B(k)
624
+ N ]x − ˆCx
625
+ N)∥.
626
+ (3.8)
627
+ Lemma 3.7. Under the assumptions of Theorem 3.6 it holds that
628
+
629
+ N(B∞,(1)
630
+ N
631
+ , · · · , B∞,(r)
632
+ N
633
+ )
634
+ d→
635
+
636
+ ∥(Id −DCFx)[G1]∥ , · · · , ∥(Id −DCFx)[Gr]∥
637
+
638
+ ,
639
+ where G is the Gaussian process from Theorem 3.4 and G(1), . . . , G(r) are i.i.d. copies of G.
640
+ Lemma 3.7 theoretically underpins the following test decision: Let ˆq(r)
641
+ 1−α be the empirical (1 − α) quantile
642
+ of the vector (B∞,(1)
643
+ N
644
+ , · · · , B∞,(r)
645
+ N
646
+ ). Reject the hypothesis H0 (defined in (3.1)), if
647
+ ∥ ˆCN − ˆCx
648
+ N∥ > ˆq(r)
649
+ 1−α.
650
+ (3.9)
651
+ Lemma 3.7 implies that the resulting test holds asymptotic level α, as r → ∞, that is
652
+ lim
653
+ r→∞ lim
654
+ N→∞ PH0
655
+
656
+ ∥ ˆCN − ˆCx
657
+ N∥ > ˆq(r)
658
+ 1−α
659
+
660
+ = α,
661
+ and is consistent as N → ∞ under the alternative H1, that is
662
+ lim
663
+ N→∞ PH0
664
+
665
+ ∥ ˆCN − ˆCx
666
+ N∥ > ˆq(r)
667
+ 1−α
668
+
669
+ = 1
670
+ for any r ∈ N.
671
+ Remark 3.8.
672
+ 11
673
+
674
+ i) There are different ways to mathematically validate a bootstrap procedure. One way is proving
675
+ convergence of the bootstrap measure (conditional on the data) to the correct limiting distribu-
676
+ tion. Here, convergence is measured w.r.t. some metric on the probability measures, such as the
677
+ Kolmogorov–Smirnov distance for probability measures on Rd or the bounded Lipschitz distance
678
+ on general metric spaces (see van der Vaart and Wellner (1996) for a definition). This approach of
679
+ studying conditional distributions is considered in many classical works, such as Hall (1992). As
680
+ an alternative, it is possible to derive unconditional convergence results (such as Theorem 3.6 and
681
+ Lemma 3.7), where it is shown that a number of bootstrapped statistics converge to independent
682
+ copies of the same limiting distribution. Such results reflect the need of generating bootstrap rep-
683
+ etitions for most practical test decisions. One merit of this approach is its clearer interpretability
684
+ compared to the abstract notion of convergence on the spaces of measures, w.r.t. a difficult metric.
685
+ Yet, from a theoretical standpoint, the two approaches are in many instances equivalent. In par-
686
+ ticular, Lemma 3.7 implies for the conditional bootstrap measure PB(1)
687
+ N |X1,··· ,XN the convergence in
688
+ probability
689
+ d
690
+
691
+ PB(1)
692
+ N |X1,··· ,XN , P∥ ˆ
693
+ CN− ˆ
694
+ Cx
695
+ N∥� P→ 0,
696
+ where d is the Kolmogorov–Smirnov metric for probability measures on R and P∥ ˆ
697
+ CN− ˆ
698
+ Cx
699
+ N∥ denotes
700
+ the probability measure of the test statistic ∥ ˆCN − ˆCx
701
+ N∥. The proof of this assertion follows directly
702
+ from Lemma 2.3 in Bücher and Kojadinovic (2019) and a similar, conditional version of Theorem 3.6
703
+ can be given by using the techniques in Section 3 of that paper.
704
+ ii) The bandwidth parameter l = lN in Theorem 3.6 plays a similar role as the block length in a block
705
+ bootstrap. In the special case of independent data it is not necessary to assume that lN → ∞ and
706
+ a choice l = 1 yields the desired result (for multiplier bootstraps in the independent case, see also
707
+ Section 3.6 in van der Vaart and Wellner (1996)). We also want to highlight that our assumption
708
+ lN/
709
+
710
+ N → 0 is weaker than in previous works, where usually a polynomial decay rate of lN/
711
+
712
+ N was
713
+ assumed (see Dette and Kokot (2022)).
714
+ iii) The bootstrap test decision presented in this paper can be implemented without ever saving the entire
715
+ empirical covariance operator, or any other object of comparable size. In the following, we want to
716
+ sketch an argument why this is true. Let us therefore focus on the partial trace approximation: To
717
+ approximate the partial trace approximation ( ˆCN)tr, it suffices to calculate the trace of the empirical
718
+ covariance Tr[ ˆCN], as well as the partial traces ( ˆCN)tr
719
+ 1 , ( ˆCN)tr
720
+ 2 . All of these objects can be calculated
721
+ directly from the data, as e.g.,
722
+ Tr[ ˆCN] = 1
723
+ N
724
+ N
725
+
726
+ i=1
727
+
728
+ K1
729
+
730
+ K2
731
+ X2
732
+ i (s, t)ds dt
733
+ (3.10)
734
+ or
735
+ ( ˆCN)tr
736
+ 1 (s, s′) = 1
737
+ N
738
+ N
739
+
740
+ i=1
741
+
742
+ K2
743
+ Xi(s, t)Xi(s′, t)dt.
744
+ (3.11)
745
+ In particular, we do not have to save ˆCN to calculate ( ˆCN)tr. In contrast to ˆCN, the three objects
746
+ Tr[ ˆCN], ( ˆCN)tr
747
+ 1 , ( ˆCN)tr
748
+ 2 are small (a discretization takes about as much memory as a data function
749
+ Xn) and hence we assume that they (and thereby ( ˆCN)tr) are tractable.
750
+ So, from now on we
751
+ 12
752
+
753
+ assume that these objects are saved. Now, calculating the test statistic ∥ ˆCN − ˆCtr
754
+ N ∥ can be done
755
+ by maximizing the distance | ˆCN − ˆCtr
756
+ N | blockwise (it is easy to calculate for example ˆCN only for
757
+ certain subsets of the arguments (s, t, s′, t′) and then evaluate the maximum over all subsets). The
758
+ calculation of the bootstrap statistic B∞,(k)
759
+ N
760
+ (defined in (3.8)) is slightly more intricate. Here, we
761
+ have to calculate [ ˆCtr
762
+ N + B(k)
763
+ N ]tr (the other objects in B∞,(k)
764
+ N
765
+ can again be calculated for subsets of
766
+ indices in a straightforward way). Calculating [ ˆCtr
767
+ N + B(k)
768
+ N ]tr boils down to calculating the (partial)
769
+ traces of ˆCtr
770
+ N and B(k)
771
+ N
772
+ separately (as the partial traces are linear). For ˆCtr
773
+ N they equal ( ˆCN)tr
774
+ 1 , ( ˆCN)tr
775
+ 2
776
+ and we have already calculated and saved them before. For B(k)
777
+ N , they are equal to the partial traces
778
+ of
779
+ 1
780
+ N
781
+ �N
782
+ n=1 w(k)
783
+ n,N ˆCN (so essentially those of ˆCN) and those of
784
+ 1
785
+ N
786
+ �N
787
+ n=1 w(k)
788
+ n,N [Xn − XN] · [Xn − XN].
789
+ Notice that we cannot save this later object (it is of the same size as ˆCN). So, as a computational
790
+ trick, we can express it as the “covariance” of the complex valued data
791
+
792
+ sign(w(k)
793
+ n,N)·|w(k)
794
+ n,N|·[Xn−XN].
795
+ These objects are again small enough to be saved, and from them, we can calculate the partial traces
796
+ of
797
+ 1
798
+ N
799
+ �N
800
+ n=1 w(k)
801
+ n,N [Xn − XN] · [Xn − XN] directly (see (3.10) and (3.11)). Notice that in practice
802
+ it is necessary to take the real part in the end, to eliminate complex valued remainders, due to
803
+ computational imprecisions.
804
+ 4
805
+ Finite sample properties
806
+ In this section, we study the finite sample performance of our new method. We begin by a simulation
807
+ study, where we compare the performance of the test with a benchmark procedure from Constantinou et al.
808
+ (2018). Subsequently, we apply our test to a dataset of roman language recordings as described and used
809
+ in Aston et al. (2017).
810
+ 4.1
811
+ Simulations
812
+ Following Constantinou et al. (2018), we generate spatio-temporal data by virtue of a functional MA(1)-
813
+ process. More precisely, we generate Gaussian processes e0, . . . , eN, living on the unit square [0, 1]2, with
814
+ covariance kernel C, point-wise defined as
815
+ C(s, t, s′, t′) :=
816
+ 1
817
+ (a|t − t′| + 1)1/2 exp
818
+
819
+
820
+ b2|s − s′|2
821
+ (a|t − t′| + 1)c
822
+
823
+ ,
824
+ s, s′, t, t′ ∈ [0, 1].
825
+ (4.1)
826
+ As in Constantinou et al. (2018), we set a = 3 and b = 2 and consider the observations
827
+ Xn(s, t) :=
828
+ S
829
+
830
+ s′=1
831
+ exp
832
+
833
+ −b2(s − s′)2�
834
+ [en(t, s′) + en−1(t, s′)]
835
+ n = 1, · · · , N.
836
+ Notice that for c = 0 the kernel C in (4.1) factorizes into purely spatial and temporal components. By
837
+ implication, the covariance of Xn is separable for c = 0 (the hypothesis). On the other hand, if c > 0 the
838
+ kernel C is not separable and this inseparability is inherited by the covariance of Xn. We hence generate
839
+ data under H0 by setting c = 0 and under the alternative by setting c = 1. As in Constantinou et al.
840
+ (2018), we discretize the time component t, by dividing the unit-interval into T = 50 equidistant points
841
+ (1/T, 2/T, . . ., 50/T ). For the spatial component, Constantinou et al. (2018) use a similar discretization
842
+ (1/S, 2/S, . . ., (S − 1)/S), but for smaller numbers of gridpoints with S = 4, 6, 8, 10, 12, 14. Considering
843
+ 13
844
+
845
+ larger S is problematic for the procedure in Constantinou et al. (2018), which relies on the estimation
846
+ of the asymptotic covariance operator of
847
+
848
+ N( ˆCN − C) - an expensive and difficult undertaking in high
849
+ dimensions (we touched this point in our discussion at the end of Section 3.2). To implement their pro-
850
+ cedure, Constantinou et al. (2018) rely on dimension reduction, for S ≤ 8 in time, and for S > 8 in
851
+ both space and time. As we might expect, such projections entail deteriorating power for larger S as the
852
+ amount of variance explained decreases. In our study, we use the same number of gridpoints (to allow
853
+ meaningful comparisons) but also study the larger sizes of S = 20 and S = 30. As sample sizes, we
854
+ consider N = 50, 100, 150, 200 and as corresponding block-lengths lN = 2, 2, 3, 4. The number of bootstrap
855
+ repetitions for the generation of the empirical quantile is fixed at 400 and the nominal level at α = 5%.
856
+ All reported results are based on 1000 simulation runs.
857
+ In Table 1 we report empirical rejection probabilities under the hypothesis of separability (c = 0) and
858
+ the alternative (c = 1). In brackets, we include the rejection probabilities reported in Constantinou et al.
859
+ (2018) (whenever available), where we have chosen each time the maximum number of projection param-
860
+ eters (in time for S ≤ 8 and in space and time for S > 8), which produced the most powerful results (see
861
+ their Tables I-IV for a full picture of performance under variation of the projection parameters).
862
+ rejection probability under H0
863
+ rejection probability under H1
864
+ S
865
+ N = 50
866
+ N = 100
867
+ N = 150
868
+ N = 200
869
+ N = 50
870
+ N = 100
871
+ N = 150
872
+ N = 200
873
+ 4
874
+ 3.3
875
+ 5.8 (5.0)
876
+ 5.2 (5.3)
877
+ 5.4 (5.5)
878
+ 36.0
879
+ 91.0 (95.1)
880
+ 99.2 (99.8)
881
+ 100.0 (100.0)
882
+ 6
883
+ 2.5
884
+ 6.0 (5.3)
885
+ 5.2 (6.6)
886
+ 4.5 (5.1)
887
+ 40.5
888
+ 92.8 (89.0)
889
+ 99.1 (99.3)
890
+ 100.0 (100.0)
891
+ 8
892
+ 3.75
893
+ 6.5 (7.5)
894
+ 4.2 (4.7)
895
+ 5.1 (5.7)
896
+ 34.8
897
+ 92.3 (85.2)
898
+ 98.0 (98.7)
899
+ 99.9 (100.0)
900
+ 10
901
+ 2.75
902
+ 7.6 (4.7)
903
+ 3.4 (5.3)
904
+ 3.7 (5.8)
905
+ 41.8
906
+ 90.6 (84.7)
907
+ 98.6 (98.5)
908
+ 99.9 (100.0)
909
+ 12
910
+ 1.5
911
+ 7.2 (5.0)
912
+ 3.1 (6.0)
913
+ 5.2 (5.7)
914
+ 37.8
915
+ 90.4(82.9)
916
+ 99.0 (97.8)
917
+ 99.9 (100.0)
918
+ 14
919
+ 2.0
920
+ 7.0 (4.6)
921
+ 5.3 (5.7)
922
+ 3.7 (5.6)
923
+ 33.5
924
+ 92.5 (78.9)
925
+ 98.6 (93.7)
926
+ 100.0 (95.7)
927
+ 20
928
+ 3.4
929
+ 5.2
930
+ 5.7
931
+ 3.80
932
+ 38.0
933
+ 90.3
934
+ 98.3
935
+ 99.9
936
+ 30
937
+ 2.7
938
+ 7.0
939
+ 5.3
940
+ 3.61
941
+ 36.1
942
+ 87.4
943
+ 98.2
944
+ 99.9
945
+ Table 1:
946
+ Empirical rejection probabilities of the bootstrap test (3.9) under the hypothesis (c = 0) and the
947
+ alternative (c = 1). Benchmark values from the test of Constantinou et al. (2018) are given in brackets if
948
+ available.
949
+ Our results in Table 1 attest a satisfactory performance of the bootstrap test.
950
+ The nominal level is
951
+ reasonably approximated for N ≥ 100, while for N = 50 the test is somewhat conservative. The power of
952
+ the bootstrap test is high in most scenarios. While for small values of S, the benchmark test fares slightly
953
+ better, the bootstrap’s performance does not deteriorate for larger S, where it clearly outperforms the
954
+ benchmark. Even raising S to 20 or 30 does not impinge on performance in any systematic way (exactly
955
+ what a theory for continuous processes would suggest). Computationally, the bootstrap is particularly
956
+ user-friendly: It allows a straightforward parallelization in the generation of bootstrap samples and is
957
+ hence easy to implement. We have run our simulations on a standard desktop computer (3.2 GHz Apple
958
+ 14
959
+
960
+ M1 Pro, Octa-core, 16 GB RAM) and any test evaluation needed less than a minute (for S ≤ 10 less than
961
+ 2 seconds), which underpins the practicability of this approach. The subsequent data example was run on
962
+ the same machine for even larger values of T and S.
963
+ 4.2
964
+ A data example
965
+ We apply our test to the acoustic phonetic dataset of acoustic (log-)spectograms of Aston et al. (2017). A
966
+ brief discussion with additional references can be found in Section 4.2 of their paper. Both the raw and pre-
967
+ processed data together with detailed descriptions are contained in the file Acoustic_Data_And_Code.zip
968
+ available from Series C datasets of Volume 67 (https://rss.onlinelibrary.wiley.com/hub/journal/
969
+ 14679876/series-c-datasets/67_5). The data consist of recordings of spoken words (in this case the
970
+ numbers one to ten) in five different roman languages. For statistical use they have been transformed in
971
+ the form of acoustic log-spectograms. For our purposes only the preprocessed data are used (namely the
972
+ files WarpedPSD.RData and SVRF_WarpedPSD_SuppMat.RData). There are in total 219 data "functions" in
973
+ a frequency-time domain as described in Sections 2-4 of Pigoli et al. (2018).
974
+ As already indicated by the analysis in Pigoli et al. (2018) the null hypothesis (3.1) of separability seems to
975
+ be violated in this instance. Before applying our test statistic we look at relative measures of separability.
976
+ More concretely, for the separable trace approximation, the relative measure is given by
977
+ ∥ ˆCN − Ftr( ˆCN)∥
978
+ ∥ ˆCN∥
979
+ .
980
+ Indeed, as a preliminary analysis, we found that the relative measure of separability for the language
981
+ covariance operators are rather high, see Table 2.
982
+ French
983
+ Italian
984
+ Portuguese
985
+ American Spanish
986
+ Iberian Spanish
987
+ Relative
988
+ measure
989
+ 0.631
990
+ 0.895
991
+ 0.868
992
+ 0.947
993
+ 0.882
994
+ Table 2: The relative measure of separability w.r.t. the trace approximation of the five roman languages.
995
+ For every of the five languages we ran our bootstrap statistic of 1, 000 repetitions on the residual (i.e.
996
+ centered) surface data for each language separately. As a result the hypotheses of separability for every
997
+ of these languages is rejected with a highly significant p−value of less than 0.1%. See the first row of
998
+ Table 3 for the p-values of our test. For the sake of completeness the second and third row contain the
999
+ p-values obtained in Aston et al. (2017) for 2 frequency and 3 time dimensions and 8 frequency and 10
1000
+ dimensions, respectively. Our method provides several advantages, it is free of any tuning parameter, in
1001
+ contrast to the Studentized version of the empirical bootstrap of Aston et al. (2017), who have to choose
1002
+ additional parameters of dimensions of eigendirections (note that their test can only detect deviations
1003
+ from separability along those eigendirections). Moreover, when too few eigendirections are chosen (see
1004
+ Section 4.2 of Aston et al. (2017)) the hypotheses of separability cannot be rejected at the 5%-level.
1005
+ Secondly, in order to calculate the bootstrap we do only need to save the data, not the whole covariance
1006
+ operator, hence avoiding storage problems.
1007
+ 15
1008
+
1009
+ French
1010
+ Italian
1011
+ Portuguese
1012
+ American Spanish
1013
+ Iberian Spanish
1014
+ Test (3.9)
1015
+ <0.001
1016
+ <0.001
1017
+ 0.001
1018
+ <0.001
1019
+ <0.001
1020
+ Emp. stud. test
1021
+ (2, 3)
1022
+ 0.078
1023
+ 0.197
1024
+ 0.022
1025
+ 0.360
1026
+ 0.013
1027
+ Emp. stud. test
1028
+ (8, 10)
1029
+ 0.001
1030
+ 0.002
1031
+ 0.001
1032
+ 0.001
1033
+ <0.001
1034
+ Table 3: p−values of three different bootstrap tests of five Roman languages. First row: the test (3.9)
1035
+ proposed in this paper.
1036
+ Second and third row: the studentized version of the empirical bootstrap test
1037
+ proposed by Aston et al. (2017) with frequencey and time dimensions (2, 3) and (8, 10) respectively.
1038
+ Acknowledgements. This work was partially supported by the DFG Research unit 5381 Mathematical
1039
+ Statistics in the Information Age.
1040
+ References
1041
+ Aston, J. A. D., D. Pigoli, and S. Tavakoli (2017). Tests for separability in nonparametric covariance
1042
+ operators of random surfaces. Ann. Statist. 45(4), 1431–1461.
1043
+ Aue, A., G. Rice, and O. Sönmez (2018). Detecting and dating structural breaks in functional data without
1044
+ dimension reduction. J. R. Stat. Soc. Ser. B Stat. Methodol. 80(3), 509–529.
1045
+ Bagchi, P. and H. Dette (2020). A test for separability in covariance operators of random surfaces. Ann.
1046
+ Statist. 48(4), 2303–2322.
1047
+ Bhatia, R. (2003). Partial traces and entropy inequalities. Linear Algebra Appl. 370(1), 125–132.
1048
+ Billingsley, P. (2012).
1049
+ Probability and Measure, Anniversary Edition, Volume 238 of Wiley Series in
1050
+ Probability & Statistics. Wiley & Sons.
1051
+ Bücher, A. and I. Kojadinovic (2013). A dependent multiplier bootstrap for the sequential empirical copula
1052
+ process under strong mixing. Bernoulli 22(2), 927–968.
1053
+ Bücher, A. and I. Kojadinovic (2019). A note on conditional versus joint unconditional weak convergence
1054
+ in bootstrap consistency results. J. Theor. Probab. 32, 1145–1165.
1055
+ Cao, G., L. Yang, and D. Todem (2012). Simultaneous inference for the mean function based on dense
1056
+ functional data. J. Nonparametric Stat. 24(2), 359–377.
1057
+ Constantinou, P., P. Kokoszka, and M. Reimherr (2017). Testing separability of space–time functional
1058
+ processes. Biometrika 104(2), 425–437.
1059
+ 16
1060
+
1061
+ Constantinou, P., P. Kokoszka, and M. Reimherr (2018). Testing separability of space–time functional
1062
+ processes. J. Time Ser. Anal. 39(5), 731–747.
1063
+ Crujeiras, R. M., Fernández-Casal, and W. González-Manteiga (2010). Testing separability of space–time
1064
+ functional processes. Environmetrics 21, 382–399.
1065
+ Degras, D. (2011). Simultaneous confidence bands for nonparametric regression with functional data. Stat.
1066
+ Sin. 21, 1735–1765.
1067
+ Degras, D. (2017).
1068
+ Simultaneous confidence bands for the mean of functional data.
1069
+ WIREs Comp.
1070
+ Stats. 9(3), e1397.
1071
+ Dehling, H., T. Mikosch, and M. Sørensen (2002).
1072
+ Empirical process techniques for dependent data.
1073
+ Birkhäuser.
1074
+ Dette, H., G. Dierickx, and T. Kutta (2022).
1075
+ Quantifying deviations from separability in space-time
1076
+ functional processes. Bernoulli 28(4), 2909–2940.
1077
+ Dette, H. and K. Kokot (2022). "detecting relevant differences in the covariance operators of functional
1078
+ time series - a sup-norm approach". Ann. Inst. Statist. Math. 74(2), 195–231.
1079
+ Dette, H., K. Kokot, and A. Aue (2020). Functional data analysis in the banach space of continuous
1080
+ functions. Ann. Statist. 48(2), 1168–1192.
1081
+ Dmitrovskii, V. A., S. V. Ermakov, and E. I. Ostrovskii (1984). The central limit theorem for weakly
1082
+ dependent Banach-valued variables. Theor. Probab. Appl. 28, 89–104.
1083
+ Filipiak, K., D. Klein, and E. Vojtkova (2018). The properties of partial trace and block trace operators
1084
+ of partitioned matrices. Electron. J. Linear Algebra 33, 3–15.
1085
+ Fuentes, M. (2006). Testing for separability of spatial–temporal covariance functions. J. Statist. Plan.
1086
+ Inference 136(2), 447–466.
1087
+ Garey, M. R. and D. S. Johnson (1979). Computers and Intractability: A Guide to the Theory of NP-
1088
+ Completeness (First Edition ed.). Series of Books in the Mathematical Sciences. W. H. Freeman.
1089
+ Genton, M. G. (2007, 11). Separable approximations of space-time covariance matrices. Environmetrics 18,
1090
+ 681–695.
1091
+ Gillis, N. and Y. Shitov (2017). Low-rank matrix approximation in the infinity norm. Linear Algebra
1092
+ Appl. 581, 367–382.
1093
+ Giné, E. and R. Nickl (2016). Mathematical foundations of infinite-dimensional statistical models. Cam-
1094
+ bridge Series in Statistical and Probablistic Mathematics. New York: Cambridge University Press.
1095
+ Gromenko, O., P. Kokoszka, and M. Reimherr (2016). Detection of change in the spatiotemporal mean
1096
+ function. J. R. Stat. Soc. Ser. B Stat. Methodol. 79(1), 29–50.
1097
+ 17
1098
+
1099
+ Gromenko, O., P. Kokoszka, L. Zhu, and J. Sojka (2012). Estimation and testing for spatially indexed
1100
+ curves with application to ionospheric and magnetic field trends. Ann. Appl. Stat. 6(2), 669 – 696.
1101
+ Hall, P. (1992). The Bootstrap and Edgeworth Expansion. New York: Springer.
1102
+ Horváth, L. and P. Kokoszka (2012). Inference for Functional Data with Applications. New York: Springer
1103
+ Series in Statistics.
1104
+ Hsing, T. and R. Eubank (2015). Theoretical Foundations of Functional Data Analysis, with an Introduc-
1105
+ tion to linear Operators. New York: Wiley.
1106
+ Jain, N. C. and M. B. Marcus (1975). The central limit theorem for C(S)-valued random variables. J.
1107
+ Funct. Anal. 19, 216–231.
1108
+ Janson, S. and S. Kaijser (2015). Higher moments of Banach space valued random variables, Volume 238
1109
+ of Memoirs of the American Mathematical Society. American Mathematical Society.
1110
+ King, M. C., A.-M. Staicu, J. M. Davis, B. J. Reich, and B. Eder (2018). A functional data analysis of
1111
+ spatiotemporal trends and variation in fine particulate matter. Atmos. Environ. 184, 233–243.
1112
+ Kokoszka, P. and M. Reimherr (2013). Asymptotic normality of the principal components of functional
1113
+ time series. Stochastic Process. Appl. 123(5), 1546–1562.
1114
+ König, H. (1986). Eigenvalue Distribution of Compact Operators, Volume 16 of Operator Theory: Advances
1115
+ and Applications. Birkhäuser.
1116
+ Martínez-Hernández, I. and M. Genton (2020). Recent developments in complex and spatially correlated
1117
+ functional data. Braz. J. Probab. Stat. 34, 204–229.
1118
+ Masak, T., S. Sarkar, and V. M. Panaretos (2020). Principal Separable Component Analysis via the Partial
1119
+ Inner Product. https://arxiv.org/abs/2007.12175.
1120
+ Mateu, J. and R. Giraldo (2022). Geostatistical Functional Data Analysis. Wiley.
1121
+ Matsuda, Y. and Y. Yajima (2004). On testing for separable correlations of multivariate time series. J.
1122
+ Time Ser. Anal. 24(4), 501–528.
1123
+ Paparoditis, E. and T. Sapatinas (2016). Bootstrap-based testing of equality of mean functions or equality
1124
+ of covariance operators for functional data. Biometrika 103, 727–733.
1125
+ Pigoli, D., P. Z. Hadjipantelis, J. S. Coleman, and J. A. D. Aston (2018). The statistical analysis of
1126
+ acoustic phonetic data: exploring differences between spoken romance languages. J. R. Stat. Soc. Ser.
1127
+ C Appl. Statist. 67, 1103–1145.
1128
+ Scaccia, L. and R. J. Martin (2005). Testing axial symmetry and separability of lattice processes. J.
1129
+ Statist. Plann. Inference 131(1), 19–39.
1130
+ Steinwart, I. and A. Christmann (2008). Support Vector Machines. New York: Springer Science and
1131
+ Business Media.
1132
+ 18
1133
+
1134
+ van der Vaart, A. W. and J. A. Wellner (1996). Weak convergence and empirical processes. With applica-
1135
+ tions to statistics. New York: Springer Series in Statistics.
1136
+ Van Loan, C. F. and N. Pitsianis (1993). Approximation with kronecker products. Linear Algebra for
1137
+ Large Scale and Real-Time Applications 232, 293–314.
1138
+ White, H. (2001). Asymptotic Theory for Econometricians. New York: Academic Press.
1139
+ Yoshihara, K.-i. (1978). Moment inequalities for mixing sequences. Kodai Math. J. 1, 316–328.
1140
+ 19
1141
+
1142
+ A
1143
+ Proof of Theorem 2.2
1144
+ In this section, we investigate the differentiability of the approximation maps (·)tr, (·)pr, (·)PCA. We adapt
1145
+ results from Dette et al. (2022) (Theorem 3.4), where differentiability of the approximations on the space
1146
+ of L2-functions is shown. Since the continuous functions form a subspace of L2, endowed with a stronger
1147
+ norm, the Fréchet-differentials (for each map) have to coincide on both spaces (if they exist). Therefore, it
1148
+ only remains to show that the “differential quotients” converge in the space of continuous functions. Notice
1149
+ that we do not establish positive-semi definitness for any of the approximations, which is well known in
1150
+ the literature (for partial traces see Lemma 2.4 in Filipiak et al. (2018) and for the other approximation
1151
+ types the discussion in Masak et al. (2020)).
1152
+ A.1
1153
+ Differentiability of the partial trace
1154
+ Recall the definition of the partial trace kernels in (2.2) and the partial product approximation in
1155
+ (2.3).
1156
+ Lemma A.1. Let K1 ⊂ Rp, K2 ⊂ Rq be compact sets. Then the (partial) trace operators
1157
+ tr : C((K1 × K2)2) → R
1158
+ tri : C((K1 × K2)2) → C(K2
1159
+ i )
1160
+ defined in Section 2.2.1 are continuous.
1161
+ Proof. The proof follows by elementary calculations. For A ∈ C((K1 × K2)2) we can upper bound the
1162
+ integral
1163
+ |tr[A]| =
1164
+ ����
1165
+
1166
+ K1×K2
1167
+ A(u, w, u, w)du dw
1168
+ ���� ≤ |K1| · |K2| · ∥A∥.
1169
+ Here,|Ki| denotes the Lebesgue measure of Ki in the appropriate dimension. Analogous arguments can
1170
+ be used for the continuity of tr1, tr2 using their definitions in Section 2.2.1.
1171
+ Theorem A.2. Let K1 ⊂ Rp, K2 ⊂ Rq be compact sets. Then, the map Ftr defined in (2.3) is Fréchet
1172
+ differentiable in any non-zero covariance kernel C.
1173
+ Proof. The Fréchet differentiability of Ftr
1174
+ i = Htr ◦ Gtr, follows by the chain rule from the differentiability
1175
+ of the two maps
1176
+ Gtr : C((K1 × K2)2) → C(K2
1177
+ 1) × C(K2
1178
+ 2)
1179
+ and
1180
+ Htr : C(K2
1181
+ 1) × C(K2
1182
+ 2) → C((K1 × K2)2)
1183
+ defined (point-wise) as
1184
+
1185
+
1186
+
1187
+ Gtr
1188
+ 1 [T ](s, s′)
1189
+ Gtr
1190
+ 2 [T ](t, t′)
1191
+
1192
+
1193
+  =
1194
+
1195
+
1196
+
1197
+
1198
+
1199
+ K2 T (s, w, s′, w)dw
1200
+
1201
+ K1×K2 T (u, w, u, w)du dw
1202
+
1203
+ K1 T (u, t, u, t′)du
1204
+
1205
+
1206
+
1207
+
1208
+ Htr
1209
+
1210
+ 
1211
+
1212
+
1213
+
1214
+ F
1215
+ G
1216
+
1217
+
1218
+
1219
+
1220
+  (s, t, s′, t′) = F(s, s′)G(t, t′).
1221
+ 20
1222
+
1223
+ Using (the proof of) Theorem 3.4 in Dette et al. (2022), we claim that the Fréchet differential of Gtr in
1224
+ C, i.e., DCGtr[T ](s, t, s′, t′), can be point-wise expressed as
1225
+
1226
+
1227
+
1228
+
1229
+
1230
+
1231
+ K2 T (s, w, s′, w)dw
1232
+
1233
+ K1×K2 C(u, w, u, w)dudw −
1234
+
1235
+ K1×K2 T (u, w, u, w)dudw
1236
+
1237
+ K2 C(s, w, s′, w)dw
1238
+ ��
1239
+ K1×K2 C(u, w, u, w)dudw
1240
+ �2
1241
+
1242
+ K1 T (u, t, u, t′)du
1243
+
1244
+
1245
+
1246
+
1247
+
1248
+ Boundedness of the map DCGtr follows directly from the continuity of tr, tr1, tr2 (see Lemma A.1). Now,
1249
+ we verify that DCGtr is indeed the differential. Since the second component is linear and continuous in
1250
+ the sup-norm it must be its own differential. Hence it is enough to consider the first component. For this
1251
+ purpose, let H ∈ C((K1 × K2)2) such that ∥H∥ → 0. Notice that for H sufficiently small, all (partial)
1252
+ traces in the subsequent objects are well-defined. A simple calculation yields the representation
1253
+ Gtr
1254
+ 1 [C + H](s, t, s′, t′) − Gtr
1255
+ 1 [C](s, t, s′, t′) − DCGtr
1256
+ 1 [H](s, t, s′, t′)
1257
+ =
1258
+
1259
+ ��
1260
+ K2 H(s, w, s′, w)dw
1261
+ � ��
1262
+ K1×K2 H(u, w, u, w)du dw
1263
+
1264
+ ��
1265
+ K1×K2(C + H)(u, w, u, w)du dw
1266
+ � ��
1267
+ K1×K2 C(u, w, u, w)du dw
1268
+
1269
+ +
1270
+ ��
1271
+ K1×K2 H(u, w, u, w)du dw
1272
+ �2 �
1273
+ K2 C(s, w, s′, w)dw
1274
+ ��
1275
+ K1×K2(C + H)(u, w, u, w)du dw
1276
+ � ��
1277
+ K1×K2 C(u, w, u, w)du dw
1278
+ �2 .
1279
+ Arguing as in the proof of Lemma A.1 above one easily sees that both terms on the right are uniformly
1280
+ of order O
1281
+
1282
+ ∥H∥2�
1283
+ , which shows the desired property of Fréchet differentiability. Next we turn to the
1284
+ differentiability of the map Htr, where again (the proof of) Theorem 3.4 in Dette et al. (2022) suggests
1285
+ the following candidate for a differential
1286
+ D(L1,L2)Htr
1287
+
1288
+ 
1289
+
1290
+
1291
+
1292
+ F
1293
+ G
1294
+
1295
+
1296
+
1297
+
1298
+  (s, t, s′, t′) = L1(s, s′)G(t, t′) + F(s, s′)L2(t, t′)
1299
+ with (L1, L2)t := Gtr[C]. Proving that D(L1,L2)Htr is indeed the Fréchet differential follows by similar,
1300
+ but simpler calculations as in the proof of the differentiability of Hpr in Theorem A.4 (below) and is
1301
+ therefore omitted.
1302
+ A.2
1303
+ Differentiability of the partial product
1304
+ Recall the definition of the partial product kernels in (2.4) and the partial product approximation in
1305
+ (2.5).
1306
+ Lemma A.3. For any ψ ∈ C(K2
1307
+ 2), the partial product operators as defined in Section 2.2.2 are continuous.
1308
+ Proof. The proof is trivial for the linear operator Fpr
1309
+ 1 , which is evidently bounded. In order to show
1310
+ 21
1311
+
1312
+ continuity of Fpr
1313
+ 2 , let A, H ∈ C(K2
1314
+ 2) with ∥H∥ → 0. Then, by definition of its kernel we have
1315
+
1316
+ K2
1317
+ 1
1318
+ H(u, t, u′, t′)(A + H)pr
1319
+ 1 (u, u′)du du′ −
1320
+
1321
+ K2
1322
+ 1
1323
+ A(u, t, u′, t′) ((A + H)pr
1324
+ 1 (u, u′) − Apr
1325
+ 1 (u, u′)) du du′
1326
+ (A.1)
1327
+ =
1328
+
1329
+ K2
1330
+ 1
1331
+ (H(u, t, u′, t′)Hpr
1332
+ 1 (s, s′)(u, u′) + H(u, t, u′, t′)Apr
1333
+ 1 (u, u′) + A(u, t, u′, t′)Hpr
1334
+ 1 (u, u′)) du du′
1335
+ where we used linearity of Fpr
1336
+ 1
1337
+ in the second equality. The first integral is of order O(∥H∥2) where we
1338
+ have used the (Lipschitz) continuity of the linear map Fpr
1339
+ 1 . The second and third integral are evidently
1340
+ (bounded) linear maps in H corresponding to the derivative.
1341
+ Theorem A.4. Let K1 ⊂ Rp, K2 ⊂ Rq be compact sets and ψ ∈ C(K2
1342
+ 2) be chosen such that Cpr
1343
+ 1
1344
+ (defined
1345
+ in (2.4)) is not identically 0. Then, the map Fpr defined in (2.5) is Fréchet differentiable in C.
1346
+ Proof. As in the proof of Theorem A.2 above, we can again decompose Fpr into two simpler ones
1347
+ Gpr : C((K1 × K2)2) → C(K2
1348
+ 1) × C(K2
1349
+ 2)
1350
+ and
1351
+ Hpr : C(K2
1352
+ 1) × C(K2
1353
+ 2) → C((K1 × K2)2)
1354
+ point-wise defined as
1355
+ Gpr[T ](s, t, s′, t′) =
1356
+
1357
+
1358
+
1359
+
1360
+ K2
1361
+ 2 T (s, w, s′, w′)ψ(w, w′)dw dw′
1362
+
1363
+ K2
1364
+ 1 T (u, t, u′, t′)
1365
+ ��
1366
+ K2
1367
+ 2 T (u, w, u′, w′)ψ(w, w′)dw dw′�
1368
+ du du′
1369
+
1370
+
1371
+
1372
+ Hpr
1373
+
1374
+ 
1375
+
1376
+
1377
+
1378
+
1379
+ F
1380
+ G
1381
+
1382
+
1383
+
1384
+
1385
+
1386
+  (s, t, s′, t′) =
1387
+ F(s, s′)G(t, t′)
1388
+
1389
+ K2
1390
+ 1 (F(u, u′))2du du′ .
1391
+ The derivative in C of the first component of Gpr is by linearity and boundedness (w.r.t. the sup
1392
+ norm) the map itself. The second component is differentiable, which follows by the decomposition (A.1),
1393
+ where the last two integrals are linear maps of H (the derivative) and the third one is of order O(∥H∥2).
1394
+ Indeed defining the map (which in fact only depends actually on the variables (t, t′))
1395
+ DCGpr
1396
+ 2 [H](s, t, s′, t′) =
1397
+
1398
+ K2
1399
+ 1
1400
+ C(u, t, u′, t′)
1401
+ ��
1402
+ K2
1403
+ 2
1404
+ H(u, w, u′, w′)∆(w, w′)dw dw′
1405
+
1406
+ du du′
1407
+ +
1408
+
1409
+ K2
1410
+ 1
1411
+ H(u, t, u′, t′)
1412
+ ��
1413
+ K2
1414
+ 2
1415
+ C(u, w, u′, w′)∆(w, w′)dw dw′
1416
+
1417
+ du du′.
1418
+ and subtracting it from (Gpr
1419
+ 2 [C + H] − Gpr
1420
+ 2 [C])(s, t, s′, t′), we infer as in (A.1) that this difference is of the
1421
+ order O(∥H∥2). Next we calculate the derivative of Hpr for a generic pair (L1, L2)t, Li ∈ C(K2
1422
+ i ), i = 1, 2
1423
+ 22
1424
+
1425
+ with L1 ̸= 0. It is point-wise given by
1426
+ D(L1,L2)tHpr
1427
+
1428
+ 
1429
+
1430
+
1431
+
1432
+
1433
+ F
1434
+ G
1435
+
1436
+
1437
+
1438
+
1439
+
1440
+  (s, t, s′, t′) =F(s, s′)L2(t, t′) + L1(s, s′)G(t, t′)
1441
+
1442
+ K2
1443
+ 1(L1(u, u′))2du du′
1444
+
1445
+ 2
1446
+ ��
1447
+ K2
1448
+ 1 F(u, u′)L1(u, u′)du du′�
1449
+ L1(s, s′)L2(t, t′)
1450
+ ��
1451
+ K2
1452
+ 1 (L1(u, u′))2du du′
1453
+ �2
1454
+ Boundedness of the derivative follows directly from boundedness of the kernels F, G (as well as the bound-
1455
+ edness away from 0 of the denominator). Now consider Hi ∈ C(K2
1456
+ i ) with max(∥H1∥, ∥H2∥) → 0 differen-
1457
+ tiability of the map Hpr follows by decomposing the difference
1458
+
1459
+
1460
+
1461
+ Hpr
1462
+
1463
+ 
1464
+
1465
+
1466
+
1467
+
1468
+ L1 + H1
1469
+ L2 + H2
1470
+
1471
+
1472
+
1473
+
1474
+
1475
+  − Hpr
1476
+
1477
+ 
1478
+
1479
+
1480
+
1481
+
1482
+ L1
1483
+ L2
1484
+
1485
+
1486
+
1487
+
1488
+
1489
+  − D(L1,L2)tHpr
1490
+
1491
+ 
1492
+
1493
+
1494
+
1495
+
1496
+ H1
1497
+ H2
1498
+
1499
+
1500
+
1501
+
1502
+
1503
+ 
1504
+
1505
+
1506
+
1507
+  (s, t, s′, t′)
1508
+ =
1509
+
1510
+ H1(s, s′)L2(t, t′) + L1(s, s′)H2(t, t′) − 2L1(s, s′)L2(t, t′)
1511
+
1512
+ K2
1513
+ 1 L1(u, u′)H1(u, u′)du du′
1514
+
1515
+ K2
1516
+ 1 (L1(u, u′))2 du du′
1517
+
1518
+
1519
+ ×
1520
+
1521
+
1522
+ 1
1523
+
1524
+ K2
1525
+ 1 ((L1 + H1)(u, u′))2 du du′ −
1526
+ 1
1527
+
1528
+ K2
1529
+ 1 (L1(u, u′))2 du du′
1530
+
1531
+
1532
+ Evidently, the first factor is of order O(max{∥H1∥, ∥H2∥}). Furthermore, a small calculation reveals the
1533
+ same rate for the second one. This completes the proof of the differentiability for the maps Gpr and Hpr
1534
+ and the differentiability of the partial product approximation follows by the chain rule and the identity
1535
+ Fpr = Hpr ◦ Gpr.
1536
+ A.3
1537
+ Differentiability of the SPCA
1538
+ In order to make the following derivations easier to read, we define for a compact set K the space of
1539
+ continuous, symmetric kernels C(K2)Sym as
1540
+ C(K2)Sym := {A ∈ C(K2) : A(x, y) = A(y, x) ∀x, y ∈ K}.
1541
+ Any kernel A represents the corresponding Hilbert–Schmidt (integral) operator, which (according to the
1542
+ spectral theorem for normal operators acting on L2[0, 1]) can be decomposed as
1543
+ A(x, y) =
1544
+
1545
+ i∈N
1546
+ vA
1547
+ i (x)vA
1548
+ i (y)λA
1549
+ i ,
1550
+ (A.2)
1551
+ where {vA
1552
+ i }i∈N are the eigenfunctions and {λA
1553
+ i }i∈N the corresponding eigenvalues. Without loss of gen-
1554
+ erality, we assume in the following that |λA
1555
+ 1 | ≥ |λA
1556
+ 2 | ≥ |λA
1557
+ i | for any i ≥ 3. Notice that a priori, the
1558
+ identity (A.2) only holds true in an L2-sense, but it can be shown that it remains true in the space of
1559
+ 23
1560
+
1561
+ continuous functions w.r.t. the sup-norm by Mercer’s Theorem, see, for instance, Theorem 3.a.1 in König
1562
+ (1986). Moreover, it can be shown that the eigenfunctions allow the choice of a continuous representative
1563
+ (see Lemma C.1). Therefore, we will subsequently assume that vA
1564
+ i
1565
+ is this representative in C(K). Let
1566
+ us now assume that A0 ∈ C(K2)Sym is a kernel which satisfies |λA0
1567
+ 1 | > |λA0
1568
+ 2 |. This means that the first
1569
+ eigenvalue of A0 is unique, and the first eigenfunction (corresponding to λA0
1570
+ 1 ) as well. Since eigenfunctions
1571
+ are generally only determined up to sign, we suppose here that some choice of sign for vA0
1572
+ 1
1573
+ has been fixed.
1574
+ Then, it follows that there exists a sufficiently small δ = δ(A0) > 0, such that for any A ∈ C(K2)Sym with
1575
+ ∥A − A0∥ < δ it holds that |λA
1576
+ 1 | > |λA
1577
+ 2 | making the first eigenvalue of A unique. This also (up to a sign)
1578
+ identifies the first eigenfunction vA
1579
+ 1 of A and we may fix that choice of sign, which minimizes the distance
1580
+
1581
+ K(vA0
1582
+ 1 (t) − vA
1583
+ 1 (t))2dt (see Lemma C.3 for details). Now, the “eigen-maps”
1584
+ Λ :
1585
+
1586
+
1587
+
1588
+ Uδ(A0) → R,
1589
+ A �→ λA
1590
+ 1
1591
+ V :
1592
+
1593
+
1594
+
1595
+ Uδ(A0) → C(K),
1596
+ A �→ vA
1597
+ 1
1598
+ (A.3)
1599
+ are well-defined. Since the separable approximation is (essentially) a rank-1-approximation of an operator,
1600
+ the key step in proving differentiability of the SPCA-approximation is proving differentiability of the
1601
+ eigenfunction-map and eigenvalue-map. Since the eigen-maps are known to be differentiable in an L2-sense
1602
+ (again see the proof of Theorem 3.4 in Dette et al. (2022)) we only have to validate that the differentials
1603
+ are still the limit of the “differential quotients” (as in the above proofs). In the case of the eigenfunction-
1604
+ maps this requires a non-standard representation of the differential, to still guarantee that it maps into
1605
+ the space of continuous functions.
1606
+ Lemma A.5. Suppose that A0 ∈ C(K2)Sym satisfies |λA0
1607
+ 1 | > |λA0
1608
+ 2 |. Then for δ = δ(A0) sufficiently small,
1609
+ it holds that the eigen-maps (defined in (A.3)) are Fréchet-differentiable.
1610
+ Proof. Adapting the proof from Theorem 3.4 in Dette et al. (2022) is trivial in the case of the eigenvalue-
1611
+ map, where the differential is given by
1612
+ DA0Λ[T ] =
1613
+
1614
+ K2 T (x, y)vA0
1615
+ 1 (x)vA0
1616
+ 1 (y)dx dy.
1617
+ In contrast, establishing the result for the eigenfunction-map is more intricate. Therefore, it warrants a
1618
+ detailed discussion. This time we do not start with the differential, but find it easier to derive it in a
1619
+ step-by-step process. For this purpose, consider H ∈ C(K2)Sym with ∥H∥ → 0 (in particular, we may
1620
+ assume that A0 + H ∈ Uδ(A0)). We now investigate the decomposition
1621
+ vA0+H
1622
+ 1
1623
+ − vA0
1624
+ 1
1625
+ = (A0 + H)
1626
+ λA0+H
1627
+ 1
1628
+
1629
+ vA0+H
1630
+ 1
1631
+
1632
+ − A0
1633
+ λA0
1634
+ 1
1635
+
1636
+ vA0
1637
+ 1
1638
+
1639
+ =
1640
+
1641
+ 1
1642
+ λA0+H
1643
+ 1
1644
+
1645
+ 1
1646
+ λA0
1647
+ 1
1648
+
1649
+ (A0 + H)
1650
+
1651
+ vA0+H
1652
+ 1
1653
+
1654
+ + (A0 + H)
1655
+ λA0
1656
+ 1
1657
+
1658
+ vA0+H
1659
+ 1
1660
+ − vA0
1661
+ 1
1662
+
1663
+ + H
1664
+ λA0
1665
+ 1
1666
+
1667
+ vA0
1668
+ 1
1669
+
1670
+ =: T1 + T2 + T3
1671
+ Next, we will find the differential of each term separately.
1672
+ We start with the first term T1 and note
1673
+ that T1 = −(λA0+H
1674
+ 1
1675
+ − λA0
1676
+ 1 )vA0+H
1677
+ 1
1678
+ /λA0+H
1679
+ 1
1680
+ , since (A0 + H)
1681
+
1682
+ vA0+H
1683
+ 1
1684
+
1685
+ = λA0+H
1686
+ 1
1687
+ vA0+H
1688
+ 1
1689
+ . We claim that the
1690
+ 24
1691
+
1692
+ differential is given by H �→ −vA0
1693
+ 1 /λA0
1694
+ 1
1695
+ ·
1696
+
1697
+ K2 H(x, y)vA0
1698
+ 1 (x)vA0
1699
+ 1 (y)dx dy, which is obviously linear and
1700
+ continuous w.r.t. the sup-norm. Adding and subtracting cross-terms yields the following bound
1701
+ �����T1 + vA0
1702
+ 1
1703
+ λA0
1704
+ 1
1705
+
1706
+ K2 H(x, y)vA0
1707
+ 1 (x)vA0
1708
+ 1 (y)dx dy
1709
+ ����� ≤
1710
+
1711
+ K2 H(x, y)vA0
1712
+ 1 (x)vA0
1713
+ 1 (y)dx dy ∥vA0+H
1714
+ 1
1715
+ − vA0
1716
+ 1 ∥
1717
+ λA0
1718
+ 1
1719
+ + ∥vA0
1720
+ 1 ∥
1721
+ λA0
1722
+ 1
1723
+ ����
1724
+
1725
+ K2 H(x, y)vA0
1726
+ 1 (x)vA0
1727
+ 1 (y)dx dy − (λA0+H
1728
+ 1
1729
+ − λA0
1730
+ 1 )
1731
+ ����
1732
+ Both terms are of order O
1733
+
1734
+ ∥H∥2�
1735
+ . For the first one we observe that the integral is obviously of order
1736
+ O
1737
+
1738
+ ∥H∥2�
1739
+ and the bound of O
1740
+
1741
+ ∥H∥2�
1742
+ for the difference of eigenfunctions follows by Lemma C.2 part ii).
1743
+ The second term on the right is of order O
1744
+
1745
+ ∥H∥2�
1746
+ , due to the differentiability of the eigenvalue-map (see
1747
+ the beginning of this proof), as
1748
+ DA0Λ[H] =
1749
+
1750
+ K2 H(x, y)vA0
1751
+ 1 (x)vA0
1752
+ 1 (y)dx dy
1753
+ (for details we refer to Dette et al. (2022)).
1754
+ We continue by analyzing T2. Notice that by the (second) inequality of Lemma 2 in Kokoszka and Reimherr
1755
+ (2013), one has
1756
+ ∥H[vA0+H
1757
+ 1
1758
+ − vA0
1759
+ 1 ]/λA0
1760
+ 1 ∥ ≤ ∥H∥
1761
+ |λA0
1762
+ 1 |
1763
+ ��
1764
+ K
1765
+
1766
+ vA0+H
1767
+ 1
1768
+ − vA0
1769
+ 1
1770
+ �2
1771
+ (x)dx
1772
+ �1/2
1773
+ < κ∥H∥2.
1774
+ This implies that T2 = A0[vA0+H
1775
+ 1
1776
+ − vA0
1777
+ 1 ]/λA0
1778
+ 1
1779
+ + O(∥H∥2). We can rewrite the non-negligible term as
1780
+ A0
1781
+ λA0
1782
+ 1
1783
+
1784
+ vA0+H
1785
+ 1
1786
+ − vA0
1787
+ 1
1788
+
1789
+ = A0
1790
+ λA0
1791
+ 1
1792
+
1793
+ �
1794
+ i≥1
1795
+ ��
1796
+ K
1797
+
1798
+ vA0+H
1799
+ 1
1800
+ (x) − vA0
1801
+ 1 (x)
1802
+
1803
+ vA0
1804
+ i
1805
+ (x)dx
1806
+
1807
+ vA0
1808
+ i
1809
+
1810
+
1811
+ (A.4)
1812
+ Notice that the RHS is nothing else than the L2-basis expansion of vA0+H
1813
+ 1
1814
+ −vA0
1815
+ 1
1816
+ w.r.t. the ONB {vA0
1817
+ i }i∈N.
1818
+ This relation definitely holds w.r.t. the L2-norm, since A0 is an integral operator, but it needs not hold
1819
+ w.r.t. the sup norm. However, we claim it does. First, note that both side are well-defined continuous
1820
+ functions. Moreover, notice that
1821
+ sup
1822
+ x
1823
+ ������
1824
+
1825
+ K
1826
+ A0(x, y)
1827
+
1828
+ vA0+H
1829
+ 1
1830
+ (y) − vA0
1831
+ 1 (y) −
1832
+
1833
+ i≥1
1834
+ ��
1835
+ K
1836
+
1837
+ vA0+H
1838
+ 1
1839
+ (u) − vA0
1840
+ 1 (u)
1841
+
1842
+ vA0
1843
+ i (u)du
1844
+
1845
+ vA0
1846
+ i
1847
+ (y)
1848
+
1849
+  dy
1850
+ ������
1851
+ ≤∥A0∥
1852
+
1853
+ K
1854
+ ������
1855
+ vA0+H
1856
+ 1
1857
+ (y) − vA0
1858
+ 1 (y) −
1859
+
1860
+ i≥1
1861
+ ��
1862
+ K
1863
+
1864
+ vA0+H
1865
+ 1
1866
+ (u) − vA0
1867
+ 1 (u)
1868
+
1869
+ vA0
1870
+ i
1871
+ (u)du
1872
+
1873
+ vA0
1874
+ i (y)dy
1875
+ ������
1876
+ = 0
1877
+ where a0 is the continuous kernel of A0. Using the first identity and the second identity of Lemma 1 in
1878
+ Kokoszka and Reimherr (2013) on
1879
+ ��
1880
+ K
1881
+
1882
+ vA0+H
1883
+ 1
1884
+ (x) − vA0
1885
+ 1 (x)
1886
+
1887
+ vA0
1888
+ 1 (x)dx
1889
+
1890
+ vA0
1891
+ 1
1892
+ and
1893
+
1894
+ i≥2
1895
+ ��
1896
+ K
1897
+
1898
+ vA0+H
1899
+ 1
1900
+ (x) − vA0
1901
+ 1 (x)
1902
+
1903
+ vA0
1904
+ i (x)dx
1905
+
1906
+ vA0
1907
+ i
1908
+ respectively, one sees that the RHS of (A.4) equals
1909
+ − A0
1910
+ 2λA0
1911
+ 1
1912
+
1913
+ vA0
1914
+ 1
1915
+ � �
1916
+ K
1917
+ (vA0+H
1918
+ 1
1919
+ (x) − vA0
1920
+ 1 (x))2dx + A0
1921
+ λA0
1922
+ 1
1923
+ ��
1924
+ i>1
1925
+ vA0
1926
+ i
1927
+ λA0+H
1928
+ 1
1929
+ − λA0
1930
+ i
1931
+
1932
+ K2 H(x, y)vA0+H
1933
+ 1
1934
+ (x)vA0
1935
+ i
1936
+ (y)dx dy
1937
+
1938
+ 25
1939
+
1940
+ where equality holds w.r.t. sup-norm by the same argument as above. From the proof of Lemma 2 in
1941
+ Kokoszka and Reimherr (2013), it follows easily that
1942
+
1943
+ K(vA0+H
1944
+ 1
1945
+ (x) − vA0
1946
+ 1 (x))2dx = O(∥H∥2) so that the first term is negligible. Using a similar reasoning
1947
+ as before (together with the bounds of Lemma C.2), we can then show that
1948
+ A0
1949
+ λA0
1950
+ 1
1951
+ ��
1952
+ i>1
1953
+ vA0
1954
+ i
1955
+ λA0+H
1956
+ 1
1957
+ − λA0
1958
+ i
1959
+
1960
+ K2 H(x, y)vA0+H
1961
+ 1
1962
+ (x)vA0
1963
+ i
1964
+ (y)dx dy
1965
+
1966
+ = A0
1967
+ λA0
1968
+ 1
1969
+ ��
1970
+ i>1
1971
+ vA0
1972
+ i
1973
+ λA0
1974
+ 1
1975
+ − λA0
1976
+ i
1977
+
1978
+ K2 H(x, y)vA0
1979
+ 1 (x)vA0
1980
+ i
1981
+ (y)dx dy
1982
+
1983
+ + O(∥H∥2),
1984
+ where we omit the precise calculations to avoid redundancy. The remaining series in the second line is
1985
+ linear in H. A simple calculation shows that it is also bounded. Finally, we notice that the term T3 already
1986
+ is a linear, bounded map in H. As a consequence, we can rewrite the decomposition
1987
+ vA0+H
1988
+ 1
1989
+ − vA0
1990
+ 1
1991
+ = T1 + T2 + T3 = −vA0
1992
+ 1 /λA0
1993
+ 1
1994
+
1995
+ K2 H(x, y)vA0
1996
+ 1 (x)vA0
1997
+ 1 (y)dx dy
1998
+ + A0
1999
+ λA0
2000
+ 1
2001
+ ��
2002
+ i>1
2003
+ vA0
2004
+ i
2005
+ λA0
2006
+ 1
2007
+ − λA0
2008
+ i
2009
+
2010
+ K2 H(x, y)vA0
2011
+ 1 (x)vA0
2012
+ i
2013
+ (y)dx dy
2014
+
2015
+ + H
2016
+ λA0
2017
+ 1
2018
+
2019
+ vA0
2020
+ 1
2021
+
2022
+ + O(∥H∥2).
2023
+ The non-vanishing part is the Fréchet-differential. Notice that in L2 this differential can be further sim-
2024
+ plified to the more common expression ���
2025
+ i>1
2026
+ vA0
2027
+ i
2028
+ λA0
2029
+ 1
2030
+ −λA0
2031
+ i
2032
+
2033
+ K2 H(x, y)vA0
2034
+ 1 (x)vA0
2035
+ i
2036
+ (y)dx dy (where it has been
2037
+ used that A0[vA0
2038
+ i
2039
+ ] = λA0
2040
+ i vA0
2041
+ i
2042
+ in an L2-sense), for instances, see Kokoszka and Reimherr (2013). However,
2043
+ this expression is not necessarily an element of the continuous functions anymore, since even the conti-
2044
+ nuity of the eigenfunctions may not hold for all i ∈ N. These considerations conclude our proof of the
2045
+ differentiability of the eigen-maps.
2046
+ Theorem A.6. Let K1 ⊂ Rp, K2 ⊂ Rq be compact sets and C ∈ C((K1 × K2)2) be a separable covariance
2047
+ operator. Then the map FPCA as defined in (2.8) is Fréchet differentiable in C w.r.t. the sup-norm.
2048
+ Proof. Having established differentiability of the first eigenvalue and eigenfunction of a symmetric operator,
2049
+ the proof now follows step by step as that of Theorem 3.4 of Dette et al. (2022).
2050
+ B
2051
+ Proof of Theorem 3.6
2052
+ We show weak convergence in the space of continuous functions, relying on the theory of weak conver-
2053
+ gence for spaces of bounded functions as described in van der Vaart and Wellner (1996). For this purpose
2054
+ two conditions need to be verified, tightness and convergence of the marginals, see their Theorem 1.5.4.
2055
+ First, we demonstrate weak convergence of the marginals of the covariance operator, using the Cramér–
2056
+ Wold device (see Theorem 29.4 in Billingsley (2012)). We use classical blocking technique (to handle the
2057
+ bootstrapped part) together with moment inequalities from Yoshihara (1978) for strongly mixing random
2058
+ variables. Second, we prove tightness, by establishing asymptotic equicontinuity (see, for instance, The-
2059
+ orem 1.5.7 from van der Vaart and Wellner (1996)). The latter is done in turn by controlling entropy
2060
+ bounds. We define the packing numbers and entropy of sets.
2061
+ 26
2062
+
2063
+ For the sake of brevity, we introduce the following point-wise notations for the objects of interest.
2064
+ So for (s, t), (s′, t′) ∈ K1 × K2 we set
2065
+ ˜Xi(s, t) := Xi(s, t) − EXi(s, t) ;
2066
+ ˜CN(s, t, s′, t′) := 1
2067
+ N
2068
+ N
2069
+
2070
+ i=1
2071
+ ˜Xi(s, t) ˜Xi(s′, t′),
2072
+ and
2073
+ ˜B(k)
2074
+ N (s, t, s′, t′) := 1
2075
+ N
2076
+ N
2077
+
2078
+ i=1
2079
+ ( ˜Xi(s, t) ˜Xi(s′, t′) − C(s, t, s′, t′)) wi,N.
2080
+ The second equality follows by change of summation, where we set Z(k)
2081
+ j
2082
+ = 0 (deterministic) for any j ≤ 0.
2083
+ In the last equality, we have defined the (random) weight wi,N in the obvious way.
2084
+ In order to enhance the clarity of our proof we make two simplifications: First, instead of proving con-
2085
+ vergence of the vector
2086
+
2087
+ N( ˆCN − C, B(1)
2088
+ N , · · · , B(r)
2089
+ N ) we confine ourselves to convergence of their centered
2090
+ versions, i.e., of
2091
+
2092
+ N( ˜CN − C, ˜B(1)
2093
+ N , · · · , ˜B(r)
2094
+ N ). Proving that the difference of these vectors is of order oP(1)
2095
+ follows by similar, but simpler techniques as used in the below proof and is therefore omitted. (It is a
2096
+ consequence of the fact that ˜Xi, i ≥ 1 also satisfies a CLT). Second, w.l.o.g. we set r = 1, since adjusting
2097
+ for r > 1 is straightforward and a notational burden.
2098
+ Step 1:
2099
+ We begin, proving weak convergence of the finite dimensional distributions, by means of the
2100
+ Cramér–Wold device (see, for instance, Theorem 29.4 in Billingsley (2012)). For this purpose, let p ∈ N be
2101
+ fixed but arbitrary and consider arbitrary tuples (sm, tm, s′
2102
+ m, t′
2103
+ m) ∈ (K1 × K2)2 and numbers am, a′
2104
+ m ∈ R,
2105
+ for 1 ≤ j ≤ p. Recall that to apply the Cramér–Wold device, we have to establish weak convergence of
2106
+ the real-valued, random variables
2107
+ CWN :=
2108
+
2109
+ N
2110
+ p
2111
+
2112
+ m=1
2113
+
2114
+ am
2115
+
2116
+ ˜CN(sm, tm, s′
2117
+ m, t′
2118
+ m) − C(sm, tm, s′
2119
+ m, t′
2120
+ m)
2121
+
2122
+ + a′
2123
+ m ˜B(1)
2124
+ N (sm, tm, s′
2125
+ m, t′
2126
+ m)
2127
+
2128
+ to
2129
+ p
2130
+
2131
+ m=1
2132
+
2133
+ amG(sm, tm, s′
2134
+ m, t′
2135
+ m) + a′
2136
+ mG(1)(sm, tm, s′
2137
+ m, t′
2138
+ m)
2139
+
2140
+ ,
2141
+ where G, G(1) are two independent identically distributed Gaussian processes. We proceed by a blocking
2142
+ technique. It follows, by definition, that we can rewrite CWN as
2143
+ CWN =
2144
+ 1
2145
+
2146
+ N
2147
+ N
2148
+
2149
+ i=1
2150
+ p
2151
+
2152
+ m=1
2153
+
2154
+ ˜Xi(sm, tm) ˜Xi(s′
2155
+ m, t′
2156
+ m) − C(sm, tm, s′
2157
+ m, t′
2158
+ m)
2159
+
2160
+ (am + a′
2161
+ mwi,N)
2162
+ =
2163
+
2164
+ bN
2165
+ N
2166
+ ⌊N/bN⌋
2167
+
2168
+ j=1
2169
+ jbN
2170
+
2171
+ i=(j−1)bN +1
2172
+ p
2173
+
2174
+ m=1
2175
+
2176
+ ˜Xi(sm, tm) ˜Xi(s′
2177
+ m, t′
2178
+ m) − C(sm, tm, s′
2179
+ m, t′
2180
+ m)
2181
+ � (am + a′
2182
+ mwi,N)
2183
+ √bN
2184
+ + Rem1 .
2185
+ Here (bN)N∈N is a sequence of natural numbers, such that lN/bN → 0 and bN/
2186
+
2187
+ N → 0 and Rem1 a
2188
+ remainder capturing all “overhanging terms” with indices between bN⌊N/bN⌋ and N. Using the triangle
2189
+ inequality (and counting terms), it is straightforward to see that E| Rem1 | = O(bN/
2190
+
2191
+ N) = o(1) and hence
2192
+ 27
2193
+
2194
+ Rem1 = oP(1). For ease of reference, we now define the random variables
2195
+ Yj :=
2196
+ jbN
2197
+
2198
+ i=(j−1)bN +1
2199
+ p
2200
+
2201
+ m=1
2202
+
2203
+ ˜Xi(sm, tm) ˜Xi(s′
2204
+ m, t′
2205
+ m) − C(sm, tm, s′
2206
+ m, t′
2207
+ m)
2208
+ � (am + a′
2209
+ mwi,N)
2210
+ √bN
2211
+ (B.1)
2212
+ =
2213
+ jbN
2214
+
2215
+ i=(j−1)bN +1
2216
+ p
2217
+
2218
+ m=1
2219
+ ˘Yi,m
2220
+ (am + a′
2221
+ mwi,N)
2222
+ √bN
2223
+ ,
2224
+ where ˘Yi,m is defined in the obvious way.
2225
+ This allows us to write CWN =
2226
+
2227
+ bN
2228
+ N
2229
+
2230
+ j Yj + oP(1).
2231
+ In
2232
+ the following, we demonstrate weak convergence of the (non-negligible) sum, by virtue of the central
2233
+ limit theorem of Wooldridge–White (Theorem 5.20 in White (2001)). Therefore, we have to check three
2234
+ conditions: Sufficiently fast decay of the mixing coefficients of (Yj)j=1,··· ,⌊N/bN⌋, uniform boundedness of
2235
+ fourth moments and existence of the asymptotic variance.
2236
+ Mixing: The variables (Yj)j=1,··· ,⌊N/bN⌋ form a triangular array of α-mixing random variables, with
2237
+ mixing coefficients satisfying (for all N ≥ N0 and some sufficiently large N0 ∈ N) for |j − j′| ≥ 2
2238
+ α(Yj, Yj′) ≤ κ ((|j − j′| − 1) (bN − lN + 2))−a .
2239
+ (B.2)
2240
+ Here we have used Assumption 3.2 iv) together with the definition of the random variables Yj, Yj′.
2241
+ More specifically, we have used that Yj only depends on the functions ˜X(j−1)bN +1, · · · , ˜XjbN and on
2242
+ w(j−1)bN +1,N, · · · , wjbN ,N. In particular, the mixing coefficients for |j − j′| ≥ 2 converge (uniformly) to 0
2243
+ and hence the decay condition in the theorem of Wooldridge–White is trivially satisfied.
2244
+ Bounded fourth moments: We now want to show that E[Y 4
2245
+ j ] ≤ κ < ∞ uniformly in j and begin with
2246
+ the following calculation
2247
+ E[Y 4
2248
+ j ] ≤κ
2249
+ p
2250
+
2251
+ m=1
2252
+ E
2253
+
2254
+ 
2255
+ ������
2256
+ jbN
2257
+
2258
+ i=(j−1)bN +1
2259
+ ˘Yi,m
2260
+ (am + a′
2261
+ mwi,N)
2262
+ √bN
2263
+ ������
2264
+ 4
2265
+ 
2266
+ (B.3)
2267
+
2268
+ p
2269
+
2270
+ m=1
2271
+ E
2272
+
2273
+ E
2274
+
2275
+ 
2276
+ ������
2277
+ jbN
2278
+
2279
+ i=(j−1)bN +1
2280
+ ˘Yi,m
2281
+ (am + a′
2282
+ mwi,N)
2283
+ √bN
2284
+ ������
2285
+ 4 ����w1,N, . . . , wN,N
2286
+
2287
+ 
2288
+
2289
+ 
2290
+ ≤κ
2291
+ p
2292
+
2293
+ m=1
2294
+ E
2295
+
2296
+ 
2297
+
2298
+
2299
+ jbN
2300
+
2301
+ i=(j−1)bN +1
2302
+ �(am + a′
2303
+ mwi,N)
2304
+ √bN
2305
+ �2
2306
+
2307
+
2308
+ 4
2309
+  ≤ κ.
2310
+ In the first inequality the constant κ only depends on p. In the first equality, we condition on the wi,N,
2311
+ 1 ≤ i ≤ N (using the tower property). Hence, we can apply Theorem 3 from Yoshihara (1978), to get
2312
+ the second inequality. Notice that we assume ˘Yi,m to have a finite γ/2-moment, which holds since by iii)
2313
+ of Assumptions 3.2 Xi have finite γ-moments. In the above cited theorem, we have made the parameter
2314
+ choices m = 4 and δ = γ/2 − 4 and its summability condition (ii) is met since a > 2γ/(γ − 8) according
2315
+ to iv) of our Assumptions 3.2. The constant κ in this inequality only depends on the summability of the
2316
+ mixing coefficients (see the proof of Theorem 3 of Yoshihara (1978) for more details) and moments (of ˘Yi),
2317
+ but not on anything else. For the third inequality, we notice that (am + a′
2318
+ mwi,N)2 has bounded moments
2319
+ of any order (wi,N is normal with variance 1) and hence by counting terms the last inequality follows, with
2320
+ 28
2321
+
2322
+ κ now also depending on am, a′
2323
+ m, 1 ≤ m ≤ p.
2324
+ Convergence of the variance: Next, we have to prove the long-run variance exists. In order to
2325
+ achieve this, we decompose
2326
+ E
2327
+
2328
+ 
2329
+
2330
+
2331
+
2332
+ bN
2333
+ N
2334
+
2335
+ j
2336
+ Yj
2337
+
2338
+
2339
+ 2
2340
+  = bN
2341
+ N
2342
+ ⌊N/bN⌋
2343
+
2344
+ j=1
2345
+ EY 2
2346
+ j + bN
2347
+ N
2348
+
2349
+ |j−j′|=1
2350
+ |EYjYj′| + 2
2351
+
2352
+ h≥2
2353
+ sup
2354
+ j
2355
+ |EYjYj+h|.
2356
+ (B.4)
2357
+ Using the mixing condition (B.2) we see that the last sum can be bounded (for sufficiently large N) by
2358
+ κb−a(γ−4)/γ
2359
+ N
2360
+ sup
2361
+ j
2362
+ (E|Yj|γ/2)4/γ �
2363
+ h≥2
2364
+ h−a(γ−4)/γ = o(1).
2365
+ Here we have used a standard covariance inequality for α-mixing (see Lemma 3.11 in Dehling et al. (2002))
2366
+ to bound |EYjYj+h| and for the small o-rate, that the sum on the right converges for a > γ/(γ − 4) (see
2367
+ Assumption 3.2 iv)). Similarly, we can upper bound the other sum of covariances by
2368
+ bN
2369
+ N
2370
+
2371
+ |j−j′|=1
2372
+ |EYjYj′| ≤ κ sup
2373
+ j
2374
+ |EYjYj+1|.
2375
+ We further bound the covariance |EYjYj+1| (and show that it converges to 0 uniformly in j). To this end,
2376
+ let (sN)N∈N denote an increasing sequence of natural numbers with lN/sN → 0 and sN/bN → 0. Recalling
2377
+ (B.1) we can now split up
2378
+ Yj =
2379
+ (j+1)bN −sN
2380
+
2381
+ i=jbN +1
2382
+ p
2383
+
2384
+ m=1
2385
+ ˘Yi,m
2386
+ (am + a′
2387
+ mwi,N)
2388
+ √bN
2389
+ +
2390
+ (j+1)bN
2391
+
2392
+ i=(j+1)bN −sN+1
2393
+ p
2394
+
2395
+ m=1
2396
+ ˘Yi,m
2397
+ (am + a′
2398
+ mwi,N)
2399
+ √bN
2400
+ =: Yj,1 + Yj,2,
2401
+ Yj+1 =
2402
+ (j+2)bN −sN
2403
+
2404
+ i=(j+1)bN +1
2405
+ p
2406
+
2407
+ m=1
2408
+ ˘Yi,m
2409
+ (am + a′
2410
+ mwi,N)
2411
+ √bN
2412
+ +
2413
+ (j+2)bN
2414
+
2415
+ i=(j+2)bN −sN+1
2416
+ p
2417
+
2418
+ m=1
2419
+ ˘Yi,m
2420
+ (am + a′
2421
+ mwi,N)
2422
+ √bN
2423
+ =: Yj+1,1 + Yj+1,2.
2424
+ Here the variables Yj,1, Yj,2, Yj+1,1, Yj+1,2 are defined in the obvious way. Using the same techniques as
2425
+ in (B.3), it follows that E[(Yj,1)4], E[(Yj+1,1)4] < ∞ and (counting terms) E[(Yj,2)4], E[(Yj+1,2)4] = o(1).
2426
+ The Cauchy–Schwarz inequality thus implies E[Yj,1Yj+1,2], E[Yj,2Yj+1,2], E[Yj,2Yj+1,1] = o(1). Moreover,
2427
+ using the covariance inequality for α-mixing E[Yj,1Yj+1,2] ≤ {E[(Yj,1)4]E[(Yj+1,1)4]}1/2α(Yj,1, Yj+1,1)1/2.
2428
+ Now α(Yj,1, Yj+1,1) ≤ κ(sN − lN)−a = o(1), where we have used Assumption 3.2 iv) together with the
2429
+ definition of the random variables Yj,1, Yj+1,1. Recall therefore, that Yj,1 only depends on the functions
2430
+ ˜XjbN +1, . . . , ˜X(j+1)bN −sN and on the weights wjbN +1,N, . . . , w(j+1)bN −sN ,N. These considerations imply
2431
+ that the second and third term, on the right of (B.4), i.e., the mixed terms, are of order o(1) and hence the
2432
+ variance is equal to bN
2433
+ N
2434
+ �⌊N/bN⌋
2435
+ j=1
2436
+ EY 2
2437
+ j . Finally, we have to show that this variance convergences. Therefore,
2438
+ let us consider, for 1 < j ≤ ⌊N/bN⌋, EY 2
2439
+ j
2440
+ =E
2441
+
2442
+ E
2443
+
2444
+ 
2445
+
2446
+
2447
+ p
2448
+
2449
+ m=1
2450
+ (j+1)bN
2451
+
2452
+ i=jbN +1
2453
+ ˘Yi,m
2454
+ (am + a′
2455
+ mwi,N)
2456
+ √bN
2457
+
2458
+
2459
+ 2 ���w1,N . . . , wN,N
2460
+
2461
+ 
2462
+
2463
+ 
2464
+ (B.5)
2465
+ =
2466
+ p
2467
+
2468
+ m,l=1
2469
+ 1
2470
+ bN
2471
+ (j+1)bN
2472
+
2473
+ i,k=jbN +1
2474
+ E[ ˘Yi,m ˘Yi,l] E[(am + a′
2475
+ mwi,N)(al + a′
2476
+ lwk,N)]
2477
+ 29
2478
+
2479
+ where we used independence of ˘Yi,m and wi,N, 1 ≤ i ≤ N. Due to our stationarity Assumption 3.2, we
2480
+ have E[ ˘Yi,m ˘Yk,l] = τ m,l
2481
+ Y
2482
+ (|i − k|) for a function τm,l
2483
+ Y
2484
+ : N → R. Moreover, by construction the covariance of
2485
+ wi,N and wk,N also only depends on |i − k| and N. Hence, we can consistently define
2486
+ τ m,l
2487
+ w,N(|i − k|) := E[(am + a′
2488
+ mwi,N)(al + a′
2489
+ lwk,N)] = amal + a′
2490
+ ma′
2491
+ lE[wi,Nwk,N]
2492
+ which converges as N → ∞ and E[wi,Nwk,N] → 1 (this follows by definition of the weights; see the very
2493
+ beginning of this proof). We can hence rewrite (B.5) as
2494
+ p
2495
+
2496
+ m,l=1
2497
+
2498
+ |h|<bN
2499
+ τ m,l
2500
+ Y
2501
+ (|h|)τ m,l
2502
+ w,N(|h|)(1 − |h|/bN).
2503
+ Notice that this object does not depend on j and converges to the long-run variance �p
2504
+ m,l=1
2505
+
2506
+ h∈Z τY (|h|)m,l.
2507
+ This latter convergence can be established directly by the dominated convergence theorem. Indeed, first
2508
+ observe that |τm,l
2509
+ w,N(|h|)| ≤ κ, for (1 − |h|/bN) ≤ 1. Secondly, the terms τ m,l
2510
+ Y
2511
+ (|h|) are summable for any
2512
+ m, l, which again follows by the covariance inequality for α-mixing random variables. Let |i− j| = |h| ≥ 1,
2513
+ then
2514
+ τ m,l
2515
+ Y
2516
+ (|h|) = E[ ˘Yi,m ˘Yk,l] ≤ κ{E[| ˘Yi,m|γ/2]}2/γ{E[| ˘Yk,l|γ/2]}2/γ(|h| + 1)−a(γ−4)/γ,
2517
+ which is summable since a > γ/(γ − 4) and due to uniform boundedness of the moments, see iii) of our
2518
+ Assumptions 3.2. It follows by straightforward modifications that also EY 2
2519
+ 1 converges to the same vari-
2520
+ ance. As a consequence of the above considerations, the variance in (B.4) converges and we can apply the
2521
+ central limit theorem of Wooldridge–White (Theorem 5.20 in White (2001)), which entails convergence of
2522
+ the marginal distributions.
2523
+ It remains to show that
2524
+
2525
+ N �N
2526
+ p=1 am( ˜CN − C)(sm, tm, s′
2527
+ m, t′
2528
+ m) and
2529
+
2530
+ N �N
2531
+ p=1 a′
2532
+ m ˜B(1)
2533
+ N (sm, tm, s′
2534
+ m, t′
2535
+ m) are
2536
+ asymptotically independent and have the same (asymptotic) variance. The asymptotic independence fol-
2537
+ lows readily from the uncorraletedness of the sequences ( ˜Xi)i∈Z and the weights together with the Gaussian
2538
+ limit. As for the equivalence of their variance, this follows by a quick calculation using similar techniques
2539
+ as in the first part of our proof.
2540
+ Before proceeding to the proof of tightness by asymptotic equicontinuity we state the definition of
2541
+ packing numbers for the sake of completeness.
2542
+ Definition B.1. Let (X, d) be a metric space and B(x, r) a ball of radius r > 0 centered around x ∈ X.
2543
+ Then for ε > 0, we define the ε-packing number D(ε, d) as
2544
+ sup
2545
+
2546
+ n ∈ N |
2547
+ n�
2548
+ i=1
2549
+ B(xi, ε) ⊃ X where d(xi, xj) > ε, xi ∈ X, 1 ≤ i ≤ n
2550
+
2551
+ .
2552
+ Note that, clearly, the packing number becomes bigger for smaller ε > 0 and remains finite for any totally
2553
+ bounded sets.
2554
+ In the subsequent part of our proof, for K ⊂ Rp we set ρK(x, y) := 1 ∧ maxp
2555
+ i=1 |xi − yi|.
2556
+ Step 2:
2557
+ We show that the process
2558
+
2559
+ N( ˜CN − C, ˜B(1)
2560
+ N ) is asymptotically uniformly ˜ρ-equicontinuous in
2561
+ probability, where
2562
+ ˜ρ((s, t, u, v), (s′, t′, u′, v′)) := max{ρK1×K2((s, t), (s′, t′)), ρK1×K2((u, v), (u′, v′))}
2563
+ 30
2564
+
2565
+ is our metric on (K1 × K2)2. Moreover, recall that by Theorem 1.5.7 in van der Vaart and Wellner (1996)
2566
+ asymptotic equicontinuity of the process is equivalent to tightness. For ζ > 0, define the set of pairs
2567
+ Aζ := {((s, t, u, v), (s′, t′, u′, v′)) ∈ (K1 × K2)4 | ˜ρ((s, t, u, v), (s′, t′, u′, v′)) < ζ}.
2568
+ We will now bound, for ǫ > 0,
2569
+ lim sup
2570
+ N→∞
2571
+ P
2572
+
2573
+ sup
2574
+ (x,x′)∈Aζ
2575
+ ���
2576
+
2577
+ N( ˜CN − C, ˜B(1)
2578
+ N )(x) −
2579
+
2580
+ N( ˜CN − C, ˜B(1)
2581
+ N )(x′)
2582
+ ��� > ε
2583
+
2584
+ ≤ lim sup
2585
+ N→∞
2586
+ E
2587
+
2588
+ sup
2589
+ (x,x′)∈Aζ
2590
+ ���
2591
+
2592
+ N( ˜CN − C, ˜B(1)
2593
+ N )(x) −
2594
+
2595
+ N( ˜CN − C, ˜B(1)
2596
+ N )(x′)
2597
+ ���
2598
+ �J
2599
+ /εJ.
2600
+ (B.6)
2601
+ Using Theorem 2.2.4. in van der Vaart and Wellner (1996) it is enough to bound the J-th moment of the
2602
+ difference in two locations. More precisely, for a J to be specified below, we upperbound
2603
+ E
2604
+ ���
2605
+
2606
+ N( ˜CN − C)(s, t, u, v) −
2607
+
2608
+ N( ˜CN − C)(s′, t′, u′, v′)
2609
+ ���
2610
+ J
2611
+ (B.7)
2612
+ and
2613
+ E
2614
+ ���
2615
+
2616
+ N ˜B(1)
2617
+ N (s, t, u, v) −
2618
+
2619
+ N ˜B(1)
2620
+ N (s′, t′, u′, v′)
2621
+ ���
2622
+ J
2623
+ .
2624
+ (B.8)
2625
+ Applying Theorem 3 in Yoshihara (1978) on the α-mixing random variables:
2626
+ ˜X1(s, t) ˜X1(u, v) − E
2627
+
2628
+ ˜X1(s, t) ˜X1(u, v)
2629
+
2630
+ − ˜X1(s′, t′) ˜X1(u′, v′) + E
2631
+
2632
+ ˜X1(s′, t′) ˜
2633
+ X1(u′, v′)
2634
+
2635
+ with weights ai = 1/
2636
+
2637
+ N and (arbitrary, but small) δ > 0 we see (B.7) is less than
2638
+ κE
2639
+ ���� ˜X1(s, t) ˜X1(u, v) − E
2640
+
2641
+ ˜X1(s, t) ˜X1(u, v)
2642
+
2643
+ − ˜X1(s′, t′) ˜X1(u′, v′) + E
2644
+
2645
+ ˜X1(s′, t′) ˜X1(u′, v′)
2646
+ ����
2647
+ �J
2648
+ (B.9)
2649
+ whenever �
2650
+ i≥1(i + 1)J/2+1α(i)δ/(J+δ) < ∞.
2651
+ The latter term will be bound using continuity properties of our random variables as assumed in
2652
+ Assumption 3.2(ii). Indeed, taking the expectation of relation 3.3, note we have that
2653
+ | ˜Xi(s, t) − ˜Xi(s′, t′)| ≤ (M + EM)ρK1×K2((s, t), (s′, t′))β
2654
+ so the centered random variables are Hölder continuous with as new random constant ˜
2655
+ M := M + EM. A
2656
+ quick calculation then shows that
2657
+ ��� ˜X1(s, t) ˜X1(u, v) − ˜X1(s′, t′) ˜X1(u′, v′)
2658
+ ��� ≤ 2∥ ˜X1∥ ˜
2659
+ M ˜ρβ((s, t, u, v), (s′, t′, u′, v′)),
2660
+ and similarly as above
2661
+ ���E
2662
+
2663
+ ˜X1(s, t) ˜
2664
+ X1(u, v)
2665
+
2666
+ − E
2667
+
2668
+ ˜X1(s, t) ˜X1(u, v)
2669
+ ���� ≤ 2E| ˜
2670
+ M|˜ρβ((s, t, u, v), (s′, t′, u′, v′)).
2671
+ Using the two above bounds, we see that (B.9) can be upperbounded by
2672
+ κE
2673
+
2674
+ ˜
2675
+ M J ∥X1∥J�
2676
+ ˜ρJβ((s, t, u, v), (s′, t′, u′, v′)),
2677
+ where κ may depend on β, J but not on N.
2678
+ 31
2679
+
2680
+ To bound (B.8) we first condition on the weights w(1)
2681
+ i,N, 1 ≤ i ≤ N. Then the argument runs along the
2682
+ same lines as the one for bounding (B.7), namely a straightforward application of Theorem 3 in Yoshihara
2683
+ (1978). This gives the bound
2684
+ κE
2685
+
2686
+
2687
+
2688
+
2689
+
2690
+
2691
+
2692
+
2693
+
2694
+
2695
+ N
2696
+
2697
+ i=1
2698
+
2699
+ w(1)
2700
+ i,N
2701
+ �2
2702
+ N
2703
+
2704
+
2705
+
2706
+ J
2707
+ E
2708
+ ��
2709
+ ( ˜X1 · ˜X1 − C)(s, t, u, v) − ( ˜X1 · ˜X1 − C)(s′, t′, u′, v′)
2710
+ �J ��w(1)
2711
+ i,N, 1 ≤ i ≤ N
2712
+
2713
+
2714
+
2715
+
2716
+
2717
+
2718
+
2719
+
2720
+ ≤κE
2721
+
2722
+
2723
+
2724
+ N
2725
+
2726
+ i=1
2727
+
2728
+ w(1)
2729
+ i,N
2730
+ �2
2731
+ N
2732
+
2733
+
2734
+
2735
+ J
2736
+ E
2737
+
2738
+ ˜
2739
+ M J ∥X1∥J�
2740
+ ˜ρJβ((s, t, u, v), (s′, t′, u′, v′))
2741
+ where we also used independence of ˜Xi, w(1)
2742
+ i,N.
2743
+ Another application of Yoshihara’s Theorem 3 on the
2744
+ lN−dependent sequence wi,N allows us to bound their J-th moment, which remains finite since lN/N → 0,
2745
+ as N → ∞. Recall that ˜ρ = max{ρK1, ρK2} and all norms are equivalent on finite dimensional spaces.
2746
+ Since in general finite dimensional spaces the following bound holds (see, for instance, Ex. 6 of Section 2.1
2747
+ in van der Vaart and Wellner (1996))
2748
+ D(ε, ˜ρβ) <
2749
+ κ
2750
+ ε2(d1+d2)/β
2751
+ (here κ depends on di := dim(Ki), i = 1, 2 as well as the diameter of Ki). Choosing the parameter J =
2752
+ ⌈2(d1+d2)/β⌉+1 and using Markov’s inequality together with Theorem 2.2.4 in van der Vaart and Wellner
2753
+ (1996) the expression (B.6) for any arbitrary ν > 0, is less than (κ/εJ)(η−2(d1+d2)/(Jβ)+1+ζη−4(d1+d2)2/(Jβ2))
2754
+ which can be made arbitrarily small picking ζ small and then ν small. Consequently, our process is ˜ρ-
2755
+ equicontinuous in probability.
2756
+ 32
2757
+
2758
+ C
2759
+ Additional results
2760
+ Throughout this section, we always assume that the eigenvalues of an operator A satisfy |λA
2761
+ 1 | ≥ |λA
2762
+ 2 | ≥ |λA
2763
+ i |
2764
+ for any i ≥ 3.
2765
+ Lemma C.1. Let A ∈ C(K2)Sym be a kernel, with eigenvalues |λA
2766
+ 1 | > |λA
2767
+ 2 |, then we can find a continuous
2768
+ representative of the first eigenfunctions vA
2769
+ 1 ∈ C(K).
2770
+ Proof. We first notice that in an L2-sense the equality vA
2771
+ 1 = A[vA
2772
+ 1 ]/λA
2773
+ 1 holds. Now defining vA
2774
+ 1 point-wise
2775
+ by the expression A[vA
2776
+ 1 ]/λA
2777
+ 1 , we see that it is already continuous, as
2778
+ vA
2779
+ 1 (t + h) − vA
2780
+ 1 (t) = (λA
2781
+ 1 )−1
2782
+
2783
+ K
2784
+ [A(s, t + h) − A(s, t)]vA
2785
+ 1 (s)ds
2786
+ ≤(λA
2787
+ 1 )−1� �
2788
+ K
2789
+ [A(s, t + h) − A(s, t)]2ds
2790
+ �1/2
2791
+ ≤ κ sup
2792
+ t |A(s, t + h) − A(s, t)| = o(1).
2793
+ Here we have used Cauchy–Schwarz in the first inequality. The small-o refers to convergence as |h| → 0
2794
+ and follows because the continuous kernel A is uniformly continuous on the compact set K2.
2795
+ Lemma C.2. Suppose that A0 ∈ C(K2)Sym with A0 satisfying |λA0
2796
+ 1 | > |λA0
2797
+ 2 |. Furthermore, consider
2798
+ for some δ > 0 the operator A ∈ C(K2)Sym with ∥A − A0∥ ≤ δ and a choice of eigenfunction s.t.
2799
+
2800
+ K vA0
2801
+ 1 (t)vA
2802
+ 1 (t)dt ≥ 0. Then it holds with a constant κ := κ(A0, δ)
2803
+ i)
2804
+ For j = 1, 2
2805
+ ���|λA
2806
+ j | − |λA0
2807
+ j |
2808
+ ��� ≤ κ∥A − A0∥.
2809
+ ii)
2810
+ ��
2811
+ K
2812
+ (vA
2813
+ 1 (t) − vA0
2814
+ 1 (t))2dt
2815
+ �1/2
2816
+ ≤ κ∥A − A0∥.
2817
+ The identities follow directly from i) in Horváth and Kokoszka (2012) (Lemmas 2.2-3), applied to the
2818
+ operators A and A0. Notice that we have here exploited that the sup-norm is stronger than the L2-norm.
2819
+ Lemma C.3. Let A0 ∈ C(K2)Sym be a kernel, with eigenvalues |λA0
2820
+ 1 | > |λA0
2821
+ 2 | and eigenfunction vA0
2822
+ 1
2823
+ (where some choice of sign for the eigenfunction is fixed). Then there exists a δ = δ(A0) > 0 sufficiently
2824
+ small, s.t. for any A ∈ C(K2)Sym with ∥A − A0∥ ≤ δ it holds that |λA
2825
+ 1 | > |λA
2826
+ 2 | and some choice of sign
2827
+ exists for vA
2828
+ 1 s.t.
2829
+
2830
+ K(vA0
2831
+ 1 (t) − vA
2832
+ 1 (t))2dt <
2833
+
2834
+ K(vA0
2835
+ 1 (t) + vA
2836
+ 1 (t))2dt.
2837
+ Proof. The proof is a direct consequence of the preceding Lemma C.2. Notice that
2838
+ |λA
2839
+ 1 | = (|λA
2840
+ 1 | − |λA0
2841
+ 1 |) + (|λA0
2842
+ 1 | − |λA0
2843
+ 2 |) + (|λA0
2844
+ 2
2845
+ − |λA
2846
+ 2 |) + |λA
2847
+ 2 | ≥ |λA
2848
+ 2 | − κδ,
2849
+ where κ comes from Lemma C.2. For sufficiently small δ > 0, the inequality |λA
2850
+ 1 | > |λA
2851
+ 2 | holds. Finally,
2852
+ the inequality
2853
+
2854
+ K(vA0
2855
+ 1 (t) − vA
2856
+ 1 (t))2dt <
2857
+
2858
+ K(vA0
2859
+ 1 (t) + vA
2860
+ 1 (t))2dt follows directly from part ii) of Lemma C.2,
2861
+ again for small enough δ.
2862
+ 33
2863
+
LtE3T4oBgHgl3EQfYQrP/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
MNFQT4oBgHgl3EQfVDaQ/content/tmp_files/2301.13299v1.pdf.txt ADDED
@@ -0,0 +1,530 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ CMS Tracker Alignment Activities during LHC Long
2
+ Shutdown 2
3
+ Sandra Consuegra Rodríguez푎,∗
4
+ 푎Deutsches Elektronen-Synchrotron,
5
+ Notkestraße 85, 22607 Hamburg, Germany
6
+ E-mail: [email protected]
7
+ The strategies for and the performance of the CMS tracker alignment during the 2021-2022 LHC
8
+ commissioning preceding the Run 3 data-taking period are described. The results of the very
9
+ first tracker alignment after the pixel reinstallation, performed with cosmic ray muons recorded
10
+ with the solenoid magnet off are presented. Also, the performance of the first alignment of the
11
+ commissioning period with collision data events, collected at center-of-mass energy of 900 GeV,
12
+ is presented. Finally, the tracker alignment effort during the final countdown to LHC Run 3 is
13
+ discussed.
14
+ 41st International Conference on High Energy physics - ICHEP2022
15
+ 6-13 July, 2022
16
+ Bologna, Italy
17
+ 1On behalf of the CMS Collaboration
18
+ ∗Speaker
19
+ © Copyright owned by the author(s) under the terms of the Creative Commons
20
+ Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0).
21
+ https://pos.sissa.it/
22
+
23
+ CMS Tracker Alignment Activities during LHC Long Shutdown 2
24
+ Sandra Consuegra Rodríguez
25
+ 1. CMS tracker detector
26
+ The innermost tracking system of the CMS experiment, called the tracker, consists of two de-
27
+ vices, the Silicon Pixel and Silicon Strip detectors, within a length of 5.8 m and a diameter of 2.5
28
+ m [1]. The closest detector to the interaction point, the Silicon Pixel detector, consists of the barrel
29
+ pixel sub-detector (BPIX) composed of 4 layers and the forward pixel sub-detector (FPIX) with two
30
+ forward endcaps, each composed of 3 disks, for a total of 1856 modules in the current configuration
31
+ (Phase 1). Because of its proximity to the interaction point, the pixel detector is exposed to the
32
+ highest density of tracks from the proton-proton collisions and, therefore, suffers more extensively
33
+ the effects of the radiation damage. To tackle these effects, the pixel tracker was extracted from the
34
+ CMS experimental cavern, underwent extensive repairs, was provided with a new innermost layer,
35
+ and was reinstalled during the LHC Long Shutdown 2 (LS2). The silicon strip detector consists
36
+ of 15 148 modules and is composed of the Tracker Inner Barrel (TIB), Tracker Inner Disks (TID),
37
+ Tracker Outer Barrel (TOB), and Tracker EndCaps (TEC).
38
+ 2. Track-based alignment
39
+ The tracker was specifically designed to allow for a very accurate determination of the trajec-
40
+ tory of charged particles by ensuring an intrinsic spatial resolution of up to 10-30 microns. From
41
+ the positions at a number of points registered in the detector in the form of hits, the trajectory of a
42
+ charged particle can be reconstructed. Once the hits belonging to each trajectory are associated, a
43
+ fit is performed and the track parameters such as the track curvature radius, impact parameter 푑푥푦
44
+ in the xy plane, impact parameter 푑푧 along the beam direction, as well as the angles 휃 and 휙, are
45
+ obtained. The tracking efficiency, a measure of how efficiently a charged particle passing through
46
+ the tracker is reconstructed, provides a quantitative estimate of the tracking performance. Given
47
+ the deflection of charged particles in a magnetic field, their transverse momentum can be computed
48
+ as the product of the electric charge, the magnetic field, and the curvature radius. Thus, the track
49
+ parameter uncertainties are propagated to the momentum measurement. Furthermore, the resolu-
50
+ tion of a reconstructed primary vertex position depends strongly on the number of tracks used to fit
51
+ the vertex and the transverse momentum of those tracks. Hence, high-quality track reconstruction
52
+ paves the way for accurate primary and secondary vertex reconstruction.
53
+ To ensure good tracking efficiency, as well as a precise momentum measurement and primary ver-
54
+ tex reconstruction, the uncertainty on the track parameters needs to be reduced as much as possible.
55
+ One of the main contributions to this uncertainty comes from the limited precision of the hit position
56
+ measurements entering the track fit from which the track parameters are determined, which in turn
57
+ is related to the overall limited knowledge of the position of the detector modules. The latter has
58
+ two main contributions: the intrinsic spatial resolution of the sensors and the uncertainty related
59
+ to the limited knowledge of the displacements, rotations, and surface deformations of the tracker
60
+ modules. For an accurate determination of the track parameters, this second source of uncertainty
61
+ in the position of the detector modules needs to be reduced to at least the intrinsic spatial resolution
62
+ of the sensors. The correction of the position, orientation, and curvature of the tracker modules to
63
+ reach a precision better than the intrinsic spatial resolution is the task of tracker alignment.
64
+ The so-called track-based alignment consists of fitting a set of tracks with an appropriate track
65
+ 2
66
+
67
+ CMS Tracker Alignment Activities during LHC Long Shutdown 2
68
+ Sandra Consuegra Rodríguez
69
+ model, and computing track-hit residuals, i.e., the difference between the measured hit position and
70
+ the corresponding prediction obtained from the track fit. Geometry corrections can be derived from
71
+ the 휒2 minimization of these track-hit residuals. The Millepede and HipPy alignment algorithms
72
+ are used by CMS to solve the 휒2 minimization problem [2, 3]. The alignment parameters are de-
73
+ termined with Millepede in a simultaneous fit of all tracks, involving two types of parameters: the
74
+ local parameters that characterize the tracks used for the alignment, and nine global parameters that
75
+ describe the position, orientation, and surface deformations of the modules. The local parameters
76
+ of a single track are only connected to the subset of global parameters that are related to that track,
77
+ and they are not directly connected to the local parameters of other tracks. The global parameters
78
+ of each of the single modules of the detector can be corrected in a single alignment fit if enough
79
+ tracks are available. On the other hand, when using the HipPy algorithm, the 휒2 of each sensor is
80
+ minimized with respect to a change in the local alignment of that sensor only, keeping the parame-
81
+ ters of every other sensor fixed, in an iterative procedure.
82
+ Once the set of alignment constants is obtained, the improvement of post-alignment track-hits resid-
83
+ uals is reviewed. Furthermore, before the new detector geometry is updated online for the data taking
84
+ or used for the data reprocessing, the impact of the new set of alignment constants in the tracking
85
+ performance, vertexing performance, and physics observables such as the mass of the Z boson res-
86
+ onance as function of the pseudorapidity and azimuthal angle is checked.
87
+ A simplified version of the offline alignment described above also runs online as part of the Prompt
88
+ Calibration Loop (PCL). The PCL alignment uses the MillePede algorithm and performs the align-
89
+ ment of the pixel high-level structures at the level of ladders and panels, which ensures the consid-
90
+ eration of radiation effects of the innermost layer of the barrel pixel detector already during data
91
+ taking. The obtained constants are then used for the reconstruction of the next run if movements are
92
+ above certain thresholds. Thus, the online and offline alignment are complementary components
93
+ of the tracker alignment within CMS, one providing automated online correction of the pixel high-
94
+ level structures and the other refining the alignment calibration with the possibility to reach each of
95
+ the single modules of the detector in a single alignment fit.
96
+ 3. Tracker alignment effort prior to the beginning of Run 3
97
+ The first data-taking exercise upon the restart of operations in 2021 consisted of recording cos-
98
+ mic ray muons with the magnetic field off, “cosmic run at zero Tesla” (CRUZET). The alignment
99
+ with cosmic ray data has the advantage of allowing the update of the tracker alignment constants
100
+ before the start of collision data taking. Major shifts in the pixel and strip sub-detectors (e.g., due
101
+ to magnet cycles and temperature changes) can be identified and the geometry corrected accord-
102
+ ingly before beams are injected into the collider and collision data becomes available. The very first
103
+ alignment of the pixel detector after reinstallation in the experimental cavern was performed using
104
+ 2.9M cosmic ray tracks recorded during the CRUZET period, at the level of single modules for the
105
+ pixel detector and the outer barrel of the strip detector, and of half-barrels and half-cylinders for the
106
+ rest of the strip partitions. This period was followed by cosmic data-taking with magnetic field at
107
+ nominal value (3.8T), “cosmic run at four Tesla” (CRAFT). In this case, the geometry was derived
108
+ using 765k cosmic ray tracks with the alignment corrections derived at the level of single modules
109
+ for the barrel pixel and at the level of half-barrels and half-cylinders for the forward pixel and all of
110
+ 3
111
+
112
+ CMS Tracker Alignment Activities during LHC Long Shutdown 2
113
+ Sandra Consuegra Rodríguez
114
+ the strip sub-detectors. While the geometries derived with CRUZET and CRAFT data constituted
115
+ relevant updates of the alignment constants starting from a potentially large misalignment, the re-
116
+ sults are statistically limited by the available number of cosmic ray tracks, especially in the forward
117
+ pixel endcaps, and systematically limited by the lack of kinematic variety of the tracks sample.
118
+ For a further improvement of the alignment calibration, a sample of 255.2M pp collision tracks,
119
+ accumulated at a center-of-mass energy of 900 GeV and 3.8T magnetic field, was used. Finally,
120
+ shortly before the start of pp collisions in 2022, the alignment was updated using 6.3M cosmic ray
121
+ tracks recorded at 3.8 T. Alignment corrections were derived at the level of single modules for the
122
+ pixel detector and at the level of half-barrels and half-cylinders for the different strip sub-detectors.
123
+ A comparison of the performance of the different sets of alignment constants obtained with cos-
124
+ mic rays at 0T, cosmic rays at 3.8T, and pp collision tracks during 2021, as well as the alignment
125
+ performance in 2022 prior to pp collisions at √푠=13.6 TeV, are presented in this section.
126
+ 3.1 Offline alignment using cosmic-ray and collision tracks (2021)
127
+ The distribution of the median of the track-hit residuals per module (DMRs) constitutes a mea-
128
+ sure of the tracking performance. The DMRs are monitored for all the tracker substructures, as
129
+ shown for the barrel and forward pixel sub-detectors in Figure 1. A significant improvement on the
130
+ track-hit residuals for the alignment with collision data over the alignments with cosmic ray muons
131
+ only is observed. In the barrel region, DMR distributions can be obtained separately for the pixel
132
+ barrel modules pointing radially inwards or outwards. The difference of their mean values Δ휇 in
133
+ the local-x (x’) direction shown in Figure 2 as a function of the delivered integrated luminosity
134
+ constitutes a measure of the reduction of Lorentz drift angle effects with the alignment procedure.
135
+ 60
136
+
137
+ 40
138
+
139
+ 20
140
+
141
+ 0
142
+ 20
143
+ 40
144
+ 60
145
+ m]
146
+ µ
147
+ )[
148
+ hit
149
+ -x'
150
+ pred
151
+ median(x'
152
+ 0
153
+ 100
154
+ 200
155
+ 300
156
+ 400
157
+ 500
158
+ 600
159
+ 700
160
+ 800
161
+ m
162
+ µ
163
+ number of modules / 2.4
164
+ Preliminary
165
+
166
+ CMS
167
+ pp collisions (2021) 0.9 TeV
168
+ BPIX
169
+ Alignment with:
170
+ 0T cosmic rays
171
+ m
172
+ µ
173
+ = 19.5
174
+ σ
175
+ m,
176
+ µ
177
+ = -2.1
178
+ µ
179
+
180
+ 3.8T cosmic rays
181
+ m
182
+ µ
183
+ = 9.0
184
+ σ
185
+ m,
186
+ µ
187
+ = -1.9
188
+ µ
189
+
190
+ cosmic rays + collisions
191
+ m
192
+ µ
193
+ = 1.1
194
+ σ
195
+ m,
196
+ µ
197
+ = -0.1
198
+ µ
199
+
200
+ 40
201
+
202
+ 30
203
+
204
+ 20
205
+
206
+ 10
207
+
208
+ 0
209
+ 10
210
+ 20
211
+ 30
212
+ 40
213
+ m]
214
+ µ
215
+ )[
216
+ hit
217
+ -x'
218
+ pred
219
+ median(x'
220
+ 0
221
+ 50
222
+ 100
223
+ 150
224
+ 200
225
+ 250
226
+ 300
227
+ 350
228
+ 400
229
+ 450
230
+ m
231
+ µ
232
+ number of modules / 1.6
233
+ Preliminary
234
+
235
+ CMS
236
+ pp collisions (2021) 0.9 TeV
237
+ FPIX
238
+ Alignment with:
239
+ 0T cosmic rays
240
+ m
241
+ µ
242
+ = 9.3
243
+ σ
244
+ m,
245
+ µ
246
+ = -1.9
247
+ µ
248
+
249
+ 3.8T cosmic rays
250
+ m
251
+ µ
252
+ = 9.3
253
+ σ
254
+ m,
255
+ µ
256
+ = -1.9
257
+ µ
258
+
259
+ cosmic rays + collisions
260
+ m
261
+ µ
262
+ = 0.8
263
+ σ
264
+ m,
265
+ µ
266
+ = -0.2
267
+ µ
268
+
269
+ Figure 1: The distribution of median residuals is shown for the local-x coordinate in the barrel pixel (left)
270
+ and forward pixel (right). The alignment constants used for the reprocessing of the pp collision data (red) are
271
+ compared with the ones derived using cosmic rays only, recorded at 0T (green) and 3.8T (blue). The quoted
272
+ means 휇 and standard deviations 휎 correspond to parameters of a Gaussian fit to the distributions [4].
273
+ The effect of the alignment calibration on the reconstruction of physics objects is also stud-
274
+ ied. The distance between tracks and the unbiased track-vertex residuals is studied, searching for
275
+ 4
276
+
277
+ CMS Tracker Alignment Activities during LHC Long Shutdown 2
278
+ Sandra Consuegra Rodríguez
279
+ 0
280
+ 200
281
+ 400
282
+ 600
283
+ 800
284
+ 1000
285
+ ]
286
+ -1
287
+ b
288
+ µ
289
+ Delivered integrated luminosity [
290
+ 5
291
+
292
+ 0
293
+ 5
294
+ 10
295
+ 15
296
+ 20
297
+ m]
298
+ µ
299
+ [
300
+ µ
301
+
302
+ BPIX (x')
303
+ 0T cosmic rays
304
+ 3.8T cosmic rays
305
+ cosmic rays + collisions
306
+ Preliminary
307
+
308
+ CMS
309
+ pp collisions (2021) 0.9 TeV
310
+ Alignment with
311
+ Figure 2: Difference between the mean values Δ휇 obtained separately for the modules with the electric field
312
+ pointing radially inwards or outwards. After alignment with cosmic and collision tracks, the mean difference
313
+ Δ휇 is consistently closer to zero [4].
314
+ potential biases in the primary vertex reconstruction. The mean value of the unbiased track-vertex
315
+ residuals is shown in Figure 3 for the longitudinal and transverse planes, with a significant reduction
316
+ of the bias when collision tracks are included in the alignment procedure.
317
+ [rad]
318
+ φ
319
+ track
320
+ 1000
321
+
322
+ 800
323
+
324
+ 600
325
+
326
+ 400
327
+
328
+ 200
329
+
330
+ 0
331
+ 200
332
+ 400
333
+ 600
334
+ 800
335
+ 1000
336
+ m]
337
+ µ
338
+ [
339
+
340
+ xy
341
+ d
342
+
343
+ 3
344
+
345
+ 2
346
+
347
+ 1
348
+
349
+ 0
350
+ 1
351
+ 2
352
+ 3
353
+ Alignment with:
354
+ 0T cosmic rays
355
+ 3.8T cosmic rays
356
+ cosmic rays + collisions
357
+ pp collisions (2021) 0.9 TeV
358
+ CMS
359
+ Preliminary
360
+ [rad]
361
+ φ
362
+ track
363
+ 600
364
+
365
+ 400
366
+
367
+ 200
368
+
369
+ 0
370
+ 200
371
+ 400
372
+ 600
373
+ m]
374
+ µ
375
+ [
376
+
377
+ z
378
+ d
379
+
380
+ 3
381
+
382
+ 2
383
+
384
+ 1
385
+
386
+ 0
387
+ 1
388
+ 2
389
+ 3
390
+ Alignment with:
391
+ 0T cosmic rays
392
+ 3.8T cosmic rays
393
+ cosmic rays + collisions
394
+ pp collisions (2021) 0.9 TeV
395
+ CMS
396
+ Preliminary
397
+ Figure 3: The mean track-vertex impact parameter in the transverse 푑푥푦 plane (left) and longitudinal 푑푧
398
+ plane (right) in bins of the track azimuthal angle 휙 is shown [4].
399
+ 4. Offline alignment using cosmic-ray tracks (2022)
400
+ The alignment constants were updated before the start of Run 3 using cosmic ray muons recorded
401
+ at 3.8 T, to correct for movements caused by the magnet cycle during the 2021-2022 winter break
402
+ and repeated temperature cycles due to strip detector maintenance. After the geometry update, the
403
+ bias on the distribution of median residuals for the forward pixel detector was corrected, as shown
404
+ in Figure 4, left. Furthermore, the difference in the track impact parameters in the transverse plane
405
+ 5
406
+
407
+ CMS Tracker Alignment Activities during LHC Long Shutdown 2
408
+ Sandra Consuegra Rodríguez
409
+ 푑푥푦 for cosmic ray tracks passing through the pixel detector and split into two halves at their point
410
+ of closest approach to the interaction region was also reduced, as shown in Figure 4, right.
411
+ 40
412
+
413
+ 30
414
+
415
+ 20
416
+
417
+ 10
418
+
419
+ 0
420
+ 10
421
+ 20
422
+ 30
423
+ 40
424
+ m]
425
+ µ
426
+ )[
427
+ hit
428
+ -x'
429
+ pred
430
+ median(x'
431
+ 0
432
+ 20
433
+ 40
434
+ 60
435
+ 80
436
+ 100
437
+ 120
438
+ 140
439
+ 160
440
+ 180
441
+ 200
442
+ m
443
+ µ
444
+ number of modules / 1.6
445
+ Preliminary
446
+
447
+ CMS
448
+ 3.8T cosmic rays (2022)
449
+ FPIX
450
+ 2021 geometry
451
+ m
452
+ µ
453
+ m, rms = 9.5
454
+ µ
455
+ = -4.9
456
+ µ
457
+
458
+ alignment with 3.8T cosmic rays
459
+ m
460
+ µ
461
+ m, rms = 3.4
462
+ µ
463
+ = -0.0
464
+ µ
465
+
466
+ 100
467
+
468
+ 50
469
+
470
+ 0
471
+ 50
472
+ 100
473
+ m)
474
+ µ
475
+ (
476
+ 2
477
+ /
478
+ xy
479
+ d
480
+
481
+ 0.00
482
+ 0.02
483
+ 0.04
484
+ 0.06
485
+ 0.08
486
+ 0.10
487
+ 0.12
488
+ m
489
+ µ
490
+ fraction of tracks / 5
491
+ 2021 geometry
492
+ m
493
+ µ
494
+ m, rms = 38.2
495
+ µ
496
+ = 4.5
497
+ µ
498
+ alignment with 3.8T cosmic rays
499
+ m
500
+ µ
501
+ m, rms = 36.2
502
+ µ
503
+ = 0.7
504
+ µ
505
+ Preliminary
506
+
507
+ CMS
508
+ 3.8T cosmic rays (2022)
509
+ Figure 4: Distribution of median residuals for the local-x coordinate in the forward pixel (left) and difference
510
+ in track impact parameters in the transverse plane 푑푥푦 (right) [5].
511
+ 5. Summary
512
+ The tracker alignment effort during the Run 3 commissioning period has been presented. The
513
+ online alignment in the Prompt Calibration Loop and the strategy followed for the alignment calibra-
514
+ tion considering the availability of tracks with certain topologies have been discussed. Finally, the
515
+ data-driven methods used to derive the alignment parameters and the set of validations that monitor
516
+ the physics performance after the update of the tracker alignment constants have been presented.
517
+ References
518
+ [1] CMS Collaboration, The CMS Experiment at the CERN LHC, 2008 JINST 3 S08004,
519
+ doi:10.1088/1748-0221/3/08/S08004.
520
+ [2] V. Blobel and C. Kleinwort, A new method for the high-precision alignment of track detectors,
521
+ Proceedings of Conference on Advanced Statistical Techniques in Particle Physics, Durham,
522
+ UK, 2002, https://inspirehep.net/literature/589639.
523
+ [3] CMS Collaboration, Strategies and performance of the CMS silicon tracker alignment during
524
+ LHC Run 2, 2022 Nucl. Instrum. Methods A 1037 166795, doi:10.1016/j.nima.2022.166795.
525
+ [4] CMS Collaboration, CMS Tracker Alignment Performance Results CRAFT 2022, CMS Status
526
+ Report, 150th LHCC Meeting - OPEN Session, 2022, https://indico.cern.ch/event/1156732/.
527
+ [5] CMS Collaboration, Tracker Alignment Performance in 2021, CMS-DP-2022/017, 2022,
528
+ https://cds.cern.ch/record/2813999/.
529
+ 6
530
+
MNFQT4oBgHgl3EQfVDaQ/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,162 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf,len=161
2
+ page_content='CMS Tracker Alignment Activities during LHC Long Shutdown 2 Sandra Consuegra Rodríguez푎,∗ 푎Deutsches Elektronen-Synchrotron, Notkestraße 85, 22607 Hamburg, Germany E-mail: sandra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
3
+ page_content='consuegra.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
4
+ page_content='rodriguez@desy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
5
+ page_content='de The strategies for and the performance of the CMS tracker alignment during the 2021-2022 LHC commissioning preceding the Run 3 data-taking period are described.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
6
+ page_content=' The results of the very first tracker alignment after the pixel reinstallation, performed with cosmic ray muons recorded with the solenoid magnet off are presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
7
+ page_content=' Also, the performance of the first alignment of the commissioning period with collision data events, collected at center-of-mass energy of 900 GeV, is presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
8
+ page_content=' Finally, the tracker alignment effort during the final countdown to LHC Run 3 is discussed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
9
+ page_content=' 41st International Conference on High Energy physics - ICHEP2022 6-13 July, 2022 Bologna, Italy 1On behalf of the CMS Collaboration ∗Speaker © Copyright owned by the author(s) under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
10
+ page_content='0 International License (CC BY-NC-ND 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
11
+ page_content='0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
12
+ page_content=' https://pos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
13
+ page_content='sissa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
14
+ page_content='it/ CMS Tracker Alignment Activities during LHC Long Shutdown 2 Sandra Consuegra Rodríguez 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
15
+ page_content=' CMS tracker detector The innermost tracking system of the CMS experiment, called the tracker, consists of two de- vices, the Silicon Pixel and Silicon Strip detectors, within a length of 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
16
+ page_content='8 m and a diameter of 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
17
+ page_content='5 m [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
18
+ page_content=' The closest detector to the interaction point, the Silicon Pixel detector, consists of the barrel pixel sub-detector (BPIX) composed of 4 layers and the forward pixel sub-detector (FPIX) with two forward endcaps, each composed of 3 disks, for a total of 1856 modules in the current configuration (Phase 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
19
+ page_content=' Because of its proximity to the interaction point, the pixel detector is exposed to the highest density of tracks from the proton-proton collisions and, therefore, suffers more extensively the effects of the radiation damage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
20
+ page_content=' To tackle these effects, the pixel tracker was extracted from the CMS experimental cavern, underwent extensive repairs, was provided with a new innermost layer, and was reinstalled during the LHC Long Shutdown 2 (LS2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
21
+ page_content=' The silicon strip detector consists of 15 148 modules and is composed of the Tracker Inner Barrel (TIB), Tracker Inner Disks (TID), Tracker Outer Barrel (TOB), and Tracker EndCaps (TEC).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
22
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
23
+ page_content=' Track-based alignment The tracker was specifically designed to allow for a very accurate determination of the trajec- tory of charged particles by ensuring an intrinsic spatial resolution of up to 10-30 microns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
24
+ page_content=' From the positions at a number of points registered in the detector in the form of hits, the trajectory of a charged particle can be reconstructed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
25
+ page_content=' Once the hits belonging to each trajectory are associated, a fit is performed and the track parameters such as the track curvature radius, impact parameter 푑푥푦 in the xy plane, impact parameter 푑푧 along the beam direction, as well as the angles 휃 and 휙, are obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
26
+ page_content=' The tracking efficiency, a measure of how efficiently a charged particle passing through the tracker is reconstructed, provides a quantitative estimate of the tracking performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
27
+ page_content=' Given the deflection of charged particles in a magnetic field, their transverse momentum can be computed as the product of the electric charge, the magnetic field, and the curvature radius.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
28
+ page_content=' Thus, the track parameter uncertainties are propagated to the momentum measurement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
29
+ page_content=' Furthermore, the resolu- tion of a reconstructed primary vertex position depends strongly on the number of tracks used to fit the vertex and the transverse momentum of those tracks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
30
+ page_content=' Hence, high-quality track reconstruction paves the way for accurate primary and secondary vertex reconstruction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
31
+ page_content=' To ensure good tracking efficiency, as well as a precise momentum measurement and primary ver- tex reconstruction, the uncertainty on the track parameters needs to be reduced as much as possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
32
+ page_content=' One of the main contributions to this uncertainty comes from the limited precision of the hit position measurements entering the track fit from which the track parameters are determined, which in turn is related to the overall limited knowledge of the position of the detector modules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
33
+ page_content=' The latter has two main contributions: the intrinsic spatial resolution of the sensors and the uncertainty related to the limited knowledge of the displacements, rotations, and surface deformations of the tracker modules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
34
+ page_content=' For an accurate determination of the track parameters, this second source of uncertainty in the position of the detector modules needs to be reduced to at least the intrinsic spatial resolution of the sensors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
35
+ page_content=' The correction of the position, orientation, and curvature of the tracker modules to reach a precision better than the intrinsic spatial resolution is the task of tracker alignment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
36
+ page_content=' The so-called track-based alignment consists of fitting a set of tracks with an appropriate track 2 CMS Tracker Alignment Activities during LHC Long Shutdown 2 Sandra Consuegra Rodríguez model, and computing track-hit residuals, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
37
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
38
+ page_content=', the difference between the measured hit position and the corresponding prediction obtained from the track fit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
39
+ page_content=' Geometry corrections can be derived from the 휒2 minimization of these track-hit residuals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
40
+ page_content=' The Millepede and HipPy alignment algorithms are used by CMS to solve the 휒2 minimization problem [2, 3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
41
+ page_content=' The alignment parameters are de- termined with Millepede in a simultaneous fit of all tracks, involving two types of parameters: the local parameters that characterize the tracks used for the alignment, and nine global parameters that describe the position, orientation, and surface deformations of the modules.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
42
+ page_content=' The local parameters of a single track are only connected to the subset of global parameters that are related to that track, and they are not directly connected to the local parameters of other tracks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
43
+ page_content=' The global parameters of each of the single modules of the detector can be corrected in a single alignment fit if enough tracks are available.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
44
+ page_content=' On the other hand, when using the HipPy algorithm, the 휒2 of each sensor is minimized with respect to a change in the local alignment of that sensor only, keeping the parame- ters of every other sensor fixed, in an iterative procedure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
45
+ page_content=' Once the set of alignment constants is obtained, the improvement of post-alignment track-hits resid- uals is reviewed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
46
+ page_content=' Furthermore, before the new detector geometry is updated online for the data taking or used for the data reprocessing, the impact of the new set of alignment constants in the tracking performance, vertexing performance, and physics observables such as the mass of the Z boson res- onance as function of the pseudorapidity and azimuthal angle is checked.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
47
+ page_content=' A simplified version of the offline alignment described above also runs online as part of the Prompt Calibration Loop (PCL).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
48
+ page_content=' The PCL alignment uses the MillePede algorithm and performs the align- ment of the pixel high-level structures at the level of ladders and panels, which ensures the consid- eration of radiation effects of the innermost layer of the barrel pixel detector already during data taking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
49
+ page_content=' The obtained constants are then used for the reconstruction of the next run if movements are above certain thresholds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
50
+ page_content=' Thus, the online and offline alignment are complementary components of the tracker alignment within CMS, one providing automated online correction of the pixel high- level structures and the other refining the alignment calibration with the possibility to reach each of the single modules of the detector in a single alignment fit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
51
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
52
+ page_content=' Tracker alignment effort prior to the beginning of Run 3 The first data-taking exercise upon the restart of operations in 2021 consisted of recording cos- mic ray muons with the magnetic field off, “cosmic run at zero Tesla” (CRUZET).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
53
+ page_content=' The alignment with cosmic ray data has the advantage of allowing the update of the tracker alignment constants before the start of collision data taking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
54
+ page_content=' Major shifts in the pixel and strip sub-detectors (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
55
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
56
+ page_content=', due to magnet cycles and temperature changes) can be identified and the geometry corrected accord- ingly before beams are injected into the collider and collision data becomes available.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
57
+ page_content=' The very first alignment of the pixel detector after reinstallation in the experimental cavern was performed using 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
58
+ page_content='9M cosmic ray tracks recorded during the CRUZET period, at the level of single modules for the pixel detector and the outer barrel of the strip detector, and of half-barrels and half-cylinders for the rest of the strip partitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
59
+ page_content=' This period was followed by cosmic data-taking with magnetic field at nominal value (3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
60
+ page_content='8T), “cosmic run at four Tesla” (CRAFT).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
61
+ page_content=' In this case, the geometry was derived using 765k cosmic ray tracks with the alignment corrections derived at the level of single modules for the barrel pixel and at the level of half-barrels and half-cylinders for the forward pixel and all of 3 CMS Tracker Alignment Activities during LHC Long Shutdown 2 Sandra Consuegra Rodríguez the strip sub-detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
62
+ page_content=' While the geometries derived with CRUZET and CRAFT data constituted relevant updates of the alignment constants starting from a potentially large misalignment, the re- sults are statistically limited by the available number of cosmic ray tracks, especially in the forward pixel endcaps, and systematically limited by the lack of kinematic variety of the tracks sample.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
63
+ page_content=' For a further improvement of the alignment calibration, a sample of 255.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
64
+ page_content='2M pp collision tracks, accumulated at a center-of-mass energy of 900 GeV and 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
65
+ page_content='8T magnetic field, was used.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
66
+ page_content=' Finally, shortly before the start of pp collisions in 2022, the alignment was updated using 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
67
+ page_content='3M cosmic ray tracks recorded at 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
68
+ page_content='8 T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
69
+ page_content=' Alignment corrections were derived at the level of single modules for the pixel detector and at the level of half-barrels and half-cylinders for the different strip sub-detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
70
+ page_content=' A comparison of the performance of the different sets of alignment constants obtained with cos- mic rays at 0T, cosmic rays at 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
71
+ page_content='8T, and pp collision tracks during 2021, as well as the alignment performance in 2022 prior to pp collisions at √푠=13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
72
+ page_content='6 TeV, are presented in this section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
73
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
74
+ page_content='1 Offline alignment using cosmic-ray and collision tracks (2021) The distribution of the median of the track-hit residuals per module (DMRs) constitutes a mea- sure of the tracking performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
75
+ page_content=' The DMRs are monitored for all the tracker substructures, as shown for the barrel and forward pixel sub-detectors in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
76
+ page_content=' A significant improvement on the track-hit residuals for the alignment with collision data over the alignments with cosmic ray muons only is observed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
77
+ page_content=' In the barrel region, DMR distributions can be obtained separately for the pixel barrel modules pointing radially inwards or outwards.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
78
+ page_content=' The difference of their mean values Δ휇 in the local-x (x’) direction shown in Figure 2 as a function of the delivered integrated luminosity constitutes a measure of the reduction of Lorentz drift angle effects with the alignment procedure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
79
+ page_content=" 60 − 40 − 20 − 0 20 40 60 m] µ )[ hit x' pred median(x' 0 100 200 300 400 500 600 700 800 m µ number of modules / 2." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
80
+ page_content='4 Preliminary CMS pp collisions (2021) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
81
+ page_content='9 TeV BPIX Alignment with: 0T cosmic rays m µ = 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
82
+ page_content='5 σ m, µ = -2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
83
+ page_content='1 µ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
84
+ page_content='8T cosmic rays m µ = 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
85
+ page_content='0 σ m, µ = -1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
86
+ page_content='9 µ cosmic rays + collisions m µ = 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
87
+ page_content='1 σ m, µ = -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
88
+ page_content="1 µ 40 − 30 − 20 − 10 − 0 10 20 30 40 m] µ )[ hit x' pred median(x' 0 50 100 150 200 250 300 350 400 450 m µ number of modules / 1." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
89
+ page_content='6 Preliminary CMS pp collisions (2021) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
90
+ page_content='9 TeV FPIX Alignment with: 0T cosmic rays m µ = 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
91
+ page_content='3 σ m, µ = -1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
92
+ page_content='9 µ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
93
+ page_content='8T cosmic rays m µ = 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
94
+ page_content='3 σ m, µ = -1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
95
+ page_content='9 µ cosmic rays + collisions m µ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
96
+ page_content='8 σ m, µ = -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
97
+ page_content='2 µ Figure 1: The distribution of median residuals is shown for the local-x coordinate in the barrel pixel (left) and forward pixel (right).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
98
+ page_content=' The alignment constants used for the reprocessing of the pp collision data (red) are compared with the ones derived using cosmic rays only, recorded at 0T (green) and 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
99
+ page_content='8T (blue).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
100
+ page_content=' The quoted means 휇 and standard deviations 휎 correspond to parameters of a Gaussian fit to the distributions [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
101
+ page_content=' The effect of the alignment calibration on the reconstruction of physics objects is also stud- ied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
102
+ page_content=" The distance between tracks and the unbiased track-vertex residuals is studied, searching for 4 CMS Tracker Alignment Activities during LHC Long Shutdown 2 Sandra Consuegra Rodríguez 0 200 400 600 800 1000 ] 1 b µ Delivered integrated luminosity [ 5 − 0 5 10 15 20 m] µ [ µ ∆ BPIX (x') 0T cosmic rays 3." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
103
+ page_content='8T cosmic rays cosmic rays + collisions Preliminary CMS pp collisions (2021) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
104
+ page_content='9 TeV Alignment with Figure 2: Difference between the mean values Δ휇 obtained separately for the modules with the electric field pointing radially inwards or outwards.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
105
+ page_content=' After alignment with cosmic and collision tracks, the mean difference Δ휇 is consistently closer to zero [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
106
+ page_content=' potential biases in the primary vertex reconstruction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
107
+ page_content=' The mean value of the unbiased track-vertex residuals is shown in Figure 3 for the longitudinal and transverse planes, with a significant reduction of the bias when collision tracks are included in the alignment procedure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
108
+ page_content=' [rad] φ track 1000 − 800 − 600 − 400 − 200 − 0 200 400 600 800 1000 m] µ [ 〉 xy d 〈 3 − 2 − 1 − 0 1 2 3 Alignment with: 0T cosmic rays 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
109
+ page_content='8T cosmic rays cosmic rays + collisions pp collisions (2021) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
110
+ page_content='9 TeV CMS Preliminary [rad] φ track 600 − 400 − 200 − 0 200 400 600 m] µ [ 〉 z d 〈 3 − 2 − 1 − 0 1 2 3 Alignment with: 0T cosmic rays 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
111
+ page_content='8T cosmic rays cosmic rays + collisions pp collisions (2021) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
112
+ page_content='9 TeV CMS Preliminary Figure 3: The mean track-vertex impact parameter in the transverse 푑푥푦 plane (left) and longitudinal 푑푧 plane (right) in bins of the track azimuthal angle 휙 is shown [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
113
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
114
+ page_content=' Offline alignment using cosmic-ray tracks (2022) The alignment constants were updated before the start of Run 3 using cosmic ray muons recorded at 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
115
+ page_content='8 T, to correct for movements caused by the magnet cycle during the 2021-2022 winter break and repeated temperature cycles due to strip detector maintenance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
116
+ page_content=' After the geometry update, the bias on the distribution of median residuals for the forward pixel detector was corrected, as shown in Figure 4, left.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
117
+ page_content=' Furthermore, the difference in the track impact parameters in the transverse plane 5 CMS Tracker Alignment Activities during LHC Long Shutdown 2 Sandra Consuegra Rodríguez 푑푥푦 for cosmic ray tracks passing through the pixel detector and split into two halves at their point of closest approach to the interaction region was also reduced, as shown in Figure 4, right.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
118
+ page_content=" 40 − 30 − 20 − 10 − 0 10 20 30 40 m] µ )[ hit x' pred median(x' 0 20 40 60 80 100 120 140 160 180 200 m µ number of modules / 1." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
119
+ page_content='6 Preliminary CMS 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
120
+ page_content='8T cosmic rays (2022) FPIX 2021 geometry m µ m, rms = 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
121
+ page_content='5 µ = -4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
122
+ page_content='9 µ alignment with 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
123
+ page_content='8T cosmic rays m µ m, rms = 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
124
+ page_content='4 µ = -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
125
+ page_content='0 µ 100 − 50 − 0 50 100 m) µ ( 2 / xy d ∆ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
126
+ page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
127
+ page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
128
+ page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
129
+ page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
130
+ page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
131
+ page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
132
+ page_content='12 m µ fraction of tracks / 5 2021 geometry m µ m, rms = 38.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
133
+ page_content='2 µ = 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
134
+ page_content='5 µ alignment with 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
135
+ page_content='8T cosmic rays m µ m, rms = 36.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
136
+ page_content='2 µ = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
137
+ page_content='7 µ Preliminary CMS 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
138
+ page_content='8T cosmic rays (2022) Figure 4: Distribution of median residuals for the local-x coordinate in the forward pixel (left) and difference in track impact parameters in the transverse plane 푑푥푦 (right) [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
139
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
140
+ page_content=' Summary The tracker alignment effort during the Run 3 commissioning period has been presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
141
+ page_content=' The online alignment in the Prompt Calibration Loop and the strategy followed for the alignment calibra- tion considering the availability of tracks with certain topologies have been discussed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
142
+ page_content=' Finally, the data-driven methods used to derive the alignment parameters and the set of validations that monitor the physics performance after the update of the tracker alignment constants have been presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
143
+ page_content=' References [1] CMS Collaboration, The CMS Experiment at the CERN LHC, 2008 JINST 3 S08004, doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
144
+ page_content='1088/1748-0221/3/08/S08004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
145
+ page_content=' [2] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
146
+ page_content=' Blobel and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
147
+ page_content=' Kleinwort, A new method for the high-precision alignment of track detectors, Proceedings of Conference on Advanced Statistical Techniques in Particle Physics, Durham, UK, 2002, https://inspirehep.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
148
+ page_content='net/literature/589639.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
149
+ page_content=' [3] CMS Collaboration, Strategies and performance of the CMS silicon tracker alignment during LHC Run 2, 2022 Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
150
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
151
+ page_content=' Methods A 1037 166795, doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
152
+ page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
153
+ page_content='nima.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
154
+ page_content='2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
155
+ page_content='166795.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
156
+ page_content=' [4] CMS Collaboration, CMS Tracker Alignment Performance Results CRAFT 2022, CMS Status Report, 150th LHCC Meeting - OPEN Session, 2022, https://indico.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
157
+ page_content='cern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
158
+ page_content='ch/event/1156732/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
159
+ page_content=' [5] CMS Collaboration, Tracker Alignment Performance in 2021, CMS-DP-2022/017, 2022, https://cds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
160
+ page_content='cern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
161
+ page_content='ch/record/2813999/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
162
+ page_content=' 6' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/MNFQT4oBgHgl3EQfVDaQ/content/2301.13299v1.pdf'}
PdE4T4oBgHgl3EQf-Q54/content/tmp_files/2301.05362v1.pdf.txt ADDED
@@ -0,0 +1,1499 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ An Empirical Study on Software Bill of Materials:
2
+ Where We Stand and the Road Ahead
3
+ Boming Xia∗†, Tingting Bi†‡, Zhenchang Xing†§, Qinghua Lu†, Liming Zhu†∗
4
+ ∗University of New South Wales, Sydney, Australia
5
+ †CSIRO’s Data61, Sydney, Australia
6
+ ‡Monash University, Melbourne, Australia
7
+ §Australian National University, Canberra, Australia
8
+ Abstract—The rapid growth of software supply chain attacks
9
+ has attracted considerable attention to software bill of materials
10
+ (SBOM). SBOMs are a crucial building block to ensure the trans-
11
+ parency of software supply chains that helps improve software
12
+ supply chain security. Although there are significant efforts from
13
+ academia and industry to facilitate SBOM development, it is
14
+ still unclear how practitioners perceive SBOMs and what are the
15
+ challenges of adopting SBOMs in practice. Furthermore, existing
16
+ SBOM-related studies tend to be ad-hoc and lack software
17
+ engineering focuses. To bridge this gap, we conducted the first
18
+ empirical study to interview and survey SBOM practitioners. We
19
+ applied a mixed qualitative and quantitative method for gathering
20
+ data from 17 interviewees and 65 survey respondents from 15
21
+ countries across five continents to understand how practitioners
22
+ perceive the SBOM field. We summarized 26 statements and
23
+ grouped them into four topics on SBOM’s states of practice.
24
+ Based on the study results, we derived a goal model and
25
+ highlighted future directions where practitioners can put in their
26
+ effort.
27
+ Index Terms—software bill of materials, SBOM, bill of mate-
28
+ rials, responsible AI, empirical study.
29
+ I. INTRODUCTION
30
+ Modern software products are assembled through intricate
31
+ and dynamic supply chains [1], while recent attacks against
32
+ software supply chains (SSC) have increased significantly
33
+ (e.g., SolarWinds attack [2]). According to Sonatype’s report
34
+ [3], there was a 650% year-over-year increase in SSC attacks
35
+ in 2021, and the number was 430% in 2020. SSC attacks
36
+ mainly aim at the upstream open source software/components
37
+ (OSS) [4], and the majority of the software organizations use
38
+ OSS [5]. The reliance on OSS leads to additional risks, such
39
+ as the lack of reliable maintenance and support compared to
40
+ proprietary software/components [6]. For example, in March
41
+ 2022, the primary maintainer of a popular OSS package,
42
+ node-ipc, intentionally injected malware into an update that
43
+ overwrote file systems in specific geographical locations [7].
44
+ The security risks of software and its supply chain call for
45
+ improved visibility into the SSC, with which timely and
46
+ accurate identification of the impacted software/components
47
+ could be carried out in case of a vulnerability or an SSC attack.
48
+ A software bill of materials (SBOM) is a formal machine-
49
+ readable inventory of the components (and their dependency
50
+ relationships) used for producing a software product [8].
51
+ SBOMs enhance the security of both the proprietary and
52
+ open source components in SSCs [9] through improved trans-
53
+ parency. According to Linux Foundation’s SBOM and Cyber-
54
+ security Readiness report (SBOM readiness report for short)
55
+ [5], SBOMs are critical for enhancing SSC security. 90%
56
+ of the surveyed organizations have started or are planning
57
+ their SBOM journey, with 54% already addressing SBOMs.
58
+ The report also estimated 66% and 13% growth in SBOM
59
+ production or consumption in 2022 and 2023, respectively.
60
+ Nonetheless, some organizations are still concerned about how
61
+ SBOM adoption and application will evolve (e.g., 40% are
62
+ uncertain about industrial SBOM commitment and 39% seek
63
+ consensus on SBOM data fields).
64
+ Despite SBOMs’ essentiality for software and SSC security,
65
+ there remain questions to answer and problems to solve.
66
+ Motivated by the value of SBOMs and the existing gaps, with
67
+ the overarching goal of investigating the SBOM status quo
68
+ from practitioners’ perspectives, this paper aims to answer the
69
+ following research questions (RQs).
70
+ RQ1: What is the current state of SBOM practice?
71
+ Despite the benefits of SBOMs and the SBOM readiness
72
+ report showing an overall 90% of SBOM readiness, how
73
+ practitioners perceive SBOMs and how SBOMs are being
74
+ addressed in practice is unclear. To answer this question, we
75
+ analyzed the SBOM practice status from SBOM generation,
76
+ distribution and sharing, validation and verification, and vul-
77
+ nerability and exploitability management. We summarized the
78
+ current SBOM practices and what practitioners expect.
79
+ RQ2: What is the current state of SBOM tooling
80
+ support?
81
+ Despite the proliferation of the SBOM tooling market, this
82
+ RQ focuses on the SBOM tooling status from the practition-
83
+ ers’ perspective. We investigated the practitioners’ attitudes
84
+ towards existing tools from the following aspects: the ne-
85
+ cessity/availability/usability/integrity of SBOM tools. While
86
+ exploring the current SBOM tooling state, we also looked into
87
+ practitioners’ expectations of SBOM tools.
88
+ RQ3: What are the main concerns for SBOM?
89
+ This RQ investigates the most outstanding concerns SBOM
90
+ practitioners have. Although the prospect of SBOMs is promis-
91
+ ing, there are still challenges to resolve. With this RQ, we aim
92
+ to provide a reference for the most imminent issues for future
93
+ research and development on SBOMs.
94
+ Our research aims to unveil the state of the SBOM field,
95
+ investigating what practitioners have and how they are ad-
96
+ arXiv:2301.05362v1 [cs.SE] 13 Jan 2023
97
+
98
+ dressing SBOMs, versus what they expect. Our work on
99
+ SBOMs has four main distinctions and contributions compared
100
+ to existing work represented by the SBOM readiness report:
101
+ 1) Timeliness: The SBOM readiness report was published
102
+ in January 2022, with the survey launched in June 2021.
103
+ Google Trends shows a significant increase in SBOM
104
+ interest since July 2021. This study provides a more
105
+ updated view of SBOMs.
106
+ 2) Software engineering (SE) angles: The SBOM readi-
107
+ ness report is industry-oriented and security-focused,
108
+ whereas this research broadens and deepens the report
109
+ and supplements SE angles, evidenced by considerations
110
+ such as SBOM generation/update throughout software
111
+ development lifecycle (Finding 5) and AIBOM (Section
112
+ IV-A8). The detailed comparison between this research
113
+ and the SBOM readiness report is presented in Table IV.
114
+ 3) Different objectives: The SBOM readiness report aims
115
+ to investigate whether and to what extent organizations
116
+ are prepared for SBOM production and consumption
117
+ (i.e., readiness). In contrast, this study focuses on current
118
+ SBOM practices and expectations from practitioners’
119
+ perspectives. We provide a set of implications, including
120
+ a goal model, for future endeavors towards further
121
+ operationalizing SBOMs.
122
+ 4) Systematic methodology: We conducted the first em-
123
+ pirical study on the SBOM status from practitioners’
124
+ perspectives, using a mixed methodology. Instead of
125
+ using predefined questions as in SBOM readiness re-
126
+ port, we qualitatively and quantitatively coded in-depth
127
+ opinions from 17 interviewees into 26 representative
128
+ statements, which were validated in a survey with 65
129
+ valid respondents from 15 countries.
130
+ The remainder of this paper is organized as follows. Section
131
+ II describes the context of the SBOM field. Section III presents
132
+ the methodology of our study. In section IV we present the
133
+ study results. Section V discusses the implications of this
134
+ study. Section VI discusses related work, and section VII
135
+ draws conclusions and outlines avenues for future work.
136
+ II. BACKGROUND: WHAT IS SBOM?
137
+ A bill of materials (BOM) was initially used in the manu-
138
+ facturing industry as an inventory list of all the sub-assemblies
139
+ and components in a parent assembly [10]. Sharing the same
140
+ origin, an SBOM as the building block to enhanced software
141
+ supply chain security is a software “BOM” (see Fig. 1).
142
+ There are three main SBOM standard formats: a) Software
143
+ Package Data eXchange (SPDX), b) CycloneDX, and c)
144
+ Software Identification (SWID) Tagging, while the first two
145
+ are most adopted [12]. SPDX is an open-source international
146
+ standard hosted by the Linux Foundation, emphasizing licence
147
+ compliance. CycloneDX was designed by OWASP in 2017
148
+ whose primary focus is security. SWID Tagging is also an in-
149
+ ternational standard maintained by the US National Institute of
150
+ Standards and Technology, focusing on providing a transparent
151
+ software/components identification mechanism.
152
+ Fig. 1. (AI) Software supply chain and SBOM [11].
153
+ The above three formats all have the corresponding tooling
154
+ to help operationalize the formats into practice that are listed
155
+ on their respective websites. It is worth mentioning that the
156
+ SBOM formats and tooling working group under the US
157
+ National Telecommunications and Information Administration
158
+ (NTIA) had an effort to summarize all tools supporting dif-
159
+ ferent standards (i.e., SPDX list, CycloneDX list, SWID list).
160
+ In terms of government-side SBOM efforts, with incidents
161
+ such as the SolarWinds attack ringing the alarm of SSC
162
+ security, the US government issued an executive order on en-
163
+ hancing cybersecurity [13] in May 2021, explicitly mandating
164
+ all companies trading with the US government to provide
165
+ SBOMs. NTIA has published a series of documents and
166
+ guidelines (e.g., SBOM minimum elements [8]) to facilitate
167
+ SBOM development. The Cybersecurity and Infrastructure
168
+ Security Agency (CISA) is also actively working on SBOM
169
+ facilitation by regularly hosting listening sessions with the
170
+ SBOM industrial community.
171
+ Notably, the Linux Foundation published the SBOM readi-
172
+ ness report [5] in January 2022, which surveyed 412 organi-
173
+ zations across the globe. According to the report, 98% of the
174
+ surveyed organizations are concerned about software security,
175
+ over 80% are aware of the US executive order, and 90%
176
+ have started their SBOM journey. Although the evolvement of
177
+ SBOM adoption and application remains a concern, the report
178
+ predicts that the SBOM tool market is expected to explode
179
+ in 2022 and 2023. As of January 2022, there were about
180
+ 20 SBOM tool vendors in the market, and some were from
181
+ adjacent markets like Software Composition Analysis (SCA)
182
+ which dates back to 2002 [14]. Meanwhile, various open
183
+ source tools are available with a focus on SBOM generation.
184
+ However, while the SBOM readiness report comprehen-
185
+ sively covers a broad category, their reports were based on
186
+ multi-choice questions with limited choices, which constrained
187
+ the possible answers. The guidelines and documents published
188
+ by NTIA provide a reference for understanding SBOM and
189
+ SBOM practice but lack the actual perception from the SBOM
190
+ practitioners. To fill the gaps, we interviewed 17 SBOM
191
+ practitioners (see Table I) with open-ended questions on how
192
+ they perceive current SBOM practice and SBOM tooling.
193
+ We then organized an online survey containing statements
194
+
195
+ SBOM
196
+ Component 1
197
+ SBOM
198
+ SBOM
199
+ Component 2
200
+ (AIBOM)
201
+ SBOM
202
+ Component 3
203
+ Software
204
+ Data
205
+ Model
206
+ AIBOM
207
+ (AI) Component 4
208
+ Data/model co-versioing registryfrom the interviews, allowing more practitioners to validate
209
+ the statements. Compared with the SBOM readiness report
210
+ and NTIA’s documents, we focus on how actual SBOM
211
+ practitioners think about SBOMs and how they are addressing
212
+ SBOMs in production without limiting the possible answers.
213
+ III. RESEARCH METHODOLOGY
214
+ This study presents an exploratory empirical study on
215
+ SBOM status in practice. Fig. 2 shows the overall methodology
216
+ adopted in this paper that consists of three stages, following a
217
+ mixed qualitative and quantitative approach [15]. We described
218
+ the planning and preparation stage in Section III-A; the data
219
+ collection and analysis processes of the interviews and the
220
+ online survey are presented in Sections III-B and III-C.
221
+ Fig. 2. Overall research methodology.
222
+ A. Stage Zero: Planning and Preparation
223
+ At the planning stage, we prepared a research protocol1 and
224
+ drafted two types of interview questions: demographics and
225
+ open-ended. For demographics, we ask about the participants’
226
+ background information, such as job roles and experiences.
227
+ For the open-ended questions, we asked how the participants
228
+ perceive SBOMs. We obtained ethics approvals for this study.
229
+ B. Stage One: Interview
230
+ Pilot interview and protocol refinement. Before the formal
231
+ interviews, we conducted a small-scale pilot interview with 3
232
+ participants from our connections. Based on their feedback
233
+ and suggestions, we adjusted some interview questions.
234
+ Participant recruitment. We recruited 17 SBOM prac-
235
+ titioners from 13 organizations (e.g., CISA, Oracle) across
236
+ 7 countries (see Table I). Interviewees were recruited by:
237
+ a) emailing our contacts who helped further disseminate the
238
+ invitation emails to their colleagues; b) emailing developers
239
+ on GitHub working on SBOM-related projects whose email
240
+ addresses are public; c) advertising on Twitter and LinkedIn
241
+ and interested people can contact the first author. The 17
242
+ interviewees have worked in software-related fields for around
243
+ 14 years on average (min 4 years and max 30 years), while
244
+ they have been working actively in SBOM-related fields for
245
+ 1The detailed research protocol is provided via the submission system as
246
+ supplementary materials. A link will be attached in the formal version.
247
+ TABLE I
248
+ INTERVIEWEE DEMOGRAPHICS*
249
+ ID
250
+ Field of work
251
+ Country
252
+ Work exp.
253
+ SBOM exp.
254
+ I1
255
+ Dev.
256
+ China
257
+ 10
258
+ 0.5
259
+ I2
260
+ Dev.
261
+ China
262
+ 10
263
+ 0.2
264
+ I3
265
+ Dev.
266
+ China
267
+ 10
268
+ 0.2
269
+ I4
270
+ Dev. & Sec.
271
+ Australia
272
+ 20
273
+ 3.0
274
+ I5
275
+ Dev.
276
+ US
277
+ 18
278
+ 0.5
279
+ I6
280
+ Dev.
281
+ US
282
+ 20
283
+ 0.5
284
+ I7
285
+ Sec.
286
+ Brazil
287
+ 4
288
+ 0.5
289
+ I8
290
+ Dev. & Cnslt.
291
+ Ireland
292
+ 15
293
+ 1.5
294
+ I9
295
+ Sec.
296
+ India
297
+ 5.5
298
+ 1.0
299
+ I10
300
+ Cnslt. & Adv.
301
+ US
302
+ 20
303
+ 3.0
304
+ I11
305
+ Dev. & Sec. (SBOM tool)
306
+ Israel
307
+ 12
308
+ 1.5
309
+ I12
310
+ Cnslt. & Adv.
311
+ Israel
312
+ 15
313
+ 0.3
314
+ I13
315
+ Dev.&Sec.&Res.
316
+ Australia
317
+ 30
318
+ 2.0
319
+ I14
320
+ Dev. & Sec. & Res.
321
+ US
322
+ 10
323
+ 3.0
324
+ I15
325
+ Dev.
326
+ India
327
+ 8
328
+ 1.5
329
+ I16
330
+ Dev. (SBOM tool)
331
+ US
332
+ 20
333
+ 1.0
334
+ I17
335
+ Cnslt. & Adv.
336
+ US
337
+ 15
338
+ 5.0
339
+ *Dev./Sec.: Software Development/Security; Cnslt.: Consultant; Adv.:
340
+ Advisor; Res.: Researcher. Experiences are listed in years, as of July 2022
341
+ around 1.4 years on average (min 2 months and max 5 years).
342
+ We will refer to the 17 interviewees as I1 to I17.
343
+ Transcribing and coding. 1) Transcribing. The interviews
344
+ were audio-recorded. The first author transcribed the audio
345
+ recordings, and the second author double-checked the tran-
346
+ scripts. 2) Pilot coding. The first two authors (i.e., coders)
347
+ conducted a pilot coding of the 3 pilot interview transcripts.
348
+ They discussed the initial coding results and reached a certain
349
+ level of preliminary agreement on the granularity of thematic
350
+ coding. 3) Code generation. The coders then performed the-
351
+ matic coding to qualitatively analyze the interview transcripts
352
+ [16], [17] of 17 interviewees using MAXQDA2022 tool. The
353
+ first coder generated 574 codes under 86 cards (i.e., repetitive
354
+ and similar codes classified into the same category). The
355
+ second coder generated 364 codes under 41 cards. After
356
+ discussing the coding results with a third author, the coders
357
+ further cleared the coding granularity, combined similar cards,
358
+ and disposed of cards with limited value. Finally, a total of 54
359
+ unique cards were generated.
360
+ Data analysis and open card sorting. The coders sep-
361
+ arately sorted the 54 generated cards into potential themes
362
+ (not predefined) given thematic similarity. After the sorting
363
+ process, the coders calculated Cohen’s Kappa value [18] to
364
+ assess their agreement level. The overall value was 0.77,
365
+ indicating substantial agreement. The coders discussed their
366
+ disagreements to reach a common ground. he coders reviewed
367
+ and agreed on the final themes to reduce card sorting bias.
368
+ Eventually, we derived 26 statements (see Table III) under
369
+ 3 themes: State of SBOMs Practice (T1), SBOM Tooling
370
+ Support (T2), and SBOM Issues and Concerns (T3). All the
371
+ authors have double-checked our coding results to ensure the
372
+ reported results are accurate and consistent.
373
+ C. Stage Two: Online Survey
374
+ We conducted an online survey to confirm or refute the ex-
375
+ tracted statements. We designed the survey following Kitchen-
376
+
377
+ Stage 0
378
+ Stage 1
379
+ Stage 2
380
+ Planning & Preparation
381
+ Interview
382
+ Online survey
383
+ Overarching goal
384
+ Pilot study
385
+ Pilot study
386
+ Practitioners' perception on
387
+ SBOM
388
+ Protocol refinement
389
+ Protocol refinement
390
+ Participants
391
+ Research questions
392
+ recruitment
393
+ Participants
394
+ 1. State of SBOM practice
395
+ recruitment
396
+ Interviews
397
+ 2. State of SBOM tooling
398
+ Online survey
399
+ 3. SBOM concerns
400
+ Transcribing & coding
401
+ Data analysis
402
+ Protocol
403
+ Ethics approval
404
+ Statement extractionTABLE II
405
+ SURVEY RESPONDENTS DEMOGRAPHICS*
406
+ Field of work
407
+ Project team
408
+ Work exp.
409
+ SBOM exp.
410
+ Dev. (38.6%)
411
+ <10 ppl. (16)
412
+ <1 year (1)
413
+ <6 months (17)
414
+ Sec. (30.1%)
415
+ 10-20 ppl. (20)
416
+ 1-3 years (11)
417
+ 0.5-1 year (17)
418
+ Cnslt./Adv. (10.8%)
419
+ 20-50 ppl. (15)
420
+ 3-5 years (13)
421
+ 1-2 years (13)
422
+ Mgmt (9.7%)
423
+ >50 ppl. (15)
424
+ 5-10 years (9)
425
+ >2 years (19)
426
+ Res. (9.7%)
427
+ -
428
+ >10 years (32)
429
+ -
430
+ Other (1.1%)
431
+ -
432
+ -
433
+ -
434
+ *Mgmt.: Management; ppl.: people. Since multiple answers are supported
435
+ for respondents’ work, field of work is listed in percentages while the
436
+ others are listed with response numbers.
437
+ ham and Pfleeger’s guideline [19]. The survey was anonymous,
438
+ and all information collected was non-identifiable.
439
+ Survey design and pilot study. The survey was published
440
+ via Qualtrics. Different types of questions were included in the
441
+ survey (e.g., multiple choice and free text). The statements are
442
+ scored on a 5-point Likert scale (Strongly disagree, Disagree,
443
+ Neutral, Agree, Strongly agree), with an additional “Not sure”.
444
+ We piloted the survey with six participants from Australia
445
+ and Singapore and then refined the survey. The pilot study
446
+ results were excluded from the final results. The formal
447
+ survey consists of 7 sections: demographics, SBOM status quo,
448
+ generation, distribution, tooling, benefits, and concerns.
449
+ Participants recruitment. To increase the number of par-
450
+ ticipants, we adopted the following strategy for recruitment:
451
+ ● We contacted industrial practitioners from several compa-
452
+ nies worldwide and asked for their help in disseminating
453
+ the survey invitation emails.
454
+ ● We sent invitation emails to over 2000 developers from
455
+ GitHub whose email addresses are publicly available.
456
+ ● We posted the recruitment advertisement on social media
457
+ platforms (i.e., Twitter and LinkedIn).
458
+ We received a total of 129 responses, including 27 with
459
+ respondents selecting “(Very) unfamiliar with SBOM”. After
460
+ removing them and the incomplete responses and responses
461
+ completed within 2 minutes, we had 65 valid responses. We
462
+ acknowledge that the number of responses is not as ideal
463
+ as similar empirical studies (e.g., [17], [20]). However, we
464
+ believe this is consistent with our findings on the lack of
465
+ SBOM adoption and education (i.e., Findings 1 and 10). The
466
+ 65 participants come from 15 countries across 5 continents.
467
+ The top 3 countries where the participants reside are Australia,
468
+ China, and the US. An overview of the survey respondents’
469
+ demographics is presented in Table II. It is worth noting
470
+ that although nearly half (47.7%) of the respondents have
471
+ worked in the software field for over 10 years, only one
472
+ quarter (27.7%) have worked on SBOMs for over 2 years,
473
+ indicating that SBOM is still a relatively fresh concept to
474
+ software practitioners.
475
+ Data analysis. Apart from the demographics, SBOM fa-
476
+ miliarity questions, and a final optional free-text question, all
477
+ statements are presented as Likert-scale questions (see the bar
478
+ charts in Table III) for the evaluation of the agreement degree.
479
+ IV. STUDY RESULTS
480
+ This section reports the study results. In Table III, we drew
481
+ the Linkert distribution graphs for 26 statements that were re-
482
+ organized into four topics and calculated the overall scores
483
+ based on: Strongly Disagree (1), Disagree (2), Neutral (3),
484
+ Agree (4), Strongly Agree (5), and Not Sure (0). We calculated
485
+ the percentages of “agrees” (strongly agree and agree) and
486
+ “disagrees” (strongly disagree and disagree) of each statement.
487
+ Following the SBOM background in Section II, this section
488
+ starts by introducing the current SBOM practices (Section
489
+ IV-A). Then Section IV-B investigates the current tooling
490
+ status of SBOMs. Finally, Section IV-C presents practitioners’
491
+ primary concerns for SBOMs.
492
+ A. RQ1: What is the current state of SBOM practice?
493
+ To answer RQ1, we discussed 16 statements in this section
494
+ based on T1 (see Table III). Our results suggest that SBOMs
495
+ are not widely adopted. SBOM generation and distribution re-
496
+ quire further standardization and maturer mechanisms. SBOM
497
+ data validation is generally neglected. For the typical SBOM
498
+ use case of vulnerability management, the exploitability status
499
+ classification should be more than binary.
500
+ 1) SBOM benefits: We summarized 3 statements (i.e., S1-
501
+ S3) on SBOM benefits based on the interviews.
502
+ 15 of 17 interviewees mentioned that the enhanced trans-
503
+ parency of the software supply chain is one of the exceptional
504
+ advantages of SBOMs [S1, 90.8% agree, 1.5% disagree].
505
+ Transparency brings a lot of favorable consequences, such
506
+ as end-of-life software management, vulnerability tracking,
507
+ and license compliance checking [5]. “The biggest benefit is
508
+ knowing exactly what is being bundled in your software, right?
509
+ So it is to assure our customers that, if there’s a vulnerability
510
+ reported, you immediately know (whether) you are impacted
511
+ or not, if the SBOM is accurate.” (I13-Dev.&Sec.&Res.)
512
+ Another benefit originates from the SBOM data. The uni-
513
+ fication of software composition details provided by SBOMs
514
+ is beneficial as the standardized SBOM data has the potential
515
+ to be further built upon. “The SBOM itself isn’t the valuable
516
+ part. The valuable part is, how do we turn that data into
517
+ intelligence, into action.” (I17-Cnslt.&Adv.) Based on the
518
+ SBOM data, it is promising that there will be SBOM-centric
519
+ ecosystems emerging [S2, 86.2% agree, 1.5% disagree]. How-
520
+ ever, due to the lack of SBOM adoption (see Section IV-A2),
521
+ such ecosystems are long-term goals not to be achieved soon.
522
+ Thirdly, although adopting SBOMs requires extra efforts
523
+ (e.g., additional tools and processes, education to related
524
+ personnel), the benefits of SBOMs outweigh the costs [S3,
525
+ 86.2% agree, 7.7% disagree]. � Although some organizations
526
+ are “worried whether SBOMs would increase the cost of a
527
+ software product” (I1-Dev.), � the majority favor the benefits
528
+ brought by SBOMs as the potential loss without SBOMs can
529
+ be devastating. “What I think about is, what is the cost when
530
+ a vulnerability is exploited? ...if you look at SolarWinds event,
531
+ that cost was $800 million.” (I6-Dev.)
532
+
533
+ TABLE III
534
+ INTERVIEW AND SURVEY RESULTS ON SBOM STATEMENTS
535
+ Likert distribution
536
+ Statement
537
+ Graph
538
+ Score
539
+ T1. State of SBOM practice
540
+ S1. Improving transparency and visibility into the software products is the biggest benefit of SBOMs.
541
+ 4.42
542
+ S2. SBOM data form the foundation of a potential SBOM-centric ecosystem.
543
+ 4.05
544
+ S3. The benefits brought by SBOMs outweigh the costs of SBOMs (e.g., extra learning and management of SBOMs & tools).
545
+ Section IV-A1
546
+ SBOM benefits
547
+ 4.34
548
+ S4. Currently third-party (open source or proprietary) components are not equipped with SBOMs.
549
+ 4.11
550
+ S5. SBOMs are not generated for all software products (produced/used) within an organization.
551
+ Section IV-A2
552
+ SBOM adoption
553
+ 4.25
554
+ S6. SBOMs can be generated at different stages of the software development lifecycle.
555
+ 4.14
556
+ S7. Currently, a new SBOM is not always re-generated when there’s any change to software artifacts.
557
+ Section IV-A3
558
+ SBOM generation points
559
+ 3.31
560
+ S8. SBOMs are currently generated in a non-standardized format (e.g., not SPDX nor CycloneDX nor SWID).
561
+ 2.86
562
+ S9. Despite the 7 minimum data fields recommended by NTIA, the minimum fields are not necessarily all included in SBOMs.
563
+ 3.57
564
+ S10. In practice, SBOMs are extended with more useful data fields (other than the 7 minimum data fields) whenever possible.
565
+ Section IV-A4
566
+ SBOM data fields and
567
+ standarization
568
+ 4.34
569
+ S11. SBOMs are currently only generated for internal consumption.
570
+ 2.97
571
+ S12. Access control should be required for the distribution of SBOMs for proprietary software/components.
572
+ 4.14
573
+ S13. Content tailoring (sharing partial SBOMs) should be required for SBOM distribution of proprietary software/components.
574
+ Section IV-A5
575
+ SBOM distribution
576
+ 3.57
577
+ S14. SBOM producer’s (i.e., software vendor) reputation is important for assessing SBOM integrity (e.g., completeness).
578
+ 3.4
579
+ S15. Currently there are no validation mechanisms to ensure SBOM integrity (accuracy, completeness etc).
580
+ Section IV-A6
581
+ SBOM validation
582
+ 3.28
583
+ S16. Current vulnerability management with SBOMs doesn’t focus on the actual exploitability of the vulnerability.
584
+ Section IV-A7
585
+ Vul. & exploitability
586
+ 3.72
587
+ S17. SBOMs for AI software are different from SBOMs for traditional software.
588
+ Section IV-A8
589
+ AIBOM
590
+ 3.26
591
+ T2. State of SBOM tooling support
592
+ S18. Although existing sources (e.g., package manager, POM.xml) are already there, it is still necessary to parse and feed
593
+ metadata from these sources into a standard format via SBOM tools.
594
+ Section IV-B1
595
+ Necessity of SBOM tools
596
+ 4.08
597
+ S19. There are significantly limited tools for SBOM consumption.
598
+ 4
599
+ S20. SBOM consumption should be integrated with existing tools (e.g., vulnerability/configuration management tools).
600
+ Section IV-B2
601
+ Availability of SBOM tools
602
+ 4.03
603
+ S21. Existing SBOM tools can be hard to use (e.g., lack of usability, complexity).
604
+ 3.57
605
+ S22. SBOM tools lack of interoperability and standardization (e.g., the hash of one component generated by different tools
606
+ can be different).
607
+ Section IV-B3
608
+ Usability of SBOM tools
609
+ 3.92
610
+ S23. End users can’t validate the integrity (e.g., accuracy and completeness) of the generated SBOMs by existing tools.
611
+ Section IV-B4
612
+ Validation of SBOM tools
613
+ 3.69
614
+ T3. SBOM issues & concerns
615
+ S24. Existing SBOM standards don’t meet current market demands (e.g., the standards support only limited fields).
616
+ 2.85
617
+ S25. Attackers can take advantage of the information contained in SBOMs.
618
+ 3.63
619
+ S26. There is hesitation in adopting SBOMs due to various concerns (e.g., lack of basic IT asset management).
620
+ Section IV-C
621
+ SBOM concerns
622
+ 3.98
623
+ Finding 1: The transparency brought by SBOMs can
624
+ enable accountability, traceability and security, but
625
+ there is a lack of systematic consumption-scenario-
626
+ driven design of SBOM features.
627
+ 2) SBOM adoption: We summarized 2 statements (i.e., S4-
628
+ S5) on SBOM adoption status (see Table III).
629
+ Despite the benefits of SBOMs and the SBOM readiness
630
+ report’s [5] optimistic results that 90% of the 412 sampled
631
+ organizations have started or are planning their SBOM journey,
632
+ the adoption of SBOM is not as optimistic according to our
633
+ interviews and survey. For example, most existing third-party
634
+ software or components, either open source or proprietary, are
635
+ not equipped with SBOMs [S4, 83.1% agree, 13.8% disagree].
636
+ As I2 stated, “when introducing third-party components to
637
+ our organization, we need to try to generate SBOMs for
638
+ them because not all of them have SBOMs.” (I2-Dev.) How-
639
+ ever, considering the prevalence of OSS, the unavailability
640
+ of SBOMs for (open-source) software/components also holds
641
+ software vendors back from SBOM adoption as they may
642
+ wonder whether SBOM adoption is an industrial consensus.
643
+ In addition, SBOMs are not generated for all software
644
+ even inside a software vendor organization [S5, 87.7% agree,
645
+ 7.7% disagree]. As stated by I10, “software vendors may be
646
+ producing SBOMs for some customer products. But I bet most
647
+ of them don’t generate SBOMs for the financial software they
648
+ are using.” (I10-Cnslt.& Adv.)
649
+ Finding 2: A large portion of widely used software,
650
+ especially OSS, does not have SBOMs. The incentives
651
+ for generating SBOMs for OSS and proprietary
652
+ software need to be propagated.
653
+ 3) SBOM generation point: We summarized 2 statements
654
+ (i.e., S6-S7 in Table III) on SBOM (re-)generation.
655
+ SBOMs can be generated at a set of different stages in the
656
+ software development life cycle (e.g., build time, run time,
657
+ before delivery, after third-party components introduction, etc.)
658
+ [S6, 84.6% agree, 12.3% disagree], which differs from case to
659
+ case as “the challenge here sort of builds on the sheer diversity
660
+ of software” (I17-Cnslt.&Adv.) (e.g., modern/legacy software,
661
+ container images, cloud-based software). For example, “for
662
+ legacy software that’s already out there in the wild, maybe
663
+
664
+ you don’t have reproducible builds. You only have that built
665
+ artifacts... it’s like you can’t do it (generate SBOMs) at build
666
+ time anymore... it’s just too difficult... But you could probably
667
+ do a run time (SBOM) generator.” (I8-Dev.&Cnslt)
668
+ As stated by I8, “I don’t really think there is a perfect
669
+ time (for SBOM generation)”. (I8-Dev.&Cnslt) Since software
670
+ development goes through a life cycle, ideally an SBOM
671
+ should be generated at the early stages and then gradually
672
+ enriched with more information from the latter stages,
673
+ which was supported by I12 and I14. “I think the way to
674
+ actually include the most full SBOM is to have visibility
675
+ towards the whole cycles, from the report to the build to the
676
+ factory.” (I12-Cnslt.&Adv.) “I do not think we should produce
677
+ an SBOM as a one-shot process, but rather we should be
678
+ carrying evidence and partial SBOMs and enriching them in
679
+ every single operation.” (I14-Dev.&Sec.&Res.)
680
+ As for SBOM re-generation, it is evident that whenever any
681
+ change happens to any software artifact, the corresponding
682
+ SBOMs should be timely re-generated to reflect this change,
683
+ which is hardly the current practice followed by every SBOM
684
+ producer [S7, 53.8% agree, 35.4% disagree]. As stated by I10,
685
+ “that is more of an aspirational goal - it’s not something that
686
+ will be realized right away. Because right now it would be just
687
+ great if they put out a new SBOM whenever they did a new ma-
688
+ jor version, and that is better than nothing.”(I10-Cnslt.&Adv.)
689
+ However, since some organizations are re-generating SBOMs
690
+ upon each change, and if SBOM re-generation is to be a
691
+ standard practice, solutions like SBOM version control are
692
+ needed for managing the SBOMs. As stated by I8, with
693
+ different versions of SBOMs, “you need to version control
694
+ your SBOMs, and figure out how to distribute that information
695
+ to your customers.” (I8-Dev.&Cnslt)
696
+ Finding 3: SBOM generation is belated and not dy-
697
+ namic, while ideally SBOMs are expected to be gener-
698
+ ated during early software development stages and
699
+ continuously enriched/updated.
700
+ 4) SBOM data fields standardization: In this subsection, we
701
+ investigated what data fields generated SBOMs contain, based
702
+ on S8-S10 in Table III, since not knowing what to include in
703
+ an SBOM is the second biggest concern for producing SBOMs
704
+ according to the SBOM readiness report [5].
705
+ First, despite the existence and relative prevalence of two
706
+ major SBOM standards (i.e., SPDX and CycloneDX), some
707
+ organizations generate SBOMs based on their customized non-
708
+ standard formats [S8, 27.7% agree, 32.3% disagree]. Based
709
+ on the survey results, although more respondents agree with
710
+ standardized SBOM formats, over one quarter agree with
711
+ customized SBOM generation. As I4 stated, “the people I
712
+ spoke to (in some organizations) might have been doing this
713
+ (generating SBOMs), but they might not have been doing
714
+ a standard-format SBOM. They would just be keeping an
715
+ inventory of all their software components.” (I4-Dev.&Sec.)
716
+ Second, although there are 7 minimum SBOM data fields
717
+ recommended by NTIA [8], in practice, generated SBOMs
718
+ don’t always meet the minimum bar [S9, 63.1% agree, 24.6%
719
+ disagree] for two main reasons (i.e., software vendor cus-
720
+ tomization, data availability). Some software vendors choose
721
+ only to include a subset of the minimum data fields, or
722
+ customize their minimum requirements to meet their respective
723
+ needs. According to I3, his/her organization “has its own
724
+ minimum requirements (different from NTIA’s)” (I3, Dev.).
725
+ Software vendors sometimes do not include all the minimum
726
+ data fields as the relevant data is not always attainable. “The
727
+ truth is, I tried to put in as much as what you said (7
728
+ minimum data fields). I don’t have access all the time to all
729
+ the details.” (I11-Dev.&Sec.(SBOM tool)) As a result, when
730
+ relevant information of certain data fields is unavailable, the
731
+ generated SBOMs can be “full of non-assertion elements... In
732
+ practice, this means that, yes, the standards themselves can
733
+ support the NTIA recommendation; No, the tools are omitting
734
+ those fields or leaving them blank.” (I14-Dev.&Sec.&Res.)
735
+ Third, for some organizations producing SBOMs or building
736
+ SBOM tools to produce SBOMs, they want to include/sup-
737
+ port as much “useful” information in SBOMs [S10, 87.7%
738
+ agree, 4.6% disagree]. For the former, since an SBOM can
739
+ effectively help with internal software supply chain manage-
740
+ ment, they prefer to generate more comprehensive SBOMs
741
+ with additional information such as vulnerability. As I13
742
+ mentioned, “we want to produce the best information... then
743
+ the developers can look at it and then do their work” (I13-
744
+ Dev.&Sec.&Res.) For the latter, the more comprehensive in-
745
+ formation their SBOM tools support, the more competitive
746
+ they are in the market. As stated by I11, “I also have a
747
+ big scope of metadata depending on the target other than
748
+ the base.” (I11-Dev.&Sec.(SBOM tool)) Furthermore, as I14
749
+ pointed out, “something relatively worse happens... to create
750
+ business value... they are trying to extend it (an SBOM) with
751
+ things that may or may not be relevant to the problem.” (I14-
752
+ Dev.&Sec.&Res.)
753
+ Finding 4: Despite official recommendations on mini-
754
+ mum SBOM data fields, there is still a lack of consen-
755
+ sus on what to include in SBOMs.
756
+ 5) SBOM distribution: In this subsection we discussed 3
757
+ statements (i.e., S11-S13 in Table III).
758
+ A considerable portion of the respondents agree that “or-
759
+ ganizations generate SBOMs for internal consumption, rather
760
+ than giving them to customers” (I11-Dev.&Sec.(SBOM tool)
761
+ [S11, 40% agree, 38.5% disagree]. The authors notice a lack of
762
+ consensus on this statement from the survey respondents. We
763
+ believe this is consistent with the general “lack of consensus”
764
+ status of the SBOM as in the SBOM readiness report [5],
765
+ resulting from the relative recentness and lack of adoption.
766
+ However, since SBOMs are now being distributed in prac-
767
+ tice, proper distribution mechanisms are needed. According to
768
+
769
+ the SBOM readiness report [5], one of the leading concerns for
770
+ SBOM production is that some information inside an SBOM
771
+ is too sensitive and risky to be public. Since the source code
772
+ is already publicly available for OSS, their SBOMs should be
773
+ public. For proprietary software/components, although some
774
+ of the SBOMs can be public, “authenticated (access control)
775
+ is going to be the norm” (I4-Dev.&Sec) [S12, 76.9% agree,
776
+ 13.8% disagree], depending on the software vendors’ policies.
777
+ “At least for some segments of the market, I think access
778
+ management is part of it. You need to be able to share your
779
+ SBOMs with whomever you want to share, and not have all
780
+ of the world get access to it.” (I12-Cnslt.&Adv.)
781
+ Apart from access control, content tailoring (selective shar-
782
+ ing) is also helpful for mitigating the above concern. There can
783
+ be a negotiated compromise between the software vendor and
784
+ its downstream procurers on what to include in the distributed
785
+ SBOMs, instead of sharing the complete SBOMs [S13, 60%
786
+ agree, 24.6% disagree]. “There’s got to be a mechanism... like
787
+ a router in the middle, that takes the SBOMs or VEXs produced
788
+ by the suppliers and routes them down to each end user, exactly
789
+ what they need.” (I0-Cnslt.&Adv.), so that “only the right
790
+ people can see the right information” (I13–Dev.&Sec.&Res.).
791
+ Finding 5: Proprietary and sensitive information in
792
+ SBOMs introduces barriers to SBOM distribution. Se-
793
+ lective sharing (content tailoring) and access control
794
+ mechanisms need to be considered.
795
+ 6) SBOM validation: This subsection is based on S14 and
796
+ S15 (see Table III).
797
+ The lack of SBOM integrity validation is a shared problem
798
+ mentioned by 13 out of 17 interviewees. Without reliable vali-
799
+ dation measures [S15, 49.3% agree, 26.2% disagree], software
800
+ procurers may only roughly assess the quality of an SBOM
801
+ by referring to the SBOM producer’s reputation [S14, 50.8%
802
+ agree, 13.8% disagree]. SBOM integrity is two-fold: a) SBOM
803
+ data integrity (whether the SBOM has been tampered with),
804
+ and b) SBOM tooling integrity (tooling capability as to the
805
+ competence to generate complete and accurate SBOMs; and
806
+ tooling security as to whether the SBOM generation tools are
807
+ hacked). We discuss SBOM tooling integrity in Section IV-B4.
808
+ SBOM data tampering can come from outside and inside
809
+ an organization (i.e., external/internal tampering). External
810
+ tampering is more straightforward as an SBOM can be “easy
811
+ to tamper (with) and easy to fake” (I14-Dev.&Sec.&Res.)
812
+ without reliable validation methods. Thus, proper validation
813
+ mechanisms are needed (e.g., signing using sigstore’s Cosign).
814
+ Inside tampering means a software vendor may change the
815
+ SBOM data considering customer acceptance and security
816
+ issues. For example, I14 and I15 mentioned instances of
817
+ internal tampering based on their experiences:
818
+ a) “You could have a release engineer at the last minute,
819
+ realizing that they wanted to change the SBOM just because
820
+ otherwise, the customer wouldn’t take it. It’s not that the whole
821
+ organization lied. But it does mean that they got to tamper with
822
+ the SBOM that doesn’t again faithfully represent the product
823
+ that they weren’t given.” (I14-Dev.&Sec.&Res.)
824
+ b) “Whenever we are going to use an open source project,
825
+ there has to be a security check... if some kind of (vulnerable)
826
+ code is there, we just need to remove it... we are not actually
827
+ passing those kinds of changes to the public.” (I15-Dev.)
828
+ Finding 6: Trust in SBOM data needs to be assured
829
+ considering tampering threats. SBOM data valida-
830
+ tion/verification mechanisms and integrity services
831
+ are needed.
832
+ 7) Vulnerability and exploitability:
833
+ In this section we
834
+ discuss SBOMs for vulnerability management and the ex-
835
+ ploitability of vulnerabilities (i.e., S16 in Table III).
836
+ Although vulnerability management is a representative
837
+ SBOM use case [21], vulnerability management currently
838
+ barely considers the actual exploitability [S16, 73.8% agree,
839
+ 13.8% disagree]. Nevertheless, the exploitability of a vulner-
840
+ ability should be taken seriously, as a vulnerability may not
841
+ necessarily be exploitable [22].
842
+ “I think it’s a very, very interesting point, and it’s a very
843
+ legit issue. Vulnerability and exploitability are totally different.
844
+ You can’t simply send a long report to the developers and ask
845
+ them to update each and every vulnerable dependency that
846
+ has been flagged. I know the development team might end up
847
+ ignoring your report, or come back at you saying, ‘are you
848
+ able to exploit this vulnerability? No? Then why should I go
849
+ and update it if you are unable to exploit it?’” (I9-Sec.)
850
+ As mitigation, vulnerabilities are often selectively fixed
851
+ based on the criticality (e.g., The Common Vulnerability Scor-
852
+ ing System (CVSS) score). As stated by I9, “if it’s a critical
853
+ or a high vulnerability... then make sure it is updated. But
854
+ when it comes to (a) medium or low (criticality vulnerability),
855
+ then ignore it.” (I9-Sec.) Although there are efforts towards
856
+ exploitability, such as CISA’s Known Exploited Vulnerabilities
857
+ Catalog that serves as a “must patch list”, there are only
858
+ limited records (around 800 as of August 2022) in this catalog.
859
+ Vulnerability Exploitability eXchange (VEX) has emerged
860
+ as a tailored method to cope with such problems. � A VEX
861
+ is a security advisory produced by a software vendor that
862
+ allows the assertions of the vulnerability status of a software
863
+ product [23]. As companion artifacts to SBOMs [24], VEXs
864
+ provide SBOM operators with clearer understanding of the
865
+ vulnerabilities and suggested remediation. � However, cur-
866
+ rent exploitability evaluation is manual and subjective to the
867
+ domain knowledge of the security experts [25], [26]. Also,
868
+ “the ability to differentiate between whether it’s exploitable or
869
+ not is a hard thing to do itself” (I11-Dev.&Sec.(SBOM tool)),
870
+ “especially if you want to automate it”. (I13–Dev.&Sec.&Res.)
871
+ What is more, “there is no way to confirm this (VEX), and it’s
872
+ actually very, very hard to prove a negative. So if you see a
873
+ VEX entry that says this (vulnerability) doesn’t hit me, the only
874
+
875
+ way to prove it wrong is to make an exploit yourself. Again,
876
+ if you are able to do that, then you’re almost making things
877
+ worse, right? (I14-Dev.&Sec.& Res.)”
878
+ � To further complicate this problem, there is hardly guar-
879
+ anteed unexploitability. As I11, an SBOM tool developer
880
+ with security (hacker) experience, stated, “I agree the more
881
+ valuable these exploitable vulnerabilities are, but I don’t agree
882
+ that the ones defined less exploitable are not valuable. I used
883
+ to be on the attacker’s side... Hackers can take their time,
884
+ and they can find a way to put together a lot of things
885
+ that look very not exploitable, and at the end of the day,
886
+ find themselves with very easy and exploitable access.” (I11-
887
+ Dev.&Sec.(SBOM tool)) A possible solution is there should be
888
+ “potential exploitability” (I14-Dev.&Sec.& Res.).
889
+ Finding 7: It is unclear what to do with vulnerabilities
890
+ with limited exploitability exposed by SBOMs/VEXs.
891
+ 8) AIBOM: This subsection is based on S16 (see Table III).
892
+ AI software is software with AI components. Compared
893
+ with SBOMs for traditional software, SBOMs for AI software
894
+ (i.e., AIBOMs) are different [S16, 47.7% agree, 24.6% dis-
895
+ agree]. Although some interviewees thought an AIBOM “con-
896
+ tains only additional AI package information” (I1-Dev.), the
897
+ AI artifacts (e.g., data, code, model, configuration) also need
898
+ provenance and co-versioning [27], [28]. An AIBOM (see
899
+ Fig. 1) records not only the software composition information
900
+ as a traditional SBOM, but also contains information about
901
+ the data/model/code/configuration co-versioning registries, al-
902
+ lowing transparency and accountability into the AI artifacts
903
+ for AI model training and evaluation. Considering the AI
904
+ software deployment is continuous progress (e.g., continuous
905
+ training in case of data/concept drift), these AI artifacts’ co-
906
+ versioning registries are more dynamic and subject to change,
907
+ while the component inventory information is relatively static.
908
+ To reduce frequent re-generation of the AIBOM, the co-
909
+ versioning registries can be independent of the AIBOMs,
910
+ instead of being embedded in the AIBOMs.
911
+ B. RQ2: What is the current state of SBOM tooling support?
912
+ This section discusses 6 statements (see T2 in Table III).
913
+ Although some practitioners argue that SBOM tools were not
914
+ necessary, the importance and necessity of SBOM tools are
915
+ recognized by most participants. However, the existing tools
916
+ still lack maturity in general and require further development.
917
+ 1) Necessity of SBOM tools: This subsection is based on
918
+ S18 in Table III.
919
+ The most interesting argument about SBOM tooling is the
920
+ necessity of using SBOM tools to generate SBOMs. Since
921
+ currently few organizations (e.g., the US government agencies)
922
+ are actually requiring SBOMs to be provided upon software
923
+ delivery, � some interviewees think they do not have to
924
+ generate SBOMs, especially when most SBOM tools serve
925
+ like a “proxy”: they merely feed the existing metadata (e.g.,
926
+ package manager) into a standard format, but the data is
927
+ already there with or without SBOMs.
928
+ “We do not use SBOMs internally... because we have tools,
929
+ which is where the SBOM information is coming anyway:
930
+ package manager. Those tools generally just take a look at
931
+ the files in the system and the configuration of the system,
932
+ whereas SBOM tools just essentially parse those and then try
933
+ to use that in a format. So, if we don’t have a lot of end users...
934
+ why would we introduce this (SBOM)? It’s like a middleman
935
+ that really doesn’t produce much.” (I14-Dev.&Sec.& Res.)
936
+ � That being said, most survey respondents think generat-
937
+ ing SBOMs using SBOM tools is necessary [S18, 83.1%
938
+ agree, 10.8% disagree], which is consistent with the benefit
939
+ of standardization and unification of the software composition
940
+ data enabled by SBOMs discussed in Section IV-A1.
941
+ 2) Availability of SBOM tools:
942
+ In this subsection, we
943
+ discussed statements S19-S20 in Table III.
944
+ Tooling is an integral part of SBOM, as SBOMs are not
945
+ manually generated nor intended for direct human consump-
946
+ tion. The generation and consumption of SBOMs rely on
947
+ SBOM tools. “Shift left” originates from DevSecOps [29],
948
+ which means shifting the security work to earlier stages of
949
+ the software development life cycle so that security issues can
950
+ be identified and fixed earlier. Considering there is a “lack of
951
+ more developer-oriented (SBOM) tools that are more familiar
952
+ by developers” (I7-Sec.), and SBOMs are tightly coupled with
953
+ security tasks, SBOM tools should also consider “shift left”.
954
+ Despite there is a lot of existing SBOM tools as mentioned
955
+ in Section II, contrary to the finding in the SBOM readiness
956
+ report [5] that “SBOM consumption mirrors SBOM produc-
957
+ tion”, our finding shows that currently, the “SBOM genera-
958
+ tion is ahead of SBOM consumption” (I17-Cnslt.&Adv.), and
959
+ there are significantly limited tools for SBOM consumption
960
+ [S19, 75.4% agree, 12.3% disagree]. As stated by I17, “the
961
+ large bucket of what we don’t have today in 2022 is SBOM
962
+ consumption.” (I17-Cnslt.&Adv.) Without SBOM consumption
963
+ tools, even if an SBOM was provided to a software procurer,
964
+ the procurer would wonder, “what do I do with the SBOMs?
965
+ How do I process them? How do I analyze them?” (I12-
966
+ Cnslt.&Adv.) Besides dedicated SBOM consumption tools, a
967
+ possible solution is to feed SBOMs into existing IT asset
968
+ management tools [S20, 41.5% agree, 12.3% disagree], which
969
+ requires functional extensions.
970
+ 3) Usability of SBOM tools: This section discusses S21-
971
+ S22 in Table III.
972
+ Although the SBOM tools market is proliferating with the
973
+ expectation to “explode” in 2022 and 2023 [5], the usability
974
+ of existing tools remains an issue. SBOM tools can be hard to
975
+ use due to various reasons. (e.g., complexity, aggressivity, lack
976
+ of generalization) [S21, 64.6% agree, 18.5% disagree]. For
977
+ example, “to use the CycloneDX Maven plugin, it’s required
978
+ to import this plugin in the POM.xml file. For open source
979
+ software, it is all right. But for proprietary software, this
980
+ introduces invasion, which can be a problem”. (I3-Dev.)
981
+ Although four interviewees (i.e., I9-I12) mentioned that
982
+ there were user-friendly tools such as Dependency-track, the
983
+
984
+ interviewees also acknowledged that most SBOM tools were
985
+ open source and not enterprise-ready. A problem with open
986
+ source tools is, “an organization needs to have the capability
987
+ of knowing open source projects, running them, fine-tuning
988
+ them towards its needs, maintaining them” (I12-Cnslt.&Adv.),
989
+ which can be a considerable problem for smaller-scale orga-
990
+ nizations and start-ups.
991
+ Tooling interoperability and standardization also hinder the
992
+ usability of SBOM tools [S22, 73.8% agree, 10.8% disagree].
993
+ As mentioned by I17, SBOM tooling is also “an area where
994
+ we need further harmonization and standardization.” (I17-
995
+ Cnslt.& Adv.) For instance, the SBOM data (e.g., component
996
+ hash) of the same software/components generated by different
997
+ tools can be different, while “the whole point of a hash is
998
+ that it should be the same (for the same component), so
999
+ that...downstream users can validate it”. (I17-Cnslt.& Adv.)
1000
+ 4) Integrity of SBOM tools: In this subsection, we discuss
1001
+ SBOM tooling integrity based on S23 in Table III.
1002
+ As mentioned in Section IV-A6, SBOM integrity consists
1003
+ of SBOM data integrity and SBOM tooling integrity. SBOM
1004
+ tooling integrity also includes two aspects: a) tooling compe-
1005
+ tence: the completeness and accuracy of the accuracy caused
1006
+ by SBOM tooling capability; and b) tooling security: whether
1007
+ the SBOM generation toolchain has been maliciously altered.
1008
+ Most respondents agree that the integrity of SBOMs gen-
1009
+ erated by existing tools cannot be validated [S23, 69.2%
1010
+ agree, 18.5% disagree]. The accuracy and completeness of
1011
+ the generated SBOMs caused by tooling competence is a
1012
+ common concern for generating SBOMs. To the best of our
1013
+ knowledge, there is no comprehensive measure or validation
1014
+ against such unintentional mistakes from the end users’ point
1015
+ of view. However, the intentional tampering resulting from
1016
+ compromised toolchains is another story. One possible solution
1017
+ is to evaluate the SBOM tools’ assurance based on Automated
1018
+ Rapid Certification Of Software (ARCOS) [30] though it is
1019
+ still a work in progress.
1020
+ Finding 8: There is a lack of maturity in SBOM tool-
1021
+ ing. More reliable, user-friendly, standard-conformable,
1022
+ and interoperable enterprise-level SBOM tools, espe-
1023
+ cially SBOM consumption tools, are needed.
1024
+ C. RQ3: What are the main concerns for SBOM?
1025
+ This section investigates practitioners’ main concerns for
1026
+ SBOMs based on T3 in Table III. During the interviews,
1027
+ SBOM tool developers’ common concern lay with the SBOM
1028
+ standard formats. Most respondents remained concerned about
1029
+ SBOMs being “roadmaps for attackers” [31]. The most fun-
1030
+ damental issue is the lack of SBOM adoption and education.
1031
+ 1) SBOM formats’ lack of extensibility: In this subsection
1032
+ we discussed S24 in Table III.
1033
+ There are mainly two competing SBOM standard formats
1034
+ (i.e., SPDX and CycloneDX), and neither can fully meet
1035
+ current market needs [S24, 35.4% agree, 33.8% disagree].
1036
+ Notably, this statement was mentioned by both interviewees
1037
+ (i.e., I11, I16) working on SBOM tool development. Although
1038
+ the respondents show a discrepancy and lack of consensus on
1039
+ this statement, it is consistent with the interview results.
1040
+ Interestingly, I11 considered the SBOM format standardiza-
1041
+ tion to be one of the most significant benefits, while agreed
1042
+ the existing standards remain to be developed. � On the one
1043
+ hand, “the big advantage (of SBOMs) is standardization.
1044
+ The formats allow a lot of people to understand the same
1045
+ language” (I11-Dev.&Sec.(SBOM tool)). It offers “a unified
1046
+ framework to communicate software composition information”
1047
+ (I14-Dev.&Sec.& Res.). � On the other hand, some think the
1048
+ formats are not extensible enough. For example, ��current for-
1049
+ mats only support one dependency relationship, DependsOn”
1050
+ (I11-Dev.&Sec.(SBOM tool)). We summarized possible format
1051
+ extension points in Section V-A2 based on the interviews.
1052
+ a) “My biggest concern is the dynamicity and the ability to
1053
+ use the standard formats of SBOMs... to define the things I
1054
+ want to do with these SBOMs.” (I11-Dev.&Sec.(SBOM tool))
1055
+ b) “My biggest concern... is that the standardization is really
1056
+ kind of not good... competing standards... different properties,
1057
+ and different kinds of purposes. But consolidating down until
1058
+ reasonable sets of things are the same between the competing
1059
+ formats would be great.” (I16-Dev.(SBOM tool))
1060
+ Finding 9: Although there is a set of standard formats,
1061
+ they require further consensus, standardization as
1062
+ well as additional extension points.
1063
+ 2) SBOM information sensitivity: In this section, we dis-
1064
+ cussed S25 in Table III.
1065
+ There are two types of opinions among the participants
1066
+ about the SBOM information sensitivity issue: � Some think
1067
+ certain information inside the SBOM is too risky and sensitive
1068
+ to be public, and the information inside an SBOM may serve
1069
+ the attackers as a ”roadmap” of the software and supply
1070
+ chain [S25, 63.1% agree, 20% disagree]. � Meanwhile, others
1071
+ believe that there is no need to worry as the attackers do not
1072
+ need SBOMs because they already have tools to easily get
1073
+ the software composition information. SBOMs are actually
1074
+ roadmaps for defenders to help level the playing field [31].
1075
+ Just as I4 stated, “on the surface, it seems like a valid concern.
1076
+ But... if you’re highly sophisticated cooperation, you probably
1077
+ don’t necessarily need this information. As a start-up, you
1078
+ don’t get to be a target in an attack... I think the benefit of that
1079
+ visibility is certainly on the defender’s side.” (I4-Dev.&Sec.)
1080
+ In addition, access control and content tailoring (see Section
1081
+ IV-A5) can also play a role in mitigating this concern.
1082
+ 3) SBOM adoption and education deficiency: In this sec-
1083
+ tion, we discussed S26 in Table III.
1084
+ The most fundamental and imminent concern is limited
1085
+ SBOM adoption [S26, 80% agree, 7.7% disagree]. Organiza-
1086
+ tions may have various reasons for their hesitation to SBOM
1087
+ adoption. For example, they may worry about the industrial
1088
+
1089
+ consensus or SBOMs’ value to customers, or they may lack
1090
+ even the most basic IT asset management.
1091
+ a) “I’m actually a bit worried about the people producing and
1092
+ consuming SBOMs because I think the market is not really
1093
+ ready. They need to (be) educate(d), and many people don’t
1094
+ know what SBOMs are.” (I11-Dev.&Sec.(SBOM tool))
1095
+ b) “For SBOMs to become valuable to consume, many people
1096
+ need to produce (SBOMs)... So one of the concerns I have
1097
+ about SBOMs is, is everybody going to follow this pattern (to
1098
+ produce SBOMs)? Because there’re obviously people (saying)
1099
+ it’s not accurate so they don’t want to produce it.” (I6-Dev.)
1100
+ However, despite being concerned about SBOM adoption,
1101
+ I6 also agreed that “even the less accurate ones are better
1102
+ than adding no visibility” (I6-Dev.). Because “there’s always
1103
+ going to be a maturity problem. The idea that because some
1104
+ people can’t use SBOM so others shouldn’t... That’s not how
1105
+ we do security.” (I17-Cnslt.&Adv.)
1106
+ SBOM education is needed not only to educate the public
1107
+ for increased SBOM adoption, but the SBOM practitioners
1108
+ also need to be educated and realize SBOMs have unaddressed
1109
+ issues before they rush into generating SBOMs. “The problem
1110
+ right now is that we are almost putting the cart before the
1111
+ horse - we’re expecting the SBOMs to fix the problems rather
1112
+ than fixing the problems with an SBOM.” (I14-Dev.&Sec.)
1113
+ Finding 10: There is a lack of market awareness and
1114
+ good value propositions for SBOM adoption. SBOM
1115
+ advocators need to: a) leverage relevant regulation
1116
+ and use cases such as procurement evaluation and
1117
+ supply chain risk management to improve SBOM
1118
+ awareness; and b) promote more SBOM consump-
1119
+ tion tools with clear benefits.
1120
+ V. DISCUSSION AND IMPLICATIONS
1121
+ A. Implications
1122
+ This section discusses below key implications for future
1123
+ SBOM research and development.
1124
+ 1) Goal model: Based on the study results, we present
1125
+ a goal model for future SBOM endeavors (see Fig. 3). As
1126
+ mentioned in Sections IV-A2 and IV-C3, the lack of SBOM
1127
+ adoption causes a substantial obstacle to SBOM progress.
1128
+ To achieve increased SBOM adoption and more SBOM-
1129
+ enabled benefits, there are three goals to be satisfied:
1130
+ a) Higher-quality SBOM generation (findings 3, 4, 6,
1131
+ 8, and 9): maturer tooling support for the generation of
1132
+ more standardized tamper-proof “dynamic” SBOMs [32]. For
1133
+ instance, further standardization on SBOM-included data fields
1134
+ is needed. SBOM industry should strictly conform to an agreed
1135
+ minimum data fields, while considering different industry and
1136
+ business sectors when adding optional data fields.
1137
+ b) Clearer benefits and use cases for SBOM consumption
1138
+ (findings 1, 2, 10): SBOM education (e.g., on SBOM-enabled
1139
+ benefits) results in increased SBOM adoption (including con-
1140
+ sumption); Increased SBOM adoption, in turn, leads to more
1141
+ developed SBOM-centric ecosystems with favorable use cases.
1142
+ c) Lower barriers in SBOM sharing and distribution
1143
+ (findings 5 and 7): The distribution and sharing of SBOMs and
1144
+ the vulnerability status (e.g., VEXs) need to be more flexible
1145
+ with proper mechanisms that meet both the software ven-
1146
+ dors’ and procurers’ needs. Technologies such as Blockchain,
1147
+ confidential computing (e.g., zero-knowledge proofs, secure
1148
+ multiparty computation for sharing without access) can poten-
1149
+ tially be leveraged to communicate SBOM data. During the
1150
+ distribution of SBOM data, there also need to be risk-based
1151
+ flexible policies to communicate unfixed vulnerabilities.
1152
+ Fig. 3. SBOM goal model.
1153
+ 2) Format extension points: As discussed in Section IV-C,
1154
+ the interviewees mentioned several potential extensions to
1155
+ the existing SBOM formats. Other than supporting more de-
1156
+ pendency relationship types, another possible extension point
1157
+ is component types. “For example, the components of a
1158
+ Git is the commits, and CycloneDX does not have such a
1159
+ component (type) defined.” (I11-Dev.&Sec.(SBOM tool)) The
1160
+ third extension point is file location. “My organization has its
1161
+ own SBOM format... which has... things like where does it find
1162
+ something in a file system... However, formats like SPDX might
1163
+ not have a place for that.” (I16-Dev.(SBOM tool)) Apart from
1164
+ the three points mentioned by interviewees, another essential
1165
+ point is verifiable credentials [27] embedded in or linked to an
1166
+ SBOM. For traditional software, such credentials can prove the
1167
+ validity of software/components. For AI software, responsible
1168
+ AI-related information such as conformance to certain AI
1169
+ ethics principles can be included.
1170
+ B. Positioning with respect to SBOM readiness report
1171
+ This section compares the key differences between our
1172
+ findings and the SBOM readiness report’s results. This study
1173
+ broadens/deepens the SBOM readiness report mainly from 9
1174
+ SBOM aspects: benefits, adoption, generation, distribution, in-
1175
+ tegrity, vulnerability management (with SBOMs/VEXs), tool-
1176
+ ing, concerns, and AIBOM (See Table IV).
1177
+ C. Threats to validity
1178
+ The number of survey participants may pose a threat to
1179
+ validity. However, considering the relative novelty of SBOM
1180
+ and the lack of SBOM adoption, we believe this threat can be
1181
+ justified. It is possible that some of the survey respondents
1182
+
1183
+ Increased SBOM adoption and more
1184
+ SBOM-enabled benefits
1185
+ Higher-quality
1186
+ Clearer benefits & use cases
1187
+ Lower barriers in SBOM
1188
+ SBOM generation
1189
+ for SBOM consumption
1190
+ sharing & distribution
1191
+ 10
1192
+ Tooling
1193
+ Dynamic
1194
+ Validation/
1195
+ Consumption
1196
+ SBOM
1197
+ Adoption
1198
+ (Vulnerability)
1199
+ Standardization
1200
+ verification
1201
+ -driven design incentives promotion
1202
+ Distribution
1203
+ generation
1204
+ maturityTABLE IV
1205
+ SBOM READINESS REPORT V.S. THIS PAPER
1206
+ Topics
1207
+ SBOM readiness report
1208
+ This paper
1209
+ Benefits
1210
+ 16 specific benefits of SBOMs (10 for producing and 6 for
1211
+ consuming SBOMs), all enabled by transparency.
1212
+ Transparency, and subsequently enabled accountability, traceability, and
1213
+ security. (Finding 1)
1214
+ Adoption
1215
+ 90% surveyed organizations have started SBOM journey;
1216
+ 47% are using (i.e., producing/consuming) SBOMs.
1217
+ SBOM adoption is worrying: limited generation & more limited consumption.
1218
+ (Findings 1, 2, 10)
1219
+ Generation
1220
+ a) SBOMs can be generated at different SDLC stages.
1221
+ b) More organizations favor including more than baseline
1222
+ SBOM information.
1223
+ a) SBOMs can be generated at different SDLC stages but practitioners expect
1224
+ “dynamic” SBOM generation throughout SDLC (Finding 3).
1225
+ b) SBOM-included data fields need further standardization (Finding 4).
1226
+ Distribution
1227
+ N/A
1228
+ Secure yet flexible SBOM distribution mechanisms are needed. (Finding 5)
1229
+ Integrity
1230
+ N/A
1231
+ SBOM integrity assurances are needed against tampering threats. (Finding 6)
1232
+ Vulnerability
1233
+ SBOMs should reflect vulnerability information.
1234
+ a) Organizations may not want to share sensitive (vulnerability) data
1235
+ (Finding 5).
1236
+ b) Mechanisms are needed to communicate vulnerabilities with limited/
1237
+ undetermined exploitability (Finding 7).
1238
+ Tooling
1239
+ Limited availability of SBOM tooling
1240
+ Affirmed necessity but limited availability, usability, and integrity of SBOM
1241
+ tooling. (Finding 8)
1242
+ Concerns
1243
+ 4 shared concerns for production & consumption: industry
1244
+ commitment, data fields consensus, value of SBOMs,
1245
+ tooling availability. 2 additional concerns for production:
1246
+ information privacy, correctness.
1247
+ Explicitly identifies 3 major concerns but covers more throughout
1248
+ a) Standard formats’ lack of extensibility (Finding 9).
1249
+ b) SBOM information sensitivity & privacy (Finding 5).
1250
+ c) Adoption and education deficiency (Finding 10).
1251
+ AIBOM
1252
+ N/A
1253
+ AIBOM should also include AI/ML-specific data. (Section IV-A8)
1254
+ do not have a comprehensive understanding on SBOMs,
1255
+ which may introduce noise to the collected data. To mitigate
1256
+ this threat, we let the respondents choose whether they are
1257
+ familiar with SBOMs. If their answer is no, the survey will
1258
+ automatically end. Still, we cannot fully ascertain whether the
1259
+ collected responses are accurate reflections of their beliefs. It
1260
+ is a common and tolerable threat to validity in many existing
1261
+ similar empirical studies, which assume that the majority of
1262
+ responses truly reflect what respondents truly believe.
1263
+ VI. RELATED WORK
1264
+ On the one hand, there has been work on SSC security.
1265
+ For instance, Ohm et al. [4] summarized 174 OSS packages
1266
+ used for real-world malicious SSC attacks. Blockchain has
1267
+ been applied to SSC security (e.g., [33]–[35]. Especially,
1268
+ Marjanovi´c et al. [36] used blockchain-based techniques to
1269
+ record the software composition details. On the other hand,
1270
+ there are limited scholarly papers on SBOMs. Martin et al. [21]
1271
+ introduced the concept of the SBOM and listed nine possible
1272
+ use scenarios. In 2021, Carmody et al. [37] presented a high-
1273
+ level overview of how SBOMs help build resilient medical
1274
+ SSCs. They illustrated the benefits of SBOMs for software pro-
1275
+ ducers, consumers and regulators, as well as relevant progress
1276
+ on SBOMs. Back in 2019, Barclay et al. [38] introduced their
1277
+ ideas on applying BOMs to data ecosystems for transparency
1278
+ and traceability, where they detailed a conceptual model to
1279
+ combine a BOM (static) and a bill of lots (dynamic) to jointly
1280
+ record the static data components and the dynamic data of
1281
+ a specific experiment. Based on their previous work, as a
1282
+ step towards operationalizing the conceptual model, Barclay
1283
+ et al. [39] recently introduced their work using a BOM as a
1284
+ verifiable credential for transparency into the AI SSCs, which
1285
+ is a step towards AIBOM.
1286
+ VII. CONCLUSION AND FUTURE WORK
1287
+ SBOMs are essential to SSC security considering the trans-
1288
+ parency enabled by SBOMs and the subsequently enhanced
1289
+ accountability, traceability and security. In this study, we
1290
+ interviewed 17 and surveyed 65 SBOM practitioners on their
1291
+ perception of SBOM. Despite the promising SSC transparency
1292
+ and security enabled by SBOMs, there are still open challenges
1293
+ to be addressed. To accelerate the adoption of SBOMs, higher-
1294
+ quality SBOM generation, clearer benefits and use cases in
1295
+ SBOM consumption, and lower barriers in SBOM sharing are
1296
+ prerequisites which need to be further studied, mitigated and
1297
+ addressed. In addition, SBOMs for AI software (i.e., AIBOM)
1298
+ are an inevitable trend given the popularity of AI and AI
1299
+ software, and AIBOMs need to consider the co-evolution of
1300
+ data/model/code/configuration.
1301
+ ACKNOWLEDGMENT
1302
+ The authors would like to thank all the interview and survey
1303
+ participants for their great help and support. This work could
1304
+ never have been accomplished without them.
1305
+ REFERENCES
1306
+ [1] NTIA, “Framing Software Component Transparency: Establishing a
1307
+ Common Software Bill of Material (SBOM).” [Online]. Available:
1308
+ https://ntia.gov/files/ntia/publications/framingsbom 20191112.pdf
1309
+ [2] Wikipedia contributors, “Solarwinds — Wikipedia, the free encyclo-
1310
+ pedia,” https://en.wikipedia.org/w/index.php?title=SolarWinds&oldid=
1311
+ 1104117684, 2022, [Online; accessed 25-August-2022].
1312
+ [3] Sonatype, “The 2021 State of the Software Supply Chain Report.”
1313
+ [Online]. Available: https://www.sonatype.com/resources/state-of-the-
1314
+ software-supply-chain-2021
1315
+ [4] M. Ohm, H. Plate, A. Sykosch, and M. Meier, “Backstabber’s knife
1316
+ collection: A review of open source software supply chain attacks,” in
1317
+ International Conference on Detection of Intrusions and Malware, and
1318
+ Vulnerability Assessment.
1319
+ Springer, 2020, pp. 23–43.
1320
+
1321
+ [5] “The State of Software Bill of Materials (SBOM) and Cybersecurity
1322
+ Readiness.”
1323
+ [Online].
1324
+ Available:
1325
+ https://www.linuxfoundation.org/
1326
+ tools/the-state-of-software-bill-of-materials-sbom-and-cybersecurity-
1327
+ readiness/
1328
+ [6] A. Singh, R. Bansal, and N. Jha, “Open source software vs proprietary
1329
+ software,” International Journal of Computer Applications, vol. 114,
1330
+ no. 18, 2015.
1331
+ [7] D. Serpanos and T. Komninos, “The cyberwarfare in ukraine,” Com-
1332
+ puter, vol. 55, no. 7, pp. 88–91, 2022.
1333
+ [8] NTIA, “The Minimum Elements For a Software Bill of Materials
1334
+ (SBOM).”
1335
+ [Online].
1336
+ Available:
1337
+ https://www.ntia.doc.gov/files/ntia/
1338
+ publications/sbom minimum elements report.pdf
1339
+ [9] Gartner Research, “Innovation Insight for SBOMs.” [Online]. Available:
1340
+ https://www.gartner.com/en/documents/4011501
1341
+ [10] J. Jiao, M. M. Tseng, Q. Ma, and Y. Zou, “Generic bill-of-materials-
1342
+ and-operations for high-variety production management,” Concurrent
1343
+ Engineering, vol. 8, no. 4, pp. 297–321, 2000.
1344
+ [11] Google Cloud, “Delivering software securely.” [Online]. Available: https:
1345
+ //cloud.google.com/resources/delivering-software-securely-whitepaper
1346
+ [12] B. Bensing, “History of the Software Bill of Materials (SBOM).”
1347
+ [Online].
1348
+ Available:
1349
+ https://billbensing.com/software-supply-chain/
1350
+ history-software-bill-of-material-sbom/
1351
+ [13] “Executive Order on Improving the Nation’s Cybersecurity,” May
1352
+ 2021.
1353
+ [Online].
1354
+ Available:
1355
+ https://www.whitehouse.gov/briefing-
1356
+ room/presidential-actions/2021/05/12/executive-order-on-improving-
1357
+ the-nations-cybersecurity/
1358
+ [14] E-SPIN, “The Evolution of Software Composition Analysis (SCA),”
1359
+ https://www.e-spincorp.com/the-evolution-of-software-composition-
1360
+ analysissca/, 2018, [Online; accessed 25-August-2022].
1361
+ [15] S. Easterbrook, J. Singer, M.-A. Storey, and D. Damian, “Selecting
1362
+ empirical methods for software engineering research,” in Guide to
1363
+ advanced empirical software engineering.
1364
+ Springer, 2008, pp. 285–
1365
+ 311.
1366
+ [16] J. A. Smith, “Qualitative psychology: A practical guide to research
1367
+ methods,” Qualitative psychology, pp. 1–312, 2015.
1368
+ [17] T. Bi, X. Xia, D. Lo, J. Grundy, T. Zimmermann, and D. Ford,
1369
+ “Accessibility in software practice: A practitioner’s perspective,” ACM
1370
+ Transactions on Software Engineering and Methodology (TOSEM),
1371
+ vol. 31, no. 4, pp. 1–26, 2022.
1372
+ [18] J. Cohen, “A coefficient of agreement for nominal scales,” Educational
1373
+ and psychological measurement, vol. 20, no. 1, pp. 37–46, 1960.
1374
+ [19] B. A. Kitchenham and S. L. Pfleeger, “Personal opinion surveys,” in
1375
+ Guide to advanced empirical software engineering.
1376
+ Springer, 2008,
1377
+ pp. 63–92.
1378
+ [20] X. Hu, X. Xia, D. Lo, Z. Wan, Q. Chen, and T. Zimmermann,
1379
+ “Practitioners’ expectations on automated code comment generation,”
1380
+ in Proceedings of the 44th International Conference on Software
1381
+ Engineering, ser. ICSE ’22.
1382
+ New York, NY, USA: Association
1383
+ for Computing Machinery, 2022, p. 1693–1705. [Online]. Available:
1384
+ https://doi.org/10.1145/3510003.3510152
1385
+ [21] R. A. Martin, “Visibility & control: Addressing supply chain challenges
1386
+ to trustworthy software-enabled things,” in 2020 IEEE Systems Security
1387
+ Symposium (SSS), 2020, pp. 1–4.
1388
+ [22] J. Yin, M. Tang, J. Cao, and H. Wang, “Apply transfer learning
1389
+ to
1390
+ cybersecurity:
1391
+ Predicting
1392
+ exploitability
1393
+ of
1394
+ vulnerabilities
1395
+ by
1396
+ description,” Knowledge-Based Systems, vol. 210, p. 106529, 2020.
1397
+ [Online]. Available: https://www.sciencedirect.com/science/article/pii/
1398
+ S0950705120306584
1399
+ [23] CISA, “Vulnerability Exploitability eXchange (VEX) - Status Justifica-
1400
+ tions,” p. 13, 2022.
1401
+ [24] NTIA, “Sharing and Exchanging SBOMs.” [Online]. Available: https:
1402
+ [27] Q. Lu, L. Zhu, X. Xu, J. Whittle, and Z. Xing, “Towards a Roadmap
1403
+ on Software Engineering for Responsible AI,” in 2022 IEEE/ACM 1st
1404
+ //www.ntia.doc.gov/files/ntia/publications/ntia sbom framing sharing
1405
+ july9.pdf
1406
+ [25] A. A. Younis, Y. K. Malaiya, and I. Ray, “Using attack surface
1407
+ entry points and reachability analysis to assess the risk of software
1408
+ vulnerability exploitability,” in 2014 IEEE 15th International Symposium
1409
+ on High-Assurance Systems Engineering, 2014, pp. 1–8.
1410
+ [26] B.
1411
+ Slava,
1412
+ “The
1413
+ end
1414
+ goal
1415
+ for
1416
+ SBOMs
1417
+ -
1418
+ lessons
1419
+ learned
1420
+ from
1421
+ parallel
1422
+ cybersecurity
1423
+ markets
1424
+ |
1425
+ LinkedIn.”
1426
+ [Online]. Available: https://www.linkedin.com/pulse/end-goal-sboms-
1427
+ lessons- learned- from- parallel- markets- slava- bronfman/?trackingId=
1428
+ L48%2BvRWJfddIMba1jDSHNQ%3D%3D
1429
+ International Conference on AI Engineering – Software Engineering for
1430
+ AI (CAIN), 2022, pp. 101–112.
1431
+ [28] I. Barclay, A. Preece, I. Taylor, S. K. Radha, and J. Nabrzyski,
1432
+ “Providing assurance and scrutability on shared data and machine
1433
+ learning
1434
+ models
1435
+ with
1436
+ verifiable
1437
+ credentials,”
1438
+ Concurrency
1439
+ and
1440
+ Computation: Practice and Experience, vol. n/a, no. n/a, p. e6997,
1441
+ eprint: https://onlinelibrary.wiley.com/doi/pdf/10.1002/cpe.6997. [On-
1442
+ line].
1443
+ Available:
1444
+ https://onlinelibrary.wiley.com/doi/abs/10.1002/
1445
+ cpe.6997
1446
+ [29] R. N. Rajapakse, M. Zahedi, M. A. Babar, and H. Shen, “Challenges and
1447
+ solutions when adopting DevSecOps: A systematic review,” Information
1448
+ and Software Technology, vol. 141, p. 106700, 2022. [Online]. Available:
1449
+ https://www.sciencedirect.com/science/article/pii/S0950584921001543
1450
+ [30] W.
1451
+ Martin,
1452
+ “Automated
1453
+ Rapid
1454
+ Certification
1455
+ Of
1456
+ Software.”
1457
+ [Online]. Available: https://www.darpa.mil/program/automated-rapid-
1458
+ certification-of-software
1459
+ [31] “Sbom Myths vs. Facts.” [Online]. Available: https://www.ntia.gov/
1460
+ files/ntia/publications/sbom myths vs facts nov2021.pdf
1461
+ [32] Rezilion,
1462
+ “Dynamic
1463
+ SBOM:
1464
+ A
1465
+ Comprehensive
1466
+ Guide,”
1467
+ https : / /
1468
+ www.rezilion.com/blog/dynamic-sbom-a-comprehensive-guide/, 2022,
1469
+ [Online; accessed 31-August-2022].
1470
+ [33] M. Mylrea and S. N. G. Gourisetti, “Blockchain for supply chain
1471
+ cybersecurity, optimization and compliance,” in 2018 Resilience Week
1472
+ (RWS), 2018, pp. 70–76.
1473
+ [34] E. Bandara, S. Shetty, A. Rahman, and R. Mukkamala, “Let’strace
1474
+ — blockchain, federated learning and tuf/in-toto enabled cyber supply
1475
+ chain provenance platform,” in MILCOM 2021 - 2021 IEEE Military
1476
+ Communications Conference (MILCOM), 2021, pp. 470–476.
1477
+ [35] H. Zhang, T. Nakamura, and K. Sakurai, “Security and trust issues
1478
+ on digital supply chain,” in 2019 IEEE Intl Conf on Dependable,
1479
+ Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence
1480
+ and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf
1481
+ on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/-
1482
+ CyberSciTech), 2019, pp. 338–343.
1483
+ [36] J. Marjanovi´c, N. Dalˇcekovi´c, and G. Sladi´c, “Improving critical infras-
1484
+ tructure protection by enhancing software acquisition process through
1485
+ blockchain,” in 7th Conference on the Engineering of Computer Based
1486
+ Systems, 2021, pp. 1–7.
1487
+ [37] S. Carmody, A. Coravos, G. Fahs, A. Hatch, J. Medina, B. Woods, and
1488
+ J. Corman, “Building resilient medical technology supply chains with a
1489
+ software bill of materials,” npj Digital Medicine, vol. 4, no. 1, pp. 1–6,
1490
+ Feb. 2021, number: 1 Publisher: Nature Publishing Group. [Online].
1491
+ Available: https://www.nature.com/articles/s41746-021-00403-w
1492
+ [38] I. Barclay, A. Preece, I. Taylor, and D. Verma, “Towards traceability
1493
+ in data ecosystems using a bill of materials model,” arXiv preprint
1494
+ arXiv:1904.04253, 2019.
1495
+ [39] I. Barclay, A. Preece, I. Taylor, S. K. Radha, and J. Nabrzyski, “Pro-
1496
+ viding assurance and scrutability on shared data and machine learning
1497
+ models with verifiable credentials,” Concurrency and Computation:
1498
+ Practice and Experience, p. e6997, 2022.
1499
+
PdE4T4oBgHgl3EQf-Q54/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
Q9E5T4oBgHgl3EQfZg88/content/tmp_files/2301.05581v1.pdf.txt ADDED
@@ -0,0 +1,2209 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ The Numerical Flow Iteration for the
2
+ Vlasov–Poisson Equation
3
+ Matthias Kirchhart∗
4
+ R. Paul Wilhelm∗
5
+ Abstract
6
+ We present the numerical ow iteration (NuFI) for solving the Vlasov–Poisson equation. In a certain
7
+ sense specied later herein, NuFI provides infnite resolution of the distribution function. NuFI exactly
8
+ preserves positivity, all Lp-norms, charge, and entropy. Numerical experiments show no energy drift.
9
+ NuFI is fast, requires several orders of magnitude less memory than conventional approaches, and
10
+ can very eciently be parallelised on GPU clusters. Low delity simulations provide good qualitative
11
+ results for extended periods of time and can be computed on low-cost workstations.
12
+ 1 Introduction
13
+ 1.1 The Vlasov–Poisson Equation
14
+ Our problem of interest is a simplied model for the evolution of plasmas in their collisionless limit, as they
15
+ occur in, for example, nuclear fusion devices. In dimensionless form it is given by the following system:
16
+ ∂tf + v · ∇xf − E · ∇vf = 0,
17
+ (1)
18
+ E := −∇xφ,
19
+ (2)
20
+ −∆xφ = ρ,
21
+ (3)
22
+ ρ(t, x) := ¯ρ −
23
+
24
+ Rd f(t, x, v) dv▷
25
+ (4)
26
+ Here, f = f(t, x, v) is the electron distribution function, i. e., f(t, x, v) ≥ 0 describes the probability density
27
+ of electrons having velocity v ∈ Rd and location x ∈ Rd at time t ∈ R. The Vlasov–Poisson equation for
28
+ Plasmas is typically investigated for d ∈ {1, 2, 3}. In this work we will assume periodic boundary conditions
29
+ in x, i. e., Ω := [0, L]d with L > 0, such that for all Cartesian basis vectors ei ∈ Rd and all k ∈ Z one has
30
+ f(t, x + Lkei, v) = f(t, x, v).
31
+ To obtain a well-posed problem, non-negative initial data of f needs to be supplied, usually at time
32
+ t = 0:
33
+ f(t = 0, x, v) = f0(x, v) for a given x-periodic f0 ∈ L1(Ω × Rd) ∩ L∞(Rd × Rd), f0 ≥ 0 a. e.
34
+ (5)
35
+ In many computational benchmarks f0 is a smooth function which is given as a relatively simple expression.
36
+ Usually f0 decays exponentially as |v| → ∞, so in computational practice one pretends that one has
37
+ f(t, x, v) = 0 whenever |v| ≥ vmax for some user-dened parameter vmax.
38
+ Equation (4) denes the charge density ρ; the parameter ¯ρ stems from the assumption of a uniform ion-
39
+ background and needs to be chosen such that overall neutrality is preserved, i. e., ∀t ≥ 0 :
40
+
41
+ Ω ρ(t, x) dx = 0.
42
+ Neglecting collisions and the magnetic eld, the Vlasov equation (1) then describes the evolution of f
43
+ under the inuence of the self-consistent electric eld E = E(t, x), given in terms of the electric potential
44
+ φ = φ(t, x), which in turn is given as the solution of the Poisson equation (3).
45
+ ∗Applied and Computational Mathematics, RWTH Aachen University, Schinkelstraße 2, 52062 Aachen, Germany.
46
47
+ 1
48
+
49
+ 0
50
+ π
51
+ 2
52
+ π
53
+
54
+ 2
55
+
56
+
57
+ 2
58
+
59
+
60
+ 2
61
+
62
+ 0
63
+ 0.05
64
+ 0.1
65
+ 0.15
66
+ 0.2
67
+ 0.25
68
+ 0.3
69
+ x
70
+ fτ,h(30, x, 0)
71
+ t = 30
72
+ 0
73
+ π
74
+ 2
75
+ π
76
+
77
+ 2
78
+
79
+
80
+ 2
81
+
82
+
83
+ 2
84
+
85
+ 0
86
+ 0.05
87
+ 0.1
88
+ 0.15
89
+ 0.2
90
+ 0.25
91
+ 0.3
92
+ x
93
+ fτ,h(100, x, 0)
94
+ t = 100
95
+ Figure 1: Cross-sections at v = 0 of approximations to distribution function f(t, x, v) for the two stream
96
+ instability benchmark in d = 1, see Section 4.2, at times t = 30 and t = 100. Computed using
97
+ the numerical ow iteration as described below, using Nx = 64 and Nv = 256. The emergence
98
+ of laments which grow ever ner with time is clearly visible. Due to their nite resolution, all
99
+ mesh-based approaches which directly discretise f will eventually fail to reproduce these laments
100
+ accurately.
101
+ 1.2 Challenges in Numerical Algorithms for the Vlasov–Poisson Equation
102
+ Supercially, numerically solving the Vlasov–Poisson equation might seem simple: assuming for the moment
103
+ the electric eld E was known, the Vlasov equation (1) is a linear advection equation that can be solved
104
+ using classical numerical schemes, e. g., nite dierences with upstream discretisation. From such an
105
+ approximation, the charge density ρ could be computed directly; solving the Poisson equation (3) also is
106
+ a classical problem for which there are many ecient algorithms available. The resulting approximation
107
+ of the electric potential can then be fed back into the Vlasov solver to proceed by one time-step into the
108
+ future.
109
+ While possible in theory, such a simple approach faces many problems in practice. Grid- and particle-
110
+ based methods that directly discretise f face the curse of dimensionality: the 2d-dimensional (x, v)-space
111
+ results in extremely large memory requirements. For such schemes, simulating the three-dimensional case
112
+ (d = 3) usually is – if at all – only feasible on very large high-performance computers. At the same time,
113
+ such schemes typically have very low arithmetic intensity, i. e., a low FLOP/byte count. Modern computer
114
+ architectures struggle to deliver good performance for such schemes.
115
+ Even if these issues could be overcome, we want to particularly emphasise the diculty due to so-called
116
+ laments, i. e., very ne details that develop in the solution over time. This is illustrated in Figure 1, which
117
+ shows cross-sections of a numerical solution to a well-known benchmark problem at two dierent times t.
118
+ The increasing lamentation in the solution manifests itself as oscillations with frequencies that rapidly
119
+ increase over time t. As the laments become too small for a given resolution, conventional discretisations
120
+ often begin to violate several of the conservation laws discussed in Section 2.5. In this sense, these schemes
121
+ then give unphysical results. For example, avoiding overshoots and negative values of f near laments is
122
+ very dicult for many high-order schemes.
123
+ 1.3 Overview
124
+ The rest of this article is structured as follows. Section 2 introduces the numerical ow iteration and
125
+ discusses mathematical and practical issues. In Section 3 we elaborate on relationships with other methods
126
+ found in the literature. Numerical experiments are discussed in Section 4. We conclude with an outlook to
127
+ possible future extensions in Section 5.
128
+ 2 The Numerical Flow Iteration
129
+ To understand NuFI, we will rst need to introduce the exact ow associated with the Vlasov–Poisson
130
+ equation. We then proceed by introducing the components of NuFI and also discuss several important
131
+ conservation properties.
132
+ 2
133
+
134
+ 2.1 The Exact Flow and Solution to the Vlasov–Poisson Equation
135
+ Assume we knew the velocity v ∈ Rd and position x ∈ Rd of some imaginary ‘particle’ at time s ∈ R. If we
136
+ furthermore assume that the electric eld E was known for all times t, we can trace the state
137
+
138
+ ˆx(t), ˆv(t)
139
+
140
+ of
141
+ that imaginary particle both forward (t > s) and backward (t < s) in time by solving the following initial
142
+ value problem:
143
+ d
144
+ dt ˆx(t) = ˆv(t),
145
+ ˆx(s) = x,
146
+ d
147
+ dt ˆv(t) = −E
148
+
149
+ t, ˆx(t)
150
+
151
+ ,
152
+ ˆv(s) = v▷
153
+ (6)
154
+ Equation (6) is the denition of the characteristic lines of the Vlasov equation (1). Assuming E is suciently
155
+ smooth, as a consequence of the Picard–Lindel¨of theorem, it is well-known that this system has a unique
156
+ solution for any (s, x, v) ∈ R × Rd × Rd. This leads us to the following denition:
157
+ Denition 2.1 (Flow). The ow Φt
158
+ s(x, v) of the Vlasov–Poisson equation is dened as the unique solution
159
+ of the initial value problem (6):
160
+ Φt
161
+ s(x, v) :=
162
+
163
+ ˆx(t), ˆv(t)
164
+
165
+
166
+ We will sometimes use the term exact ow to distinguish Φt
167
+ s from approximative, numerical ows.
168
+ In other words: Φt
169
+ s(x, v) tells us the position and velocity at some time t of a particle with given state
170
+ (x, v) at time s. Note that system (6) is symplectic, and the following lemma is a well-known consequence
171
+ that will be of great importance later on.
172
+ Lemma 2.2 (Volume Preservation of the Exact Flow). The ow Φt
173
+ s : Rd × Rd → Rd × Rd is a
174
+ dieomorphism that preserves volume in phase-space:
175
+ ∀s, t ∈ R : ∀(x, v) ∈ Rd × Rd :
176
+ det ∇(x,v)Φt
177
+ s(x, v) ≡ 1▷
178
+ With help of the ow Φt
179
+ s, the exact solution to the Vlasov–Poisson system takes a very simple form.
180
+ Lemma 2.3 (Solution Formula). Let the non-negative distribution function f be given at initial time
181
+ t = 0, i. e., assume we were given f0(x, v) ≥ 0 such that f(0, x, v) = f0(x, v) for all (x, v) ∈ Rd × Rd. Then
182
+ the (exact) solution to the Vlasov–Poisson equation is given by:
183
+ ∀(t, x, v) ∈ R × Rd × Rd :
184
+ f(t, x, v) = f0
185
+
186
+ Φ0
187
+ t(x, v)
188
+
189
+
190
+ 2.2 The Numerical Flow and Solution to the Vlasov–Poisson Equation
191
+ In NuFI, the exact numerical ow Φ is replaced by a numerical approximation Ψ. For the moment we
192
+ will still assume the electric eld E was known for all times t. For simplicity of the exposition, we will
193
+ restrict ourselves to the case Φ0
194
+ t ≈ Ψ0
195
+ nτ, n ∈ N0, that is, we only consider discrete times t = nτ ≥ 0 with a
196
+ user-dened time-step τ > 0. However, extensions to arbitrary t are certainly possible.
197
+ Due to the symplecticity of system (6), it is natural to approximate Φ0
198
+ t using a symplectic one-step
199
+ method for ordinary dierential equations. In this work, we will use the well-known St¨ormer–Verlet
200
+ method.[1] Noting that we are going backwards in time, in mathematical notation we have:
201
+ Ψ0
202
+ nτ = Ψ0
203
+ τ ◦ Ψτ
204
+ 2τ ◦ Ψ2τ
205
+ 3τ ◦ Ψ3τ
206
+ 4τ ◦ · · · ◦ Ψ(n−1)τ
207
+
208
+ ,
209
+ (7)
210
+ where an individual step Ψ(k−1)τ
211
+
212
+ (x, v), k ∈ {1, ▷ ▷ ▷ , n}, is given as:
213
+ vk− 1
214
+ 2 := v + τ
215
+ 2E(kτ, x),
216
+ xk−1 := x − τvk− 1
217
+ 2 ,
218
+ vk−1 := vk− 1
219
+ 2 + τ
220
+ 2E
221
+
222
+ (k − 1)τ, xk−1
223
+
224
+ ,
225
+ Ψ(k−1)τ
226
+
227
+ (x, v) := (xk−1, vk−1)▷
228
+ (8)
229
+ We believe that it is important to point out that Ψ0
230
+ nτ can easily and eciently be implemented on
231
+ computer hardware, at a cost of just one evaluation of E per time-step. In the following C++ snippet vec
232
+ stands for a d-dimensional vector of oating point values.
233
+ 3
234
+
235
+ void
236
+ numerical_flow ( size_t n, double tau , vec &x, vec &v )
237
+ {
238
+ if ( n == 0 ) return;
239
+ // Omit the
240
+ following
241
+ single
242
+ line for
243
+ Psi_tilda:
244
+ v += (tau /2)*E(n*tau ,x);
245
+ while ( --n )
246
+ {
247
+ x -= tau * v;
248
+ // Inverse
249
+ signs; we are
250
+ v += tau * E(n*tau ,x); // going
251
+ backwards in time!
252
+ }
253
+ x -= tau*v;
254
+ v += (tau /2)*E(0,x);
255
+ }
256
+ This code also mentions the closely related function ˜Ψ0
257
+ nτ, which is dened such that Ψ0
258
+ nτ(x, v) = ˜Ψ0
259
+
260
+
261
+ x, v +
262
+ τ
263
+ 2E(nτ, x)
264
+
265
+ , which we will need later on.
266
+ The St¨ormer–Verlet method is second order accurate in time: |Φ0
267
+ nτ(x, v) − Ψ0
268
+ nτ(x, v)| = O(τ 2). Moreover,
269
+ this method is symmetric, i. e., running the method backwards in time is the same as running the forward
270
+ method on the time-reversed Vlasov–Poisson equation. With the numerical ow in place, it is natural to
271
+ dene approximations of the following shape:
272
+ f(nτ, x, v) = f0
273
+
274
+ Φ0
275
+ nτ(x, v)
276
+
277
+ ≈ f0
278
+
279
+ Ψ0
280
+ nτ(x, v)
281
+
282
+ =: fτ(nτ, x, v)▷
283
+ (9)
284
+ Several remarks are in order:
285
+ • Both Ψ0
286
+ nτ and ˜Ψ0
287
+ nτ can be computed at arbitrary locations (x, v) ∈ Rd × Rd. The St¨ormer–Verlet
288
+ method only discretises in time, there is no limit to the (x, v)-resolution of the numerical ow. It is in
289
+ this sense when we say that in NuFI the distribution function f has innite resolution in phase-space.
290
+ • It is not necessary to explicitly store f, only the initial data f0 and the electric eld E need to be
291
+ accessible.
292
+ • To evaluate Ψ0
293
+ nτ, the electric eld E is only required at the discrete time steps iτ, i = 0, ▷ ▷ ▷ , n.
294
+ • To evaluate ˜Ψ0
295
+ nτ, the electric eld is only needed at previous times iτ, i = 0, ▷ ▷ ▷ , n − 1, i. e., the
296
+ current E(nτ, ·) is not required.
297
+ In practice, the exact electric eld E(t, x) will be replaced with a numerical approximation Eτ,h ≈ E;
298
+ the meaning of h will be claried later. The resulting fully discrete numerical ow Ψ0
299
+ nτ,h ≈ Ψ0
300
+ nτ will then
301
+ also be distinguished with an additional index h. However, regardless of errors in Eτ,h, just like the exact
302
+ ow Φ0
303
+ nτ, one of the remarkable key properties of symplectic integrators is that the numerical ows Ψ0
304
+
305
+ and respectively Ψ0
306
+ nτ,h also preserve volume in phase-space. For completeness we repeat the simple proof.
307
+ Lemma 2.4 (Volume Preservation of the Numerical Flow). Regardless of errors in the electric
308
+ eld Eτ,h ≈ E, the numerical ows Ψ0
309
+ nτ and Ψ0
310
+ nτ,h of the St¨ormer–Verlet method are dieomorphisms
311
+ which preserve volume in phase-space:
312
+ ∀n ∈ N0 : ∀(x, v) ∈ Rd × Rd :
313
+ det ∇(x,v)Ψ0
314
+ nτ(x, v) ≡ det ∇(x,v)Ψ0
315
+ nτ,h(x, v) ≡ 1▷
316
+ Proof. We only describe Ψ0
317
+ nτ as the proof for Ψ0
318
+ nτ,h is identical. Because of the chain rule and the properties
319
+ of the determinant one has:
320
+ det ∇(x,v)Ψ0
321
+ nτ =
322
+ n
323
+
324
+ k=1
325
+ det ∇(x,v)Ψ(k−1)τ
326
+
327
+
328
+ (10)
329
+ Similarly, a single step Ψ(k−1)τ
330
+
331
+ is composed of the three sub-steps given in (8). The Jacobian matrix of,
332
+ e. g., the rst sub-step is given by:
333
+ ∇(x,v)
334
+
335
+ x
336
+ v + τ
337
+ 2E(kτ, x)
338
+
339
+ =
340
+
341
+ I
342
+ 0
343
+ τ
344
+ 2∇xE(kτ, x)
345
+ I
346
+
347
+
348
+ (11)
349
+ 4
350
+
351
+ This is a triangular matrix with unit diagonal, so its determinant also is one. This is also the case for the
352
+ other sub-steps, and thus det ∇(x,v)Ψ0
353
+ nτ ≡ 1.
354
+ 2.3 Structure of the Numerical Flow Iteration
355
+ So far we have assumed that the electric eld E was known exactly. In practice, however, this is of course
356
+ not the case and it needs to be computed from the charge density ρ, which itself is dened in (4). Thus,
357
+ only some approximation Eτ,h ≈ E will be available, where h denotes a discretisation parameter that will
358
+ be described later.
359
+ At initial time t = 0 the charge density ρ(t = 0, x) can be computed by integrating f0 along v. This can,
360
+ for example, be done by using numerical quadrature giving an approximation ρτ,h(0, x) ≈ ρ(0, x). The
361
+ approximate electric eld Eτ,h(0, x) then results from the solution of the Poisson equation (3), which can
362
+ itself be discretised with some reasonable numerical method.
363
+ From this point, we proceed iteratively in time. Thus, assume that we had already computed ρτ,h, φτ,h,
364
+ and Eτ,h at times iτ, i = 0, ▷ ▷ ▷ , n − 1 for some n ∈ N. We seek to compute ρτ,h(nτ, x) using the numerical
365
+ approximation f(nτ, x, v) ≈ f0
366
+
367
+ Ψ0
368
+ nτ,h(x, v)
369
+
370
+ . However, Ψ0
371
+ nτ,h cannot be evaluated, because Eτ,h(nτ, x) is
372
+ still unknown. Luckily, this circular dependency can be resolved by using ˜Ψ0
373
+ nτ,h and a simple change of
374
+ variables:
375
+ ρ(nτ, x) = ¯ρ −
376
+
377
+ Rd f0
378
+
379
+ Φ0
380
+ nτ(x, v)
381
+
382
+ dv
383
+ Φ⇝Ψτ,h
384
+
385
+ ¯ρ −
386
+
387
+ Rd f0
388
+
389
+ Ψ0
390
+ nτ,h(x, v)
391
+
392
+ dv = ¯ρ −
393
+
394
+ Rd f0
395
+ ˜Ψ0
396
+ nτ,h(x, v + τ
397
+ 2Eτ,h(nτ, x))
398
+
399
+ dv
400
+ ˆv:=v+ τ
401
+ 2 Eτ,h(nτ,x)
402
+ =
403
+ ¯ρ −
404
+
405
+ Rd f0
406
+ ˜Ψ0
407
+ nτ,h(x, ˆv)
408
+
409
+ dˆv▷
410
+ (12)
411
+ In other words, for the computation of ρ, we can safely replace Ψ0
412
+ nτ,h with ˜Ψ0
413
+ nτ,h without any additional
414
+ error. Additionally, unlike Ψ0
415
+ nτ,h, its sibling ˜Ψ0
416
+ nτ,h is computable! By replacing the last integral with a
417
+ suitable quadrature rule, we can thus compute ρτ,h(nτ, x) ≈ ρ(nτ, x) and proceed. This is the numerical
418
+ ow iteration, which can be summarised as follows:
419
+ 1. Compute ρτ,h(t = 0, x) by integrating f0 along v, using numerical quadrature.
420
+ 2. Compute and store φτ,h(t = 0, x) using ρτ,h(t = 0, x).
421
+ 3. For n = 1, 2, 3, ▷ ▷ ▷ :
422
+ a) Compute an approximation ρτ,h(nτ, x) ≈ ρ(nτ, x) using (12) and numerical quadrature.
423
+ b) Compute and store φτ,h(nτ, x) using ρτ,h(nτ, x).
424
+ In the limit h → 0, the last integral in (12) is evaluated without any error and the Poisson equation
425
+ −∆φh,0 = ρh,0 is also solved exactly.
426
+ Denition 2.5 (Semi-discrete Approximation). The semi-discrete approximation fτ,0 is dened as
427
+ fτ,0(nτ, x, v) := f0
428
+
429
+ Ψ0
430
+ nτ,0(x, v)
431
+
432
+ ,
433
+ where at every time-step the last integral in (12) and the Poisson equation −∆φτ,0 = ρτ,0 are solved exactly.
434
+ Note that except for the initial time t = 0, we will still usually have Ψ0
435
+ nτ ̸= Ψ0
436
+ nτ,0, E ̸= Eτ,0, φ ̸= φτ,0,
437
+ and ρ ̸= ρτ,0 due to the errors introduced by the time discretisation. Consequently, we usually also have
438
+ fτ,0 ̸= fτ with fτ from (9), which uses the exact eld E.
439
+ 2.4 Numerical Approximations of ρ and φ
440
+ While the distribution function f shows increasing lamentation over time, numerical evidence has shown
441
+ that this is often not the case for the electric potential φ and eld E, and to a somewhat lesser extent also
442
+ for the charge density ρ. An illustration of this is given in Figure 2.
443
+ 5
444
+
445
+ 0
446
+ π
447
+ 2
448
+ π
449
+
450
+ 2
451
+
452
+
453
+ 2
454
+
455
+
456
+ 2
457
+
458
+ −08
459
+ −06
460
+ −04
461
+ −02
462
+ 0
463
+ 02
464
+ 04
465
+ 06
466
+ 08
467
+ x
468
+ ρ(t, x)
469
+ E(t, x)
470
+ ϕ(t, x)
471
+ Figure 2: Even for very strongly lamented distributions f, the electric eld E and potential φ often remain
472
+ comparatively smooth. This example shows approximations of f (left) as well as ρ, E, and φ
473
+ (right) for the two stream instability benchmark (d = 1) at t = 100. See Section 4.2 for more
474
+ details.
475
+ For this reason, unlike f, the charge density ρ and especially the electric potential φ can eciently be
476
+ approximated on relatively coarse grids. In this work we sample the values of ρ on a Cartesian grid of
477
+ mesh-width hx =
478
+ L
479
+ Nx , for some Nx ∈ N. For each grid node xi, i = 0, ▷ ▷ ▷ , N d
480
+ x − 1, we approximate ρ(nτ, xi)
481
+ using (12). The integral is approximated using the mid-point rule on a Cartesian grid reaching from −vmax
482
+ to vmax in each of the d components of v, having mesh width hv = 2vmax
483
+ Nv :
484
+ ρ(nτ, xi) ≈ ρτ,h(nτ, xi) := ¯ρ − hd
485
+ xhd
486
+ v
487
+ Nd
488
+ v −1
489
+
490
+ j=0
491
+ f0
492
+ ˜Ψ0
493
+ nτ,h(xi, vj)
494
+
495
+
496
+ (13)
497
+ Here, the vj are the mid-points of the cells of the Cartesian grid in v-direction. This requires the
498
+ evaluation of f0 ◦ ˜Ψ0
499
+ nτ,h at N d
500
+ xN d
501
+ v locations (xi, vj) and is by far the computationally most expensive step
502
+ of NuFI. Note however, that the evaluation of f0 ◦ ˜Ψ0
503
+ nτ,h is an embarrassingly parallel operation. The
504
+ summation can thus be eciently implemented on GPUs using so-called ‘atomic additions’. It can also be
505
+ parallelised to entire clusters of GPUs using simple reductions on partial results of ρτ,h.
506
+ While in principle any quadrature rule could be used, the mid-point rule has the advantage of achieving
507
+ exponential convergence for compactly supported smooth functions.[2] As mentioned in the introduction,
508
+ in many cases f0 is a smooth function that exponentially decays as |v| → ∞ and can thus eectively be
509
+ considered as compactly supported. Hence, before the occurrence of lamentation while f still is smooth,
510
+ we can expect very accurate results. At the same time, the mid-point rule has the advantage of being
511
+ simple and stable: only positive terms appear in the sum.
512
+ We have thus dened ρτ,h at the grid-points xi, between which we will interpolate. In this work we assume
513
+ that f, and thus also ρ and φ are periodic in x. It thus makes sense to use trigonometric interpolation:
514
+ ρτ,h(nτ, x) =
515
+
516
+ α
517
+ cαeiα 2πx
518
+ L ,
519
+ (14)
520
+ where α is a multi-index and the coecients cα can eciently be computed from the point-values ρτ,h(nτ, xi)
521
+ at the nodes xi using the fast Fourier transform (FFT). In this representation, solving the Poisson equation
522
+ −∆φτ,h = ρτ,h corresponds to a trivial scaling of the coecients cα. The electric energy 1
523
+ 2∥∇xφτ,h∥2
524
+ L2(Ω)
525
+ can also be computed easily using Parseval’s identity.
526
+ While the spectral representation of φτ,h is essentially optimal from a mathematical point of view, it
527
+ comes with a practical diculty. When computing the numerical ow Ψ0
528
+ nτ,h (or its relative ˜Ψ0
529
+ nτ,h), the
530
+ electric eld and thus −∇xφτ,h needs to be evaluated very often at arbitrary locations x. This evaluation
531
+ is extremely expensive, as a summation over all modes α is necessary. For this reason, we follow a dierent
532
+ approach.
533
+ Instead, we compute the inverse Fourier transform and thereby eciently obtain the point values
534
+ φτ,h(nτ, xi) at the grid nodes xi, i = 0, ▷ ▷ ▷ , N d
535
+ x − 1. Afterwards we compute the Cartesian, periodic,
536
+ tensor-product spline interpolant of fourth order (piece-wise, coordinate-wise cubical polynomials of global
537
+ coordinate-wise smoothness C2). This representation is equally memory ecient, but a single evaluation
538
+ 6
539
+
540
+ 0.25
541
+ 0.2
542
+ 0.15
543
+ 0.1
544
+ 0.05
545
+ 10
546
+ 12of −∇xφ only takes a constant amount of time, independent of the resolution hx, resulting in signicant
547
+ speed-ups.
548
+ Denition 2.6 (Fully Discrete Approximation). The fully discrete approximation fτ,h is dened as:
549
+ fτ,h(nτ, x, v) := f0
550
+
551
+ Ψ0
552
+ nτ,h(x, v)
553
+
554
+ ,
555
+ where Ψ0
556
+ nτ,h is the numerical ow that is computed using the numerical approximation Eτ,h ≈ E that results
557
+ from taking the gradient of the spline interpolant of φτ,h.
558
+ 2.5 Conservation Properties
559
+ What really makes NuFI stick out of the crowd, are its remarkable conservation properties. To avoid the
560
+ technical details associated with the x-periodic setting, in this subsection we consider the whole-space case
561
+ with ¯ρ = 0 instead, but note that these results also carry over to the periodic setting.
562
+ Theorem 2.7 (Conserved Quantities). Let F(nτ, x, v) either denote the exact solution F(nτ, x, v) =
563
+ f0
564
+
565
+ Φ0
566
+ nτ(x, v)
567
+
568
+ , or a discrete approximation, F(nτ, x, v) = fτ,h(nτ, x, v) = f0
569
+
570
+ Ψ0
571
+ nτ,h(x, v)
572
+
573
+ , τ > 0, h ≥ 0.
574
+ Then, regardless of errors in the approximate electric eld Eτ,h ≈ E that is used in the computation of
575
+ Ψ0
576
+ nτ,h, F fulls for all nτ, n ∈ N0:
577
+ • the maximum principle: 0 ≤ F(nτ, x, v) ≤ ∥f0∥L∞(Rd×Rd),
578
+ • conservation of all Lp(Rd × Rd) norms, 1 ≤ p ≤ ∞:
579
+ ∥F(nτ, ·, ·)∥Lp(Rd×Rd) = ∥f0∥Lp(Rd×Rd),
580
+ (15)
581
+ • conservation of kinetic entropy:
582
+ 
583
+ Rd×Rd
584
+ F(nτ, x, v) ln
585
+
586
+ F(nτ, x, v)
587
+
588
+ dvdx =
589
+ 
590
+ Rd×Rd
591
+ f0 ln f0 dvdx,
592
+ (16)
593
+ • and, more generally, for any function g : R → R for which the following integrals are dened:
594
+ 
595
+ Rd×Rd
596
+ g
597
+
598
+ F(nτ, x, v)
599
+
600
+ dvdx =
601
+ 
602
+ Rd×Rd
603
+ g
604
+
605
+ f0(x, v)
606
+
607
+ dvdx▷
608
+ (17)
609
+ Proof. For brevity, we will write Ξ ∈ {Φ0
610
+ nτ, Ψ0
611
+ nτ,h}. The maximum principle directly follows from the fact
612
+ that F = f0 ◦ Ξ and f0 ≥ 0. Conservation of the L∞-norm follows because Ξ is a dieomorphism and
613
+ thus Ξ(Rd × Rd) = Rd × Rd. Conservation of entropy (g(x) = x ln x) and the other Lp-norms (g(x) = xp)
614
+ follows from the last statement. For the last statement, we transform the integral and use the volume
615
+ preservation of Ξ to obtain:
616
+ 
617
+ Rd×Rd
618
+ g
619
+
620
+ F(nτ, x, v)
621
+
622
+ dvdx =
623
+ 
624
+ Rd×Rd
625
+ g
626
+
627
+ f0
628
+
629
+ Ξ(x, v)
630
+ 
631
+ dvdx =
632
+ 
633
+ Rd×Rd
634
+ g
635
+
636
+ f0(x, v)
637
+
638
+ | det ∇(x,v)Ξ−1(x, v)|
639
+
640
+ 
641
+
642
+ ≡1
643
+ dvdx =
644
+ 
645
+ Rd×Rd
646
+ g
647
+
648
+ f0(x, v)
649
+
650
+ dvdx▷
651
+ (18)
652
+ The semi-discrete approximation fτ,0 additionally conserves momentum.
653
+ Theorem 2.8 (Conservation of Momentum). Let F(nτ, x, v) either denote the exact solution F =
654
+ f0
655
+
656
+ Φ0
657
+ nτ(x, v)
658
+
659
+ , or the semi-discrete approximation F(nτ, x, v) = fτ,0(nτ, x, v) from Denition 2.5. Then F
660
+ fulls the conservation of momentum:
661
+ ∀n ∈ N0 :
662
+ 
663
+ Rd×Rd
664
+ vF(nτ, x, v) dvdx =
665
+ 
666
+ Rd×Rd
667
+ vf0(x, v) dvdx▷
668
+ (19)
669
+ 7
670
+
671
+ Proof. The result for the exact solution is a classical matter; we thus only give the proof for fτ,0. For n = 0
672
+ the result is trivial as fτ,0(0, x, v) ≡ f0(x, v). Now assuming the result held for some n ∈ N0, we will show
673
+ that it also holds for k := n + 1. Abbreviating Ξ := ˜Ψ0
674
+ kτ,0, we obtain:
675
+ 
676
+ Rd×Rd
677
+ vfτ,0(kτ, x, v) dvdx =
678
+ 
679
+ Rd×Rd
680
+ vf0
681
+
682
+ Ξ(x, v + τ
683
+ 2Eτ,0(kτ, x))
684
+
685
+ dvdx▷
686
+ (20)
687
+ We now perform the same change of variables as in (12), however we note that due to the product vfτ,0
688
+ things become slightly more involved. Letting ˆv = v + τ
689
+ 2Eτ,0
690
+
691
+ kτ, x
692
+
693
+ , and noting that in this section we
694
+ assume the whole-space case with ¯ρ = 0, we obtain:
695
+ 
696
+ Rd×Rd
697
+ ˆvf0
698
+
699
+ Ξ(x, ˆv)
700
+
701
+ dˆvdx + τ
702
+ 2
703
+
704
+ Rd
705
+ Eτ,0(kτ, x)ρτ,0(kτ, x) dx▷
706
+ (21)
707
+ Note that Eτ,0 = −∇φτ,0 and ρτ,0 = −∆φτ,0. Moreover, for any function φ that is smooth enough
708
+ and decays suciently fast at innity we obtain using integration by parts, interchanging the order of
709
+ dierentiation, and the fact that the Laplacian is self-adjoint:
710
+
711
+ Rd ∇φ∆φ dx = −
712
+
713
+ Rd φ∇∆φ dx = −
714
+
715
+ Rd φ∆∇φ dx = −
716
+
717
+ Rd ∆φ∇φ dx▷
718
+ (22)
719
+ Thus, this integral equals its own negative, and therefore the second integral in (21) is zero. As for the rst
720
+ integral, we perform another change of variables and let ˆx = x − τ ˆv:
721
+ 
722
+ Rd×Rd
723
+ ˆvf0
724
+
725
+ Ξ(x, ˆv)
726
+
727
+ dˆvdx =
728
+ 
729
+ Rd×Rd
730
+ ˆvf0
731
+
732
+ Ψ0
733
+ nτ,0(ˆx, ˆv + τ
734
+ 2Eτ,0(nτ, ˆx))
735
+
736
+ dˆvdˆx▷
737
+ (23)
738
+ Thus, by performing a nal change of variables on ˆv and repeating the same arguments as above, we obtain
739
+ in total:
740
+ 
741
+ Rd×Rd
742
+ vfτ,0
743
+
744
+ (n + 1)τ, x, v) dvdx =
745
+ 
746
+ Rd×Rd
747
+ vfτ,0
748
+
749
+ nτ, x, v) dvdx▷
750
+ (24)
751
+ Hence by induction, the result follows.
752
+ Finally, the exact solution also satises conservation of energy. Unfortunately, it is yet unclear to what
753
+ extent this is the case for NuFI and we will point to our numerical experiments at the end of this article.
754
+ Theorem 2.9 (Conservation of Energy). The exact solution f(t, x, v) = f0
755
+
756
+ Φ0
757
+ t(x, v)
758
+
759
+ and electric eld
760
+ E satisfy the conservation of energy:
761
+ d
762
+ dt
763
+
764
+
765
+ 1
766
+ 2
767
+ 
768
+ Rd×Rd
769
+ v2f(t, x, v) dvdx + 1
770
+ 2
771
+
772
+ Rd
773
+ E(t, x)2 dx
774
+
775
+
776
+  = 0▷
777
+ (25)
778
+ 2.6 Complexity
779
+ 2.6.1 Memory Complexity
780
+ Throughout this work we will assume that f0 is given as a compact mathematical expression and can thus
781
+ essentially be stored at zero cost. In this case, NuFI essentially only requires us to store φτ,h for each
782
+ time-step.
783
+ It cannot be overstated that due to the missing v-dependence of φτ,h, storing the spline coecients of φ
784
+ on a grid requires several orders of magnitude less memory than storing f. Especially when d = 3, memory
785
+ consumption can be reduced millions of times. Let n ∈ N denote the number of time-steps that should be
786
+ computed. We then need to store φτ,h(kτ, ·) for k = 0, 1, ▷ ▷ ▷ , n. This results in:
787
+ Memory Requirement = (n + 1)N d
788
+ x × size of one oating point value▷
789
+ (26)
790
+ 8
791
+
792
+ d
793
+ Nx = Nv
794
+ Memory of φτ,h per step
795
+ Memory for storing f
796
+ 2
797
+ 128
798
+ 0.125 MiB
799
+ 2 048 MiB
800
+ 2
801
+ 256
802
+ 0.5 MiB
803
+ 32 768 MiB
804
+ 2
805
+ 512
806
+ 2 MiB
807
+ 524 288 MiB
808
+ 3
809
+ 128
810
+ 0.015 GiB
811
+ 32 768 GiB
812
+ 3
813
+ 256
814
+ 0.125 GiB
815
+ 2 097 152 GiB
816
+ 3
817
+ 512
818
+ 1 GiB
819
+ 134 217 728 GiB
820
+ Table 1: Memory requirements for storing the electric potential φ on a d-dimensional grid compared
821
+ to directly storing the distribution function f on a 2d-dimensional grid for various example
822
+ discretisations.
823
+ While in NuFI memory requirements do grow with the number of time-steps, the data required for an
824
+ individual step is negligible compared to storing f on a 2d dimensional grid, requiring N d
825
+ xN d
826
+ v oating point
827
+ values. Assuming 8 bytes per oating point value, the dierent memory requirements are illustrated in
828
+ Table 1.
829
+ This means that, even for simulations with d = 3 and Nx = 256, φτ,h can be completely stored for
830
+ several hundred time-steps in the memory of modern GPUs.
831
+ 2.6.2 Computational Complexity
832
+ By far, the computationally most expensive operation in NuFI is the evaluation of ρh(nτ, xi) using numerical
833
+ quadrature. The cost of all other operations is negligible: quadrature is carried out on the 2d dimensional
834
+ (x, v)-space while all other operations are carried out on the lower-dimensional x-space.
835
+ For simplicity, we will assume that f0 can be evaluated eciently at O(1) cost. In each time-step
836
+ k = 1, 2, ▷ ▷ ▷ , n, the numerical ux Ψ0
837
+ kτ,h needs to be evaluated at N d
838
+ xN d
839
+ v quadrature nodes. Evaluating
840
+ Ψ0
841
+ kτ,h in turn requires k + 1 evaluations of the approximate electric eld Eτ,h; giving a total cost of
842
+ approximately:
843
+ N d
844
+ xN d
845
+ v
846
+ n
847
+
848
+ k=1
849
+ (k + 1) = O
850
+ n2
851
+ 2 N d
852
+ xN d
853
+ v
854
+
855
+ (27)
856
+ evaluations of Eτ,h. For this reason it is crucial to have ecient routines for the evaluation of Eτ,h available.
857
+ In our approach using splines, the cost of a single evaluation of Eτ,h is independent of n, Nx and Nv.
858
+ Thus, unlike conventional methods, the cost of NuFI grows quadratically with the number of time-steps.
859
+ This might make the method look unattractive. However, NuFI has a much higher FLOP/byte ratio than
860
+ approaches that directly store f, so it achieves much higher performance on modern computer systems.
861
+ Additionally, also due to the low storage requirements, it easy to parallelise on clusters. Finally, no other
862
+ method known to the authors conserves as many physical properties as NuFI does. It is maybe for this
863
+ reason, as our numerical experiments will conrm, that NuFI only requires relatively coarse resolutions Nx,
864
+ Nv to achieve qualitatively good results.
865
+ 3 Similarities and Dierences to Related Literature and Methods
866
+ A key idea in NuFI is to approximate and follow the phase-ow Φt
867
+ s and use the method of characteristics
868
+ to exploit exact conservation of values of f along the phase-ow. In a sense this is a similar idea to
869
+ Lagrangian schemes like Smooth Particle Hydrodynamics (SPH),[3],[4],[5] Particle-In-Cell (PIC),[5],[6],[7] and
870
+ interpolation- and approximation-based particle methods.[8],[9] The key dierences between particle methods
871
+ like PIC and NuFI are the direct discretisation in phase-space and that one traces the characteristics
872
+ forward in time instead of backwards.
873
+ In particle methods one tries to discretise the phase-space directly via sampling the initial distribution
874
+ function f0 at a set of points in the phase-space called ‘particles’. The particles are then traced along
875
+ their respective characteristics. For the non-linear case one then has to compute the electric eld from
876
+ these particles and their respective carried values of f. The dierent Lagrangian schemes basically dier
877
+ 9
878
+
879
+ Hardware
880
+ CPU
881
+ GPU
882
+ Workstation Laptop
883
+ Intel Xeon E-2276M @ 2.8 GHz,
884
+ 6 cores, 2 threads per core
885
+ Nvidia Quadro T1000 Mobile,
886
+ 4 GB DDR5-VRAM
887
+ Claix GPU Cluster
888
+ 2×Intel
889
+ Xeon
890
+ Platinum
891
+ 8160
892
+ ‘Skylake’ @ 2.1 GHz, 24 Cores
893
+ each, per node
894
+ 2×Nvidia
895
+ Volta
896
+ V100-SXM2,
897
+ 16 GB HBM2-RAM, per node
898
+ Table 2: Overview of the hardware congurations used for the numerical experiments.
899
+ in this aspect, i. e., how the electric eld is computed from the samples. For the often-used PIC schemes
900
+ the particles are mapped to a grid in x, thereby computing an approximation to ρ from which E can be
901
+ obtained via a Poisson solver on the same grid.
902
+ While in principle PIC has several desirable conservation properties, it struggles with excessive levels
903
+ of noise caused by the ne lamentation and steep gradients in the solution f. This makes remeshing
904
+ every few time-steps necessary.[10] Remeshing reduces the noise in the simulation but introduces a certain
905
+ numerical diusion similar to semi-Lagrangian methods.[11] Due to the steep gradients, methods that
906
+ approximate the solution f directly will suer of overshoots in the numerical solution.[9],[12]
907
+ Related to Lagrangian methods and in particular PIC are the ‘semi-Lagrangian’ methods.[12],[13],[14],[15]
908
+ Similar to purely Eulerian approaches[16],[17],[18] which discretise the distribution function directly and
909
+ update the values on grid-nodes, semi-Lagrangian schemes also use a full grid-based discretisation of f in
910
+ the phase-space. However, to avoid too restrictive time-step constraints and to reduce numerical diusion
911
+ they trace the ‘movement of grid-points’ along the characteristics to use the values of the previous time-step
912
+ approximation of f for interpolation or approximation in the current time-step. The possibility of choosing
913
+ large time-steps also exists in NuFI.
914
+ The use of direct discretisations in the whole phase-space via a grid is expensive as discussed in
915
+ Section 2.6.1. Ways to overcome this are discussed in for instance the papers by Kormann on decomposition
916
+ of the solution into a tensor train format and Einkemmer on comparing the discontinuous Galerkin with a
917
+ spline-based semi-Lagrangian approach.[19],[20]
918
+ 4 Numerical Experiments
919
+ In this section we describe the results of several numerical experiments. For this we used two dierent
920
+ hardware congurations available to us: our local workstation laptop as well as the Claix GPU Cluster of
921
+ RWTH Aachen University, see Table 2.
922
+ 4.1 Weak Landau Damping (d = 1)
923
+ The rst test case is commonly called weak Landau Damping. The initial condition is
924
+ f0(x, v) :=
925
+ 1
926
+
927
+ 2π e− v2
928
+ 2 
929
+ 1 + α cos(kx)
930
+
931
+ ,
932
+ (x, v) ∈ [0, L] × R
933
+ (28)
934
+ with k = 0▷5, α = 0▷01, L = 4π. The velocity space is cut at vmax = 10. We use dierent spatial resolutions
935
+ Nx and Nv, but all simulations use the same time-step τ =
936
+ 1
937
+ 16.
938
+ The initial state (28) is a small perturbation to the Maxwellian distribution
939
+ fM(v) =
940
+ 1
941
+
942
+ 2π e− v2
943
+ 2
944
+ (29)
945
+ which is an equilibrium of the Vlasov–Poisson equation (1). It is known that this particular perturbation
946
+ gets periodically damped to zero in a weak sense as t → ∞. Thus, this benchmark consists of reproducing
947
+ the correct damping rate for the electric eld. The so-called Landau damping rate is γE = 0▷153359, half
948
+ of the corresponding damping rate for the electric energy γenergy = 0▷306718.[19]
949
+ 10
950
+
951
+ 0
952
+ 10
953
+ 20
954
+ 30
955
+ 40
956
+ 50
957
+ 60
958
+ 70
959
+ 80
960
+ 90
961
+ 100
962
+ 10−18
963
+ 10−16
964
+ 10−14
965
+ 10−12
966
+ 10−10
967
+ 10−8
968
+ 10−6
969
+ 10−4
970
+ 10−2
971
+ t
972
+ 1
973
+ 2‖Eτ,h‖2
974
+ L2
975
+ single, Nx = 8, Nv = 32
976
+ double, Nx = 8, Nv = 32
977
+ single, Nx = 32, Nv = 128
978
+ double, Nx = 32, Nv = 128
979
+ single, Nx = 128, Nv = 512
980
+ double, Nx = 128, Nv = 512
981
+ Figure 3: Electric energy for the weak Landau damping benchmark (d = 1) displayed for simulations run in
982
+ single and double precision arithmetic. Except for the nest resolution, results for single and
983
+ double precision are indistinguishable.
984
+ For d = 1 meaningful simulations can still be carried out on the workstation laptop. For such hardware
985
+ computations in single precision are usually signicantly faster and provide sucient accuracy when d = 1.
986
+ At the highest resolution, the computation of all 1 600 time-steps took 1.7 seconds in total when using
987
+ single precision. As the laptop only uses a consumer grade GPU chip, the double precision computation
988
+ was signicantly slower and took 28.3 seconds.
989
+ The results are illustrated in Figure 3. For low and medium resolutions the results of single and double
990
+ precision computations are indistinguishable. Only for high resolutions a dierent behaviour after t ≈ 60
991
+ is observed: on the one hand, when computing in single precision no damping eect can be observed
992
+ after t ≈ 62 as the electric energy arrived at machine precision level with respect to the single precision,
993
+ suggesting that Landau damping can at most be resolved up to the chosen oating point precision. On the
994
+ other hand, the damping eect is still observable until t ≈ 80 for double precision, however, with slightly
995
+ slower rate. For single precision one does not observe recurrence phenomena: instead the electric energy
996
+ oscillates with same amplitude after t ≈ 62. The simulation with double precision shows a slight recurrence
997
+ at t ≈ 83.
998
+ The correct damping rate and oscillation frequency are reproduced by all simulations. The highest
999
+ resolution simulation captures the correct damping rate γenergy until t ≈ 62. Lower resolutions capture the
1000
+ correct damping rate only until their respective recurrence timings.
1001
+ 4.2 Two Stream Instability (d = 1)
1002
+ Next we investigate the two stream instability benchmark. The initial condition is
1003
+ f0(x, v) :=
1004
+ 1
1005
+
1006
+ 2π e− v2
1007
+ 2 v2
1008
+ 1 + α cos(kx)
1009
+
1010
+ ,
1011
+ (x, v) ∈ [0, L] × R
1012
+ (30)
1013
+ with k = 0▷5, α = 0▷01, L = 4π. The velocity space is cut at vmax = 10, time integration uses a time step
1014
+ of τ =
1015
+ 1
1016
+ 16. We again consider simulations in low (Nx = 8, Nv = 32), medium (Nx = 32, Nv = 128), and
1017
+ high resolution (Nx = 128, Nv = 512).
1018
+ This benchmark simulates two colliding streams of electrons with opposing velocity which are both
1019
+ slightly perturbed from equilibrium. After an initial damping phase the streams start mixing, leading to
1020
+ an increasingly turbulent behaviour. In particular, the distribution function f develops an increasing level
1021
+ of lamentation and a ‘vortex’ over time.
1022
+ 11
1023
+
1024
+ 0
1025
+ 10
1026
+ 20
1027
+ 30
1028
+ 40
1029
+ 50
1030
+ 60
1031
+ 70
1032
+ 80
1033
+ 90
1034
+ 100
1035
+ 10−9
1036
+ 10−6
1037
+ 10−3
1038
+ 100
1039
+ t
1040
+ 1
1041
+ 2∥Eτ,h∥2
1042
+ L2
1043
+ Nx = 8, Nv = 32
1044
+ Nx = 32, Nv = 128
1045
+ Nx = 128, Nv = 512
1046
+ Figure 4: Electric energy for the two stream instability benchmark (d = 1) displayed for simulations, run in
1047
+ double precision and using time-step τ =
1048
+ 1
1049
+ 16.
1050
+ Figure 4 shows the evolution of electric energy until T = 100. Until t ≈ 10 damping eects on the
1051
+ two particle streams are still dominating the overall dynamic. Between t ≈ 10 and t ≈ 25 a vortex in
1052
+ the phase-space starts forming. After t ≈ 25 the mixing process is dominant, where turbulence and
1053
+ lamentation in the solution make resolving f increasingly complicated. Until t ≈ 25 all three simulations
1054
+ are able to capture the underlying dynamics in the electric energy correctly. After t ≈ 25 the low resolution
1055
+ simulation is still able to capture the dynamics qualitatively, however, with a signicant error. After t ≈ 40
1056
+ the medium resolution simulation also starts to deviate from the high resolution one, albeit to a much
1057
+ lesser extent. The medium and high resolution simulation are able to resolve the slow oscillation in the
1058
+ electric energy after t ≈ 25. The high resolution run is able to reproduce the electric energy until t = 100
1059
+ without signicant numerical noise in the plot.
1060
+ Figure 6 shows the distribution function fτ,h for several times t. At t ≈ 5 the electric eld damping seizes
1061
+ to be dominant. At this time the dierence to the initial datum of f is barely perceivable. Around t ≈ 25
1062
+ the forming of a vortex in phase-space starts setting in which comes with reaching the global maximum in
1063
+ electric energy. After t ≈ 25 the vortex rotates periodically, creating an increasing number of laments
1064
+ for later t. The low resolution is also able capture the overall dynamics correctly in a qualitative sense,
1065
+ however, one observes increasing distortions for the low resolution simulation. For t = 100 the vortex seems
1066
+ to move along the x-axis for the low resolution simulation, which is an incorrect dynamic.
1067
+ The higher resolution simulation is able to correctly reproduce the dynamics until the end (t = 100).
1068
+ In addition, NuFI is able to reproduce the ne lamentation expected from the analytic solution. The
1069
+ pixel-artefacts which can be seen in Figure 6 are due to the nite resolution of the plot (2 048 sampling
1070
+ points in each direction) and would disappear in plots of suciently high resolution.
1071
+ Figure 5 shows the relative errors produced by simulation for several resolution settings in time and
1072
+ phase-space as well as dierent choice of oating point representation. The reference solution was computed
1073
+ using Nx = 512, Nv = 2 048 and τ =
1074
+ 1
1075
+ 32.
1076
+ When varying the phase-space resolution one observes that until t ≈ 20 all errors stay at approximately
1077
+ the same level. Then the mixing process with accompanied with increasing lamentation in the solution
1078
+ sets in, which leads to an increase of error for all resolutions. After t ≈ 26 errors seem to stabilise on a
1079
+ xed level again; ranging from 10−3 to 10−5 for the relative L2 error for the simulation in single precision
1080
+ and from 10−1 to 10−2 with respect to the L∞-norm. Similar error behaviour can be observed for double
1081
+ precision, suggesting that the chosen oating point precision makes no longer a dierence when entering
1082
+ the turbulent phase of the simulation in this case. Note however, that for early times errors in double
1083
+ precision can be up to eight orders of magnitude smaller.
1084
+ When varying the time-step-size and xing the resolution in phase-space we observe an initial jump in
1085
+ error between t = 0 and t ≈ 2. The error growth is much reduced for the smaller time steps. This implies
1086
+ that at this stage of the simulation the errors in the quadrature and the Poisson solver are close to machine
1087
+ precision 10−8, and that it is the time discretisation error which is dominating. After t ≈ 2 the errors levels
1088
+ stabilise and do not signicantly further increase until the onset of lamentation around t ≈ 26.
1089
+ 12
1090
+
1091
+ 0
1092
+ 2
1093
+ 4
1094
+ 6
1095
+ 8
1096
+ 10
1097
+ 12
1098
+ 14
1099
+ 16
1100
+ 18
1101
+ 20
1102
+ 22
1103
+ 24
1104
+ 26
1105
+ 28
1106
+ 30
1107
+ 10−10
1108
+ 10−9
1109
+ 10−8
1110
+ 10−7
1111
+ 10−6
1112
+ 10−5
1113
+ 10−4
1114
+ 10−3
1115
+ t
1116
+ ∥E − Eτ,h∥L2∥E∥L2
1117
+ hx = L32, hv = vmax64
1118
+ hx = L64, hv = vmax128
1119
+ hx = L128, hv = vmax256
1120
+ (a) L2-error, single precision
1121
+ 0
1122
+ 2
1123
+ 4
1124
+ 6
1125
+ 8
1126
+ 10
1127
+ 12
1128
+ 14
1129
+ 16
1130
+ 18
1131
+ 20
1132
+ 22
1133
+ 24
1134
+ 26
1135
+ 28
1136
+ 30
1137
+ 10−5
1138
+ 10−4
1139
+ 10−3
1140
+ 10−2
1141
+ 10−1
1142
+ t
1143
+ ∥E − Eτ,h∥L∞∥E∥L∞
1144
+ hx = L32, hv = vmax64
1145
+ hx = L64, hv = vmax128
1146
+ hx = L128, hv = vmax256
1147
+ (b) L∞-error, single precision
1148
+ 0
1149
+ 2
1150
+ 4
1151
+ 6
1152
+ 8
1153
+ 10
1154
+ 12
1155
+ 14
1156
+ 16
1157
+ 18
1158
+ 20
1159
+ 22
1160
+ 24
1161
+ 26
1162
+ 28
1163
+ 30
1164
+ 10−16
1165
+ 10−14
1166
+ 10−12
1167
+ 10−10
1168
+ 10−8
1169
+ 10−6
1170
+ 10−4
1171
+ 10−2
1172
+ t
1173
+ ∥E − Eτ,h∥L2∥E∥L2
1174
+ hx = L32, hv = vmax64
1175
+ hx = L64, hv = vmax128
1176
+ hx = L128, hv = vmax256
1177
+ (c) L2-error, double precision
1178
+ 0
1179
+ 2
1180
+ 4
1181
+ 6
1182
+ 8
1183
+ 10
1184
+ 12
1185
+ 14
1186
+ 16
1187
+ 18
1188
+ 20
1189
+ 22
1190
+ 24
1191
+ 26
1192
+ 28
1193
+ 30
1194
+ 10−8
1195
+ 10−7
1196
+ 10−6
1197
+ 10−5
1198
+ 10−4
1199
+ 10−3
1200
+ 10−2
1201
+ 10−1
1202
+ t
1203
+ ∥E − Eτ,h∥L∞∥E∥L∞
1204
+ hx = L32, hv = vmax64
1205
+ hx = L64, hv = vmax128
1206
+ hx = L128, hv = vmax256
1207
+ (d) L∞-error, double precision
1208
+ 0
1209
+ 2
1210
+ 4
1211
+ 6
1212
+ 8
1213
+ 10
1214
+ 12
1215
+ 14
1216
+ 16
1217
+ 18
1218
+ 20
1219
+ 22
1220
+ 24
1221
+ 26
1222
+ 28
1223
+ 30
1224
+ 10−8
1225
+ 10−7
1226
+ 10−6
1227
+ 10−5
1228
+ 10−4
1229
+ 10−3
1230
+ 10−2
1231
+ t
1232
+ ∥E − Eτ,h∥L2∥E∥L2
1233
+ ∆t = 12
1234
+ ∆t = 14
1235
+ ∆t = 18
1236
+ (e) L2-error, single precision
1237
+ 0
1238
+ 2
1239
+ 4
1240
+ 6
1241
+ 8
1242
+ 10
1243
+ 12
1244
+ 14
1245
+ 16
1246
+ 18
1247
+ 20
1248
+ 22
1249
+ 24
1250
+ 26
1251
+ 28
1252
+ 30
1253
+ 10−4
1254
+ 10−3
1255
+ 10−2
1256
+ 10−1
1257
+ t
1258
+ ∥E − Eτ,h∥L∞∥E∥L∞
1259
+ ∆t = 12
1260
+ ∆t = 14
1261
+ ∆t = 18
1262
+ (f) L∞-error, single precision
1263
+ Figure 5: Relative errors in electric eld with respect to the L2− and L∞−norm for the two stream
1264
+ instability benchmark in d = 1. With τ =
1265
+ 1
1266
+ 16 or Nx = 64, Nv = 256 xed respectively. Reference
1267
+ solution computed using Nx = 512, Nv = 2 048 and τ =
1268
+ 1
1269
+ 32.
1270
+ 13
1271
+
1272
+ t = 5
1273
+ t = 25
1274
+ t = 50
1275
+ t = 100
1276
+ Figure 6: The distribution function fτ,h(t, x, v) for the two stream instability benchmark. Left Nx = 8,
1277
+ Nv = 32 and right Nx = 128, Nv = 512. Both computed using τ =
1278
+ 1
1279
+ 16 as time-step. The plot
1280
+ resolution is 2 048 points in both x- and v-direction.
1281
+ 14
1282
+
1283
+ fh
1284
+ 5
1285
+ 4
1286
+ 0.25
1287
+ 3
1288
+ 2
1289
+ 0.2
1290
+ 1
1291
+ A
1292
+ 0
1293
+ 0.15
1294
+ -1
1295
+ 0.1
1296
+ -2
1297
+ -3
1298
+ 0.05
1299
+ -4
1300
+ -5.
1301
+ 0
1302
+ 2
1303
+ 4
1304
+ 6
1305
+ 8
1306
+ 10
1307
+ 12
1308
+ Xfh
1309
+ 5
1310
+ 4
1311
+ 0.25
1312
+ 3
1313
+ 2
1314
+ 0.2
1315
+ 1
1316
+ A
1317
+ 0
1318
+ 0.15
1319
+ -1
1320
+ 0.1
1321
+ -2
1322
+ -3
1323
+ 0.05
1324
+ -4
1325
+ -5.
1326
+ 0
1327
+ 2
1328
+ 4
1329
+ 6
1330
+ 8
1331
+ 10
1332
+ 12
1333
+ X5
1334
+ 4
1335
+ 0.25
1336
+ 3
1337
+ 2
1338
+ 0.2
1339
+ 1
1340
+ 0
1341
+ 0.15
1342
+ -1
1343
+ 0.1
1344
+ -2
1345
+ -3
1346
+ 0.05
1347
+ -4
1348
+ -5
1349
+ 0
1350
+ 2
1351
+ 4
1352
+ 6
1353
+ 8
1354
+ 10
1355
+ 125
1356
+ 4
1357
+ 0.25
1358
+ 3
1359
+ 2
1360
+ 0.2
1361
+ 1
1362
+ 0
1363
+ 0.15
1364
+ -1
1365
+ 0.1
1366
+ -2
1367
+ -3
1368
+ 0.05
1369
+ -4
1370
+ -5
1371
+ 0
1372
+ 2
1373
+ 4
1374
+ 6
1375
+ 8
1376
+ 10
1377
+ 125
1378
+ 4
1379
+ 0.25
1380
+ 3
1381
+ 2
1382
+ 0.2
1383
+ 0
1384
+ 0.15
1385
+ -1
1386
+ 0.1
1387
+ -2
1388
+ -3
1389
+ 0.05
1390
+ -4
1391
+ -5
1392
+ 0
1393
+ 2
1394
+ 4
1395
+ 6
1396
+ 8
1397
+ 10
1398
+ 12
1399
+ X5
1400
+ 4
1401
+ 0.25
1402
+ 3
1403
+ 2
1404
+ 0.2
1405
+ 0
1406
+ 0.15
1407
+ -1
1408
+ 0.1
1409
+ -2
1410
+ -3
1411
+ 0.05
1412
+ -4
1413
+ -5
1414
+ 0
1415
+ 2
1416
+ 4
1417
+ 8
1418
+ 10
1419
+ 125
1420
+ 4
1421
+ 0.25
1422
+ 3
1423
+ 2
1424
+ 0.2
1425
+ 0
1426
+ 0.15
1427
+ -1
1428
+ 0.1
1429
+ -2
1430
+ -3
1431
+ 0.05
1432
+ -4
1433
+ -5
1434
+ 0
1435
+ 2
1436
+ 4
1437
+ 6
1438
+ 8
1439
+ 10
1440
+ 125
1441
+ 4
1442
+ 0.25
1443
+ 3
1444
+ 2
1445
+ 0.2
1446
+ 1
1447
+ 0
1448
+ 0.15
1449
+ -1
1450
+ 0.1
1451
+ -2
1452
+ -3
1453
+ 0.05
1454
+ -4
1455
+ -5
1456
+ 0
1457
+ 2
1458
+ 4
1459
+ 8
1460
+ 10
1461
+ 120
1462
+ 10
1463
+ 20
1464
+ 30
1465
+ 40
1466
+ 50
1467
+ 10−6
1468
+ 10−4
1469
+ 10−2
1470
+ 100
1471
+ 102
1472
+ t
1473
+ 1
1474
+ 2∥Eτ,h∥2
1475
+ L2
1476
+ Nx = 32, Nv = 128
1477
+ Nx = 64, Nv = 256
1478
+ Nx = 128, Nv = 512
1479
+ Figure 7: Electric energy for the strong Landau damping benchmark in d = 2, with time-step set to τ =
1480
+ 1
1481
+ 16.
1482
+ 4.3 Strong Landau Damping (d = 2)
1483
+ For the two-dimensional case we consider the strong Landau damping or non-linear Landau damping
1484
+ benchmark. The initial condition is
1485
+ f0(x, y, u, v) := 1
1486
+ 2π e− v2+u2
1487
+ 2
1488
+
1489
+ 1 + α(cos(kx) + cos(ky))
1490
+
1491
+ ,
1492
+ (x, y, u, v) ∈ [0, L]2 × R2
1493
+ (31)
1494
+ with k = 0▷5, α = 0▷5, and L = 4π. The velocity space is cut at vmax = 10, we chose τ =
1495
+ 1
1496
+ 16 as time-step.
1497
+ All computations are carried out using double precision arithmetic.
1498
+ The initial datum is a strong perturbation of the Maxwellian distribution function. We thus expect a
1499
+ strong growth in the electric eld strength. In this sense, this case is more comparable to the two stream
1500
+ instability than the weak Landau damping benchmark.
1501
+ Figure 7 shows the evolution of electric energy over time. After a initial periodic damping period until
1502
+ t ≈ 10 with electric energy ranging between 102 and 10−1 the electric eld gets excited again. The electric
1503
+ energy increases periodically until t ≈ 42 after which it gets damped again.
1504
+ While the high resolution simulation is able to resolve the dynamics in the electric energy correctly until
1505
+ t = 50, the low resolution simulation starts struggling after the excitement sets in, at t ≈ 20 divergence from
1506
+ the high resolution solution becomes observable. In particular after t ≈ 30 the low resolution simulation is
1507
+ also no longer able to capture the correct peaks and lows of the electric energy. However, the oscillating
1508
+ nature and overall dynamics are still reproduced qualitatively correctly.
1509
+ In Figure 8 we plot relative errors with dierent resolutions in phase space. The reference solution was
1510
+ computed using Nx = 256, Nv = 1 024 and τ =
1511
+ 1
1512
+ 32.
1513
+ Initially the relative L2-errors are again close to machine precision for the high resolution simulation,
1514
+ similar to the d = 1 case. For low resolution the simulation errors are around 10−8 with respect to the
1515
+ L2-norm and 10−4 in the L∞-norm. However, in contrast to the d = 1 two stream benchmark the errors
1516
+ increase signicantly faster. The errors increase continuously until t ≈ 20 and level out at a range between
1517
+ 10−1 for low resolution in L2- as well as L∞-norms and 10−4 in L2- as well as 10−2 in L∞-norm for the
1518
+ high resolution simulation.
1519
+ Figures 9 and 10 illustrate the electric eld of high and low resolution simulations at various times t.
1520
+ There is no observable qualitative or quantitative dierence between the two simulations in these plots,
1521
+ suggesting that even the low resolution is able able to correctly capture the dynamics in the electric eld
1522
+ until at least t = 50.
1523
+ 4.4 Two Stream Instability (d = 3)
1524
+ For the three-dimensional case we again consider the two stream instability benchmark. The initial condition
1525
+ is
1526
+ f0(x, y, z, u, v, w) :=
1527
+ 1
1528
+ 2(2π)
1529
+ 3
1530
+ 2
1531
+
1532
+ e− (v−v0)2
1533
+ 2
1534
+ + e− (v+v0)2
1535
+ 2
1536
+
1537
+ e− u2+w2
1538
+ 2
1539
+
1540
+ 1 + α(cos(kx) + cos(ky) + cos(kz)
1541
+
1542
+ ,
1543
+ (32)
1544
+ 15
1545
+
1546
+ 0
1547
+ 2
1548
+ 4
1549
+ 6
1550
+ 8
1551
+ 10
1552
+ 12
1553
+ 14
1554
+ 16
1555
+ 18
1556
+ 20
1557
+ 22
1558
+ 24
1559
+ 26
1560
+ 28
1561
+ 30
1562
+ 10−16
1563
+ 10−13
1564
+ 10−10
1565
+ 10−7
1566
+ 10−4
1567
+ 10−1
1568
+ t
1569
+ ∥E − Eτ,h∥L2∥E∥L2
1570
+ Nx = 32, Nv = 128
1571
+ Nx = 64, Nv = 256
1572
+ Nx = 128, Nv = 512
1573
+ 0
1574
+ 2
1575
+ 4
1576
+ 6
1577
+ 8
1578
+ 10
1579
+ 12
1580
+ 14
1581
+ 16
1582
+ 18
1583
+ 20
1584
+ 22
1585
+ 24
1586
+ 26
1587
+ 28
1588
+ 30
1589
+ 10−5
1590
+ 10−4
1591
+ 10−3
1592
+ 10−2
1593
+ 10−1
1594
+ 100
1595
+ t
1596
+ ∥E − Eτ,h∥L∞∥E∥L∞
1597
+ Nx = 32, Nv = 128
1598
+ Nx = 64, Nv = 256
1599
+ Nx = 128, Nv = 512
1600
+ Figure 8: L2- and L∞ errors with respect to a reference solution for the strong Landau damping benchmark
1601
+ in d = 2. Computed with time-step τ =
1602
+ 1
1603
+ 16. The reference solution was computed using Nx = 256,
1604
+ Nv = 1 024.
1605
+ with (x, y, z, u, v, w) ∈ [0, L]3 × R3 where k = 0▷2, α = 10−3, L = 4π, and v0 = 2▷4. These parameters are
1606
+ the same as the ones chosen by Kormann.[19] The velocity space is cut at vmax = 10 and we use τ =
1607
+ 1
1608
+ 16
1609
+ as time-step. We carry out simulations at dierent resolutions; the nest uses Nx = 32, Nv = 64, and
1610
+ therefore more than eight billion quadrature nodes in phase-space. Using eight nodes of the Claix cluster
1611
+ with two GPUs each, the computation of all n = 800 time-steps took 3:58 hours. Again, only double
1612
+ precision arithmetic is considered.
1613
+ Figure 11 shows the evolution of electric energy over time. In contrast to the d = 1 benchmark, the
1614
+ amplitude of the perturbation of the equilibrium is smaller, which leads to a delayed excitement of the
1615
+ electric eld as well as delayed vortex-formation. The peak electric energy is reached at t ≈ 35. The
1616
+ lower resolution simulation is not able to capture some of the peak-timings and after t ≈ 30 exhibits a
1617
+ faster oscillation than the higher resolution simulation. However, even with low resolution of only 8 points
1618
+ in spatial and 16 points in velocity-direction the NuFI is still able to capture the overall dynamics in a
1619
+ qualitatively correct manner up to t ≈ 30.
1620
+ Figure 12 shows a representative cross-section of the electric eld at z = 0. The electric eld aligns along
1621
+ the x-axis with positive direction for approximately y > 15 and negative direction for y < 15.
1622
+ 4.5 On the Conservation of Energy
1623
+ From Section 2.5 we know that all Lp-norms of fτ,h as well as kinetic entropy are conserved exactly by
1624
+ NuFI. While the conservation is exact, the actual numerical values of the integrals in (15) and (16) can
1625
+ only be approximated by means of quadrature formulæ.
1626
+ The same holds true for the total energy: its value can also only be approximated by means of quadrature.
1627
+ Additionally, however, we cannot expect an exact conservation of energy due to various discretisation errors.
1628
+ This even holds for the semi-discrete scheme where h → 0 with a xed time-step τ. In particular, in many
1629
+ mechanical systems, symplectic time integrators usually do not conserve energy exactly; however the error
1630
+ in total energy remains bounded and does not grow over time. In other words: while these schemes usually
1631
+ do not conserve energy exactly, they are free of a systematic energy drift. Thus the question arises whether
1632
+ this is also the case in NuFI.
1633
+ To at least partially address this question, we consider the two stream instability benchmark in d = 1,
1634
+ τ =
1635
+ 1
1636
+ 32. At time t = 0 the initial data f0 and corresponding charge density ρ are very smooth; thus
1637
+ the conserved quantities and the total energy can accurately be computed using numerical quadrature.
1638
+ The values obtained at t = 0 can thus serve as reference values. We then proceed as follows: in every
1639
+ time-step the integrals are evaluated using the same quadrature rule as in (13). The results are illustrated
1640
+ in Figure 13. For the entropy and Lp-norms the deviations from the value at t = 0 are quadrature errors
1641
+ only. The value for total energy contains both quadrature and discretisation errors. However, we observe
1642
+ that the relative errors of the approximate total energy are of the same magnitude as the quadrature errors
1643
+ for the other conserved quantities. We thus conclude that the error in total energy is smaller than the
1644
+ quadrature error; a systematic energy drift – if present – could only be detected by using more quadrature
1645
+ points. As this is the case for all tested resolutions, we conclude that an energy drift is unlikely.
1646
+ 16
1647
+
1648
+ t = 0
1649
+ t = 25
1650
+ t = 50
1651
+ Figure 9: The electric eld Eτ,h for the strong Landau damping benchmark in d = 2 at dierent times t.
1652
+ Left we display the magnitude |E(t, x)| of the electric eld, the right hand side illustrates the
1653
+ direction. The simulation was run with τ =
1654
+ 1
1655
+ 16, Nx = 32, Nv = 128.
1656
+ 17
1657
+
1658
+ 10
1659
+ 8
1660
+ J.
1661
+ 0.
1662
+ 0.2
1663
+ 10E
1664
+ 12
1665
+ 10
1666
+ 8
1667
+ 0
1668
+ +
1669
+ 0
1670
+ N
1671
+ 4
1672
+ 6
1673
+ 8
1674
+ 10
1675
+ 120.08
1676
+ 12
1677
+ 0.07
1678
+ 10
1679
+ 0.06
1680
+ 0.05
1681
+ 0.04
1682
+ 0.03
1683
+ 0.02
1684
+ 0.01
1685
+ 10
1686
+ 212
1687
+ 10
1688
+ 8
1689
+ .-
1690
+
1691
+ 0
1692
+ t
1693
+ 0
1694
+ 4
1695
+ 6
1696
+ 8
1697
+ 10
1698
+ 1212
1699
+ 10
1700
+ 0.2
1701
+ 0.15
1702
+ 0.1
1703
+ 0.05
1704
+ 10En
1705
+ 12
1706
+ 10
1707
+ 8
1708
+ 6
1709
+ 2
1710
+ 0
1711
+ 0
1712
+ N
1713
+ 4
1714
+ 6
1715
+ 10
1716
+ 12 t = 0
1717
+ t = 25
1718
+ t = 50
1719
+ Figure 10: The same as Figure 9, but this time with high resolution Nx = 128, Nv = 512. Both simulations
1720
+ qualitatively produce the same electric eld.
1721
+ 18
1722
+
1723
+ 10
1724
+ 8
1725
+ J.
1726
+ 0.
1727
+ 0.2
1728
+ 10E
1729
+ 12
1730
+ 10
1731
+ 8
1732
+ 0
1733
+ +
1734
+ 0
1735
+ N
1736
+ 4
1737
+ 6
1738
+ 8
1739
+ 10
1740
+ 120.08
1741
+ 12
1742
+ 0.07
1743
+ 10
1744
+ 0.06
1745
+ 0.05
1746
+ 0.04
1747
+ 0.03
1748
+ 0.02
1749
+ 0.01
1750
+ 10
1751
+ 212
1752
+ 10
1753
+ 8
1754
+ .-
1755
+
1756
+ 0
1757
+ t
1758
+ 0
1759
+ 4
1760
+ 6
1761
+ 8
1762
+ 10
1763
+ 1212
1764
+ 10
1765
+ 0.2
1766
+ 0.15
1767
+ 0.1
1768
+ 0.05
1769
+ 10En
1770
+ 12
1771
+ 10
1772
+ 8
1773
+ 6
1774
+ 2
1775
+ 0
1776
+ 0
1777
+ N
1778
+ 4
1779
+ 6
1780
+ 10
1781
+ 12 0
1782
+ 5
1783
+ 10
1784
+ 15
1785
+ 20
1786
+ 25
1787
+ 30
1788
+ 35
1789
+ 40
1790
+ 45
1791
+ 50
1792
+ 10−3
1793
+ 10−2
1794
+ 10−1
1795
+ 100
1796
+ 101
1797
+ 102
1798
+ 103
1799
+ 104
1800
+ 105
1801
+ t
1802
+ 1
1803
+ 2∥Eτ,h∥2
1804
+ L2
1805
+ Nx = 8, Nv = 16
1806
+ Nx = 16, Nv = 32
1807
+ Nx = 32, Nv = 64
1808
+ Figure 11: Electric energy for the two stream instability benchmark in d = 3. Time-step τ =
1809
+ 1
1810
+ 16.
1811
+ 4.6 Computational Time and Scaling
1812
+ As mentioned before, NuFI can be very eciently implemented on GPU clusters. In this section, we thus
1813
+ look at the computational time and scaling behaviour of NuFI. The code for these computations is available
1814
+ from the authors per request. We consider the cases d = 1 and d = 2 only, as they allow larger numbers of
1815
+ samples: for d = 3 the number of quadrature nodes grows too quickly and we would end up with graphs
1816
+ containing only a few computational results.
1817
+ First we consider the computational time on a single node of the Claix cluster, see Table 2. For the
1818
+ case d = 1 only one GPU and single precision was used, both GPUs and double precision was used for
1819
+ d = 2. Starting with Nx = 8, Nv = 32, we measured the total computational time for n = 480 time-steps
1820
+ of τ =
1821
+ 1
1822
+ 16, i. e., simulations were stopped at tend = 30. For each subsequent simulation the values of Nx
1823
+ and Nv were doubled.
1824
+ The computational times are displayed in Figure 14. For d = 1 the computation time stays below 10−1 s
1825
+ until roughly one million quadrature nodes. Before this point, there are still spare execution units in the
1826
+ GPU thus computational time remains approximately constant. Afterwards we observe linear scaling until
1827
+ roughly one billion points. At this point there is again a upwards kink in the graph. We believe that this is
1828
+ due to caching eects: until this points the coecients of φτ,h for a single time-step t into the 128 KiB
1829
+ large cache of the GPU. For the d = 2 we observe linear scaling starting from the second measurement
1830
+ point.
1831
+ Next we consider a strong scaling experiment in d = 2, with Nx = 64, Nv = 256, and n = 480 time-steps,
1832
+ in double precision. Starting with a single node, we measure the computational time with an increasing
1833
+ number of computational nodes of the Claix cluster. The results are illustrated in Figure 15. We observe
1834
+ almost optimal strong scaling, i. e., when doubling the number of computational nodes the computation
1835
+ time is cut in half. After the measurement point with eight computational nodes there is slight kink in the
1836
+ plot which we believe is caused by the base calculations which take the same amount of time independent of
1837
+ the number of nodes like the Poisson solver, which uses a serial, non-parallelised implementation. We plan
1838
+ to carry out larger simulations on bigger machines, once corresponding computational resources become
1839
+ available to us.
1840
+ 5 Conclusion
1841
+ The numerical ow iteration is a new method for numerically solving the Vlasov–Poisson equation with
1842
+ excellent conservation properties, low memory requirements, and high arithmetic intensity. It is ideally
1843
+ 19
1844
+
1845
+ t = 0
1846
+ t = 25
1847
+ t = 50
1848
+ Figure 12: The electric eld Eτ,h for the two stream benchmark in d = 3, at dierent times t for z = 0.
1849
+ Left: magnitude |Eτ,h|2, right: directions in the xy-plane. The simulation was run with τ =
1850
+ 1
1851
+ 16,
1852
+ Nx = 32, Nv = 64, i. e., using 8 589 934 592 quadrature points.
1853
+ 20
1854
+
1855
+ 10°
1856
+ 30
1857
+ 25
1858
+ 20
1859
+ 10
1860
+ 10
1861
+ 15
1862
+ 20
1863
+ 25
1864
+ 30En
1865
+ 30
1866
+ 25
1867
+ -
1868
+ 20
1869
+ 7
1870
+ 15
1871
+ 10
1872
+ 2
1873
+ n
1874
+ 0
1875
+ t.
1876
+ 0
1877
+ n
1878
+ 10
1879
+ 15
1880
+ 20
1881
+ 25
1882
+ 30 Eh
1883
+ OE
1884
+ 0.12
1885
+ 25
1886
+ 0.1
1887
+ 20
1888
+ 0.08
1889
+ 0.06
1890
+ 10
1891
+ 0.04
1892
+ 0.0Z
1893
+ 00
1894
+ 5
1895
+ 10
1896
+ 15
1897
+ 20
1898
+ 25En
1899
+ 30
1900
+ 25
1901
+ 20
1902
+ 15
1903
+ 10
1904
+ 0
1905
+ 0
1906
+ n
1907
+ 10
1908
+ 15
1909
+ 20
1910
+ 25
1911
+ 30Eh
1912
+ 30
1913
+ 25
1914
+ 20
1915
+ 10
1916
+ 00
1917
+ 5
1918
+ 10
1919
+ 15 ,
1920
+ 20
1921
+ 25
1922
+ 30En
1923
+ 30
1924
+ 25
1925
+ 20
1926
+ 15
1927
+ 10
1928
+ 0
1929
+ 0
1930
+ n
1931
+ 10
1932
+ 15
1933
+ 20
1934
+ 25
1935
+ 300
1936
+ 10
1937
+ 20
1938
+ 30
1939
+ 40
1940
+ 50
1941
+ 60
1942
+ 70
1943
+ 80
1944
+ 90
1945
+ 100
1946
+ −15%
1947
+ −10%
1948
+ −05%
1949
+ 0%
1950
+ 05%
1951
+ 10%
1952
+ 15%
1953
+ t
1954
+ Quadrature Error of ∥fτ,h∥L1
1955
+ Nx = 64, Nv = 128
1956
+ Nx = 128, Nv = 256
1957
+ Nx = 256, Nv = 512
1958
+ 0
1959
+ 10
1960
+ 20
1961
+ 30
1962
+ 40
1963
+ 50
1964
+ 60
1965
+ 70
1966
+ 80
1967
+ 90
1968
+ 100
1969
+ −15%
1970
+ −10%
1971
+ −05%
1972
+ 0%
1973
+ 05%
1974
+ 10%
1975
+ 15%
1976
+ t
1977
+ Quadrature Error of ∥fτ,h∥L2
1978
+ Nx = 64, Nv = 128
1979
+ Nx = 128, Nv = 256
1980
+ Nx = 256, Nv = 512
1981
+ 0
1982
+ 10
1983
+ 20
1984
+ 30
1985
+ 40
1986
+ 50
1987
+ 60
1988
+ 70
1989
+ 80
1990
+ 90
1991
+ 100
1992
+ −15%
1993
+ −10%
1994
+ −05%
1995
+ 0%
1996
+ 05%
1997
+ 10%
1998
+ 15%
1999
+ t
2000
+ Quadrature Error of Entropy
2001
+ Nx = 64, Nv = 128
2002
+ Nx = 128, Nv = 256
2003
+ Nx = 256, Nv = 512
2004
+ 0
2005
+ 10
2006
+ 20
2007
+ 30
2008
+ 40
2009
+ 50
2010
+ 60
2011
+ 70
2012
+ 80
2013
+ 90
2014
+ 100
2015
+ −15%
2016
+ −10%
2017
+ −05%
2018
+ 0%
2019
+ 05%
2020
+ 10%
2021
+ 15%
2022
+ t
2023
+ Approximate Error of Total Energy
2024
+ Nx = 64, Nv = 128
2025
+ Nx = 128, Nv = 256
2026
+ Nx = 256, Nv = 512
2027
+ Figure 13: Quadrature errors when computing the L1-norm, L2-norm, and kinetic entropy of fτ,h for the
2028
+ two stream instability benchmark in d = 1 using τ =
2029
+ 1
2030
+ 32. These quantities are conserved exactly,
2031
+ their numerical value, however, can only be approximated using quadrature. The values are
2032
+ compared to the approximations at time t = 0. Total energy cannot be expected to be conserved
2033
+ exactly, and cannot be evaluated exactly, either. However, its approximate error is of the same
2034
+ order of magnitude as the quadrature error of the exactly preserved quantities and no drift is
2035
+ visible.
2036
+ 102
2037
+ 103
2038
+ 104
2039
+ 105
2040
+ 106
2041
+ 107
2042
+ 108
2043
+ 109
2044
+ 1010
2045
+ 10−1
2046
+ 101
2047
+ 103
2048
+ 105
2049
+ NxNv
2050
+ tcomp (in s)
2051
+ (a) d = 1
2052
+ 104
2053
+ 105
2054
+ 106
2055
+ 107
2056
+ 108
2057
+ 109
2058
+ 1010
2059
+ 10−1
2060
+ 101
2061
+ 103
2062
+ 105
2063
+ N 2
2064
+ xN 2
2065
+ v
2066
+ tcomp (in s)
2067
+ (b) d = 2
2068
+ Figure 14: Computational times for n = 480 time-steps and Nx = 2k, Nv = 2k+2, k = 3, 4, 5, ▷ ▷ ▷ . Left:
2069
+ d = 1, single precision, one GPU of the Claix cluster. Right: d = 2, double precision, one node
2070
+ with two GPUs. Complexity grows linearly with the number of quadrature points N d
2071
+ xN d
2072
+ v . For
2073
+ d = 1 caching eects become visible at 109 quadrature points.
2074
+ 21
2075
+
2076
+ 20
2077
+ 21
2078
+ 22
2079
+ 23
2080
+ 24
2081
+ 24
2082
+ 25
2083
+ 26
2084
+ 27
2085
+ 28
2086
+ 29
2087
+ nodes
2088
+ tcomp (in s)
2089
+ Figure 15: Strong scaling with the number of nodes for d = 2, Nx = 64, Nv = 256, n = 480 time-steps,
2090
+ and double precision, where both GPUs on each node of the Claix cluster are used. We observe
2091
+ almost optimal strong scaling; for 16 nodes parallel eciency is only slightly reduced.
2092
+ suited for modern ultra-parallel high-performance computing hardware and workstations alike. We believe
2093
+ that these properties will nally enable suciently resolved simulations of the Vlasov–Poisson equation for
2094
+ the most important case d = 3, already in ‘Tier 2’ data centres.
2095
+ Several extensions to the scheme are possible. The approach can directly be applied to multi-species
2096
+ systems and can be extended to the full Maxwell equations.
2097
+ In this work, for simplicity, we used entirely uniform discretisations. However, one can easily envision
2098
+ adaptive schemes: φτ,h can be stored using an adaptive space–time discretisation, adaptive numerical quad-
2099
+ rature can be used, as well as adaptive time-stepping schemes. However, as usual, adaptive schemes make
2100
+ eective parallelisation signicantly harder and require sophisticated load-balancing and synchronisation
2101
+ mechanisms.
2102
+ Inhomogeneous right hand sides g(t, x, v) of the Vlasov equation (1) can also easily be taken into account.
2103
+ In this case the solution formula from Lemma 2.3 becomes:
2104
+ f(t, x, v) = f0
2105
+
2106
+ Φ0
2107
+ t(x, v)
2108
+
2109
+ +
2110
+  t
2111
+ 0
2112
+ g
2113
+
2114
+ s, Φs
2115
+ t(x, v)
2116
+
2117
+ ds▷
2118
+ (33)
2119
+ The last integral can then be eciently approximated using the numerical ow Ψτ,h and the trapezoidal
2120
+ rule. This way collision operators could also be incorporated into the simulation.
2121
+ Acknowledgments
2122
+ Matthias Kirchhart started this work as a member of RWTH Aachen University, where he also received
2123
+ funding from the German research foundation (DFG), project number 432219818, ‘Vortex Methods for
2124
+ Incompressible Flows’.
2125
+ The idea, analysis, and content were created there.
2126
+ He now works for Intel
2127
+ Deutschland GmbH, which kindly permitted the completion of this article.
2128
+ Paul Wilhelm is recipient of a scholarship from the German national high performance computing
2129
+ organisation (NHR).
2130
+ We would like to acknowledge the work of Jan Eifert, who helped in the implementation of the code.
2131
+ Without these fundings and support, this work would not have been possible.
2132
+ References
2133
+ [1]
2134
+ E. Hairer, G. Wanner and C. Lubich. Geometric Numerical Integration. Structure-Preserving Al-
2135
+ gorithms for Ordinary Dierential Equations. 2nd ed. Springer Series in Computational Mathematics
2136
+ 31. Springer, 2006. isbn: 3540306633.
2137
+ [2]
2138
+ L. N. Trefethen and J. A. C. Weideman. ‘The Exponentially Convergent Trapezoidal Rule’. In: SIAM
2139
+ Review 58.3 (Jan. 2014), pp. 385–458. issn: 0036–1445. doi: 10.1137/130932132.
2140
+ [3]
2141
+ G.-H. Cottet and P.-A. Raviart. ‘Particle Methods for the One-Dimensional Vlasov–Poisson Equations’.
2142
+ In: SIAM Journal on Numerical Analysis 21.1 (June 1984), pp. 52–76. issn: 0036–1429. doi: 10.
2143
+ 1137/0721003.
2144
+ 22
2145
+
2146
+ [4]
2147
+ P. Raviart. ‘An analysis of particle methods’. In: Numerical Methods in Fluid Dynamics (1985),
2148
+ pp. 243–324. doi: 10.1007/BFb0074532.
2149
+ [5]
2150
+ R. Hockney and J. Eastwood. Computer Simulation Using Particles. CRC Press, Mar. 2021. isbn:
2151
+ 978-1-4398-2205-0.
2152
+ [6]
2153
+ J Denavit. ‘Numerical simulation of plasmas with periodic smoothing in phase space’. In: Journal of
2154
+ Computational Physics 9.1 (1972), pp. 75–98. issn: 0021-9991. doi: 10.1016/0021-9991(72)90037-X.
2155
+ [7]
2156
+ B. Wang, G. H. Miller and P. Colella. ‘A Particle-in-cell Method with Adaptive Phase-space Remapping
2157
+ for Kinetic Plasmas’. In: SIAM J. Sci. Comput. 33.6 (Dec. 2011), pp. 3509–3537. doi: 10.1137/
2158
+ 100811805.
2159
+ [8]
2160
+ G. Russo and J. A. Strain. ‘Fast Triangulated Vortex Methods for the 2D Euler Equations’. In: Journal
2161
+ of Computational Physics 111.2 (1994), pp. 291–323. issn: 0021-9991. doi: 10.1006/jcph.1994.1065.
2162
+ [9]
2163
+ R. P. Wilhelm and M. Kirchhart. ‘An interpolating particle method for the Vlasov–Poisson equation’.
2164
+ In: Journal of Computational Physics 473 (2023), p. 111720. issn: 0021-9991. doi: 10.1016/j.jcp.
2165
+ 2022.111720.
2166
+ [10]
2167
+ A. Myers, P. Colella and B. Straalen. ‘A 4th-Order Particle-in-Cell Method with Phase-Space
2168
+ Remapping for the Vlasov–Poisson Equation’. In: SIAM Journal on Scientic Computing 39.9 (Feb.
2169
+ 2016), B467–B485. issn: 1095–7197. doi: 10.1137/16M105962X.
2170
+ [11]
2171
+ G.-H. Cottet, J.-M. Etancelin, F. Perignon and C. Picard. ‘High order semi-Lagrangian particle meth-
2172
+ ods for transport equations: numerical analysis and implementation issues’. In: ESAIM: Mathematical
2173
+ Modelling and Numerical Analysis 48.4 (2014), 1029–1060. doi: 10.1051/m2an/2014009.
2174
+ [12]
2175
+ N. Crouseilles, M. Mehrenberger and E. Sonnendr¨ucker. ‘Conservative semi-Lagrangian schemes for
2176
+ Vlasov equations’. In: Journal of Computational Physics 229.6 (2010), pp. 1927–1953. issn: 0021-9991.
2177
+ doi: 10.1016/j.jcp.2009.11.007.
2178
+ [13]
2179
+ J. A. Rossmanith and D. C. Seal. ‘A positivity-preserving high-order semi-Lagrangian discontinuous
2180
+ Galerkin scheme for the Vlasov–Poisson equations’. In: Journal of Computational Physics 230.16
2181
+ (2011), pp. 6203–6232. issn: 0021–9991. doi: doi.org/10.1016/j.jcp.2011.04.018.
2182
+ [14]
2183
+ N. Besse and E. Sonnendr¨ucker. ‘Semi-Lagrangian schemes for the Vlasov equation on an unstructured
2184
+ mesh of phase space’. In: Journal of Computational Physics 191.2 (2003-11), pp. 341–376. issn:
2185
+ 0021–9991. doi: 10.1016/S0021-9991(03)00318-8.
2186
+ [15]
2187
+ G.-H. Cottet. ‘Semi-Lagrangian particle methods for high-dimensional Vlasov–Poisson systems’. In:
2188
+ Journal of Computational Physics 365 (2018), pp. 362–375. issn: 0021–9991. doi: 10.1016/j.jcp.
2189
+ 2018.03.042.
2190
+ [16]
2191
+ F. Filbet and E. Sonnendr¨ucker. ‘Comparison of Eulerian Vlasov Solvers’. In: Computer Physics
2192
+ Communications 150.3 (July 2001), pp. 247–266. issn: 0010–4655. doi: 10.1016/S0010-4655(02)
2193
+ 00694-X.
2194
+ [17]
2195
+ F. Filbet, E. Sonnendr¨ucker and P. Bertrand. ‘Conservative Numerical Schemes for the Vlasov
2196
+ Equation’. In: Journal of Computational Physics 172.1 (Sept. 2001), pp. 166–187. issn: 0021–9991.
2197
+ doi: 10.1006/jcph.2001.6818.
2198
+ [18]
2199
+ T. Arber and R. Vann. ‘A Critical Comparison of Eulerian-Grid-Based Vlasov Solvers’. In: Journal of
2200
+ Computational Physics 180.1 (2002), pp. 339–357. issn: 0021–9991. doi: 10.1006/jcph.2002.7098.
2201
+ [19]
2202
+ K. Kormann. ‘A Semi-Lagrangian Vlasov Solver in Tensor Train Format’. In: SIAM Journal on
2203
+ Scientic Computing 37.4 (2015), B613–B632. doi: 10.1137/140971270.
2204
+ [20]
2205
+ L. Einkemmer. ‘A performance comparison of semi-Lagrangian discontinuous Galerkin and spline
2206
+ based Vlasov solvers in four dimensions’. In: Journal of Computational Physics 376 (2019), pp. 937–
2207
+ 951. issn: 0021-9991. doi: 10.1016/j.jcp.2018.10.012.
2208
+ 23
2209
+
Q9E5T4oBgHgl3EQfZg88/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
QNA0T4oBgHgl3EQfDP_p/content/tmp_files/2301.02002v1.pdf.txt ADDED
@@ -0,0 +1,792 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ Ultrafast chiroptical switching in UV-excited molecules
4
+
5
+ Vincent Wanie1*, Etienne Bloch2, Erik P. Månsson1, Lorenzo Colaizzi1,3, Sergey Ryabchuk3,4,
6
+ Krishna Saraswathula1,3, Andrea Trabattoni1,5, Valérie Blanchet2, Nadia Ben Amor6,
7
+ Marie-Catherine Heitz6, Yann Mairesse2, Bernard Pons2*, Francesca Calegari 1, 3, 4*
8
+
9
+ 1Center for Free-Electron Laser Science, Deutsches Elektronen-Synchrotron DESY, Notkestr. 85, 22607 Hamburg, Germany
10
+ 2Université de Bordeaux - CNRS - CEA, CELIA, UMR5107, F-33405 Talence, France
11
+ 3Physics Department, Universität Hamburg, Luruper Chaussee 149, 22761 Hamburg, Germany
12
+ 4The Hamburg Centre for Ultrafast Imaging, Universität Hamburg, Luruper Chaussee 149, 22761 Hamburg, Germany
13
+ 5Institute of Quantum Optics, Leibniz Universität Hannover, Welfengarten 1, 30167 Hannover, Germany
14
+ 6CNRS, UPS, LCPQ (Laboratoire de Chimie et Physique Quantiques), FeRMI, 118 Route Narbonne, F-31062 Toulouse, France
15
16
+
17
+ Molecular chirality is a key design property for many technologies including bioresponsive
18
+ imaging 1, circularly polarized light detection 2 and emission 3, molecular motors 4,5 and
19
+ chiroptical switches 6,7. Imaging and manipulating the primary steps of transient chirality is
20
+ therefore central for controlling numerous physical, chemical and biological properties that
21
+ arise from chiral molecules in response to external stimuli. So far, the manifestation of
22
+ electron-driven chiral dynamics in neutral molecules has not been demonstrated at their
23
+ natural timescale. Here, we use time-resolved photoelectron circular dichroism (TR-PECD)
24
+ to image the dynamics of coherent electronic motion in neutral chiral molecules and
25
+ disclose its impact on the molecular chiral response. We report on a rapid sign inversion of
26
+ the chiroptical signal occurring in ~7 fs following the UV-excitation of methyl-lactate
27
+ molecules. The populated electronic coherences can be used for chiroptical switching
28
+ where the amplitude and direction of the net photoelectron current generated by PECD is
29
+ controlled. The interpretation of the results is supported by theoretical modelling of both
30
+ the molecular photoexcitation to Rydberg states and the subsequent photoionization via
31
+ PECD. Our findings establish a general method to investigate electron dynamics in a variety
32
+ of chiral systems with high sensitivity and pave the way to a new scheme for enantio-
33
+ sensitive charge-directed reactivity in neutral chiral molecules.
34
+
35
+
36
+ 2
37
+
38
+ Chirality is a peculiar property that characterizes the majority of biochemical systems: a chiral
39
+ molecule exists in two geometrical configurations that are non-superimposable mirror images
40
+ of each other - defined as (R) and (S) enantiomers - exhibiting different physical and chemical
41
+ properties when interacting with another chiral entity. This chiral recognition is central to
42
+ many fields of applied sciences, including enantioselective catalysis, drug engineering and
43
+ biophysics 7,8. Capturing the primary steps of chiral recognition and the mechanisms dictating
44
+ the outcomes of a chiral interaction would thus have a significant impact in various fields
45
+ working with chiral property of matter. At the ultrafast electronic timescale for instance, the
46
+ opportunity to steer electrons responsible for chemical activity notably promises a way to
47
+ control the outcome of enantio-sensitive reactions 9 via charge-directed reactivity 10–12.
48
+ However, the ability to track and control electron-driven chiral interactions as well as other
49
+ electron dynamics in biochemically-relevant neutral molecules in general remains to be
50
+ demonstrated.
51
+
52
+ In this context, the temporal resolution provided by attosecond technologies developed in
53
+ the past twenty years gives access to the fastest electron dynamics of matter on their natural
54
+ timescale. Seminal pump-probe experiments using attosecond light pulses have revealed
55
+ valence electron dynamics in atoms
56
+ 13, autoionization dynamics in molecules
57
+ 14,
58
+ photoionization delays in solids 15,16 as well as electron-driven charge migration in
59
+ biomolecules 12,17. However, the intrinsically high photon energy of attosecond light sources
60
+ inevitably leads to target ionization, which results in probing ultrafast dynamics of cationic
61
+ states. Investigating the light-induced electron dynamics of biochemically-relevant neutral
62
+ molecules with high temporal resolution requires new experimental approaches. Two
63
+ important technological challenges must be addressed. First, the pump pulse must have well-
64
+
65
+ 3
66
+
67
+ defined characteristics: (i) a photon energy below the ionization threshold, (ii) a broadband
68
+ energy spectrum to trigger electron motion among multiple electronic states and (iii) a time
69
+ duration that provides a prompt excitation before any nuclear motion can take place,
70
+ together with sufficient temporal resolution. Because of the low ionization potential of most
71
+ molecular systems, laser pulses with such characteristics are confined to a narrow spectral
72
+ region covering the ultraviolet (UV) and the vacuum-UV ranges, which also avoids triggering
73
+ complex high-order, strong-field multiphoton driven processes that typically do not occur in
74
+ nature 18,19.
75
+ Second, the spectroscopic observable must be carefully chosen. In other words, how to probe
76
+ electron dynamics with an increased sensitivity compared to typical ultrafast spectroscopic
77
+ methods such as all-optical transient absorption spectroscopy or time-resolved
78
+ photoelectron and photoion spectroscopies 20,21? Since circularly polarized light possesses a
79
+ chiral character, a promising approach is to use the chiroptical response of bio-relevant
80
+ systems to investigate their ultrafast dynamics.
81
+
82
+ It has been known since 1976 that the photoionization of randomly oriented chiral molecules
83
+ by circularly polarized radiation yields a photoelectron angular distribution (PAD) which
84
+ presents a forward-backward asymmetry along the light propagation axis 22,23. This
85
+ asymmetry, referred to as PhotoElectron Circular Dichroism (PECD), is orders of magnitude
86
+ larger than the conventional absorption circular dichroism 24, and it is therefore well suited
87
+ to the study of chiral features in the gas phase. PECD was shown to be strongly sensitive to a
88
+ wealth of structural molecular properties, including the nature of ionized orbitals and
89
+ continuum states 25, isomerism and chemical substitution 26,27 and the vibrational structure
90
+ of the cation 28. While structural features are generally gained from static measurements, the
91
+
92
+ 4
93
+
94
+ availability of femtosecond and attosecond pulses provides a valuable tool to characterize
95
+ and manipulate the dynamical properties of chiral neutral molecules at the electron
96
+ timescale. So far, the strength of PECD has only been demonstrated in the time domain for
97
+ the investigation of nuclear dynamics, internal conversion and photoionization delays in chiral
98
+ molecules 29–32.
99
+
100
+ Here, we employ a novel laser-based technology delivering few-femtosecond UV pulses 33 to
101
+ perform TR-PECD measurements with unprecedented temporal resolution and extend the
102
+ method to the investigation of electron-driven chiral interactions in neutral methyl-lactate
103
+ (ML) – a derivative of lactate, which has regained substantial interest due to its recently
104
+ uncovered metabolic functions 34. A linearly polarized UV pulse promptly launches a coherent
105
+ electronic wavepacket in the bio-relevant molecule while a time-delayed circularly polarized
106
+ near-infrared (NIR) probe triggers ionization from the transient wavepacket (Fig.1a). The
107
+ chiroptical molecular response is characterized by the preferential direction of emission of
108
+ the ejected electron through PECD. Numerical simulations modelling the experiment show
109
+ that the NIR pulse tracks electronic beatings initiated by the coherent superposition of
110
+ Rydberg states created by the broadband UV pump pulse. The resulting oscillations of the
111
+ charge density can be used for chiroptical switching in which the net photoelectron current
112
+ from the initially isotropic sample is reversed on a sub-10 fs timescale when adjusting the
113
+ pump-probe time delay.
114
+
115
+ Fig. 1 shows an overview of the experimental approach used to investigate in real-time the
116
+ chiral dynamics of ML. Following sudden photoexcitation of (S)-ML enantiomers just below
117
+ the ionization threshold by a few-fs UV pulse, a circularly polarized near-infrared (NIR) probe
118
+
119
+ 5
120
+
121
+ pulse leads to photoionization (a). For each pump-probe delay 𝑡, the photoelectron angular
122
+ distributions (PADs) are collected with a velocity map imaging spectrometer (VMIs) for both
123
+ left (ℎ = +1) and right (ℎ = −1) circular polarizations of the NIR probe pulse. These raw
124
+ distributions are then fitted using a pBasex inversion algorithm 29 to yield the PAD
125
+ 𝑆(")(𝜖, 𝜃, 𝑡), where 𝜖 is the kinetic energy of the photoelectron and 𝜃 its emission angle with
126
+ respect to the light propagation axis (see section 1.2 of the supplement). The differential PECD
127
+ image is then defined as the normalized difference 𝑃𝐸𝐶𝐷(𝜖, 𝜃, 𝑡) = 2
128
+ $("#)(%,',())$(%#)(%,',()
129
+ $("#)(%,',()*$(%#)(%,',()
130
+ and its evolution is observed as a function of the pump-probe delay 𝑡. Figure 1b displays
131
+ 𝑃𝐸𝐶𝐷(𝜖, 𝜃, 𝑡) for 𝑡 = 5, 11, 17 and 26 fs, which captures an inversion of the photoelectron
132
+ forward-backward asymmetry in about 7 fs.
133
+
134
+ The inversion procedure consists in fitting the VMIs images according to 𝑆(")(𝜖, 𝜃, 𝑡) =
135
+
136
+ 𝑏+
137
+ (")(𝜖, 𝑡)𝑃+(cos𝜃)
138
+ ,-
139
+ +./
140
+ where 𝑃+(cos𝜃) are Legendre polynomials and 𝑁 = 3 is the total
141
+ number of photons absorbed to reach the continuum from the ground state: the pump-
142
+ induced excitation involves 2 photons while ionization consists in the absorption of one NIR
143
+ probe photon. 𝑏/
144
+ (")(𝜖, 𝑡) corresponds to the total (angle-integrated) photoionization cross
145
+ section. In the case of an achiral sample, the PAD is symmetric with respect to the light
146
+ propagation axis so that the 𝑆(")(𝜖, 𝜃, 𝑡) expansion is restricted to even 𝑛’s. For chiral
147
+ samples, the asymmetric contribution to the photoelectron yield emerges from the additional
148
+ 𝑏+
149
+ (") amplitude coefficients with odd 𝑛. Besides 𝑃𝐸𝐶𝐷(𝜖, 𝜃, 𝑡), it is convenient to introduce
150
+ an angularly-integrated quantity to characterize the whole chiroptical response at fixed
151
+ kinetic energy. Defining it as the difference of electrons emitted in the forward and backward
152
+ hemispheres for ℎ = +1, normalized to the average number of electrons collected in one
153
+
154
+ 6
155
+
156
+ hemisphere, we obtain the so-called multiphotonic (MP)-PECD 35, 𝑀𝑃 − 𝑃𝐸𝐶𝐷(𝜖, 𝑡) =
157
+ 2𝛽0
158
+ (*0)(𝜖, 𝑡) −
159
+ 0
160
+ , 𝛽1
161
+ (*0)(𝜖, 𝑡) +
162
+ 0
163
+ 2 𝛽3
164
+ (*0)(𝜖, 𝑡) where 𝛽+
165
+ (*0)(𝜖, 𝑡) =
166
+ 4&
167
+ ("#)(%,()
168
+ 4'
169
+ ("#)(%,().
170
+ In our analysis the 𝑏3 coefficient has been omitted due to its negligible contribution. Figure 2
171
+ shows the multiphotonic PECD as a function of the delay 𝑡 for three 𝜖 ranges defined by the
172
+ time- and energy-resolved map of the 𝛽0 (𝜖, 𝑡) coefficient (see Fig. S2d of the supplement).
173
+ The results are shown for (S)-ML but the measurements were also performed in (R)-ML – the
174
+ comparison of enantiomeric responses is shown in Fig. S4 of the supplement. For the lowest
175
+ 𝜖 range between 25-100 meV (a), it is striking that the photoelectron emission asymmetry
176
+ reverses in the laboratory frame in ~7 fs. A clear modulation of the asymmetry remains over
177
+ few tens of fs, which is also observed at higher 𝜖 between 100-300 meV (b) and 300-720 meV
178
+ (c). Importantly, such a clear modulation hardly shows up in the time-resolved 𝛽/ (𝜖, 𝑡)
179
+ coefficient associated to the photoelectron yield (see Section 1.2 of the supplement). This
180
+ latter observable provides a limited signal to noise ratio compared to the odd coefficients
181
+ 𝛽,+*0(𝜖, 𝑡) evaluated from differential measurements, highlighting the capabilities of TR-
182
+ PECD over conventional photoelectron spectroscopy. In the following, we aim at identifying
183
+ the origin of the modulation, taking into account that the timescale possibly involves
184
+ electronic and/or nuclear degrees of freedom.
185
+
186
+ We modeled the experiment including both the UV photoexcitation and the NIR
187
+ photoionization steps. A detailed description of the theoretical method is provided in Section
188
+ 2 of the supplement. Briefly, we treat the photoexcitation and photoionization as sequential
189
+ perturbative processes. The electronic spectrum of ML and the two-photon excitation
190
+ amplitudes are obtained via large-scale time-dependent density functional theory 36.
191
+
192
+ 7
193
+
194
+ Ionization from the excited states is described using the continuum multiple scattering X𝛼
195
+ approach 37,38. Importantly, we work within the frozen-nuclei approximation.
196
+ We illustrate the results of our calculations in Figure 3. The pump pulse leads to the
197
+ population of excited states stemming mainly from excitation of the highest occupied
198
+ molecular orbital (HOMO) of the ML ground state (see section 2.1 of the supplement). We
199
+ thus present in panel (a) the two-photon excitation cross sections for the states associated to
200
+ almost pure HOMO excitation and leading, through subsequent photoionization by the probe
201
+ pulse, to the emission of photoelectrons with kinetic energies 𝜖 = 250 and 500 meV,
202
+ respectively. These 𝜖 values are representative of the second and third energy ranges
203
+ discriminated in the experimental data, respectively – the case of low energy photoelectron
204
+ dynamics (𝜖 = 50 meV) is discussed in Section 2.2.3 of the supplement. Including excitations
205
+ from the HOMO states of panel (a) in the dynamical calculations yield the time-resolved MP-
206
+ PECD displayed in panels (b) and (d). The calculations are started at 𝑡 = 10 fs to ensure no
207
+ temporal overlap between the pump and probe pulses. The computed asymmetry presents
208
+ clear modulations as a function of the pump-probe delay. The power spectra of the MP-PECD
209
+ signals, obtained by Fourier analysis, are compared to their experimental counterparts in
210
+ panels (c) and (e). An excellent agreement is found at 𝜖 = 250 meV where the oscillatory
211
+ pattern of the MP-PECD is traced back to the pump-induced coherent superposition of 3d and
212
+ 4p Rydberg states highlighted in Figure 3(a). This coherent superposition leads to quantum
213
+ beatings with ~15 fs period, associated to ~300 meV frequency, which survive long after the
214
+ pump pulse vanishes. We note that the most stable geometries of methyl-lactate do not
215
+ possess any vibrational mode in the vicinity of 2200 cm-1 (~15 fs) 39. Similarly, the coherent
216
+ superposition of 4p and 4d,f Rydberg states explains the oscillatory feature of the MP-PECD
217
+ at 𝜖 = 500 meV. A small mismatch of ~60 meV is observed between the experimental and
218
+
219
+ 8
220
+
221
+ theoretical power spectra in Figure 3(e). This is typical of the error made in quantum
222
+ chemistry computations of excited state energies. The convergence of our results with
223
+ respect to the number of excited states included in the dynamical calculations is illustrated in
224
+ Section 2.2.3 of the supplement.
225
+
226
+ In our fixed-nuclei description, the electron coherences leading to oscillatory MP-PECD do not
227
+ vanish and even lead to an overestimation of the MP-PECD amplitude at all 𝑡. In the
228
+ experiments, these coherences are found to decrease as time elapses, through decreasing
229
+ MP-PECD amplitudes (Fig. 2), but are preserved on a relatively long timescale, up to ~40 fs.
230
+ The time it takes for decoherence to occur in photoionized 40–47 and photoexcited 18,48
231
+ molecules is currently the subject of extensive investigations. Electronic wavepackets are
232
+ subject to three main decoherence sources: (i) the decrease of the overlap between nuclear
233
+ wavepackets on different electronic states, (ii) the dephasing of the different wavepacket
234
+ components, and (iii) the change of electronic state populations induced by non-adiabatic
235
+ couplings 42. Describing the coupled electron and nuclear dynamics in an energy range where
236
+ tens of electronic states lie (see Figure S11 of the supplement) is beyond state-of-the-art
237
+ theoretical approaches. Therefore, we alternatively performed classical molecular dynamics
238
+ calculations on the ground state of cationic ML to which all the HOMO Rydberg states involved
239
+ in the pump-probe dynamics correlate upon ionization. Two main classes of trajectories
240
+ showed up, converging towards two different isomeric forms of the ML cation. Within each
241
+ class of trajectories, the Rydberg state energies of neutral ML were found to remain
242
+ approximately parallel to each other and to the ML cation along the reaction path (see Figure
243
+ S11 of the supplement). This favors the overlap of the nuclear wavepackets associated to
244
+ different electronic Rydberg states over an extended time duration and thus minimizes the
245
+
246
+ 9
247
+
248
+ role of decoherence mechanisms (i) and (ii). This also strengthens the frozen-nuclei
249
+ assumption with regard to the description of electronic quantum beatings which are dictated
250
+ by energy differences and should therefore remain basically the same from 𝑡 = 0 fs onwards.
251
+ The most probable source of decoherence in the present investigation is non-adiabatic
252
+ dynamics, not only between the states populated by the pump but also with the lower-lying
253
+ states reached by internal conversion soon after the prompt excitation. This information is
254
+ encoded in the ~40 fs lifetime of the transient 𝑏/ signal shown in Fig. S3 of the supplement.
255
+
256
+ Our findings on fast evolving MP-PECD and related chiroptical switching, driven by long-
257
+ lasting electronic coherences, can be highlighted by reducing the number of transient excited
258
+ states to two. In the case of 𝜖 = 250 meV, the main MP-PECD oscillation frequency is 291 meV
259
+ and corresponds to the coherent superposition of the 3d and 4p Rydberg states, respectively
260
+ located at 𝐸15 = 8.834 eV and 𝐸26 = 9.120 eV on the energy scale (Fig. 3a). For a single
261
+ molecular orientation 𝑹H, the excited electron wavepacket thus reads, at time 𝑡 after the pump
262
+ pulse vanishes, ΦJ𝑹H, 𝒓, 𝑡L = ∑
263
+ 𝐴7(𝑹H)Ψ7(𝒓)exp(−𝑖𝐸7𝑡/ℏ)
264
+ 7.15,26
265
+ where 𝐴8J𝑹HL are the two-
266
+ photon transition amplitudes associated to the excited states Ψ7(𝒓). The associated electron
267
+ density can be partitioned as
268
+ 𝜌J𝑹H, 𝒓, 𝑡L = 𝜌8+9:"J𝑹H, 𝒓L + 𝜌9;:<<J𝑹H, 𝒓LcosVJ𝐸26 − 𝐸15L𝑡/ℏW (1)
269
+ where 𝜌8+9:"J𝑹H, 𝒓L = 𝐴15
270
+ , J𝑹HLΨ15
271
+ , (𝒓) + 𝐴26
272
+ , J𝑹HLΨ26
273
+ , (𝒓), with 𝑹H such that 𝐴8J𝑹HL ∈ ℝ, and
274
+ 𝜌9;:<<J𝑹H, 𝒓L = 2𝐴15J𝑹HL𝐴26J𝑹HLΨ15(𝒓)Ψ26(𝒓). Figure 4(a) shows the coherent part
275
+ 𝜌J𝑹H, 𝒓, 𝑡L − 𝜌8+9:"J𝑹H, 𝒓L of the electron density, oscillating back-and-forth along the
276
+ molecular structure with a period 𝑇 = 2𝜋ℏ/(𝐸26 − 𝐸15) of 14.4 fs. Ionization of the 3d and
277
+
278
+ 10
279
+
280
+ 4p state superposition leads, after averaging over the orientations 𝑹H, to the total
281
+ photoelectron yield which can be decomposed similarly to (1):
282
+ 𝑏/
283
+ (±0)(𝜖, 𝑡) = 𝑏/(&)*+
284
+ (±0) (𝜖) + 𝑏/),*--
285
+ (±0) (𝜖)cosVJ𝐸26 − 𝐸15L𝑡/ℏW. (2)
286
+ The computed yield is presented in Figure 4(b) for 𝜖 = 250 meV, showing how the coherent
287
+ state superposition leading to 𝑏/),*--
288
+ (±0) (𝜖)cosVJ𝐸26 − 𝐸15L𝑡/ℏW modulates the incoherent sum
289
+ 𝑏/(&)*+
290
+ (±0) (𝜖) of individual cross sections. The unnormalized MP-PECD can in turn be written as:
291
+ 𝑀𝑃-𝑃𝐸𝐶𝐷(𝜖, 𝑡) = 𝑀𝑃-𝑃𝐸𝐶𝐷8+9:"(𝜖) + 𝑀𝑃-𝑃𝐸𝐶𝐷9;:<<(𝜖)cos ]
292
+ >?./)?01@(
293
+
294
+ − Δ𝜙` (3)
295
+ where the additional phase Δ𝜙 arises from the interference of the state-selective continuum
296
+ partial wave amplitudes building the asymmetry of the photoelectron yield (see the
297
+ supplement) – as usual, this interference is washed out at the level of the total photoelectron
298
+ yield 37,49. The temporal evolution of the unnormalized two-state MP-PECD is shown in Figure
299
+ 4(c) from which we extract the time delay Δ𝑡 = 1.8 fs associated to Δ𝜙 = 0.79 rad. The MP-
300
+ PECD reverses sign within one period of the oscillation since the asymmetries of single 3d-
301
+ and 4p-mediated pathways, contributing to the incoherent MP-PECD (dashed red line in Fig.
302
+ 4c) around which the coherent part oscillates, are opposite for 𝜖 = 250 meV. Such a
303
+ chiroptical switching depends not only on the transient bound resonances but also on the
304
+ dichroism encoded by ionization. In this respect, we note that a photoexcitation electron
305
+ circular dichroism configuration 50 in which molecules are photoexcited by a circularly
306
+ polarized pump pulse and subsequently ionized with a linearly polarized probe would reduce
307
+ the degrees of freedom to only the transient bound resonances.
308
+
309
+ In conclusion, we have shown how the prompt creation of an electronic wavepacket by a few-
310
+ fs UV pulse dictates the chiral properties of methyl-lactate in the first instants following
311
+
312
+ 11
313
+
314
+ photoexcitation, allowing for ultrafast chiroptical switching. The high sensitivity of TR-PECD
315
+ that allows us to track electronic coherences is intrinsic to its differential, background-free
316
+ nature. A complete modeling of the experiment identifies how the chiral character of Rydberg
317
+ states contributes to chiroptical switching and additional trajectory calculations describe how
318
+ the electron dynamics driving the effect can preserve the coherence over several tens of
319
+ femtoseconds. The experimental results demonstrate that our spectroscopic method can
320
+ provide insights on the nature of chiral interactions at the few-fs timescale, and notably on
321
+ the role of the primary electron dynamics in the light-induced chiral response of complex
322
+ molecular systems such as chiral biomolecules and organometallic complexes. Offering a
323
+ route to investigate the fundamental origin of chiral recognition that is ubiquitous in
324
+ biological phenomena 51, the possibility to control the photoelectron emission direction in the
325
+ laboratory frame also offers the potential to engineer petahertz switching devices based on
326
+ chiral interactions. Most importantly, these results provide new perspectives towards the
327
+ possibility to achieve enantio-sensitive charge-directed reactivity in neutral molecules to
328
+ steer the outcome of photophysical and photochemical reactions 9.
329
+ References
330
+ 1.
331
+ Heffern, M. C., Matosziuk, L. M. & Meade, T. J. Lanthanide probes for bioresponsive
332
+ imaging. Chem Rev 114, 4496–4539 (2014).
333
+ 2.
334
+ Yang, Y., da Costa, R. C., Fuchter, M. J. & Campbell, A. J. Circularly polarized light
335
+ detection by a chiral organic semiconductor transistor. Nat Photonics 7, 634–638
336
+ (2013).
337
+ 3.
338
+ Brandt, J. R., Wang, X., Yang, Y., Campbell, A. J. & Fuchter, M. J. Circularly Polarized
339
+ Phosphorescent Electroluminescence with a High Dissymmetry Factor from PHOLEDs
340
+ Based on a Platinahelicene. J Am Chem Soc 138, 9743–9746 (2016).
341
+ 4.
342
+ Koumura, N., Zijlstra, R. W. J., van Delden, R. A., Harada, N. & Feringa, B. L. Light-
343
+ driven monodirectionalmolecular rotor. Nature 401, 152–155 (1999).
344
+ 5.
345
+ Leigh, D. A. Genesis of the Nanomachines: The 2016 Nobel Prize in Chemistry.
346
+ Angewandte Chemie International Edition 55, 14506--14508 (2016).
347
+ 6.
348
+ Isla, H. & Crassous, J. Helicene-based chiroptical switches. Comptes Rendus Chimie
349
+ vol. 19 39–49 Preprint at https://doi.org/10.1016/j.crci.2015.06.014 (2016).
350
+
351
+ 12
352
+
353
+ 7.
354
+ Feringa, B. L., van Delden, R. A., Koumura, N. & Geertsema, E. M. Chiroptical
355
+ Molecular Switches. Chemical Reviews 100, 1789–1816 (2000).
356
+ 8.
357
+ Jochen R. Brandt, Francesco Salerno & Matthew J. Fuchter. The added value of small-
358
+ molecule chirality in technological applications. Nature Reviews | Chemistry 1, 1–12
359
+ (2017).
360
+ 9.
361
+ Ordonez, A. F., Ayuso, D., Decleva, P. & Smirnova, O. Geometric fields and new
362
+ enantio-sensitive observables in photoionization of chiral molecules.
363
+ arXiv:2106.14264v3 [physics.chem-ph] (2021).
364
+ 10.
365
+ Weinkauf, R., Schlag, E. W., Martinez, T. J. & Levine, R. D. Nonstationary Electronic
366
+ States and Site-Selective Reactivity. The Journal of Physical Chemistry A 101, 7702–
367
+ 7710 (1997).
368
+ 11.
369
+ Remacle, F. & Levine, R. D. An electronic time scale in chemistry. Proceedings of the
370
+ National Academy of Sciences 103, 6793–6798 (2006).
371
+ 12.
372
+ Månsson, E. P. et al. Real-time observation of a correlation-driven sub 3 fs charge
373
+ migration in ionised adenine. Communications Chemistry 4, (2021).
374
+ 13.
375
+ Goulielmakis, E. et al. Real-time observation of valence electron motion. Nature 466,
376
+ 739–743 (2010).
377
+ 14.
378
+ Haessler, S. et al. Phase-resolved attosecond near-threshold photoionization of
379
+ molecular nitrogen. Physical review A 80, 011404 (2009).
380
+ 15.
381
+ Cavalieri, A. L. et al. Attosecond spectroscopy in condensed matter. Nature 449,
382
+ 1029–1032 (2007).
383
+ 16.
384
+ Schultze, M. et al. Delay in photoemission. Science 328, 1658–1662 (2010).
385
+ 17.
386
+ Calegari, F. et al. Ultrafast electron dynamics in phenylalanine initiated by attosecond
387
+ pulses. Science 346, 336–339 (2014).
388
+ 18.
389
+ Matselyukh, D. T., Despré, V., Golubev, N. v., Kuleff, A. I. & Wörner, H. J. Decoherence
390
+ and revival in attosecond charge migration driven by non-adiabatic dynamics. Nature
391
+ Physics 1–8 (2022).
392
+ 19.
393
+ Cireasa, R. et al. Probing molecular chirality on a sub-femtosecond timescale. Nat
394
+ Phys 11, 654–658 (2015).
395
+ 20.
396
+ Suzuki, T. & Whitaker, B. J. Non-adiabatic effects in chemistry revealed by time-
397
+ resolved charged-particle imaging. International Reviews in Physical Chemistry 20,
398
+ 313–356 (2001).
399
+ 21.
400
+ Geneaux, R., Marroux, H. J. B., Guggenmos, A., Neumark, D. M. & Leone, S. R.
401
+ Transient absorption spectroscopy using high harmonic generation: A review of
402
+ ultrafast X-ray dynamics in molecules and solids. Philosophical Transactions of the
403
+ Royal Society A 377, 20170463 (2019).
404
+ 22.
405
+ Ritchie, B. Theory of the angular distribution for ejection of photoelectrons from
406
+ optically active molecules and molecular negative ions. Physical Review A 13, 1441–
407
+ 1415 (1976).
408
+ 23.
409
+ Böwering, N. et al. Asymmetry in photoelectron emission from chiral molecules
410
+ induced by circularly polarized light. Physical Review Letters 86, 1187–1190 (2001).
411
+ 24.
412
+ Daly, S., Powis, I., Garcia, G. A., Soldi-Lose, H. & Nahon, L. Photoionization of
413
+ epichlorohydrin enantiomers and clusters studied with circularly polarized vacuum
414
+ ultraviolet radiation. Journal of Chemical Physics 134, 064306 (2011).
415
+ 25.
416
+ Nahon, L., Garcia, G. A., Harding, C. J., Mikajlo, E. & Powis, I. Determination of chiral
417
+ asymmetries in the valence photoionization of camphor enantiomers by
418
+
419
+ 13
420
+
421
+ photoelectron imaging using tunable circularly polarized light. Journal of Chemical
422
+ Physics 125, 114309 (2006).
423
+ 26.
424
+ Garcia, G. A., Dossmann, H., Nahon, L., Daly, S. & Powis, I. Photoelectron circular
425
+ dichroism and spectroscopy of trifluoromethyl- and methyl-oxirane: A comparative
426
+ study. Physical Chemistry Chemical Physics 16, 16214–16224 (2014).
427
+ 27.
428
+ Powis, I., Harding, C. J., Garcia, G. A. & Nahon, L. A valence photoelectron imaging
429
+ investigation of chiral asymmetry in the photoionization of fenchone and camphor.
430
+ ChemPhysChem 9, 475–483 (2008).
431
+ 28.
432
+ Garcia, G. A., Nahon, L., Daly, S. & Powis, I. Vibrationally induced inversion of
433
+ photoelectron forward-backward asymmetry in chiral molecule photoionization by
434
+ circularly polarized light. Nature Communications 4, 1–6 (2013).
435
+ 29.
436
+ Comby, A. et al. Relaxation Dynamics in Photoexcited Chiral Molecules Studied by
437
+ Time-Resolved Photoelectron Circular Dichroism: Toward Chiral Femtochemistry.
438
+ Journal of Physical Chemistry Letters 7, 4514–4519 (2016).
439
+ 30.
440
+ Beaulieu, S. et al. Attosecond-resolved photoionization of chiral molecules. Science
441
+ 358, 1288–1294 (2017).
442
+ 31.
443
+ Blanchet, V. et al. Ultrafast relaxation investigated by photoelectron circular
444
+ dichroism: an isomeric comparison of camphor and fenchone. Physical Chemistry
445
+ Chemical Physics 23, 25612 (2021).
446
+ 32.
447
+ Svoboda, V. et al. Femtosecond photoelectron circular dichroism of chemical
448
+ reactions. Science Advances 8, eabq2811 (2022).
449
+ 33.
450
+ Galli, M. et al. Generation of deep ultraviolet sub-2-fs pulses. Optics Letters 44, 1308–
451
+ 1311 (2019).
452
+ 34.
453
+ Brooks, G. A. et al. Lactate in contemporary biology: a phoenix risen. Journal of
454
+ Physiology 600, 1229–1251 (2022).
455
+ 35.
456
+ Lehmann, C. S., Ram, N. B., Powis, I. & Janssen, M. H. M. Imaging photoelectron
457
+ circular dichroism of chiral molecules by femtosecond multiphoton coincidence
458
+ detection. Journal of Chemical Physics 139, 234307 (2013).
459
+ 36.
460
+ Runge, E. & Gross, E. K. U. Time-dependent density-functional theory for
461
+ multicomponent systems. Physical Review Letters 52, 997–1000 (1984).
462
+ 37.
463
+ Dill, D. & Dehmer, J. L. Electron-molecule scattering and molecular photoionization
464
+ using the multiple-scattering method. The Journal of Chemical Physics 61, 692–699
465
+ (1974).
466
+ 38.
467
+ Slater, J. C. & Johnson, K. H. Self-Consistent-Field Xα Cluster Method for Polyatomic
468
+ Molecules and Solids. Physical Review B 5, 844–853 (1972).
469
+ 39.
470
+ Borba, A., Gómez-Zavaglia, A., Lapinski, L. & Fausto, R. Matrix isolation FTIR
471
+ spectroscopic and theoretical study of methyl lactate. Vibrational Spectroscopy 36,
472
+ 79–88 (2004).
473
+ 40.
474
+ Vacher, M., Steinberg, L., Jenkins, A. J., Bearpark, M. J. & Robb, M. A. Electron
475
+ dynamics following photoionization: Decoherence due to the nuclear-wave-packet
476
+ width. Physical Review A 92, 040502(R) (2015).
477
+ 41.
478
+ Arnold, C., Vendrell, O. & Santra, R. Electronic decoherence following
479
+ photoionization: Full quantum-dynamical treatment of the influence of nuclear
480
+ motion. Physical Review A 95, 033425 (2017).
481
+ 42.
482
+ Vacher, M., Bearpark, M. J., Robb, M. A. & Malhado, J. P. Electron Dynamics upon
483
+ Ionization of Polyatomic Molecules: Coupling to Quantum Nuclear Motion and
484
+ Decoherence. Physical Review Letters 118, 083001 (2017).
485
+
486
+ 14
487
+
488
+ 43.
489
+ Arnold, C., Vendrell, O., Welsch, R. & Santra, R. Control of Nuclear Dynamics through
490
+ Conical Intersections and Electronic Coherences. Phys Rev Lett 120, 123001 (2018).
491
+ 44.
492
+ Golubev, N. v., Begušić, T. & Vaníček, J. On-the-Fly Ab Initio Semiclassical Evaluation
493
+ of Electronic Coherences in Polyatomic Molecules Reveals a Simple Mechanism of
494
+ Decoherence. Physical Review Letters 125, 083001 (2020).
495
+ 45.
496
+ Despré, V., Golubev, N. v. & Kuleff, A. I. Charge Migration in Propiolic Acid: A Full
497
+ Quantum Dynamical Study. Physical Review Letters 121, 203002 (2018).
498
+ 46.
499
+ Despré, V. et al. Attosecond hole migration in benzene molecules surviving nuclear
500
+ motion. Journal of Physical Chemistry Letters 6, 426–431 (2015).
501
+ 47.
502
+ Lara-Astiaso, M., Palacios, A., Decleva, P., Tavernelli, I. & Martín, F. Role of electron-
503
+ nuclear coupled dynamics on charge migration induced by attosecond pulses in
504
+ glycine. Chemical Physics Letters 683, 357–364 (2017).
505
+ 48.
506
+ Csehi, A., Badankó, P., Halász, G. J., Vibók, Á. & Lasorne, B. On the preservation of
507
+ coherence in the electronic wavepacket of a neutral and rigid polyatomic molecule.
508
+ Journal of Physics B: Atomic, Molecular and Optical Physics 53, 184005 (2020).
509
+ 49.
510
+ Powis, I. Photoelectron circular dichroism in chiral molecules. in Advances in Chemical
511
+ Physics vol. 138 267–329 (2008).
512
+ 50.
513
+ Beaulieu, S. et al. Photoexcitation circular dichroism in chiral molecules. Nature
514
+ Physics 14, 484–489 (2018).
515
+ 51.
516
+ Zehnacker, A. & Suhm, M. A. Chirality recognition between neutral molecules in the
517
+ gas phase. Angewandte Chemie International Edition 47, 6970–6992 (2008).
518
+
519
+
520
+ 15
521
+
522
+
523
+
524
+ Fig. 1: Light-induced chiral dynamics of methyl-lactate. (a) A few-femtosecond linearly polarized UV pulse creates an
525
+ electronic wavepacket of Rydberg states via 2-photon absorption. The red and blue structure illustrates a sketch of a time-
526
+ evolving Rydberg wavepacket in the neutral molecule that is probed by a time-delayed circularly polarized NIR pulse. The
527
+ probing step leads to the ejection of an electron along the light propagation axis defined by the vector k. The large bandwidth
528
+ of the probe pulse allows two or more Rydberg states to reach the same electron continuum state and thus probe their
529
+ interference. (b) The resulting photoelectron angular distribution is recorded by a velocity map imaging spectrometer. For
530
+ each time delay, an image is recorded for both left (LCP) and right circular polarization (RCP) of the probe pulse. The
531
+ differential image PECD(ϵ,θ,t) defined in the main text is shown for time delays of 5, 11,17 and 26 fs for photoelectrons with
532
+ kinetic energies from 25 to 300 meV along the radial coordinate.
533
+
534
+ 5 fs
535
+ 11 fs
536
+ 17 fs
537
+ 26 fs delay16
538
+
539
+
540
+
541
+ Fig. 2: Energy-resolved analysis. Temporal evolution of the MP-PECD in (S) - methyl-lactate for three different kinetic energy
542
+ ranges of photoelectrons: 25-100 meV (a), 100-300 meV (b) and 300-720 meV (c). The standard error of the mean over 5
543
+ measurements is shown by the shaded areas and the solid blue lines show the fit of the oscillations from t = 0 fs (see the
544
+ corresponding Fourier analysis in Fig. 3d,e). The change of sign in (a) identifies a reversal of the photoelectron emission
545
+ direction in the laboratory frame, generating a net photoelectron current 𝑗!
546
+ "! along the light propagation direction k.
547
+
548
+ 25-10
549
+ 20
550
+ 60
551
+ (b)
552
+ 100-300 meV
553
+ 20
554
+ 20
555
+ 40
556
+ 60
557
+ (c)
558
+ 300-720 meV
559
+ 2017
560
+
561
+
562
+
563
+ Fig. 3: Modelling of the experiment. (a) Two-photon absorption (TPA) cross sections for the excited states stemming from
564
+ almost pure HOMO excitation. The cross sections have been convoluted with the UV-pump intensity squared. The blue and
565
+ green curves correspond to the spectral probe intensity, down-shifted in energy to elicit the transient Rydberg states leading
566
+ to photoelectrons with energies 𝜖 = 250 and 𝜖 = 500 meV through ionization by one photon centred at frequency
567
+ 𝜔 = 1.75 eV. (b) Calculated MP-PECD for photoelectrons with 𝜖 = 250 meV (green) compared to the experiment (blue).
568
+ The calculations start at 𝑡 = 10 fs corresponding to the end of the pump-probe overlap region (yellow area). (c)
569
+ Corresponding power spectra from a Fourier analysis. The frequency axis is displayed for beatings of excited states with an
570
+ energy spacing between 150 meV (27.6 fs) and 500 meV (8.3 fs). The main peak from the computed curve is at 291 meV
571
+ (14.2 fs). The power spectrum of the experimental data shows a peak frequency at 280 meV (14.8 fs) and was evaluated up
572
+ to 𝑡 = 35 fs where the oscillations vanish. (d) Calculated MP-PECD for photoelectrons with 𝜖 = 500 meV (green) compared
573
+ to the experiment (blue). (e) Corresponding power spectra with a central component at 269 meV (15.4 fs) for the computed
574
+ curve. The power spectrum of the experimental data is shown with a central frequency at ~329 meV (12.6 fs).
575
+
576
+ 20
577
+ TPA cross section (a.u.)
578
+ (a)
579
+ [1-NIR] 250 mev [I1-NIR] 500 meV
580
+ 15
581
+ 4df
582
+ 10
583
+ 3d
584
+ 5
585
+ 4p
586
+ 0
587
+ 8.8
588
+ 9.0
589
+ 9.2
590
+ 9.4
591
+ 9.6
592
+ Energy (eV)
593
+ 15
594
+ 30
595
+ (a.u.)
596
+ (b)
597
+ +- Experiment
598
+ (c)
599
+ Exp.
600
+ Th.
601
+ Theory (250 meV)
602
+ MP-PECD (%)
603
+ 10
604
+ 20
605
+ MP-PECD (%)
606
+ 0.8
607
+ 0.6
608
+ 5
609
+ 10
610
+ 0.4
611
+ 0
612
+ 0.2
613
+ 10
614
+
615
+ 200 300 400 500
616
+ Frequency (meV)
617
+ 10
618
+ 40
619
+ (a.u.)
620
+ (d)
621
+ Experiment
622
+ e)
623
+ Exp
624
+ Th.
625
+ Theory (500 meV)
626
+ MP-PECD (%)
627
+ MP-PECD (%)
628
+ spectrum
629
+ 0.8
630
+ 5
631
+ 20
632
+ 0.6
633
+ 0
634
+ 0.4
635
+ -5
636
+ FT
637
+ -10
638
+ 40
639
+ T
640
+ 0
641
+ 0
642
+ 10
643
+ 20
644
+ 30
645
+ 40
646
+ 50
647
+ 60
648
+ 200 300 400 500
649
+ Delay (fs)
650
+ Frequency (meV)18
651
+
652
+
653
+ Fig. 4: Electron-driven dynamics in the case of quantum beating monitored by 3d and 4p states. (a) Temporal evolution of
654
+ the coherent part of the electron density over one period of the quantum beating between the 3d and 4p states (see equation
655
+ (1) of the text). (b) Photoelectron yield as a function of the pump-probe delay for 𝜖 = 250 meV. The quantum beating leads
656
+ to an oscillatory behavior of the yield which is in phase with the variation of the electron density shown in (a), as expected
657
+ from equations (1) and (2). (c) MP-PECD as a function of the pump-probe delay for 𝜖 = 250 meV. The dichroism is delayed
658
+ by 𝛥𝜙 = 0.79 rad (1.8 fs) with respect to the variation of the electron density because of the interferences between the
659
+ continuum partial wave amplitudes (see equation (3)).
660
+ METHODS
661
+
662
+ Experimental setup
663
+ The experiments were carried out with a 1 kHz titanium:sapphire laser (FemtoPower, Spectra-
664
+ Physics), delivering 25-fs, 12-mJ pulses at 800 nm. 5.6 mJ were used for spectral broadening
665
+ in a 2.3-m long hollow-core fiber (few-cycle inc.) filled with a pressure gradient of helium gas.
666
+ The fiber setup seeds an all-vacuum Mach-Zehnder-like interferometer with 5-fs near-
667
+ infrared (NIR) pulses. One arm is used for the generation of the UV-pump pulse via third-
668
+ harmonic generation in neon gas (Fig. S1a). A pair of silicon superpolished substrates (Gooch
669
+ & Housego) is used at Brewster angle to attenuate the residual part of the NIR driving field by
670
+ 3 orders of magnitude while reflecting ~16% of the UV radiation (50 nJ). In the second arm of
671
+ the interferometer, the remaining part of the NIR beam is focused to the experimental region
672
+ by a toroidal mirror (f = -900 mm) followed by a motorized zero-order quarter-waveplate
673
+ (B. Halle) in order to control the helicity of the circularly polarized probe pulses (16 μJ), with
674
+
675
+ 10.0 fs
676
+ 13.6 fs
677
+ 17.2 fs
678
+ 20.8 fs
679
+ 24.4 fs
680
+ 7.2 fs
681
+ MP-PECDcross
682
+ MP-PECDincoh19
683
+
684
+ an estimated intensity of 5×1012 Wcm−2 (Fig. S1b). Liquid (S)-methyl-lactate (97%
685
+ enantiomeric excess, Sigma-Aldrich) was evaporated and transported to a velocity map
686
+ imaging spectrometer to measure the photoelectron angular distribution as a function of the
687
+ pump-probe time delay.
688
+ Computation of TR-PECD
689
+
690
+ At time 𝑡 after the pump pulse vanishes, the electron wavepacket formed in a ML molecule
691
+ whose orientation in the laboratory frame is characterized by 𝑹H reads
692
+ ΦJ𝑹H, 𝒓, 𝑡L = ∑ 𝒜8J𝑹HLΨ8(𝒓)exp(−i𝐸8𝑡/ℏ)
693
+ 8
694
+ ,
695
+ where Ψ8(𝒓) are excited states with energies 𝐸8 and two-photon absorption amplitudes from
696
+ the ground state 𝒜8J𝑹HL. These states, energies and transition amplitudes, have been
697
+ obtained by large-scale TDDFT 36 calculations, detailed in Section 2.1 of the supplement. In
698
+ the spectral region spanned by the pump pulse, most of the excited states have a Rydberg
699
+ character and stem from the excitation of the ML HOMO (see Fig. S5 of the supplement).
700
+ The absorption of one NIR photon of the probe pulse leads to the ejection of a photoelectron
701
+ with wavevector 𝒌′H in the molecular frame. The associated ionization dipole is
702
+ 𝒅𝒌C
703
+ ",D:EJ𝑹H, 𝑡L = f 𝒜8J𝑹HLg𝐼0)-FG(𝜔8) < Ψ𝒌C
704
+ ())|𝒆𝒉
705
+ m. 𝒓|Ψ8 > exp(−i𝐸8𝑡/ℏ)
706
+ 8
707
+
708
+ where 𝐼0)-FG(𝜔8) is the spectral intensity of the probe pulse at frequency
709
+ 𝜔8 = 𝑘C,/2 + 𝐼6 − 𝐸8, with 𝐼6 the ML ionization potential, 𝒆𝒉
710
+ m is the circular polarization of
711
+ the probe pulse (ℎ = ±1) and Ψ𝒌C
712
+ ()) is the ingoing scattering state associated to the electron
713
+ ejected in the continuum. Neither the scattering state nor the excited states explicitly depend
714
+ on 𝑡 since the calculations are made assuming that the nuclei remain frozen at their
715
+ equilibrium locations at all 𝑡 (see Section 2.3 of the supplement). Ψ𝒌2
716
+ ())(𝒓) is obtained in the
717
+
718
+ 20
719
+
720
+ framework of the X𝛼 approximation for the exchange electron interaction 37,38, detailed in
721
+ Section 2.2.2 of the supplement.
722
+ Rotating the ionization dipole into the laboratory frame allows us to define the orientation-
723
+ averaged differential ionization cross section as
724
+ 𝑑𝜎s(")
725
+ 𝑑Ω𝒌
726
+ (𝑘, 𝜃, 𝜑, 𝑡) ∝ w 𝑑𝑹H|𝒅𝒌
727
+ ",EI4J𝑹H, 𝑡L|,
728
+ where 𝑘 = 𝑘′ and (𝜃, 𝜑) are the spherical angles characterizing the direction 𝒌H of electron
729
+ ejection in the laboratory frame -- 𝜃 is defined with respect to the pulse propagation direction
730
+ 𝒛y. While the cross section can be put in the closed form
731
+ 5JK(+)
732
+ 5L𝒌 (𝑘, 𝜃, 𝜑, 𝑡) = ∑
733
+
734
+ 𝑏<,,8
735
+ (")(𝑘, 𝑡)𝑌<
736
+ ,8(𝜃, 𝜑)
737
+ ,
738
+ 8.),
739
+ M
740
+ <./
741
+ ,
742
+ where 𝑌<
743
+ ,8(𝜃, 𝜑) are spherical harmonics, we show in section 2.2.2 of the supplement that
744
+ the MP-PECD is
745
+ 𝑀𝑃 − 𝑃𝐸𝐶𝐷(𝜖, 𝑡) =
746
+ 0
747
+ 4','
748
+ ("#)(%,() {2√3𝑏0,/
749
+ (*0)(𝜖, 𝑡) −
750
+ √O
751
+ , 𝑏1,/
752
+ (*0)(𝜖, 𝑡) +
753
+ √00
754
+ 2 𝑏3,/
755
+ (*0)(𝜖, 𝑡)}.
756
+ where 𝜖 =
757
+ ℏ5P5
758
+ ,D , with 𝑚 the electron mass, is the photoelectron kinetic energy. The 𝑏<,,8
759
+ (")
760
+ coefficients basically depend on partial-wave ionization amplitudes weighted by the primary
761
+ excitation factors, as shown in Section 2.2.2 of the supplement.
762
+
763
+
764
+
765
+
766
+ 21
767
+
768
+ ACKNOWLEDGEMENTS
769
+ We thank F. Remacle and O. Smirnova for their constructive feedback and K. Pikull for the
770
+ excellent technical support.
771
+ AUTHOR CONTRIBUTIONS
772
+ V.W., E.B., V.B., Y.M., B.P. and F.C. conceived the experiment. V.W., E.B., E.P.M., L.C., S.R., K.S.
773
+ and A.T. performed the experiments. V.W., E.B. and Y.M., carried out the data analysis.
774
+ M.C.H., N.B.A. and B.P. calculated the molecular and electronic properties of methyl-lactate.
775
+ B.P. performed the PECD calculations. M.C.H. performed the classical trajectory simulations.
776
+ V.W., Y.M., B.P. and F.C. drafted the manuscript. All authors contributed to the discussion of
777
+ the results and the editing of the manuscript.
778
+ COMPETING INTERESTS
779
+ The authors declare no competing interests.
780
+ FUNDING
781
+ We acknowledge financial support from the European Research Council under the ERC-2014-
782
+ StG STARLIGHT (grant no. 637756), European Union’s Horizon 2020 research and innovation
783
+ program No. 682978 – EXCITERS, the German Research Foundation (DFG)—SFB-925—project
784
+ 170620586 and the Cluster of Excellence Advanced Imaging of Matter (AIM).
785
+ DATA AVAILABILITY
786
+ The data that support the findings of this study are available from the corresponding author
787
+ upon reasonable request.
788
+ CODE AVAILABILITY
789
+ The code used for the simulations contained in this study is available from the corresponding
790
+ authors upon reasonable request.
791
+
792
+
QNA0T4oBgHgl3EQfDP_p/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
RtFRT4oBgHgl3EQf8ThG/content/tmp_files/2301.13683v1.pdf.txt ADDED
@@ -0,0 +1,1816 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Friend-training: Learning from Models of Different but Related Tasks
2
+ Mian Zhang†∗, Lifeng Jin⋄, Linfeng Song⋄, Haitao Mi⋄, Xiabing Zhou† and Dong Yu⋄
3
+ †Soochow University, Suzhou, China
4
5
+ ⋄Tencent AI Lab, Bellevue, WA, USA
6
+ {lifengjin,lfsong,haitaomi,dyu}@tencent.com
7
+ Abstract
8
+ Current self-training methods such as standard
9
+ self-training, co-training, tri-training, and oth-
10
+ ers often focus on improving model perfor-
11
+ mance on a single task, utilizing differences in
12
+ input features, model architectures, and train-
13
+ ing processes. However, many tasks in natural
14
+ language processing are about different but re-
15
+ lated aspects of language, and models trained
16
+ for one task can be great teachers for other re-
17
+ lated tasks. In this work, we propose friend-
18
+ training, a cross-task self-training framework,
19
+ where models trained to do different tasks are
20
+ used in an iterative training, pseudo-labeling,
21
+ and retraining process to help each other for
22
+ better selection of pseudo-labels.
23
+ With two
24
+ dialogue understanding tasks, conversational
25
+ semantic role labeling and dialogue rewriting,
26
+ chosen for a case study, we show that the
27
+ models trained with the friend-training frame-
28
+ work achieve the best performance compared
29
+ to strong baselines.
30
+ 1
31
+ Introduction
32
+ Many different machine learning algorithms, such
33
+ as self-supervised learning (Mikolov et al., 2013;
34
+ Devlin et al., 2019; Liu et al., 2021), semi-
35
+ supervised learning (Yang et al., 2021) and weakly
36
+ supervised learning (Zhou, 2018), aim at using un-
37
+ labeled data to boost performance. They have been
38
+ of even greater interest recently given the amount
39
+ of unlabeled data available. Self-training (Scudder,
40
+ 1965) is one semi-supervised learning mechanism
41
+ aiming to improve model performance through
42
+ pseudo-labeling and has been successfully ap-
43
+ plied to computer vision (Lee et al., 2013; Chen
44
+ et al., 2021), natural language processing (Dong
45
+ and Schäfer, 2011; Bhat et al., 2021) and other
46
+ fields (Wang et al., 2019; Kahn et al., 2020).
47
+ The main challenge of self-training is how to
48
+ select high-quality pseudo-labels.
49
+ Current self-
50
+ training algorithms mainly focus on a single task
51
+ ∗Work done when interning at Tencent AI Lab.
52
+ predicate: 喜欢 (like)
53
+ arg-0:
54
+ arg-1: 宫崎骏(Hayao Miyazaki)
55
+ 知道久石让吗?
56
+ (Do you know Joe Hisaishi?)
57
+ 我很喜欢他。
58
+ (I like him so much.)
59
+ 知道啊,宫崎骏的很多电影配
60
+ 乐都是久石让的,比如《幽灵
61
+ 公主》。
62
+ (Yes, I do. Many of Hayao
63
+ Miyazaki’s movie soundtracks
64
+ are composed by Hisaishi, such
65
+ as Princess Mononoke).
66
+ cross-task supervision
67
+ DR
68
+ CSRL
69
+ context
70
+ current utterance
71
+ rewritten utterance
72
+ predicate-arguments
73
+ 我很喜欢久石让。
74
+ (I like Joe Hisaishi so much.)
75
+ Figure 1: An example of cross-task supervision be-
76
+ tween a CSRL parser and a DR system in a di-
77
+ alogue.
78
+ 久 石 让( Joe Hisaishi ) from the rewrit-
79
+ ten utterance provides cross-task supervision to 宫
80
+ 崎骏( Hayao Miyazaki ), the predicted arg-1 of 喜
81
+ 欢(like) from the CSRL parser, while 我( I ) to the pre-
82
+ dicted arg-0.
83
+ when assessing the quality of pseudo-labels and suf-
84
+ fer from gradual drifts of noisy instances (Zhang
85
+ et al., 2021). This work is motivated by the observa-
86
+ tion that learning targets of tasks represent different
87
+ properties of the inputs, and some properties are
88
+ shared across the tasks which can be used as super-
89
+ vision from one task to another. Such properties
90
+ include certain span boundaries in dependency and
91
+ constituency parsing, and some emotion polarities
92
+ in sentiment analysis and emotion detection. Two
93
+ dialogue understanding tasks, conversational se-
94
+ mantic role labeling (CSRL) and dialogue rewriting
95
+ (DR), are also such a pair, with shared properties
96
+ such as coreference and zero-pronoun resolution.
97
+ As shown in Figure 1, the rewritten utterance can
98
+ be used to generate cross-task supervision to the
99
+ arguments of predicate 喜欢(like). We leverage the
100
+ cross-task supervision from friend tasks – different
101
+ but related tasks – as a great criterion for assessing
102
+ the quality of pseudo-labels.
103
+ In this work, we propose friend-training, the
104
+ first cross-task self-training framework. Compared
105
+ to single-task self-training, friend-training exploits
106
+ supervision from friend tasks for better selec-
107
+ arXiv:2301.13683v1 [cs.CL] 31 Jan 2023
108
+
109
+ tion of pseudo-labels. To this end, two novel mod-
110
+ ules are proposed: (1) a translation matcher, which
111
+ maps the pseudo-labels of different tasks for one
112
+ instance into the same space and computes a match-
113
+ ing score representing the cross-task matching de-
114
+ gree of pseudo-labels from different tasks; (2)
115
+ an augmented (instance) selector, which leverages
116
+ both the confidence of pseudo-labels from task-
117
+ specific models and the matching score to select
118
+ instances with pseudo-labels of high quality as new
119
+ training data. We choose CSRL and DR as friend
120
+ tasks to conduct a case study for friend-training,
121
+ and specify the translation matcher and augmented
122
+ selector for friend-training between these tasks. Ex-
123
+ perimental results of domain generalization and
124
+ few-shot learning show friend-training surpasses
125
+ both classical and state-of-the-art semi-supervised
126
+ learning algorithms by a large margin. To summa-
127
+ rize, contributions from this work include:
128
+ • We propose friend-training, the first cross-task
129
+ self-training framework which exploits super-
130
+ vision from friend tasks for better selection of
131
+ pseudo-labels in the iterative training process.
132
+ • We provide specific modeling of friend-training
133
+ between CSRL and DR, with a novel translation
134
+ matcher and a novel augmented selector.
135
+ • Extensive experiments with CSRL and DR
136
+ demonstrate the effectiveness of friend-training,
137
+ outperforming several strong baselines.
138
+ 2
139
+ Related Work
140
+ Self-training Self-training (Scudder, 1965; An-
141
+ gluin and Laird, 1988; Abney, 2002; Lee et al.,
142
+ 2013) is a classical semi-supervised learning frame-
143
+ work (Chapelle et al., 2009) which has been widely
144
+ explored in recent years. The general idea of self-
145
+ training is to adopt a trained model to pseudo-label
146
+ easily acquired unlabeled data and use them to
147
+ augment the training data to retrain the model it-
148
+ eratively. This paradigm shows promising effec-
149
+ tiveness in a variety of tasks: including text classi-
150
+ fication (Mukherjee and Awadallah, 2020; Wang
151
+ et al., 2020a), image classification (Xie et al., 2020;
152
+ Zoph et al., 2020), machine translation (He et al.,
153
+ 2020) and model distillation (Mukherjee and Has-
154
+ san Awadallah, 2020).
155
+ Co-training (Blum and
156
+ Mitchell, 1998) and tri-training (Zhou and Li, 2005)
157
+ are similar iterative training frameworks to self-
158
+ training but with a different number of models or
159
+ considering different views of the training data,
160
+ both of which see wide adoption in NLP (Mihalcea,
161
+ 2004; McClosky et al., 2006; Wan, 2009; Li et al.,
162
+ 2014; Caragea et al., 2015; Lee and Chieu, 2021;
163
+ Wagner and Foster, 2021). These frameworks aim
164
+ at improving performance with multiple models
165
+ trained on one task, without directly leveraging the
166
+ benefit of supervision from related tasks.
167
+ Multi-task Learning Multi-task learning (Caru-
168
+ ana, 1997; Yang et al., 2021) seeks to improve the
169
+ learning performance of one task with the help of
170
+ other related tasks, among which two lines of work
171
+ are related to ours: (1) semi-supervised multi-task
172
+ learning (Liu et al., 2007; Li et al., 2009) combines
173
+ semi-supervised learning and multi-task learning.
174
+ Liu et al. (2007) exploited unlabeled data by ran-
175
+ dom walk and used a task clustering method for
176
+ multi-task learning. Li et al. (2009) integrated ac-
177
+ tive learning (MacKay, 1992) with the model in
178
+ Liu et al. (2007) to retrieve data that are most infor-
179
+ mative for labeling. Although these works tried to
180
+ utilize unlabeled data to enhance multi-task learn-
181
+ ing, our work differs from them in incorporating su-
182
+ pervised signals among tasks to select high-quality
183
+ pseudo-labels for updating models, which is an iter-
184
+ ative training process without additional human an-
185
+ notation. (2) Task grouping (Kumar and III, 2012;
186
+ Standley et al., 2020; Fifty et al., 2021) aims to
187
+ find groups of related tasks and employs multi-task
188
+ learning to each group of tasks, with one model for
189
+ each group. Our work focuses on training single-
190
+ task models, but task grouping techniques can be
191
+ used to look for possible friend tasks.
192
+ Conversational Semantic Role Labeling CSRL
193
+ is a task for predicting the semantic roles of
194
+ predicates in a conversational context.
195
+ Wu
196
+ et al. (2021) leveraged relational graph neural net-
197
+ works (Schlichtkrull et al., 2018) to model both the
198
+ speaker and predicate dependency, achieving some
199
+ promising results. However, the current dataset (Xu
200
+ et al., 2021) for CSRL is limited to mono-domain.
201
+ High-quality labeled data for new domains are
202
+ needed to empower more applicable CSRL models.
203
+ Dialogue Rewriting DR is commonly framed as a
204
+ sequence-to-sequence problem which suffers large
205
+ search space issue (Elgohary et al., 2019; Huang
206
+ et al., 2021). To address it, Hao et al. (2021) cast
207
+ DR to sequence labeling, transforming rewriting
208
+ an utterance as deleting tokens from an utterance
209
+ or inserting spans from the dialogue history into an
210
+ utterance. Jin et al. (2022) improved the continuous
211
+ span issue in (Hao et al., 2021) by first generating
212
+
213
+ multiple spans for each token and slotted rules and
214
+ then replacing a fixed number rules with spans.
215
+ 3
216
+ Friend-training
217
+ Friend-training is an iterative training framework to
218
+ jointly refine models of several friend tasks. Differ-
219
+ ent from self-training, friend-training injects cross-
220
+ task supervision into the selection of pseudo-labels.
221
+ We first briefly describe self-training before pre-
222
+ senting friend-training.
223
+ 3.1
224
+ Self-training
225
+ Classic self-training aims at iteratively refining a
226
+ model of a single task by using both labeled data
227
+ and a large amount of unlabeled corpus. At each
228
+ iteration, the model first assigns the unlabeled data
229
+ with pseudo-labels. Subsequently, a set of the unla-
230
+ beled instances with pseudo-labels is selected for
231
+ training, presumably with information for better
232
+ model generalization. Then cross-entropy of model
233
+ predictions and labels on both gold and pseudo-
234
+ labeled data is minimized to update the model:
235
+ L =
236
+ N
237
+
238
+ i=1
239
+ yi log yi
240
+ pi
241
+ + λ
242
+ N′
243
+
244
+ i=1
245
+ y′
246
+ i log y′
247
+ i
248
+ p′
249
+ i
250
+ ,
251
+ (1)
252
+ where the left term is the loss for the labeled data
253
+ and the right for the unlabeled data while λ is a
254
+ coefficient to balancing them; N(N′) is the number
255
+ of instances, y (y′) is the label and p (p′) is the
256
+ output probability of the model.
257
+ Self-training is usually limited to only one task,
258
+ but there are thousands of NLP tasks already pro-
259
+ posed and many of them are related.
260
+ Models
261
+ trained for one task can be great teachers for other
262
+ related tasks. We explore this cross-task supervi-
263
+ sion in self-training by incorporating two novel
264
+ modules introduced in subsection 3.2.
265
+ 3.2
266
+ Friend-training
267
+ For friend-training with two tasks,1 we have two
268
+ classifiers fa and fb trained on two different tasks
269
+ with labeled training sets La and Lb, with expected
270
+ accuracies ηa and ηb, respectively. The two datasets
271
+ are created independently and the prediction tar-
272
+ gets of the two tasks are partially related through
273
+ a pair of translation functions Fa : ˆYa → Σ
274
+ and Fb : ˆYb → Σ, where Σ is the set of possi-
275
+ ble sub-predictions that all possible predictions
276
+ 1We focus on the two-friend version of friend-training in
277
+ this work, however, friend-training can easily be extended to
278
+ more than two friends.
279
+ of the two tasks ˆYa and ˆYb can be reduced to.
280
+ | ˆYa| ≥ |Σ|, | ˆYb| ≥ |Σ|.
281
+ We assume that the
282
+ translation functions are general functions with
283
+ the expected probability of generating a translation
284
+ ϵF =
285
+ 1
286
+ |Σ|. The translation functions are determin-
287
+ istic and always map the gold labels of the friend
288
+ tasks for the same input to the same translation.
289
+ Both classifiers make predictions on the unla-
290
+ beled set U at iteration k. Some instances Uk
291
+ F
292
+ with pseudo-labels are chosen as new training data
293
+ based on the results of the translation functions,
294
+ φa(x) = Fa(fa(x)) and φb(x) = Fb(fb(x)), and
295
+ some selection criteria, such as total agreement. If
296
+ total agreement is used as the selection criterion,
297
+ the probability of erroneous predictions for fa in
298
+ these instances is
299
+ Prx[fa(x) ̸= f∗
300
+ a(x)|φa(x) = φb(x)]
301
+ =1 − ηaPrx[φa(x) = φb(x)|fa(x) = f∗
302
+ a(x)]
303
+ Prx[φa(x) = φb(x)]
304
+ ,
305
+ (2)
306
+ with f∗ being the optimal classifier.
307
+ Because both classifiers are very different due to
308
+ training data, annotation guidelines, models, pre-
309
+ diction targets, etc., being all different, the two
310
+ classifiers are very likely to be independent of each
311
+ other. Under this condition Equation 2 becomes
312
+ 1 − ηa(ηb + ϵF(1 − ηb))
313
+ Prx[φa(x) = φb(x)]
314
+ =1 −
315
+ Z
316
+ Z + ηbϵF(1 − ηa) + E ,
317
+ (3)
318
+ where Z = ηa(ηb + ϵF(1 − ηb)) and E = ϵ2
319
+ F(1 −
320
+ ηa)(1 − ηb). We give the detailed derivation of
321
+ Equation 2 and 3 in Appendix A.1. This indi-
322
+ cates that the quality of the picked instances is
323
+ negatively correlated with the number of false pos-
324
+ itive instances brought by the noisy translation
325
+ ηbϵF(1 − ηa), and the number of matching nega-
326
+ tive instances E. When ϵF is minimized by choos-
327
+ ing translation functions with a sufficiently large
328
+ co-domain Σ, the probability of error instances
329
+ chosen when two classifiers agree approaches 0.
330
+ This also indicates that even when 1 − ηa is large,
331
+ i.e. fa performs badly, if the co-domain is large,
332
+ the error rate of the chosen instances can still be
333
+ kept very low.2 As the dependence between the
334
+ 2Intuitively, this means independent classifiers trained to
335
+ do different tasks are unlikely to predict the same but wrong
336
+ sub-prediction for a given input, if the sub-prediction includes
337
+ a large number of decisions.
338
+
339
+ two classifiers grows in training, the probability
340
+ of error instances also increases. When they are
341
+ completely dependent on each other, Equation 2
342
+ becomes 1 − ηa, i.e. classic self-training.
343
+ Based on this formulation, two additional mod-
344
+ ules are needed: (1) a translation matcher that
345
+ maps predictions of two models trained on different
346
+ tasks into the same space and computes a matching
347
+ score; (2) an augmented (instance) selector which
348
+ selects instances with pseudo-labels for the clas-
349
+ sifiers considering both the matching score of the
350
+ translated predictions and the model confidences.
351
+ Translation Matcher Given the prediction of mod-
352
+ els of two friend tasks fa(x) and fb(x), the transla-
353
+ tion matcher M leverages translation functions Fa
354
+ and Fb to get the translated pseudo-labels and com-
355
+ putes a matching score m for the pair of pseudo-
356
+ labels, which represents the similarity of the pair
357
+ in the translation space:
358
+ ma,b = M (Fa(fa(x)), Fb(fb(x))) ,
359
+ (4)
360
+ with total agreement being 1. This matching score
361
+ serves as a criterion for the selection of high quality
362
+ pseudo-labels with cross-task supervision.
363
+ Augmented Selector Apart from pseudo-label sim-
364
+ ilarity, other information about pseudo-label quality
365
+ can be found from model confidence, which self-
366
+ training algorithms specifically utilize, to augment
367
+ matching scores. The augmented selector consid-
368
+ ers both the confidence of the pseudo-labels from
369
+ task models, denoted as {ca, cb}, and the matching
370
+ scores:
371
+ qτ = Sτ(ma,b, cτ),
372
+ (5)
373
+ where qτ ∈ {0, 1} represents the selection result
374
+ of the pseudo-label for task τ ∈ a, b. Therefore,
375
+ instances with low matching scores but high con-
376
+ fidence may also be selected as the training data.
377
+ The complete algorithm is shown in Algorithm 1.
378
+ 4
379
+ Friend Training between CSRL and
380
+ DR
381
+ To verify the effectiveness of friend-training, we
382
+ select two dialogue understanding tasks as friend
383
+ tasks to conduct friend-training experiments for a
384
+ case study: conversational semantic role labeling
385
+ (CSRL) and dialogue rewriting (DR). While both
386
+ require skills such as coreference and zero-pronoun
387
+ resolution, the two tasks focus on different proper-
388
+ ties of the dialogue utterance: (1) CSRL focuses
389
+ on extracting arguments of the predicates in the
390
+ Algorithm 1: Two-task friend-training
391
+ Input
392
+ :Labeled data sets for two friend
393
+ tasks, La, Lb; an unlabeled data set
394
+ U; task models fa, fb.
395
+ Output :Refined fa, fb.
396
+ Pre-train fτ with Lτ (τ ∈ a, b);
397
+ while not until the maximum iteration do
398
+ Lu
399
+ a = ∅; Lu
400
+ b = ∅;
401
+ for z in U do
402
+ Generate fa(z), fb(z) and ca, cb;
403
+ ma,b ← Equation 4;
404
+ qa, qb ← Equation 5;
405
+ if qτ = 1 (τ ∈ a, b) then
406
+ Lu
407
+ τ = Lu
408
+ τ + {z, vτ};
409
+ end
410
+ Update fτ with Lτ, Lu
411
+ τ by Equation 1
412
+ (τ ∈ a, b);
413
+ end
414
+ Return fa, fb;
415
+ utterance from the whole dialogue history; (2) DR
416
+ aims to rewrite the last turn of a dialogue to make it
417
+ context-free and fluent by recovering all the ellipsis
418
+ and coreference in the utterance. Figure 2 provides
419
+ an overview of friend-training between the above
420
+ two tasks. Next, we first introduce the task mod-
421
+ els and then specify the translation matcher and
422
+ augmented selector for applying friend-training.
423
+ 4.1
424
+ Task Models
425
+ Task Definition A dialogue consists of N tempo-
426
+ rally ordered utterances {u1, ..., uN}. (1) Given
427
+ utterance ut and K predicates {pred1, ..., predK}
428
+ of ut, a CSRL parser predicts spans from the di-
429
+ alogue as arguments for all predicates. (2) A dia-
430
+ logue rewriter rewrites ut to make it context-free
431
+ according to its context {u1, ..., ut−1}.
432
+ Dialogue Encoder We concatenate dialogue con-
433
+ text {u1, ..., ut−1} and the current utterance ut as
434
+ a sequence of tokens {x1, ..., xM} and encode it
435
+ with BERT (Devlin et al., 2019) to get the contex-
436
+ tualized embeddings:
437
+ E = e1, ..., eM = BERT(x1, ..., xM) ∈ RH×M.
438
+ Encoders for CSRL and DR share no parameters,
439
+ but for simplicity, we use the same notation E for
440
+ their outputs.
441
+ Conversational Semantic Role Labeling With
442
+ the contextualized embeddings, we further gener-
443
+ ate predicate-aware utterance representations G =
444
+
445
+ Unlabeled
446
+ data
447
+ CSRL Parser
448
+ Dialogue
449
+ Rewriter
450
+ Translation
451
+ Matcher
452
+ SSRL Parser
453
+ (𝑝𝑟𝑒𝑑1, 𝒜1)
454
+ Translation Matcher
455
+ 𝑢1
456
+ 𝑢2
457
+ 𝑢3
458
+ 𝑢3
459
+
460
+ 𝑢3
461
+
462
+ (𝑝𝑟𝑒𝑑2, 𝒜2)
463
+ Augmented
464
+ Selector
465
+ (𝑝𝑟𝑒𝑑1, ℬ1)
466
+ (𝑝𝑟𝑒𝑑2, ℬ2)
467
+ (𝑝𝑟𝑒𝑑1, 𝒜1)
468
+ (𝑝𝑟𝑒𝑑2, 𝒜2)
469
+ GM()
470
+ Friend-training
471
+ confidence score
472
+ matching score
473
+ geometric mean
474
+ arguments matching
475
+ GM()
476
+ 𝑚1
477
+ 𝑚2
478
+ 𝑚′
479
+ Step1
480
+ Step2
481
+ Step3
482
+ Figure 2: The overview of the friend-training process between CSRL and DR for one dialogue instance which
483
+ has three utterances and the last utterance contains two predicates. Step1: the unlabeled dialogue is labeled by
484
+ the CSRL parser and dialogue rewriter, resulting in predictions of arguments for the predicates (CSRL) and the
485
+ rewritten utterance (DR), respectively. Step2: Pseudo-labels of both tasks are fed into the translation matcher
486
+ to get their matching scores: the translation matcher first conducts sentence-level semantic role labeling (SSRL)
487
+ on the rewritten utterance u′
488
+ 3 and then compares the results with those of the CSRL parser for matching scores.
489
+ Step3: The threshold-based augmented selector makes the final decision of whether to add each pseudo-label to
490
+ the training data considering both their confidence and matching scores. Best viewed in color.
491
+ {g1, ..., gM} ∈ RH×M as Wu et al. (2021) by ap-
492
+ plying self-attention (Vaswani et al., 2017) to E
493
+ with predicate-aware masking, where a token is
494
+ only allowed to attend to tokens in the same utter-
495
+ ance and tokens from the utterance containing the
496
+ predicate:
497
+ Maski,j =
498
+
499
+ 1
500
+ if u[i] = u[j] or u[j] = u[pred],
501
+ 0
502
+ otherwise,
503
+ where u[m] denotes the utterance containing token
504
+ xm and u[pred] denotes the one with the predicate.
505
+ The predicate-aware representations are then pro-
506
+ jected by a feed-forward network to get the distri-
507
+ bution of labels for each token:
508
+ Pc = softmaxcolumn-wise(WcG + bc) ∈ RC×M,
509
+ where Wc and bc are learnable parameters and C
510
+ is the number of labels. The labels follow BIO se-
511
+ quence labeling scheme: B-X and I-X respectively
512
+ denote the token is the first token and the inner
513
+ token of argument X, where O means the token
514
+ does not belong to any argument. The output of
515
+ the CSRL parser for K predicates are denoted as
516
+ {A1, ..., AK}, where set Ak containing the argu-
517
+ ments for predk.
518
+ Dialogue Rewriting Following Hao et al. (2021),
519
+ we cast DR as sequence labeling. Specifically, a
520
+ binary classifier on the top of E first determines
521
+ whether to keep each token for in utterance ut in
522
+ the rewritten utterance:
523
+ Pd = softmaxcolumn-wise(WdE + bd) ∈ R2×M,
524
+ where Wd and bd are learnable parameters. Next,
525
+ a span of the context tokens is predicted to be in-
526
+ serted in front of each token. In practice, two self-
527
+ attention layer (Vaswani et al., 2017) are adopted
528
+ to calculate the probability of context tokens being
529
+ the start index or end index of the span:
530
+ Pst = softmaxcolumn-wise(Attnst(E)) ∈ RM×M,
531
+ Ped = softmaxcolumn-wise(Attned(E)) ∈ RM×M,
532
+ where Pst
533
+ i,j (Ped
534
+ i,j) denotes the probability of xi be-
535
+ ing the start (end) index of the span for xj. Then
536
+ by applying argmax to P, we could obtain the start
537
+ and end indexes of the span for each token:
538
+ sst = argmaxcolumn-wise(Pst) ∈ RM,
539
+ sed = argmaxcolumn-wise(Ped) ∈ RM,
540
+ The probability of the span to be inserted in front
541
+ of xm is Pst
542
+ sst
543
+ m,m × Ped
544
+ sed
545
+ m ,m when sst
546
+ m ⩽ sed
547
+ m. When
548
+ sst
549
+ m > sed
550
+ m, it means no insertion. The output of the
551
+ dialogue rewriter for ut is denoted as u′
552
+ t.
553
+ 4.2
554
+ Translation Matcher
555
+ To translate the outputs (pseudo-labels) from
556
+ the CSRL parser {A1, ..., AK} and the dialogue
557
+ rewriter u′
558
+ t into a same space, we leverage a nor-
559
+ mal sentence-level semantic role parser with fixed
560
+
561
+ Step2Step3parameters to greedily extract arguments from the
562
+ rewritten utterance u′
563
+ t for the K predicates, denoted
564
+ as {B1, ..., BK} (Appendix A.5 shows an example).
565
+ So the common target space Σ is the label space of
566
+ CSRL, which is large enough to make the error rate
567
+ of chosen instances keep very low (see the analysis
568
+ in subsection 3.2). The matching score mk ∈ [0, 1]
569
+ for predk is calculated based on the edit distance
570
+ between Ak and Bk:
571
+ mk = 1 −
572
+ dist(⊕Ak, ⊕Bk)
573
+ max(len(⊕Ak), len(⊕Bk)),
574
+ where dist() calculates the edit distance between
575
+ two strings, len() returns the length of a string
576
+ and ⊕Ak denotes the concatenation of arguments
577
+ in set Ak in a predefined order of arguments3
578
+ (empty strings means arguments do not exist). Fur-
579
+ thermore, we obtain the overall matching score
580
+ m′ ∈ [0, 1] for the rewritten utterance u′
581
+ t as fol-
582
+ lows:
583
+ m′ = GM(m1, ..., mK),
584
+ where GM() represents the geometric mean.
585
+ 4.3
586
+ Augmented Selector
587
+ The augmented selector selects high-quality
588
+ pseudo-labels according to both their matching
589
+ scores and confidence. For CSRL, we calculate
590
+ the confidence score for each predicate based on
591
+ the output of the softmax layer. Specifically, we
592
+ obtain the confidence of an argument for predk by
593
+ multiplying the probability of its tokens, denoted
594
+ as {ak1, ..., ak|Ak|}. We then use the geometric
595
+ mean of all the confidence of arguments belonging
596
+ to predk as the confidence for predk. The overall
597
+ score sk ∈ [0, 1] for predk is calculated as follows:
598
+ sk = αGM(ak1, ..., ak|Ak|) + (1 − α)mk,
599
+ where hyper-parameter α gives a balance between
600
+ the matching score and the confidence. For DR, we
601
+ multiply the probabilities of spans to be inserted
602
+ and of decisions on whether to keep tokens or not
603
+ as the model confidence of u′
604
+ t, denoted as bt. The
605
+ overall score rt ∈ [0, 1] of u′
606
+ t is as follows:
607
+ rt = βbt + (1 − β)m′,
608
+ where a larger value of hyper-parameter β places
609
+ more importance on the model confidence. α and
610
+ β are set to be 0.2 for both tasks in the experiments.
611
+ 3Argument concatenating order: ARG0, ARG1, ARG2, ARG3,
612
+ ARG4, ARGM-TMP, ARGM-LOC, ARGM-PRP
613
+ Pick thresholds are set for sk and rt to control the
614
+ number and quality of selected pseudo-labels. We
615
+ analyze the effects of different values of thresholds
616
+ in subsection 5.4.
617
+ 5
618
+ Experiments
619
+ 5.1
620
+ Setup
621
+ Datasets We use five dialogue datasets in our ex-
622
+ periments with domains spanning movies, celebri-
623
+ ties, book reviews, products, and social networks.
624
+ For CSRL, we use DuConv (Xu et al., 2021) and
625
+ WeiboCSRL and for DR, REWRITE (Su et al.,
626
+ 2019) and RESTORATION (Pan et al., 2019). The
627
+ datasets of the same task differ in domains and
628
+ sizes. WeiboCSRL is a newly annotated CSRL
629
+ dataset for out-of-domain testing purposes. More-
630
+ over, we use LCCC-base (Wang et al., 2020b) as the
631
+ unlabeled corpus, which is a large-scale Chinese
632
+ conversation dataset with 79M rigorously cleaned
633
+ dialogues from various social media. More details
634
+ on the annotation of WeiboCSRL and the proper-
635
+ ties of the datasets could be found in Appendix A.2.
636
+ Experiment Scenarios Our main experiments in-
637
+ volve two scenarios. (1) Domain generalization:
638
+ we use DuConv as the training data in the source
639
+ domain and WeiboCSRL for out-of-domain eval-
640
+ uation, while for DR, REWRITE is used for
641
+ training and RESTORATION for evaluation. (2)
642
+ Few-shot learning: we randomly select 100 cases
643
+ from DuConv and REWRITE as the training data
644
+ for CSRL and DR, respectively, and conduct in-
645
+ domain evaluation, which means models of both
646
+ the tasks are co-trained with only a few samples of
647
+ each task. The unlabeled data for both scenarios
648
+ are 20k dialogues extracted from LCCC-base. Im-
649
+ plementation details are provided in Appendix A.3.
650
+ Evaluation We follow Wu et al. (2021) to report
651
+ precision (Pre.), recall (Rec.), and F1 of the ar-
652
+ guments for CSRL and Hao et al. (2021) to report
653
+ word error rate (WER) (Morris et al., 2004), Rouge-
654
+ L (R-L) (Lin, 2004) and the percent of sentence-
655
+ level exact match (EM) for DR.
656
+ 5.2
657
+ Baselines
658
+ We
659
+ compare
660
+ friend-training
661
+ with
662
+ six
663
+ semi-
664
+ supervised training paradigms: two standard tech-
665
+ niques such as standard self-training (SST) (Scud-
666
+ der, 1965) and standard co-training (SCoT) (Blum
667
+ and Mitchell, 1998), as well as four recent methods
668
+ such as mean teacher (MT) (Tarvainen and Valpola,
669
+ 2017), cross pseudo supervision (CPS) (Chen
670
+
671
+ WeiboCSRL
672
+ RESTORATION
673
+ Method
674
+ Pre.
675
+ Rec.
676
+ F1
677
+ R-L
678
+ EM
679
+ WER(⇓)
680
+ Base
681
+ 57.97
682
+ 54.47
683
+ 56.16
684
+ 82.78
685
+ 25.25
686
+ 28.69
687
+ Multitask-Base
688
+ 53.66
689
+ 54.32
690
+ 53.99
691
+ 81.68
692
+ 22.49
693
+ 32.44
694
+ SST (Scudder, 1965)
695
+ 60.85
696
+ 56.54
697
+ 58.62
698
+ 85.22
699
+ 32.97
700
+ 22.22
701
+ MT (Tarvainen and Valpola, 2017)
702
+ 58.42
703
+ 55.71
704
+ 57.03
705
+ 83.76
706
+ 28.82
707
+ 26.49
708
+ CPS (Chen et al., 2021)
709
+ 60.34
710
+ 52.87
711
+ 56.36
712
+ 85.60
713
+ 32.68
714
+ 22.78
715
+ SCoT (Blum and Mitchell, 1998)
716
+ 57.33
717
+ 54.13
718
+ 55.69
719
+ 84.51
720
+ 29.25
721
+ 24.87
722
+ STBR (Bhat et al., 2021)
723
+ 60.77
724
+ 58.04
725
+ 59.38
726
+ 85.79
727
+ 33.78
728
+ 23.30
729
+ STea (Yu et al., 2021)
730
+ 60.10
731
+ 55.13
732
+ 57.50
733
+ 85.75
734
+ 34.23
735
+ 22.17
736
+ FDT (Ours)
737
+ 65.29(↑4.44)
738
+ 58.63(↑2.09)
739
+ 61.78(↑3.16)
740
+ 86.82(↑1.60)
741
+ 38.22(↑5.25)
742
+ 20.31(↑1.91)
743
+ (a) Domain generalization for models trained with DuConv and REWRITE.
744
+ DuConv
745
+ REWRITE
746
+ Method
747
+ Pre.
748
+ Rec.
749
+ F1
750
+ R-L
751
+ EM
752
+ WER(⇓)
753
+ Base
754
+ 29.50
755
+ 21.90
756
+ 25.14
757
+ 73.44
758
+ 3.60
759
+ 39.98
760
+ Multitask-Base
761
+ 22.43
762
+ 20.63
763
+ 21.49
764
+ 78.97
765
+ 11.70
766
+ 40.46
767
+ SST (Scudder, 1965)
768
+ 34.16
769
+ 27.49
770
+ 30.46
771
+ 80.93
772
+ 27.80
773
+ 31.02
774
+ MT (Tarvainen and Valpola, 2017)
775
+ 36.32
776
+ 30.69
777
+ 33.27
778
+ 81.66
779
+ 33.00
780
+ 31.66
781
+ CPS (Chen et al., 2021)
782
+ 37.14
783
+ 29.47
784
+ 32.86
785
+ 79.56
786
+ 23.30
787
+ 32.60
788
+ SCoT (Blum and Mitchell, 1998)
789
+ 38.37
790
+ 26.15
791
+ 31.10
792
+ 78.58
793
+ 22.31
794
+ 33.79
795
+ STBR (Bhat et al., 2021)
796
+ 32.37
797
+ 25.21
798
+ 28.34
799
+ 82.37
800
+ 29.80
801
+ 30.31
802
+ STea (Yu et al., 2021)
803
+ 39.34
804
+ 28.78
805
+ 33.25
806
+ 83.04
807
+ 31.57
808
+ 30.36
809
+ FDT (Ours)
810
+ 40.41(↑6.25)
811
+ 30.82(↑3.33)
812
+ 34.97(↑4.51)
813
+ 82.83(↑1.90)
814
+ 34.20(↑6.40)
815
+ 27.87(↑3.15)
816
+ FDT-S (Ours)
817
+ 40.12
818
+ 33.41
819
+ 36.46
820
+ 83.11
821
+ 37.10
822
+ 26.88
823
+ Fully-trained Base
824
+ 69.83
825
+ 68.53
826
+ 69.17
827
+ 89.47
828
+ 52.30
829
+ 20.54
830
+ (b) Few-shot learning for models trained with DuConv and REWRITE.
831
+ Table 1: Test results for domain generalization and few-shot learning. Base denotes the task models trained with
832
+ data from a single task. Multitask-Base denotes the base model of CSRL and DR sharing the same dialogue
833
+ encoder. Results are averaged across three runs. ⇓ means lower is better. For few-shot learning, performance of
834
+ the base models trained with the full training set from the single task is provided for reference.
835
+ et al., 2021), self-training with batch reweight-
836
+ ing (STBR) (Bhat et al., 2021) and self-teaching
837
+ (STea) (Yu et al., 2021). See Appendix A.4 for
838
+ more details.
839
+ 5.3
840
+ Main Results
841
+ Table 1 shows the comparison between friend-
842
+ training (FDT) and the baselines mentioned in sub-
843
+ section 5.2. FDT achieves the best overall perfor-
844
+ mance over the baselines by significant margins
845
+ in both domain generalization and few-shot learn-
846
+ ing scenarios, which demonstrates the effective-
847
+ ness of FDT in different experimental situations
848
+ to utilize large unlabeled corpora. Moreover, we
849
+ show the absolute improvements of FDT over SST
850
+ in parentheses (↑). As we could see, in few-shot
851
+ learning, FDT obtain 4.51 and 3.15 higher abso-
852
+ lute points over SST on F1 of DuConv and WER
853
+ of REWRITE, respectively, than those of domain
854
+ generalization, which are 3.16 and 1.91 points, re-
855
+ vealing that FDT could realize its potential easier
856
+ in few-shot learning. Besides, for few-shot learn-
857
+ ing, we further consider the situation where a full-
858
+ trained base model from the friend task is available,
859
+ denoted as FDT-S. As we could see, when the tar-
860
+ get task is CSRL, FDT-S makes a gain of 1.49
861
+ points on F1 over FDT and when the target task
862
+ is DR, FDT-S outperforms FDT on WER by 0.99
863
+ points and EM by 2.90 points, indicating that more
864
+ reliable supervision from friend task could further
865
+ enhance the few-shot learning of the target task.
866
+ 5.4
867
+ Analysis
868
+ In this section, we conduct experiments to analyze
869
+ how selected parameters and settings interact with
870
+ model performance in FDT.
871
+ Pick Thresholds We vary the pick thresholds of
872
+ CSRL and DR in domain generalization scenario
873
+ and track the model performance: we fix the pick
874
+ threshold of the friend task to the best (see Ap-
875
+ pendix A.3) when varying that of the evaluating
876
+ task. As illustrated in Figure 3a, when the thresh-
877
+ olds increase gradually, the models become better
878
+ with higher F1 for CSRL and lower WER for DR.
879
+ We attribute this to wrong pseudo-labels being fil-
880
+ tered out by the augmented selector of FDT. Then
881
+
882
+ 0.1
883
+ 0.3
884
+ 0.5
885
+ 0.7
886
+ 0.9
887
+ (a) pick threshold
888
+ 55
889
+ 56
890
+ 57
891
+ 58
892
+ 59
893
+ 60
894
+ F1
895
+ CSRL
896
+ DR
897
+ 19
898
+ 20
899
+ 21
900
+ 22
901
+ 23
902
+ 24
903
+ 25
904
+ WER
905
+ (a) The effect of pick thresholds.
906
+ 10/10
907
+ 30/30
908
+ 50/50
909
+ 70/70
910
+ 90/90
911
+ %train(CSRL/DR)
912
+ 40
913
+ 44
914
+ 48
915
+ 52
916
+ 56
917
+ 60
918
+ F1
919
+ BASE
920
+ STBR
921
+ STea
922
+ FDT
923
+ (b) F1 on CSRL test set.
924
+ 10/10
925
+ 30/30
926
+ 50/50
927
+ 70/70
928
+ 90/90
929
+ %train(CSRL/DR)
930
+ 20
931
+ 24
932
+ 28
933
+ 32
934
+ 36
935
+ 40
936
+ 44
937
+ WER
938
+ BASE
939
+ STBR
940
+ STea
941
+ FDT
942
+ (c) WER on DR test set.
943
+ Figure 3: Sub-figures (b) and (c) show the model performance of the comparing methods with different strengths
944
+ of base models; the dashed horizontal line represents the performance of FDT with a fully trained base model.
945
+ 10/10
946
+ 30/30
947
+ 50/50
948
+ 70/70
949
+ 90/90
950
+ 10/100
951
+ 30/100
952
+ 50/100
953
+ 70/100
954
+ 90/100
955
+ %train(CSRL/DR)
956
+ 52
957
+ 54
958
+ 56
959
+ 58
960
+ 60
961
+ 62
962
+ 64
963
+ 66
964
+ 68
965
+ F1
966
+ 53.98
967
+ 58.7
968
+ 59.84
969
+ 60.2
970
+ 60.71
971
+ 54.87
972
+ 57.89
973
+ 58.51
974
+ 58.95
975
+ 59.31
976
+ FDT
977
+ FDT-SF
978
+ (a) The performacne on CSRL test set.
979
+ 10/10
980
+ 30/30
981
+ 50/50
982
+ 70/70
983
+ 90/90
984
+ 100/10
985
+ 100/30
986
+ 100/50
987
+ 100/70
988
+ 100/90
989
+ %train(CSRL/DR)
990
+ 20
991
+ 21
992
+ 22
993
+ 23
994
+ 24
995
+ 25
996
+ 26
997
+ WER
998
+ 25.26
999
+ 22.18
1000
+ 20.89
1001
+ 20.61
1002
+ 20.37
1003
+ 22.93
1004
+ 21.15
1005
+ 20.8
1006
+ 20.76
1007
+ 20.71
1008
+ FDT
1009
+ FDT-SF
1010
+ (b) The performance on DR test set.
1011
+ Figure 4: The role of co-updating in friend-training.
1012
+ the model performances hit the peaks and drop as
1013
+ the thresholds keep increasing in the interval of
1014
+ high values, which is owed to high thresholds pro-
1015
+ ducing insufficient pseudo-labels for iterative train-
1016
+ ing. Automatically choosing proper pick thresholds
1017
+ is worth to be explored in the future.
1018
+ The Strength of Base Model To understand and
1019
+ compare how performance of models before friend-
1020
+ training or self-training influences their final per-
1021
+ formance, we compare STBR, STea and FDT with
1022
+ the base models trained on different percentages of
1023
+ labeled data in the source domain when evaluating
1024
+ on out-domain testing data. Specifically, we follow
1025
+ domain generalization settings and use a variable
1026
+ percentage of labeled data to conduct experiments.
1027
+ For CSRL and DR, respectively, we set the
1028
+ amount of labeled data as {10%/10%, 30%/30%,
1029
+ 50%/50%, 70%/70%, 90%/90%}. The results are
1030
+ shown in Figure 3b and Figure 3c. We can see
1031
+ that all the methods adopting self-training to make
1032
+ use of unlabeled data surpass the base model by a
1033
+ significant margin, whether when given a weak or
1034
+ strong base model, demonstrating the effectiveness
1035
+ of self-training paradigm. Moreover, FDT achieves
1036
+ the best results across the evaluating percentages
1037
+ of labeled data: when the base model has a good
1038
+ amount of training data, such as those trained on
1039
+ 30% labeled data and above, the performance of
1040
+ FDT is significantly better than STBR and STea,
1041
+ proving that FDT leverages the features learned
1042
+ from labeled data more effectively with cross-task
1043
+ supervision.
1044
+ The Role of Co-updating We also explore the
1045
+ case where one of the models of the friend tasks is
1046
+ fully trained and does not have to be updated. We
1047
+ consider FDT-SF, FDT with a fixed fully trained
1048
+ base model from the friend task in domain gener-
1049
+ alization4. As illustrated in Figure 4, FDT-SF sur-
1050
+ passes FDT when given a weak base model for the
1051
+ evaluating task because of the strong supervision
1052
+ from the friend task. However, FDT outperforms
1053
+ FDT-SF when the evaluating task is given a fairly-
1054
+ trained model, which demonstrates the benefits of
1055
+ co-updating the models in friend-training.
1056
+ 6
1057
+ Conclusion
1058
+ We propose friend-training, the first cross-task self-
1059
+ training framework, which leverages supervision
1060
+ from friend tasks for better selection of pseudo-
1061
+ labels. Moreover, we provide specific modeling
1062
+ of friend-training between conversational seman-
1063
+ tic role labeling and dialogue rewriting. Experi-
1064
+ ments on domain generalization and few-shot learn-
1065
+ ing scenarios demonstrate the promise of friend-
1066
+ 4Specifically, when the evaluating task is CSRL, the
1067
+ amount of labeled data for the two tasks are set as {10%/100%,
1068
+ 30%/100%, 50%/100%, 70%/100%, 90%/100%}, and
1069
+ when the evaluating task is DR, {100%/10%, 100%/30%,
1070
+ 100%/50%, 100%/70%, 100%/90%}.
1071
+
1072
+ training, which outperforms prior classical or state-
1073
+ of-the-art semi-supervised methods by substantial
1074
+ margins.
1075
+ 7
1076
+ Limitation
1077
+ We showed how the friend-training strategy can be
1078
+ applied to two dialogue understanding tasks in the
1079
+ case study here, but many other task pairs or task
1080
+ sets can be examined to fully explore the generality
1081
+ of the approach. Identifying friend tasks depends
1082
+ on expert knowledge in this work, but approaches
1083
+ for task grouping and task similarity may be used to
1084
+ automatically discover friend tasks. Besides, with
1085
+ the proliferation of cross-modal techniques, tasks
1086
+ of different modalities are expected to act as friend
1087
+ tasks as well. Also, designing translation functions
1088
+ and matchers for friend tasks in the friend-training
1089
+ framework requires an understanding of the rela-
1090
+ tionship between the friend tasks, but prompting
1091
+ and model interpretability methods could poten-
1092
+ tially be applied for easing this process.
1093
+ 8
1094
+ Acknowledgement
1095
+ We thank the anonymous reviewers for their help-
1096
+ ful comments and the support of National Nature
1097
+ Science Foundation of China (No.62176174).
1098
+ References
1099
+ Steven Abney. 2002. Bootstrapping. In the 40th An-
1100
+ nual Meeting of the Association for Computational
1101
+ Linguistics (ACL), pages 360–367.
1102
+ Dana Angluin and Philip Laird. 1988. Learning from
1103
+ noisy examples. Mach. Learn., 2(4):343–370.
1104
+ Meghana Moorthy Bhat, Alessandro Sordoni, and Sub-
1105
+ habrata Mukherjee. 2021.
1106
+ Self-training with few-
1107
+ shot rationalization.
1108
+ In Proceedings of the 2021
1109
+ Conference on Empirical Methods in Natural Lan-
1110
+ guage Processing, pages 10702–10712, Online and
1111
+ Punta Cana, Dominican Republic. Association for
1112
+ Computational Linguistics.
1113
+ Avrim Blum and Tom Mitchell. 1998. Combining la-
1114
+ beled and unlabeled data with co-training. In Pro-
1115
+ ceedings of the eleventh annual conference on Com-
1116
+ putational learning theory, pages 92–100.
1117
+ Cornelia Caragea, Florin Bulgarov, and Rada Mihalcea.
1118
+ 2015. Co-Training for topic classification of schol-
1119
+ arly data. In Proceedings of the 2015 Conference on
1120
+ Empirical Methods in Natural Language Processing,
1121
+ pages 2357–2366, Lisbon, Portugal. Association for
1122
+ Computational Linguistics.
1123
+ Rich Caruana. 1997.
1124
+ Multitask learning.
1125
+ Machine
1126
+ learning, 28(1):41–75.
1127
+ Olivier Chapelle, Bernhard Scholkopf, and Alexander
1128
+ Zien. 2009. Semi-supervised learning (chapelle, o.
1129
+ et al., eds.; 2006)[book reviews]. IEEE Transactions
1130
+ on Neural Networks, 20(3):542–542.
1131
+ Xiaokang Chen, Yuhui Yuan, Gang Zeng, and Jingdong
1132
+ Wang. 2021. Semi-supervised semantic segmenta-
1133
+ tion with cross pseudo supervision. In Proceedings
1134
+ of the IEEE/CVF Conference on Computer Vision
1135
+ and Pattern Recognition, pages 2613–2622.
1136
+ Michael Collins. 2003. Head-Driven statistical mod-
1137
+ els for natural language parsing. Comput. Linguist.,
1138
+ 29(4):589–637.
1139
+ Jacob Devlin, Ming-Wei Chang, Kenton Lee, and
1140
+ Kristina Toutanova. 2019.
1141
+ BERT: Pre-training of
1142
+ deep bidirectional transformers for language under-
1143
+ standing.
1144
+ In Proceedings of the 2019 Conference
1145
+ of the North American Chapter of the Association
1146
+ for Computational Linguistics: Human Language
1147
+ Technologies, Volume 1 (Long and Short Papers),
1148
+ pages 4171–4186, Minneapolis, Minnesota. Associ-
1149
+ ation for Computational Linguistics.
1150
+ Cailing Dong and Ulrich Schäfer. 2011.
1151
+ Ensemble-
1152
+ style self-training on citation classification. In Pro-
1153
+ ceedings of 5th International Joint Conference on
1154
+ Natural Language Processing, pages 623–631, Chi-
1155
+ ang Mai, Thailand. Asian Federation of Natural Lan-
1156
+ guage Processing.
1157
+ Ahmed Elgohary, Denis Peskov, and Jordan Boyd-
1158
+ Graber. 2019.
1159
+ Can you unpack that? learning to
1160
+ rewrite questions-in-context. In Proceedings of the
1161
+ 2019 Conference on Empirical Methods in Natu-
1162
+ ral Language Processing and the 9th International
1163
+ Joint Conference on Natural Language Processing
1164
+ (EMNLP-IJCNLP), pages 5918–5924, Hong Kong,
1165
+ China. Association for Computational Linguistics.
1166
+ Chris Fifty, Ehsan Amid, Zhe Zhao, Tianhe Yu, Rohan
1167
+ Anil, and Chelsea Finn. 2021. Efficiently identify-
1168
+ ing task groupings for multi-task learning. Advances
1169
+ in Neural Information Processing Systems, 34.
1170
+ Jie Hao,
1171
+ Linfeng Song,
1172
+ Liwei Wang,
1173
+ Kun Xu,
1174
+ Zhaopeng Tu, and Dong Yu. 2021. RAST: Domain-
1175
+ robust dialogue rewriting as sequence tagging. In
1176
+ Proceedings of the 2021 Conference on Empirical
1177
+ Methods in Natural Language Processing, pages
1178
+ 4913–4924, Online and Punta Cana, Dominican Re-
1179
+ public. Association for Computational Linguistics.
1180
+ Han He and Jinho D. Choi. 2021. The stem cell hy-
1181
+ pothesis: Dilemma behind multi-task learning with
1182
+ transformer encoders. In Proceedings of the 2021
1183
+ Conference on Empirical Methods in Natural Lan-
1184
+ guage Processing, pages 5555–5577, Online and
1185
+ Punta Cana, Dominican Republic. Association for
1186
+ Computational Linguistics.
1187
+ Junxian He, Jiatao Gu, Jiajun Shen, and Marc’Aurelio
1188
+ Ranzato. 2020.
1189
+ Revisiting self-training for neural
1190
+
1191
+ sequence generation.
1192
+ In 8th International Confer-
1193
+ ence on Learning Representations, ICLR 2020, Ad-
1194
+ dis Ababa, Ethiopia, April 26-30, 2020. OpenRe-
1195
+ view.net.
1196
+ Mengzuo Huang, Feng Li, Wuhe Zou, Hongbo Zhang,
1197
+ and Weidong Zhang. 2021. Sarg: A novel semi au-
1198
+ toregressive generator for multi-turn incomplete ut-
1199
+ terance restoration.
1200
+ In Proc. 35th AAAI Conf. Ar-
1201
+ tif. Intell., 33rd Conf. Innovat. Appl. Artif. Intell.,
1202
+ 11th Symp. Educat. Adv. Artif. Intell., pages 13055–
1203
+ 13063.
1204
+ Lifeng Jin and William Schuler. 2019.
1205
+ Variance of
1206
+ average surprisal: A better predictor for quality of
1207
+ grammar from unsupervised PCFG induction.
1208
+ In
1209
+ Proceedings of the 57th Annual Meeting of the
1210
+ Association for Computational Linguistics, pages
1211
+ 2453–2463, Florence, Italy. Association for Compu-
1212
+ tational Linguistics.
1213
+ Lisa Jin, Linfeng Song, Lifeng Jin, Dong Yu, and
1214
+ Daniel Gildea. 2022. Hierarchical context tagging
1215
+ for utterance rewriting.
1216
+ Jacob Kahn, Ann Lee, and Awni Hannun. 2020. Self-
1217
+ training for end-to-end speech recognition.
1218
+ In
1219
+ 2020 IEEE International Conference on Acous-
1220
+ tics, Speech and Signal Processing, ICASSP 2020,
1221
+ Barcelona, Spain, May 4-8, 2020, pages 7084–7088.
1222
+ IEEE.
1223
+ Abhishek Kumar and Hal Daumé III. 2012.
1224
+ Learn-
1225
+ ing task grouping and overlap in multi-task learning.
1226
+ In Proceedings of the 29th International Conference
1227
+ on Machine Learning, ICML 2012, Edinburgh, Scot-
1228
+ land, UK, June 26 - July 1, 2012. icml.cc / Omni-
1229
+ press.
1230
+ Dong-Hyun Lee et al. 2013. Pseudo-label: The simple
1231
+ and efficient semi-supervised learning method for
1232
+ deep neural networks. In Workshop on challenges
1233
+ in representation learning, ICML, volume 3, page
1234
+ 896.
1235
+ Jian Yi David Lee and Hai Leong Chieu. 2021. Co-
1236
+ training for commit classification. In Proceedings of
1237
+ the Seventh Workshop on Noisy User-generated Text
1238
+ (W-NUT 2021), pages 389–395, Online. Association
1239
+ for Computational Linguistics.
1240
+ Hui Li, Xuejun Liao, and Lawrence Carin. 2009. Ac-
1241
+ tive learning for semi-supervised multi-task learning.
1242
+ In 2009 IEEE International Conference on Acous-
1243
+ tics, Speech and Signal Processing, pages 1637–
1244
+ 1640. IEEE.
1245
+ Zhenghua Li,
1246
+ Min Zhang,
1247
+ and Wenliang Chen.
1248
+ 2014. Ambiguity-aware ensemble training for semi-
1249
+ supervised dependency parsing. In Proceedings of
1250
+ the 52nd Annual Meeting of the Association for
1251
+ Computational Linguistics (Volume 1: Long Papers),
1252
+ pages 457–467, Baltimore, Maryland. Association
1253
+ for Computational Linguistics.
1254
+ Chin-Yew Lin. 2004.
1255
+ ROUGE: A package for auto-
1256
+ matic evaluation of summaries. In Text Summariza-
1257
+ tion Branches Out, pages 74–81, Barcelona, Spain.
1258
+ Association for Computational Linguistics.
1259
+ Qiuhua Liu, Xuejun Liao, and Lawrence Carin. 2007.
1260
+ Semi-supervised multitask learning.
1261
+ In Advances
1262
+ in Neural Information Processing Systems 20, Pro-
1263
+ ceedings of the Twenty-First Annual Conference on
1264
+ Neural Information Processing Systems, Vancouver,
1265
+ British Columbia, Canada, December 3-6, 2007,
1266
+ pages 937–944. Curran Associates, Inc.
1267
+ Xiao Liu, Fanjin Zhang, Zhenyu Hou, Li Mian,
1268
+ Zhaoyu Wang, Jing Zhang, and Jie Tang. 2021.
1269
+ Self-supervised learning: Generative or contrastive.
1270
+ IEEE Transactions on Knowledge and Data Engi-
1271
+ neering.
1272
+ Ilya Loshchilov and Frank Hutter. 2019.
1273
+ Decou-
1274
+ pled weight decay regularization.
1275
+ In 7th Inter-
1276
+ national Conference on Learning Representations,
1277
+ ICLR 2019, New Orleans, LA, USA, May 6-9, 2019.
1278
+ OpenReview.net.
1279
+ David JC MacKay. 1992. Information-based objective
1280
+ functions for active data selection. Neural computa-
1281
+ tion, 4(4):590–604.
1282
+ David M Magerman. 1995. Statistical Decision-Tree
1283
+ models for parsing. In 33rd Annual Meeting of the
1284
+ Association for Computational Linguistics, pages
1285
+ 276–283, Cambridge, Massachusetts, USA. Associ-
1286
+ ation for Computational Linguistics.
1287
+ David McClosky, Eugene Charniak, and Mark Johnson.
1288
+ 2006. Effective Self-Training for parsing. In Pro-
1289
+ ceedings of the Human Language Technology Con-
1290
+ ference of the NAACL, Main Conference, pages 152–
1291
+ 159, New York City, USA. Association for Compu-
1292
+ tational Linguistics.
1293
+ Rada Mihalcea. 2004.
1294
+ Co-training and self-training
1295
+ for word sense disambiguation. In Proceedings of
1296
+ the Eighth Conference on Computational Natural
1297
+ Language Learning (CoNLL-2004) at HLT-NAACL
1298
+ 2004, pages 33–40, Boston, Massachusetts, USA.
1299
+ Association for Computational Linguistics.
1300
+ Tomas Mikolov, Wen-Tau Yih, and Geoffrey Zweig.
1301
+ 2013.
1302
+ Linguistic regularities in continuous space
1303
+ word representations.
1304
+ In Proceedings of the 2013
1305
+ Conference of the North American Chapter of the
1306
+ Association for Computational Linguistics: Human
1307
+ Language Technologies, pages 746–751, Atlanta,
1308
+ Georgia. Association for Computational Linguistics.
1309
+ Andrew Cameron Morris, Viktoria Maier, and Phil
1310
+ Green. 2004.
1311
+ From wer and ril to mer and wil:
1312
+ improved evaluation measures for connected speech
1313
+ recognition. In Eighth International Conference on
1314
+ Spoken Language Processing.
1315
+ Subhabrata Mukherjee and Ahmed Hassan Awadallah.
1316
+ 2020. Uncertainty-aware self-training for few-shot
1317
+
1318
+ text classification.
1319
+ In Advances in Neural Infor-
1320
+ mation Processing Systems 33: Annual Conference
1321
+ on Neural Information Processing Systems 2020,
1322
+ NeurIPS 2020, December 6-12, 2020, virtual.
1323
+ Subhabrata Mukherjee and Ahmed Hassan Awadallah.
1324
+ 2020. XtremeDistil: Multi-stage distillation for mas-
1325
+ sive multilingual models.
1326
+ In Proceedings of the
1327
+ 58th Annual Meeting of the Association for Compu-
1328
+ tational Linguistics, pages 2221–2234, Online. As-
1329
+ sociation for Computational Linguistics.
1330
+ Zhufeng Pan, Kun Bai, Yan Wang, Lianqiang Zhou,
1331
+ and Xiaojiang Liu. 2019. Improving open-domain
1332
+ dialogue systems via multi-turn incomplete utter-
1333
+ ance restoration. In Proceedings of the 2019 Con-
1334
+ ference on Empirical Methods in Natural Language
1335
+ Processing and the 9th International Joint Confer-
1336
+ ence on Natural Language Processing (EMNLP-
1337
+ IJCNLP), pages 1824–1833, Hong Kong, China. As-
1338
+ sociation for Computational Linguistics.
1339
+ Michael Schlichtkrull, Thomas N Kipf, Peter Bloem,
1340
+ Rianne van den Berg, Ivan Titov, and Max Welling.
1341
+ 2018. Modeling relational data with graph convolu-
1342
+ tional networks. In European semantic web confer-
1343
+ ence, pages 593–607. Springer.
1344
+ Henry Scudder. 1965.
1345
+ Probability of error of some
1346
+ adaptive pattern-recognition machines. IEEE Trans-
1347
+ actions on Information Theory, 11(3):363–371.
1348
+ Trevor Standley, Amir Roshan Zamir, Dawn Chen,
1349
+ Leonidas J. Guibas, Jitendra Malik, and Silvio
1350
+ Savarese. 2020. Which tasks should be learned to-
1351
+ gether in multi-task learning? In Proceedings of the
1352
+ 37th International Conference on Machine Learning,
1353
+ ICML 2020, 13-18 July 2020, Virtual Event, volume
1354
+ 119 of Proceedings of Machine Learning Research,
1355
+ pages 9120–9132. PMLR.
1356
+ Hui Su, Xiaoyu Shen, Rongzhi Zhang, Fei Sun, Peng-
1357
+ wei Hu, Cheng Niu, and Jie Zhou. 2019. Improv-
1358
+ ing multi-turn dialogue modelling with utterance
1359
+ ReWriter. In Proceedings of the 57th Annual Meet-
1360
+ ing of the Association for Computational Linguistics,
1361
+ pages 22–31, Florence, Italy. Association for Com-
1362
+ putational Linguistics.
1363
+ Antti Tarvainen and Harri Valpola. 2017. Mean teach-
1364
+ ers are better role models: Weight-averaged consis-
1365
+ tency targets improve semi-supervised deep learning
1366
+ results. In Advances in Neural Information Process-
1367
+ ing Systems 30: Annual Conference on Neural In-
1368
+ formation Processing Systems 2017, December 4-9,
1369
+ 2017, Long Beach, CA, USA, pages 1195–1204.
1370
+ Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob
1371
+ Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz
1372
+ Kaiser, and Illia Polosukhin. 2017. Attention is all
1373
+ you need. In Advances in Neural Information Pro-
1374
+ cessing Systems 30: Annual Conference on Neural
1375
+ Information Processing Systems 2017, December 4-
1376
+ 9, 2017, Long Beach, CA, USA, pages 5998–6008.
1377
+ Joachim Wagner and Jennifer Foster. 2021. Revisiting
1378
+ tri-training of dependency parsers.
1379
+ Xiaojun Wan. 2009.
1380
+ Co-Training for Cross-Lingual
1381
+ sentiment classification. In Proceedings of the Joint
1382
+ Conference of the 47th Annual Meeting of the ACL
1383
+ and the 4th International Joint Conference on Natu-
1384
+ ral Language Processing of the AFNLP, pages 235–
1385
+ 243, Suntec, Singapore. Association for Computa-
1386
+ tional Linguistics.
1387
+ Chun Wang, Shirui Pan, Ruiqi Hu, Guodong Long,
1388
+ Jing Jiang, and Chengqi Zhang. 2019.
1389
+ Attributed
1390
+ graph clustering: A deep attentional embedding ap-
1391
+ proach. In Proceedings of the Twenty-Eighth Inter-
1392
+ national Joint Conference on Artificial Intelligence,
1393
+ IJCAI 2019, Macao, China, August 10-16, 2019,
1394
+ pages 3670–3676. ijcai.org.
1395
+ Yaqing Wang, Subhabrata Mukherjee, Haoda Chu,
1396
+ Yuancheng Tu, Ming Wu, Jing Gao, and Ahmed Has-
1397
+ san Awadallah. 2020a.
1398
+ Adaptive self-training for
1399
+ few-shot neural sequence labeling. ArXiv preprint,
1400
+ abs/2010.03680.
1401
+ Yida Wang, Pei Ke, Yinhe Zheng, Kaili Huang, Yong
1402
+ Jiang, Xiaoyan Zhu, and Minlie Huang. 2020b. A
1403
+ large-scale chinese short-text conversation dataset.
1404
+ In CCF International Conference on Natural Lan-
1405
+ guage Processing and Chinese Computing, pages
1406
+ 91–103. Springer.
1407
+ Han Wu, Kun Xu, and Linqi Song. 2021.
1408
+ CSAGN:
1409
+ Conversational structure aware graph network for
1410
+ conversational semantic role labeling. In Proceed-
1411
+ ings of the 2021 Conference on Empirical Methods
1412
+ in Natural Language Processing, pages 2312–2317,
1413
+ Online and Punta Cana, Dominican Republic. Asso-
1414
+ ciation for Computational Linguistics.
1415
+ Qizhe Xie, Minh-Thang Luong, Eduard H. Hovy, and
1416
+ Quoc V. Le. 2020.
1417
+ Self-training with noisy stu-
1418
+ dent improves imagenet classification.
1419
+ In 2020
1420
+ IEEE/CVF Conference on Computer Vision and Pat-
1421
+ tern Recognition, CVPR 2020, Seattle, WA, USA,
1422
+ June 13-19, 2020, pages 10684–10695. IEEE.
1423
+ Kun Xu, Han Wu, Linfeng Song, Haisong Zhang, Linqi
1424
+ Song, and Dong Yu. 2021. Conversational seman-
1425
+ tic role labeling. IEEE/ACM Transactions on Audio,
1426
+ Speech, and Language Processing, 29:2465–2475.
1427
+ Nianwen Xue. 2006. Semantic role labeling of nom-
1428
+ inalized predicates in Chinese.
1429
+ In Proceedings of
1430
+ the Human Language Technology Conference of the
1431
+ NAACL, Main Conference, pages 431–438, New
1432
+ York City, USA. Association for Computational Lin-
1433
+ guistics.
1434
+ Xiangli Yang, Zixing Song, Irwin King, and Zenglin
1435
+ Xu. 2021. A survey on deep semi-supervised learn-
1436
+ ing. ArXiv preprint, abs/2103.00550.
1437
+ Dian Yu, Kai Sun, Dong Yu, and Claire Cardie. 2021.
1438
+ Self-teaching machines to read and comprehend
1439
+ with large-scale multi-subject question-answering
1440
+
1441
+ data.
1442
+ In Findings of the Association for Compu-
1443
+ tational Linguistics: EMNLP 2021, pages 56–68,
1444
+ Punta Cana, Dominican Republic. Association for
1445
+ Computational Linguistics.
1446
+ Chiyuan Zhang, Samy Bengio, Moritz Hardt, Ben-
1447
+ jamin Recht, and Oriol Vinyals. 2021. Understand-
1448
+ ing deep learning (still) requires rethinking general-
1449
+ ization.
1450
+ Communications of the ACM, 64(3):107–
1451
+ 115.
1452
+ Zhi-Hua Zhou. 2018. A brief introduction to weakly
1453
+ supervised learning.
1454
+ National science review,
1455
+ 5(1):44–53.
1456
+ Zhi-Hua Zhou and Ming Li. 2005. Tri-training: Ex-
1457
+ ploiting unlabeled data using three classifiers. IEEE
1458
+ Transactions on knowledge and Data Engineering,
1459
+ 17(11):1529–1541.
1460
+ Barret Zoph, Golnaz Ghiasi, Tsung-Yi Lin, Yin Cui,
1461
+ Hanxiao Liu, Ekin Dogus Cubuk, and Quoc Le.
1462
+ 2020. Rethinking pre-training and self-training. In
1463
+ Advances in Neural Information Processing Systems
1464
+ 33: Annual Conference on Neural Information Pro-
1465
+ cessing Systems 2020, NeurIPS 2020, December 6-
1466
+ 12, 2020, virtual.
1467
+
1468
+ A
1469
+ Appendix
1470
+ A.1
1471
+ Error rates
1472
+ We have two classifiers fa and fb trained on two
1473
+ different tasks with labeled training sets La and
1474
+ Lb, with expected accuracies ηa and ηb, respec-
1475
+ tively. The prediction targets of the two tasks are
1476
+ partially related through a pair of translation func-
1477
+ tions Fa : ˆYa → Σ and Fb : ˆYb → Σ, where Σ
1478
+ is the set of possible sub-predictions that all pos-
1479
+ sible predictions of the two tasks ˆYa and ˆYb can
1480
+ be reduced to. | ˆYa| ≥ |Σ|, | ˆYb| ≥ |Σ|. The sub-
1481
+ predictions can be a part of the whole prediction
1482
+ targets for both tasks, or some lossy transforma-
1483
+ tion of the prediction targets. For example, a sub-
1484
+ prediction for a POS-tagging task can be the POS
1485
+ tag of the first word (a part of the prediction) or the
1486
+ number of the NN tag in the whole prediction se-
1487
+ quence (a transformation of the prediction). We as-
1488
+ sume that the translation functions are general func-
1489
+ tions with the expected probability of generating
1490
+ a translation ϵF =
1491
+ 1
1492
+ |Σ|; they are deterministic and
1493
+ always map the gold labels of the friend tasks for
1494
+ the same input to the same translation. Both clas-
1495
+ sifiers make predictions on the unlabeled set U at
1496
+ iteration k. Some instances Uk
1497
+ F with pseudo-labels
1498
+ are chosen as new training data based on the results
1499
+ of the translation functions, φa(x) = Fa(fa(x))
1500
+ and φb(x) = Fb(fb(x)), and some selection crite-
1501
+ ria, such as total agreement. If total agreement is
1502
+ used as the selection criterion, the probability of
1503
+ erroneous predictions for fa in these instances is
1504
+ Prx[fa(x) ̸= f∗
1505
+ a(x)|φa(x) = φb(x)]
1506
+ =1 − Prx[fa(x) = f∗
1507
+ a(x)|φa(x) = φb(x)]
1508
+ =1 − Prx[fa(x) = f∗
1509
+ a(x)]·
1510
+ Prx[φa(x) = φb(x)|fa(x) = f∗
1511
+ a(x)]
1512
+ Prx[φa(x) = φb(x)]
1513
+ =1 − ηa·
1514
+ Prx[φa(x) = φb(x)|fa(x) = f∗
1515
+ a(x)]
1516
+ Prx[φa(x) = φb(x)]
1517
+ ,
1518
+ (6)
1519
+ with f∗ being the optimal classifier. If we consider
1520
+ the two classifiers very likely to be independent
1521
+ from each other, then the probability of the transla-
1522
+ tion of the predictions from the two classifiers be-
1523
+ ing the same given the prediction from classifier fa
1524
+ is correct, which is Prx[φa(x) = φb(x)|fa(x) =
1525
+ f∗
1526
+ a(x)], is the sum of the probability of the clas-
1527
+ sifier fb making the correct prediction ηb and the
1528
+ probability of an erroneous translation of the wrong
1529
+ prediction ϵF(1 − ηb). The probability of the trans-
1530
+ lations matching Prx[φa(x) = φb(x)] has four sit-
1531
+ uations: both predictions of the two classifiers are
1532
+ correct ηaηb; fa(x) is correct but fb(x) is wrong
1533
+ and being translated erroneously ηaϵF(1 − ηb);
1534
+ fb(x) is correct but fa(x) is wrong and being trans-
1535
+ lated erroneously ηbϵF(1 − ηa); both fa(x) and
1536
+ fb(x) are wrong but matching in the translation
1537
+ space ϵ2
1538
+ F(1 − ηa)(1 − ηb). Under these conditions
1539
+ Equation 6 becomes
1540
+ 1 − ηa(ηb + ϵF(1 − ηb))
1541
+ Prx[φa(x) = φb(x)]
1542
+ =1 −
1543
+ Z
1544
+ Z + ηbϵF(1 − ηa) + E ,
1545
+ (7)
1546
+ where Z = ηa(ηb + ϵF(1 − ηb)) and E = ϵ2
1547
+ F(1 −
1548
+ ηa)(1 − ηb) which shows that the term ηbϵF(1 −
1549
+ ηa)+E needs to be small to make the probability of
1550
+ matching translations with predictions being wrong
1551
+ small. This indicates that the quality of the picked
1552
+ instances based on the total agreement criterion
1553
+ is negatively correlated with the number of false
1554
+ positive instances brought by the noisy translation
1555
+ ηbϵF(1−ηa), and the number of matching negative
1556
+ instances E. ϵF can be minimized by choosing
1557
+ translation functions with a sufficiently large co-
1558
+ domain Σ, which means that when the translation
1559
+ space is large enough, it is unlikely that the two
1560
+ classifiers totally agree in the translation space but
1561
+ do not agree in their own prediction target spaces.
1562
+ So the probability of them agreeing and making
1563
+ correct predictions is much larger than agreeing but
1564
+ making incorrect predictions while the probability
1565
+ of error instances chosen when two classifiers agree
1566
+ approaches 0, indicating that even when 1 − ηa is
1567
+ large, i.e. fa performs badly, if the co-domain is
1568
+ large, the error rate of the chosen instances can still
1569
+ be kept very low.
1570
+ A.2
1571
+ Datasets
1572
+ Annotation Procedure of WeiboCSRL The dia-
1573
+ logues we use for CSRL annotation are extracted
1574
+ from LCCC-base (Wang et al., 2020b), which
1575
+ consists of at least 4 turns and 80 total charac-
1576
+ ters to assure enough context for CSRL and DR.
1577
+ These dialogues and those used as unlabeled data
1578
+ for experiments in section 5 are from different
1579
+ parts of LCCC-base. For each dialogue, we an-
1580
+ notate the predicates in the last utterance with
1581
+ the guidance of frame files of Chinese Proposi-
1582
+
1583
+ tion Bank5. For each predicate, the arguments
1584
+ we annotate are numbered arguments ARG0-ARG4
1585
+ and adjuncts ARGM-LOC, ARGM-MNR, ARGM-TMP and
1586
+ ARGM-NEG, whose definitions are shown in (Xue,
1587
+ 2006). ARGM-MNR is not included for evaluation in
1588
+ section 5 because annotation of ARGM-MNR is lack-
1589
+ ing in DuConv, the training data for CSRL. In the
1590
+ end, we obtain 3891 annotated predicates.
1591
+ Dataset Details Table 2 shows the statistic of the
1592
+ datasets used in the experiments. DuConv (Xu
1593
+ et al., 2021) focuses on movies and celebrities and
1594
+ we adopt the same train/dev/test splitting as Xu
1595
+ et al. (2021). REWRITE (Su et al., 2019) contains
1596
+ 20K dialogues with a wide range of topics crawled
1597
+ from Chinese social media platforms; the last ut-
1598
+ terance of each dialogue is rewritten to recover all
1599
+ co-referred and omitted information. RESTORA-
1600
+ TION (Pan et al., 2019) contains dialogues from
1601
+ Douban6, most of which are book, movie or prod-
1602
+ uct reviews. Compared with REWRITE, it contains
1603
+ more annotated dialogues, but around 40% of the
1604
+ last utterances require no rewriting.
1605
+ Domain
1606
+ #Instance(train/dev/test)
1607
+ DuConv
1608
+ movies and celebrities
1609
+ 23361 / 2852 / 2977
1610
+ WeiboCSRL
1611
+ social media
1612
+ - / 1945 / 1946
1613
+ REWRITE
1614
+ social media
1615
+ 16925 / 1000 / 1000
1616
+ RESTORATION
1617
+ book, movie and
1618
+ product reviews
1619
+ - / 5000 / 5000
1620
+ Table 2: Dataset statistics.
1621
+ A.3
1622
+ Implementation Details
1623
+ Dataset configuration of the tasks for the experi-
1624
+ mental scenarios are shown in Table 3.
1625
+ Preprocessing Details The maximum length of
1626
+ the input dialogue is set to 125. We transform the
1627
+ word-based labeling of DuConv to character-based
1628
+ labeling and we use the scripts7 provided by Hao
1629
+ et al. (2021) to generate token-level annotations for
1630
+ sequence-labeling-based DR. For unlabeled data,
1631
+ we discard dialogues with less than 4 turns to guar-
1632
+ antee sufficient context for CSRL and DR.
1633
+ Model Details We use pretrained BERT8 (Devlin
1634
+ et al., 2019) as the dialogue encoder for CSRL and
1635
+ DR. Both the values of hyper-parameter α and β
1636
+ are set to 0.2 and the pick thresholds are set to 0.6.
1637
+ We choose a state-of-the-art sentence-level seman-
1638
+ 5https://verbs.colorado.edu/chinese/cpb/
1639
+ 6https://www.douban.com
1640
+ 7https://github.com/freesunshine0316/
1641
+ RaST-plus
1642
+ 8https://huggingface.co/bert-base-chinese
1643
+ tic role labeling (SSRL) parser9 for the translation
1644
+ matcher which follows the same structure as (He
1645
+ and Choi, 2021).
1646
+ Training Details We adopt AdamW (Loshchilov
1647
+ and Hutter, 2019) to optimize models with a learn-
1648
+ ing rate of 4e-5 and batch size of 16. We use λ = 1
1649
+ to balance the loss of labeled and unlabeled data.
1650
+ Task
1651
+ Train
1652
+ Dev&Test
1653
+ DG
1654
+ CSRL
1655
+ DuConv (train)
1656
+ WeiboCSRL (dev,test)
1657
+ DR
1658
+ REWRITE (train)
1659
+ RESTORATION (dev,test)
1660
+ FSL
1661
+ CSRL
1662
+ DuConv (100 cases)
1663
+ DuConv (dev,test)
1664
+ DR
1665
+ REWRITE (100 cases)
1666
+ REWRITE (dev,test)
1667
+ Table 3: Dataset configuration of domain generaliza-
1668
+ tion (DG) and few-shot learning (FSL).
1669
+ A.4
1670
+ Baselines
1671
+ Standard self-training (Scudder, 1965) generates
1672
+ pseudo-labels to unlabeled data with a base model
1673
+ and uses them to train a new base model, which is
1674
+ repeated until convergence. Standard co-training
1675
+ (Blum and Mitchell, 1998) is similar to Standard
1676
+ self-training, but with two different base models
1677
+ dealing with the same task, generating pseudo-
1678
+ labels and adding the trusted ones for iterative train-
1679
+ ing. Mean teacher (Tarvainen and Valpola, 2017)
1680
+ maintains a teacher model on the fly, whose weights
1681
+ are the exponential moving average of the weights
1682
+ of a student model across iterations. Cross pseudo
1683
+ supervision (Chen et al., 2021), a state-of-the-art
1684
+ variant of self-training, maintains two networks
1685
+ with different initialization; the pseudo-label of
1686
+ one network is used to supervise the other network.
1687
+ Self-training with batch reweighting (Bhat et al.,
1688
+ 2021) is a state-of-the-art self-training method that
1689
+ reweights the pseudo-labels in a batch when train-
1690
+ ing according to the confidence from the teacher
1691
+ model. Self-teaching (Yu et al., 2021), a state-of-
1692
+ the-art semi-supervised method that sequentially
1693
+ trains a junior teacher, a senior teacher and an ex-
1694
+ pert student to leverage the unlabeled data.
1695
+ For the hyper-parameters of the baselines, we
1696
+ keep the common hyper-parameters, such as learn-
1697
+ ing rate, batch size, optimizer, and so on, the same
1698
+ as our proposed method. And we adopt the values
1699
+ of method-specific hyper-parameters used in the
1700
+ original papers, such as the merging weight of soft
1701
+ and hard labels of self-teaching and the smoothing
1702
+ parameter for updating of mean teacher.
1703
+ 9https://github.com/hankcs/HanLP
1704
+
1705
+ Context:
1706
+ ch: [A]我有一个非常喜欢的女明星。[B]她叫什么名字?[A]布蕾克·莱弗利。[B]她很有名吗?
1707
+ en: [A] I have a favorite actress. [B] What’s her name? [A] Blake Lively. [B] Is she famous?
1708
+ Current utterance
1709
+ ch: [A]她是一个非常受关注的女明星。
1710
+ en: [A] She is a actress attracting much attention.
1711
+ Rewritten utterance
1712
+ ch: [A] 布蕾克·莱弗利是一个非常受关注的女明星。
1713
+ en: [A] Blake Lively is a actress attracting much attention.
1714
+ Predicates
1715
+ 是(is)
1716
+ 受(attract)
1717
+ CSRL
1718
+ ch: ARG1: 一个非常受关注的女明星
1719
+ en: ARG1: a actress attracting much attention
1720
+ ARG0: 布蕾克·莱弗利, ARG1: 关注
1721
+ ARG0: Blake Lively, ARG1: attention
1722
+ SSRL
1723
+ ch: ARG0: 布蕾克·莱弗利, ARG1: 一个非常受关注的女明星
1724
+ en: ARG0: Blake Lively, ARG1: a actress attracting much attention
1725
+ ARG0: 布蕾克·莱弗利, ARG1: 关注
1726
+ ARG0: Blake Lively, ARG1: attention
1727
+ Predicate matching score
1728
+ 0.61
1729
+ 1.0
1730
+ Predicate confidence
1731
+ 0.95
1732
+ 0.54
1733
+ Predicate overall score
1734
+ 0.67
1735
+ 0.90
1736
+ Utterance matching score
1737
+ 0.81
1738
+ Utterance confidence
1739
+ 0.92
1740
+ Utterance overall score
1741
+ 0.83
1742
+ Table 4: Case study: [A] and [B] are the signatures of speakers. ch and en are the language abbreviations.
1743
+ A.5
1744
+ Case Study
1745
+ We show a representative case of selecting pseudo-
1746
+ labels in Table 4. There are two predicates in cur-
1747
+ rent utterance: 是(is) and 受(attract). For 是(is),
1748
+ the CSRL parser yields only ARG1 while SSRL
1749
+ parser gives the same ARG1 but more of ARG0
1750
+ based on the rewritten utterance. With the differ-
1751
+ ence in arguments, the overall score is not high and
1752
+ this predicate could be regarded as low-quality if a
1753
+ high pick threshold is set. For 受(attract), the CSRL
1754
+ and SSRL parsers give the same arguments, which
1755
+ are the right answer. However, if we only consider
1756
+ the model confidence of the predicate, which is
1757
+ 0.54, this high-quality predicate are more likely
1758
+ to been discarded than consider the overall score,
1759
+ which is 0.90. And the rewritten utterance gets a
1760
+ high overall score, which is what we expected.
1761
+ A.6
1762
+ Discussion on Generalization of the
1763
+ Framework
1764
+ It is not uncommon at all for different language
1765
+ tasks sharing some information. With one case
1766
+ study presented in detail in the main body of the
1767
+ paper, we also provide a short example of a dif-
1768
+ ferent friend task pair – constituency parsing and
1769
+ dependency parsing – and explain how they can
1770
+ help each other and show the general nature of the
1771
+ friend-training framework.
1772
+ Early work (Magerman, 1995; Collins, 2003) has
1773
+ shown relationship between dependency and con-
1774
+ stituency parsing through head-finding rules, and
1775
+ Jin and Schuler (2019) show directly how common
1776
+ structures between dependency and constituency
1777
+ trees can be derived for parsing evaluation. In a
1778
+ dependency graph, a set of nodes with a single
1779
+ incoming edge is usually indicative of a phrase
1780
+ structure, such as a noun phrase, a verb phrase or
1781
+ a prepositional phrase. Such phrasal structures are
1782
+ well-marked in constituency treebanks, and could
1783
+ be used as the shared friend information for friend-
1784
+ training. Here is a sketch of how friend-training
1785
+ can be applied to this pair:
1786
+ 1. Train a constituency parser and a dependency
1787
+ parser, presumably trained with a small num-
1788
+ ber of training instances, as the models for the
1789
+ friend-training framework.
1790
+ 2. Run both parsers on a common set of unla-
1791
+ beled data for parsing results.
1792
+ 3. Find phrases such as noun, verb or preposi-
1793
+ tional phrases in the predicted constituency
1794
+ trees.
1795
+ 4. Compare with the dependency trees, and
1796
+ check if spans of such phrases have only a
1797
+ single incoming edge. If so, the constituency
1798
+ and dependency parsing results can be consid-
1799
+ ered agreeing, and added to the silver training
1800
+ set. If not, the silver annotation is discarded.
1801
+ 5. Train the parsers again with the gold and silver
1802
+ training instances.
1803
+ As long as some shared information can be iden-
1804
+ tified between two seemingly different tasks, the
1805
+
1806
+ noisy agreement between that partial target can
1807
+ provide valuable supervision between two tasks.
1808
+ The translation and matching between constituency-
1809
+ dependency targets are simpler compared to the
1810
+ CSRL-rewriting pair presented in the paper, partly
1811
+ because no model is required for the translation
1812
+ process. However the CSRL-rewriting pair is more
1813
+ significant because heuristics may be difficult or
1814
+ not obvious to design where ‘bridging’ tasks such
1815
+ as single-sentence SRL may be readily available.
1816
+
RtFRT4oBgHgl3EQf8ThG/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
U9E3T4oBgHgl3EQfawpi/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bdc53c422c7751ed0c112cb844e8420f6405fef8c3c55aa50091c27cb3ab8f20
3
+ size 2031661
U9FIT4oBgHgl3EQfgSvJ/content/tmp_files/2301.11283v1.pdf.txt ADDED
@@ -0,0 +1,766 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ Real-Time Digital Twins:
3
+ Vision and Research Directions for 6G and Beyond
4
+ Ahmed Alkhateeb, Shuaifeng Jiang, and Gouranga Charan
5
+ Abstract—This article presents a vision where real-time digital
6
+ twins of the physical wireless environments are continuously
7
+ updated using multi-modal sensing data from the distributed
8
+ infrastructure and user devices, and are used to make communi-
9
+ cation and sensing decisions. This vision is mainly enabled by the
10
+ advances in precise 3D maps, multi-modal sensing, ray-tracing
11
+ computations, and machine/deep learning. This article details this
12
+ vision, explains the different approaches for constructing and
13
+ utilizing these real-time digital twins, discusses the applications
14
+ and open problems, and presents a research platform that can
15
+ be used to investigate various digital twin research directions.
16
+ I. INTRODUCTION
17
+ Heading towards 6G, communication systems are increas-
18
+ ingly featuring key trends such as the employment of large
19
+ numbers of antennas and the use of higher frequency bands [1].
20
+ These technology trends bring higher data-rate and multiplex-
21
+ ing gains to the networks, but also impose critical challenges
22
+ on the ability of these systems to support highly-mobile,
23
+ energy-constrained, reliable, and low-latency applications. For
24
+ example, the deployment of large antenna arrays is associated
25
+ with high channel acquisition and beam sweeping overhead
26
+ [2], [3], which makes it hard for these massive MIMO systems
27
+ to support mobile applications, and the use of higher frequency
28
+ bands at mmWave and sub-THz makes the wireless links very
29
+ sensitive to line-of-sight (LOS) blockages, which challenges
30
+ the reliability and latency of the networks [4].
31
+ In this article, we present a novel vision in which a real-time
32
+ digital twin is utilized to make operational physical, access,
33
+ network, and application layer decisions to the real physical
34
+ world in communication and sensing systems. The key features
35
+ of the envisioned digital twin-based wireless systems can be
36
+ summarized as follows:
37
+ • Enabled by 3D maps and multi-modal sensing: The
38
+ envisioned digital twin will leverage precise 3D maps and
39
+ fuse multi-modal sensory data from distributed devices
40
+ and infrastructure nodes to construct an accurate real-time
41
+ digital replica of the physical world.
42
+ • Capable of making real-time decisions: Leveraging
43
+ advances in real-time 3D ray-tracing, efficient computing,
44
+ and machine/deep learning, the envisioned digital twin
45
+ will be capable of making real-time decisions for the
46
+ wireless communication systems.
47
+ • Continuously refined for better approximation: We
48
+ envision the digital twin as a model that will be continu-
49
+ ously refined to improve its approximation of the physical
50
+ The authors are with the School of Electrical, Computer and Energy
51
+ Engineering, Arizona State University, (Email: alkhateeb, s.jiang, gcha-
52
53
+ world (including the electromagnetic and optical aspects)
54
+ and to enhance its decision accuracy.
55
+ • A global digital twin shared between devices: In its
56
+ ultimate version, we envision this digital twin to be
57
+ global and shared between devices such that all devices
58
+ can jointly enhance it and benefit from it using their
59
+ coordinated sensing and communication decisions.
60
+ • Used for all communication layer decisions: With the
61
+ real-time emulation of the physical world, the envisioned
62
+ digital twin can be utilized to make physical-layer de-
63
+ cisions such as channel prediction, as well as access,
64
+ network, and application layer decisions.
65
+ It is important to highlight here that the general concept
66
+ of real-time digital twins has been studied before in the
67
+ context of smart manufacturing, intelligent transportation, and
68
+ healthcare [5]. For wireless communications, prior work has
69
+ mainly focused on network operation topics such as edge
70
+ computing, network optimization, and service management,
71
+ in which digital twins are leveraged to simulate the real
72
+ world at the network level [6], [7]. In contrast, we focus
73
+ on utilizing the real-time digital twin to simulate the real
74
+ world with a particular emphasis on the physical modeling
75
+ of the environment and wireless signal propagation. To that
76
+ end, the envisioned real-time digital twins produce real-time
77
+ instantaneous and statistical information about the wireless
78
+ channels, which could be leveraged to make decisions for
79
+ the physical, access, network, or application layers of the
80
+ communication systems.
81
+ The goal of this article is to expose the potential of real-
82
+ time digital twins for wireless communication and sensing
83
+ systems in 6G and beyond. In the next sections, we discuss
84
+ the key enabling technologies, the different approaches for
85
+ constructing and utilizing these digital twins, and the various
86
+ applications and future research directions. We also present
87
+ a research platform that could be used to investigate many
88
+ interesting digital twin research directions.
89
+ II. TODAY’S TECHNOLOGY ADVANCES LEAD TO
90
+ REAL-TIME DIGITAL TWINS
91
+ The vision of building real-time digital twins is motivated
92
+ by the recent advances in 3D maps, multi-modal sensing, ray
93
+ tracing, and machine/deep learning. Next, we briefly discuss
94
+ these four key enablers for real-time digital twins.
95
+ Precise 3D Maps: 3D maps contain information about the
96
+ positions, shapes, orientations, and materials of the commu-
97
+ nication devices and other objects in the environment. The
98
+ current application trends of AR/XR, autonomous driving,
99
+ arXiv:2301.11283v1 [eess.SP] 26 Jan 2023
100
+
101
+ 2
102
+ Radar
103
+ LiDAR
104
+ Camera
105
+ IMU
106
+ Position
107
+ ...
108
+ High-Fidelity Sensing
109
+ Real-Time Ray Tracing
110
+ ML/DL Advances
111
+ Precise 3D Map
112
+ Real World
113
+ Digital Replica
114
+ Precise Real-Time
115
+ 3D Map
116
+ Channel Info.
117
+ Geometric Info.
118
+ (Position/Mobility)
119
+ Desicions
120
+ Configurations
121
+ Operations
122
+ Twin
123
+ Construction
124
+ & Update
125
+ Real-Time
126
+ Ray Tracing
127
+ Task Solving
128
+ Vehicle
129
+ Radar
130
+ Vehicle
131
+ LiDAR
132
+ Surveillance
133
+ Camera
134
+ User
135
+ Position
136
+ Digital Twin Guided
137
+ Beamforming
138
+ User
139
+ IMU
140
+ Fig. 1. This figure presents the general idea of the digital twin with the four key enablers: precise 3D map, high-fidelity sensing, real-time ray tracing, and
141
+ ML/DL. The digital twin is constructed based on a real-time 3D map. By performing real-time ray tracing, the digital twin infers channel information. The
142
+ channel and geometry information can facilitate various applications.
143
+ and metaverse technologies created an increasing demand
144
+ for precise 3D map data. In response to that, the 3D map
145
+ data collection, processing, and management capabilities have
146
+ been significantly advanced. Vehicle, airborne, and satellite
147
+ 3D imaginary sensors are now used to collect and build
148
+ very accurate 3D maps. Further, the growing computational
149
+ and database resources are making it possible to process and
150
+ manage large-scale 3D maps, even at the scale of the full world
151
+ like Nvidia OmniVerse [8]. Thanks to all these developments,
152
+ precise 3D maps are becoming more affordable and accessible.
153
+ High-Fidelity Sensing: Recent trends in sensing-aided
154
+ communication,
155
+ integrated
156
+ sensing
157
+ and
158
+ communication
159
+ (ISAC), and internet-of-things (IoT) tend to deploy multi-
160
+ modal sensors, such as cameras, radars, LiDARs, positioning,
161
+ at the infrastructure, user equipment, and IoT devices. These
162
+ distributed sensors can complement each other since they have
163
+ different observing angles and different types of information,
164
+ such as position, shape, and mobility measures about the
165
+ various stationary and moving objects. This sensing capability
166
+ can be further enhanced by leveraging the recent advances in
167
+ multi-modal data fusion [9]. As a result, it is becoming more
168
+ feasible to acquire high-fidelity sensing information about the
169
+ surrounding environment in nearly real-time, which is a key
170
+ enabler for the envisioned digital twin.
171
+ Real-Time Ray Tracing: Ray tracing simulators attempt
172
+ to trace the wireless signal propagation paths between trans-
173
+ mit and receive antennas, and generate the parameters, such
174
+ as the angles of arrival/departure and complex path gains,
175
+ of these propagation paths. A main limitation of the ray
176
+ tracing simulators is that they typically require considerable
177
+ computational overhead, and hence, incur high latency. The
178
+ significant advances in parallel computing hardware and ray-
179
+ tracing computational approaches over the last two decades,
180
+ however, are enabling real-time ray-tracing for both wireless
181
+ and optical signals. This means that, given precise real-time
182
+ 3D maps, the wireless channels between the (possibly mobile)
183
+ transmitters and receiver can potentially soon be computed in
184
+ the digital twins in real-time.
185
+ Advances in Machine/Deep Learning: Machine and deep
186
+ learning have demonstrated powerful capabilities in extracting
187
+ features, approximating complex functions, and solving non-
188
+ trivial optimization problems in wireless communication and
189
+ sensing/perception. In the digital twins, these advances in
190
+ machine/deep learning can be utilized to (i) enhance the
191
+ quality and reduce the cost of building precise 3D maps, (ii)
192
+ improve the efficiency of the multi-modal sensing in terms
193
+ of sensory data processing, transferring, sharing, and fusion
194
+ [10], and (iii) advance the ray tracing accuracy and reduce its
195
+ latency and computational complexity.
196
+ All these advances in precise 3D maps, high-fidelity sens-
197
+ ing, real-time ray tracing, and machine/deep learning are
198
+ making it more feasible to realize real-time digital twins.
199
+ In particular, the precise 3D map and high-fidelity sensing
200
+ complement each other; while the 3D maps mainly contain
201
+ information about the static objects in the environment, the
202
+ high-fidelity sensing can augment these maps with information
203
+ about the dynamic objects in real-time. Conducting ray tracing
204
+ on these real-time 3D maps leads to real-time wireless digital
205
+ twins. Further, the advances in machine/deep learning can
206
+ be utilized to enhance the various aspects of these real-time
207
+ digital twins. The real-time digital twins open opportunities for
208
+ novel capabilities and applications in wireless communication
209
+
210
+ 3
211
+ Level 1: Local Information and Individual Decisions
212
+ Level 2: Shared Information and Individual Decisions
213
+ Level 3: Shared Information and Joint Decisions
214
+ Local/Partial Digital Twin
215
+ of Vehicle 1
216
+ Local/Partial Digital Twin
217
+ of Vehicle 2
218
+ Vehicles 1 and 2
219
+ Equipped with Multi-modal Sensors
220
+ Device 1 Local Decisions
221
+ (Ray-Tracing, Beam Pred...)
222
+ Device 2 Local Decisions
223
+ (Ray-Tracing, Beam Pred...)
224
+ Device 1 Local Decisions
225
+ (Ray-Tracing, Beam Pred...)
226
+ Device 2 Local Decisions
227
+ (Ray-Tracing, Beam Pred...)
228
+ Joint Decisions
229
+ (Ray-Tracing, Beam Pred...)
230
+ Sensing Information is Projected to A Shared Digital Twin
231
+ Sensing Information is Projected to A Shared Digital Twin
232
+ V1
233
+ V1
234
+ V1
235
+ V2
236
+ V2
237
+ V2
238
+ Vehicle 1 Sensing Information is
239
+ Projected to A Local Digital Twin
240
+ Vehicle 2 Sensing Information is
241
+ Projected to A Local Digital Twin
242
+ Fig. 2. This figure presents our vision of how the digital twin system will operate in the real world. In particular, it shows three different operating modes
243
+ (i) local information and individual decision, (ii) shared information and individual decision, and (iii) shared information and joint decision.
244
+ and sensing systems. These digital twins can, for instance,
245
+ be leveraged to compute channel or channel covariance in-
246
+ formation, predict LOS link blockages, proactively predict
247
+ handover and traffic steering, and even predict application-
248
+ specific caching requirements.
249
+ III. TRUE DIGITAL TWINS THAT KEEP LEARNING
250
+ There are different approaches of how such a real-time
251
+ digital twin could be leveraged. In this section, we first discuss
252
+ two main approaches where digital twins are either only used
253
+ for training machine learning models or for making real-time
254
+ decisions. Then, we present our vision for true digital twins
255
+ that keep learning and improving over time.
256
+ Digital Twins for Training ML Models: With the pre-
257
+ cise 3D maps and accurate ray-tracing simulators, we can
258
+ build high-fidelity and site-specific synthetic datasets. These
259
+ datasets could be utilized to train machine learning models
260
+ for the various wireless communication and sensing tasks. In
261
+ particular, these synthetic datasets could be generated in large-
262
+ scale and with high variance, which is hard and expensive to
263
+ collect in the real world. The machine learning models that are
264
+ trained on these site-specific synthetic datasets could then be
265
+ deployed to make inference/decisions for the physical world.
266
+ Further, these models could be refined using limited real-world
267
+ datasets for better and more robust performance. This approach
268
+ relaxes the latency requirements as the digital twins are not
269
+ used for real-time decisions. The drawback, however, is that
270
+ these ML models are not benefiting from the global real-time
271
+ sensing and awareness that the real-time digital twins have,
272
+ which may limit their performance.
273
+ Digital Twins for Real-Time Decisions: Another approach
274
+ is to use these real-time digital twins to directly make real-time
275
+ or near real-time decisions for the physical-world communi-
276
+ cation and sensing systems. For example, an FDD massive
277
+ MIMO basestation can use the real-time digital twin to predict
278
+ the downlink channel or, at least, the dominant subspace of
279
+ this channel, which saves large channel training and feedback
280
+ overhead. Mobile users may also use this digital twin, for
281
+ instance, to predict if their LOS links are going to be blocked
282
+ by a moving scatterer or whether they need to switch to other
283
+ beams. This approach can, therefore, benefit from the real-time
284
+ nature of the digital twin and the richer awareness about the
285
+ surrounding environment in making real-time decisions. The
286
+ drawback, however, is that the decisions that are solely made
287
+ based on the digital twin will be very sensitive to the modeling
288
+ accuracy, which challenges the robustness of these decisions.
289
+ True Digital Twins: The previous two approaches have a
290
+ clear trade-off between the ability to benefit from the real-
291
+ time awareness of the digital twins to make efficient decisions
292
+ (e.g., in terms of wireless resources and mobility support)
293
+ and the ability to ensure the robustness of these decisions.
294
+ This motivates what we call true digital twins that can be
295
+ thought of as machine learning models themselves that keep
296
+ learning and improving their approximation of the physical
297
+ world, and hence their decisions, over time. In particular,
298
+ these digital twins could leverage learning agents and use
299
+ prior decisions and feedback to enhance the modeling accuracy
300
+ of the 3D maps, the processing and integration of the multi-
301
+ modal sensing data, and the approximation fidelity of the ray
302
+ tracing. These true digital twins can, therefore, be used to
303
+ make decisions that are both real-time and accurate for the
304
+ various wireless communication and sensing tasks.
305
+
306
+ 4
307
+ IV. THREE DIGITAL TWIN LEVELS
308
+ Constructing and utilizing digital twins requires interaction
309
+ with the devices that are contributing to the digital twins
310
+ with sensing data and leveraging the digital twins in making
311
+ decisions. This, however, raises questions about the required
312
+ level of coordination between these devices for both the
313
+ sensing and communication tasks. For that, we envision that
314
+ digital twins will evolve through three main digital twin
315
+ levels of coordination as the computation, synchronization,
316
+ and communication capabilities develop over time. Next, we
317
+ briefly present these operating modes (levels) and highlight
318
+ how they could function in the real world.
319
+ Local information and individual decision: We envision
320
+ the first level of the digital twin to incorporate local sensing
321
+ and individual decisions. In particular, each device equipped
322
+ with one or more sensors will be expected to collect its
323
+ local sensing information. The acquired local data can then
324
+ be projected onto a 3D map to generate a real-time digital
325
+ twin. This, in general, will help generate a partial view of the
326
+ entire map, resulting in a localized digital twin. This local real-
327
+ time digital twin can then be utilized to facilitate the sensing
328
+ and wireless communication decision-making process. An
329
+ advantage to such a local approach is that the limited sensing
330
+ information captured by each device can be processed locally
331
+ (on the device or edge), reducing the downstream processing
332
+ and decision-making latency. However, the partial nature of the
333
+ generated digital twin limits the scope of the decision-making
334
+ capabilities of the devices. For example, enabling advanced
335
+ applications, such as future blockage prediction and handoff,
336
+ may require access to a more global real-time digital twin.
337
+ Shared information and individual decision: The pro-
338
+ posed first level of the digital twin is limited by the local
339
+ view of the wireless environment, which results in a partial
340
+ digital twin. Generating an accurate real-time digital twin
341
+ and reaping its benefits requires a global overview of the
342
+ environment. Fusing the sensing information collected across
343
+ different devices in the wireless environment at any given
344
+ time can be a promising way to achieve this vision of a
345
+ comprehensive digital twin. As such, this idea forms the basis
346
+ of our vision of the second level of the digital twin. Similar to
347
+ the first level, each device is expected to collect sensing data
348
+ of its surrounding environment. However, here, we propose
349
+ to fuse the information collected across devices to generate a
350
+ detailed and thorough digital twin. The fusion operation can
351
+ be performed at the edge or cloud. Even though information
352
+ sharing across devices (or at the edge/cloud) is enabled,
353
+ each device is envisioned to undertake its own sensing and
354
+ communication decisions. This is due to the high computation,
355
+ synchronization, and communication requirement for joint and
356
+ globally-optimized decisions for all the devices.
357
+ Shared information and joint/cooperative decision: With
358
+ the increased computation, synchronization, and communica-
359
+ tion capabilities of future devices, we envision that digital
360
+ twins will evolve into a more global form where devices can
361
+ also coordinate and jointly optimize their sensing and commu-
362
+ nication decisions. Therefore, in this third level of the digital
363
+ twins, devices are expected to share and fuse their sensing
364
+ information, mostly at the edge, similar to the second level,
365
+ to form a global and comprehensive real-time digital twin.
366
+ In addition, the sensing and communication decisions will be
367
+ jointly optimized either in a central or distributed way. This
368
+ is expected to enhance both the sensing and communication
369
+ performance of future wireless systems. These three digital
370
+ twin levels are illustrated in Fig. 2, clarifying the differences
371
+ in the information-sharing and decision-making approaches.
372
+ V. APPLICATIONS
373
+ The proposed digital twin leverages precise 3D maps and
374
+ high-fidelity sensing to capture real-time information about the
375
+ geometry and materials of the static and dynamic objects in
376
+ the environment and to construct a real-time digital replica. By
377
+ performing real-time ray tracing on this digital replica, we can
378
+ infer various information about the communication channels,
379
+ such as the propagation path parameters (path loss, delays,
380
+ angles, etc.), channel and covariance information, link quality,
381
+ and blockage status. Moreover, by utilizing the temporal and
382
+ spatial consistency of the channels, the digital twin can predict
383
+ future channel information in dynamic environments. The real-
384
+ time and future channel predictions can be leveraged to make
385
+ real-time and proactive decisions that can potentially improve
386
+ the communication system operations in the physical, access,
387
+ network, and application layers.
388
+ Physical Layer: The physical layer operation has, by defini-
389
+ tion, a clear dependancy on the wireless channels. Many phys-
390
+ ical layer tasks, e.g., MIMO precoding and link adaptation,
391
+ directly rely on partial or full knowledge about the communi-
392
+ cation channels. However, the channel acquisition is typically
393
+ associated with high overhead, especially in large-dimensional
394
+ systems, which degrades the overall system efficiency. Real-
395
+ time digital twins open novel opportunities to revolutionize the
396
+ channel acquisition process: When the real-time 3D maps and
397
+ ray tracing computations are sufficiently accurate, the digital
398
+ twin could be directly used to accurately infer the channels,
399
+ reducing or even eliminating the channel acquisition overhead.
400
+ Further, in scenarios where the approximation is not sufficient
401
+ to accurately estimate the full channels, the digital twin may
402
+ still be used to predict the dominant channel subspaces and
403
+ reduce the channel acquisition overhead [11], [12]. These
404
+ digital twins can also be used to estimate the signal-to-noise
405
+ ratio (SNR) of the communication links and improve the
406
+ modulation and coding scheme selection. Another interesting
407
+ physical layer application of the digital twin is to generate a
408
+ massive amount of data for a given site in the real world. This
409
+ site-specific data can then be utilized to optimize the traffic
410
+ beam sets and the channel feedback compression codebooks.
411
+ Access Layer: Current and future communication systems,
412
+ especially at higher frequencies, employ large antenna arrays
413
+ and highly-directional beams to achieve sufficient SNR and
414
+ realize high data rates. Aligning these beams, however, typi-
415
+ cally requires large beam training overhead that scales with
416
+ the number of antennas. The real-time and future channel
417
+ information predicted by the digital twin can facilitate the
418
+ initial access (initial beam alignment) and beam management
419
+ for these systems and reduce the beam training overhead.
420
+
421
+ 5
422
+ Cloud
423
+ Edge
424
+ Ray-Tracing
425
+ 3D Map
426
+ AI/ML
427
+ D1: Sensing Data
428
+ D2: Sensing Data
429
+ Dn: Sensing Data
430
+ Physical World
431
+ Digital World
432
+ E.g.: MIMO Precoding
433
+ Channel Prediction
434
+ Link Adaptation
435
+ Initial Access
436
+ Beam Management
437
+ E.g.: Proactive Blockage Prediction
438
+ E.g.: Service Migration
439
+ Proactive Network Configuration
440
+ Occlusion
441
+ Will Lead to Link Disruption
442
+ E.g: Proactive Caching
443
+ Flexible Application-Specific Decisions
444
+ Physical Layer
445
+ Access Layer
446
+ Network Layer
447
+ Application Layer
448
+ Massive MIMO
449
+ Basestation
450
+ User
451
+ Propagation Paths
452
+ Precoding Matrix
453
+ Fig. 3. This figure presents some example communication applications that digital twins can enable across the different layers, such as the physical layer,
454
+ MAC layer, network layer, and application layer. For example, in the MAC layer, the digital twin can proactively predict future blockages and initiate hand-off
455
+ by tracking the mobility pattern of the different objects in the environment over time.
456
+ Further, due to the increased penetration loss, high frequency
457
+ communication links, e.g., in mmWave, experience sudden
458
+ disturbance due to blockages. By tracking the motion of the
459
+ user and other objects in the environment, the digital twins can
460
+ proactively predict the occurance and duration of incoming
461
+ blockages before they happen. This enables seamless han-
462
+ dover control and improve the network reliability and latency
463
+ performance. Digital twins can alsp enhance the access layer
464
+ resource allocation, user scheduling, MU-MIMO user pairing,
465
+ and interference management, among many other applications.
466
+ Network Layer: In prior work, digital twins have been
467
+ used to optimize the network layer operations and applications
468
+ such as device and traffic monitoring, resource allocation,
469
+ edge computing, and cyber security. We refer to this type
470
+ of digital twins as the network-level digital twins since they
471
+ typically focus on monitoring network status and modeling
472
+ the network-level entities, services, and dynamics. Differently,
473
+ the envisioned physical-level digital twins can provide fine-
474
+ grained information about the communication links, which
475
+ can also be used to improve the accuracy of the radio access
476
+ network (RAN) modeling. This accurate RAN modeling can
477
+ enhance the efficiency and reliability of various network-level
478
+ operations. Further, the physical-level digital twins can provide
479
+ real-time and future information about the user position and
480
+ mobility characteristics, which could be leveraged to improve
481
+ several edge computing operations. For instance, when a user
482
+ is predicted to move out of the service area of the in-use edge
483
+ server, proactive service migration can be triggered to improve
484
+ the service quality. The physical-level digital twins can also
485
+ work cooperatively and in an integrated manner with the
486
+ network-level digital twins to enhance the end-user experience.
487
+ Application Layer: New emerging applications, such as au-
488
+ tonomous driving and AR/VR, pose more stringent reliability
489
+ and latency requirements to advanced communication systems.
490
+ The 6G is envisioned to support 9-nine reliability with 0.1ms
491
+ latency for mission and safety-critical applications. Moreover,
492
+ different applications often have diverse requirements for data
493
+ throughput, reliability, and latency, thus different strategies
494
+ when handling link instability. The digital twin can simulate
495
+ the physical signal propagation and channels, which can offer
496
+ fine-grained information on the communication link quality,
497
+ both in real-time and proactively. This link quality information
498
+ provides more flexibility for making efficient application-layer
499
+ decisions in a way that respects this application diversity. For
500
+ example, if a video streaming application knows ahead of time
501
+ about the communication link disruption and blockage status,
502
+ this application can pre-load a certain portion of the video,
503
+ considering the duration of the cut-off, and achieve a seam-
504
+ less user experience with efficient usage of communication
505
+ resources. While the digital twin provides low-level and fine-
506
+ grained information about the communication links, how to
507
+ efficiently utilize this information is still to be investigated.
508
+ VI. DIGITAL TWIN RESEARCH PLATFORM
509
+ Here, we present a digital twin research platform based on
510
+ the DeepSense 6G [13] and the DeepVerse 6G [14] datasets
511
+ that can be used to investigate various digital twin research
512
+ directions. Next, we briefly present these digital twin datasets
513
+ and show how they can be used to investigate an example
514
+ application of digital twin-assisted beam prediction.
515
+
516
+ GPSPosition,Orientation
517
+ Camera
518
+ User
519
+ LiDAR
520
+ Radar
521
+ Future BlockageFuture Blockage
522
+ Prediction
523
+ Prediction Algorithm
524
+ InputSequenceEdgeServerEdges
525
+ Cloud Server
526
+ Service MigrationServerUE Movement6
527
+ Digital Twin Datasets: The digital twins rely on co-existing
528
+ real-world data and high-fidelity synthetic data generated using
529
+ accurate 3D maps and ray tracing. For that, the DeepSense 6G
530
+ and the DeepVerse 6G datasets are well-suited to facilitate the
531
+ research, development, and application of digital twins. The
532
+ DeepSense 6G is a large-scale multi-modal sensing and com-
533
+ munication dataset collected in various real-world scenarios;
534
+ the DeepVerse 6G is a synthetic dataset that can simulate high-
535
+ fidelity multi-modal sensing and communication data from ray
536
+ tracing. Combining real-world scenarios and their synthetic
537
+ replicas from the two datasets, we present a digital twin
538
+ research platform to investigate its efficacy, limitations, use
539
+ cases, and applications in real-world systems.
540
+ Example Application: In [15], the digital twin is used to
541
+ first infer the channels with real-time 3D maps (containing
542
+ user positions) and ray tracing. Then, these channels can be
543
+ used to infer optimal beams. However, the high computational
544
+ complexity of ray tracing may result in high latency, thus
545
+ limiting real-time applications. For that, ML models can be
546
+ employed to approximate the ray tracing simulation with
547
+ accelerated computation. Furthermore, ML can be leveraged
548
+ to learn the mapping function from 3D maps to the optimal
549
+ beam in an end-to-end manner. This can potentially improve
550
+ the computational efficiency since the ML has the flexibility
551
+ to not model the unnecessary ray tracing for a specific com-
552
+ munication problem. When the ML is trained solely using the
553
+ digital replica, it is limited by the impairments in the 3D map
554
+ and ray tracing. A small amount of real-world data can be
555
+ utilized to fine-tune the ML models (i.e. transfer learning) and
556
+ to even transcend the digital replica.
557
+ Experimental Results: Scenario 1 of DeepSense is adopted
558
+ as the real-world scenario, and the digital replica of this
559
+ scenario is constructed and simulated. An ML model is first
560
+ trained on the position and wireless beam data from the digital
561
+ replica. Then it is fine-tuned on the real-world data. The top-2
562
+ beam prediction accuracy is obtained by testing the model on
563
+ unseen real-world data. After training on 200 digital replica
564
+ data points, the ML model can achieve a high top-2 accuracy
565
+ of 91.4%. Note that this digital twin approach does not need
566
+ any real-world training data. Moreover, with transfer learning,
567
+ a small number of real-world data points (less than 20) can
568
+ quickly improve the ML model to go beyond the digital replica
569
+ and achieve near-optimal performance. Next, the digital replica
570
+ impairment is explicitly modeled by adopting a uniform beam
571
+ steering codebook that is different from the beam codebook of
572
+ the communication hardware. The uniform codebook leads to
573
+ lower performance when fine-tuned on a very limited amount
574
+ of real-world data. However, when more than 20 real-world
575
+ data points are used for fine-tuning, the performance of the two
576
+ codebooks becomes very similar. The mismatches between the
577
+ real world and the digital replica can be efficiently calibrated
578
+ by a small amount of real-world data.
579
+ VII. FUTURE RESEARCH DIRECTIONS
580
+ Digital twins are envisioned to be an integral component
581
+ of 6G and beyond wireless communication systems and have
582
+ recently piqued the interest of both the industry and academia
583
+ 0
584
+ 20
585
+ 40
586
+ 60
587
+ 80
588
+ 100
589
+ Number of Real Data Points Used for Training
590
+ 0.3
591
+ 0.4
592
+ 0.5
593
+ 0.6
594
+ 0.7
595
+ 0.8
596
+ 0.9
597
+ Top-2 Accuracy Tested on Real-World Data
598
+ Trained on real-world data
599
+ Transfer learining (measured codebook)
600
+ Transfer learining (unifrom codebook)
601
+ 0
602
+ 5
603
+ 10
604
+ 15
605
+ 20
606
+ 0.86
607
+ 0.88
608
+ 0.9
609
+ 0.92
610
+ 0.94
611
+ 0.96
612
+ Transfer learning
613
+ Pre-trained on 200
614
+ synthetic data points
615
+ Fig. 4. This figure shows the top-2 accuracy performance by first training the
616
+ NN on the synthetic data generated by the digital twin and then fine-tuning
617
+ it on real-world data.
618
+ alike. However, realizing this vision and exploring the true
619
+ potential of digital twins requires overcoming the fundamental
620
+ challenges and thoroughly investigating some of the important
621
+ aspects. Next, we present some open research directions that
622
+ need to be investigated toward enabling digital twin-aided
623
+ next-generation wireless communication.
624
+ Impact of Digital Twin on Communication Tasks: De-
625
+ ploying digital twin-aided solutions in the real world will re-
626
+ quire revisiting all the problem statements, such as LOS/NLOS
627
+ beam prediction, blockage prediction, hand-off, etc., to evalu-
628
+ ate the efficacy of these solutions accurately. In particular, it
629
+ is necessary to investigate how much gain in performance can
630
+ be achieved by utilizing the real-time digital twins compared
631
+ to conventional and sensing-aided approaches. To that end,
632
+ the recently published DeepVerse 6G synthetic dataset (with
633
+ multi-modal sensing and communication data generated from
634
+ 3D models and ray-tracing) was created to mimic the real-
635
+ world scenarios of the DeepSense 6G dataset, effectively
636
+ making them a digital twin of each other. These two datasets
637
+ combined can enable the development and evaluation of digital
638
+ twin-aided applications in real-world communication systems.
639
+ Communication-Sensing Trade-Off: In order to gener-
640
+ ate an accurate real-time digital twin with minimal latency,
641
+ the sensing data collected across different devices, in some
642
+ cases, need to be transferred quickly to a central unit for
643
+ further processing (digital twin levels 2 and 3). The data
644
+ transfer rate is dependent on the available bandwidth of the
645
+ communication system itself. As the amount of sensing data
646
+ increases (for example, with the increase in sensing modalities
647
+ or the number of devices), so does the requirement for com-
648
+ munication bandwidth. While access to diverse and detailed
649
+ sensing information can help generate a more accurate digital
650
+ twin, which improves the performance of the communication
651
+ system, transferring that sensing data will consume communi-
652
+ cation resources, potentially offsetting any gains. A promising
653
+ solution to overcome this challenge is to first process the
654
+
655
+ 7
656
+ sensory data locally and extract relevant features, and then
657
+ transfer the low-dimensional extracted features across devices.
658
+ Investigating this trade-off and the possible solutions is an
659
+ interesting open problem.
660
+ Sensing Fusion and Coordination: As presented in Sec-
661
+ tion IV, in the third level of the digital twin, devices can
662
+ communicate and coordinate to make joint sensing and com-
663
+ munication decisions. For instance, multiple devices in the
664
+ same location will capture similar sensing data. Most of this
665
+ data may be redundant, and transferring this data over the
666
+ limited communication bandwidth for further processing will
667
+ only increase the computational cost overhead without signif-
668
+ icantly improving the generated digital twin. One solution to
669
+ improve resource utilization can be to sense and transfer the
670
+ optimum data required to generate a complete and accurate
671
+ digital twin. Realizing such a solution will require the devices
672
+ to communicate with each other and adopt efficient protocols
673
+ for cooperative sensing. These challenges highlight the need
674
+ for further investigation in this direction.
675
+ Central and Distributed Decision: Generating an accurate
676
+ and complete real-time digital twin necessitates the sharing
677
+ and transferring of sensing data across devices. Given access
678
+ to this digital twin of the real world, the next question is,
679
+ how will this replica of the real world be utilized to facilitate
680
+ the sensing and communication decision-making process? For
681
+ instance, a user can make individual decisions in a distributed
682
+ manner or adopt a centralized way that fosters a collaborative
683
+ decision-making environment. Both these approaches have
684
+ their advantages and limitations. For example, the individual
685
+ distributed decisions are mostly made on the edge devices,
686
+ which will minimize any latency involved with data transfer
687
+ back and forth from the cloud devices. However, they generally
688
+ require computation-intensive machine learning-based models,
689
+ which will further increase the overhead in these resource-
690
+ constrained edge devices. Developing a robust and efficient
691
+ solution that can be deployed in the real world requires a
692
+ detailed investigation of these different possibilities.
693
+ VIII. CONCLUSION
694
+ This article presented and discussed a vision for future
695
+ wireless communication and sensing systems that would lever-
696
+ age precise 3D maps, distributed multi-modal sensing, effi-
697
+ cient ray-tracing computations, and advanced machine/deep
698
+ learning to construct, update, and utilize real-time digital
699
+ twins. As computations, communication, and synchronization
700
+ capabilities evolve over time, we expect devices to gradu-
701
+ ally coordinate in building and updating global digital twins
702
+ using their sensing information and potentially make joint
703
+ sensing and communication decisions for the physical, access,
704
+ network, and application layers. The article also presented
705
+ a research platform, based on the real-world DeepSense 6G
706
+ dataset and its digital replica, DeepVerse 6G, to investigate
707
+ various digital twin research directions, and showed how to
708
+ use this platform for one example application.
709
+ REFERENCES
710
+ [1] T. S. Rappaport, Y. Xing, O. Kanhere, S. Ju, A. Madanayake, S. Mandal,
711
+ A. Alkhateeb, and G. C. Trichopoulos, “Wireless communications and
712
+ applications above 100 GHz: Opportunities and challenges for 6G and
713
+ beyond,” IEEE Access, vol. 7, pp. 78 729–78 757, 2019.
714
+ [2] A. Alkhateeb, O. El Ayach, G. Leus, and R. Heath, “Channel estimation
715
+ and hybrid precoding for millimeter wave cellular systems,” IEEE
716
+ Journal of Selected Topics in Signal Processing, vol. 8, no. 5, pp. 831–
717
+ 846, Oct. 2014.
718
+ [3] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An
719
+ overview of massive MIMO: Benefits and challenges,” IEEE journal of
720
+ selected topics in signal processing, vol. 8, no. 5, pp. 742–758, 2014.
721
+ [4] J. G. Andrews, T. Bai, M. N. Kulkarni, A. Alkhateeb, A. K. Gupta,
722
+ and R. W. Heath, “Modeling and analyzing millimeter wave cellular
723
+ systems,” IEEE Transactions on Communications, vol. 65, no. 1, pp.
724
+ 403–430, 2016.
725
+ [5] Y. Wu, K. Zhang, and Y. Zhang, “Digital twin networks: A survey,” IEEE
726
+ Internet of Things Journal, vol. 8, no. 18, pp. 13 789–13 804, 2021.
727
+ [6] L. U. Khan, W. Saad, D. Niyato, Z. Han, and C. S. Hong, “Digital-twin-
728
+ enabled 6g: Vision, architectural trends, and future directions,” IEEE
729
+ Communications Magazine, vol. 60, no. 1, pp. 74–80, 2022.
730
+ [7] H. X. Nguyen, R. Trestian, D. To, and M. Tatipamula, “Digital twin for
731
+ 5g and beyond,” IEEE Communications Magazine, vol. 59, no. 2, pp.
732
+ 10–15, 2021.
733
+ [8] “NVIDIA Omniverse Platform.” [Online]. Available: https://developer.
734
+ nvidia.com/nvidia-omniverse-platform
735
+ [9] Z. Liu, G. Xiao, H. Liu, and H. Wei, “Multi-sensor measurement and
736
+ data fusion,” IEEE Instrumentation & Measurement Magazine, vol. 25,
737
+ no. 1, pp. 28–36, 2022.
738
+ [10] E. Blasch, T. Pham, C.-Y. Chong, W. Koch, H. Leung, D. Braines, and
739
+ T. Abdelzaher, “Machine learning/artificial intelligence for sensor data
740
+ fusion–opportunities and challenges,” IEEE Aerospace and Electronic
741
+ Systems Magazine, vol. 36, no. 7, pp. 80–93, 2021.
742
+ [11] S. Jiang and A. Alkhateeb, “Sensing Aided OTFS Channel Estimation
743
+ for Massive MIMO Systems,” arXiv preprint arXiv:2209.11321, 2022.
744
+ [12] U. Demirhan and A. Alkhateeb, “Integrated sensing and communication
745
+ for 6G: Ten key machine learning roles,” IEEE Communications
746
+ Magazine, 2022. [Online]. Available: https://arxiv.org/abs/2208.02157
747
+ [13] A.
748
+ Alkhateeb,
749
+ G.
750
+ Charan,
751
+ T.
752
+ Osman,
753
+ A.
754
+ Hredzak,
755
+ J.
756
+ Morais,
757
+ U. Demirhan, and N. Srinivas, “Deepsense 6G: A large-scale real-world
758
+ multi-modal sensing and communication dataset,” 2022. [Online].
759
+ Available: https://arxiv.org/abs/2211.09769
760
+ [14] U. Demirhan, A. Taha, and A. Alkhateeb, “Deepverse 6G: A framework
761
+ for synthetic multi-modal sensing and communication datasets,” arXiv
762
+ preprint. [Online]. Available: https://www.DeepVerse6G.net
763
+ [15] S. Jiang and A. Alkhateeb, “Digital twin based beam prediction: Can
764
+ we train in the digital world and deploy in reality?” arXiv preprint.
765
+ [Online]. Available: https://arxiv.org/abs/2301.07682
766
+
U9FIT4oBgHgl3EQfgSvJ/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,388 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf,len=387
2
+ page_content='1 Real-Time Digital Twins: Vision and Research Directions for 6G and Beyond Ahmed Alkhateeb, Shuaifeng Jiang, and Gouranga Charan Abstract—This article presents a vision where real-time digital twins of the physical wireless environments are continuously updated using multi-modal sensing data from the distributed infrastructure and user devices, and are used to make communi- cation and sensing decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
3
+ page_content=' This vision is mainly enabled by the advances in precise 3D maps, multi-modal sensing, ray-tracing computations, and machine/deep learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
4
+ page_content=' This article details this vision, explains the different approaches for constructing and utilizing these real-time digital twins, discusses the applications and open problems, and presents a research platform that can be used to investigate various digital twin research directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
5
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
6
+ page_content=' INTRODUCTION Heading towards 6G, communication systems are increas- ingly featuring key trends such as the employment of large numbers of antennas and the use of higher frequency bands [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
7
+ page_content=' These technology trends bring higher data-rate and multiplex- ing gains to the networks, but also impose critical challenges on the ability of these systems to support highly-mobile, energy-constrained, reliable, and low-latency applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
8
+ page_content=' For example, the deployment of large antenna arrays is associated with high channel acquisition and beam sweeping overhead [2], [3], which makes it hard for these massive MIMO systems to support mobile applications, and the use of higher frequency bands at mmWave and sub-THz makes the wireless links very sensitive to line-of-sight (LOS) blockages, which challenges the reliability and latency of the networks [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
9
+ page_content=' In this article, we present a novel vision in which a real-time digital twin is utilized to make operational physical, access, network, and application layer decisions to the real physical world in communication and sensing systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
10
+ page_content=' The key features of the envisioned digital twin-based wireless systems can be summarized as follows: Enabled by 3D maps and multi-modal sensing: The envisioned digital twin will leverage precise 3D maps and fuse multi-modal sensory data from distributed devices and infrastructure nodes to construct an accurate real-time digital replica of the physical world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
11
+ page_content=' Capable of making real-time decisions: Leveraging advances in real-time 3D ray-tracing, efficient computing, and machine/deep learning, the envisioned digital twin will be capable of making real-time decisions for the wireless communication systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
12
+ page_content=' Continuously refined for better approximation: We envision the digital twin as a model that will be continu- ously refined to improve its approximation of the physical The authors are with the School of Electrical, Computer and Energy Engineering, Arizona State University, (Email: alkhateeb, s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
13
+ page_content='jiang, gcha- ran@asu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
14
+ page_content='edu).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
15
+ page_content=' world (including the electromagnetic and optical aspects) and to enhance its decision accuracy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
16
+ page_content=' A global digital twin shared between devices: In its ultimate version, we envision this digital twin to be global and shared between devices such that all devices can jointly enhance it and benefit from it using their coordinated sensing and communication decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
17
+ page_content=' Used for all communication layer decisions: With the real-time emulation of the physical world, the envisioned digital twin can be utilized to make physical-layer de- cisions such as channel prediction, as well as access, network, and application layer decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
18
+ page_content=' It is important to highlight here that the general concept of real-time digital twins has been studied before in the context of smart manufacturing, intelligent transportation, and healthcare [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
19
+ page_content=' For wireless communications, prior work has mainly focused on network operation topics such as edge computing, network optimization, and service management, in which digital twins are leveraged to simulate the real world at the network level [6], [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
20
+ page_content=' In contrast, we focus on utilizing the real-time digital twin to simulate the real world with a particular emphasis on the physical modeling of the environment and wireless signal propagation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
21
+ page_content=' To that end, the envisioned real-time digital twins produce real-time instantaneous and statistical information about the wireless channels, which could be leveraged to make decisions for the physical, access, network, or application layers of the communication systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
22
+ page_content=' The goal of this article is to expose the potential of real- time digital twins for wireless communication and sensing systems in 6G and beyond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
23
+ page_content=' In the next sections, we discuss the key enabling technologies, the different approaches for constructing and utilizing these digital twins, and the various applications and future research directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
24
+ page_content=' We also present a research platform that could be used to investigate many interesting digital twin research directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
25
+ page_content=' II.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
26
+ page_content=' TODAY’S TECHNOLOGY ADVANCES LEAD TO REAL-TIME DIGITAL TWINS The vision of building real-time digital twins is motivated by the recent advances in 3D maps, multi-modal sensing, ray tracing, and machine/deep learning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
27
+ page_content=' Next, we briefly discuss these four key enablers for real-time digital twins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
28
+ page_content=' Precise 3D Maps: 3D maps contain information about the positions, shapes, orientations, and materials of the commu- nication devices and other objects in the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
29
+ page_content=' The current application trends of AR/XR, autonomous driving, arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
30
+ page_content='11283v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
31
+ page_content='SP] 26 Jan 2023 2 Radar LiDAR Camera IMU Position .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
32
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
33
+ page_content=' High-Fidelity Sensing Real-Time Ray Tracing ML/DL Advances Precise 3D Map Real World Digital Replica Precise Real-Time 3D Map Channel Info.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
34
+ page_content=' Geometric Info.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
35
+ page_content=' (Position/Mobility) Desicions Configurations Operations Twin Construction & Update Real-Time Ray Tracing Task Solving Vehicle Radar Vehicle LiDAR Surveillance Camera User Position Digital Twin Guided Beamforming User IMU Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
36
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
37
+ page_content=' This figure presents the general idea of the digital twin with the four key enablers: precise 3D map, high-fidelity sensing, real-time ray tracing, and ML/DL.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
38
+ page_content=' The digital twin is constructed based on a real-time 3D map.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
39
+ page_content=' By performing real-time ray tracing, the digital twin infers channel information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
40
+ page_content=' The channel and geometry information can facilitate various applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
41
+ page_content=' and metaverse technologies created an increasing demand for precise 3D map data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
42
+ page_content=' In response to that, the 3D map data collection, processing, and management capabilities have been significantly advanced.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
43
+ page_content=' Vehicle, airborne, and satellite 3D imaginary sensors are now used to collect and build very accurate 3D maps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
44
+ page_content=' Further, the growing computational and database resources are making it possible to process and manage large-scale 3D maps, even at the scale of the full world like Nvidia OmniVerse [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
45
+ page_content=' Thanks to all these developments, precise 3D maps are becoming more affordable and accessible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
46
+ page_content=' High-Fidelity Sensing: Recent trends in sensing-aided communication, integrated sensing and communication (ISAC), and internet-of-things (IoT) tend to deploy multi- modal sensors, such as cameras, radars, LiDARs, positioning, at the infrastructure, user equipment, and IoT devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
47
+ page_content=' These distributed sensors can complement each other since they have different observing angles and different types of information, such as position, shape, and mobility measures about the various stationary and moving objects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
48
+ page_content=' This sensing capability can be further enhanced by leveraging the recent advances in multi-modal data fusion [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
49
+ page_content=' As a result, it is becoming more feasible to acquire high-fidelity sensing information about the surrounding environment in nearly real-time, which is a key enabler for the envisioned digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
50
+ page_content=' Real-Time Ray Tracing: Ray tracing simulators attempt to trace the wireless signal propagation paths between trans- mit and receive antennas, and generate the parameters, such as the angles of arrival/departure and complex path gains, of these propagation paths.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
51
+ page_content=' A main limitation of the ray tracing simulators is that they typically require considerable computational overhead, and hence, incur high latency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
52
+ page_content=' The significant advances in parallel computing hardware and ray- tracing computational approaches over the last two decades, however, are enabling real-time ray-tracing for both wireless and optical signals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
53
+ page_content=' This means that, given precise real-time 3D maps, the wireless channels between the (possibly mobile) transmitters and receiver can potentially soon be computed in the digital twins in real-time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
54
+ page_content=' Advances in Machine/Deep Learning: Machine and deep learning have demonstrated powerful capabilities in extracting features, approximating complex functions, and solving non- trivial optimization problems in wireless communication and sensing/perception.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
55
+ page_content=' In the digital twins, these advances in machine/deep learning can be utilized to (i) enhance the quality and reduce the cost of building precise 3D maps, (ii) improve the efficiency of the multi-modal sensing in terms of sensory data processing, transferring, sharing, and fusion [10], and (iii) advance the ray tracing accuracy and reduce its latency and computational complexity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
56
+ page_content=' All these advances in precise 3D maps, high-fidelity sens- ing, real-time ray tracing, and machine/deep learning are making it more feasible to realize real-time digital twins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
57
+ page_content=' In particular, the precise 3D map and high-fidelity sensing complement each other;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
58
+ page_content=' while the 3D maps mainly contain information about the static objects in the environment, the high-fidelity sensing can augment these maps with information about the dynamic objects in real-time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
59
+ page_content=' Conducting ray tracing on these real-time 3D maps leads to real-time wireless digital twins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
60
+ page_content=' Further, the advances in machine/deep learning can be utilized to enhance the various aspects of these real-time digital twins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
61
+ page_content=' The real-time digital twins open opportunities for novel capabilities and applications in wireless communication 3 Level 1: Local Information and Individual Decisions Level 2: Shared Information and Individual Decisions Level 3: Shared Information and Joint Decisions Local/Partial Digital Twin of Vehicle 1 Local/Partial Digital Twin of Vehicle 2 Vehicles 1 and 2 Equipped with Multi-modal Sensors Device 1 Local Decisions (Ray-Tracing, Beam Pred.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
62
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
63
+ page_content=') Device 2 Local Decisions (Ray-Tracing, Beam Pred.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
64
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
65
+ page_content=') Device 1 Local Decisions (Ray-Tracing, Beam Pred.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
66
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
67
+ page_content=') Device 2 Local Decisions (Ray-Tracing, Beam Pred.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
68
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
69
+ page_content=') Joint Decisions (Ray-Tracing, Beam Pred.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
70
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
71
+ page_content=') Sensing Information is Projected to A Shared Digital Twin Sensing Information is Projected to A Shared Digital Twin V1 V1 V1 V2 V2 V2 Vehicle 1 Sensing Information is Projected to A Local Digital Twin Vehicle 2 Sensing Information is Projected to A Local Digital Twin Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
72
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
73
+ page_content=' This figure presents our vision of how the digital twin system will operate in the real world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
74
+ page_content=' In particular, it shows three different operating modes (i) local information and individual decision, (ii) shared information and individual decision, and (iii) shared information and joint decision.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
75
+ page_content=' and sensing systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
76
+ page_content=' These digital twins can, for instance, be leveraged to compute channel or channel covariance in- formation, predict LOS link blockages, proactively predict handover and traffic steering, and even predict application- specific caching requirements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
77
+ page_content=' III.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
78
+ page_content=' TRUE DIGITAL TWINS THAT KEEP LEARNING There are different approaches of how such a real-time digital twin could be leveraged.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
79
+ page_content=' In this section, we first discuss two main approaches where digital twins are either only used for training machine learning models or for making real-time decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
80
+ page_content=' Then, we present our vision for true digital twins that keep learning and improving over time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
81
+ page_content=' Digital Twins for Training ML Models: With the pre- cise 3D maps and accurate ray-tracing simulators, we can build high-fidelity and site-specific synthetic datasets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
82
+ page_content=' These datasets could be utilized to train machine learning models for the various wireless communication and sensing tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
83
+ page_content=' In particular, these synthetic datasets could be generated in large- scale and with high variance, which is hard and expensive to collect in the real world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
84
+ page_content=' The machine learning models that are trained on these site-specific synthetic datasets could then be deployed to make inference/decisions for the physical world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
85
+ page_content=' Further, these models could be refined using limited real-world datasets for better and more robust performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
86
+ page_content=' This approach relaxes the latency requirements as the digital twins are not used for real-time decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
87
+ page_content=' The drawback, however, is that these ML models are not benefiting from the global real-time sensing and awareness that the real-time digital twins have, which may limit their performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
88
+ page_content=' Digital Twins for Real-Time Decisions: Another approach is to use these real-time digital twins to directly make real-time or near real-time decisions for the physical-world communi- cation and sensing systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
89
+ page_content=' For example, an FDD massive MIMO basestation can use the real-time digital twin to predict the downlink channel or, at least, the dominant subspace of this channel, which saves large channel training and feedback overhead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
90
+ page_content=' Mobile users may also use this digital twin, for instance, to predict if their LOS links are going to be blocked by a moving scatterer or whether they need to switch to other beams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
91
+ page_content=' This approach can, therefore, benefit from the real-time nature of the digital twin and the richer awareness about the surrounding environment in making real-time decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
92
+ page_content=' The drawback, however, is that the decisions that are solely made based on the digital twin will be very sensitive to the modeling accuracy, which challenges the robustness of these decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
93
+ page_content=' True Digital Twins: The previous two approaches have a clear trade-off between the ability to benefit from the real- time awareness of the digital twins to make efficient decisions (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
94
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
95
+ page_content=', in terms of wireless resources and mobility support) and the ability to ensure the robustness of these decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
96
+ page_content=' This motivates what we call true digital twins that can be thought of as machine learning models themselves that keep learning and improving their approximation of the physical world, and hence their decisions, over time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
97
+ page_content=' In particular, these digital twins could leverage learning agents and use prior decisions and feedback to enhance the modeling accuracy of the 3D maps, the processing and integration of the multi- modal sensing data, and the approximation fidelity of the ray tracing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
98
+ page_content=' These true digital twins can, therefore, be used to make decisions that are both real-time and accurate for the various wireless communication and sensing tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
99
+ page_content=' 4 IV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
100
+ page_content=' THREE DIGITAL TWIN LEVELS Constructing and utilizing digital twins requires interaction with the devices that are contributing to the digital twins with sensing data and leveraging the digital twins in making decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
101
+ page_content=' This, however, raises questions about the required level of coordination between these devices for both the sensing and communication tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
102
+ page_content=' For that, we envision that digital twins will evolve through three main digital twin levels of coordination as the computation, synchronization, and communication capabilities develop over time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
103
+ page_content=' Next, we briefly present these operating modes (levels) and highlight how they could function in the real world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
104
+ page_content=' Local information and individual decision: We envision the first level of the digital twin to incorporate local sensing and individual decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
105
+ page_content=' In particular, each device equipped with one or more sensors will be expected to collect its local sensing information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
106
+ page_content=' The acquired local data can then be projected onto a 3D map to generate a real-time digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
107
+ page_content=' This, in general, will help generate a partial view of the entire map, resulting in a localized digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
108
+ page_content=' This local real- time digital twin can then be utilized to facilitate the sensing and wireless communication decision-making process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
109
+ page_content=' An advantage to such a local approach is that the limited sensing information captured by each device can be processed locally (on the device or edge), reducing the downstream processing and decision-making latency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
110
+ page_content=' However, the partial nature of the generated digital twin limits the scope of the decision-making capabilities of the devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
111
+ page_content=' For example, enabling advanced applications, such as future blockage prediction and handoff, may require access to a more global real-time digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
112
+ page_content=' Shared information and individual decision: The pro- posed first level of the digital twin is limited by the local view of the wireless environment, which results in a partial digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
113
+ page_content=' Generating an accurate real-time digital twin and reaping its benefits requires a global overview of the environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
114
+ page_content=' Fusing the sensing information collected across different devices in the wireless environment at any given time can be a promising way to achieve this vision of a comprehensive digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
115
+ page_content=' As such, this idea forms the basis of our vision of the second level of the digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
116
+ page_content=' Similar to the first level, each device is expected to collect sensing data of its surrounding environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
117
+ page_content=' However, here, we propose to fuse the information collected across devices to generate a detailed and thorough digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
118
+ page_content=' The fusion operation can be performed at the edge or cloud.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
119
+ page_content=' Even though information sharing across devices (or at the edge/cloud) is enabled, each device is envisioned to undertake its own sensing and communication decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
120
+ page_content=' This is due to the high computation, synchronization, and communication requirement for joint and globally-optimized decisions for all the devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
121
+ page_content=' Shared information and joint/cooperative decision: With the increased computation, synchronization, and communica- tion capabilities of future devices, we envision that digital twins will evolve into a more global form where devices can also coordinate and jointly optimize their sensing and commu- nication decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
122
+ page_content=' Therefore, in this third level of the digital twins, devices are expected to share and fuse their sensing information, mostly at the edge, similar to the second level, to form a global and comprehensive real-time digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
123
+ page_content=' In addition, the sensing and communication decisions will be jointly optimized either in a central or distributed way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
124
+ page_content=' This is expected to enhance both the sensing and communication performance of future wireless systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
125
+ page_content=' These three digital twin levels are illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
126
+ page_content=' 2, clarifying the differences in the information-sharing and decision-making approaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
127
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
128
+ page_content=' APPLICATIONS The proposed digital twin leverages precise 3D maps and high-fidelity sensing to capture real-time information about the geometry and materials of the static and dynamic objects in the environment and to construct a real-time digital replica.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
129
+ page_content=' By performing real-time ray tracing on this digital replica, we can infer various information about the communication channels, such as the propagation path parameters (path loss, delays, angles, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
130
+ page_content=' ), channel and covariance information, link quality, and blockage status.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
131
+ page_content=' Moreover, by utilizing the temporal and spatial consistency of the channels, the digital twin can predict future channel information in dynamic environments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
132
+ page_content=' The real- time and future channel predictions can be leveraged to make real-time and proactive decisions that can potentially improve the communication system operations in the physical, access, network, and application layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
133
+ page_content=' Physical Layer: The physical layer operation has, by defini- tion, a clear dependancy on the wireless channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
134
+ page_content=' Many phys- ical layer tasks, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
135
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
136
+ page_content=', MIMO precoding and link adaptation, directly rely on partial or full knowledge about the communi- cation channels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
137
+ page_content=' However, the channel acquisition is typically associated with high overhead, especially in large-dimensional systems, which degrades the overall system efficiency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
138
+ page_content=' Real- time digital twins open novel opportunities to revolutionize the channel acquisition process: When the real-time 3D maps and ray tracing computations are sufficiently accurate, the digital twin could be directly used to accurately infer the channels, reducing or even eliminating the channel acquisition overhead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
139
+ page_content=' Further, in scenarios where the approximation is not sufficient to accurately estimate the full channels, the digital twin may still be used to predict the dominant channel subspaces and reduce the channel acquisition overhead [11], [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
140
+ page_content=' These digital twins can also be used to estimate the signal-to-noise ratio (SNR) of the communication links and improve the modulation and coding scheme selection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
141
+ page_content=' Another interesting physical layer application of the digital twin is to generate a massive amount of data for a given site in the real world.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
142
+ page_content=' This site-specific data can then be utilized to optimize the traffic beam sets and the channel feedback compression codebooks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
143
+ page_content=' Access Layer: Current and future communication systems, especially at higher frequencies, employ large antenna arrays and highly-directional beams to achieve sufficient SNR and realize high data rates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
144
+ page_content=' Aligning these beams, however, typi- cally requires large beam training overhead that scales with the number of antennas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
145
+ page_content=' The real-time and future channel information predicted by the digital twin can facilitate the initial access (initial beam alignment) and beam management for these systems and reduce the beam training overhead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
146
+ page_content=' 5 Cloud Edge Ray-Tracing 3D Map AI/ML D1: Sensing Data D2: Sensing Data Dn: Sensing Data Physical World Digital World E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
147
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
148
+ page_content=' : MIMO Precoding Channel Prediction Link Adaptation Initial Access Beam Management E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
149
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
150
+ page_content=' : Proactive Blockage Prediction E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
151
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
152
+ page_content=' : Service Migration Proactive Network Configuration Occlusion Will Lead to Link Disruption E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
153
+ page_content='g: Proactive Caching Flexible Application-Specific Decisions Physical Layer Access Layer Network Layer Application Layer Massive MIMO Basestation User Propagation Paths Precoding Matrix Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
154
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
155
+ page_content=' This figure presents some example communication applications that digital twins can enable across the different layers, such as the physical layer, MAC layer, network layer, and application layer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
156
+ page_content=' For example, in the MAC layer, the digital twin can proactively predict future blockages and initiate hand-off by tracking the mobility pattern of the different objects in the environment over time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
157
+ page_content=' Further, due to the increased penetration loss, high frequency communication links, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
158
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
159
+ page_content=', in mmWave, experience sudden disturbance due to blockages.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
160
+ page_content=' By tracking the motion of the user and other objects in the environment, the digital twins can proactively predict the occurance and duration of incoming blockages before they happen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
161
+ page_content=' This enables seamless han- dover control and improve the network reliability and latency performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
162
+ page_content=' Digital twins can alsp enhance the access layer resource allocation, user scheduling, MU-MIMO user pairing, and interference management, among many other applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
163
+ page_content=' Network Layer: In prior work, digital twins have been used to optimize the network layer operations and applications such as device and traffic monitoring, resource allocation, edge computing, and cyber security.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
164
+ page_content=' We refer to this type of digital twins as the network-level digital twins since they typically focus on monitoring network status and modeling the network-level entities, services, and dynamics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
165
+ page_content=' Differently, the envisioned physical-level digital twins can provide fine- grained information about the communication links, which can also be used to improve the accuracy of the radio access network (RAN) modeling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
166
+ page_content=' This accurate RAN modeling can enhance the efficiency and reliability of various network-level operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
167
+ page_content=' Further, the physical-level digital twins can provide real-time and future information about the user position and mobility characteristics, which could be leveraged to improve several edge computing operations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
168
+ page_content=' For instance, when a user is predicted to move out of the service area of the in-use edge server, proactive service migration can be triggered to improve the service quality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
169
+ page_content=' The physical-level digital twins can also work cooperatively and in an integrated manner with the network-level digital twins to enhance the end-user experience.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
170
+ page_content=' Application Layer: New emerging applications, such as au- tonomous driving and AR/VR, pose more stringent reliability and latency requirements to advanced communication systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
171
+ page_content=' The 6G is envisioned to support 9-nine reliability with 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
172
+ page_content='1ms latency for mission and safety-critical applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
173
+ page_content=' Moreover, different applications often have diverse requirements for data throughput, reliability, and latency, thus different strategies when handling link instability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
174
+ page_content=' The digital twin can simulate the physical signal propagation and channels, which can offer fine-grained information on the communication link quality, both in real-time and proactively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
175
+ page_content=' This link quality information provides more flexibility for making efficient application-layer decisions in a way that respects this application diversity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
176
+ page_content=' For example, if a video streaming application knows ahead of time about the communication link disruption and blockage status, this application can pre-load a certain portion of the video, considering the duration of the cut-off, and achieve a seam- less user experience with efficient usage of communication resources.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
177
+ page_content=' While the digital twin provides low-level and fine- grained information about the communication links, how to efficiently utilize this information is still to be investigated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
178
+ page_content=' VI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
179
+ page_content=' DIGITAL TWIN RESEARCH PLATFORM Here, we present a digital twin research platform based on the DeepSense 6G [13] and the DeepVerse 6G [14] datasets that can be used to investigate various digital twin research directions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
180
+ page_content=' Next, we briefly present these digital twin datasets and show how they can be used to investigate an example application of digital twin-assisted beam prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
181
+ page_content=' GPSPosition,Orientation Camera User LiDAR Radar Future BlockageFuture Blockage Prediction Prediction Algorithm InputSequenceEdgeServerEdges Cloud Server Service MigrationServerUE Movement6 Digital Twin Datasets: The digital twins rely on co-existing real-world data and high-fidelity synthetic data generated using accurate 3D maps and ray tracing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
182
+ page_content=' For that, the DeepSense 6G and the DeepVerse 6G datasets are well-suited to facilitate the research, development, and application of digital twins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
183
+ page_content=' The DeepSense 6G is a large-scale multi-modal sensing and com- munication dataset collected in various real-world scenarios;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
184
+ page_content=' the DeepVerse 6G is a synthetic dataset that can simulate high- fidelity multi-modal sensing and communication data from ray tracing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
185
+ page_content=' Combining real-world scenarios and their synthetic replicas from the two datasets, we present a digital twin research platform to investigate its efficacy, limitations, use cases, and applications in real-world systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
186
+ page_content=' Example Application: In [15], the digital twin is used to first infer the channels with real-time 3D maps (containing user positions) and ray tracing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
187
+ page_content=' Then, these channels can be used to infer optimal beams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
188
+ page_content=' However, the high computational complexity of ray tracing may result in high latency, thus limiting real-time applications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
189
+ page_content=' For that, ML models can be employed to approximate the ray tracing simulation with accelerated computation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
190
+ page_content=' Furthermore, ML can be leveraged to learn the mapping function from 3D maps to the optimal beam in an end-to-end manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
191
+ page_content=' This can potentially improve the computational efficiency since the ML has the flexibility to not model the unnecessary ray tracing for a specific com- munication problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
192
+ page_content=' When the ML is trained solely using the digital replica, it is limited by the impairments in the 3D map and ray tracing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
193
+ page_content=' A small amount of real-world data can be utilized to fine-tune the ML models (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
194
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
195
+ page_content=' transfer learning) and to even transcend the digital replica.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
196
+ page_content=' Experimental Results: Scenario 1 of DeepSense is adopted as the real-world scenario, and the digital replica of this scenario is constructed and simulated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
197
+ page_content=' An ML model is first trained on the position and wireless beam data from the digital replica.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
198
+ page_content=' Then it is fine-tuned on the real-world data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
199
+ page_content=' The top-2 beam prediction accuracy is obtained by testing the model on unseen real-world data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
200
+ page_content=' After training on 200 digital replica data points, the ML model can achieve a high top-2 accuracy of 91.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
201
+ page_content='4%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
202
+ page_content=' Note that this digital twin approach does not need any real-world training data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
203
+ page_content=' Moreover, with transfer learning, a small number of real-world data points (less than 20) can quickly improve the ML model to go beyond the digital replica and achieve near-optimal performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
204
+ page_content=' Next, the digital replica impairment is explicitly modeled by adopting a uniform beam steering codebook that is different from the beam codebook of the communication hardware.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
205
+ page_content=' The uniform codebook leads to lower performance when fine-tuned on a very limited amount of real-world data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
206
+ page_content=' However, when more than 20 real-world data points are used for fine-tuning, the performance of the two codebooks becomes very similar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
207
+ page_content=' The mismatches between the real world and the digital replica can be efficiently calibrated by a small amount of real-world data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
208
+ page_content=' VII.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
209
+ page_content=' FUTURE RESEARCH DIRECTIONS Digital twins are envisioned to be an integral component of 6G and beyond wireless communication systems and have recently piqued the interest of both the industry and academia 0 20 40 60 80 100 Number of Real Data Points Used for Training 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
210
+ page_content='3 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
211
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
212
+ page_content='5 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
213
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
214
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
215
+ page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
216
+ page_content='9 Top-2 Accuracy Tested on Real-World Data Trained on real-world data Transfer learining (measured codebook) Transfer learining (unifrom codebook) 0 5 10 15 20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
217
+ page_content='86 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
218
+ page_content='88 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
219
+ page_content='9 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
220
+ page_content='92 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
221
+ page_content='94 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
222
+ page_content='96 Transfer learning Pre-trained on 200 synthetic data points Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
223
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
224
+ page_content=' This figure shows the top-2 accuracy performance by first training the NN on the synthetic data generated by the digital twin and then fine-tuning it on real-world data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
225
+ page_content=' alike.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
226
+ page_content=' However, realizing this vision and exploring the true potential of digital twins requires overcoming the fundamental challenges and thoroughly investigating some of the important aspects.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
227
+ page_content=' Next, we present some open research directions that need to be investigated toward enabling digital twin-aided next-generation wireless communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
228
+ page_content=' Impact of Digital Twin on Communication Tasks: De- ploying digital twin-aided solutions in the real world will re- quire revisiting all the problem statements, such as LOS/NLOS beam prediction, blockage prediction, hand-off, etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
229
+ page_content=', to evalu- ate the efficacy of these solutions accurately.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
230
+ page_content=' In particular, it is necessary to investigate how much gain in performance can be achieved by utilizing the real-time digital twins compared to conventional and sensing-aided approaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
231
+ page_content=' To that end, the recently published DeepVerse 6G synthetic dataset (with multi-modal sensing and communication data generated from 3D models and ray-tracing) was created to mimic the real- world scenarios of the DeepSense 6G dataset, effectively making them a digital twin of each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
232
+ page_content=' These two datasets combined can enable the development and evaluation of digital twin-aided applications in real-world communication systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
233
+ page_content=' Communication-Sensing Trade-Off: In order to gener- ate an accurate real-time digital twin with minimal latency, the sensing data collected across different devices, in some cases, need to be transferred quickly to a central unit for further processing (digital twin levels 2 and 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
234
+ page_content=' The data transfer rate is dependent on the available bandwidth of the communication system itself.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
235
+ page_content=' As the amount of sensing data increases (for example, with the increase in sensing modalities or the number of devices), so does the requirement for com- munication bandwidth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
236
+ page_content=' While access to diverse and detailed sensing information can help generate a more accurate digital twin, which improves the performance of the communication system, transferring that sensing data will consume communi- cation resources, potentially offsetting any gains.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
237
+ page_content=' A promising solution to overcome this challenge is to first process the 7 sensory data locally and extract relevant features, and then transfer the low-dimensional extracted features across devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
238
+ page_content=' Investigating this trade-off and the possible solutions is an interesting open problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
239
+ page_content=' Sensing Fusion and Coordination: As presented in Sec- tion IV, in the third level of the digital twin, devices can communicate and coordinate to make joint sensing and com- munication decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
240
+ page_content=' For instance, multiple devices in the same location will capture similar sensing data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
241
+ page_content=' Most of this data may be redundant, and transferring this data over the limited communication bandwidth for further processing will only increase the computational cost overhead without signif- icantly improving the generated digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
242
+ page_content=' One solution to improve resource utilization can be to sense and transfer the optimum data required to generate a complete and accurate digital twin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
243
+ page_content=' Realizing such a solution will require the devices to communicate with each other and adopt efficient protocols for cooperative sensing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
244
+ page_content=' These challenges highlight the need for further investigation in this direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
245
+ page_content=' Central and Distributed Decision: Generating an accurate and complete real-time digital twin necessitates the sharing and transferring of sensing data across devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
246
+ page_content=' Given access to this digital twin of the real world, the next question is, how will this replica of the real world be utilized to facilitate the sensing and communication decision-making process?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
247
+ page_content=' For instance, a user can make individual decisions in a distributed manner or adopt a centralized way that fosters a collaborative decision-making environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
248
+ page_content=' Both these approaches have their advantages and limitations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
249
+ page_content=' For example, the individual distributed decisions are mostly made on the edge devices, which will minimize any latency involved with data transfer back and forth from the cloud devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
250
+ page_content=' However, they generally require computation-intensive machine learning-based models, which will further increase the overhead in these resource- constrained edge devices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
251
+ page_content=' Developing a robust and efficient solution that can be deployed in the real world requires a detailed investigation of these different possibilities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
252
+ page_content=' VIII.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
253
+ page_content=' CONCLUSION This article presented and discussed a vision for future wireless communication and sensing systems that would lever- age precise 3D maps, distributed multi-modal sensing, effi- cient ray-tracing computations, and advanced machine/deep learning to construct, update, and utilize real-time digital twins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
254
+ page_content=' As computations, communication, and synchronization capabilities evolve over time, we expect devices to gradu- ally coordinate in building and updating global digital twins using their sensing information and potentially make joint sensing and communication decisions for the physical, access, network, and application layers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
255
+ page_content=' The article also presented a research platform, based on the real-world DeepSense 6G dataset and its digital replica, DeepVerse 6G, to investigate various digital twin research directions, and showed how to use this platform for one example application.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
256
+ page_content=' REFERENCES [1] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
257
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
258
+ page_content=' Rappaport, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
259
+ page_content=' Xing, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
260
+ page_content=' Kanhere, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
261
+ page_content=' Ju, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
262
+ page_content=' Madanayake, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
263
+ page_content=' Mandal, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
264
+ page_content=' Alkhateeb, and G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
265
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
266
+ page_content=' Trichopoulos, “Wireless communications and applications above 100 GHz: Opportunities and challenges for 6G and beyond,” IEEE Access, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
267
+ page_content=' 7, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
268
+ page_content=' 78 729–78 757, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
269
+ page_content=' [2] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
270
+ page_content=' Alkhateeb, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
271
+ page_content=' El Ayach, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
272
+ page_content=' Leus, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
273
+ page_content=' Heath, “Channel estimation and hybrid precoding for millimeter wave cellular systems,” IEEE Journal of Selected Topics in Signal Processing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
274
+ page_content=' 8, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
275
+ page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
276
+ page_content=' 831– 846, Oct.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
277
+ page_content=' 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
278
+ page_content=' [3] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
279
+ page_content=' Lu, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
280
+ page_content=' Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
281
+ page_content=' Li, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
282
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
283
+ page_content=' Swindlehurst, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
284
+ page_content=' Ashikhmin, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
285
+ page_content=' Zhang, “An overview of massive MIMO: Benefits and challenges,” IEEE journal of selected topics in signal processing, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
286
+ page_content=' 8, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
287
+ page_content=' 5, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
288
+ page_content=' 742–758, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
289
+ page_content=' [4] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
290
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
291
+ page_content=' Andrews, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
292
+ page_content=' Bai, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
293
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
294
+ page_content=' Kulkarni, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
295
+ page_content=' Alkhateeb, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
296
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
297
+ page_content=' Gupta, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
298
+ page_content=' W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
299
+ page_content=' Heath, “Modeling and analyzing millimeter wave cellular systems,” IEEE Transactions on Communications, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
300
+ page_content=' 65, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
301
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
302
+ page_content=' 403–430, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
303
+ page_content=' [5] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
304
+ page_content=' Wu, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
305
+ page_content=' Zhang, and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
306
+ page_content=' Zhang, “Digital twin networks: A survey,” IEEE Internet of Things Journal, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
307
+ page_content=' 8, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
308
+ page_content=' 18, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
309
+ page_content=' 13 789–13 804, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
310
+ page_content=' [6] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
311
+ page_content=' U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
312
+ page_content=' Khan, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
313
+ page_content=' Saad, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
314
+ page_content=' Niyato, Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
315
+ page_content=' Han, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
316
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
317
+ page_content=' Hong, “Digital-twin- enabled 6g: Vision, architectural trends, and future directions,” IEEE Communications Magazine, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
318
+ page_content=' 60, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
319
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
320
+ page_content=' 74–80, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
321
+ page_content=' [7] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
322
+ page_content=' X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
323
+ page_content=' Nguyen, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
324
+ page_content=' Trestian, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
325
+ page_content=' To, and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
326
+ page_content=' Tatipamula, “Digital twin for 5g and beyond,” IEEE Communications Magazine, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
327
+ page_content=' 59, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
328
+ page_content=' 2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
329
+ page_content=' 10–15, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
330
+ page_content=' [8] “NVIDIA Omniverse Platform.” [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
331
+ page_content=' Available: https://developer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
332
+ page_content=' nvidia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
333
+ page_content='com/nvidia-omniverse-platform [9] Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
334
+ page_content=' Liu, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
335
+ page_content=' Xiao, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
336
+ page_content=' Liu, and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
337
+ page_content=' Wei, “Multi-sensor measurement and data fusion,” IEEE Instrumentation & Measurement Magazine, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
338
+ page_content=' 25, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
339
+ page_content=' 1, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
340
+ page_content=' 28–36, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
341
+ page_content=' [10] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
342
+ page_content=' Blasch, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
343
+ page_content=' Pham, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
344
+ page_content='-Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
345
+ page_content=' Chong, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
346
+ page_content=' Koch, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
347
+ page_content=' Leung, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
348
+ page_content=' Braines, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
349
+ page_content=' Abdelzaher, “Machine learning/artificial intelligence for sensor data fusion–opportunities and challenges,” IEEE Aerospace and Electronic Systems Magazine, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
350
+ page_content=' 36, no.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
351
+ page_content=' 7, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
352
+ page_content=' 80–93, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
353
+ page_content=' [11] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
354
+ page_content=' Jiang and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
355
+ page_content=' Alkhateeb, “Sensing Aided OTFS Channel Estimation for Massive MIMO Systems,” arXiv preprint arXiv:2209.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
356
+ page_content='11321, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
357
+ page_content=' [12] U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
358
+ page_content=' Demirhan and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
359
+ page_content=' Alkhateeb, “Integrated sensing and communication for 6G: Ten key machine learning roles,” IEEE Communications Magazine, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
360
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
361
+ page_content=' Available: https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
362
+ page_content='org/abs/2208.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
363
+ page_content='02157 [13] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
364
+ page_content=' Alkhateeb, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
365
+ page_content=' Charan, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
366
+ page_content=' Osman, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
367
+ page_content=' Hredzak, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
368
+ page_content=' Morais, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
369
+ page_content=' Demirhan, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
370
+ page_content=' Srinivas, “Deepsense 6G: A large-scale real-world multi-modal sensing and communication dataset,” 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
371
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
372
+ page_content=' Available: https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
373
+ page_content='org/abs/2211.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
374
+ page_content='09769 [14] U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
375
+ page_content=' Demirhan, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
376
+ page_content=' Taha, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
377
+ page_content=' Alkhateeb, “Deepverse 6G: A framework for synthetic multi-modal sensing and communication datasets,” arXiv preprint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
378
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
379
+ page_content=' Available: https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
380
+ page_content='DeepVerse6G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
381
+ page_content='net [15] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
382
+ page_content=' Jiang and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
383
+ page_content=' Alkhateeb, “Digital twin based beam prediction: Can we train in the digital world and deploy in reality?”' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
384
+ page_content=' arXiv preprint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
385
+ page_content=' [Online].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
386
+ page_content=' Available: https://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
387
+ page_content='org/abs/2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
388
+ page_content='07682' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/U9FIT4oBgHgl3EQfgSvJ/content/2301.11283v1.pdf'}
VtE5T4oBgHgl3EQfcA97/content/tmp_files/2301.05600v1.pdf.txt ADDED
@@ -0,0 +1,1863 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Data assimilation finite element method for the linearized
2
+ Navier-Stokes equations with higher order polynomial
3
+ approximation
4
+ Erik Burman∗ and Deepika Garg† and Janosch Preuss‡
5
+ January 16, 2023
6
+ Abstract
7
+ In this article, we design and analyze an arbitrary-order stabilized finite element
8
+ method to approximate the unique continuation problem for laminar steady flow de-
9
+ scribed by the linearized incompressible Navier–Stokes equation. We derive quantitative
10
+ local error estimates for the velocity, which account for noise level and polynomial degree,
11
+ using the stability of the continuous problem in the form of a conditional stability esti-
12
+ mate. Numerical examples illustrate the performances of the method with respect to the
13
+ polynomial order and perturbations in the data. We observe that the higher order poly-
14
+ nomials may be efficient for ill-posed problems, but are also more sensitive for problems
15
+ with poor stability due to the ill-conditioning of the system.
16
+ Key words: linearized Navier–Stokes’ equations, data assimilation, stabilized finite element
17
+ methods, error estimates
18
+ 1
19
+ Introduction
20
+ The question of how to assimilate measured data into large-scale computations of flow problems
21
+ is receiving increasing attention from the computational mathematics community [27, 22, 7, 35,
22
+ 26, 3]. There are several different situations where such data assimilation problems as can be
23
+ seen in the above examples. One situation is when the data necessary to make the flow problem
24
+ well-posed is lacking, for instance, when the data on the boundary of the the domain is unknown;
25
+ instead, measurements are available in some subset of the bulk domain or boundary to make up
26
+ for this shortfall. In such a case, the problem is typically ill-posed, and numerical simulations
27
+ are significantly more challenging to perform than when handling well-posed flow problems. Ill-
28
+ posed problems usually come up in inverse problems and data assimilation. Traditionally, these
29
+ ∗Department
30
+ of
31
+ Mathematics,
32
+ University
33
+ College
34
+ London,
35
+ London,
36
+ UK–WC1E
37
+ 6BT,
38
+ UK.;
39
40
+ †Department
41
+ of
42
+ Mathematics,
43
+ University
44
+ College
45
+ London,
46
+ London,
47
+ UK–WC1E
48
+ 6BT,
49
+ UK.;
50
51
+ ‡Department
52
+ of
53
+ Mathematics,
54
+ University
55
+ College
56
+ London,
57
+ London,
58
+ UK–WC1E
59
+ 6BT,
60
+ UK.;
61
62
+ 1
63
+ arXiv:2301.05600v1 [math.NA] 13 Jan 2023
64
+
65
+ ill-posed problems have been solved by regularizing at the continuous level, using e.g. Tikhonov
66
+ regularization [37] or quasi-reversibility [33]. The regularized problem is well-posed and may
67
+ be discretized using any appropriate numerical technique. Then, the regularization parameter
68
+ must be tuned to the optimal value for the noise in the data. There is considerable literature
69
+ of research on Tikhonov regularization and inverse problems, and we suggest the reader to [31]
70
+ and its references for an overview of computational approaches employing this strategy. The
71
+ quasi-reversibility methods relevant to the current study may be found in [10, 11, 21, 12].
72
+ The goal of the current contribution is to develop a finite element approach directly ap-
73
+ plied to the ill-posed variational data assimilation form. Regularization is then introduced at
74
+ the discrete level utilizing stabilized finite element methods that allow for a comprehensive
75
+ analysis employing conditional stability estimates. The idea is presented in [14] for standard
76
+ H1-conforming finite element methods. Ill-posed problems are analyzed in [15], and in [17],
77
+ the technique is extended to nonconforming approximations. In both cases, low-order approxi-
78
+ mation spaces are considered. The error analysis requires the availability of sharp conditional
79
+ stability estimates for the continuous problem. The estimates are conditional in the sense that a
80
+ particular a priori bound must be assumed to hold for the solution, and the continuity provided
81
+ in this bound is often merely H¨older [32]. In the literature, these estimates are referred to as
82
+ quantitative uniqueness results and employ theoretical methods such as Carleman estimates
83
+ or three-ball estimates [1, 30]. Error bounds derived using conditional stability estimates can
84
+ be optimal because they reflect the approximation order of the finite element space and the
85
+ stability of the ill-posed problem. In particular, when applied to a well-posed problem, the
86
+ finite element method recovers optimal convergence.
87
+ The ill-posed problem that we consider here is the unique continuation problem. The unique
88
+ continuation problem for the Stokes equations was initially studied in [25]. The analysis of the
89
+ stability properties of ill-posed problems based on the Navier–Stokes equations is a very active
90
+ field of research, and we refer to the works [4, 5, 6, 9, 28, 29, 34] for recent results.
91
+ This study aims to determine whether using high-order methods in the primal-dual stabilized
92
+ Galerkin methods is as helpful in the ill-posed case as in the well-posed situation. Inspired by
93
+ the approach proposed in [8] for the lowest-order finite element discretization of the unique
94
+ continuation problem subject to the Navier-Stokes equations, here we generalize the method to
95
+ arbitrary polynomial orders and investigate the benefits of using higher-order polynomials in
96
+ numerical experiments.
97
+ The rest of the paper is organized as follows. In section 2, we introduce the considered
98
+ inverse problem and some related stability estimates. In section 3, we describe the proposed
99
+ stabilized finite element approximation of the data assimilation problem and state the local error
100
+ estimate. The numerical analysis of the method is carried out in section 4. Finally, section
101
+ 5 presents a series of numerical examples which illustrate the performance of the proposed
102
+ method.
103
+ 2
104
+ The linearized Navier–Stokes problem
105
+ Let Ω be an open polygonal (polyhedral) domain in Rd, d = 2, 3. Let (U, P) be the solution of
106
+ the stationary incompressible Navier–Stokes equations and consider some perturbation (u, p)
107
+ of this base flow. If the quadratic term is ignored, the linearized Navier–Stokes equations for
108
+ 2
109
+
110
+ (u, p) can be written
111
+ L(u, p) = f;
112
+ in Ω,
113
+ (1)
114
+ ∇ · u = 0
115
+ in Ω,
116
+ (2)
117
+ where
118
+ L(u, p) = (U · ∇)u + (u · ∇)U − ν∆u + ∇p.
119
+ Here, ν is a diffusion coefficient. We assume that U belongs to [W 1,∞(Ω)]d and that (u, p)
120
+ satisfies the regularity
121
+ (u, p) ∈ [H2(Ω)]d × H1(Ω).
122
+ For this problem, we assume that measurements on u are available in some subdomain
123
+ ωM ⊂ Ω having a nonempty interior and our purpose is to reconstruct a fluid flow perturbation
124
+ of u for system (1)–(2) based on the measurements of velocity.
125
+ Now, we will present some useful notations. Consider the following spaces:
126
+ V := [H1(Ω)]d, V0 := [H1
127
+ 0(Ω)]d, L0 := L2
128
+ 0(Ω), and L := L2(Ω)
129
+ where L2
130
+ 0(Ω) = {p ∈ L2(Ω) :
131
+
132
+ Ω p = 0}. We also define the norms, for k = 1 or d,
133
+ ∥·∥L := ∥·∥[L2(Ω)]k , ∥·∥V := ∥·∥[H1(Ω)]k , ∥·∥V ′
134
+ 0 := ∥·∥[H−1(Ω)]k .
135
+ Observe that in the definitions, we employ the same notation for k = 1 and k = d. For any
136
+ subdomain X ⊂ Ω, we set
137
+ |v|X :=
138
+ ��
139
+ X
140
+ |v|2
141
+ � 1
142
+ 2
143
+ , ∀ v ∈ [L2(X)]d.
144
+ Next, define the bilinear forms as: for all (u, v) ∈ V × V
145
+ a(u, v) :=
146
+
147
+
148
+ ((U · ∇)u + (u · ∇)U) · v + ν
149
+
150
+
151
+ ∇u : ∇v,
152
+ (3)
153
+ where H : G := �d
154
+ i,j=1 Hi,jGi,j and, for all (p, v) ∈ L × V
155
+ b(p, v) : =
156
+
157
+
158
+ p∇ · v,
159
+ (4)
160
+ l(v) : =
161
+
162
+
163
+ f · v.
164
+ (5)
165
+ The weak form of the inverse problem can be expressed as: f ∈ V
166
+
167
+ 0, u|ωM being given, find
168
+ (u, p) ∈ V × L0 such that
169
+ u = q in ωM
170
+ (6)
171
+ and
172
+ a(u, v) − b(p, v) + b(r, u) = ⟨f, v⟩V ′
173
+ 0 ,V0,
174
+ ∀ (v, r) ∈ V0 × L.
175
+ (7)
176
+ 3
177
+
178
+ Here, q ∈ [H1(ωM)]d corresponds to the exact fluid velocity on ωM, i.e. q is a solution to the
179
+ linearized Navier-Stokes’ equations in ωM and has an extension u to all of Ω. Below in the
180
+ finite element method we will assume that we do not have access to q, but only some measured
181
+ velocities uM = q + δu. So uM corresponds to the exact velocity polluted by a small noise
182
+ δu ∈ [L2(ωM)]d.
183
+ Consider the linearized Navier–Stokes problem with a non-zero velocity divergence
184
+ L(u, p) = f;
185
+ in Ω,
186
+ (8)
187
+ ∇ · u = g
188
+ in Ω.
189
+ (9)
190
+ We assume that if the boundary conditions of system (8)–(9) are homogeneous Dirichlet bound-
191
+ ary conditions, then it is well-posed. More precisely, we make the following assumption:
192
+ Assumption A. For all f ∈ V ′
193
+ 0 and g ∈ L0 we assume that system (8)–(9) admits a unique
194
+ weak solution (u, p) ∈ V0 × L0 and that there exists a constant CS > 0 depending only on U, ν
195
+ and Ω such that
196
+ ∥u∥V + ∥p∥L ≤ CS(∥f∥V ′
197
+ 0 + ∥g∥L).
198
+ (10)
199
+ Furthermore, if ∥∇U∥[L∞(Ω)]d×d is small enough, then the Lax–Milgram lemma implies that
200
+ Assumption A holds. The assumption of smallness on ∇U is a sufficient condition, there are
201
+ reasons to believe that Assumption A holds in more general cases.
202
+ In the homogeneous case (which corresponds to f = 0 in (1)–(2) or to f = 0 and g = 0 in
203
+ (8)–(9)), a solution (u, p) satisfies a three-balls inequality which only involves the L2 norm of the
204
+ velocity. This three-balls inequality result is stated in [34] (with their notations, A corresponds
205
+ to U and B to ∇U).
206
+ Theorem 2.1. (Conditional stability for the linearized Navier–Stokes problem). Let f ∈ V ′
207
+ 0,
208
+ ωM ⊂ Ω and g ∈ L be given. For all B ⊂⊂ Ω, there exist C > 0 and 0 < τ < 1 such that
209
+ |u|B ≤ C(∥f∥V ′
210
+ 0 + ∥g∥L + ∥u∥L)1−τ(∥f∥V ′
211
+ 0 + ∥g∥L + |u|ωM)τ,
212
+ (11)
213
+ for all (u, p) ∈ [H1(Ω)]d × H1(Ω) solution of (8)–(9).
214
+ Proof. For the proof we refer the reader to [8, Appendix A].
215
+ Theorem 2.1 provides a conditional stability result for ill-posed problems [1] in the sense that,
216
+ for this estimate to be helpful, it must be accompanied by an a priori bound on the solution on
217
+ the global domain (due to the presence of ∥u∥L on the right-hand side). Specifically, Theorem
218
+ 2.1 implies that a solution (u, p) in [H1(Ω)]d × H1(Ω) of problem (6) and (7), must be unique.
219
+ For the pressure uniqueness holds up to a constant. Moreover, in inequality (11), the exponent
220
+ τ depends on the dimension d, the size of the measure domain ωM and the distance between
221
+ the target domain B and the boundary of the computational domain Ω.
222
+ Moreover, let f ∈ [L2(Ω)]d and we introduce the operator A defined on (V × L0) × (V0 × L)
223
+ by
224
+ A((u, p), (v, r)) := a(u, v) − b(p, v) + b(r, u)
225
+ (12)
226
+ where a and b are respectively defined by (3) and (4). Thus, we look for (u, p) ∈ V × L0 such
227
+ that
228
+ A((u, p), (v, r)) = l(v) ∀(v, r) ∈ V0 × L
229
+ (13)
230
+ and (6) holds.
231
+ 4
232
+
233
+ 3
234
+ Stabilized finite element approximation
235
+ In this section, we first introduce a discretization of problem (13) using a standard finite ele-
236
+ ment method. Then, the discrete inverse problem is reformulated as a constrained minimization
237
+ problem in the discrete space where the regularization of the cost functional is achieved through
238
+ stabilization terms. Finally, the estimation of the error between the exact continuous solution
239
+ and the discrete solution of our minimization problem is stated in Theorem 4.2 which corre-
240
+ sponds to our main theoretical result.
241
+ Let {Th}h be a family of affine, simplicial meshes of Ω. For simplicity, the family {Th}h
242
+ is supposed to be quasi-uniform. Mesh faces are collected in the set Fh which is split into
243
+ the set of interior faces, Fint
244
+ h , and of boundary faces, Fext
245
+ h
246
+ . For a smooth enough function v
247
+ that is possibly double-valued at F ∈ Fint
248
+ h
249
+ with F = ∂T − ∩ ∂T +, we define its jump at F as
250
+ [v] =: vT − − vT +, and we fix the unit normal vector to F, denoted by νF, as pointing from T −
251
+ to T +. The arbitrariness in the sign of [v] is irrelevant in what follows.
252
+ We next define a piecewise polynomial space as
253
+ Pk(Th) :=
254
+
255
+ v ∈ L2(Ω) : v|T ∈ Pk(T)
256
+ ∀T ∈ Th
257
+
258
+ ,
259
+ where Pk(T), k ≥ 0, is the space of polynomials of degree at most k over the element T. Further,
260
+ define a conforming finite element space as
261
+ P c
262
+ k(Th) :=
263
+
264
+ v ∈ H1(Ω) : v|T ∈ Pk(T) ∀ T ∈ Th
265
+
266
+ .
267
+ Let V k
268
+ h := [P c
269
+ k(Th)]d, Wh := V0 ∩ V k1
270
+ h , Q0
271
+ h := L2
272
+ 0(Ω) ∩ P c
273
+ k2(Th) and Qh := P c
274
+ k3(Th). For the
275
+ analysis below the polynomial degrees of the above spaces may be chosen as k ≥ 1, k1 ≥ 1,
276
+ k2 ∈ {max{1, k − 1}, k} and k3 ≥ 1 and the convergence order will be given in terms of k.
277
+ To make the notation more compact we introduce the composite spaces Vh := V k
278
+ h × Q0
279
+ h and
280
+ Wh := Wh×Qh. We may then write the finite element approximation of (13): Find (uh, ph) ∈ Vh
281
+ such that
282
+ A((uh, ph), (vh, qh)) = l(vh),
283
+ (14)
284
+ for all (vh, qh) ∈ Wh.
285
+ Let us introduce the measurement bilinear form to take into account the measurements on
286
+ ωM given by (6).
287
+ m(u, u) := |u|2
288
+ ωM = γMξ−1
289
+
290
+ ωM
291
+ u2,
292
+ (15)
293
+ where ξ = max(ν, ∥U∥[L∞(Ω)]d×d h) and γM > 0 will correspond to a free parameter representing
294
+ the relative confidence in the measurements. The objective is then to minimize the functional
295
+ 1
296
+ 2m(uM − uh, uM − uh)
297
+ (16)
298
+ under the constraint that (uh, ph) satisfies (14).
299
+ We now introduce the following discrete Lagrangian for ((uh, ph), (zh, yh)) ∈ Vh × Wh,
300
+ Lh((uh, ph), (zh, yh)) := 1
301
+ 2m(uh − uM, uh − uM) + A((uh, ph), (zh, yh)) − l(zh).
302
+ (17)
303
+ 5
304
+
305
+ If we differentiate with respect to (uh, ph) and (zh, yh), we get the following optimality system:
306
+ Find (uh, ph) ∈ Vh and (zh, yh) ∈ Wh such that
307
+ A((uh, ph), (wh, xh)) = l(wh),
308
+ (18)
309
+ A((vh, qh), (zh, yh)) + m(uh, vh) = m(uM, vh),
310
+ (19)
311
+ for all (vh, qh) ∈ Vh and (wh, xh) ∈ Wh.
312
+ However, the discrete Lagrangian associated to
313
+ this problem leads to an optimality system which is ill-posed. To regularize it, we introduce
314
+ stabilization operators that will convexify the problem with respect to the direct variables uh, ph
315
+ and the adjoint variables zh, yh. We introduce Su : Vh × Vh → R, S∗
316
+ u : Wh × Wh → R, Sp :
317
+ Q0
318
+ h × Q0
319
+ h → R and S∗
320
+ p : Qh × Qh → R. The choice of stabilization terms will be discussed later.
321
+ For compactness, we introduce the primal and dual stabilizers: for all (uh, ph), (vh, qh) ∈ Vh
322
+ Sh((uh, ph), (vh, qh)) = Sg((uh, ph), (vh, qh)) + ˜Sh((uh, ph), (vh, qh)),
323
+ Sg((uh, ph), (vh, qh)) = γGLS
324
+
325
+ T∈Th
326
+
327
+ T
328
+ h2
329
+ Tξ−1
330
+ T L(uh, ph)L(vh, qh) dx,
331
+ (20)
332
+ ˜Sh((uh, ph), (vh, qh)) = α(h2k∇uh, ∇vh) + γu
333
+
334
+ F∈Fint
335
+ h
336
+
337
+ F
338
+ hFξF[∇uh · n][∇vh · n] ds
339
+ + γdiv
340
+
341
+
342
+ ξT(∇ · uh)(∇ · vh) dx,
343
+ (21)
344
+ where ξT = max(ν, ∥U∥[L∞(Ω)]d×d hT), ξF = max(ν, ∥U∥[L∞(Ω)]d×d hF) and γGLS, α, γu, and γdiv
345
+ are positive user-defined parameters. And for all (zh, yh), (wh, xh) ∈ Wh
346
+ S∗
347
+ h((zh, yh), (wh, xh)) = S∗
348
+ u(zh, wh) + S∗
349
+ p(yh, xh),
350
+ S∗
351
+ u(zh, wh) = γ∗
352
+ u
353
+
354
+
355
+ ∇zh : ∇wh dx,
356
+ (22)
357
+ S∗
358
+ p(yh, xh) = γ∗
359
+ p
360
+
361
+
362
+ yhxh dx,
363
+ (23)
364
+ where γ∗
365
+ u and γ∗
366
+ p are positive user-defined parameters. Let us make some comments on these
367
+ stabilization terms. The stabilization of the direct velocity acts on fluctuations of the discrete
368
+ solution through a penalty on the jump of the solution gradient over element faces and has no
369
+ equivalent on the continuous level. The form Sg(·, ·) is a Galerkin least squares stabilization. Let
370
+ us mention that there is some freedom in the choice of dual stabilization, e.g. set S∗
371
+ p(yh, xh) =
372
+ γ∗
373
+ p
374
+
375
+ Ω ∇yh∇xh dx. We will only detail the analysis for the first choice (23) below. We refer the
376
+ reader to [14, 16] for a more general discussion of the possible stabilization operators.
377
+ We may then write the discrete Lagrangian Lh : Vh × Wh → R, for all (uh, ph) ∈ Vh and
378
+ (zh, yh) ∈ Wh.
379
+ Lh((uh, ph), (zh, yh)) := 1
380
+ 2m(uh − uM, uh − uM) + A((uh, ph), (zh, yh)) − l(zh)
381
+ +1
382
+ 2Sg((uh − u, ph − p), (vh, qh)) + ˜Sh((uh, ph), (vh, qh)) − 1
383
+ 2S∗
384
+ h((zh, yh), (zh, yh))
385
+ (24)
386
+ 6
387
+
388
+ If we differentiate with respect to (uh, ph) and (zh, yh), we get the following optimality system:
389
+ Find (uh, ph) ∈ Vh and (zh, yh) ∈ Wh such that
390
+ A((uh, ph), (wh, xh)) − S∗
391
+ h((zh, yh), (wh, xh)) = l(wh),
392
+ (25)
393
+ A((vh, qh), (zh, yh)) + Sh((uh, ph), (vh, qh)) + m(uh, vh) = m(uM, vh)
394
+ + γGLS
395
+
396
+ T∈Th
397
+
398
+ T
399
+ fh2
400
+ Tξ−1
401
+ T L(vh, qh) dx,
402
+ (26)
403
+ for all (vh, qh) ∈ Vh and (wh, xh) ∈ Wh.
404
+ 4
405
+ Stability and Error Analysis
406
+ To prove the stability of our formulations, we need the following result.
407
+ Lemma 4.1. There exists Cp such that for all vh ∈ Vh there holds
408
+ ∥vh∥H1(Ω) ≤ Cp(∥vh∥ωM + ∥∇vh∥L).
409
+ (27)
410
+ Proof. The following Poincar´e inequality is well known [24, lemma B.63]. If f : H1(Ω) → R is
411
+ a linear functional that is non-zero for constant functions then
412
+ ∥v∥H1(Ω) ≤ Cp(|f(v)| + ∥∇v∥L),
413
+ ∀v ∈ H1(Ω).
414
+ For instance, we may take
415
+ f(v) =
416
+
417
+ ωM
418
+ v dx ≤ C|v|ωM.
419
+ As an immediate consequence we have the bound (27).
420
+ Let us prove that the discrete problem is well-posed. We can write the discrete formulation
421
+ in a more compact form. Let (uh, ph) = Uh, (zh, yh) = Zh, (vh, qh) = Xh and (wh, xh) = Yh.
422
+ G((Uh, Zh), (Xh, Yh)) = Ah(Uh, Yh) − S∗
423
+ h(Zh, Yh) + Ah(Xh, Zh) + Sh(Uh, Xh) + γM(uh, vh)ωM.
424
+ (28)
425
+ We define the norm on ([H2(Ω)]d + Vh) × (H1(Ω) + Qh)
426
+ |||(Uh, Zh)|||2 := Sh(Uh, Uh) + γM|uh|2
427
+ ωM + S∗
428
+ h(Zh, Zh).
429
+ (29)
430
+ |||(Uh, Zh)||| defines a norm, since γM > 0, α > 0 and thanks to the Poincar´e inequality (27).
431
+ The following result demonstrates the stability of the system (25)–(26).
432
+ Theorem 4.1. The discrete bilinear form (28) satisfies the following inf-sup condition for some
433
+ positive constant γ, independent of h:
434
+ inf
435
+ (Uh,Zh)∈Vh×Wh
436
+ sup
437
+ (Xh,Yh)∈Vh×Wh
438
+ G((Uh, Zh), (Xh, Yh))
439
+ |||(Uh, Zh)||| |||(Xh, Yh)||| ≥ γ.
440
+ 7
441
+
442
+ Proof. In order to prove the stability result, it is enough to choose some (Xh, Yh) ∈ Vh×Wh
443
+ for any arbitrary (Uh, Zh) ∈ Vh × Wh, such that
444
+ G((Uh, Zh), (Xh, Yh))
445
+ |||(Xh, Yh)|||
446
+ ≥ γ |||(Uh, Zh)||| > 0.
447
+ First, consider the bilinear form in (28) with (Xh, Yh) = (Uh, −Zh):
448
+ G((Uh, Zh), (Uh, −Zh)) = S∗
449
+ h(Zh, Zh) + Sh(Uh, Uh) + γM(uh, uh)ωM
450
+ = S∗
451
+ h(Zh, Zh) + Sh(Uh, Uh) + γM|uh|2
452
+ ωM.
453
+ G((Uh, Zh), (Uh, −Zh)) ≥ |||(Uh, Zh)|||2 .
454
+ (30)
455
+ and
456
+ |||(Uh, −Zh)||| ≤ |||(Uh, Zh)||| .
457
+ (31)
458
+ Finally, by dividing (30) by (31), we get the result.
459
+ According to the Babuˇska–Neˇcas–Brezzi theorem (see [24]), the square linear system defined
460
+ by (25)–(26) admits a unique solution for all h > 0.
461
+ 4.1
462
+ Error Analysis
463
+ Now recall the following technical results of finite element analysis.
464
+ Lemma 4.2. Trace inequality [23]: Suppose F denotes an edge of T ∈ Th. For vh ∈ Pk(Th),
465
+ there holds
466
+ ∥vh∥L2(F) ≤ Ch−1/2
467
+ T
468
+ ∥vh∥L2(T).
469
+ (32)
470
+ Lemma 4.3. Inverse inequality [23]: Let v ∈ Pk(Th), for all k ≥ 0. Then,
471
+ ∥∇v∥L2(T) ≤ Ch−1
472
+ T ∥v∥L2(T) .
473
+ (33)
474
+ Lemma 4.4. Let Ih : L2(Ω) → P c
475
+ k(Th) be the Cl´ement interpolation. The following approxima-
476
+ tion estimates hold for the interpolation operator Ih, see [24],
477
+ ∥Ihv∥L ≤ C ∥v∥L , ∀v ∈ L
478
+ ∥∇Ihv∥L ≤ C ∥∇v∥L , ∀v ∈ H1(Ω),
479
+ (34)
480
+ ∥(v − Ihv)∥L + h ∥∇(v − Ihv)∥L ≤ Cht ∥v∥Ht(Ω) , for all v ∈ Ht(Ω), 1 ≤ t ≤ k + 1,
481
+ (35)
482
+ � �
483
+ T∈Th
484
+ ∥∆(v − Ihv)∥2
485
+ L2(T)
486
+ �1/2
487
+ ≤ Cht−2 ∥v∥Ht(Ω) , for all v ∈ Ht(Ω), 2 ≤ t ≤ k + 1,
488
+ (36)
489
+
490
+ � �
491
+ F∈Fint
492
+ h
493
+ ∥v − Ihv∥2
494
+ L2(F)
495
+
496
+
497
+ 1/2
498
+ ≤ Cht−1/2 ∥v∥Ht(Ω) , for all v ∈ Ht(Ω), t ≤ k + 1,
499
+ (37)
500
+
501
+ � �
502
+ F∈Fint
503
+ h
504
+ ∥∇(v − Ihv)∥2
505
+ L2(F)
506
+
507
+
508
+ 1/2
509
+ ≤ Cht−3/2 ∥v∥Ht(Ω) , for all 1 ≤ v ∈ Ht(Ω), 2 ≤ t ≤ k + 1.
510
+ (38)
511
+ The same bound holds for interpolation of vector-valued functions, Ih : [L2(Ω)]d → V k
512
+ h and for
513
+ interpolation on Wh where homogeneous boundary conditions are imposed.
514
+ 8
515
+
516
+ Using the above bounds to the componentwise extension of Ih to vectorial functions, we
517
+ deduce the following approximation bound.
518
+ Corollary 4.1. It holds for (u, p) ∈ [Hk+1(Ω)]d × Hk(Ω),
519
+ � �
520
+ T∈Th
521
+ ∥L(Ihu − u, Ihp − p)∥2
522
+ L2(T)
523
+ � 1
524
+ 2
525
+ ≤ Chk−1 �
526
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
527
+
528
+ .
529
+ In this section, we will present and prove several technical results.
530
+ First observe that
531
+ the formulation (25)–(26) is weakly consistent in the sense that we have a modified Galerkin
532
+ orthogonality relation with respect to the scalar product associated to A:
533
+ Lemma 4.5. (Consistency). Let (u, p) satisfy (1) and (uh, ph) be a solution of (25)–(26). Then
534
+ there holds
535
+ A((u − uh, p − ph), (wh, xh)) = −S∗
536
+ h((zh, yh), (wh, xh)),
537
+ ∀(wh, xh) ∈ Wh.
538
+ (39)
539
+ Proof. The result follows by taking the difference between (13) and (25).
540
+ Lemma 4.6. Let (u, p) ∈ [Hk+1(Ω)]d × L2
541
+ 0
542
+ � Hk(Ω). Then,
543
+ |||(u − Ihu, p − Ihp)||| ≤ Chk �
544
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
545
+
546
+ .
547
+ (40)
548
+ Proof. The approximation bounds can be deduced using the component-wise extension of
549
+ Ih to vector functions.
550
+ Lemma 4.7. (Continuity). Let (u, p) ∈ [Hk+1(Ω)]d × L2
551
+ 0
552
+ � Hk(Ω). Then,
553
+ A((u − Ihu, p − Ihp), (zh, yh)) ≤ Chk �
554
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
555
+
556
+ S∗
557
+ h((zh, yh), (zh, yh))
558
+ 1
559
+ 2,
560
+ (41)
561
+ for all (zh, yh) ∈ Wh.
562
+ Proof. Let us derive the estimate (41). Using the definition of A(·, ·) :
563
+ A((Ihu − u, Ihp − p), (zh, yh)) = a(Ihu − u, zh) − b(Ihp − p, zh) + b(yh, Ihu − u).
564
+ (42)
565
+ Consider the first term on the right hand side of (42). Using the Cauchy–Schwarz inequality
566
+ and Poincar´e inequality,
567
+ a(Ihu − u, zh) ≤ C ∥U∥[W 1,∞]d (∥u − Ihu∥L + ∥∇(u − Ihu)∥L)(∥zh∥L + ∥∇zh∥L)
568
+ ≤ C ∥U∥[W 1,∞]d hk ∥u∥[Hk+1(Ω)]d S∗
569
+ h((zh, 0), (zh, 0))
570
+ 1
571
+ 2.
572
+ The second term of (42) can be handled as:
573
+ b(Ihp − p, zh) ≤ ∥p − Ihp∥L ∥∇ · zh∥L
574
+ ≤ Chk ∥p∥Hk(Ω) S∗
575
+ h((zh, 0), (zh, 0))
576
+ 1
577
+ 2.
578
+ The last term of (42) can be handled as:
579
+ b(yh, Ihu − u) ≤ ∥∇ · (u − Ihu)∥L ∥yh∥L
580
+ ≤ Chk ∥u∥k+1 S∗
581
+ h((0, yh), (0, yh))
582
+ 1
583
+ 2.
584
+ Finally, the result follows by combining all the above estimates.
585
+ 9
586
+
587
+ Lemma 4.8. We assume that the solution (u, p) ∈ [Hk+1(Ω)]d × L2
588
+ 0 ∩ Hk(Ω) and we consider
589
+ (uh, ph) ∈ Vh and (zh, qh) ∈ Wh the discrete solution of (25)–(26). Then there holds,
590
+ |||(u − uh, p − ph), (zh, qh)||| ≤ C
591
+
592
+ hk(∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)) + γ
593
+ 1
594
+ 2m|δu|ωM
595
+
596
+ .
597
+ (43)
598
+ Proof. We introduce the discrete errors ζh = Ihu − uh, ηh = Ihp − ph. By this way,
599
+ |||(u − uh, p − ph), (zh, qh)||| ≤ |||(u − Ihu, p − Ihp), (0, 0)||| + |||(ζh, ηh), (zh, qh)||| .
600
+ (44)
601
+ The first term of (44) can be handled by using the Lemma 4.6. Consider the second term of
602
+ (44)
603
+ |||(ζh, ηh), (zh, qh)|||2 = S∗
604
+ h((zh, qh), (zh, qh)) + Sh((ζh, ηh), (ζh, ηh)) + γM|ζh|2
605
+ ωM.
606
+ To estimate the right-hand side, we notice that, using the second equation of (26) with (vh, qh) =
607
+ (ζh, ηh)
608
+ Sh((ζh,ηh), (ζh, ηh)) + γM|ζh|2
609
+ ωM − A((ζh, ηh), (zh, qh))
610
+ = Sh(Ihu, Ihp), (ζh, ηh)) + m(Ihu − u, ζh) − m(δu, ζh) − γGLS
611
+
612
+ T∈Th
613
+
614
+ T
615
+ fh2
616
+ Tξ−1
617
+ T L(ζh, ηh) dx.
618
+ (45)
619
+ Using Lemma 4.5, we obtained
620
+ A((u − Ihu, p − Ihp), (zh, qh)) + A((ζh, ηh), (zh, qh)) = −S∗
621
+ h((zh, qh), (zh, qh)).
622
+ (46)
623
+ Adding (45) and (46),
624
+ S∗
625
+ h((zh, qh), (zh, qh)) + Sh((ζh, ηh), (ζh, ηh)) + γM|ζh|2
626
+ ωM
627
+ = A((Ihu − u, Ihp − p), (zh, yh))
628
+
629
+ ��
630
+
631
+ + Sh(Ihu, Ihp), (ζh, ηh)) − γGLS
632
+
633
+ T∈Th
634
+
635
+ T
636
+ h2
637
+ Tξ−1
638
+ T L(u, p)L(ζh, ηh))
639
+
640
+ ��
641
+
642
+ dx
643
+ + m(Ihu − u, ζh) − m(δu, ζh)
644
+
645
+ ��
646
+
647
+ = (1) + (2) + (3).
648
+ (47)
649
+ We bound the terms (1)–(3) term by term. The first term is handled by using Lemma 4.7
650
+ A((Ihu − u, Ihp − p), (zh, qh)) ≤ Chk �
651
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
652
+
653
+ S∗
654
+ h((zh, 0), (zh, 0))
655
+ 1
656
+ 2.
657
+ (48)
658
+ Consider the second term on the right hand side of (47)
659
+ Sh(Ihu, Ihp), (ζh, ηh)) − γGLS
660
+
661
+ T∈Th
662
+
663
+ T
664
+ h2
665
+ Tξ−1
666
+ T L(u, p)L(ζh, ηh) dx
667
+ = (h2k∇Ihuh, ∇ζh) + γGLS
668
+
669
+ T∈Th
670
+
671
+ T
672
+ h2
673
+ Tξ−1
674
+ T L(Ihu, Ihp)L(ζh, ηh) dx
675
+ − γGLS
676
+
677
+ T∈Th
678
+
679
+ T
680
+ h2
681
+ Tξ−1
682
+ T L(u, p)L(ζh, ηh) dx + γu
683
+
684
+ F∈Fint
685
+ h
686
+
687
+ F
688
+ hFξF[∇Ihuh · n][∇ζh · n] ds
689
+ + γdiv
690
+
691
+
692
+ ξT(∇ · Ihuh)(∇ · ζh) dx.
693
+ (49)
694
+ 10
695
+
696
+ We now estimate the terms on the right hand side of (49). Using the H1-stability of Ih, the
697
+ first term of (49) can be handled as:
698
+ (h2k∇Ihu, ∇ζh) ≤ Chk ∥u∥[H1(Ω)]d Sh((ζh, ηh), (ζh, ηh))
699
+ 1
700
+ 2.
701
+ Consider the next two terms of (49). Using the Cauchy– Schwarz inequality and Corollary 4.1
702
+ we obtain
703
+ γGLS
704
+
705
+ T∈Th
706
+
707
+ T
708
+ h2
709
+ Tξ−1
710
+ T L(Ihu, Ihp)L(ζh, ηh) dx − γGLS
711
+
712
+ T∈τh
713
+
714
+ T
715
+ h2
716
+ Tξ−1
717
+ T L(u, p)L(ζh, ηh) dx
718
+ =γGLS
719
+
720
+ T∈Th
721
+
722
+ T
723
+ h2
724
+ Tξ−1
725
+ T L(Ihu − u, Ihp − p)L(ζh, ηh) dx
726
+
727
+
728
+ γGLS
729
+
730
+ T∈Th
731
+
732
+ T
733
+ h2
734
+ Tξ−1
735
+ T L(Ihu − u, Ihp − p)2 dx
736
+ � 1
737
+ 2 �
738
+ γGLS
739
+
740
+ T∈Th
741
+
742
+ T
743
+ h2
744
+ Tξ−1
745
+ T L(ζh, ηh)2 dx
746
+ � 1
747
+ 2
748
+ ≤ Chk �
749
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
750
+
751
+ Sh((ζh, ηh), (ζh, ηh))
752
+ 1
753
+ 2.
754
+ The next term of (49) can be handled by using the Cauchy–Schwarz inequality and the estimate
755
+ (38),
756
+ γu
757
+
758
+ F∈Fint
759
+ h
760
+
761
+ F
762
+ hFξF[∇Ihuh · n][∇ζh · n] ds
763
+
764
+
765
+ �γu
766
+
767
+ F∈Fint
768
+ h
769
+
770
+ F
771
+ hFξF[∇Ihuh · n]2 ds
772
+
773
+
774
+ 1
775
+ 2 �
776
+ �γu
777
+
778
+ F∈Fint
779
+ h
780
+
781
+ F
782
+ hFξF[∇ζh · n]2 ds
783
+
784
+
785
+ 1
786
+ 2
787
+
788
+
789
+ �γu
790
+
791
+ F∈Fint
792
+ h
793
+
794
+ F
795
+ hFξF[∇(Ihu − u) · n]2 ds
796
+
797
+
798
+ 1
799
+ 2
800
+ Sh((ζh, ηh), (ζh, ηh))
801
+ 1
802
+ 2
803
+ ≤ Chk ∥u∥[Hk+1(Ω)]d Sh((ζh, ηh), (ζh, ηh))
804
+ 1
805
+ 2.
806
+ Put together (49) leads to
807
+ Sh(Ihu, Ihp), (ζh, ηh)) − γGLS
808
+
809
+ T∈Th
810
+
811
+ T
812
+ h2
813
+ Tξ−1
814
+ T L(u, p)L(ζh, ηh) dx
815
+ ≤ Chk �
816
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
817
+
818
+ Sh((ζh, ηh), (ζh, ηh))
819
+ 1
820
+ 2.
821
+ The last term can be handled as:
822
+ |m(Ihu − u, ζh) − m(δu, ζh)| ≤ C(|Ihu − u|ωM + |δu|ωM)γm|ζh|ωM
823
+ ≤ C(hk+1 ∥u∥[Hk+1(Ω)]d + γ
824
+ 1
825
+ 2m|δu|ωM)γ
826
+ 1
827
+ 2m|ζh|ωM.
828
+ Put together (47) leads to
829
+ |||(ζh, ηh), (zh, qh)|||2 ≤ C
830
+
831
+ hk�
832
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
833
+
834
+ + γ
835
+ 1
836
+ 2m|δu|ωM
837
+
838
+ |||(ζh, ηh), (zh, qh)|||
839
+ ⇒ |||(ζh, ηh), (zh, qh)||| ≤ C(hk�
840
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
841
+
842
+ + γ
843
+ 1
844
+ 2m|δu|ωM).
845
+ The combination of the above estimates concludes the claim.
846
+ 11
847
+
848
+ Corollary 4.2. Under the same assumptions as for Lemma 4.8, there holds
849
+ ∥u − uh∥V ≤ C
850
+
851
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + h−kγ
852
+ 1
853
+ 2m|δu|ωM
854
+
855
+ ,
856
+ (50)
857
+ and
858
+ ∥uh∥V ≤ C
859
+
860
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + γ
861
+ 1
862
+ 2mh−k|δu|ωM
863
+
864
+ .
865
+ (51)
866
+ Proof. Using Lemma 4.8, we see that
867
+ ∥u − uh∥V = h−k ��hk(u − uh)
868
+ ��
869
+ V ≤Ch−k(Sh(u − uh, u − uh) + |u − uh|2
870
+ ωM)
871
+ ≤Ch−k�
872
+ hk(∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)) + γ
873
+ 1
874
+ 2m|δu|ωM
875
+
876
+ ≤C
877
+
878
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + h−kγ
879
+ 1
880
+ 2m|δu|ωM
881
+
882
+ .
883
+ The estimate (51) is immediate by using the triangle inequality and the estimate (50).
884
+ The following theorem is the main theoretical result of the paper and states an error estimate
885
+ for this method.
886
+ Theorem 4.2. Let f ∈ [L2(Ω)]d and uM = u|ωM + δu be given. We assume that (u, p) ∈
887
+ [Hk+1(Ω)]2 × L2
888
+ 0 ∩ Hk(Ω) is the solution of (13), and consider (uh, ph) ∈ Vh and (zh, yh) ∈ Wh
889
+ the discrete solution of (25)–(26). Then for all B ⊂⊂ Ω there exists τ ∈ (0, 1) such that
890
+ |u − uh|B ≤ Chkτ�
891
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + h−k|δu|ωM
892
+
893
+ .
894
+ (52)
895
+ Proof.
896
+ Let us first consider the weak formulation of the problem satisfied by (ζ, η) =
897
+ (u − uh, p − ph).
898
+ A((ζ, η), (w, r)) = (f, w)L − A((uh, ph), (w, r)).
899
+ We introduce uh and ph being fixed. The linear forms rf and rg on V0 and L respectively defined
900
+ by: For all w ∈ V0 and r ∈ L
901
+ ⟨rf, w⟩V ′
902
+ 0,V + (rg, r)L := (f, w)L − A((uh, ph), (w, r)).
903
+ (53)
904
+ It follows that (ζ, η) is the solution of (8)–(9) with f and g in the right hand sides replaced
905
+ respectively by rf and rg. Applying now corollary 2.1, we directly get
906
+ |ζ|B ≤ C(∥rf∥V ′
907
+ 0 + ∥rg∥L + ∥ζ∥L)1−τ(∥rf∥V ′
908
+ 0 + ∥rg∥L + |ζ|ωM)τ.
909
+ (54)
910
+ Using (25), we can write the residuals: for all (wh, qh) ∈ Wh
911
+ < rf, w >V ′
912
+ 0,V +(rg, r)L := (f, w − wh)L − A((uh, ph), (w − wh, r − qh)) − S∗
913
+ h((zh, yh), (wh, qh)).
914
+ (55)
915
+ We take wh = Ihw and qh = Ihr in (55). Now, let us estimate the terms on the right hand
916
+ side of (55). Consider the first two terms of (55)
917
+ (f, w − wh)L−A((uh, ph), (w − wh, r − qh))
918
+ = (f, w − wh)L − (a(uh, w − wh) − b(ph, w − wh)) + b(r − qh, uh)).
919
+ (56)
920
+ 12
921
+
922
+ Applying an integration by parts to the first two terms of (56) and using Lemma 4.8,
923
+ (f, w − wh)L−(a(uh, w − wh) − b(ph, w − wh))
924
+ = |
925
+
926
+ T∈Th
927
+
928
+ T
929
+ L(u, p)(w − wh) dx −
930
+
931
+ T∈Th
932
+
933
+ T
934
+ L(uh, ph)(w − wh) dx|
935
+ +
936
+
937
+ F∈Fint
938
+ h
939
+
940
+ F
941
+ |[∇(u − uh) · n]||(w − wh)| ds
942
+ = |
943
+
944
+ T∈Th
945
+
946
+ T
947
+ L(u − uh, p − ph)(w − wh) dx| +
948
+
949
+ F∈Fint
950
+ h
951
+
952
+ F
953
+ |[∇(u − uh) · n]||(w − wh)| ds
954
+ ≤ C
955
+ � �
956
+ T∈Th
957
+ h2
958
+ Tξ−1
959
+ T ∥L(u − uh, p − ph)∥2
960
+ L2(T)
961
+ � 1
962
+ 2
963
+ h−1 ∥w − wh∥L
964
+ + C
965
+
966
+ � �
967
+ F∈Fint
968
+ h
969
+
970
+ F
971
+ hFξF[∇(u − uh) · n]2 ds
972
+
973
+
974
+ 1
975
+ 2 �
976
+ � �
977
+ F∈Fint
978
+ h
979
+
980
+ F
981
+ h−1
982
+ F ξ−1
983
+ F (w − wh)2 ds
984
+
985
+
986
+ 1
987
+ 2
988
+ ≤ C |||(u − uh, p − ph), (zh, qh)||| h−1 ∥w − wh∥L
989
+ + C
990
+
991
+ � �
992
+ F∈Fint
993
+ h
994
+
995
+ F
996
+ hFξF[∇(u − uh) · n]2 ds
997
+
998
+
999
+ 1
1000
+ 2 �
1001
+ � �
1002
+ F∈Fint
1003
+ h
1004
+
1005
+ F
1006
+ h−1
1007
+ F ξ−1
1008
+ F (w − wh)2 ds
1009
+
1010
+
1011
+ 1
1012
+ 2
1013
+ ≤ C(hk ∥u∥[Hk+1(Ω)]d + hk ∥p∥Hk(Ω)) ∥w∥[H1(Ω)]d + hk ∥u∥[Hk+1(Ω)]d ∥w∥[H1(Ω)]d
1014
+ ≤ Chk(∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)) ∥w∥[H1(Ω)]d .
1015
+ (57)
1016
+ The last term is handled using the Cauchy–Schwarz inequality and Lemma 4.8,
1017
+ b(r − qh, uh) ≤ ∥r − qh∥L ∥∇ · uh∥L
1018
+ ≤ ∥r∥L ∥∇ · uh∥L
1019
+ ≤ C(hk(∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)) + γ1/2
1020
+ m |δu|ωM) ∥r∥L .
1021
+ (58)
1022
+ Applying the above bounds in (56) leads to
1023
+ (f, w − wh)L−A((uh, ph), (w − wh, r − qh))
1024
+ (59)
1025
+ ≤ C(hk(∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)) + γ1/2
1026
+ m |δu|ωM)(∥w∥[H1(Ω)]d + ∥r∥L).
1027
+ The last term of (55) is handled using Lemma 4.8
1028
+ S∗
1029
+ h((zh, yh), (wh, qh)) ≤ S∗
1030
+ h((zh, yh), (zh, yh))
1031
+ 1
1032
+ 2S∗
1033
+ h((wh, qh), (wh, qh))
1034
+ 1
1035
+ 2
1036
+ ≤ C
1037
+
1038
+ hk�
1039
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
1040
+
1041
+ + γ1/2
1042
+ m |δu|ωM
1043
+
1044
+ (∥w∥[H1(Ω)]d + ∥r∥L).
1045
+ (60)
1046
+ As a consequence we can bound the quantity defined in (55) by
1047
+ ⟨rf,w⟩V ′
1048
+ 0,V + (rg, r)L
1049
+ ≤ C(hk �
1050
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
1051
+
1052
+ + γ1/2
1053
+ m |δu|ωM)(∥w∥[H1(Ω)]d + ∥r∥L).
1054
+ (61)
1055
+ 13
1056
+
1057
+ Since this bound holds for all w ∈ V0 and r ∈ L, we conclude that
1058
+ ∥rf∥V ′
1059
+ 0 + ∥rg∥L ≤ C
1060
+
1061
+ hk�
1062
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
1063
+
1064
+ + γ1/2
1065
+ m |δu|ωM
1066
+
1067
+ .
1068
+ (62)
1069
+ Using the Poincar´e inequality (27), we have the bound
1070
+ ∥ζ∥L ≤ C(|ζ|ωM + ∥∇ζ∥L) ≤ Ch−k �
1071
+ |hkζ|ωM +
1072
+ ��hk∇ζ
1073
+ ��
1074
+ L
1075
+
1076
+ ≤ Ch−k |||(ζ, 0), (0, 0)|||
1077
+ ≤ Ch−k�
1078
+ hk�
1079
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
1080
+
1081
+ + γ1/2
1082
+ m |δu|ωM
1083
+
1084
+ ≤ C
1085
+
1086
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + γ1/2
1087
+ m h−k|δu|ωM
1088
+
1089
+ .
1090
+ Thus, we can bound the terms in the right-hand side of (54) in the following way:
1091
+ ∥rf∥V ′
1092
+ 0 + ∥rg∥L + ∥ζ∥L ≤ C
1093
+
1094
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + γ1/2
1095
+ m h−k|δu|ωM
1096
+
1097
+ .
1098
+ (63)
1099
+ And
1100
+ ∥rf∥V ′
1101
+ 0 + ∥rg∥L + |ζ|ωM ≤ Chk�
1102
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + γ1/2
1103
+ m |δu|ωM
1104
+
1105
+ .
1106
+ (64)
1107
+ Using these two bounds in (54), we conclude that
1108
+ |ζ|B ≤ (∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + γ1/2
1109
+ m h−k|δu|ωM)1−τ(hk�
1110
+ ∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω)
1111
+
1112
+ + γ1/2
1113
+ m |δu|ωM)τ
1114
+ ≤ Chτk(∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + γ1/2
1115
+ m h−k|δu|ωM).
1116
+ which completes the proof of the theorem.
1117
+ 5
1118
+ Numerical simulations
1119
+ In this section, we use several two-dimensional numerical examples to apply the methodology
1120
+ described in section 3. All experiments have been implemented using the open-source computing
1121
+ platform FEniCSx [36, 2]. A docker image to reproduce the numerical results is available at
1122
+ https://doi.org/10.5281/zenodo.7442458. The free parameters in (25)–(26) are set to
1123
+ α = γu = γdiv = γGLS = γ∗
1124
+ u = γ∗
1125
+ p = 10−1, γM = 1000.
1126
+ in all the numerical examples. In the first example we will verify the convergence orders for
1127
+ different polynomial orders using equal order interpolation k for all variables. Then we consider
1128
+ the same test case using the minimal polynomial order that results in the same error bounds,
1129
+ k1 = 1, k2 = max{k − 1, 1} and k3 = 1. Finally, we study the robustness of the error estimate
1130
+ with respect to the viscosity for a configuration where the target subdomain B is strictly
1131
+ downwind the data subdomain ωM, so that every point B is on a streamline intersecting ωM.
1132
+ 14
1133
+
1134
+ 5.1
1135
+ Convergence study: Stokes example
1136
+ To demonstrate the convergence behaviour of the method introduced in section 3, we take the
1137
+ test case for the Stokes problem from [18]. Let Ω = [0, 1]2 be the unit square. We consider the
1138
+ velocity and pressure fields given by
1139
+ u(x, y) = (20xy3, 5x4 − 5y4)
1140
+ p(x, y) = 60x2y − 20y3 − 5.
1141
+ It is simple to demonstrate that (u, p) is a solution to the homogeneous Stokes problem with
1142
+ ν = 1, corresponding to the system (1)–(2) with U = 0 and f = 0. As a result, we consider
1143
+ (25)–(26) with U = 0 and f = 0. Two different geometric settings are considered: one in which
1144
+ the data is continued in the convex geometry, inside the convex hull of ωM, and one in which the
1145
+ solution is continued in the non-convex geometry, outside the convex hull of ωM. The convex
1146
+ geometry represented by Fig 1(a) is given as:
1147
+ ωM = Ω \ (0.1, 0.9) × (0.25, 1),
1148
+ B = Ω \ (0.1, 0.9) × (0.95, 1),
1149
+ and the non-convex geometry represented by fig 1(b) is given as:
1150
+ ωM = {(x, y) : 0.25 ≤ x ≤ 0.75, 0.05 ≤ y ≤ 0.5},
1151
+ B = {(x, y) : 0.125 ≤ x ≤ 0.875, 0.05 ≤ y ≤ 0.95}.
1152
+ (a) Convex geometry
1153
+ (b) Non-convex geometry
1154
+ Figure 1: Sketch of the domains used for computations in section 5.1.
1155
+ .
1156
+ We begin by performing the computation using unperturbed data. The relative L2- norm
1157
+ errors ∥u − uh∥[L2(B)]d / ∥u∥[L2(B)]d are computed in the subdomain B. In addition, we present
1158
+ the history of convergence of the residual quantity for velocity stabilization:
1159
+
1160
+ �γu
1161
+
1162
+ F∈Fint
1163
+ h
1164
+
1165
+ F
1166
+ hF[(∇uh − ∇Ihuh) · n]2 ds
1167
+
1168
+
1169
+ 1
1170
+ 2
1171
+ .
1172
+ 15
1173
+
1174
+ B
1175
+ wMB
1176
+ wMFig.
1177
+ 2 displays the velocity, pressure errors and residual quantity in the convex and non-
1178
+ convex geometry.
1179
+ Filled squares, circles and triangles represent the velocity errors; dashed
1180
+ lines represent the pressure error, and the plain thin lines represent the residual. The expected
1181
+ order of convergence is observed for the residual in Lemma 4.8. The local velocity error behaves
1182
+ consistently with the convergence rates obtained in Theorem 4.2. We can also see in Fig. 2 that
1183
+ the higher order polynomials are more satisfactory for ill-posed problems. Next, we proceed
1184
+ with the numerical verification of the above method with data perturbation.
1185
+ Consider the
1186
+ perturbed data
1187
+ uM = u|ωM + δu,
1188
+ with random perturbations
1189
+ |δu|ωM = O(hk−θ),
1190
+ for some θ ∈ N0 available for implementing our method. According to Theorem 4.2, we have
1191
+ the estimate
1192
+ |u − uh|B �� Chkτ−θ(∥u∥[Hk+1(Ω)]d + ∥p∥Hk(Ω) + 1),
1193
+ (65)
1194
+ consequently, convergence requires the condition kτ − θ > 0. Figs 3–4 present the convergence
1195
+ history of the velocity, pressure and residual quantities with the data perturbation in the convex
1196
+ and non-convex geometry, respectively. The effect of different values of θ for relative L2-error
1197
+ are studied in Figs 3–4. The relative error for θ = 0 is displayed in Figs. 3(a) and 4(a). In
1198
+ both cases, the results are in agreement with the Theorem 4.2. As stated in (65), the p = 1
1199
+ polynomial approximation may diverge for θ = 1, which is confirmed by Fig. 3(b). Next, the
1200
+ method p = 2 converges linearly, whereas p = 3 still manages to converge, albeit at a slower
1201
+ rate. As shown in the Fig. 3(c), this result is consistent with the fact that for θ = 2, convergence
1202
+ is no longer observed for any p ≤ 3. Similar convergence results are observed in the non-convex
1203
+ domain as shown in Fig. 4. The results of Figs. 3–4 indicate that for the convex geometry
1204
+ τ ≈ 1 and for the non-convex geometry τ ≈ 2
1205
+ 3. In Fig. 5-7 the same results are presented for
1206
+ the case where the minimal polynomial order is considered that is k1 = 1, k2 = max{k − 1, 1},
1207
+ k3 = 1. The results are very similar and we conclude that for these numerical examples there
1208
+ is no disadvantage in taking the smallest possible dual space.
1209
+ 10−2
1210
+ 10−1
1211
+ 10−7
1212
+ 10−6
1213
+ 10−5
1214
+ 10−4
1215
+ 10−3
1216
+ 10−2
1217
+ 10−1
1218
+ h
1219
+ k = 1
1220
+ k = 2
1221
+ k = 3
1222
+ 10−2
1223
+ 10−1
1224
+ 10−6
1225
+ 10−5
1226
+ 10−4
1227
+ 10−3
1228
+ 10−2
1229
+ 10−1
1230
+ 100
1231
+ h
1232
+ O(h1)
1233
+ O(h2)
1234
+ O(h3)
1235
+ (a) Errors for convex geometry in Fig. 1(a)
1236
+ (b) Errors for non-convex geometry in Fig. 1(b)
1237
+ Figure 2: Relative error for geometrical setup displayed in Fig. 1.
1238
+ 16
1239
+
1240
+ 10−2
1241
+ 10−1
1242
+ 10−7
1243
+ 10−6
1244
+ 10−5
1245
+ 10−4
1246
+ 10−3
1247
+ 10−2
1248
+ 10−1
1249
+ h
1250
+ k = 1
1251
+ k = 2
1252
+ k = 3
1253
+ (a) θ = 0
1254
+ 10−2
1255
+ 10−1
1256
+ 10−6
1257
+ 10−5
1258
+ 10−4
1259
+ 10−3
1260
+ 10−2
1261
+ 10−1
1262
+ 100
1263
+ 101
1264
+ h
1265
+ O(h)
1266
+ O(h2)
1267
+ O(h3)
1268
+ (b) θ = 1
1269
+ 10−2
1270
+ 10−1
1271
+ 10−4
1272
+ 10−3
1273
+ 10−2
1274
+ 10−1
1275
+ 100
1276
+ 101
1277
+ 102
1278
+ h
1279
+ (c) θ = 2
1280
+ Figure 3:
1281
+ Relative error for geometrical setup Fig. 1(a) in terms of the strength of the data
1282
+ perturbation.
1283
+ 10−2
1284
+ 10−1
1285
+ 10−4
1286
+ 10−3
1287
+ 10−2
1288
+ 10−1
1289
+ 100
1290
+ h
1291
+ k = 1
1292
+ k = 2
1293
+ k = 3
1294
+ (a) θ = 0
1295
+ 10−2
1296
+ 10−1
1297
+ 10−5
1298
+ 10−4
1299
+ 10−3
1300
+ 10−2
1301
+ 10−1
1302
+ 100
1303
+ 101
1304
+ h
1305
+ O(h)
1306
+ O(h2)
1307
+ O(h3)
1308
+ (b) θ = 1
1309
+ 10−2
1310
+ 10−1
1311
+ 10−2
1312
+ 10−1
1313
+ 100
1314
+ 101
1315
+ 102
1316
+ h
1317
+ (c) θ = 2
1318
+ Figure 4:
1319
+ Relative error for geometrical setup Fig. 1(b) in terms of the strength of the data
1320
+ perturbation.
1321
+ 10−2
1322
+ 10−1
1323
+ 10−6
1324
+ 10−5
1325
+ 10−4
1326
+ 10−3
1327
+ 10−2
1328
+ 10−1
1329
+ 100
1330
+ h
1331
+ k = 2
1332
+ k = 3
1333
+ 10−2
1334
+ 10−1
1335
+ 10−5
1336
+ 10−4
1337
+ 10−3
1338
+ 10−2
1339
+ 10−1
1340
+ 100
1341
+ h
1342
+ O(h1)
1343
+ O(h2)
1344
+ O(h3)
1345
+ (a) Errors for convex geometry in Fig. 1(a)
1346
+ (b) Errors for non-convex geometry in Fig. 1(b)
1347
+ Figure 5: Relative error with using the minimal polynomial order for geometrical setup displayed
1348
+ in Fig. 1.
1349
+ 5.2
1350
+ Convergence study with varying viscosity
1351
+ In this subsection, we consider the flow of a viscous Newtonian fluid between two solid bound-
1352
+ aries at y = H, −H driven by a constant pressure gradient. The source term f is chosen such
1353
+ 17
1354
+
1355
+ 10−2
1356
+ 10−1
1357
+ 10−5
1358
+ 10−4
1359
+ 10−3
1360
+ 10−2
1361
+ 10−1
1362
+ h
1363
+ k = 2
1364
+ k = 3
1365
+ (a) θ = 0
1366
+ 10−1.8
1367
+ 10−1.6
1368
+ 10−1.4
1369
+ 10−1.2
1370
+ 10−1
1371
+ 10−0.8
1372
+ 10−4
1373
+ 10−3
1374
+ 10−2
1375
+ 10−1
1376
+ 100
1377
+ h
1378
+ O(h)
1379
+ O(h2)
1380
+ (b) θ = 1
1381
+ 10−1.8
1382
+ 10−1.6
1383
+ 10−1.4
1384
+ 10−1.2
1385
+ 10−1
1386
+ 10−0.8
1387
+ 10−3
1388
+ 10−2
1389
+ 10−1
1390
+ 100
1391
+ 101
1392
+ h
1393
+ (c) θ = 2
1394
+ Figure 6:
1395
+ Relative error with using the minimal polynomial order for geometrical setup Fig.
1396
+ 1(a) in terms of the strength of the data perturbation.
1397
+ 10−2
1398
+ 10−1
1399
+ 10−5
1400
+ 10−4
1401
+ 10−3
1402
+ 10−2
1403
+ 10−1
1404
+ 100
1405
+ h
1406
+ k = 2
1407
+ k = 3
1408
+ (a) θ = 0
1409
+ 10−1.6
1410
+ 10−1.4
1411
+ 10−1.2
1412
+ 10−1
1413
+ 10−0.8
1414
+ 10−4
1415
+ 10−3
1416
+ 10−2
1417
+ 10−1
1418
+ 100
1419
+ 101
1420
+ h
1421
+ O(h)
1422
+ O(h2)
1423
+ O(h3)
1424
+ (b) θ = 1
1425
+ 10−1.6
1426
+ 10−1.4
1427
+ 10−1.2
1428
+ 10−1
1429
+ 10−0.8
1430
+ 10−2
1431
+ 10−1
1432
+ 100
1433
+ 101
1434
+ 102
1435
+ h
1436
+ (c) θ = 2
1437
+ Figure 7:
1438
+ Relative error with using the minimal polynomial order for geometrical setup Fig.
1439
+ 1(b) in terms of the strength of the data perturbation.
1440
+ that the solution of the plane Poiseuille flow
1441
+ u(x, y) = U(x, y) =
1442
+ � P
1443
+ 2µ(H2 − y2), 0
1444
+
1445
+ ,
1446
+ p(x, y) =
1447
+ �1
1448
+ 2 − x
1449
+
1450
+ P,
1451
+ satisfies the model problem. We demonstrate the performance of the numerical method for
1452
+ varying viscosity in a domain where the target subdomain is aligned with the flow, shown in
1453
+ Figure 8, and defined by
1454
+ ωM = (0.0, 0.2) × (0.2, 0.8),
1455
+ B = (0.2, 0.8) × (0.45, 0.55).
1456
+ (66)
1457
+ As in the previous section, we have examined the convergence of the method by performing
1458
+ numerical tests on both unperturbed and perturbed data. We vary the viscosity between ν = 1
1459
+ and ν = 0.
1460
+ Observe that since no boundary conditions are imposed nothing needs to be
1461
+ changed in the formulation in the singular limit. Also note that the choice of ξT and ξF in
1462
+ (20)-(21) mimicks the choice for the stabilized method for (the well-posed) Oseen’s problem
1463
+ used to improve robustness in the high Reynolds limit. Also with reference to high Reynolds
1464
+ computations for the well-posed case we here consider equal order interpolation for all fields.
1465
+ We wish to explore if the results on stability for the unique continuation for convection–
1466
+ diffusion equations in the limit of small diffusivity [19, 20] carry over to the case of incompressible
1467
+ 18
1468
+
1469
+ flow.
1470
+ The key observation there was that for smooth solutions to the convection–diffusion
1471
+ equation the method had H¨older stable error estimates when diffusion dominates, similar to
1472
+ the analysis above, but in the convection dominated regime the stability in a subdomain slightly
1473
+ smaller than that spanned by the characteristics intersecting the data zone is Lipschitz. In that
1474
+ zone the convergence for the ill-posed problem coincides with that of the well-posed problem for
1475
+ piecewise affine approximation. As a means to study the effect of incompressibility we compare
1476
+ with the case where in addition to u in ωM, p is also provided as data in Ω. The proposed method
1477
+ can be modified to accommodate this case by including 1
1478
+ 2 ∥ph − p∥Ω, as an additional term in
1479
+ the Lagrangian (17). Note that when the pressure is added the velocity pressure coupling is
1480
+ strongly reduced. The relative L2-errors for running the same problem as above are displayed
1481
+ in Fig. 9. Left side plots of Fig. 9 show the results without adding any additional pressure
1482
+ term, and right side plots of Fig. 9 display the results by including the pressure data. We
1483
+ observe that the results with pressure information are consistently better than those without.
1484
+ In particular for high order polynomials and high Reynolds number the information on the
1485
+ pressure appears to provide a very strong enhancement of the stability. Further, the effect of
1486
+ data perturbations for different values of the viscosity coefficient is studied with and without the
1487
+ pressure augmentation, see Figs. 10–11. We observe that if a priori information on the pressure
1488
+ is added and viscosity is reduced the convergence order for the relative L2-error increases. This
1489
+ is consistent with the results of [19, 20]. If the pressure is not added however we do not observe
1490
+ this effect and it appears from these computational examples that we can not expect the result
1491
+ from [20] to hold for linearized incompressible flow.
1492
+ In Fig. 10-11 we present the results under perturbations of data. These results show that
1493
+ the robustness under perturbations is also substantially enhanced if the pressure is known,
1494
+ indicating that the pressure velocity coupling introduces a strong sensitivity to perturbations.
1495
+ 6
1496
+ Conclusions
1497
+ We have introduced a finite element data assimilation method for the linearized Navier-Stokes’
1498
+ equation. We proved the natural extension of the error estimates of [8] valid for piecewise
1499
+ affine approximation to the case of arbitrary polynomial orders.
1500
+ The expected increase in
1501
+ convergence rate was obtained, but the estimates also show that the sensitivity of the system
1502
+ to perturbations in data increase. The theoretical results were validated on some academic test
1503
+ cases. The main observations are that high order approximation for the ill-posed linearized
1504
+ Navier-Stokes’ equations pays off, at least for sufficiently clean data. The spaces for the dual
1505
+ variables on the other hand can be chosen with piecewise affine approximation without loss
1506
+ of accuracy of the approximation. A study where the viscosity was varied showed that the
1507
+ incompressibility condition and the associated velocity-pressure coupling severely compromise
1508
+ the convective Lipschitz stability that is known to hold in the zone in the domain defined by
1509
+ points on the characteristics intersecting the data zone. If additional data in the form of global
1510
+ pressure measurements were added the results improved and were similar to the those of the
1511
+ scalar convection–diffusion equation.
1512
+ Future work will focus on the nonlinear case and the possibility of enhancing stability by
1513
+ adding knowledge of some other variable than the pressure, such as for example a passive tracer
1514
+ as in scalar image velocimetry [13].
1515
+ 19
1516
+
1517
+ Figure 8: Data set ωM and error measurement regions (B).
1518
+ Acknowledgment
1519
+ This research was funded by EPSRC grants EP/T033126/1 and EP/V050400/1.
1520
+ References
1521
+ [1] Giovanni Alessandrini, Luca Rondi, Edi Rosset, and Sergio Vessella. The stability for the
1522
+ Cauchy problem for elliptic equations. Inverse Problems, 25(12):123004, 47, 2009.
1523
+ [2] Martin S. Alnæes, Anders Logg, Kristian B. Ølgaard, Marie E. Rognes, and Garth N.
1524
+ Wells. Unified Form Language: A Domain-Secific Language for Weak Formulations of
1525
+ Partial Differential Equations. ACM Trans. Math. Softw., 40(2), mar 2014.
1526
+ [3] Solveigh Averweg, Alexander Schwarz, Carina Schwarz, and J¨org Schr¨oder. 3D modeling
1527
+ of generalized Newtonian fluid flow with data assimilation using the least-squares finite
1528
+ element method. Comput. Methods Appl. Mech. Engrg., 392:Paper No. 114668, 19, 2022.
1529
+ [4] Mehdi Badra, Fabien Caubet, and J´er´emi Dard´e. Stability estimates for Navier-Stokes
1530
+ equations and application to inverse problems.
1531
+ Discrete Contin. Dyn. Syst. Ser. B,
1532
+ 21(8):2379–2407, 2016.
1533
+ [5] Andrea Ballerini. Stable determination of an immersed body in a stationary Stokes fluid.
1534
+ Inverse Problems, 26(12):125015, 25, 2010.
1535
+ [6] Mourad Bellassoued, Oleg Imanuvilov, and Masahiro Yamamoto. Carleman estimate for
1536
+ the Navier-Stokes equations and an application to a lateral Cauchy problem.
1537
+ Inverse
1538
+ Problems, 32(2):025001, 23, 2016.
1539
+ [7] C. Bertoglio, D. Chapelle, M. A. Fern´andez, J.-F. Gerbeau, and P. Moireau. State observers
1540
+ of a vascular fluid-structure interaction model through measurements in the solid. Comput.
1541
+ Methods Appl. Mech. Engrg., 256:149–168, 2013.
1542
+ 20
1543
+
1544
+ B
1545
+ wM[8] Muriel Boulakia, Erik Burman, Miguel A. Fern´andez, and Colette Voisembert. Data assim-
1546
+ ilation finite element method for the linearized Navier-Stokes equations in the low Reynolds
1547
+ regime. Inverse Problems, 36(8):085003, 21, 2020.
1548
+ [9] Muriel Boulakia, Anne-Claire Egloffe, and C´eline Grandmont. Stability estimates for the
1549
+ unique continuation property of the Stokes system and for an inverse boundary coefficient
1550
+ problem. Inverse Problems, 29(11):115001, 21, 2013.
1551
+ [10] L. Bourgeois. A mixed formulation of quasi-reversibility to solve the Cauchy problem for
1552
+ Laplace’s equation. Inverse Problems, 21(3):1087–1104, 2005.
1553
+ [11] L. Bourgeois. Convergence rates for the quasi-reversibility method to solve the Cauchy
1554
+ problem for Laplace’s equation. Inverse Problems, 22(2):413–430, 2006.
1555
+ [12] Laurent Bourgeois and J´er´emi Dard´e. The “exterior approach” to solve the inverse obstacle
1556
+ problem for the Stokes system. Inverse Probl. Imaging, 8(1):23–51, 2014.
1557
+ [13] E. Burman, J. J. J. Gillissen, and L. Oksanen. Stability estimate for scalar image velocime-
1558
+ try, 2020.
1559
+ [14] Erik Burman. Stabilized finite element methods for nonsymmetric, noncoercive, and ill-
1560
+ posed problems. Part I: Elliptic equations. SIAM J. Sci. Comput., 35(6):A2752–A2780,
1561
+ 2013.
1562
+ [15] Erik Burman. Error estimates for stabilized finite element methods applied to ill-posed
1563
+ problems. C. R. Math. Acad. Sci. Paris, 352(7-8):655–659, 2014.
1564
+ [16] Erik Burman. Stabilised finite element methods for ill-posed problems with conditional
1565
+ stability. In Building bridges: connections and challenges in modern approaches to nu-
1566
+ merical partial differential equations, volume 114 of Lect. Notes Comput. Sci. Eng., pages
1567
+ 93–127. Springer, [Cham], 2016.
1568
+ [17] Erik Burman. A stabilized nonconforming finite element method for the elliptic Cauchy
1569
+ problem. Math. Comp., 86(303):75–96, 2017.
1570
+ [18] Erik Burman and Peter Hansbo. Stabilized nonconforming finite element methods for data
1571
+ assimilation in incompressible flows. Math. Comp., 87(311):1029–1050, 2018.
1572
+ [19] Erik Burman, Mihai Nechita, and Lauri Oksanen.
1573
+ A stabilized finite element method
1574
+ for inverse problems subject to the convection-diffusion equation. I: diffusion-dominated
1575
+ regime. Numer. Math., 144(3):451–477, 2020.
1576
+ [20] Erik Burman, Mihai Nechita, and Lauri Oksanen. A stabilized finite element method for
1577
+ inverse problems subject to the convection-diffusion equation. II: convection-dominated
1578
+ regime. Numer. Math., 150(3):769–801, 2022.
1579
+ [21] J´er´emi Dard´e, Antti Hannukainen, and Nuutti Hyv¨onen.
1580
+ An Hdiv-based mixed quasi-
1581
+ reversibility method for solving elliptic Cauchy problems.
1582
+ SIAM J. Numer. Anal.,
1583
+ 51(4):2123–2148, 2013.
1584
+ 21
1585
+
1586
+ [22] Marta D’Elia, Mauro Perego, and Alessandro Veneziani. A variational data assimilation
1587
+ procedure for the incompressible Navier-Stokes equations in hemodynamics. J. Sci. Com-
1588
+ put., 52(2):340–359, 2012.
1589
+ [23] Daniele Antonio Di Pietro and Alexandre Ern.
1590
+ Mathematical aspects of discontinuous
1591
+ Galerkin methods, volume 69. Springer Science & Business Media, 2011.
1592
+ [24] A Ern and JL Guermond. Theory and practice of finite elements springer-verlag. New
1593
+ York, 2004.
1594
+ [25] Caroline Fabre and Gilles Lebeau. Prolongement unique des solutions de l’equation de
1595
+ Stokes. Comm. Partial Differential Equations, 21(3-4):573–596, 1996.
1596
+ [26] Bosco Garc´ıa-Archilla and Julia Novo. Error analysis of fully discrete mixed finite ele-
1597
+ ment data assimilation schemes for the Navier-Stokes equations. Adv. Comput. Math.,
1598
+ 46(4):Paper No. 61, 33, 2020.
1599
+ [27] J. J. Heys, T. A. Manteuffel, S. F. McCormick, M. Milano, J. Westerdale, and M. Be-
1600
+ lohlavek. Weighted least-squares finite elements based on particle imaging velocimetry
1601
+ data. J. Comput. Phys., 229(1):107–118, 2010.
1602
+ [28] O. Yu. Imanuvilov and M. Yamamoto. Global uniqueness in inverse boundary value prob-
1603
+ lems for the Navier-Stokes equations and Lam´e system in two dimensions. Inverse Prob-
1604
+ lems, 31(3):035004, 46, 2015.
1605
+ [29] O. Yu. Imanuvilov and M. Yamamoto.
1606
+ Remark on boundary data for inverse bound-
1607
+ ary value problems for the Navier-Stokes equations [Addendum to MR3319370]. Inverse
1608
+ Problems, 31(10):109401, 4, 2015.
1609
+ [30] Victor Isakov. Inverse problems for partial differential equations, volume 127 of Applied
1610
+ Mathematical Sciences. Springer, New York, second edition, 2006.
1611
+ [31] Kazufumi Ito and Bangti Jin. Inverse problems, volume 22 of Series on Applied Mathe-
1612
+ matics. World Scientific Publishing Co. Pte. Ltd., Hackensack, NJ, 2015. Tikhonov theory
1613
+ and algorithms.
1614
+ [32] Fritz John. Continuous dependence on data for solutions of partial differential equations
1615
+ with a prescribed bound. Comm. Pure Appl. Math., 13(4):551–585, 1960.
1616
+ [33] R. Latt`es and J.-L. Lions.
1617
+ M´ethode de quasi-r´eversibilit´e et applications.
1618
+ Travaux et
1619
+ Recherches Math´ematiques, No. 15. Dunod, Paris, 1967.
1620
+ [34] Ching-Lung Lin, Gunther Uhlmann, and Jenn-Nan Wang. Optimal three-ball inequal-
1621
+ ities and quantitative uniqueness for the Stokes system.
1622
+ Discrete Contin. Dyn. Syst.,
1623
+ 28(3):1273–1290, 2010.
1624
+ [35] Alexander Schwarz and Richard P. Dwight. Data assimilation for Navier-Stokes using the
1625
+ least-squares finite-element method. Int. J. Uncertain. Quantif., 8(5):383–403, 2018.
1626
+ [36] Matthew W. Scroggs, Igor A. Baratta, Chris N. Richardson, and Garth N. Wells. Basix:
1627
+ a runtime finite element basis evaluation library. J. Open Source Softw., 7(73):3982, 2022.
1628
+ 22
1629
+
1630
+ [37] Andrey N. Tikhonov and Vasiliy Y. Arsenin. Solutions of ill-posed problems. Scripta Series
1631
+ in Mathematics. V. H. Winston & Sons, Washington, D.C.; John Wiley & Sons, New York-
1632
+ Toronto, Ont.-London, 1977. Translated from the Russian, Preface by translation editor
1633
+ Fritz John.
1634
+ 23
1635
+
1636
+ 10−2
1637
+ 10−1
1638
+ 10−6
1639
+ 10−5
1640
+ 10−4
1641
+ 10−3
1642
+ 10−2
1643
+ 10−1
1644
+ 100
1645
+ h
1646
+ O(h)
1647
+ O(h2)
1648
+ O(h3)
1649
+ (a) without pressure, ν = 100
1650
+ 10−2
1651
+ 10−1
1652
+ 10−8
1653
+ 10−6
1654
+ 10−4
1655
+ 10−2
1656
+ 100
1657
+ h
1658
+ k = 1
1659
+ k = 2
1660
+ k = 3
1661
+ (b) with pressure, ν = 100
1662
+ 10−2
1663
+ 10−1
1664
+ 10−4
1665
+ 10−3
1666
+ 10−2
1667
+ 10−1
1668
+ 100
1669
+ h
1670
+ (c) without pressure, ν = 10−2
1671
+ 10−2
1672
+ 10−1
1673
+ 10−8
1674
+ 10−6
1675
+ 10−4
1676
+ 10−2
1677
+ 100
1678
+ h
1679
+ (d) with pressure, ν = 10−2
1680
+ 10−2
1681
+ 10−1
1682
+ 10−4
1683
+ 10−3
1684
+ 10−2
1685
+ 10−1
1686
+ 100
1687
+ h
1688
+ (e) without pressure, ν = 10−4
1689
+ 10−2
1690
+ 10−1
1691
+ 10−8
1692
+ 10−6
1693
+ 10−4
1694
+ 10−2
1695
+ 100
1696
+ h
1697
+ (f) with pressure, ν = 10−4
1698
+ 10−2
1699
+ 10−1
1700
+ 10−4
1701
+ 10−3
1702
+ 10−2
1703
+ 10−1
1704
+ 100
1705
+ h
1706
+ (g) without pressure, ν = 0
1707
+ 10−2
1708
+ 10−1
1709
+ 10−8
1710
+ 10−6
1711
+ 10−4
1712
+ 10−2
1713
+ 100
1714
+ h
1715
+ (h) with pressure, ν = 0
1716
+ Figure 9: Relative error for geometrical setup Fig. 8.
1717
+ 24
1718
+
1719
+ 10−2
1720
+ 10−1
1721
+ 10−5
1722
+ 10−4
1723
+ 10−3
1724
+ 10−2
1725
+ 10−1
1726
+ 100
1727
+ 101
1728
+ h
1729
+ O(h)
1730
+ O(h2)
1731
+ O(h3)
1732
+ (a) without pressure θ = 0, ν = 100
1733
+ 10−2
1734
+ 10−1
1735
+ 10−6
1736
+ 10−5
1737
+ 10−4
1738
+ 10−3
1739
+ 10−2
1740
+ 10−1
1741
+ 100
1742
+ 101
1743
+ h
1744
+ k = 1
1745
+ k = 2
1746
+ k = 3
1747
+ (b) with pressure θ = 0, ν = 100
1748
+ 10−2
1749
+ 10−1
1750
+ 10−4
1751
+ 10−3
1752
+ 10−2
1753
+ 10−1
1754
+ 100
1755
+ 101
1756
+ h
1757
+ (c) without pressure θ = 0, ν = 10−2
1758
+ 10−2
1759
+ 10−1
1760
+ 10−6
1761
+ 10−5
1762
+ 10−4
1763
+ 10−3
1764
+ 10−2
1765
+ 10−1
1766
+ 100
1767
+ 101
1768
+ h
1769
+ (d) with pressure θ = 0, ν = 10−2
1770
+ 10−2
1771
+ 10−1
1772
+ 10−4
1773
+ 10−3
1774
+ 10−2
1775
+ 10−1
1776
+ 100
1777
+ 101
1778
+ h
1779
+ (e) without pressure θ = 0, ν = 10−4
1780
+ 10−2
1781
+ 10−1
1782
+ 10−6
1783
+ 10−5
1784
+ 10−4
1785
+ 10−3
1786
+ 10−2
1787
+ 10−1
1788
+ 100
1789
+ 101
1790
+ h
1791
+ (f) with pressure θ = 0, ν = 10−4
1792
+ 10−2
1793
+ 10−1
1794
+ 10−4
1795
+ 10−3
1796
+ 10−2
1797
+ 10−1
1798
+ 100
1799
+ 101
1800
+ h
1801
+ (g) without pressure θ = 0, ν = 0
1802
+ 10−2
1803
+ 10−1
1804
+ 10−6
1805
+ 10−5
1806
+ 10−4
1807
+ 10−3
1808
+ 10−2
1809
+ 10−1
1810
+ 100
1811
+ 101
1812
+ h
1813
+ (h) with pressure θ = 0, ν = 0
1814
+ Figure 10:
1815
+ Relative errors in terms of the strength of the data perturbation for geometrical
1816
+ setup displayed in Fig. 8.
1817
+ 25
1818
+
1819
+ 10−2
1820
+ 10−1
1821
+ 10−2
1822
+ 10−1
1823
+ 100
1824
+ 101
1825
+ h
1826
+ (a) without pressure θ = 1, ν = 1
1827
+ 10−2
1828
+ 10−1
1829
+ 10−4
1830
+ 10−3
1831
+ 10−2
1832
+ 10−1
1833
+ 100
1834
+ 101
1835
+ h
1836
+ (b) with pressure θ = 1, ν = 1
1837
+ 10−2
1838
+ 10−1
1839
+ 10−3
1840
+ 10−2
1841
+ 10−1
1842
+ 100
1843
+ 101
1844
+ 102
1845
+ 103
1846
+ h
1847
+ (c) without pressure θ = 2, ν = 1
1848
+ 10−2
1849
+ 10−1
1850
+ 10−3
1851
+ 10−2
1852
+ 10−1
1853
+ 100
1854
+ 101
1855
+ 102
1856
+ 103
1857
+ h
1858
+ (d) with pressure θ = 2, ν = 1
1859
+ Figure 11:
1860
+ Relative errors in terms of the strength of the data perturbation for geometrical
1861
+ setup displayed in Fig. 8.
1862
+ 26
1863
+
VtE5T4oBgHgl3EQfcA97/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
XNE4T4oBgHgl3EQfNQyg/content/tmp_files/2301.04955v1.pdf.txt ADDED
@@ -0,0 +1,2205 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Characterization of attractors for non-autonomous
2
+ Lotka-Volterra cooperative systems
3
+ Juan Garcia-Fuentes1, Jos´e A. Langa1, Piotr Kalita1,2, Antonio Su´arez1
4
+ 1Departamento de Ecuaciones Diferenciales y An´alisis Num´erico, Universidad de
5
+ Sevilla, Campus Reina Mercedes, 41012, Sevilla, Spain
6
+ 2Faculty of Mathematics and Computer Science, Jagiellonian University, ul.
7
+ �Lojasiewicza 6, 30-348 Krakow, Poland
8
+ E-mail addresses: J.G.-F.: [email protected] J.A.L.: [email protected] P. K.:
9
10
+ January 12, 2023
11
+ Abstract
12
+ In this paper we study the long time behaviour of cooperative n- dimensional non-auto-
13
+ nomous Lotka–Volterra systems from population dynamics. We provide conditions to obtain
14
+ extinction of a given subset of species. We also give sufficient conditions to get existence of
15
+ a globally stable global solution with one species extinct, or with of all species extinct except
16
+ one. Moreover, we obtain the structure of the forwards non-autonomous attractor in one, two,
17
+ and three dimensions by constructing the heteroclinic connections between the globally stable
18
+ solution and the semistables ones in cases of permanence and extinction of species.
19
+ 1
20
+ Introduction
21
+ The Lotka–Volterra system is a classical model of population dynamics representing the behavior
22
+ of species in ecosystems. This model consists of the following n-dimensional system of differential
23
+ equations, in which the unknown ui corresponds to the density of individuals of the i-th species:
24
+ u1
25
+ i “ ui
26
+ ¨
27
+ ˚
28
+ ˚
29
+ ˝aiptq ´ biiptqui ´
30
+ n
31
+ ÿ
32
+ j“1
33
+ j‰i
34
+ bijptquj
35
+ ˛
36
+ ‹‹‚
37
+ for i P t1, ..., nu.
38
+ (1)
39
+ ai determines the intrinsic growth rate of the species i, and bij represents the interaction between
40
+ the species i and j. In particular bii stands for the intrinsic competition of the same species i.
41
+ If bij is negative, then the species j contributes positively to the growth of the species i, and we
42
+ 1
43
+
44
+ 1
45
+ INTRODUCTION
46
+ speak about a cooperative system. Alternatively, if bij is positive, j contributes negatively to the
47
+ growth of i which means that all species compete with the others.
48
+ When these coefficients are constant, the system is autonomous. In such case if the matrix
49
+ B “ pbijqn
50
+ i,j“1 is Volterra–Lyapunov stable (see, for instance, [Tak96]), the full characterization of
51
+ the asymptotic behavior of the solutions of the system is well known. In particular, it is possible to
52
+ give conditions on the coefficients paiqn
53
+ i“1 which guarantee the existence of a globally asymptotically
54
+ stable equilibrium, in which all the species are present, or, on the contrary, conditions for this stable
55
+ equilibrium to possess one or more species extinct. These observations allow to determine the full
56
+ structure of the global attractor associated to (1) [Tak96, Gue17, HS22, AKL22]. However, the
57
+ situation is completely different in the non-autonomous case, i.e., when coefficients depend on
58
+ time, and the corresponding theory is not fully developed, in particular the one related to the
59
+ detailed description of their global attractors. In the present paper we study the non-autonomous
60
+ cooperative Lotka-Volterra system and we give conditions to describe its long time behaviour,
61
+ including the characterization of their attractors in low dimensional cases.
62
+ We briefly recall the most important results obtained for this non-autonomous version of the
63
+ problem.
64
+ In the works of Gopalsamy [Gop86a, Gop86b] the author treat periodic and almost
65
+ periodic functions aiptq and bijptq in competitive framework, i.e.
66
+ bijptq ě 0 for all t P R and
67
+ i ‰ j. Conditions are given to ensure the existence of globally stable solutions with all components
68
+ strictly positive for all time t P R. Ahmad and Lazer develop the study also for the competitive
69
+ case, relaxing the requirement for periodicity or almost periodicity of coefficients, and still obtaining
70
+ the existence of a unique globally stable strictly positive permanent solutions, i.e. with all species
71
+ present [AL95, AL00], or with one of the species extinct [Ahm93, AL98]. On the other hand,
72
+ Redheffer in [Red96] finds some general conditions on the coefficients to get a globally stable
73
+ solution with no restriction on the sign for the interspecific parameters, but only for the case of
74
+ permanence of the system.
75
+ In the first part of this paper we obtain the result, not considered before, providing criteria for
76
+ the extinction of any given subcommunity of species in the cooperative case. The main difficulty
77
+ of the proof was to obtain the decay of the density of species despite the possible cooperation from
78
+ the other species. In Lemma 4.1, we obtain that under the diagonal dominance condition (H) for
79
+ the non-autonomous matrix B “ pbijqn
80
+ i,j“1 and conditions (B), which links matrix B with intrinsic
81
+ growth rates of individual species a “ paiqn
82
+ i“1, densities for a given subcommunity of species decay
83
+ jointly to zero. Condition (B) is a variation of the conditions in [Red96] although we allow some
84
+ of the growth rates aiptq to be also negative. We also prove the existence of a stable solution for
85
+ two particular cases of extinction in the n-dimensional species community: in which all species
86
+ except one become extinct and in the case where only one species becomes extinct. These results
87
+ are contained in Sections 4.3 and 4.4, respectively.
88
+ The feature of the system (1) is, that by setting some of the variables to zero, one obtains,
89
+ for each subset of the community t1, . . . , nu, a smaller system, modeling the dynamics of this sub-
90
+ community, embedded in the original system. Hence, the above results of Redheffer, Ahmad and
91
+ Lazer as well as the ones in our Section 4 allow us to construct the asymptotically stable solu-
92
+ tions for the full community as well as all its subcommunities. Here a natural question appears,
93
+ motivated by recent developments in the theory of attractors for non-autonomous dynamical sys-
94
+ tems [KR11, CLR13, BCL20]: how to describe all solutions which are bounded both in the past
95
+ and future, and how are they related to each other in terms of attraction when time tends to
96
+ plus or minus infinity. This question naturally leads to the study of the geometrical structure of
97
+ non-autonomous attractors, which consist of the globally asymptotically stable solutions, which
98
+ 2
99
+
100
+ 2
101
+ NON-AUTONOMOUS COOPERATIVE LOTKA–VOLTERRA SYSTEM AND
102
+ EXISTENCE OF GLOBAL SOLUTIONS
103
+ were the main interest to previous researchers analysing (1), asymptotically stable solutions for
104
+ the subcommunities, and heteroclinic connections between them. By the theory of exponential
105
+ dichotomies for the linearized systems (see Section 2), based in [BP15] for dichotomies for upper
106
+ triangular systems, and the non-autonomous versions of the Hadamard–Perron theorem on the
107
+ existence of local stable and unstable manifolds [CLR13, KR11] we are able to construct the het-
108
+ eroclinic connections between various stable and semi-stable (i.e. stable for the subsystems of the
109
+ original systems) solutions. We also prove that all other solutions must be unbounded in the past.
110
+ Thus, we show in Sections 5, 6, and 7 the complete structure of the non-autonomous attractor
111
+ for various cases of extinction and persistence, for one, two, and three dimensions, respectively.
112
+ Observe that the detailed description of a non-autonomous attractor is always a very difficult task,
113
+ and we have just a few very recent papers on this subject (such as [CRLO23]). However, thanks
114
+ to the previous results, we construct the full structure of the forward (and pullback) attractor for
115
+ a non-autonomous problem governed by a system differential equations.
116
+ 2
117
+ Non-autonomous cooperative Lotka–Volterra system and
118
+ existence of global solutions
119
+ 2.1
120
+ Lotka–Volterra system
121
+ We use the following convention for the functions defined on the real line: aL “ inftPR aptq,
122
+ aU “ suptPR aptq. Moreover, for two such functions a, b we will say that a ą b if aptq ą bptq for
123
+ t P R and likewise we define the non-sharp inequalities a ě b.
124
+ We will consider the following n-dimensional cooperative Lotka–Volterra system.
125
+ u1
126
+ i “ ui
127
+ ˆ
128
+ aiptq ´
129
+ n
130
+ ÿ
131
+ j“1
132
+ bijptquj
133
+ ˙
134
+ ,
135
+ (LV-n)
136
+ for i “ 1, ..., n, where aiptq and bijptq are continuous real-valued functions. Assume that the system
137
+ is cooperative, i.e. bijptq ď 0 for i ‰ j, and biiptq ą 0 for all t P R, and for i “ 1, ..., n. Moreover,
138
+ we make the following standing assumption of the column diagonal dominance
139
+ ˜
140
+ cibii `
141
+ n
142
+ ÿ
143
+ j“1,j‰i
144
+ cjbij
145
+ ¸L
146
+ ě δ ą 0
147
+ for all i “ 1, ..., n,
148
+ (H)
149
+ for some positive constants tciun
150
+ i“1.
151
+ 2.2
152
+ Existence of global attracting solution. Case of permanence
153
+ We recall the result in [Red96] which provides conditions for the existence of a positive solution
154
+ u˚ “ pu˚
155
+ 1, ..., u˚
156
+ nq, isolated from zero and infinity, which is forwards globally attractive for all
157
+ trajectories with positive initial data upt0q ą 0.
158
+ We need the following assumption: there exist positive vectors d ą 0 and d ą 0 such that
159
+ ¯dibii ď ai ď dibii `
160
+ ÿ
161
+ j‰i
162
+ djbij
163
+ for all i “ 1, ..., n.
164
+ (A)
165
+ The following result comes from Redheffer ([Red96, Theorem 1 (ii), (v), and (vi)]):
166
+ 3
167
+
168
+ 2
169
+ NON-AUTONOMOUS COOPERATIVE LOTKA–VOLTERRA SYSTEM AND
170
+ EXISTENCE OF GLOBAL SOLUTIONS
171
+ Theorem 2.1. Assume (A) and (H). Then there exists a unique complete positive trajectory u˚
172
+ separated from zero and infinity. This trajectory satisfies ¯di ď u˚
173
+ i ď di for every t P R. Moreover,
174
+ for every solution u of (LV-n) such that upt0q ą 0 the following convergence holds
175
+ lim
176
+ tÑ8 |uptq ´ u˚ptq| Ñ 0.
177
+ The following result establishes Lipschitz continuous dependence on initial data for forward
178
+ bounded solutions.
179
+ Lemma 2.2. Let two solutions u and v with the initial data at t0 be bounded for t ě t0. Assume
180
+ that |ai|, |bij| are bounded by a constant independent of time. Then there exists 0 ă κ (depending
181
+ on the bounds on the coefficients and both solutions) such that
182
+ |upt0 ` tq ´ vpt0 ` tq| ď eκt|upt0q ´ vpt0q| for t ě 0.
183
+ Proof. We skip the proof which follows in a standard way from the Gronwall lemma and estimation
184
+ of the difference of two solutions.
185
+ If the solutions are separated from zero, a stronger result holds under the diagonal dominance
186
+ assumption (H). The following lemma is proved in [Red96, Lemma 8].
187
+ Lemma 2.3. Assume (H) and let u, v be two solutions of (LV-n) such that there exist positive
188
+ constants σ1, σ2 ą 0 with σ1 ď uipτq, vipτq ď σ2 for every τ ě t0 and i P t1, . . . , nu. Then
189
+ |upt0 ` tq ´ vpt0 ` tq| ď σ2
190
+ σ1
191
+ |upt0q ´ vpt0q|e´δσ1t,
192
+ for every t ě 0.
193
+ 2.3
194
+ Existence of global solution. Case of extinction
195
+ We provide a generalized version of the above condition (A) for which there exists the global
196
+ solution consisting of zeros on a subset of indexes denoted by J and far from zero and infinity
197
+ on the remaining subset of indexes, denoted by I. Namely, we replace (A) with the following
198
+ hypothesis
199
+ 0 ă ¯dibii ď ai ď dibii `
200
+ ÿ
201
+ j‰i,jPI
202
+ djbij
203
+ for all i P I Ă t1, ..., nu,
204
+ (AI)
205
+ for positive vectors pdjqjPI and pdjqjPI.
206
+ As an application of Theorem 2.1 we have the next result. If the indexes are subdivided into
207
+ two disjoint sets I and J, it is possible to assume that zero is a solution on the set J. Observe
208
+ that (H) holds for any subset of indexes.
209
+ Theorem 2.4. If (H) and (AI) hold, then there exists a complete trajectory u˚ of the (LV-n)
210
+ such that u˚
211
+ i ” 0 for i P J “ t1, . . . , nuzI and di ď u˚
212
+ i ď di for i P I. For every solution u of
213
+ (LV-n) such that uipt0q ą 0 for i P I and uipt0q “ 0 for i P J the following convergence holds
214
+ lim
215
+ tÑ8 |uptq ´ u˚ptq| Ñ 0.
216
+ 4
217
+
218
+ 3
219
+ EXPONENTIAL DICHOTOMIES AND LINEARIZATION
220
+ Remark 1. If J is nonempty we call the solution semitrivial, as it is equal to zero on some
221
+ coordinates. Observe that if (A) holds then (AI) holds for every set of indexes I. In the same way,
222
+ if (AI) holds, then the same condition is satisfied on any subset of I. Note that while Theorem 2.1
223
+ gives the convergence of solutions with nonzero initial data for all coordinates, in above theorem
224
+ we only have convergence for nonzero initial data on coordinates indexed by I. We will provide
225
+ conditions which guarantee that solutions with all nonzero initial data also converge towards the
226
+ semitrivial solution with some of the species (indexed by J) extinct.
227
+ 3
228
+ Exponential dichotomies and linearization
229
+ 3.1
230
+ Exponential dichotomies for upper triangular systems
231
+ We will consider the following linear nonautonomous system of ODE’s
232
+ x1ptq “ Dptqxptq,
233
+ (2)
234
+ where D : R Ñ Rnˆn is continuous and bounded, i.e. suptPR }Dptq} ď M, where M is a positive
235
+ constant. The solutions of this system of ODE’s, with the initial condition xpt0q “ x0 are given by
236
+ the multiplication of the initial data by the following fundamental matrix xptq “ MDpt, t0qx0. This
237
+ fundamental matrix is invertible and if t ă t0, then MDpt, t0q “ MDpt0, tq´1. When t0 “ 0, we
238
+ use the notation MDpt, 0q “ MDptq. Then MDpt, sq “ MDptqMDpsq´1. Moreover the fundamental
239
+ matrix satisfies the following variational ODE M 1
240
+ Dptq “ DptqMDptq for every t P R with the initial
241
+ data MDp0q “ I.
242
+ Definition 3.1. We say that the system (2) has an exponential dichotomy on an interval I with
243
+ projection P : I Ñ Rnˆn, constant k ě 1 and exponents α, β ą 0 if the fundamental matrix satisfies
244
+ the invariance property
245
+ PptqMDpt, sq “ MDpt, sqPpsq for all t, s P I,
246
+ (3)
247
+ and we have the inequalities
248
+ }MDpt, sqPpsq} ď ke´αpt´sq for all s ď t P I,
249
+ (4)
250
+ }MDpt, sqpI ´ Ppsqq} ď keβpt´sq for all t ď s P I.
251
+ (5)
252
+ Typically I “ R, I “ r0, 8q or I “ p´8, 0s. In each of these cases if we substitute s “ 0 in
253
+ (3) we obtain PptqMDptq “ MDptqPp0q, and hence Pptq “ MDptqPp0qMDptq´1, so we can recover
254
+ Pptq from Pp0q and the fundamental matrix. We denote Pp0q “ P. Substituting s “ t in (4) we
255
+ obtain }Pptq} ď k. This means that if system (2) has an exponential dichotomy, then }Pptq} is
256
+ bounded uniformly with respect to t P I, and hence the moduli of all entries of the matrix Pptq
257
+ must be also bounded. If I “ R then the projection P is given uniquely, cf. [Cop78, page 19]. If
258
+ I “ R´, then P in the definition of the dichotomy can be replaced by any other projection with
259
+ the same kernel, cf. [BF20, Proposition 2], and if I “ R`, then P can be replaced by any other
260
+ projection with the same range. If the equation has the dichotomy on R` and R´ with the same
261
+ projection P and exponents then it also has the dichotomy on R with the same projection and
262
+ exponents, cf. [BF20, Proposition 1] or [Cop78, page 19].
263
+ 5
264
+
265
+ 3
266
+ EXPONENTIAL DICHOTOMIES AND LINEARIZATION
267
+ We recall the results of [BP15] on upper triangular systems. We will consider the problem
268
+ governed by the system
269
+ ˆ
270
+ xptq
271
+ yptq
272
+ ˙1
273
+
274
+ ˆ
275
+ Aptq
276
+ Cptq
277
+ 0
278
+ Bptq
279
+ ˙ ˆ
280
+ xptq
281
+ yptq
282
+ ˙
283
+ ,
284
+ (6)
285
+ assuming that Aptq, Bptq, Cptq are bounded and continuous. We discuss the relation between the
286
+ fact that the smaller systems governed by the matrices given by the diagonal blocks x1ptq “ Aptqxptq
287
+ and y1ptq “ Bptqyptq have the dichotomies, with the fact that (6) has the exponential dichotomy.
288
+ We cite the following result, cf [BP15, Corollary 1]
289
+ Corollary 3.2. Assume that the linear systems x1ptq “ Aptqxptq and y1ptq “ Bptqyptq have ex-
290
+ ponential dichotomies on R, where Aptq P Rdˆd and Bptq P Rpn´dqˆpn´dq, and Cptq is piecewise
291
+ continuous and bounded d ˆ pn ´ dq matrix. Then (6) has the exponential dichotomy on R.
292
+ The projection P for (6) can be constructed in the following way.
293
+ First we construct the
294
+ projections for the dichotomies on R´ and R` in the following way, cf. [BP15, Theorem 1]
295
+ P ` “
296
+ ˆ
297
+ P A
298
+ L`P B
299
+ 0
300
+ P B
301
+ ˙
302
+ on R`
303
+ P ´ “
304
+ ˆ
305
+ P A
306
+ L´pIn´d ´ P Bq
307
+ 0
308
+ P B
309
+ ˙
310
+ on R´,
311
+ (7)
312
+ where P A and P B are the projections for systems with Aptq and Bptq respectively, and L`, L´
313
+ are the linking operators given by
314
+ L` “ ´
315
+ ż 8
316
+ 0
317
+ MApsq´1pId ´ P ApsqqCpsqMBpsq ds,
318
+ L´ “
319
+ ż 0
320
+ ´8
321
+ MApsqP ApsqCpsqMBpsq´1 ds.
322
+ Next, we construct the unique projection P, such that its kernel coincides with the kernel of P ´
323
+ and its range with the range of P `. This projection gives the dichotomy on R.
324
+ 3.2
325
+ Linearization of nonautonomous Lotka–Volterra system
326
+ Assume that pu˚
327
+ 1ptq, u˚
328
+ 2ptq, . . . , u˚
329
+ kptq, 0, . . . , 0q is a solution of (LV-n), such that u˚
330
+ i are separated
331
+ from zero and infinity for i P t1, . . . , ku. We consider the linearized system around this solution.
332
+ Denoting u˚
333
+ j “ 0 for j P tk ` 1, . . . , nu and wi “ ui ´ u˚
334
+ i we obtain the system of differential
335
+ equations
336
+ w1
337
+ iptq “ aiptqwiptq ´ u˚
338
+ i ptq
339
+ n
340
+ ÿ
341
+ j“1
342
+ bijptqwjptq ´ wiptq
343
+ kÿ
344
+ j“1
345
+ bijptqu˚
346
+ j ptq ´
347
+ n
348
+ ÿ
349
+ j“1
350
+ bijptqwjptqwiptq.
351
+ (8)
352
+ The above system can be written as w1ptq “ Mptqwptq ` Rpwptq, tq, where R is a remainder,
353
+ quadratic with respect to w. Dropping this quadratic term we get the linearized system v1ptq “
354
+ Mptqvptq, where the unknown is now denoted by v. The system has the following block diagonal
355
+ form
356
+ v1ptq “
357
+ ˆ
358
+ Aptq
359
+ Cptq
360
+ 0
361
+ Bptq
362
+ ˙
363
+ vptq,
364
+ (9)
365
+ 6
366
+
367
+ 4
368
+ ASYMPTOTIC STABILITY FOR SOLUTIONS WITH EXTINCTION
369
+ where Aptq is k ˆ k matrix with entries given by aiiptq “ aiptq ´ řk
370
+ j“1 bijptqu˚
371
+ j ptq ´ biiptqu˚
372
+ i ptq
373
+ and aijptq “ ´bijptqu˚
374
+ i ptq for j ‰ i. The matrix Bptq is an pn ´ kq ˆ pn ´ kq diagonal matrix
375
+ with ciiptq “ aiptq ´ řk
376
+ j“1 bijptqu˚
377
+ j ptq. Finally, Cptq in an k ˆ pn ´ kq matrix with entries given by
378
+ cijptq “ ´u˚
379
+ i ptqbijptq.
380
+ The following Lemma, which has been proved in [AL98, Lemma 3.6], states that the system
381
+ with the matrix Aptq always has the exponential dichotomy with P “ I.
382
+ Lemma 3.3. Assume the diagonal dominance condition (H). Let u˚ptq be a positive solution
383
+ of (LV-n) separated from zero and infinity, and let Aptq “ paijptqq be an n ˆ n matrix of the
384
+ system linearized around u˚ptq, that is aiiptq “ aiptq ´ řn
385
+ j“1 bijptqu˚
386
+ j ptq ´ biiptqu˚
387
+ i ptq and aijptq “
388
+ ´bijptqu˚
389
+ i ptq for j ‰ i. Let be MAptq will be a fundamental matrix of the system v1ptq “ Aptqvptq,
390
+ that is
391
+ M 1
392
+ Aptq “ AptqMAptq,
393
+ MAp0q “ I.
394
+ There exist constants K ą 0 and γ ą 0 such that
395
+ }MApt, sq} “ }MAptqM ´1
396
+ A psq} ď Ke´γpt´sq
397
+ for ´8 ă s ď t ă 8.
398
+ Of course the above lemma remains valid if the dimension n is replaced with smaller numer k,
399
+ then the linear stability holds in the k dimensional subspace.
400
+ 4
401
+ Asymptotic stability for solutions with extinction
402
+ 4.1
403
+ Extinction conditions for a given subset of species
404
+ In this section we present the assumptions on ai and bij which enable the possibility of splitting the
405
+ set t1, . . . , nu into the sum of two disjoint sets of indexes I and J. For any initial data upt0q ą 0
406
+ the species indexed by J go to extinction, that is, uiptq Ñ 0 when t Ñ 8 for i P J and uiptq is
407
+ separated from zero forward in time when i P I. We impose the following condition.
408
+ #
409
+ bii ¯di ` ε ď ai ď biidi ` řn
410
+ j“1,j‰i bijpdj ` θcjq ´ ε for i P I
411
+ ai ď řn
412
+ j“1,j‰i bijpdj ` θcjq ´ ε for i P J
413
+ (B)
414
+ for some positive vectors d, ¯d ą 0, and positive numbers ε, θ ą 0. The constants cj appear in (H).
415
+ Note that if i P J, then aU
416
+ i ď ´ε, and if i P I then aL
417
+ i ě ε. Hence ai is negative and separated
418
+ from zero for i P J and positive and separated from zero for i P I.
419
+ The proof of the following result is the generalization to n dimensions of the result of Ahmad
420
+ [Ahm93, Lemma 2], where the two dimensional problem is considered and both sets I and J consist
421
+ of a single index.
422
+ Lemma 4.1. If (B) and (H) hold then for every solution u of (LV-n) such that upt0q ą 0 there
423
+ exists t˚ ą t0 such that for every t ě t˚
424
+ • ¯di ă uiptq ă di for i P I,
425
+ • uiptq ă di for i P J.
426
+ 7
427
+
428
+ 4
429
+ ASYMPTOTIC STABILITY FOR SOLUTIONS WITH EXTINCTION
430
+ Proof. Step 1. We first prove that for every i P I there exists ti “ tpiq such that uiptq ą ¯di for
431
+ every t ě ti. First suppose that there exists t ě t0 such that uiptq ą di. We prove that uipsq ą di
432
+ for every s ě t. Indeed assume that uipsq ď di for some s ą t. Define r “ mintr ě t : uiprq “ diu.
433
+ On one hand it must be 9uiprq ď 0. On the other hand
434
+ u1
435
+ iprq “ di
436
+ ˜
437
+ aiprq ´ biiprqdi ´
438
+ n
439
+ ÿ
440
+ j“1,j‰i
441
+ bijprqujprq
442
+ ¸
443
+ ě diε,
444
+ a contradiction. Now assume that there exists t ą t0 such that uipsq ď ¯di for every s ě t. Then
445
+ we would have
446
+ u1
447
+ ipsq
448
+ uipsq “ aipsq ´ biipsquipsq ´
449
+ n
450
+ ÿ
451
+ j“1,j‰i
452
+ bijpsqujpsq ą aipsq ´ biipsq ¯di ě ε ą 0
453
+ for every s ě t. This implies that uipsq Ñ 8 as s Ñ 8, so we have a contradiction.
454
+ Step 2. Define the sets
455
+ Ak “ r0, d1 ` kθc1q ˆ r0, d2 ` kθc2q ˆ ... ˆ r0, dn ` kθcnq for k ě 0.
456
+ (10)
457
+ We first prove that if u0 P Ak, then uptq P Ak for all t ě t0, i.e. the sets Ak are positively invariant.
458
+ Assume that this is not the case, i.e. upt0q P Ak and for some t ě t0 uptq R Ak. Then there must
459
+ exist s ą t0 and an index i such that uipsq “ di ` kθci and 9uipsq ě 0, and ujpsq ď dj ` kθcj for
460
+ j ‰ i. We calculate
461
+ aipsq ě biipsquipsq `
462
+ n
463
+ ÿ
464
+ j“1,j‰i
465
+ bijpsqujpsq “ biipsqcikθ ` biipsqdi `
466
+ n
467
+ ÿ
468
+ j“1,j‰i
469
+ bijpsqujpsq
470
+ ě biipsqcikθ ` biipsqdi `
471
+ n
472
+ ÿ
473
+ j“1,j‰i
474
+ bijpsqdj `
475
+ n
476
+ ÿ
477
+ j“1,j‰i
478
+ bijpsqcjkθ
479
+ “ biipsqdi `
480
+ n
481
+ ÿ
482
+ j“1,j‰i
483
+ bijpsqdj ` θk
484
+ ˜ n
485
+ ÿ
486
+ j“1
487
+ cjbijpsq
488
+ ¸
489
+ ą biipsqdi `
490
+ n
491
+ ÿ
492
+ j“1,j‰i
493
+ bijpsqdj ą biipsqdi `
494
+ n
495
+ ÿ
496
+ j“1,j‰i
497
+ bijpsqpdj ` θcjq.
498
+ Now if i P I, we directly get the contradiction with (B), and if i P J, then the above computation
499
+ implies that
500
+ aipsq ą
501
+ n
502
+ ÿ
503
+ j“1,j‰i
504
+ bijpsqpdj ` θcjq,
505
+ and we arrive at the contradiction with (B), too.
506
+ Step 3. Now let k ě 0. We prove that if uptq P Ak`1 then there exists s ą t such that
507
+ upsq P Ak. To this end, it is enough to show, that if uptq P Ak`1zAk, then there exists s ą t such
508
+ that upsq P Ak.
509
+ 8
510
+
511
+ 4
512
+ ASYMPTOTIC STABILITY FOR SOLUTIONS WITH EXTINCTION
513
+ Step 3.1. We first prove that if ujptq ă dj ` pk ` 1qθcj for every j P t1, . . . , nu and every
514
+ t ě t0, then for every i P t1, . . . , nu there exists s ą t0 such that uipsq ă di ` kθci. To this end
515
+ suppose that uiptq ě di ` kθci for all t ě t0. Then for every t ě t0
516
+ uiptq “ uipt0q exp
517
+ ˜ż t
518
+ t0
519
+ aiprq ´ biiprquiprq ´
520
+ n
521
+ ÿ
522
+ j“1,j‰i
523
+ bijprqujprq dr
524
+ ¸
525
+ ď uipt0q exp
526
+ ˜ż t
527
+ t0
528
+ aiprq ´ biiprqdi ´ biiprqcjkθ ´
529
+ n
530
+ ÿ
531
+ j“1,j‰i
532
+ bijprqpdj ` pk ` 1qθcjq dr
533
+ ¸
534
+ “ uipt0q exp
535
+ ˜ż t
536
+ t0
537
+ aiprq ´ biiprqdi ´
538
+ n
539
+ ÿ
540
+ j“1,j‰i
541
+ bijprqpdj ` θcjq ´ kθ
542
+ n
543
+ ÿ
544
+ j“1
545
+ bijprqcj dr
546
+ ¸
547
+ ď uipt0q exp
548
+ ˜ż t
549
+ t0
550
+ aiprq ´ biiprqdi ´
551
+ n
552
+ ÿ
553
+ j“1,j‰i
554
+ bijprqpdj ` θcjq dr
555
+ ¸
556
+ If i P I, then, by (B), uiptq ď uipt0q expp´εpt ´ t0qq, a contradiction with uiptq ě di ` kθci for
557
+ every t ě t0. If i P J, then as biiprqdi ą 0, it follows by (B) that also uiptq ď uipt0q expp´εpt ´ t0qq
558
+ and we arrive at the same contradiction.
559
+ Step 3.2. We now show that if for some t and for some i we have uiptq ă di ` kθci and for
560
+ every s ě t and every j P t1, . . . , nu we have ujpsq ă dj ` pk ` 1qθcj, then for every s ě t we also
561
+ have uipsq ă di ` kθci. Assume the contrary, then there exists t˚ ą t such that uipt˚q “ di ` kθci
562
+ and 9uipt˚q ě 0. This means that
563
+ aipt˚q ě biipt˚quipt˚q `
564
+ n
565
+ ÿ
566
+ j“1,j‰i
567
+ bijpt˚qujpt˚q
568
+ ě biipt˚qdi ` biipt˚qkθci `
569
+ n
570
+ ÿ
571
+ j“1,j‰i
572
+ bijpt˚qdj `
573
+ n
574
+ ÿ
575
+ j“1,j‰i
576
+ bijpt˚qpk ` 1qθcj
577
+ “ biipt˚qdi ` kθ
578
+ n
579
+ ÿ
580
+ i“1
581
+ biipt˚qci `
582
+ n
583
+ ÿ
584
+ j“1,j‰i
585
+ bijpt˚qpdj ` θcjq
586
+ ě biipt˚qdi `
587
+ n
588
+ ÿ
589
+ j“1,j‰i
590
+ bijpt˚qpdj ` θcjq.
591
+ Now if i P I we immediately get the contradiction with (B), and if i P J the last estimate implies
592
+ that aipt˚q ě řn
593
+ j“1,j‰i bijpt˚qpdj ` θcjq which also, by (B) leads to a contradiction which ends the
594
+ proof of Step 3.
595
+ Step 4. For every initial condition u0 “ pu1pt0q, u2pt0q, ..., unpt0qq ą 0 there exists some k ě 0
596
+ such that u0 P Ak, so, repeating the process above, we know that there exists some t˚ such that
597
+ upt˚q P A0, and then
598
+ uiptq ă di
599
+ for every i “ 1, ..., N and every t ě t˚.
600
+ Remark 2. Redheffer in [Red96, Lemma 5] obtains a similar result. However, note that we do
601
+ 9
602
+
603
+ 4
604
+ ASYMPTOTIC STABILITY FOR SOLUTIONS WITH EXTINCTION
605
+ not need that
606
+ n
607
+ ÿ
608
+ j“1
609
+ bijptqdj ą 0 for i P J.
610
+ The diagonal dominance condition (H) holds with constants cj, but it does not have to hold with
611
+ the constants dj, by which bij and aj relate.
612
+ Lemma 4.2. Assume (H) and (B).
613
+ Let u “ pu1, u2, ..., unq be solution of (LV-n) such that
614
+ uipt0q ą 0 for i “ 1, .., n. If i P J then ui Ñ 0 when t Ñ 8.
615
+ Proof. From Lemma 4.1 it follows that there exists t˚ ě t0 such that for every t ě t˚, we have
616
+ uiptq ă di for i “ 1, ..., n. Then, if only k P J
617
+ ˆukptq “ ˆukpt˚q exp
618
+ ˜ż t
619
+ t˚ akpsq ´
620
+ n
621
+ ÿ
622
+ j“1
623
+ bkjpsqujpsqds
624
+ ¸
625
+ ď dk exp
626
+ ˜ż t
627
+ t˚ akpsq ´
628
+ n
629
+ ÿ
630
+ j“1,j‰k
631
+ bkjpsqdj ds
632
+ ¸
633
+ ď dk exp p´εpt ´ t˚qq Ñ 0,
634
+ whence ukptq Ñ 0 as t Ñ 8.
635
+ 4.2
636
+ Backward unboundedness of solutions in case of extinction
637
+ In this subsection we prove that if the set J is not empty, then any solution with all positive initial
638
+ data must be backward unbounded.
639
+ Lemma 4.3. Assume (H) and (B) and let J be nonempty. Every solution u of (LV-n) with the
640
+ initial condition upt0q ą 0 is backward unbounded.
641
+ Proof. We take a solution u with the initial condition upt0q P A0, where A0 is given by (10) with
642
+ k “ 0. We take i P J, then
643
+ u1
644
+ i “ ui
645
+ ˆ
646
+ ai ´ biiui ´
647
+ ÿ
648
+ j‰i
649
+ bijuj
650
+ ˙
651
+ ď ui
652
+ ˆ
653
+ ai ´
654
+ ÿ
655
+ j‰i
656
+ bijdj
657
+ ˙
658
+ ´ biiu2
659
+ i ď ui
660
+ ˆ ÿ
661
+ j‰i
662
+ bijcjθ ´ ε
663
+ ˙
664
+ ´ biiu2
665
+ i ď ´εui.
666
+ Since A0 is positively invariant, the straightforward application of the Gronwall lemma yields
667
+ together with the fact that upt0q P A0
668
+ di ě uipt0q ě uiptqeεpt´t0q.
669
+ We deduce that there exists t˚
670
+ 0 such that upt˚
671
+ 0q R A0, otherwise we would get a contradiction by
672
+ passing with t0 Ñ ´8.
673
+ Now we suppose that the solution has the initial condition upt0q P Ak`1zAk. We are going to
674
+ prove that there exists t˚ ď t0 such that, upt˚q P Ak`2zAk`1, and then we would get the backward
675
+ unboundedness of the solution by iteration. For contradiction assume that for every t ď t0 we have
676
+ uptq P Ak`1. Then, as every set in family tAkukě0 is positively invariant, for every t ď t0 uptq R Ak,
677
+ and, arguing as in Step 3.2 of Lemma 4.1 there exists i P t1, 2, ..., nu such that uiptq ě di ` kθci
678
+ for every t ď t0.
679
+ 10
680
+
681
+ 4
682
+ ASYMPTOTIC STABILITY FOR SOLUTIONS WITH EXTINCTION
683
+ Suppose that i P I. We prove that it must be 9uiptq ď ´ε for every t ď t0. Indeed, if there
684
+ exists t1 ď t0 such that the opposite inequality holds, then at that time
685
+ ai ą biiui`
686
+ ÿ
687
+ j‰i
688
+ bijuj´ε ě biidi`biikθci`
689
+ ÿ
690
+ j‰i
691
+ pbijdj`bijkθcj`bijθcjq´ε ě biidi`
692
+ ÿ
693
+ j‰i
694
+ bijpdj`θcjq´ε
695
+ and we get a contradiction with (B). Then, there exists t˚ ď t0 such that uipt˚q ě di ` pk ` 2qθci
696
+ so it can not be uptq P Ak`1 for all the time in the past, a contradiction.
697
+ Analogous argument with i P J yields the inequality
698
+ ai ą
699
+ ÿ
700
+ j‰i
701
+ bijdj ` bijθcj ´ ε,
702
+ which also leads to a contradicion.
703
+ 4.3
704
+ The case of extinction of all species except one
705
+ We have given conditions which guarantee the extinction of given a subset of species.
706
+ In this
707
+ section we study the asymptotic behavior of the persistent species indexed by I. We prove that,
708
+ as time goes to infinity, the quantities of these species tend to the unique separated from zero and
709
+ infinity solutions of the subsystem given by the equations with index I. We start from the situation
710
+ when only one species persists. Hence, we provide the conditions over the vector aptq so that the
711
+ trajectory pu˚
712
+ 1, 0, ..., 0q is the global attractive solution of the system (LV-n). The function u˚
713
+ 1 is
714
+ the solution of the logistic equation
715
+ 9u1ptq “ u1ptqpa1ptq ´ b11ptqu1ptqq
716
+ separated from zero and infinity, which, by Theorem 2.1 is unique under assumptions (B1) below
717
+ (which implies (B) for one dimensional system) and (H). Hence, we need to impose (H) and the
718
+ version of (B) with I “ t1u and J “ t2, . . . , nu, namely we assume that there exists a number
719
+ d1 ą 0, a vector d ą 0, and two numbers ε, θ ą 0 such that,
720
+ #
721
+ b11 ¯d1 ` ε ď a1 ď b11d1 ` řn
722
+ j“2 b1jpdj ` cjθq ´ ε
723
+ ai ď řn
724
+ j“1,j‰i bijpdj ` cjθq ´ ε for i “ 2, ..., n
725
+ (B1)
726
+ We skip the proof of the following result which exactly follows the lines of the proof of [Ahm93,
727
+ Lemma 4], where, however, only two species, one that persists and one that decays, are considered.
728
+ Lemma 4.4. Assume (B1) and (H). Let be pu1, u2, ..., unq a solution of (LV-n) such that ¯d1 ă
729
+ u1pt0q ă d1 and 0 ă uipt0q ă di for every i “ 2, ..., n, then u˚
730
+ 1 ´ u1 Ñ 0 as time tends to infinity.
731
+ Finally, combining the above lemma with Lemma 4.1 and Lemma 4.2 we have the following
732
+ result on the asymptotic behavior.
733
+ Theorem 4.5. Supposse the hypothesis (H) and (B1) and let |b1j|U ă 8 for j “ t2, ..., nu, if
734
+ pu1, u2, ..., unq is a solution with the initial conditions uipt0q ą 0 for i “ 1, ..., n, then ui Ñ 0 for
735
+ i “ 2, ..., n and u1 ´ u˚
736
+ 1 Ñ 0 as time tends to infinity.
737
+ Proof. By Lemma 4.1, we can choose t˚ as the initial time, where ¯d1 ă u1pt˚q ă d1 and 0 ă
738
+ uipt˚q ă di for i “ 2, ..., n. Then, by Lemma 4.4, we have that u1ptq ´ u˚
739
+ 1ptq Ñ 0 and by Lemma
740
+ 4.2 we deduce uiptq Ñ 0 when t Ñ 8 for i “ 2, ..., n.
741
+ 11
742
+
743
+ 4
744
+ ASYMPTOTIC STABILITY FOR SOLUTIONS WITH EXTINCTION
745
+ 4.4
746
+ The case of extinction of one species
747
+ We continue with the analysis of the case when only one species goes to extinction.
748
+ Hence,
749
+ we provide the conditions on the coefficients aiptq, bijptq which guarantee that the trajectory
750
+ pu˚
751
+ 1, u˚
752
+ 2, ..., u˚
753
+ n´1, 0q is the global attractive solution when t Ñ 8 for (LV-n), and where pu˚
754
+ 1, u˚
755
+ 2, ..., u˚
756
+ n´1q
757
+ is the solution of the Lotka–Volterra pn ´ 1q-dimensional system obtained by removing the last
758
+ variable.
759
+ We need to impose again (H) and the version of (B) with I “ t1, ..., n ´ 1u and J “ tnu,
760
+ namely the existence of vectors d, ¯d P Rn and parameters θ, ε ą 0 such that
761
+ #
762
+ bii ¯di ` ε ď ai ď biidi ` řn
763
+ j“1;j‰i bijpdj ` cjθq ´ ε
764
+ for
765
+ i “ 1, ..., n ´ 1
766
+ an ď řn´1
767
+ j“1 bnjpdj ` cjθq ´ ε
768
+ (B2)
769
+ for every t P R.
770
+ Lemma 4.6. Assume (H) and (B2). Let be ¯u be a solution of an pn ´ 1q-dimensional Lotka–
771
+ Volterra system obtained by setting the last variable to zero (un “ 0), with the initial data ¯upt0q ą 0.
772
+ There exists a unique solution u˚ of pn ´ 1q-dimensional system, which is separated from zero and
773
+ infinity and such that
774
+ |¯uptq ´ u˚ptq| Ñ 0
775
+ when
776
+ t Ñ 8
777
+ and
778
+ ¯di ď u˚
779
+ i ptq ď di
780
+ for i “ 1, ..., n ´ 1, and for all t P R.
781
+ Proof. We use Theorem 2.1 for dimension pn ´ 1q.
782
+ Lemma 4.7. Assume (H) and (B2) and let |bin|U ă 8 for i P t1, . . . , n ´ 1u.
783
+ Let u˚ “
784
+ pu˚
785
+ 1, u˚
786
+ 2, ..., u˚
787
+ n´1q be the solution of pn ´ 1q-dimensional Lotka–Volterra system given by Lemma
788
+ 4.6 and let ˆu “ pu˚
789
+ 1, u˚
790
+ 2, ..., u˚
791
+ n´1, 0q. There exists a constant δ ą 0 such that if for some t0 P R we
792
+ have |ˆupt0q ´ u0| ă δ, then limtÑ8 |ˆuptq ´ uptq| “ 0 where u solves (LV-n) with upt0q “ u0.
793
+ Proof. We start by studying the system linearized around ˆu “ pu˚
794
+ 1, ..., u˚
795
+ n´1, 0q. We write
796
+ wptq “ uptq ´ ˆuptq
797
+ where uptq is a solution with the initial condition in a neighbourhood of ˆu. Then we obtain
798
+ w1ptq “ Mptqwptq ` Rpwptq, tq,
799
+ where Mptq and Rpw, tq are as in (8). The linearized system has the form (9) with Cptq being an
800
+ pn ´ 1q ˆ 1 which is bounded from the bound on bin. Moreover Bptq is 1 ˆ 1 matrix with its entry
801
+ given by anptq´řn´1
802
+ j“1 bn,jptqu˚
803
+ j ptq. We observe that the one dimensional system v1
804
+ n “ Bptqvn has an
805
+ exponential dichotomy with projection Pptq “ 1 since by (B2), it holds Bptq ď ´ε ă 0. Moreover,
806
+ by Lemma 3.3, the system pv1, ..., vn´1q1 “ Aptqpv1, ..., vn´1q has an exponential dichotomy with
807
+ Pptq “ Ipn´1qˆpn´1q, the pn ´ 1q ˆ pn ´ 1q identity.
808
+ Hence, by Corollary 3.2 and results of [BP15] recalled in Section 3 the linearized system (9)
809
+ admits an exponential dichotomy with the projection given by P “ Inˆn. Is easy to see that the
810
+ time dependent projection Pptq is given by Pptq “ Mpt, 0qPMp0, tq “ Inˆn. So
811
+ |vptq| ď K|vpsq|e´γpt´sq
812
+ for all
813
+ t, s P R,
814
+ 12
815
+
816
+ 5
817
+ STRUCTURE OF THE ATTRACTOR FOR NON-AUTONOMOUS LOGISTIC
818
+ EQUATION
819
+ for some constants K, γ ą 0, and by [Cop65, page 70] we get the local asymptotic stability of pu
820
+ given in the assertion of the lemma.
821
+ In the next result we establish the global asymptotic stability. We skip the proof because it
822
+ exactly follows the lines of [AL98, Theorem 2.3].
823
+ Theorem 4.8. Assume (H) and (B2) and let |bij|U ă 8 and |ai|U ă 8 for i, j P t1, . . . , nu. Let
824
+ be u a solution of (LV-n) such that upt0q ą 0. Then
825
+ lim
826
+ tÑ8 |uptq ´ ˆuptq| Ñ 0
827
+ where ˆu “ pu˚
828
+ 1, ..., u˚
829
+ n´1, 0q, pu˚
830
+ 1, ..., u˚
831
+ n´1q being the globally asymptotically stable positive solution
832
+ solution of pn ´ 1q-dimensional system given in Lemma 4.6.
833
+ 5
834
+ Structure of the attractor for non-autonomous logistic
835
+ equation
836
+ We start from the analysis for the non-autonomous problem in one dimension.
837
+ Although the
838
+ results of this section are mostly known, we need them for the study of problems in two and three
839
+ dimensions. Thus, the aim of this chapter is the study of
840
+ u1ptq “ uptqpaptq ´ bptquptqq,
841
+ (11)
842
+ where a, b P CpRq, b ą 0.
843
+ 5.1
844
+ Permanence
845
+ We need the assumption
846
+ dbptq ď aptq ď dbptq and bL ą 0,
847
+ (12)
848
+ with constants d, d ą 0. The next result follows from [Red96, Theorem 1. (ii)], cited above as
849
+ Theorem 2.1.
850
+ Lemma 5.1. The function uptq “ 0 for t P R is a solution of (11). Moreover, there exists a
851
+ function d ď u˚ptq ď d for t P R which is a solution to (11). This is the unique complete solution
852
+ separated away from zero and infinity.
853
+ Next lemma provides the characterization of the asymptotic behavior of solutions to (11) other
854
+ than u˚.
855
+ Lemma 5.2. If u : R Ñ R is a solution to (11) with upt0q ě 0 then exactly one of the four
856
+ possibilities below holds:
857
+ (a) uptq “ 0 for every t P R,
858
+ (b) u “ u˚,
859
+ (c) if upt0q P p0, u˚pt0qq then limtÑ´8 uptq “ 0 and limtÑ8 u˚ptq ´ uptq “ 0,
860
+ 13
861
+
862
+ 5
863
+ STRUCTURE OF THE ATTRACTOR FOR NON-AUTONOMOUS LOGISTIC
864
+ EQUATION
865
+ (d) if upt0q ą u˚pt0q then limtÑ´8 uptq “ 8 and limtÑ8 uptq ´ u˚ptq “ 0.
866
+ Proof. If we take the initial data upt0q P p0, u˚pt0qq then it is clear that uptq P p0, u˚ptqq for every
867
+ t. If inftPR uptq ą 0, then by [Red96, Theorem 1 (v)] we get a contradiction because the solution
868
+ bounded away from zero must be unique. So we suppose that inftPR uptq “ 0. If there exists a time
869
+ t1 P R such that upt1q “ 0, then u “ 0 by uniqueness of solution. Then there exists a decreasing
870
+ sequence ttnu such that tn Ñ ´8, uptnq Ñ 0 and uptnq ă d. If for some t P ptn`1, tnq, we have
871
+ uptq ą uptnq then there exists t˚ P rt, tnq such that upt˚q ą uptnq and on pt˚, tnq the function u is
872
+ strictly less that d. Hence
873
+ 0 ą uptnq ´ upt˚q “
874
+ ż tn
875
+ t˚ upsqpapsq ´ bpsqupsqq ds ě
876
+ ż tn
877
+ t˚ upsqpapsq ´ bpsqdqds ě 0,
878
+ a contradiction, and hence limtÑ´8 uptq “ 0. Convergence to u˚ as t Ñ 8 follows from [Red96,
879
+ Theorem 1 (vi)]. If upt0q ą u˚pt0q then analogously as for the case (c) we have the convergence at
880
+ `8 and the existence of a decreasing sequence tn Ñ ´8 such that uptnq Ñ 8 and uptnq ą d. If
881
+ uptq ă uptnq for t P ptn`1, tnq then there exists t˚ P rt, tnq such that upt˚q ă uptnq and u is strictly
882
+ greater than d on rt˚, tnq hence, analogously as in the case (c), limtÑ´8 uptq “ 8.
883
+ We finish this section by recalling two results on one dimensional problem useful in further
884
+ analysis. We first recall a result that the linearized problem has the exponential dichotomy with
885
+ its only direction being exponentially stable.
886
+ Lemma 5.3. There exist δ ą 0 and M ą 0 such that if w : R Ñ R solves the following one-
887
+ dimensional problem linearized around u˚
888
+ w1ptq “ wptqpaptq ´ 2bptqu˚ptqq,
889
+ then we have
890
+ |wptq| ď M|wpt0q|e´δpt´t0q for every t ě t0.
891
+ Proof. The result is a direct application of Lemma 3.3 which in turn follows from [AL98, Lemma
892
+ 3.6].
893
+ Finally we establish the invariance and monotonicity result for the solution of one-dimensional
894
+ problem (11).
895
+ Lemma 5.4. If upt0q ě d then uptq ě d for every t ě t0 and if upt0q ď d then uptq ď d for every
896
+ t ě t0. If 0 ă upt0q ă d then uptq ě upt0q for every t ě t0 and if upt0q ą d then uptq ď upt0q for
897
+ every t ě t0.
898
+ Proof. The first part follows from [Red96, Theorem 1. (i)]. For the second part it is enough to
899
+ prove that if 0 ă uptq ă d then u1ptq ą 0. Indeed if upt0q P p0, dq
900
+ u1ptq “ uptq paptq ´ bptquptqq ą uptq
901
+ ˆ
902
+ aptq ´ bptq
903
+ ´a
904
+ b
905
+ ¯L˙
906
+ “ uptqbptq
907
+ ˆaptq
908
+ bptq ´
909
+ ´a
910
+ b
911
+ ¯L˙
912
+ ě 0.
913
+ In turn, if uptq ą d, then
914
+ u1ptq “ uptq paptq ´ bptquptqq ă uptq
915
+ ˆ
916
+ aptq ´ bptq
917
+ ´a
918
+ b
919
+ ¯U˙
920
+ “ uptqbptq
921
+ ˆaptq
922
+ bptq ´
923
+ ´a
924
+ b
925
+ ¯U˙
926
+ ď 0,
927
+ and the proof is complete.
928
+ 14
929
+
930
+ 6
931
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 2-D SYSTEM
932
+ 5.2
933
+ Extinction
934
+ To get the criterion on the extinction of the single species we give a theorem that is a direct
935
+ application of Lemma 4.2.
936
+ Lemma 5.5. If aU ă 0 then for every solution of (11) with upt0q ą 0 we have limtÑ8 uptq “ 0
937
+ and limtÑ´8 uptq “ 8.
938
+ Proof. To get the assertion limtÑ´8 uptq “ 8 observe that since
939
+ u1ptq
940
+ uptq “ aptq ´ bptquptq,
941
+ we deduce that
942
+ lnpuptqq ´ lnpupt0qq “ aptq ´ bptquptq ď aU.
943
+ Hence
944
+ upt0q ě uptqe´aUpt´t0q,
945
+ and the proof is complete.
946
+ 6
947
+ Attractor for non-autonomous Lotka-Volterra 2-D system
948
+ In Section 2 we recalled the result of [Red96] on the existence of complete trajectories which are
949
+ bounded and separated from zero. In particular we have shown condition which guarantees the
950
+ existence of such solution. This condition can be used for the whole n-dimensional system or for its
951
+ subsystems obtained by setting some of the variables ui to zero. Using this theorem, combined with
952
+ the results of Section 4, we present the conditions under which one can characterize the structure
953
+ of the non-autonomous attractor for cooperative Lotka–Volterra problem in two dimensions. We
954
+ will consider three cases depending on the globally asymptotically stable solution: either the one
955
+ with both nonzero components, or the one with one nonzero component, or the one with both
956
+ zeros. Hence we will consider the system
957
+ #
958
+ u1
959
+ 1 “ u1pa1ptq ´ b11ptqu1 ´ b12ptqu2q
960
+ u1
961
+ 2 “ u2pa2ptq ´ b21ptqu1 ´ b22ptqu2q,
962
+ (LV-2)
963
+ with bL
964
+ 11, bL
965
+ 22 ą 0 and b12, b21 ď 0.
966
+ We will use the notation Spt, τqu0 for τ P R and t ě τ to denote the process associated to
967
+ (LV-2), i.e. the family of maps which assign to the initial data u0 at time τ the solution of (LV-2)
968
+ at time t.
969
+ 6.1
970
+ Structure of attractor for the case of permanence
971
+ We will first study the case when there exists the complete solution bounded away from zero and
972
+ infinity on both variables, which attracts all solutions with nonzero initial data as t Ñ 8. In such
973
+ case, of the permanence of the two species, the structure of non-autonomous attractor is depicted
974
+ in Figure 1.
975
+ 15
976
+
977
+ 6
978
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 2-D SYSTEM
979
+ Figure 1: Four complete solutions and their connections for the two dimensional problem with
980
+ globally asymptotically stable state with coexistence of both species. Black dot means the strictly
981
+ positive function while white dot relates with the function identically equal to zero.
982
+ Following Theorem 2.1 we have to impose the following conditions
983
+ #
984
+ pc1b11 ` c2b12qL ą 0,
985
+ pc2b22 ` c1b21qL ą 0,
986
+ #
987
+ d1b11 ď a1 ď d1b11 ` d2b12,
988
+ d2b22 ď a2 ď d1b21 ` d2b22,
989
+ (13)
990
+ with some constants d1, d2, d1, d2, c1, c2 ą 0. These bounds are exactly the conditions (A) and (H)
991
+ for the two-dimensional case. We also assume that
992
+ |b12|U, |b21|U, aU
993
+ 1 , aU
994
+ 2 ă 8.
995
+ (14)
996
+ Note that the above assumptions in particular imply that a1, a2 ą 0. The next result follows from
997
+ [Red96, Theorem 1. (ii)], cited above as Theorem 2.1.
998
+ Lemma 6.1. There exists a function u˚ “ pu˚
999
+ 1, u˚
1000
+ 2q defined for t P R, the complete solution of
1001
+ (LV-2) such that ¯di ď ui ď di for i “ 1, 2. This is the unique complete trajectory bounded away from
1002
+ zero and infinity in both variables. Moreover, there exist functions ppu1, 0q, p0, pu2q and uptq “ p0, 0q
1003
+ defined for t P R that are complete solutions to (LV-2), such that ¯di ď pui ď di for i “ 1, 2.
1004
+ The next Lemma follows directly from Lemma 5.2.
1005
+ Lemma 6.2. If the function u : R Ñ R2 is a solution to (LV-2) with u1pt0q ě 0 and u2pt0q “ 0,
1006
+ then exactly one of the four possibilities below holds:
1007
+ (a) uptq “ p0, 0q for every t P R,
1008
+ (b) u “ ppu1, 0q,
1009
+ (c) if u1pt0q P p0, pu1pt0qq then limtÑ´8 u1ptq “ 0, limtÑ8 pu1ptq ´ u1ptq “ 0 and u2ptq “ 0 for
1010
+ t P R,
1011
+ 16
1012
+
1013
+ u1
1014
+ W2
1015
+ 1
1016
+ u2
1017
+ u1
1018
+ W2
1019
+ u1
1020
+ W26
1021
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 2-D SYSTEM
1022
+ (d) if u1pt0q ą pu1pt0q then limtÑ´8 u1ptq “ 8, limtÑ8 u1ptq ´ pu1ptq “ 0, and u2ptq “ 0 for
1023
+ t P R.
1024
+ The result analogous to Lemma 6.2 holds, and allows us to establish the connection from p0, 0q
1025
+ to p0, pu2q. In order to obtain the structure as in Fig. 1, it remains to establish connections from
1026
+ p0, pu2q, ppu1, 0q and p0, 0q to pu˚
1027
+ 1, u˚
1028
+ 2q.
1029
+ Theorem 6.3. There exists the trajectory of (LV-2) denoted by z “ pz1, z2q : R Ñ R2 such that
1030
+ lim
1031
+ sÑ´8 |pz1psq, z2psqq ´ ppu1psq, 0q| “ 0.
1032
+ and
1033
+ lim
1034
+ sÑ8 |pz1psq, z2psqq ´ pu˚
1035
+ 1psq, u˚
1036
+ 2psqq| “ 0.
1037
+ Analogous result holds for p0, pu2q.
1038
+ Proof. We prove that the solution ppu1, 0q is locally unstable, i.e. its non-autonomous unstable
1039
+ manifold
1040
+ W upppu1, 0qq “ tpt, pw1, w2qq : there exists a solution z : R Ñ R2 such that
1041
+ zptq “ pw1, w2q and
1042
+ lim
1043
+ sÑ´8 |zpsq ´ ppu1psq, 0q| “ 0u,
1044
+ is nonempty and intersects the interior of the positive quadrant. As we have seen in Section 2, cf
1045
+ Theorem 2.1, the permanent solution pu˚
1046
+ 1psq, u˚
1047
+ 2psqq attracts forward in time the solution with the
1048
+ initial data in this intersection. We start by proving the existence of the local unstable manifold.
1049
+ To this end we first study the system linearized around ppu1, 0q. We write
1050
+ wptq “ uptq ´ puptq
1051
+ where puptq “ ppu1ptq, 0q, and uptq is a solution with initial condition in a neighbourhood of pu. Then
1052
+ we obtain
1053
+ w1ptq “ Mptqwptq ` Rpwptq, tq
1054
+ where Mptq is the derivative of the vector field at puptq and Rptq is a remainder which is of higher
1055
+ (quadratic) order with respect to w. In the 2D case we have the following ODE
1056
+ w1ptq “
1057
+ ˆ
1058
+ a1ptq ´ 2b11ptqpu1ptq
1059
+ ´b12ptqpu1ptq
1060
+ 0
1061
+ a2ptq ´ b21ptqpu1ptq
1062
+ ˙
1063
+ wptq `
1064
+ ˆ
1065
+ ´b11ptqw1ptq2 ´ b12ptqw1ptqw2ptq
1066
+ ´b21ptqw1ptqw2ptq ´ b22ptqw2ptq2
1067
+ ˙
1068
+ (15)
1069
+ The linearized system has the form
1070
+ #
1071
+ v1ptq “
1072
+ ˜
1073
+ a1ptq ´ 2b11ptqpu1ptq
1074
+ ´b12ptqpu1ptq
1075
+ 0
1076
+ a2ptq ´ b21ptqpu1ptq
1077
+ ¸
1078
+ vptq “
1079
+ ˜
1080
+ Aptq
1081
+ Cptq
1082
+ 0
1083
+ Bptq
1084
+ ¸
1085
+ vptq.
1086
+ (16)
1087
+ where Aptq “ a1ptq ´ 2b11ptqpu1ptq, Cptq “ ´b12ptqpu1ptq and Bptq “ a2ptq ´ b21ptqpu1ptq. We observe
1088
+ that the one dimensional system v1
1089
+ 2 “ Bptqv2 has an exponential dichotomy with projection PBptq ”
1090
+ 0 since by (13) it holds Bptq ě δ ą 0 and for every t ě s
1091
+ v2ptq “ v2psqe
1092
+ şt
1093
+ s a2prq´b21prqpu1prqds ñ |v2ptq| ě |v2psq|eδpt´sq.
1094
+ 17
1095
+
1096
+ 6
1097
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 2-D SYSTEM
1098
+ We also observe that by Lemma 5.3 the system v1
1099
+ 1 “ Aptqv1 has an exponential dichotomy with
1100
+ PAptq “ I. Then, by results recalled in Section 3, since by (14) and Lemma 6.1 the function Cptq
1101
+ is bounded, the system (16) admits an exponential dichotomy. According to (7), the projections
1102
+ are given by
1103
+ P ` “
1104
+ ˆ
1105
+ 1
1106
+ 0
1107
+ 0
1108
+ 0
1109
+ ˙
1110
+ on R` and P ´ “
1111
+ ˆ
1112
+ 1
1113
+
1114
+ 0
1115
+ 0
1116
+ ˙
1117
+ on R´.
1118
+ The projection
1119
+ P “ P ´ “
1120
+ ˆ
1121
+ 1
1122
+
1123
+ 0
1124
+ 0
1125
+ ˙
1126
+ has the same range as P ` and hence the system (16) has exponential dichotomy with P. For the
1127
+ time t P R the associated projection is given by Pptq “ Mpt, 0qPMp0, tq, where Mpt, τq is the
1128
+ fundamental matrix of (16), which yields, as both Mpt, 0q and Mp0, tq are upper triangular and
1129
+ inverse to each other,
1130
+ Pptq “
1131
+ ˆ
1132
+ 1
1133
+ Lptq
1134
+ 0
1135
+ 0
1136
+ ˙
1137
+ ,
1138
+ for certain bounded function Lptq.
1139
+ In particular dim ker Pptq “ 1 and dim range Pptq “ 1.
1140
+ Moreover,
1141
+ rangepPptqq “
1142
+ "
1143
+ β
1144
+ ˆ
1145
+ 1
1146
+ 0
1147
+ ˙
1148
+ : β P R
1149
+ *
1150
+ and rangepI ´ Pptqq “
1151
+ "
1152
+ α
1153
+ ˆ
1154
+ ´Lptq
1155
+ 1
1156
+ ˙
1157
+ : α P R
1158
+ *
1159
+ .
1160
+ We will use [KR11, Theorem 6.10 and Exercise 6.11]. There exists a neighborhood U of zero in
1161
+ R2 and a continuous function Σ´ : R ˆ U Ñ R2, a local non-auntonomous unstable manifold, such
1162
+ that Σ´pt, xq “ Σ´pt, pI ´ Pptqqxq P rangepPptqq, Σ´pt, 0q “ 0, lim|x|Ñ0
1163
+ Σ´pt,xq
1164
+ |x|
1165
+ “ 0. Moreover, if
1166
+ for some t P R and x P rangepI ´ Pptqq X U we have y “ x ` Σ´pt, xq, then, provided |y| is small
1167
+ enough, the backward trajectory w : p´8, ts Ñ R2 of (15) with wptq “ y belongs to the graph of
1168
+ Σ´, i.e. Σ´pτ, pI ´ Ppτqqwpτqq “ Ppτqwpτq and satisfies |wpτq| ď Ceδpτ´tq for every τ ď t. The
1169
+ points in the graph of Σ´ have the form
1170
+ y “ x ` Σ´pt, xq “ α
1171
+ ˆ
1172
+ ´Lptq
1173
+ 1
1174
+ ˙
1175
+ ` Σ´
1176
+ ˆ
1177
+ t, α
1178
+ ˆ
1179
+ ´Lptq
1180
+ 1
1181
+ ˙˙
1182
+
1183
+ ¨
1184
+ ˝Σ´
1185
+ ˆ
1186
+ t, α
1187
+ ˆ
1188
+ ´Lptq
1189
+ 1
1190
+ ˙˙
1191
+ ´ αLptq
1192
+ α
1193
+ ˛
1194
+ ‚.
1195
+ (17)
1196
+ Because Lptq is bounded, there exists a neighborhood of zero in R such that for α in this neighbor-
1197
+ hood, we have x “ α
1198
+ ˆ
1199
+ ´Lptq
1200
+ 1
1201
+ ˙
1202
+ P U. We take small positive α. The second coordinate of y is equal
1203
+ to α and hence positive, while the first coordinate can be made arbitrarily small, so that after
1204
+ adding to the solution ppu1ptq, 0q, with pu1 separated away from zero, the first coordinate of the sum
1205
+ is also positive. Hence, for any t P R there exists the point with second coordinate positive and
1206
+ first arbitrarily small, at time t, which is backward exponentially attracted to zero, and in terms
1207
+ of the original system, there exists the point at any t P R with both coordinates positive which is
1208
+ backwards exponentially attracted to ppu1ptq, 0q. In view of [Red96, Theorem 1 (iii) and (vi)] this
1209
+ gives us the assertion of the Theorem.
1210
+ 18
1211
+
1212
+ 6
1213
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 2-D SYSTEM
1214
+ Theorem 6.4. There exists a trajectory of (LV-2) denoted by y “ py1, y2q : R Ñ R2 such that
1215
+ lim
1216
+ sÑ´8 |py1psq, y2psqq| “ 0.
1217
+ and
1218
+ lim
1219
+ sÑ8 |py1psq, y2psqq ´ pu˚
1220
+ 1psq, u˚
1221
+ 2psqq| “ 0.
1222
+ Proof. The linearized system at p0, 0q has the form
1223
+ #
1224
+ v1ptq “
1225
+ ˜
1226
+ a1ptq
1227
+ 0
1228
+ 0
1229
+ a2ptq
1230
+ ¸
1231
+ vptq,
1232
+ (18)
1233
+ which has the exponential dichotomy with Pptq ” 0. Thus, by [KR11, Theorem 6.10 and Exercise
1234
+ 6.11] there exists a sufficiently small neighborhood of p0, 0q such that the constant function Σ´ :
1235
+ R ˆ R2 Ñ t0u is the local unstable manifold of p0, 0q and thus every sufficiently small positive
1236
+ initial condition is exponentially backwards attracted to zero. Since it must be forwards attracted
1237
+ to pu˚
1238
+ 1psq, u˚
1239
+ 2psqq, the proof is complete.
1240
+ Theorem 6.5. If a trajectory with a strictly positive initial consition is bounded both in the past
1241
+ and in the future then it must be one of trajectories described above.
1242
+ Proof. From [Red96, Theorem 1. (v)] we know that u˚ is the only solution on R that is bounded
1243
+ away from 0 and 8. Thus, if the complete trajectory u “ pu1, u2q is bounded, not coincides with
1244
+ u˚, and none of the two coordinates is zero, then for at least one of its coordinates, say u1, there
1245
+ must exist a decreasing sequence tn Ñ ´8 such that u1ptnq Ñ 0 and u1ptnq ă d1. We shall prove
1246
+ that limtÑ´8 u1ptq “ 0. We proceed analogously to the Lemma 5.2. If for some t P ptn`1, tnq,
1247
+ we have u1ptq ą u1ptnq then there exists t˚ P rt, tnq such that u1pt˚q ą u1ptnq and on pt˚, tnq the
1248
+ function u1 is strictly less that d1. Hence
1249
+ 0 ą u1ptnq ´ u1pt˚q “
1250
+ ż tn
1251
+ t˚ u1psqpa1psq ´ b11psqu1psq ´ b12psqu2psqq ds
1252
+ ě
1253
+ ż tn
1254
+ t˚ u1psqpa1psq ´ b11psqd1qds ě 0,
1255
+ and we have the contradiction. Now we need to prove that if both u1 and u2 do not converge
1256
+ backwards to zero, say u1ptq Ñ 0 as t Ñ ´8 and u2ptq is separated from zero then it must be
1257
+ lim
1258
+ tÑ´8 |u2ptq ´ pu2ptq| “ 0.
1259
+ To this end assume that for some sequence tn Ñ ´8
1260
+ lim
1261
+ nÑ8 |u2ptnq ´ pu2ptnq| “ c ą 0.
1262
+ For t ě 0 we have
1263
+ |u2ptnq ´ pu2ptnq| ď |Sptn, tn ´ tqpu1ptn ´ tq, u2ptn ´ tqq ´ Sptn, tn ´ tqp0, pu2ptn ´ tqq|.
1264
+ 19
1265
+
1266
+ 6
1267
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 2-D SYSTEM
1268
+ Since u2ptq is separated from zero, denote K “ pu2qL and M “ pu2qU. For every x P rK, Ms
1269
+ |u2ptnq ´ pu2ptnq| ď |Sptn, tn ´ tqpu1ptn ´ tq, u2ptn ´ tqq ´ Sptn, tn ´ tqp0, xq|
1270
+ ` |Sptn, tn ´ tqp0, xq ´ Sptn, tn ´ tqp0, pu2ptn ´ tqq|
1271
+ ď eκt|pu1ptn ´ tq, u2ptn ´ tqq ´ p0, xq| ` 2 maxtM, d2u2
1272
+ mintK, d2u
1273
+ e´δ mintK,d2ut,
1274
+ where we have used Lemma 2.2 and 2.3, and κ depends on the bounds on u1, u2 and the coefficients
1275
+ of the problem. Pick ε ą 0. We can find t ą 0 such that 2 maxtM,d2u2
1276
+ mintK,d2u e´δ mintK,d2ut ă ε
1277
+ 2. The
1278
+ sequence u2ptn ´ tq has a convergent subsequence, let x be a limit of this subsequence and pick n
1279
+ large enough such that Ceκt|pu1ptn ´ tq, u2ptn ´ tqq ´ p0, xq| ă ε
1280
+ 2. Hence for n large enough, on a
1281
+ subsequence,
1282
+ |u2ptnq ´ pu2ptnq| ă ε,
1283
+ a contradiction.
1284
+ To finish this section we summarize the results obtained above, and we construct the full image
1285
+ of the atractor depicted in Figure 1.
1286
+ Theorem 6.6. Assuming (13) the system (LV-2) has the following trajectories u : R Ñ R2 bounded
1287
+ both in the past and in the future:
1288
+ (a) uptq “ p0, 0q for t P R,
1289
+ (b) uptq “ ppu1ptq, 0q and uptq “ p0, pu2ptqq, corresponding to the unique solutions for one-dimensional
1290
+ subproblems bounded away from zero and infinity, given in Lemma 6.1.
1291
+ (c) Solutions of type uptq “ pu1ptq, 0q with initial condition 0 ă u1pt0q ă pu1pt0q, where limtÑ´8 u1ptq “
1292
+ 0 and limtÑ8pu1ptq ´ pu1ptqq “ 0, given in Lemma 6.2. Analogously, uptq “ p0, u2ptqq with
1293
+ initial condition 0 ă u2pt0q ă pu2pt0q, where limtÑ´8 u2ptq “ 0 and limtÑ8pu2ptq´pu2ptqq “ 0.
1294
+ (i) uptq “ pu˚
1295
+ 1ptq, u˚
1296
+ 2ptqq the unique solution with both nonzero coordinates bounded away from
1297
+ zero and infinity given in Lemma 6.1.
1298
+ (j) Solutions of type uptq “ pu1ptq, u2ptqq such that limtÑ´8pu1ptq, u2ptqq “ p0, 0q and limtÑ8pu1ptq´
1299
+
1300
+ 1ptq, u2ptq ´ u˚
1301
+ 2ptqq, given in Theorem 6.4.
1302
+ (k) Solutions of type uptq “ pu1ptq, u2ptqq such that limtÑ´8pu1ptq, u2ptqq “ ppu1ptq, 0q and limtÑ8pu1ptq´
1303
+
1304
+ 1ptq, u2ptq ´ u˚
1305
+ 2ptqq, given in Theorem 6.3.
1306
+ Analogously, uptq “ pu1ptq, u2ptqq such that
1307
+ limtÑ´8pu1ptq, u2ptqq “ p0, pu2ptqq and limtÑ8pu1ptq ´ u˚
1308
+ 1ptq, u2ptq ´ u˚
1309
+ 2ptqq “ 0.
1310
+ Moreover any solution of (LV-2) which is bounded both in the past and in the future is one of the
1311
+ solutions described in items (a)-(k).
1312
+ 20
1313
+
1314
+ 6
1315
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 2-D SYSTEM
1316
+ 6.2
1317
+ Structure of attractor for the case of extinction of one species
1318
+ Now we study is the extinction of one species. Hence, we consider (LV-2) with assumptions
1319
+ #
1320
+ pc1b11 ` c2b12qL ą 0,
1321
+ pc1b21 ` c2b22qL ą 0,
1322
+ #
1323
+ b11d1 ` ε ď a1 ď b11d1 ` b12pd2 ` θc2q ´ ε,
1324
+ a2 ď b21pd1 ` θc1q ´ ε,
1325
+ (19)
1326
+ with some constants d1, d2, c1, c2, d1 ą 0 and constants ε, θ ą 0. The first inequalities constitute
1327
+ the condition (H), while the second one in (B1) for the two dimensional case. We also assume
1328
+ that |b12|U ă 8.
1329
+ We prove that the dynamics of the problem is described by the diagram presented in Fig. 2.
1330
+ Indeed, it is sufficient to use Lemma 4.3, Theorem 4.5, Lemma 5.1, Lemma 5.2, and Lemma 5.5
1331
+ to state the following theorem.
1332
+ Theorem 6.7. Assuming (19) the system (LV-2) has the following trajectories u : R Ñ R2 bounded
1333
+ both in the past and in the future
1334
+ (a) uptq “ p0, 0q for t P R,
1335
+ (b) uptq “ ppu1ptq, 0q for t P R, where pu1 is the unique trajectory of u1
1336
+ 1 “ u1pa1ptq ´ b11ptqu1ptqq
1337
+ separated from zero and infinity given by Lemma 5.1,
1338
+ (c) uptq “ pu1ptq, 0q where limtÑ´8 u1ptq “ 0 and limtÑ8pu1ptq ´ pu1ptqq “ 0. Any solution with
1339
+ the initial data pu1pt0q, 0q satisfying 0 ă u1pt0q ă pu1pt0q constitutes such trajectory.
1340
+ All solutions other than the ones named in (a)–(c) are backwards unbounded. Moreover,
1341
+ (d) Any solution uptq “ pu1ptq, u2ptqq with initial data u1pt0q ą 0 and u2pt0q ą 0 satisfies
1342
+ limtÑ8pu1ptq ´ pu1ptq, u2ptqq “ p0, 0q and limtÑ´8 |uptq| “ 8.
1343
+ (e) Any solution uptq “ p0, u2ptqq with u2pt0q ą 0 satisfies limtÑ8 u2ptq “ 0 and limtÑ´8 u2ptq “
1344
+ 8,
1345
+ (f) Any solution uptq “ pu1ptq, 0q with u1pt0q ą pu1pt0q satisfies limtÑ8pu1ptq ´ pu1ptqq “ 0 and
1346
+ limtÑ´8 u1ptq “ 8.
1347
+ Figure 2: Two complete solutions and their connections for the two dimensional problem for which
1348
+ the state with existence of one species is globally asymptotically stable.
1349
+ 21
1350
+
1351
+ u1
1352
+ u2
1353
+ 1
1354
+ u27
1355
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1356
+ 6.3
1357
+ Extinction of both species
1358
+ The last situation is the extinction of both species. To obtain this case we make the following
1359
+ assumptions
1360
+ #
1361
+ pc1b11 ` c2b12qL ą 0,
1362
+ pc2b22 ` c1b21qL ą 0,
1363
+ #
1364
+ a1 ď b12pd2 ` θc2q ´ ε,
1365
+ a2 ď b21pd1 ` θc1q ´ ε,
1366
+ (20)
1367
+ with some constants d1, d2, c1, c2 ą 0 and ε, θ ą 0. We observe that the first inequalities is condition
1368
+ (H) and the second ones is condition pBq with J “ t1, 2u and I “ H.
1369
+ Theorem 6.8. Assuming (20) the only trajectory of system (LV-2) which is bounded both in the
1370
+ past and and the future is uptq “ p0, 0q for t P R. Moreover for every solution with initial data
1371
+ u1pt0q ą 0 or u2pt0q ą 0 we have limtÑ8pu1ptq, u2ptqq “ p0, 0q.
1372
+ Proof. The convergence limtÑ8pu1ptq, u2ptqq “ p0, 0q follows from Lemma 4.2. It remains to prove
1373
+ that any solution with initial data u1pt0q ą 0 or u2pt0q ą 0 is backward unbounded, done it in
1374
+ Lemma 4.3.
1375
+ 7
1376
+ Attractor for non-autonomous Lotka-Volterra 3-D system
1377
+ In this section we will study different possibilities of the non-autonomous attractor structure for
1378
+ the following three-dimensional system.
1379
+ $
1380
+
1381
+ &
1382
+
1383
+ %
1384
+ u1
1385
+ 1 “ u1pa1ptq ´ b11ptqu1 ´ b12ptqu2 ´ b13ptqu3q,
1386
+ u1
1387
+ 2 “ u2pa2ptq ´ b21ptqu1 ´ b22ptqu2 ´ b23ptqu3q,
1388
+ u1
1389
+ 3 “ u3pa3ptq ´ b31ptqu1 ´ b32ptqu2 ´ b33ptqu3q.
1390
+ (LV-3)
1391
+ with bL
1392
+ ii ą 0 and bij ď 0 for i, j P t1, 2, 3u. Remind that Spt, τq for t ě τ denotes the mapping that
1393
+ assigns to the initial condition taken at time τ the value of the solution at time t, now associated
1394
+ to (LV-3).
1395
+ 7.1
1396
+ Structure of attractor for the case of permanence
1397
+ The first case, that of permanence, corresponds to the dynamics depicted in Fig. 3. Following
1398
+ Theorem 2.1 we have to impose the following conditions on the coefficients of the problem to obtain
1399
+ the permanence of the three species, as well as the admissibility of all intermediate transient states
1400
+ together with the existence of all appropriate connections.
1401
+ 22
1402
+
1403
+ 7
1404
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1405
+ Figure 3: Eight complete solutions and their connections for the three dimensional problem with
1406
+ globally asymptotically stable state with coexistence for all the species.
1407
+ To this end, we assume that there exist constants ci ą 0, di ą 0 and di ą 0 for i P t1, 2, 3u,
1408
+ such that the following two systems of inequalities are satisfied.
1409
+ $
1410
+
1411
+ &
1412
+
1413
+ %
1414
+ pc1b11 ` c2b12 ` c3b13qL ą 0,
1415
+ pc2b22 ` c1b21 ` c3b23qL ą 0,
1416
+ pc3b33 ` c1b31 ` c2b32qL ą 0.
1417
+ $
1418
+
1419
+ &
1420
+
1421
+ %
1422
+ b11 ¯d1 ď a1 ď b11d1 ` b12d2 ` b13d3
1423
+ b22 ¯d2 ď a2 ď b21d1 ` b22d2 ` b23d3
1424
+ b33 ¯d3 ď a3 ď b31d1 ` b32d2 ` b33d3
1425
+ (21)
1426
+ The above inequalities are exactly conditions pAq and (H), respectively, for the three-dimensional
1427
+ case. Moreover we need to assume that
1428
+ |bij|U ă 8 and aU
1429
+ i ă 8 for every i, j P t1, 2, 3u.
1430
+ (22)
1431
+ As a direct consequence of Theorem 2.1, analogously as in the two-dimensional case, we have
1432
+ the following lemma.
1433
+ Lemma 7.1. There exists a function u˚ “ pu˚
1434
+ 1, u˚
1435
+ 2, u˚
1436
+ 3q defined for t P R, the complete solution of
1437
+ (LV-3) such that ¯di ď u˚
1438
+ i ď di for i “ 1, 2, 3. This is a unique complete trajectory bounded away
1439
+ from zero and infinity in all the variables. Moreover, there exist functions ppu1, pu2, 0q, p0, pu2, pu3q,
1440
+ ppu1, 0, pu3q, p¯u1, 0, 0q, p0, ¯u2, 0q, p0, 0, ¯u3q, and uptq “ p0, 0, 0q defined for t P R that are complete
1441
+ solutions to (LV-3), such that ¯di ď pui, ¯ui ď di for i “ 1, 2, 3.
1442
+ To obtain the attractor structure we prove the existence of the connections between the tra-
1443
+ jectories obtained in the above theorem, which play the role of non-autonomous equilibria. Next
1444
+ theorem is our first result in this context.
1445
+ Theorem 7.2. There exists the trajectory of (LV-3) denoted by z “ pz1, z2, z3q : R Ñ R3 such
1446
+ that
1447
+ lim
1448
+ sÑ´8 |pz1psq, z2psq, z3psqq ´ ppu1psq, pu2psq, 0q| “ 0.
1449
+ and
1450
+ lim
1451
+ sÑ8 |pz1psq, z2psq, z3psqq ´ pu˚
1452
+ 1psq, u˚
1453
+ 2psq, u˚
1454
+ 3psqq| “ 0.
1455
+ 23
1456
+
1457
+ 1
1458
+ W2
1459
+ 3
1460
+ u1
1461
+ u2
1462
+ 3
1463
+ 1
1464
+ u2
1465
+ 3
1466
+ u1
1467
+ u2
1468
+ u31
1469
+ u1
1470
+ 2
1471
+ 3
1472
+ u1
1473
+ u2
1474
+ 3
1475
+ u1
1476
+ u2
1477
+ u1
1478
+ u7
1479
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1480
+ Analogous result holds for p0, pu2, pu3q and ppu1, 0, pu3q. Furthermore, there exist a trajectory denoted
1481
+ by w “ pw1, w2, w3q : R Ñ R3 such that
1482
+ lim
1483
+ sÑ´8 |pw1psq, w2psq, w3psqq ´ p¯u1psq, 0, 0q| “ 0.
1484
+ and
1485
+ lim
1486
+ sÑ8 |pw1psq, w2psq, w3psqq ´ pu˚
1487
+ 1psq, u˚
1488
+ 2psq, u˚
1489
+ 3psqq| “ 0.
1490
+ Analogous result holds for p0, ¯u2, 0q and p0, 0, ¯u3q.
1491
+ Proof. The proof is analogous as for the two-dimensional case. First, we need to prove that the
1492
+ solution ppu1, pu2, 0q is locally unstable, i.e. its non-autonomous unstable manifold
1493
+ W upppu1, pu2, 0qq “ tpt, pw1, w2, w3qq : there exists a solution z : R Ñ R3 such that
1494
+ zptq “ pw1, w2, w3q and
1495
+ lim
1496
+ sÑ´8 |zpsq ´ ppu1psq, pu2psq, 0q| “ 0u,
1497
+ is nonempty and intersects the interior of the positive quadrant. We linearize the system around
1498
+ ppu1psq, pu2psq, 0q. So we write
1499
+ wptq “ uptq ´ ˆuptq
1500
+ (23)
1501
+ where ˆuptq “ ppu1ptq, pu2ptq, 0q, and now the linearized system has the form
1502
+ v1ptq “
1503
+ ˆ
1504
+ Aptq
1505
+ Cptq
1506
+ 0
1507
+ Bptq
1508
+ ˙
1509
+ vptq.
1510
+ (24)
1511
+ where
1512
+ Aptq “
1513
+ ˆ
1514
+ a1ptq ´ 2b11ptqpu1ptq ´ b12ptqpu2ptq
1515
+ ´b12ptqpu1ptq
1516
+ ´b21ptqpu2ptq
1517
+ a2ptq ´ b21ptqpu1ptq ´ 2b22ptqpu2ptq
1518
+ ˙
1519
+ ,
1520
+ Cptq “
1521
+ ˆ
1522
+ ´b13ptqpu1ptq
1523
+ ´b23ptqpu2ptq
1524
+ ˙
1525
+ and Bptq “ a3ptq ´ b31ptqpu1ptq ´ b32ptqpu2ptq. We observe that the one dimensional system v1
1526
+ 3 “
1527
+ Bptqv3 has an exponential dichotomy with projection Pptq “ 0 since by (21) it holds Bptq ě δ ą 0.
1528
+ Now ppu1ptq, pu2ptqq is the solution of the two-dimensional system obtained by taking u3 ” 0, and
1529
+ separated from zero and infinity. Hence, by Lemma 3.3, the system pv1, v2q1 “ Aptqpv1, v2q has an
1530
+ exponential dichotomy with Pptq “ I2ˆ2.
1531
+ Analogously as in two-dimensional case, we follow the results of Section 3, and since by (22) and
1532
+ Lemma 7.1 the function Cptq is bounded, and the system (24) admits an exponential dichotomy.
1533
+ So by (7), the projections are given by
1534
+ P ` “
1535
+ ¨
1536
+ ˝
1537
+ 1
1538
+ 0
1539
+ 0
1540
+ 0
1541
+ 1
1542
+ 0
1543
+ 0
1544
+ 0
1545
+ 0
1546
+ ˛
1547
+ ‚ on R` and P ´ “
1548
+ ¨
1549
+ ˝
1550
+ 1
1551
+ 0
1552
+
1553
+ 1
1554
+ 0
1555
+ 1
1556
+
1557
+ 2
1558
+ 0
1559
+ 0
1560
+ 0
1561
+ ˛
1562
+ ‚ on R´.
1563
+ Now the projection
1564
+ P “ P ´ “
1565
+ ¨
1566
+ ˝
1567
+ 1
1568
+ 0
1569
+
1570
+ 1
1571
+ 0
1572
+ 1
1573
+
1574
+ 2
1575
+ 0
1576
+ 0
1577
+ 0
1578
+ ˛
1579
+ ‚,
1580
+ 24
1581
+
1582
+ 7
1583
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1584
+ has the same range as P ` and hence the system (24) has an exponential dichotomy with P on
1585
+ whole R, and
1586
+ Pptq “
1587
+ ¨
1588
+ ˝
1589
+ 1
1590
+ 0
1591
+ L1ptq
1592
+ 0
1593
+ 1
1594
+ L2ptq
1595
+ 0
1596
+ 0
1597
+ 0
1598
+ ˛
1599
+ ‚,
1600
+ for certain bounded functions L1ptq and L2ptq. Note that rangepPptqq “ tpβ1, β2, 0q : β1, β2 P Ru,
1601
+ of dimension 2, is always the stable space in the linearization, while
1602
+ rangepI ´ Pptqq “
1603
+ $
1604
+ &
1605
+
1606
+ ¨
1607
+ ˝
1608
+ ´L1ptq
1609
+ ´L2ptq
1610
+ 1
1611
+ ˛
1612
+ ‚ : α P R
1613
+ ,
1614
+ .
1615
+ - ,
1616
+ of dimension 1, is the time dependent unstable space in the linearization.
1617
+ Analogously as in the two-dimensional case we use the non-autonomous unstable manifold
1618
+ theorem, cf., [KR11, Theorem 6.10 and Exercise 6.11]. There exists a neighborhood U of zero
1619
+ in R3 and a function Σ´ : R ˆ U Ñ R3 such that Σ´pt, xq “ Σ´pt, pI ´ Pptqqxq P rangepPptqq,
1620
+ Σ´pt, 0q “ 0, lim|x|Ñ0
1621
+ Σ´pt,xq
1622
+ |x|
1623
+ “ 0. Moreover, if for some t P R and x P rangepI ´PptqqXU we have
1624
+ y “ x ` Σ´pt, xq, then, provided |y| is small enough, the backward trajectory w : p´8, ts Ñ R3
1625
+ of (23) with wptq “ y belongs to the graph of Σ´, i.e. Σ´pτ, pI ´ Ppτqqwpτqq “ Ppτqwpτq and
1626
+ satisfies |wpτq| ď Ceδpτ´tq for every τ ď t. Moreover for a small positive α the third coordinate of
1627
+ the point
1628
+ α
1629
+ ¨
1630
+ ˝
1631
+ ´L1ptq
1632
+ ´L2ptq
1633
+ 1
1634
+ ˛
1635
+ ‚` Σ´
1636
+ ¨
1637
+ ˝t, α
1638
+ ¨
1639
+ ˝
1640
+ ´L1ptq
1641
+ ´L2ptq
1642
+ 1
1643
+ ˛
1644
+
1645
+ ˛
1646
+
1647
+ is equal to α and hence positive, while the first two coordinates are small enough so that in the
1648
+ original coordinates they are also positive. Hence, for any t P R there exists the point with all the
1649
+ coordinates positive at time t which is backward exponentially attracted to zero. In terms of the
1650
+ original system (LV-3) in view of [Red96, Theorem 1 (iii) and (vi)] this gives us the assertion of
1651
+ the Theorem.
1652
+ The proof of local instability of p¯u1, 0, 0q is analogous. The system linearized around p¯u1, 0, 0q
1653
+ has the form
1654
+ v1ptq “
1655
+ ˆ
1656
+ Aptq
1657
+ Cptq
1658
+ 0
1659
+ Bptq
1660
+ ˙
1661
+ vptq.
1662
+ (25)
1663
+ where
1664
+ Aptq “
1665
+ `
1666
+ a1ptq ´ 2b11ptq¯u1ptq
1667
+ ˘
1668
+ ,
1669
+ Bptq “
1670
+ ˆ
1671
+ a2ptq ´ b21ptq¯u1ptq
1672
+ 0
1673
+ 0
1674
+ a3ptq ´ b31ptq¯u1ptq
1675
+ ˙
1676
+ Cptq “
1677
+ `
1678
+ ´b12ptq¯u1ptq
1679
+ ´b13ptq¯u1ptq
1680
+ ˘
1681
+ Now, the two dimensional system pv2ptq, v3ptqq1 “ Bptqpv2ptq, v3ptqq has an exponential dichotomy
1682
+ with projection Pptq “ 0 since by (21) both diagonal terms are positive and separated from zero.
1683
+ The system v1
1684
+ 1 “ Aptqv1, by Theorem 6.3, has an exponential dichotomy with projection Pptq “ I,
1685
+ We follows the same process as the first case: the function Cptq is bounded, and the system (24)
1686
+ admits an exponential dichotomy, such that by (7) the projections are given by
1687
+ 25
1688
+
1689
+ 7
1690
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1691
+ P ` “
1692
+ ¨
1693
+ ˝
1694
+ 1
1695
+ 0
1696
+ 0
1697
+ 0
1698
+ 0
1699
+ 0
1700
+ 0
1701
+ 0
1702
+ 0
1703
+ ˛
1704
+ ‚ on R` and P ´ “
1705
+ ¨
1706
+ ˝
1707
+ 1
1708
+
1709
+ 1
1710
+
1711
+ 2
1712
+ 0
1713
+ 0
1714
+ 0
1715
+ 0
1716
+ 0
1717
+ 0
1718
+ ˛
1719
+ ‚ on R´.
1720
+ Since the projection
1721
+ P “ P ´ “
1722
+ ¨
1723
+ ˝
1724
+ 1
1725
+
1726
+ 1
1727
+
1728
+ 2
1729
+ 0
1730
+ 0
1731
+ 0
1732
+ 0
1733
+ 0
1734
+ 0
1735
+ ˛
1736
+ ‚,
1737
+ has the same range as P `, hence the system (24) has exponential dichotomy on R with the
1738
+ projection
1739
+ Pptq “
1740
+ ¨
1741
+ ˝
1742
+ 1
1743
+ L1ptq
1744
+ L2ptq
1745
+ 0
1746
+ 0
1747
+ 0
1748
+ 0
1749
+ 0
1750
+ 0
1751
+ ˛
1752
+ ‚,
1753
+ for certain bounded functions L1ptqq and L2ptq. Note that in this case rangepPptqq “ tβp1, 0, 0q :
1754
+ β P Ru, is of dimension 1, and is always the stable space in the linearization, while
1755
+ rangepI ´ Pptqq “
1756
+ $
1757
+ &
1758
+
1759
+ ¨
1760
+ ˝
1761
+ ´L1ptq
1762
+ 1
1763
+ 0
1764
+ ˛
1765
+ ‚` β
1766
+ ¨
1767
+ ˝
1768
+ ´L2ptq
1769
+ 0
1770
+ 1
1771
+ ˛
1772
+ ‚ : α, β P R
1773
+ ,
1774
+ .
1775
+ - ,
1776
+ is a two dimensional space,and it is the time dependent unstable space in the linearization. The
1777
+ end of the proof is analogous to the first case. with these new spaces.
1778
+ Theorem 7.3. There exists a trajectory of (LV-3) denoted by y “ py1, y2, y3q : R Ñ R3 such that
1779
+ lim
1780
+ sÑ´8 |py1psq, y2psq, y3psq| “ 0.
1781
+ and
1782
+ lim
1783
+ sÑ8 |py1psq, y2psq, y3psqq ´ pu˚
1784
+ 1psq, u˚
1785
+ 2psq, u˚
1786
+ 3psqq| “ 0.
1787
+ Proof. The proof is analogous the the proof in the two-dimensional case, cf. Theorem 6.4, with
1788
+ following linearized system at p0, 0, 0q
1789
+ $
1790
+
1791
+ &
1792
+
1793
+ %
1794
+ v1ptq “
1795
+ ¨
1796
+ ˚
1797
+ ˝
1798
+ a1ptq
1799
+ 0
1800
+ 0
1801
+ 0
1802
+ a2ptq
1803
+ 0
1804
+ 0
1805
+ 0
1806
+ a3ptq
1807
+ ˛
1808
+ ‹‚vptq,
1809
+ (26)
1810
+ We prove now the result of the three-dimensional analogy of Theorem 6.5. The proof follows
1811
+ the same argument as in Theorem 6.5.
1812
+ Theorem 7.4. If a trajectory with a strictly positive initial condition is bounded both in the past
1813
+ and in the future then it must be one of trajectories described above.
1814
+ 26
1815
+
1816
+ 7
1817
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1818
+ Proof. From [Red96, Theorem 1. (v)] we know that u˚ is the only solution on R that is bounded
1819
+ away from 0 and 8. Thus, if the complete trajectory u “ pu1, u2, u3q is bounded, not coincides
1820
+ with u˚, and none of the three coordinates is zero, then for at least one of its coordinates there
1821
+ must exist a decreasing sequence tn Ñ ´8 such that uiptnq Ñ 0 and uiptnq ă di. We consider two
1822
+ cases.
1823
+ Case 1. Two coordinates converge to zero backward and one is separated from zero. Assume
1824
+ that there exist two sequences tn Ñ ´8 and ˆtn Ñ ´8 such that u1ptnq Ñ 0, u2pˆtnq Ñ 0,
1825
+ u1ptnq ă d1 and u2pˆtnq ă d2 We first prove that limtÑ´8 uiptq “ 0 for i “ 1, 2. We proceed
1826
+ analogously as in Lemma 5.2 and Theorem 6.5. If for some t P ptn`1, tnq, we have u1ptq ą u1ptnq
1827
+ then there exists t˚ P rt, tnq such that u1pt˚q ą u1ptnq and on pt˚, tnq the function u1 is strictly
1828
+ less that d1. Hence
1829
+ 0 ą u1ptnq ´ u1pt˚q “
1830
+ ż tn
1831
+ t˚ u1psqpa1psq ´ b11psqu1psq ´ b12psqu2psq ´ b13u3psqq ds ě
1832
+ ě
1833
+ ż tn
1834
+ t˚ u1psqpa1psq ´ b11psqd1qds ě 0,
1835
+ and we have the contradiction. The same argument allows us to get limtÑ´8 u2ptq “ 0.
1836
+ Now we need to prove that for u3ptq, that is separated from zero, it must be
1837
+ lim
1838
+ tÑ´8 |u3ptq ´ ¯u3ptq| “ 0.
1839
+ To this end assume that for some sequence tn Ñ ´8
1840
+ lim
1841
+ nÑ8 |u3ptnq ´ ¯u3ptnq| “ c ą 0.
1842
+ Now, since u3ptq is separated from zero, denoting K “ pu3qL and M “ pu3qU and using Lemma
1843
+ 2.2 and Lemma 2.3, we obtain for every x P rK, Ms
1844
+ |u3ptnq ´ ¯u3ptnq| ď |Sptn, tn ´ tqpu1ptn ´ tq, u2ptn ´ tq, u3ptn ´ tqq ´ Sptn, tn ´ tqp0, 0, xq|
1845
+ ` |Sptn, tn ´ tqp0, 0, xq ´ Sptn, tn ´ tqp0, 0, ¯u3ptn ´ tqq|
1846
+ ď eκt|pu1ptn ´ tq, u2ptn ´ tq, u3ptn ´ tqq ´ p0, 0, xq| ` 2 maxtM, d3u2
1847
+ mintK, d3u
1848
+ e´δ mintK,d3ut,
1849
+ with a constant κ depending on the bounds on u and the coefficients of the problem. Pick ε ą 0.
1850
+ We can find t ą 0 such that
1851
+ 2 maxtM,d3u2
1852
+ mintK,d3u e´δ mintK,d3ut ă
1853
+ ε
1854
+ 2.
1855
+ The sequence u3ptn ´ tq has a
1856
+ convergent subsequence, let x be a limit of this subsequence and pick n large enough such that
1857
+ eκt|pu1ptn ´ tq, u2ptn ´ tq, u3ptn ´ tqq ´ p0, 0, xq| ă ε
1858
+ 2. Hence for n large enough, on a subsequence,
1859
+ |u3ptnq ´ ¯u3ptnq| ă ε,
1860
+ a contradiction.
1861
+ Case 2. Only one coordinate converges to zero backwards. We assume, for example, that there
1862
+ exists a sequence tn Ñ ´8 such that u1ptnq Ñ 0, then, analogously to the previous case, we
1863
+ can prove that limtÑ´8 u1ptq “ 0. We must prove that for u2ptq, and u3ptq, that are backward
1864
+ separated from zero, it must be
1865
+ lim
1866
+ tÑ´8 |pu2ptq, u3ptqq ´ ppu2ptq, pu3ptqq| “ 0.
1867
+ 27
1868
+
1869
+ 7
1870
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1871
+ To this end assume that for some sequence tn Ñ ´8
1872
+ lim
1873
+ nÑ8 |pu2ptnq, u3ptnqq ´ ppu2ptnq, pu3ptnqq| “ c ą 0.
1874
+ (27)
1875
+ For every xi P ruL
1876
+ i , uU
1877
+ i s for i P t2, 3u, and using Lemma 2.3 with (H) and Lemma 2.2 we have for
1878
+ t ě 0
1879
+ |pu2ptnq, u3ptnqq ´ ppu2ptnq, pu3ptnqq|
1880
+ ď |Sptn, tn ´ tqpu1ptn ´ tq, u2ptn ´ tq, u3ptn ´ tqq ´ Sptn, tn ´ tqp0, x2, x3q|
1881
+ ` |Sptn, tn ´ tqp0, x2, x3q ´ Sptn, tn ´ tqp0, pu2ptnq, pu3ptn ´ tqq|
1882
+ ď eκt|pu1ptn ´ tq, u2ptn ´ tq, u3ptn ´ tqq ´ p0, x2, x3q| ` 2σ2
1883
+ ¯σ e´¯σδt,
1884
+ where κ, σ, ¯σ depend on the bounds on coefficients of the problem, constants appearing in (21)
1885
+ and on uL
1886
+ i , uU
1887
+ i . In particular [Red96, Lemma 2] implies that the solution starting from p0, x2, x3q
1888
+ at any time is separated from zero by a constant independent on initial time and the choice of
1889
+ initial data as long as xi P ruL
1890
+ i , uU
1891
+ i s. Pick ε ą 0. We can find t ą 0 such that 2σ2
1892
+ ¯σ e´¯σδt ă ε
1893
+ 2.
1894
+ The sequence pu2ptn ´ tq, u3ptn ´ tqq has a convergent subsequence, let px2, x3q be a limit of
1895
+ this subsequence and associated times are denoted by tptnu. We pick n large enough such that
1896
+ eκt|pu1ptn ´ tq, u2ptn ´ tq, u3ptn ´ tqq ´ p0, x2, x3q| ă ε
1897
+ 2, which leads into a direct contradiction with
1898
+ (27).
1899
+ Finally, the full image of the attractor represented in Figure 3 is described in the following
1900
+ theorem with a summary of the results obtained in this section and using Lemma 5.2, Theorem
1901
+ 6.3 and Theorem 6.4 for the remaining heterolinics connections.
1902
+ Theorem 7.5. Assuming (21) the system (LV-3) has the following solutions u : R Ñ R3 bounded
1903
+ both in the past and in the future:
1904
+ (a) uptq “ p0, 0, 0q for t P R,
1905
+ (b) uptq “ p¯u1ptq, 0, 0q, uptq “ p0, ¯u2ptq, 0q and uptq “ p0, 0, ¯u3q, given in Lemma 7.1.
1906
+ (c) Any solution uptq “ pu1ptq, 0, 0q with initial condition 0 ă u1pt0q ă ¯u1pt0q, where limtÑ´8 u1ptq “
1907
+ 0 and limtÑ8pu1ptq ´ ¯u1ptqq “ 0.
1908
+ Analogously, uptq “ p0, u2ptq, 0q with initial condi-
1909
+ tion 0 ă u2pt0q ă ¯u2pt0q, where limtÑ´8 u2ptq “ 0 and limtÑ8pu2ptq ´ ¯u2ptqq “ 0, and
1910
+ uptq “ p0, 0, u3ptqq with initial condition 0 ă u3pt0q ă ¯u3pt0q, where limtÑ´8 u3ptq “ 0 and
1911
+ limtÑ8pu3ptq ´ ¯u3ptqq “ 0.
1912
+ (d) uptq “ ppu1ptq, pu2ptq, 0q, uptq “ ppu1ptq, 0, pu3ptqq and uptq “ p0, pu2ptq, pu3ptqq, given in Lemma
1913
+ 7.1.
1914
+ (e) uptq “ pu1ptq, u2ptq, 0q where limtÑ´8pu1ptq, u2ptqq “ p0, 0q and limtÑ8ppu1ptq, u2ptqq ´
1915
+ ppu1ptq, pu2ptqqq “ 0.
1916
+ Analogously, uptq “ pu1ptq, 0, u3ptqq where limtÑ´8pu1ptq, u3ptqq “
1917
+ p0, 0q and limtÑ8ppu1ptq, u3ptqq ´ ppu1ptq, pu3ptqqq “ 0, and uptq “ p0, u2ptq, u3ptqq where
1918
+ limtÑ´8pu2ptq, u3ptqq “ p0, 0q and limtÑ8ppu2ptq, u3ptqq ´ ppu2ptq, pu3ptqqq “ 0.
1919
+ 28
1920
+
1921
+ 7
1922
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1923
+ (f) uptq “ pu1ptq, u2ptq, 0q where limtÑ´8pu1ptq, u2ptqq “ p¯u1, 0q and limtÑ8ppu1ptq, u2ptqq ´
1924
+ ppu1ptq, pu2ptqqq “ 0.
1925
+ Analogously, uptq “ pu1ptq, u2ptq, 0q where limtÑ´8pu1ptq, u2ptqq “
1926
+ p0, ¯u2q and limtÑ8ppu1ptq, u2ptqq ´ ppu1ptq, pu2ptqqq “ 0.
1927
+ (g) uptq “ pu1ptq, 0, u3ptqq where limtÑ´8pu1ptq, u3ptqq “ p¯u1, 0q and limtÑ8ppu1ptq, u3ptqq ´
1928
+ ppu1ptq, pu3ptqqq “ 0.
1929
+ Analogously, uptq “ pu1ptq, 0, u3ptqq where limtÑ´8pu1ptq, u3ptqq “
1930
+ p0, ¯u3q and limtÑ8ppu1ptq, u3ptqq ´ ppu1ptq, pu3ptqqq “ 0.
1931
+ (h) uptq “ p0, u2ptq, u3ptqq where limtÑ´8pu2ptq, u3ptqq “ p¯u2, 0q and limtÑ8ppu2ptq, u3ptqq ´
1932
+ ppu2ptq, pu3ptqqq “ 0.
1933
+ Analogously, uptq “ p0, u2ptq, u3ptqq where limtÑ´8pu2ptq, u3ptqq “
1934
+ p0, ¯u3q and limtÑ8ppu2ptq, u3ptqq ´ ppu2ptq, pu3ptqqq “ 0.
1935
+ (i) uptq “ pu˚
1936
+ 1ptq, u˚
1937
+ 2ptq, u˚
1938
+ 3ptqq bounded away from zero and infinity given in Lemma 7.1.
1939
+ (j) uptq “ pu1ptq, u2ptq, u3ptqq such that limtÑ´8pu1ptq, u2ptq, u3ptqq “ p0, 0, 0q and limtÑ8pu1ptq´
1940
+
1941
+ 1ptq, u2ptq ´ u˚
1942
+ 2ptq, u3ptq ´ u˚
1943
+ 3ptqq “ 0, given in Theorem 7.3.
1944
+ (k) uptq “ pu1ptq, u2ptq, u3ptqq such that limtÑ´8pu1ptq, u2ptq, u3ptqq “ ppu1ptq, pu2ptq, 0q and limtÑ8pu1ptq´
1945
+
1946
+ 1ptq, u2ptq´u˚
1947
+ 2ptq, u3ptq´u˚
1948
+ 3ptqq “ 0, given in Theorem 7.2. Analogously, uptq “ pu1ptq, u2ptq, u3ptqq
1949
+ such that limtÑ´8pu1ptq, u2ptq, u3ptqq “ ppu1ptq, 0, pu3ptqq and limtÑ8pu1ptq ´ u˚
1950
+ 1ptq, u2ptq ´
1951
+
1952
+ 2ptq, u3ptq´u˚
1953
+ 3ptqq “ 0, and uptq “ pu1ptq, u2ptq, u3ptqq such that limtÑ´8pu1ptq, u2ptq, u3ptqq “
1954
+ p0, pu2ptq, pu3ptqq and limtÑ8pu1ptq ´ u˚
1955
+ 1ptq, u2ptq ´ u˚
1956
+ 2ptq, u3ptq ´ u˚
1957
+ 3ptqq “ 0.
1958
+ (l) uptq “ pu1ptq, u2ptq, u3ptqq such that limtÑ´8pu1ptq, u2ptq, u3ptqq “ p¯u1ptq, 0, 0q and limtÑ8pu1ptq´
1959
+
1960
+ 1ptq, u2ptq´u˚
1961
+ 2ptq, u3ptq´u˚
1962
+ 3ptqq, given in Theorem 7.2. Analogously, uptq “ pu1ptq, u2ptq, u3ptqq
1963
+ such that limtÑ´8pu1ptq, u2ptq, u3ptqq “ p0, ¯u2ptq, 0q and limtÑ8pu1ptq´u˚
1964
+ 1ptq, u2ptq´u˚
1965
+ 2ptq, u3ptq´
1966
+
1967
+ 3ptqq “ 0, and uptq “ pu1ptq, u2ptq, u3ptqq such that limtÑ´8pu1ptq, u2ptq, u3ptqq “ p0, 0, ¯u3ptqq
1968
+ and limtÑ8pu1ptq ´ u˚
1969
+ 1ptq, u2ptq ´ u˚
1970
+ 2ptq, u3ptq ´ u˚
1971
+ 3ptqq “ 0.
1972
+ Moreover, any solution of (LV-3) bounded both in the past and in the future is one of the solutions
1973
+ described in items (a)-(l).
1974
+ 7.2
1975
+ Structure of attractor for the case of extinction of one species
1976
+ In case of the permanence of the two species we would have a scheme depicted in the next Figure.
1977
+ 29
1978
+
1979
+ 7
1980
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
1981
+ Figure 4: Four complete solutions and their connections for the three dimensional problem with
1982
+ globally asymptotically stable state with coexistence of two of the three species.
1983
+ Following Theorem 4.5 we have to impose the following conditions to a1, a2 and a3 to obtain
1984
+ the extinction of one species.
1985
+ $
1986
+
1987
+ &
1988
+
1989
+ %
1990
+ pc1b11 ` c2b12 ` c3b13qL ą 0,
1991
+ pc2b22 ` c1b21 ` c3b23qL ą 0,
1992
+ pc3b33 ` c1b31 ` c2b32qL ą 0,
1993
+ $
1994
+
1995
+ &
1996
+
1997
+ %
1998
+ b11 ¯d1 ` ε ď a1 ď b11d1 ` b12d2 ` b13d3 ` θpb12c2 ` b13c3q ´ ε,
1999
+ b22 ¯d2 ` ε ď a2 ď b21d1 ` b22d2 ` b23d3 ` θpb21c1 ` b23c3q ´ ε,
2000
+ a3 ď b31d1 ` b32d2 ` θpb31c1 ` b32c2q ´ ε,
2001
+ (28)
2002
+ with some constants di, ci ą 0 for i “ 1, 2, 3 , ¯dj ą 0 for j “ 1, 2 and ε, θ ą 0.
2003
+ The above
2004
+ inequalitites are the conditions (H) and (B2) for the three-dimensional case. Moreover we need
2005
+ to assume that |bij|U ă 8 and |ai|U ă 8 for every i P t1, 2u and j P t1, 2, 3u. Summarizing all
2006
+ previous results we can formulate the following theorem.
2007
+ Theorem 7.6. Assuming (28) the system (LV-3) has the following trajectories u : R Ñ R3 bounded
2008
+ both in the past and in the future
2009
+ (a) uptq “ p0, 0, 0q for t P R,
2010
+ (b) uptq “ p¯u1ptq, 0, 0q, uptq “ p0, ¯u2ptq, 0q for t P R, where ¯ui, for i “ 1, 2, is the unique trajectory
2011
+ of u1
2012
+ i “ uipaiptq ´ biiptquiptqq separated from zero and infinity given by Lemma 5.1,
2013
+ (c) uptq “ pu1ptq, 0, 0q where limtÑ´8 u1ptq “ 0 and limtÑ8pu1ptq ´ ¯u1ptqq “ 0. Any solution
2014
+ with the initial data pu1pt0q, 0, 0q satisfying 0 ă u1pt0q ă ¯u1pt0q constitutes such trajectory.
2015
+ Analogously with any solution with the initial data p0, u2pt0q, 0q satisfying 0 ă u2pt0q ă ¯u2pt0q,
2016
+ constitutes the trajectory that satisfies uptq “ p0, u2ptq, 0q where limtÑ´8 u2ptq “ 0 and
2017
+ limtÑ8pu2ptq ´ ¯u2ptqq “ 0.
2018
+ (d) uptq “ ppu1ptq, pu2ptq, 0q, where ppu1, pu2q, is the unique trajectory of the two dimensional system
2019
+ obatined taking u3 ” 0 separated from zero and infinity given by Lemma 6.1.
2020
+ 30
2021
+
2022
+ u1
2023
+ W2
2024
+ u3
2025
+ 1
2026
+ u2
2027
+ u1
2028
+ 2
2029
+ u3
2030
+ 3
2031
+ 2
2032
+ u3
2033
+ u17
2034
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
2035
+ (e) uptq “ pu1ptq, u2ptq, 0q where limtÑ´8pu1ptq, u2ptqq “ p0, 0q and limtÑ8ppu1ptq, u2ptqq ´
2036
+ ppu1ptq, pu2ptqqq “ 0.
2037
+ (f) uptq “ pu1ptq, u2ptq, 0q where limtÑ´8pu1ptq, u2ptqq “ p¯u1, 0q and limtÑ8ppu1ptq, u2ptqq ´
2038
+ ppu1ptq, pu2ptqqq “ 0.
2039
+ Analogously, uptq “ pu1ptq, u2ptq, 0q where limtÑ´8pu1ptq, u2ptqq “
2040
+ p0, ¯u2q and limtÑ8ppu1ptq, u2ptqq ´ ppu1ptq, pu2ptqqq “ 0.
2041
+ If a solution u : R Ñ R3 is bounded then it must be on of the solutions of items (a)-(f). Moreover,
2042
+ (g) Any solution uptq “ pu1ptq, u2ptq, u3ptqq with initial data uipt0q ą 0 for i “ 1, 2, 3, satisfies
2043
+ limtÑ8pu1ptq ´ pu1ptq, u2ptq ´ pu2ptq, u3ptqq “ p0, 0, 0q and limtÑ´8 |uptq| “ 8.
2044
+ (h) Any solution uptq “ p0, 0, u3ptqq with u3pt0q ą 0 satisfies limtÑ8 u3ptq “ 0 and limtÑ´8 u3ptq “
2045
+ 8,
2046
+ (i) Any solution uptq “ pu1ptq, 0, 0q with u1pt0q ą ¯u1pt0q satisfies limtÑ8pu1ptq ´ ¯u1ptqq “ 0
2047
+ and limtÑ´8 u1ptq “ 8. Analogously, any solution uptq “ p0, u2ptq, 0q with u2pt0q ą ¯u2pt0q
2048
+ satisfies limtÑ8pu2ptq ´ ¯u2ptqq “ 0 and limtÑ´8 u2ptq “ 8.
2049
+ (j) Any solution uptq “ pu1ptq, 0, u3ptqq with u1pt0q ą 0, u3pt0q ą 0 satisfies limtÑ8pu1ptq ´
2050
+ ¯u1ptq, u3ptqq “ 0 and limtÑ´8 |pu1ptq, u3ptqq| “ 8. Analogously, any solution uptq “ p0, u2ptq, u3ptqq
2051
+ with u2pt0q ą 0, u3ptq ą 0 satisfies limtÑ8pu2ptq´¯u2ptq, u3ptqq “ 0 and limtÑ´8 |pu2ptq, u3ptqq| “
2052
+ 8.
2053
+ 7.3
2054
+ The case of extinction of two species
2055
+ In case of the extinction of the two species we would have a scheme as the next Figure.
2056
+ Figure 5: Two complete solutions and their connections for the three dimensional problem with
2057
+ globally asymptotically stable state with existence of one species.
2058
+ By Theorem 4.5 we have to impose the following conditions on the problem coefficients to
2059
+ obtain the case of the permanence of one species and extinction of the remaining two.
2060
+ 31
2061
+
2062
+ u1
2063
+ u2
2064
+ u3
2065
+ u3
2066
+ u1
2067
+ u27
2068
+ ATTRACTOR FOR NON-AUTONOMOUS LOTKA-VOLTERRA 3-D SYSTEM
2069
+ $
2070
+
2071
+ &
2072
+
2073
+ %
2074
+ pc1b11 ` c2b12 ` c3b13qL ą 0,
2075
+ pc2b22 ` c1b21 ` c3b23qL ą 0,
2076
+ pc3b33 ` c1b31 ` c2b32qL ą 0,
2077
+ $
2078
+
2079
+ &
2080
+
2081
+ %
2082
+ b11 ¯d1 ` ε ď a1 ď b11d1 ` b12d2 ` b13d3 ` θpb12c2 ` b13c3q ´ ε,
2083
+ a2 ď b21d1 ` b23d3 ` θpb21c1 ` b23c3q ´ ε,
2084
+ a3 ď b31d1 ` b32d2 ` θpb31c1 ` b32c2q ´ ε,
2085
+ (29)
2086
+ with some constants di, ci ą 0 for i “ 1, 2, 3 , ¯d1 ą 0 and ε, θ ą 0. The above inequalitites are the
2087
+ conditions (H) and (B1) for the three-dimensional case. We need to assume again that |b1j|U ă 8
2088
+ and |a1|U ă 8 for every j P t1, 2, 3u
2089
+ Theorem 7.7. Assuming (29) the system (LV-3) has the following trajectories u : R Ñ R3 bounded
2090
+ both in the past and in the future
2091
+ (a) uptq “ p0, 0, 0q for t P R,
2092
+ (b) uptq “ p¯u1ptq, 0, 0q, for t P R, where ¯u1 is the unique trajectory of u1
2093
+ 1 “ u1pa1ptq´b11ptqu1ptqq
2094
+ separated from zero and infinity given by Lemma 5.1,
2095
+ (c) uptq “ pu1ptq, 0, 0q where limtÑ´8 u1ptq “ 0 and limtÑ8pu1ptq ´ ¯u1ptqq “ 0. Any solution
2096
+ with the initial data pu1pt0q, 0, 0q satisfying 0 ă u1pt0q ă ¯u1pt0q constitutes such trajectory.
2097
+ The solutions described in (a)-(c) are the only ones which are bounded both in the past and in the
2098
+ future. Moreover,
2099
+ (d) Any solution uptq “ pu1ptq, u2ptq, u3ptqq with initial data uipt0q ą 0 for i “ 1, 2, 3, satisfies
2100
+ limtÑ8pu1ptq ´ ¯u1ptq, u2ptq, u3ptqq “ p0, 0, 0q and limtÑ´8 |uptq| “ 8.
2101
+ (e) Any solution uptq “ p0, u2ptq, 0q with u2pt0q ą 0 satisfies limtÑ8 u2ptq “ 0 and limtÑ´8 u2ptq “
2102
+ 8. Analogously, uptq “ p0, 0, u3ptqq with u3pt0q ą 0 satisfies limtÑ8 u3ptq “ 0 and limtÑ´8 u3ptq “
2103
+ 8,
2104
+ (f) Any solution uptq “ pu1ptq, 0, 0q with u1pt0q ą ¯u1pt0q satisfies limtÑ8pu1ptq ´ ¯u1ptqq “ 0 and
2105
+ limtÑ´8 u1ptq “ 8.
2106
+ (g) Any solution p0, u2ptq, u3ptqq with u2pt0q ą 0, u3pt0q ą 0 satisfies limtÑ8pu2ptq, u3ptqq “ 0
2107
+ and limtÑ´8 |pu2ptq, u3ptqq| “ 8.
2108
+ (h) Any solution pu1ptq, 0, u3ptqq with u1pt0q ą 0 and u3pt0q ą 0 satisfies limtÑ8pu1ptq´¯u1ptq, 0, u3ptqq “
2109
+ 0 and limtÑ´8 |pu1ptq, u3ptqq| “ 8. Analogously any solution pu1ptq, u2ptq, 0q with u1pt0q ą 0
2110
+ and u2pt0q ą 0 satisfies limtÑ8pu1ptq ´ ¯u1ptq, u2ptq, 0q “ 0 and limtÑ´8 |pu1ptq, u2ptqq| “ 8.
2111
+ 7.4
2112
+ Extinction of all species
2113
+ The last situation is the extinction of all species.
2114
+ To obtain this case we make the following
2115
+ assumptions
2116
+ $
2117
+
2118
+ &
2119
+
2120
+ %
2121
+ pc1b11 ` c2b12 ` c3b13qL ą 0,
2122
+ pc2b22 ` c1b21 ` c3b23qL ą 0,
2123
+ pc3b33 ` c1b31 ` c2b32qL ą 0.
2124
+ $
2125
+
2126
+ &
2127
+
2128
+ %
2129
+ a1 ď b12d2 ` b13d3 ` θpb12c2 ` b23c3q ´ ε
2130
+ a2 ď b21d1 ` b23d3 ` θpb21c1 ` b23c3q ´ ε
2131
+ a3 ď b31d1 ` b32d2 ` θpb31c1 ` b32c2q ´ ε
2132
+ (30)
2133
+ 32
2134
+
2135
+ REFERENCES
2136
+ with some constants di, ci ą 0 for i P t1, 2, 3u, and ε, θ ą 0. We observe that the first inequalities
2137
+ is the condition (H) and the second ones is the condition pBq with J “ t1, 2, 3u and I “ H.
2138
+ Theorem 7.8. Assuming (30) the only trajectory of system (LV-3) which is bounded both in
2139
+ the past and and the future is uptq “ p0, 0, 0q for t P R.
2140
+ Moreover for every solution with
2141
+ initial data uipt0q ą 0 for any i P t1, 2, 3u, we have limtÑ8pu1ptq, u2ptq, u3ptqq “ p0, 0, 0q and
2142
+ limtÑ´8 |pu1ptq, u2ptq, u3ptqq| “ 8.
2143
+ Proof. The convergence limtÑ8pu1ptq, u2ptq, u3ptqq “ p0, 0, 0q follows from Lemma 4.2. The fact
2144
+ that any solution with initial data u1pt0q ą 0, u2pt0q or u3pt0q ą 0 is backward unbounded, follows
2145
+ from Lemma 4.3.
2146
+ Funding
2147
+ Work of JGF has been partially supported by the Spanish Ministerio de Ciencia, Innovaci´on y
2148
+ Universidades (MCIU), Agencia Estatal de Investigaci´on (AEI), Fondo Europeo de Desarrollo
2149
+ Regional (FEDER) under grant PRE2019-087385. JGF and JALR have been also supported by
2150
+ projects PGC2018-096540-B-I00 and PID2021-122991NB-C21. Work of PK has been supported
2151
+ by Polish National Agency for Academic Exchange (NAWA) within the Bekker Programme under
2152
+ Project No. PPN/BEK/2020/1/00265/U/00001, and by National Science Center (NCN) of Poland
2153
+ under Projects No. UMO-2016/22/A/ST1/00077 and DEC-2017/25/B/ST1/00302. AS has been
2154
+ partially supported by projects US-1381261 and PGC2018-098308-B-I00.
2155
+ References
2156
+ [Ahm93] S. Ahmad. On the nonautonomous Volterra–Lotka competition equations. Proceedings
2157
+ of the American Mathematical Society, 117:199–204, 1993.
2158
+ [AKL22] P. Almaraz, P. Kalita, and J.A. Langa.
2159
+ Structural stability of invasion graphs for
2160
+ generalized lotka–volterra systems. https://arxiv.org/abs/2209.09802v4, 2022.
2161
+ [AL95] S. Ahmad and A. Lazer. On the nonautonomous n-competing species problems. Ap-
2162
+ plicable Analysis., 57:309–323, 1995.
2163
+ [AL98] S. Ahmad and A. Lazer. Necessary and sufficient average growth in a Lotka–Volterra
2164
+ system. Nonlinear Analysis, 34:191–228, 1998.
2165
+ [AL00] S. Ahmad and A. Lazer. Average conditions for global asymptotic stability in an nonau-
2166
+ tonomous Lotka–Volterra system. Nonlinear Analysis, 40:37–49, 2000.
2167
+ [BCL20] M.C. Bortolan, A.N. Carvalho, and J.A. Langa. Attractors Under Autonomous and
2168
+ Non-autonomous Perturbations, volume 246 of Mathematical Surveys and Monographs.
2169
+ AMS, 2020.
2170
+ [BF20] F. Battelli and M. Feˇckan. On the exponents of exponential dichotomies. Mathematics,
2171
+ 8:651, 2020.
2172
+ [BP15] F. Battelli and K.J. Palmer. Criteria for exponential dichotomy for triangular systems.
2173
+ Journal of Mathematical Analysis and Applications, 428:525–543, 2015.
2174
+ 33
2175
+
2176
+ REFERENCES
2177
+ [CLR13] A.N. Carvalho, J.A. Langa, and J.C. Robinson.
2178
+ Attractors for Infinite-dimensional
2179
+ Non-autonomous Dynamical Systems, volume 182 of Applied Mathematical Sciences.
2180
+ Springer-Verlag, 2013.
2181
+ [Cop65] W.A. Coppel. Stability and Asymptotic Behaviour of Differential Equations. Heath
2182
+ Mathematical Monographs. D.C.Heath, 1965.
2183
+ [Cop78] W.A. Coppel. Dichotomies in Stability Theory, volume 629 of Lecture Notes in Math-
2184
+ ematics. Springer-Verlag, 1978.
2185
+ [CRLO23] A.N. Carvalho, L.R.N. Rocha, J.A. Langa, and R. Obaya. Structure of non-autonomous
2186
+ attractors for a class of diffusively coupled ODE. Discrete and Continuous Dynamical
2187
+ Systems - Series B, 28:426–448, 2023.
2188
+ [Gop86a] K. Gopalsamy. Global asymptotic stability in a periodic Lotka–Volterra system. The
2189
+ ANZIAM Journal, 27:66–72, 1986.
2190
+ [Gop86b] K. Gopalsamy. Global asymptotic stability in an almost periodic Lotka–Volterra sys-
2191
+ tem. The ANZIAM Journal, 27:346–360, 1986.
2192
+ [Gue17] G.F. Guerrero. Din´amica de redes mutualistas en ecosistemas complejos. PhD thesis,
2193
+ Universidad de Sevilla, Sevilla, Espa˜na, 6 2017.
2194
+ [HS22] J. Hofbauer and S.J. Schreiber. Permanence via invasion graphs: incorporating com-
2195
+ munity assembly into modern coexistence theory. Journal of Mathematical Biology,
2196
+ 85:Article number: 54, 2022.
2197
+ [KR11] P. Kloeden and M. Rasmussen. Nonautonomous Dynamical Systems, volume 176 of
2198
+ Mathematical Surveys and Monographs. American Mathematical Society, 2011.
2199
+ [Red96] R. Redheffer.
2200
+ Nonautonomous Lotka–Volterra systems. I. J.Differential Equations,
2201
+ 127:519–541, 1996.
2202
+ [Tak96] Y. Takeuchi. Global asymptotic dynamical properties of Lotka-Volterra systems. World
2203
+ Scientific Publishing, 1996.
2204
+ 34
2205
+
XNE4T4oBgHgl3EQfNQyg/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
XtAzT4oBgHgl3EQfmf3D/content/tmp_files/2301.01565v1.pdf.txt ADDED
@@ -0,0 +1,1344 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01565v1 [quant-ph] 4 Jan 2023
2
+ General pseudo self-adjoint boundary conditions for a 1D KFG
3
+ particle in a box
4
+ Salvatore De Vincenzo1, ∗
5
+ 1The Institute for Fundamental Study (IF),
6
+ Naresuan University, Phitsanulok 65000, Thailand
7
+ (Dated: January 3, 2023)
8
+ Abstract We consider a 1D Klein-Fock-Gordon particle in a finite interval, or box. We
9
+ construct the most general set of pseudo self-adjoint boundary conditions for the Hamil-
10
+ tonian operator that is present in the first order in time 1D Klein-Fock-Gordon wave equa-
11
+ tion, or the 1D Feshbach-Villars wave equation. This set depends on four real parameters
12
+ and can be written in terms of the one-component wavefunction for the second order in
13
+ time 1D Klein-Fock-Gordon wave equation and its spatial derivative, both evaluated at
14
+ the endpoints of the box. This set can also be made dependent on the two-component
15
+ wavefunction for the 1D Feshbach-Villars equation and its spatial derivative, evaluated
16
+ at the ends of the box; however, the set actually depends on these two column vectors
17
+ each multiplied by the singular matrix that is present in the kinetic energy term of the
18
+ Hamiltonian. As a consequence, this set of boundary conditions does not imply that the
19
+ two-component wavefunction for the Feshbach-Villars equation and its spatial derivative,
20
+ evaluated at the ends of the box, satisfy it by themselves. However, any specific bound-
21
+ ary condition for the 1D Feshbach-Villars equation can be obtained from the respective
22
+ boundary condition for the second order in time 1D Klein-Fock-Gordon wave equation
23
+ and using a pair of relations that arise from the very definition of the two-component
24
+ wavefunction for the 1D Feshbach-Villars equation. Our results can be extended to the
25
+ problem of the 1D Klein-Fock-Gordon particle moving on the real line with a hole at one
26
+ point.
27
+ PACS numbers: 03.65.-w, 03.65.Ca, 03.65.Db, 03.65.Pm
28
+ Keywords: Klein-Fock-Gordon wave equation in (1+1) dimensions; Feshbach-Villars wave equa-
29
+ tion in (1+1) dimensions; pseudo-Hermitian operator; pseudo self-adjoint operator; boundary
30
+ conditions
31
+
32
+ 2
33
+ I.
34
+ INTRODUCTION
35
+ Let us write the one-dimensional (1D) Klein-Fock-Gordon (KFG) wave equation in Hamiltonian
36
+ form,
37
+ iℏ ∂
38
+ ∂tΨ = ˆhΨ,
39
+ (1)
40
+ where
41
+ ˆh = − ℏ2
42
+ 2m (ˆτ3 + iˆτ2) ∂2
43
+ ∂x2 + mc2ˆτ3 + V (x)ˆ12,
44
+ (2)
45
+ is, let us say, the KFG Hamiltonian differential operator. Here, ˆτ3 = ˆσz and ˆτ2 = ˆσy are Pauli ma-
46
+ trices and V (x) ∈ R is the external electric potential (ˆ12 is the 2×2 identity matrix). The operator
47
+ ˆh acts on two-component column state vectors of the form Ψ = Ψ(x, t) = [ ψ1(x, t) ψ2(x, t) ]T
48
+ (the symbol T represents the transpose of a matrix). Equation (1) with ˆh given in Eq. (2) is
49
+ also called the 1D Feshbach-Villars (FV) wave equation [1–4].
50
+ The 1D KFG wave equation in its standard form, or the second order in time KFG equation
51
+ in one spatial dimension [5, 6] is given by
52
+
53
+ iℏ ∂
54
+ ∂t − V (x)
55
+ �2
56
+ ψ =
57
+
58
+ −ℏ2c2 ∂2
59
+ ∂x2 + (mc2)2
60
+
61
+ ψ,
62
+ (3)
63
+ where ψ = ψ(x, t) is a one-component state vector or one-component wavefunction.
64
+ The relation between ψ and Ψ can be defined as follows:
65
+ Ψ =
66
+
67
+  ψ1
68
+ ψ2
69
+
70
+  = 1
71
+ 2
72
+
73
+  ψ + iτ
74
+ � ∂
75
+ ∂t − V
76
+ iℏ
77
+
78
+ ψ
79
+ ψ − iτ
80
+ � ∂
81
+ ∂t − V
82
+ iℏ
83
+
84
+ ψ
85
+
86
+  ,
87
+ (4)
88
+ where τ ≡ ℏ/mc2. The Compton wavelength is precisely λC ≡ cτ; thus, τ is the time taken for
89
+ a ray of light to travel the distance λC. The expression given in Eq. (3) is fully equivalent to Eq.
90
+ (1) (with ˆh given in Eq. (2)) [3, 4]. Note that, from Eq. (4), the solution ψ of Eq. (3) depends
91
+ only on the components of the column vector Ψ, namely,
92
+ ψ = ψ1 + ψ2.
93
+ (5)
94
+ Additionally,
95
+
96
+ iℏ ∂
97
+ ∂tψ − V ψ
98
+
99
+ 1
100
+ mc2 = ψ1 − ψ2.
101
+ (6)
102
+ ∗URL: https://orcid.org/0000-0002-5009-053X; Electronic address: [[email protected]]
103
+
104
+ 3
105
+ All the results we have presented thus far are well known; however, to the best of our knowl-
106
+ edge, there is one issue within the 1D KFG theory that has received little attention and that
107
+ we can raise with the following questions: What are the boundary conditions that the 1D FV
108
+ equation can support? In particular, what are the appropriate boundary conditions for this equa-
109
+ tion in the problem of the 1D KFG particle inside an interval? For example, some unexpected
110
+ boundary conditions for the solutions of the 1D FV wave equation in simple physical situations
111
+ were presented in Refs. [7–9]. In general, the boundary conditions for solutions of the second
112
+ order in time KFG wave equation appear to be similar to those supported by the Schrödinger
113
+ wavefunction (see, for example, Refs. [7, 9–11]), but we do not have at our disposal a wave
114
+ equation that could have boundary conditions similar to those of the 1D FV equation (the pres-
115
+ ence of the singular matrix ˆτ3 + iˆτ2 in the Hamiltonian has much to do with this). In general,
116
+ the physically acceptable boundary conditions for a wave equation must ensure that the corre-
117
+ sponding Hamiltonian maintains its essential property, for example, that of being self-adjoint (if
118
+ that is the case). In the case of the 1D FV equation, it is known that the Hamiltonian is a
119
+ formally pseudo-Hermitian operator (or a formally pseudo self-adjoint operator) [1, 3], and we
120
+ could find families of general boundary conditions that agree with the property of being a pseudo
121
+ self-adjoint operator, namely, not just formally, i.e., not only without specifying the domain of
122
+ the Hamiltonian (as is done in the case of Hamiltonians that are self-adjoint).
123
+ The article is organized as follows. In Section II, we introduce the pseudo inner product for the
124
+ two-component solutions of the 1D FV equation and briefly discuss its relation to other distinctive
125
+ inner products of quantum mechanics.
126
+ This pseudo inner product could also be considered
127
+ the scalar product for the one-component solutions of the KFG equation in its standard form.
128
+ Certainly, the pseudo inner product does not possess the property of positive definiteness, but
129
+ can be independent of time.
130
+ Thus, the corresponding pseudo norm can be a constant, and
131
+ because this implies that the probability current density takes the same value at each end of
132
+ the box, the Hamiltonian for this problem can be a pseudo-Hermitian operator. In fact, ˆh is
133
+ formally pseudo-Hermitian, and we find in this section a general four-parameter set of boundary
134
+ conditions that ensures that ˆh is indeed a pseudo-Hermitian operator. We write this set in terms
135
+ of ψ and ∂ψ/∂x evaluated at the ends of the box. Here, we also consider the nonrelativistic
136
+ approximation of the general set of boundary conditions and the results support the idea that this
137
+ set is indeed the most general. In Section III, we write the general set of boundary conditions in
138
+ terms of the values that Ψ and ∂Ψ/∂x take at the ends of the box. To be precise, the set must
139
+
140
+ 4
141
+ be written in terms of the values that (ˆτ3 + iˆτ2)Ψ and (ˆτ3 + iˆτ2)(∂Ψ/∂x) take at the endpoints
142
+ of the box, but (ˆτ3 + iˆτ2) is a singular matrix, i.e., it does not have an inverse. In Section IV
143
+ (Appendix I), we check that the time derivative of the pseudo inner product of two solutions of
144
+ the 1D FV equation with a potential other than zero, but expressed in terms of the respective
145
+ solutions of the usual KFG equation with V ̸= 0, is proportional to a term evaluated at the ends
146
+ of the box that also does not depend on the potential, i.e., it is a boundary term. In Section
147
+ V (Appendix II), we show that the Hamiltonian operator ˆh for a 1D KFG particle in a box is in
148
+ fact a pseudo self-adjoint operator; that is, the general matrix boundary condition ensures that
149
+ the domains of ˆh and its generalized adjoint are equal. From the results shown in this section it
150
+ follows that the boundary term that arose in Section IV (Appendix I) always vanishes, certainly
151
+ for any boundary condition included in the general family of boundary conditions. Consequently,
152
+ the value of the pseudo inner product in this problem is conserved. Finally, some concluding
153
+ remarks are presented in Section VI.
154
+ II.
155
+ BOUNDARY CONDITIONS FOR THE 1D KFG PARTICLE IN A BOX I
156
+ Let us consider a 1D KFG particle moving in the interval x ∈ Ω = [a, b], i.e., in a box. The
157
+ corresponding Hamiltonian operator given in Eq. (2) acts on two-component column state vectors
158
+ of the form Ψ = [ ψ1 ψ2 ]T and Φ = [ φ1 φ2 ]T, and the scalar product for these two state vectors
159
+ must be defined as
160
+ ⟨⟨Ψ, Φ⟩⟩ ≡
161
+ ˆ
162
+
163
+ dx Ψ†ˆτ3Φ
164
+ (7)
165
+ (the symbol † denotes the usual Hermitian conjugate, or the usual formal adjoint, of a matrix
166
+ and an operator) [1–4]. Additionally, the square of the corresponding norm (or rather, pseudo
167
+ norm) is ∥∥Ψ∥∥2 ≡ ⟨⟨Ψ, Ψ⟩⟩ =
168
+ ´
169
+ Ω dx ̺, where ̺ = ̺(x, t) = Ψ†ˆτ3Ψ = |ψ1|2 − |ψ2|2 is the
170
+ KFG probability density. Certainly, ̺ is not positive definite and calling it probability density
171
+ is not absolutely correct (although it can be interpreted as a charge density) [1–4]. Note that
172
+ the integral in (7) can also be identified with the usual scalar product in Dirac theory in (1+1)
173
+ dimensions, namely, ⟨Ψ, Φ⟩D ≡
174
+ ´
175
+ Ω dx Ψ†Φ, which is an inner product on the Hilbert space of
176
+ two-component square-integrable wavefunctions, L2(Ω) ⊕ L2(Ω); therefore,
177
+ ⟨⟨Ψ, Φ⟩⟩ ≡ ⟨Ψ, ˆτ3Φ⟩D,
178
+ (8)
179
+
180
+ 5
181
+ and ⟨Ψ, Φ⟩D = ⟨⟨Ψ, ˆτ3Φ⟩⟩. Because ⟨⟨Ψ, Ψ⟩⟩ can be a negative quantity, the scalar product in
182
+ Eq. (7) is an indefinite (or improper) inner product, or a pseudo inner product, on an infinite-
183
+ dimensional complex vector space. In general, such a vector space itself is not necessarily a
184
+ Hilbert space.
185
+ Similarly, writing Ψ and Φ in the integrand in (7) in terms of their respective components,
186
+ that is, using the relations that arise from Eq. (4) and other analogous relations for Φ (which are
187
+ obtained from Eq. (4) by making the replacements Ψ → Φ, ψ1 → φ1, ψ2 → φ2 and ψ → φ),
188
+ we obtain
189
+ ⟨⟨Ψ, Φ⟩⟩ =
190
+ iℏ
191
+ 2mc2
192
+ ˆ
193
+
194
+ dx
195
+
196
+ ψ∗φt − ψ∗
197
+ t φ − 2V
198
+ iℏ ψ∗φ
199
+
200
+ (9)
201
+ (where the asterisk ∗ denotes the complex conjugate, and ψt ≡ ∂ψ/∂t, etc), or also,
202
+ ⟨⟨Ψ, Φ⟩⟩ =
203
+ iℏ
204
+ 2mc2
205
+
206
+ ⟨ψ, φt⟩S − ⟨ψt, φ⟩S − 2V
207
+ iℏ ⟨ψ, φ⟩S
208
+
209
+ ≡ ⟨ψ, φ⟩KFG,
210
+ (10)
211
+ where ⟨ψ, φ⟩KFG can be considered the scalar product for the one-component solutions of the
212
+ KFG equation in Eq. (3) (see Appendix I). Note that ⟨ , ⟩S denotes the usual scalar product
213
+ in the Schrödinger theory in one spatial dimension, namely, ⟨ψ, φ⟩S ≡
214
+ ´
215
+ Ω dx ψ∗φ, which is an
216
+ inner product on the Hilbert space of one-component square-integrable wavefunctions, L2(Ω).
217
+ Certainly, ψ and ψt, and φ and φt, must belong to L2(Ω) to ensure that ⟨ψ, φ⟩KFG exists [12].
218
+ It can be noted that there is an isomorphism between the vectorial space of the solutions ψ
219
+ of the common KFG equation for the corresponding 1D particle, namely,
220
+ ��
221
+ ∂t − V
222
+ iℏ
223
+ �2
224
+ + ˆd
225
+
226
+ ψ = 0
227
+ (11)
228
+ (Eq. (3)), where ˆd ≡ −c2∂xx + τ −2 (∂t ≡ ∂/∂t and ∂xx ≡ ∂2/∂x2, etc) and the vectorial space
229
+ of the initial state vectors of the KFG equation in Hamiltonian form for this 1D particle, namely,
230
+ Eq. (1) with ˆh given in Eq. (2) [13]. In effect, a possible initial state vector, for example, at
231
+ t = 0, would have the form
232
+ Ψ(0) =
233
+
234
+  ψ1(0)
235
+ ψ2(0)
236
+
237
+  = 1
238
+ 2
239
+
240
+  ψ(0) + iτ
241
+
242
+ ψt(0) − V
243
+ iℏψ(0)
244
+
245
+ ψ(0) − iτ
246
+
247
+ ψt(0) − V
248
+ iℏψ(0)
249
+
250
+
251
+  ,
252
+ (12)
253
+ that arises immediately from the relation given in Eq. (4). Thus, giving an initial state vector
254
+ as Ψ(0) is equivalent to providing the initial data for the solution vector ψ, namely, ψ(0) and
255
+ ψt(0). Incidentally, operators ˆd, which can act on the one-component state vectors ψ, and ˆh,
256
+
257
+ 6
258
+ which can act on the two-component state vectors Ψ, are related as follows:
259
+ ˆh = +ℏ
260
+ 2τ (ˆτ3 + iˆτ2) ˆd + ℏ
261
+ 2τ −1 (ˆτ3 − iˆτ2) + V (x)ˆ12.
262
+ (13)
263
+ Although the scalar product in Eqs. (7) and (10) does not possess the property of positive
264
+ definiteness (i.e., ⟨⟨Ψ, Ψ⟩⟩ > 0), it is a time-independent scalar product. Indeed, using Eq. (3)
265
+ for ψ and ψ∗, and for φ and φ∗, it can be demonstrated that the following relation is verified:
266
+ d
267
+ dt⟨⟨Ψ, Φ⟩⟩ = − iℏ
268
+ 2m [ ψ∗
269
+ x φ − ψ∗φx ]|b
270
+ a = d
271
+ dt⟨ψ, φ⟩KFG,
272
+ (14)
273
+ where [ g ]|b
274
+ a ≡ g(b, t)−g(a, t), and ψx ≡ ∂ψ/∂x, etc. This result is also valid when V is different
275
+ from zero inside the box (see Appendix I). The term evaluated at the endpoints of the interval
276
+ Ω must vanish due to the boundary condition satisfied by ψ and φ, or Ψ and Φ (see Appendix
277
+ II). Additionally, if we make ψ = φ, or Ψ = Φ, in Eq. (14), we obtain the result
278
+ d
279
+ dt⟨⟨Ψ, Ψ⟩⟩ = − [ j ]|b
280
+ a = d
281
+ dt⟨ψ, ψ⟩KFG,
282
+ (15)
283
+ where j = j(x, t) = (iℏ/2m)(ψ∗
284
+ x ψ−ψ∗ψx) would be the probability current density, although we
285
+ know that this quantity, as well as ̺, cannot be interpreted as probability quantities [3, 4]. The
286
+ disappearance of the boundary term in Eq. (15) implies that the pseudo norm remains constant,
287
+ and because j(a, t) = j(b, t), we have that ˆh must be a pseudo-Hermitian operator. In the case
288
+ that Ω = R, the scalar product ⟨⟨Ψ, Φ⟩⟩ is a time-independent constant whenever Ψ and Φ are
289
+ two normalizable solutions, i.e., solutions that have their pseudo norm finite. The square of the
290
+ pseudo norm of these functions could be negative, but their magnitude cannot be infinite if the
291
+ boundary term in Eq. (14) is expected to be zero.
292
+ Next, we use the pseudo inner product given in Eq. (7), which is defined over an indefinite
293
+ inner product space [14]. For a collection of basic properties of this scalar product (but also of
294
+ general results on Hamiltonians of the type given in Eq. (2)), see Ref. [12]. Using integration
295
+ by parts twice, it can be demonstrated that the Hamiltonian differential operator ˆh in Eq. (2)
296
+ satisfies the following relation:
297
+ ⟨⟨Ψ, ˆhΦ⟩⟩ = ⟨⟨ˆhadjΨ, Φ⟩⟩ + f[Ψ, Φ],
298
+ (16)
299
+ where the boundary term f[Ψ, Φ] is given by
300
+ f[Ψ, Φ] ≡ ℏ2
301
+ 2m
302
+
303
+ Ψ†
304
+ x ˆτ3 (ˆτ3 + iˆτ2)Φ − Ψ† ˆτ3 (ˆτ3 + iˆτ2)Φx
305
+ ���b
306
+ a .
307
+ (17)
308
+
309
+ 7
310
+ This quantity can also be written in a way that will be especially important, namely,
311
+ f[Ψ, Φ] ≡ ℏ2
312
+ 2m
313
+ 1
314
+ 2
315
+
316
+ ((ˆτ3 + iˆτ2)Ψx)† (ˆτ3 + iˆτ2)Φ − ((ˆτ3 + iˆτ2)Ψ)† (ˆτ3 + iˆτ2)Φx
317
+ ����
318
+ b
319
+ a .
320
+ (18)
321
+ The latter somewhat unexpected expression is true because the singular matrix ˆτ3 +iˆτ2 obeys the
322
+ following relation: (ˆτ3 +iˆτ2)†(ˆτ3 +iˆτ2) = 2ˆτ3 (ˆτ3 +iˆτ2); however, (ˆτ3 +iˆτ2)2 = ˆ0. The differential
323
+ operator ˆhadj in Eq. (16) is the generalized Hermitian conjugate, or the formal generalized adjoint
324
+ of ˆh, namely,
325
+ ˆhadj = ˆη−1 ˆh† ˆη = ˆτ3 ˆh† ˆτ3
326
+ (19)
327
+ (ˆη = ˆτ3 = ˆη−1 is sometimes called the metric operator; in this case, ˆη is a bounded operator
328
+ and satisfies ˆη3 = ˆη) and therefore (just formally, i.e., by using only the scalar product definition
329
+ given in Eq. (7)),
330
+ ⟨⟨Ψ, ˆhΦ⟩⟩ = ⟨⟨ˆhadjΨ, Φ⟩⟩.
331
+ (20)
332
+ The latter is essentially the relation that defines the generalized adjoint differential operator ˆhadj
333
+ on an indefinite inner product space. Clearly, the latter definition requires that f[Ψ, Φ] in Eq.
334
+ (16) vanishes.
335
+ The Hamiltonian operator also formally satisfies the following relation:
336
+ ˆh = ˆhadj,
337
+ (21)
338
+ that is, ˆh is formally generalized Hermitian (or formally pseudo-Hermitian), or formally generalized
339
+ self-adjoint (or formally pseudo self-adjoint). However, if the boundary conditions imposed on Ψ
340
+ and Φ at the endpoints of the interval Ω lead to the cancellation of the boundary term in Eq.
341
+ (16), then the differential operator ˆh is indeed generalized Hermitian (or pseudo-Hermitian), and
342
+ as shown in Appendix II, it is also generalized self-adjoint (or pseudo self-adjoint), i.e.,
343
+ ⟨⟨Ψ, ˆhΦ⟩⟩ = ⟨⟨ˆhΨ, Φ⟩⟩.
344
+ (22)
345
+ Precisely, we want to obtain a general set of boundary conditions for the generalized Hermitian
346
+ Hamiltonian differential operator. Thus, if we impose Ψ = Φ in the latter relation and in Eq.
347
+ (16) (with the result in Eq. (21)), we obtain the following condition:
348
+ f[Ψ, Ψ] = ℏ
349
+ i [ j ]|b
350
+ a = 0
351
+ ( ⇒ j(b, t) = j(a, t) ) ,
352
+ (23)
353
+ where j = j(x, t) is given by
354
+ j = iℏ
355
+ 2m
356
+ 1
357
+ 2
358
+
359
+ ((ˆτ3 + iˆτ2)Ψx)† (ˆτ3 + iˆτ2)Ψ − ((ˆτ3 + iˆτ2)Ψ)† (ˆτ3 + iˆτ2)Ψx
360
+
361
+ (24)
362
+
363
+ 8
364
+ (see Eq. (18)). But also because ˆτ3 (ˆτ3 + iˆτ2) = ˆ12 + ˆσx (the latter if we use the expression
365
+ given by Eq. (17)), and the result in Eq. (5), we obtain
366
+ j = iℏ
367
+ 2m ( ψ∗
368
+ x ψ − ψ∗ψx ) ,
369
+ (25)
370
+ as expected (see the comment made just after Eq. (15)). Certainly, all the generalized Hermitian
371
+ boundary conditions must lead to the equality of j at the endpoints of the interval Ω. Further-
372
+ more, we also obtain the result ⟨⟨Ψ, ˆhΨ⟩⟩ = ⟨⟨ˆhΨ, Ψ⟩⟩ = ⟨⟨Ψ, ˆhΨ⟩⟩∗ (the superscript ∗ denotes
373
+ the complex conjugate); therefore, ⟨⟨Ψ, ˆhΨ⟩⟩ ≡ ⟨⟨ˆh⟩⟩Ψ ∈ R, i.e., the generalized mean value of
374
+ the Hamiltonian operator is real valued. Other typical properties of operators that are Hermitian
375
+ in the usual sense hold here as well; for example, the eigenvalues are real (see, for example, Refs.
376
+ [1, 3]).
377
+ Substituting j from Eq. (25) into Eq. (23), we obtain the result (we omit the variable t in
378
+ the expressions that follow)
379
+ λ2m
380
+ ℏ2 f[Ψ, Ψ] = [ ψ λψ∗
381
+ x − ψ∗λψx ]|b
382
+ a
383
+ = [ ψ(b) λψ∗
384
+ x(b) − ψ∗(b) λψx(b) ] − [ ψ(a) λψ∗
385
+ x(a) − ψ∗(a) λψx(a) ] = 0,
386
+ (26)
387
+ where λ ∈ R is a parameter required for dimensional reasons. It is very convenient to rewrite the
388
+ latter two terms using the following identity:
389
+ z1z∗
390
+ 2 − z∗
391
+ 1z2 = i
392
+ 2 [ (z1 + iz2)(z1 + iz2)∗ − (z1 − iz2)(z1 − iz2)∗ ]
393
+ = i
394
+ 2
395
+
396
+ |z1 + iz2|2 − |z1 − iz2|2 �
397
+ ,
398
+ (27)
399
+ where z1 and z2 are complex numbers. Then, the following result is obtained:
400
+ λ2m
401
+ ℏ2 f[Ψ, Ψ] = i
402
+ 2
403
+
404
+ |ψ(b) + iλψx(b)|2 − |ψ(b) − iλψx(b)|2 �
405
+ − i
406
+ 2
407
+
408
+ |ψ(a) + iλψx(a)|2 − |ψ(a) − iλψx(a)|2 �
409
+ = i
410
+ 2
411
+
412
+ |ψ(b) + iλψx(b)|2 + |ψ(a) − iλψx(a)|2 �
413
+ − i
414
+ 2
415
+
416
+ |ψ(b) − iλψx(b)|2 + |ψ(a) + iλψx(a)|2 �
417
+ = 0,
418
+ (28)
419
+ that is,
420
+ λ2m
421
+ ℏ2 f[Ψ, Ψ] = i
422
+ 2
423
+
424
+  ψ(b) + iλψx(b)
425
+ ψ(a) − iλψx(a)
426
+
427
+
428
+ † 
429
+  ψ(b) + iλψx(b)
430
+ ψ(a) − iλψx(a)
431
+
432
+
433
+
434
+ 9
435
+ − i
436
+ 2
437
+
438
+  ψ(b) − iλψx(b)
439
+ ψ(a) + iλψx(a)
440
+
441
+
442
+ † 
443
+  ψ(b) − iλψx(b)
444
+ ψ(a) + iλψx(a)
445
+
446
+  = 0.
447
+ (29)
448
+ Let us now consider the following general matrix boundary condition:
449
+
450
+  ψ(b) + iλψx(b)
451
+ ψ(a) − iλψx(a)
452
+
453
+  = ˆM
454
+
455
+  ψ(b) − iλψx(b)
456
+ ψ(a) + iλψx(a)
457
+
458
+  ,
459
+ (30)
460
+ where ˆM is an arbitrary complex matrix. By substituting Eq. (30) into Eq. (29), we obtain
461
+ i
462
+ 2
463
+
464
+  ψ(b) − iλψx(b)
465
+ ψ(a) + iλψx(a)
466
+
467
+
468
+ † �
469
+ ˆM† ˆM − ˆ12
470
+
471
+
472
+  ψ(b) − iλψx(b)
473
+ ψ(a) + iλψx(a)
474
+
475
+  = 0;
476
+ therefore, ˆM is a unitary matrix (the justification for this result is given in the comment that
477
+ follows Eq. (A14)). Thus, a general set of generalized Hermitian boundary conditions for the 1D
478
+ KFG particle in a box can be written as follows:
479
+
480
+  ψ(b) − iλψx(b)
481
+ ψ(a) + iλψx(a)
482
+
483
+  = ˆU(2×2)
484
+
485
+  ψ(b) + iλψx(b)
486
+ ψ(a) − iλψx(a)
487
+
488
+  ,
489
+ (31)
490
+ where ˆU(2×2) = ˆM−1 is also unitary. This family of boundary conditions is similar to the one
491
+ corresponding to the problem of the 1D Schrödinger particle enclosed in a box; for example, see
492
+ Eq. (28) in Ref. [15]. In relation to this, we can also take the nonrelativistic approximation of the
493
+ general boundary condition given in Eq. (31). For that purpose, it is convenient to first write the
494
+ KFG wavefunction ψ = ψ(x, t) as follows: ψ = ψS exp(−i mc2t/ℏ), where ψS = ψS(x, t) is the
495
+ Schrödinger wavefunction. Because in this approximation we have that | iℏ(ψS)t | ≪ mc2 | ψS |,
496
+ we can write ψt = (−i mc2t/ℏ)ψ, and therefore ψ1 =
497
+
498
+ 1 −
499
+ V
500
+ 2mc2
501
+
502
+ ψ and ψ2 =
503
+ V
504
+ 2mc2ψ (see Eq.
505
+ (4)). Thus, for weak external potentials and to the lowest order in v/c (and for positive energy
506
+ solutions), ψ1 ≈ ψ satisfies the Schrödinger equation in the potential V + mc2 (the latter mc2
507
+ can be eliminated by using the expression ψ1 ≈ ψ = ψS exp(−i mc2t/ℏ)) but also (ψ1)x ≈ ψx
508
+ (see, for example, Refs. [2, 3, 9]). It is then clear that, in the problem of the particle in a box, the
509
+ one-component KFG wavefunction satisfies the same boundary conditions as the one-component
510
+ Schrödinger wavefunction. Incidentally, a similar result to Eq. (31) had already been obtained
511
+ by taking the nonrelativistic limit of the most general family of boundary conditions for the 1D
512
+ Dirac particle enclosed in a box [16]. Additionally, in the analogous problem of a 1D Schrödinger
513
+ particle in the presence of a point interaction at the point x = 0 (or a hole at the origin), the most
514
+
515
+ 10
516
+ general family of boundary conditions is similar to that given in Eq. (31) [17]. Indeed, all these
517
+ results substantiate that the set of boundary conditions dependent on the four real parameters
518
+ given in Eq. (31) is also the most general for a 1D KFG particle in the interval [a, b]. Moreover,
519
+ by making the replacements a → 0+ and b → 0− in Eq. (31), we obtain the respective most
520
+ general set of boundary conditions for the case in which the 1D KFG particle moves along the
521
+ real line with a hole at the origin. Some examples of boundary conditions for this system can be
522
+ seen in Refs. [7, 9] and will be briefly discussed in Section III.
523
+ For all the boundary conditions that are part of the general set of boundary conditions in
524
+ Eq. (31), ˆh is a pseudo-Hermitian operator, but it is also a pseudo self-adjoint operator (see
525
+ Appendix II). Certainly, the result in Eq. (31) is given in terms of the wavefunction ψ, but if the
526
+ relation in Eq. (5) is used, it can also be written in terms of the components of Ψ = [ ψ1 ψ2 ]T,
527
+ i.e., in terms of ψ1 + ψ2, and its spatial derivative (ψ1)x + (ψ2)x, evaluated at the edges x = a
528
+ and x = b. Actually, the general family of boundary conditions given in Eq. (31) must be written
529
+ in terms of (ˆτ3 + iˆτ2)Ψ and (ˆτ3 + iˆτ2)Ψx evaluated at the ends of the box. We work on this
530
+ in the next section. We give below some examples of boundary conditions that are contained
531
+ in Eq.
532
+ (31): ψ(a) = ψ(b) = 0 (ˆU(2×2) = −ˆ12), i.e., ψ can satisfy the Dirichlet boundary
533
+ condition; ψx(a) = ψx(b) = 0 (ˆU(2×2) = +ˆ12), i.e., ψ can satisfy the Neumann boundary
534
+ condition; ψ(a) = ψ(b) and ψx(a) = ψx(b) (ˆU(2×2) = +ˆσx), ψ can satisfy the periodic boundary
535
+ condition; ψ(a) = −ψ(b) and ψx(a) = −ψx(b) (ˆU(2×2) = −ˆσx), ψ can satisfy the antiperiodic
536
+ boundary condition; ψ(a) = ψx(b) = 0 (ˆU(2×2) = ˆσz), i.e., ψ can satisfy a mixed boundary
537
+ condition; ψx(a) = ψ(b) = 0 (ˆU(2×2) = −ˆσz), i.e., ψ can satisfy another mixed boundary
538
+ condition; ψ(a) − λψx(a) = 0 and ψ(b) + λψx(b) = 0 (ˆU(2×2) = iˆ12), ψ can satisfy a kind of
539
+ Robin boundary condition. In fact, the latter boundary condition would be the KFG version of
540
+ the boundary condition commonly used in the so-called (one-dimensional) MIT bag model for
541
+ hadronic structures (see, for example, Ref. [16]). All these boundary conditions are typical of
542
+ wave equations that are of the second order in the spatial derivative.
543
+ Of all the boundary conditions included in the four-parameter family of boundary conditions,
544
+ only those arising from a diagonal unitary matrix describe a particle in an impenetrable box. This
545
+ is because, for these boundary conditions, the probability current density satisfies the relation
546
+ j(b) = j(a) = 0 for all t. Thus, the most general family of confining boundary conditions for
547
+ a 1D KFG particle in a box only has two (real) parameters. The latter result is due to the
548
+ similarity between the general set of boundary conditions given in Eq. (31) and the general sets
549
+
550
+ 11
551
+ of boundary conditions for the 1D Dirac and Schrödinger particles, and because we already know
552
+ that the confining boundary conditions come from a matrix ˆU(2×2) that is diagonal [16].
553
+ III.
554
+ BOUNDARY CONDITIONS FOR THE 1D KFG PARTICLE IN A BOX II
555
+ Here, we show that the most general family of pseudo self-adjoint boundary conditions can also
556
+ be expressed in terms of Ψ and Ψx evaluated at the endpoints of the box. Specifically, in terms
557
+ of (ˆτ3 + iˆτ2)Ψ and (ˆτ3 + iˆτ2)Ψx. Indeed, following a procedure similar to that used above to
558
+ obtain Eq. (26), namely, substituting j from Eq. (24) into Eq. (23), we obtain
559
+ λ2m
560
+ ℏ2 f[Ψ, Ψ] = 1
561
+ 2
562
+
563
+ ((ˆτ3 + iˆτ2)λΨx)† (ˆτ3 + iˆτ2)Ψ − ((ˆτ3 + iˆτ2)Ψ)† (ˆτ3 + iˆτ2)λΨx
564
+ ����
565
+ b
566
+ a
567
+ = 1
568
+ 2
569
+
570
+ ((ˆτ3 + iˆτ2)λΨx(b))† (ˆτ3 + iˆτ2)Ψ(b) − ((ˆτ3 + iˆτ2)Ψ(b))† (ˆτ3 + iˆτ2)λΨx(b)
571
+
572
+ − 1
573
+ 2
574
+
575
+ ((ˆτ3 + iˆτ2)λΨx(a))† (ˆτ3 + iˆτ2)Ψ(a) − ((ˆτ3 + iˆτ2)Ψ(a))† (ˆτ3 + iˆτ2)λΨx(a)
576
+
577
+ = 0,
578
+ (32)
579
+ where again, we insert the real parameter λ for dimensional reasons. Now, we use the following
580
+ matrix identity twice:
581
+ ˆZ†
582
+ 2 ˆZ1 − ˆZ†
583
+ 1 ˆZ2 = i
584
+ 2
585
+
586
+ (ˆZ1 + iˆZ2)†(ˆZ1 + iˆZ2) − (ˆZ1 − iˆZ2)†(ˆZ1 − iˆZ2)
587
+
588
+ .
589
+ (33)
590
+ Then, we obtain the following result:
591
+ λ2m
592
+ ℏ2 f[Ψ, Ψ] = 1
593
+ 2
594
+ i
595
+ 2
596
+
597
+ ((ˆτ3 + iˆτ2)(Ψ + iλΨx)(b))† (ˆτ3 + iˆτ2)(Ψ + iλΨx)(b)
598
+ − ((ˆτ3 + iˆτ2)(Ψ − iλΨx)(b))† (ˆτ3 + iˆτ2)(Ψ − iλΨx)(b)
599
+
600
+ −1
601
+ 2
602
+ i
603
+ 2
604
+
605
+ ((ˆτ3 + iˆτ2)(Ψ + iλΨx)(a))† (ˆτ3 + iˆτ2)(Ψ + iλΨx)(a)
606
+ − ((ˆτ3 + iˆτ2)(Ψ − iλΨx)(a))† (ˆτ3 + iˆτ2)(Ψ − iλΨx)(a)
607
+
608
+ = 0,
609
+ (34)
610
+ that is,
611
+ λ2m
612
+ ℏ2 f[Ψ, Ψ] = 1
613
+ 2
614
+ i
615
+ 2
616
+
617
+  (ˆτ3 + iˆτ2)(Ψ + iλΨx)(b)
618
+ (ˆτ3 + iˆτ2)(Ψ − iλΨx)(a)
619
+
620
+
621
+ † 
622
+  (ˆτ3 + iˆτ2)(Ψ + iλΨx)(b)
623
+ (ˆτ3 + iˆτ2)(Ψ − iλΨx)(a)
624
+
625
+
626
+ − 1
627
+ 2
628
+ i
629
+ 2
630
+
631
+  (ˆτ3 + iˆτ2)(Ψ − iλΨx)(b)
632
+ (ˆτ3 + iˆτ2)(Ψ + iλΨx)(a)
633
+
634
+
635
+ † 
636
+  (ˆτ3 + iˆτ2)(Ψ − iλΨx)(b)
637
+ (ˆτ3 + iˆτ2)(Ψ + iλΨx)(a)
638
+
639
+  = 0.
640
+ (35)
641
+
642
+ 12
643
+ Now, we propose writing a general matrix boundary condition as follows:
644
+
645
+  (ˆτ3 + iˆτ2)(Ψ + iλΨx)(b)
646
+ (ˆτ3 + iˆτ2)(Ψ − iλΨx)(a)
647
+
648
+  = ˆA
649
+
650
+  (ˆτ3 + iˆτ2)(Ψ − iλΨx)(b)
651
+ (ˆτ3 + iˆτ2)(Ψ + iλΨx)(a)
652
+
653
+  ,
654
+ (36)
655
+ where ˆA is an arbitrary 4 × 4 complex matrix. By substituting Eq. (36) into Eq. (35), we obtain
656
+ 1
657
+ 2
658
+ i
659
+ 2
660
+
661
+  (ˆτ3 + iˆτ2)(Ψ − iλΨx)(b)
662
+ (ˆτ3 + iˆτ2)(Ψ + iλΨx)(a)
663
+
664
+
665
+ † �
666
+ ˆA† ˆA − ˆ14
667
+
668
+
669
+  (ˆτ3 + iˆτ2)(Ψ − iλΨx)(b)
670
+ (ˆτ3 + iˆτ2)(Ψ + iλΨx)(a)
671
+
672
+  = 0,
673
+ then ˆA is a unitary matrix (ˆ14 is the 4 × 4 identity matrix). Note that the components of the
674
+ column vectors in Eq. (36) are themselves 2 × 1 column matrices and are given by
675
+ (ˆτ3 + iˆτ2)(Ψ ± iλΨx)(x) =
676
+
677
+  (ψ ± iλψx)(x)
678
+ −(ψ ± iλψx)(x)
679
+
680
+  ,
681
+ x = a, b.
682
+ (37)
683
+ Thus, the general boundary condition in Eq. (36) can be written as follows:
684
+
685
+ 
686
+ (ψ + iλψx)(b)
687
+ −(ψ + iλψx)(b)
688
+ (ψ − iλψx)(a)
689
+ −(ψ − iλψx)(a)
690
+
691
+ 
692
+ = ˆA
693
+
694
+ 
695
+ (ψ − iλψx)(b)
696
+ −(ψ − iλψx)(b)
697
+ (ψ + iλψx)(a)
698
+ −(ψ + iλψx)(a)
699
+
700
+ 
701
+ .
702
+ (38)
703
+ On the other hand, this relation can also be written as follows:
704
+
705
+ 
706
+ (ψ + iλψx)(b)
707
+ (ψ − iλψx)(a)
708
+ (ψ + iλψx)(b)
709
+ (ψ − iλψx)(a)
710
+
711
+ 
712
+ = ˆSˆAˆS†
713
+
714
+ 
715
+ (ψ − iλψx)(b)
716
+ (ψ + iλψx)(a)
717
+ (ψ − iλψx)(b)
718
+ (ψ + iλψx)(a)
719
+
720
+ 
721
+ ,
722
+ (39)
723
+ where ˆS is given by
724
+ ˆS =
725
+
726
+ 
727
+ 1
728
+ 0
729
+ 0
730
+ 0
731
+ 0
732
+ 0
733
+ 1
734
+ 0
735
+ 0 −1 0
736
+ 0
737
+ 0
738
+ 0
739
+ 0 −1
740
+
741
+ 
742
+ = 1
743
+ 2
744
+
745
+ ˆσz ⊗ ˆ12 + iˆσy ⊗ ˆσx + iˆσx ⊗ ˆσy + ˆ12 ⊗ ˆσz
746
+
747
+ ,
748
+ (40)
749
+
750
+ 13
751
+ where ⊗ denotes the Zehfuss-Kronecker product of matrices, or the matrix direct product
752
+ ˆF ⊗ ˆG ≡
753
+
754
+ 
755
+ F11 ˆG · · · F1n ˆG
756
+ ...
757
+ ...
758
+ ...
759
+ Fm1 ˆG · · · Fmn ˆG
760
+
761
+  ,
762
+ (41)
763
+ which is bilinear and associative and satisfies, among other properties, the mixed-product prop-
764
+ erty: (ˆF ⊗ ˆG)(ˆJ ⊗ ˆK) = (ˆFˆJ ⊗ ˆGˆK) (see, for example, Ref. [18]). The matrix ˆS is unitary, and
765
+ therefore, ˆSˆAˆS† is also a unitary matrix. Now, notice that the left-hand side of the relation in
766
+ Eq. (39) is given by (see Eq. (30))
767
+
768
+ 
769
+
770
+  (ψ + iλψx)(b)
771
+ (ψ − iλψx)(a)
772
+
773
+
774
+
775
+  (ψ + iλψx)(b)
776
+ (ψ − iλψx)(a)
777
+
778
+
779
+
780
+ 
781
+ =
782
+
783
+ 
784
+ ˆM
785
+
786
+  (ψ − iλψx)(b)
787
+ (ψ + iλψx)(a)
788
+
789
+
790
+ ˆM
791
+
792
+  (ψ − iλψx)(b)
793
+ (ψ + iλψx)(a)
794
+
795
+
796
+
797
+ 
798
+ =
799
+
800
+
801
+ ˆM ˆ0
802
+ ˆ0
803
+ ˆM
804
+
805
+
806
+
807
+ 
808
+ (ψ − iλψx)(b)
809
+ (ψ + iλψx)(a)
810
+ (ψ − iλψx)(b)
811
+ (ψ + iλψx)(a)
812
+
813
+ 
814
+ ,
815
+ (42)
816
+ and substituting the latter relation into Eq. (39), we obtain
817
+ ˆSˆAˆS† =
818
+
819
+
820
+ ˆM ˆ0
821
+ ˆ0
822
+ ˆM
823
+
824
+  = ˆ12 ⊗ ˆM
825
+ (43)
826
+ (because ˆM is a unitary matrix, the block diagonal matrix in Eq. (43) is also unitary). Then,
827
+ from Eq. (43), we can write the matrix ˆA as follows:
828
+ ˆA = ˆS†
829
+
830
+
831
+ ˆM ˆ0
832
+ ˆ0
833
+ ˆM
834
+
835
+  ˆS = ˆS†(ˆ12 ⊗ ˆM)ˆS.
836
+ (44)
837
+ Thus, the most general set of generalized self-adjoint boundary conditions for the 1D KFG particle
838
+ in a box can be written as follows (see Eq. (36)):
839
+
840
+  (ˆτ3 + iˆτ2)(Ψ − iλΨx)(b)
841
+ (ˆτ3 + iˆτ2)(Ψ + iλΨx)(a)
842
+
843
+  = ˆU(4×4)
844
+
845
+  (ˆτ3 + iˆτ2)(Ψ + iλΨx)(b)
846
+ (ˆτ3 + iˆτ2)(Ψ − iλΨx)(a)
847
+
848
+  ,
849
+ (45)
850
+ where
851
+ ˆU(4×4) = ˆA−1 = ˆA† = ˆS†
852
+
853
+
854
+ ˆM†
855
+ ˆ0
856
+ ˆ0
857
+ ˆM†
858
+
859
+  ˆS = ˆS†
860
+
861
+
862
+ ˆM−1
863
+ ˆ0
864
+ ˆ0
865
+ ˆM−1
866
+
867
+  ˆS
868
+ = ˆS†
869
+
870
+
871
+ ˆU(2×2)
872
+ ˆ0
873
+ ˆ0
874
+ ˆU(2×2)
875
+
876
+  ˆS = ˆS†(ˆ12 ⊗ ˆU(2×2))ˆS
877
+ (46)
878
+
879
+ 14
880
+ (to reach this result, we use Eq. (44) and the fact that ˆU(2×2) = ˆM−1, the latter two results
881
+ and only some properties of the matrix direct product could also be used). Note that the general
882
+ matrix boundary condition in Eq. (45) could also be written as follows:
883
+ (ˆ12 ⊗ (ˆτ3 + iˆτ2))
884
+
885
+  (Ψ − iλΨx)(b)
886
+ (Ψ + iλΨx)(a)
887
+
888
+  = ˆU(4×4)(ˆ12 ⊗ (ˆτ3 + iˆτ2))
889
+
890
+  (Ψ + iλΨx)(b)
891
+ (Ψ − iλΨx)(a)
892
+
893
+  ;
894
+ (47)
895
+ however, the matrix ˆ12 ⊗ (ˆτ3 + iˆτ2) does not have an inverse and the column vector on the left
896
+ side of this relation cannot be cleared. Thus, the expression given in Eq. (47) is an elegant way
897
+ to write the general boundary condition, but it is not functional and could lead to errors.
898
+ The boundary conditions that were presented just before the last paragraph of Sect. II can be
899
+ extracted from Eq. (45) if the matrix ˆU(2×2) is known. In effect, the Dirichlet boundary condition
900
+ is (ˆτ3 + iˆτ2)Ψ(a) = (ˆτ3 + iˆτ2)Ψ(b) = 0 (ˆU(4×4) = −ˆ14 = −ˆ12 ⊗ ˆ12); the Neumann boundary
901
+ condition is (ˆτ3 + iˆτ2)Ψx(a) = (ˆτ3 + iˆτ2)Ψx(b) = 0 (ˆU(4×4) = +ˆ14 = +ˆ12 ⊗ ˆ12); the periodic
902
+ boundary condition is (ˆτ3 + iˆτ2)Ψ(a) = (ˆτ3 + iˆτ2)Ψ(b) and (ˆτ3 + iˆτ2)Ψx(a) = (ˆτ3 + iˆτ2)Ψx(b)
903
+ (ˆU(4×4) = ˆσx ⊗ ˆ12); the antiperiodic boundary condition is (ˆτ3 + iˆτ2)Ψ(a) = −(ˆτ3 + iˆτ2)Ψ(b)
904
+ and (ˆτ3 + iˆτ2)Ψx(a) = −(ˆτ3 + iˆτ2)Ψx(b) (ˆU(4×4) = −ˆσx ⊗ ˆ12); a mixed boundary condition is
905
+ (ˆτ3 + iˆτ2)Ψ(a) = (ˆτ3 + iˆτ2)Ψx(b) = 0 (ˆU(4×4) = ˆσz ⊗ ˆ12); another mixed boundary condition is
906
+ (ˆτ3 + iˆτ2)Ψx(a) = (ˆτ3 + iˆτ2)Ψ(b) = 0 (ˆU(4×4) = −ˆσz ⊗ ˆ12); a kind of Robin boundary condition
907
+ (and a kind of MIT bag boundary condition for a 1D KFG particle) is (ˆτ3+iˆτ2)(Ψ(a)−λΨx(a)) =
908
+ 0 and (ˆτ3 + iˆτ2)(Ψ(b) + λΨx(b)) = 0 (ˆU(4×4) = iˆ14 = iˆ12 ⊗ ˆ12). Then, to write all these
909
+ boundary conditions in terms of ψ(a) and ψ(b), and ψx(a) and ψx(b), we must use the fact that
910
+ Ψ = [ ψ1 ψ2 ]T and ψ = ψ1 + ψ2 (Eq. (5)). If we wish to obtain explicit relations between the
911
+ components of Ψ and Ψx at x = a and Ψ and Ψx at x = b, we must use the relations given in
912
+ Eqs. (5) and (6). Additionally, it can be shown that when the matrix ˆU(2×2) is diagonal, then
913
+ the matrix ˆU(4×4) is also diagonal; consequently, diagonal matrices ˆU(4×4) in Eq. (45) lead to
914
+ confining boundary conditions (see the last paragraph of Sect. II).
915
+ In general, the boundary conditions imposed on (ˆτ3 +iˆτ2)Ψ and (ˆτ3 +iˆτ2)Ψx at the endpoints
916
+ of the box do not imply that Ψ and Ψx must also satisfy them. For example, let us consider
917
+ the problem of the 1D KFG particle in the step potential (V (x) = V0 Θ(x), where Θ(x) is
918
+ the Heaviside step function).
919
+ This problem was also considered in Refs.
920
+ [7, 9].
921
+ The step
922
+ potential is a (soft) point interaction in the neighborhood of the origin, that is, between the
923
+ points x = a → 0+ and x = b → 0−, and the boundary condition is the periodic boundary
924
+
925
+ 15
926
+ condition, which in this case becomes the continuity condition of (ˆτ3 + iˆτ2)Ψ and (ˆτ3 + iˆτ2)Ψx
927
+ at x = 0, i.e., (ˆτ3 + iˆτ2)Ψ(0−) = (ˆτ3 + iˆτ2)Ψ(0+) and (ˆτ3 + iˆτ2)Ψx(0−) = (ˆτ3 + iˆτ2)Ψx(0+).
928
+ As we know, from this condition, it is obtained that ψ(0−) = ψ(0+) and ψx(0−) = ψx(0+).
929
+ If the relations ψ1 + ψ2 = ψ (Eq. (5)) and ψ1 − ψ2 = (E − V )ψ/mc2 (Eq. (6)) are used
930
+ (in the latter, we also assumed that ψ is an energy eigenstate), one can find relations between
931
+ {Ψ(0+), Ψx(0+)} and {Ψ(0−), Ψx(0−)}. We find that the relation given in Eq. (30) in Ref.
932
+ [7] is none other than the boundary condition (ˆτ3 + iˆτ2)Ψ(0−) = (ˆτ3 + iˆτ2)Ψ(0+), with Eqs.
933
+ (5) and (6) evaluated at x = 0±. Likewise, the relation given in Eq. (31) of the same reference
934
+ is none other than (ˆτ3 + iˆτ2)Ψx(0−) = (ˆτ3 + iˆτ2)Ψx(0+), with the spatial derivatives of Eqs.
935
+ (5) and (6) also evaluated at x = 0±. Finally, adding the latter two boundary conditions, we
936
+ obtain Eq. (32) of Ref. [7]. Clearly, if the height of the step potential is not zero, then Ψ(0+)
937
+ is different from Ψ(0−), and Ψx(0+) is different from Ψx(0−). Similarly, in Ref. [9], it was
938
+ explicitly proven that Ψ(0+) ̸= Ψ(0−) and Ψx(0+) ̸= Ψx(0−) (see Eqs. (19) and (20) in
939
+ that reference), but it was also shown that the boundary condition should be written in the form
940
+ (ˆτ3+iˆτ2)Ψ(0−) = (ˆτ3+iˆτ2)Ψ(0+) and (ˆτ3+iˆτ2)Ψx(0−) = (ˆτ3+iˆτ2)Ψx(0+). Incidentally, in the
941
+ same reference, it was shown that the latter boundary condition can be obtained by integrating
942
+ the 1D FV equation from x = 0− to x = 0+.
943
+ On the other hand, in the problem of the 1D KFG particle inside the box Ω = [a, b], and
944
+ subjected to the potential V , with the Dirichlet boundary condition, (ˆτ3 + iˆτ2)Ψ(a) = (ˆτ3 +
945
+ iˆτ2)Ψ(b) = 0, we know that ψ also satisfies this condition, namely, ψ(a) = ψ(b) = 0. The
946
+ latter boundary condition together with Eqs. (5) and (6) lead us to the boundary condition
947
+ Ψ(a) = Ψ(b) = 0. Indeed, in addition to ψ1(a) + ψ2(a) = ψ1(b) + ψ2(b) = 0, ψ1(a) − ψ2(a) =
948
+ ψ1(b) − ψ2(b) = 0 (because ψt(a, t) = ψt(b, t) = 0 also holds). Finally, Ψ also satisfies the
949
+ Dirichlet boundary condition at the edges of the box (the latter boundary condition was precisely
950
+ the one used in Ref. [8]).
951
+ In short, let us suppose that the one-component wavefunction ψ can vanish at a point on
952
+ the real line, for example, at x = 0 (also V (0+) and V (0−) must be finite numbers there).
953
+ The latter is the Dirichlet boundary condition, namely, ψ(0−) = ψ(0+) = 0 ≡ ψ(0). Certainly,
954
+ this result is obtained from the disappearance of (ˆτ3 + iˆτ2)Ψ at that same point, i.e., from the
955
+ fact that the Hamiltonian operator with the latter boundary condition is a pseudo self-adjoint
956
+ operator; then, the latter condition implies that the entire two-component wavefunction Ψ has
957
+ to disappear at that point (use Eqs. (5) and (6)). In other words, the 1D FV wave equation
958
+
959
+ 16
960
+ is a second-order equation in the spatial derivative that accepts the vanishing of the entire two-
961
+ component wavefunction at a point. On the other hand, let us now suppose that ψx can vanish
962
+ at a point on the real line, for example, at x = 0, but ψ is nonzero there (also Vx(0+) and
963
+ Vx(0−) must be finite numbers there). The latter is the Neumann boundary condition, namely,
964
+ ψx(0−) = ψx(0+) = 0 ≡ ψx(0). Indeed, we also have that (ˆτ3 + iˆτ2)Ψx vanishes at that same
965
+ point. Then, it can be shown that (ψ1)x and (ψ2)x do not have to vanish at the point in question,
966
+ and therefore, Ψx is not zero there either (use Eqs. (5) and (6)).
967
+ IV.
968
+ APPENDIX I
969
+ The 1D KFG wave equation given in Eq. (3) can also be written as follows:
970
+
971
+ −ℏ2 ∂2
972
+ ∂t2 − i2ℏ V (x) ∂
973
+ ∂t + (V (x))2
974
+
975
+ ψ =
976
+
977
+ −ℏ2c2 ∂2
978
+ ∂x2 + (mc2)2
979
+
980
+ ψ,
981
+ (A1)
982
+ and therefore,
983
+ ψtt = c2ψxx −
984
+ �mc2
985
+
986
+ �2
987
+ ψ + 2V
988
+ iℏ ψt + V 2
989
+ ℏ2 ψ.
990
+ (A2)
991
+ The scalar product for the two-component column state vectors Ψ = [ ψ1 ψ2 ]T and Φ =
992
+ [ φ1 φ2 ]T, where ψ1 + ψ2 = ψ and φ1 + φ2 = φ, is given by
993
+ ⟨⟨Ψ, Φ⟩⟩ ≡
994
+ ˆ
995
+
996
+ dx Ψ†ˆτ3Φ =
997
+ iℏ
998
+ 2mc2
999
+ ˆ
1000
+
1001
+ dx
1002
+
1003
+ ψ∗
1004
+ � ∂
1005
+ ∂t − V
1006
+ iℏ
1007
+
1008
+ φ −
1009
+ �� ∂
1010
+ ∂t − V
1011
+ iℏ
1012
+
1013
+ ψ
1014
+ �∗
1015
+ φ
1016
+
1017
+ =
1018
+ iℏ
1019
+ 2mc2
1020
+ ˆ
1021
+
1022
+ dx
1023
+
1024
+ ψ∗φt − ψ∗
1025
+ t φ − 2V
1026
+ iℏ ψ∗φ
1027
+
1028
+ ≡ ⟨ψ, φ⟩KFG.
1029
+ (A3)
1030
+ The latter quantity is preserved in time; in fact, taking its time derivative and using the result in
1031
+ Eq. (A2), and a similar relation for φ (ψ and φ are solutions of the 1D KFG wave equation in
1032
+ its standard form), one obtains the same relation given in Eq. (14), namely,
1033
+ d
1034
+ dt⟨⟨Ψ, Φ⟩⟩ = d
1035
+ dt⟨ψ, φ⟩KFG = − iℏ
1036
+ 2m [ ψ∗
1037
+ x φ − ψ∗φx ]|b
1038
+ a .
1039
+ (A4)
1040
+ As follows from the results obtained in Appendix II, if ψ and φ both satisfy any boundary condition
1041
+ included in the most general set of boundary conditions, the boundary term in Eq. (A4) always
1042
+ vanishes.
1043
+
1044
+ 17
1045
+ V.
1046
+ APPENDIX II
1047
+ The goal of this section is to show that if the functions belonging to the domain of ˆh (considered
1048
+ a densely defined operator) obey any of the boundary conditions included in Eq. (31), then the
1049
+ functions of the domain of ˆhadj must obey the same boundary condition. This means that for
1050
+ the general family of boundary conditions given in Eq. (31), the operator ˆh = ˆhadj is pseudo
1051
+ self-adjoint. Our results are obtained using simple arguments that are part of the general theory
1052
+ of linear operators in an indefinite inner product space (see, for example, Refs. [19, 20]).
1053
+ Let us return to the result given in Eq. (16), namely,
1054
+ ⟨⟨Ξ, ˆhΦ⟩⟩ = ⟨⟨ˆhadjΞ, Φ⟩⟩ + f[Ξ, Φ],
1055
+ (A5)
1056
+ where f[Ξ, Φ] is given by (see Eq. (18))
1057
+ f[Ξ, Φ] ≡ ℏ2
1058
+ 2m
1059
+ 1
1060
+ 2
1061
+
1062
+ ((ˆτ3 + iˆτ2)Ξx)† (ˆτ3 + iˆτ2)Φ − ((ˆτ3 + iˆτ2)Ξ)† (ˆτ3 + iˆτ2)Φx
1063
+ ����
1064
+ b
1065
+ a .
1066
+ (A6)
1067
+ Here, ˆh can act on column vectors Φ = [ φ1 φ2 ]T ∈ D(ˆh), where D(ˆh) is the domain of ˆh, a set
1068
+ of column vectors on which we allow the differential operator ˆh to act, which includes boundary
1069
+ conditions, and ˆhadj can act on column vectors Ξ = [ ξ1 ξ2 ]T ∈ D(ˆhadj) (in general, D(ˆhadj)
1070
+ may not coincide with D(ˆh)). By virtue of the result given in Eq. (5), the respective solutions
1071
+ of Eq. (3) are the following:
1072
+ φ1 + φ2 = φ
1073
+ and
1074
+ ξ1 + ξ2 = ξ.
1075
+ (A7)
1076
+ The boundary term in Eq. (A6) can be written in terms of φ and ξ, namely,
1077
+ f[Ξ, Φ] = ℏ2
1078
+ 2m [ ξ∗
1079
+ x φ − ξ∗φx ]|b
1080
+ a .
1081
+ (A8)
1082
+ First, let us suppose that every column vector Φ ∈ D(ˆh) satisfies the boundary conditions
1083
+ (ˆτ3 + iˆτ2)Φ(a) = (ˆτ3 + iˆτ2)Φ(b) = 0 and (ˆτ3 + iˆτ2)Φx(a) = (ˆτ3 + iˆτ2)Φx(b) = 0, or, equivalently,
1084
+ φ(a) = φ(b) = 0 and φx(a) = φx(b) = 0 (remember the first relation in Eq. (A7)). In this case,
1085
+ the boundary term in Eq. (A5) vanishes, and we have the result
1086
+ ⟨⟨Ξ, ˆhΦ⟩⟩ = ⟨⟨ˆhadjΞ, Φ⟩⟩.
1087
+ (A9)
1088
+ The latter relation is precisely the one that defines the generalized adjoint differential operator.
1089
+ It is clear that its verification did not require the imposition of any boundary condition on the
1090
+
1091
+ 18
1092
+ vectors Ξ ∈ D(ˆhadj). Thus, until now, we have that D(ˆh) ̸= D(ˆhadj) (in fact, we have that
1093
+ D(ˆh) ⊂ D(ˆhadj), i.e., D(ˆh) is a restriction of D(ˆhadj)).
1094
+ If the operator ˆh is to be a generalized self-adjoint differential operator, the relation given in
1095
+ Eq. (21), namely, ˆh = ˆhadj, must be verified, and therefore, D(ˆh) = D(ˆhadj). To achieve this, we
1096
+ must allow every vector Φ ∈ D(ˆh) to satisfy more general boundary conditions, that is, we must
1097
+ relax the domain of ˆh. Let us suppose that we have a set of boundary conditions to be imposed
1098
+ on a vector Φ ∈ D(ˆh); if the cancellation of the boundary term f[Ξ, Φ] by these boundary
1099
+ conditions only depends on imposing the same boundary conditions on the vector Ξ ∈ D(ˆhadj),
1100
+ then ˆh will be a generalized self-adjoint differential operator.
1101
+ First, from Eq. (A8), we write the boundary term in Eq. (A5) as follows:
1102
+ λ2m
1103
+ ℏ2 f[Ξ, Φ] = [ φ λξ∗
1104
+ x − ξ∗λφx ]|b
1105
+ a
1106
+ = [ φ(b) λξ∗
1107
+ x(b) − ξ∗(b) λφx(b) ] − [ φ(a) λξ∗
1108
+ x(a) − ξ∗(a) λφx(a) ] = 0.
1109
+ (A10)
1110
+ It is fairly convenient to rewrite the latter two terms using the following identity:
1111
+ z1z∗
1112
+ 2 − z∗
1113
+ 3z4 = i
1114
+ 2 [ (z1 + iz4)(z3 + iz2)∗ − (z1 − iz4)(z3 − iz2)∗ ] ,
1115
+ (A11)
1116
+ where z1, z2, z3 and z4 are complex numbers. The latter relation is the generalization of that
1117
+ given in Eq. (27). In fact, making the replacements z3 → z1 and z4 → z2 in Eq. (A11), the
1118
+ relation given in Eq. (27) is obtained. Then, the following result is derived:
1119
+ λ2m
1120
+ ℏ2 f[Ξ, Φ] = i
1121
+ 2 [(φ(b) + iλφx(b)) (ξ(b) + iλξx(b))∗ − (φ(b) − iλφx(b)) (ξ(b) − iλξx(b))∗]
1122
+ − i
1123
+ 2 [(φ(a) + iλφx(a)) (ξ(a) + iλξx(a))∗ − (φ(a) − iλφx(a)) (ξ(a) − iλξx(a))∗]
1124
+ = i
1125
+ 2 [(φ(b) + iλφx(b)) (ξ(b) + iλξx(b))∗ + (φ(a) − iλφx(a)) (ξ(a) − iλξx(a))∗]
1126
+ − i
1127
+ 2 [(φ(b) − iλφx(b)) (ξ(b) − iλξx(b))∗ + (φ(a) + iλφx(a)) (ξ(a) + iλξx(a))∗] = 0,
1128
+ this means that
1129
+ λ2m
1130
+ ℏ2 f[Ξ, Φ] = i
1131
+ 2
1132
+
1133
+  ξ(b) + iλξx(b)
1134
+ ξ(a) − iλξx(a)
1135
+
1136
+
1137
+ † 
1138
+  φ(b) + iλφx(b)
1139
+ φ(a) − iλφx(a)
1140
+
1141
+
1142
+ − i
1143
+ 2
1144
+
1145
+  ξ(b) − iλξx(b)
1146
+ ξ(a) + iλξx(a)
1147
+
1148
+
1149
+ † 
1150
+  φ(b) − iλφx(b)
1151
+ φ(a) + iλφx(a)
1152
+
1153
+  = 0.
1154
+ (A12)
1155
+
1156
+ 19
1157
+ Let us now consider a more general set of boundary conditions to be imposed on a vector
1158
+ Φ ∈ D(ˆh) (i.e., more general than the boundary conditions that we presented after Eq. (A8)),
1159
+ namely,
1160
+
1161
+  φ(b) + iλφx(b)
1162
+ φ(a) − iλφx(a)
1163
+
1164
+  = ˆN
1165
+
1166
+  φ(b) − iλφx(b)
1167
+ φ(a) + iλφx(a)
1168
+
1169
+  ,
1170
+ (A13)
1171
+ where ˆN in an arbitrary complex matrix. By substituting the latter relation in Eq. (A12), we
1172
+ obtain the following result:
1173
+ λ2m
1174
+ ℏ2 f[Ξ, Φ]
1175
+ = i
1176
+ 2
1177
+
1178
+
1179
+
1180
+
1181
+
1182
+
1183
+
1184
+
1185
+
1186
+  ξ(b) + iλξx(b)
1187
+ ξ(a) − iλξx(a)
1188
+
1189
+
1190
+
1191
+ ˆN −
1192
+
1193
+  ξ(b) − iλξx(b)
1194
+ ξ(a) + iλξx(a)
1195
+
1196
+
1197
+ †
1198
+
1199
+
1200
+
1201
+  φ(b) − iλφx(b)
1202
+ φ(a) + iλφx(a)
1203
+
1204
+
1205
+
1206
+
1207
+
1208
+
1209
+
1210
+ = 0,
1211
+ and therefore,
1212
+
1213
+  ξ(b) + iλξx(b)
1214
+ ξ(a) − iλξx(a)
1215
+
1216
+
1217
+
1218
+ ˆN =
1219
+
1220
+  ξ(b) − iλξx(b)
1221
+ ξ(a) + iλξx(a)
1222
+
1223
+
1224
+
1225
+ (A14)
1226
+ (This result is because, at this point, we cannot impose any boundary conditions that would
1227
+ completely annul the column vectors in Eq. (A13), for example). Every vector Ξ ∈ D(ˆhadj)
1228
+ should satisfy the same boundary conditions that Φ ∈ D(ˆh) satisfies, i.e., the boundary conditions
1229
+ in Eq. (A13), namely,
1230
+
1231
+  ξ(b) + iλξx(b)
1232
+ ξ(a) − iλξx(a)
1233
+
1234
+  = ˆN
1235
+
1236
+  ξ(b) − iλξx(b)
1237
+ ξ(a) + iλξx(a)
1238
+
1239
+  .
1240
+ (A15)
1241
+ Taking the Hermitian conjugate of the matrix relation in Eq. (A14) and substituting this result
1242
+ into Eq. (A15), we obtain
1243
+
1244
+  ξ(b) + iλξx(b)
1245
+ ξ(a) − iλξx(a)
1246
+
1247
+  = ˆNˆN†
1248
+
1249
+  ξ(b) + iλξx(b)
1250
+ ξ(a) − iλξx(a)
1251
+
1252
+  ;
1253
+ therefore, ˆN is a unitary matrix. Thus, the most general family of generalized self-adjoint, or
1254
+ pseudo self-adjoint boundary conditions, for the 1D KFG particle in a box can be written in the
1255
+ form given by Eq. (31), namely,
1256
+
1257
+  ξ(b) − iλξx(b)
1258
+ ξ(a) + iλξx(a)
1259
+
1260
+  = ˆU
1261
+
1262
+  ξ(b) + iλξx(b)
1263
+ ξ(a) − iλξx(a)
1264
+
1265
+  ,
1266
+ (A16)
1267
+
1268
+ 20
1269
+ where ˆU = ˆN−1. The fact that the boundary condition for Φ ∈ D(ˆh) (for example, given in
1270
+ terms of φ) is the same boundary condition for Ξ ∈ D(ˆhadj) (given in terms of ξ) ensures that
1271
+ D(ˆh) = D(ˆhadj); therefore, ˆh, which was already a pseudo-Hermitian operator, is also a pseudo
1272
+ self-adjoint operator. Additionally, the boundary term given in Eq. (14), or in Eq. (A4), vanishes,
1273
+ and therefore, the pseudo inner product is conserved.
1274
+ VI.
1275
+ CONCLUDING REMARKS
1276
+ The KFG Hamiltonian operator, or the Hamiltonian present in the 1D FV wave equation, is
1277
+ formally pseudo-Hermitian; this is well known. In addition, when this operator describes a 1D
1278
+ KFG particle in a box, it is a pseudo-Hermitian operator, but is also a pseudo self-adjoint operator.
1279
+ We obtained the most general set of boundary conditions for this problem, which depends on four
1280
+ real parameters. These results can be extended to the problem of the 1D KFG particle moving
1281
+ on the real line with a penetrable or an impenetrable obstacle at one point, i.e., with a point
1282
+ interaction there.
1283
+ As we have seen, the general set of boundary conditions can be written in terms of the one-
1284
+ component wavefunction for the 1D KFG wave equation ψ and its derivative ψx, evaluated at
1285
+ the ends of the box. More interestingly, the general set can also be precisely written in terms
1286
+ of the two-component column vectors (ˆτ3 + iˆτ2)Ψ and (ˆτ3 + iˆτ2)Ψx, evaluated at the ends of
1287
+ the box. As seen from the examples presented in Section III, Ψ and Ψx, evaluated at x = a
1288
+ and x = b, do not necessarily satisfy by themselves the same boundary conditions of the general
1289
+ set. However, any specific boundary condition on Ψ and Ψx can be obtained from the respective
1290
+ boundary condition that ψ and ψx satisfy at the ends of the box and by using the relations that
1291
+ arise between the components of the column vector Ψ = [ ψ1 ψ2 ]T, and ψ, ψt, and the potential
1292
+ V (see Eqs. (5) and (6)). We hope that our article will be of interest to those interested in the
1293
+ fundamental and also technical aspects of relativistic wave equations. Furthermore, to the best
1294
+ of our knowledge, the main results of our article, i.e., those related to general sets of boundary
1295
+ conditions in the 1D KFG theory, do not appear to have been considered before.
1296
+
1297
+ 21
1298
+ Conflicts of interest
1299
+ The author declares no conflicts of interest.
1300
+ [1] A. Wachter, Relativistic Quantum Mechanics (Springer, Berlin, 2011).
1301
+ [2] H. Feshbach and F. Villars, “Elementary relativistic wave mechanics of spin 0 and spin 1/2 particles,”
1302
+ Rev. Mod. Phys. 30, 24-45 (1958).
1303
+ [3] G. Baym, Lectures on Quantum Mechanics (Westview Press, New York, 1990).
1304
+ [4] W. Greiner, Relativistic Quantum Mechanics, 3rd ed. (Springer, Berlin, 2000).
1305
+ [5] O. Klein, “Quantentheorie und fünfdimensionale Relativitätstheorie,” Zeitschrift für Physik 37, 895-
1306
+ 906 (1926); V. Fock, “Zur Schrödingerschen Wellenmechanik,” Zeitschrift für Physik 38, 242-50
1307
+ (1926); W. Gordon, “Der Comptoneffekt nach der Schrödingerschen Theorie,” Zeitschrift für Physik
1308
+ 40, 117-33 (1926).
1309
+ [6] H. Kragh, “Equation with the many fathers. The Klein-Gordon equation in 1926,” Am. J. Phys. 52,
1310
+ 1024-33 (1984).
1311
+ [7] M. Merad, L. Chetouani and A. Bounames, “Boundary conditions for the one-dimensional Feshbach-
1312
+ Villars equation,” Phys. Lett. A 267, 225-31 (2000).
1313
+ [8] P. Alberto, S. Das and E. C. Vagenas, “Relativistic particle in a box: Klein–Gordon versus Dirac
1314
+ equations,” Eur. J. Phys. 39, 025401 (2018).
1315
+ [9] S. De Vincenzo, “On the mean value of the force operator for 1D particles in the step potential,”
1316
+ Rev. Bras. Ens. Fis. 43, e20200422 (2021).
1317
+ [10] T. M. Gouveia, M. C. N. Fiolhais and J. L. Birman, “A relativistic spin zero particle in a spherical
1318
+ cavity,” Eur. J. Phys. 36, 055021 (2015).
1319
+ [11] M. Alkhateeb and A. Matzkin, “Relativistic spin-0 particle in a box: Bound states, wave packets,
1320
+ and the disappearance of the Klein paradox,” Am. J. Phys. 90, 297 (2022).
1321
+ [12] A. Mostafazadeh and F. Zamani, “Quantum mechanics of Klein-Gordon fields I: Hilbert space,
1322
+ localized states, and chiral symmetry,” Ann. Phys. 321, 2183-2209 (2006).
1323
+ [13] A. Mostafazadeh, “Hilbert space structures on the solution space of Klein-Gordon-type evolution
1324
+ equations,” Class. Quantum Grav. 20, 155-71 (2003).
1325
+ [14] D. S. Staudte, “An eight-component relativistic wave equation for spin-1
1326
+ 2 particles II,” J. Phys. A:
1327
+
1328
+ 22
1329
+ Math. Gen. 29, 169-92 (1996).
1330
+ [15] G. Bonneau, J. Faraut and G. Valent, “Self-adjoint extensions of operators and the teaching of quan-
1331
+ tum mechanics,” Am. J. Phys. 69, 322-31 (2001); Preprint, arXiv:0103153v1 [quant-ph] (2001).
1332
+ [The latter preprint is an extended version of the published article that has various mathematical
1333
+ details.]
1334
+ [16] V. Alonso and S. De Vincenzo, “General boundary conditions for a Dirac particle in a box and their
1335
+ non-relativistic limits,” J. Phys. A: Math. Gen. 30, 8573-85 (1997).
1336
+ [17] Z. Brzeźniak and B. Jefferies, “Characterization of one-dimensional point interactions for the
1337
+ Schrödinger operator by means of boundary conditions,” J. Phys. A: Math. Gen. 34, 2977-83
1338
+ (2001).
1339
+ [18] H. V. Henderson, F. Pukelsheim and S. R. Searle, “On the history of the Kronecker product,” Linear
1340
+ and Multilinear Algebra 14, 113-20 (1983).
1341
+ [19] T. Ya. Azizov and I. S. Iokhvidov, Linear Operators in Spaces with an Indefinite Metric (John Wiley
1342
+ & Sons, Chichester, 1989).
1343
+ [20] J. Bognár, Indefinite Inner Product Spaces (Springer, Berlin, 1974).
1344
+
XtAzT4oBgHgl3EQfmf3D/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
YNE1T4oBgHgl3EQfcATB/content/tmp_files/2301.03180v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff