Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -9FQT4oBgHgl3EQf7Ta5/vector_store/index.faiss +3 -0
- -NE1T4oBgHgl3EQfCgJv/content/tmp_files/2301.02865v1.pdf.txt +625 -0
- -NE1T4oBgHgl3EQfCgJv/content/tmp_files/load_file.txt +0 -0
- .gitattributes +58 -0
- 0NAyT4oBgHgl3EQfbfc0/content/2301.00262v1.pdf +3 -0
- 0dAzT4oBgHgl3EQfRPuW/vector_store/index.faiss +3 -0
- 0dFAT4oBgHgl3EQfCRwI/content/2301.08408v1.pdf +3 -0
- 0dFAT4oBgHgl3EQfCRwI/vector_store/index.faiss +3 -0
- 0dFAT4oBgHgl3EQfCRwI/vector_store/index.pkl +3 -0
- 1NFST4oBgHgl3EQfWTh0/content/tmp_files/2301.13780v1.pdf.txt +0 -0
- 1NFST4oBgHgl3EQfWTh0/content/tmp_files/load_file.txt +0 -0
- 1dE3T4oBgHgl3EQfnQrW/content/tmp_files/2301.04624v1.pdf.txt +0 -0
- 1dE3T4oBgHgl3EQfnQrW/content/tmp_files/load_file.txt +0 -0
- 1dFKT4oBgHgl3EQfOy1w/vector_store/index.faiss +3 -0
- 49E0T4oBgHgl3EQfvgE1/content/2301.02618v1.pdf +3 -0
- 49E0T4oBgHgl3EQfvgE1/vector_store/index.faiss +3 -0
- 4dAyT4oBgHgl3EQf2Pkf/vector_store/index.faiss +3 -0
- 4tAyT4oBgHgl3EQfQPYV/content/tmp_files/2301.00039v1.pdf.txt +981 -0
- 4tAyT4oBgHgl3EQfQPYV/content/tmp_files/load_file.txt +0 -0
- 59E0T4oBgHgl3EQfewCK/vector_store/index.faiss +3 -0
- 5tFJT4oBgHgl3EQfkyzq/content/tmp_files/2301.11581v1.pdf.txt +1187 -0
- 5tFJT4oBgHgl3EQfkyzq/content/tmp_files/load_file.txt +0 -0
- 6NE3T4oBgHgl3EQfpgqP/content/tmp_files/2301.04643v1.pdf.txt +794 -0
- 6NE3T4oBgHgl3EQfpgqP/content/tmp_files/load_file.txt +0 -0
- 8NAzT4oBgHgl3EQfE_qO/content/tmp_files/2301.01003v1.pdf.txt +867 -0
- 8NAzT4oBgHgl3EQfE_qO/content/tmp_files/load_file.txt +0 -0
- 8NAzT4oBgHgl3EQfSPtl/content/tmp_files/2301.01229v1.pdf.txt +340 -0
- 8NAzT4oBgHgl3EQfSPtl/content/tmp_files/load_file.txt +226 -0
- 8dE5T4oBgHgl3EQfQg7H/content/tmp_files/2301.05514v1.pdf.txt +383 -0
- 8dE5T4oBgHgl3EQfQg7H/content/tmp_files/load_file.txt +281 -0
- 99AyT4oBgHgl3EQfRPYW/content/2301.00060v1.pdf +3 -0
- 99AyT4oBgHgl3EQfRPYW/vector_store/index.faiss +3 -0
- 9NAzT4oBgHgl3EQfSft5/content/2301.01233v1.pdf +3 -0
- 9NAzT4oBgHgl3EQfSft5/vector_store/index.pkl +3 -0
- 9NFRT4oBgHgl3EQfqTc6/vector_store/index.faiss +3 -0
- 9tAzT4oBgHgl3EQfSvsB/content/2301.01235v1.pdf +3 -0
- 9tAzT4oBgHgl3EQfSvsB/vector_store/index.pkl +3 -0
- AtE0T4oBgHgl3EQfxwIb/vector_store/index.pkl +3 -0
- B9FRT4oBgHgl3EQfvjiF/vector_store/index.pkl +3 -0
- C9E2T4oBgHgl3EQfSAeL/vector_store/index.pkl +3 -0
- D9E1T4oBgHgl3EQfqQU2/vector_store/index.pkl +3 -0
- ENAyT4oBgHgl3EQf4vqx/content/2301.00793v1.pdf +3 -0
- ENAyT4oBgHgl3EQf4vqx/vector_store/index.faiss +3 -0
- ENAyT4oBgHgl3EQf4vqx/vector_store/index.pkl +3 -0
- EdE4T4oBgHgl3EQf6g7g/content/tmp_files/2301.05333v1.pdf.txt +2754 -0
- EdE4T4oBgHgl3EQf6g7g/content/tmp_files/load_file.txt +0 -0
- F9E0T4oBgHgl3EQfzQJ7/content/2301.02670v1.pdf +3 -0
- F9E0T4oBgHgl3EQfzQJ7/vector_store/index.pkl +3 -0
- GNAyT4oBgHgl3EQf5Pq2/content/tmp_files/2301.00802v1.pdf.txt +1157 -0
- GNAyT4oBgHgl3EQf5Pq2/content/tmp_files/load_file.txt +0 -0
-9FQT4oBgHgl3EQf7Ta5/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e8e425b54c1fd54fe9442c5c2227e662af06d01200f56a473c31922829e1ad02
|
3 |
+
size 7471149
|
-NE1T4oBgHgl3EQfCgJv/content/tmp_files/2301.02865v1.pdf.txt
ADDED
@@ -0,0 +1,625 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.02865v1 [astro-ph.SR] 7 Jan 2023
|
2 |
+
Draft version January 10, 2023
|
3 |
+
Typeset using LATEX default style in AASTeX631
|
4 |
+
Highly Energetic Electrons Accelerated in Strong Solar Flares as a Preferred Driver of Sunquakes
|
5 |
+
H. Wu,1 Y. Dai,1, 2 and M. D. Ding1, 2
|
6 |
+
1School of Astronomy and Space Science, Nanjing University, Nanjing 210023, People’s Republic of China
|
7 |
+
2Key Laboratory of Modern Astronomy and Astrophysics (Nanjing University), Ministry of Education, Nanjing 210023, People’s Republic
|
8 |
+
of China
|
9 |
+
ABSTRACT
|
10 |
+
Sunquakes are enhanced seismic waves excited in some energetic solar flares. Up to now, their origin
|
11 |
+
has still been controversial. In this Letter, we select and study 20 strong flares in Solar Cycle 24,
|
12 |
+
whose impulse phase is fully captured by the Reuven Ramaty High Energy Solar Spectroscopic Imager
|
13 |
+
(RHESSI ). For 11 out of 12 sunquake-active flares in our sample, the hard X-ray (HXR) emission shows
|
14 |
+
a good temporal and spatial correlation with the white-light (WL) enhancement and the sunquake.
|
15 |
+
Spectral analysis also reveals a harder photon spectrum that extends to several hundred keV, implying
|
16 |
+
a considerable population of flare-accelerated nonthermal electrons at high energies. Quantitatively,
|
17 |
+
the total energy of electrons above 300 keV in sunquake-active flares is systematically different from
|
18 |
+
that in sunquake-quiet flares, while the difference is marginal for electrons above 50 keV. All these
|
19 |
+
facts support highly energetic electrons as a preferred driver of the sunquakes. Such an electron-driven
|
20 |
+
scenario can be reasonably accommodated in the framework of a recently proposed selection rule for
|
21 |
+
sunquake generation. For the remaining one event, the sunquake epicenter is cospatial with a magnetic
|
22 |
+
imprint, i.e., a permanent change of magnetic field on the photosphere. Quantitative calculation shows
|
23 |
+
that the flare-induced downward Lorentz force can do enough work to power the sunquake, acting as
|
24 |
+
a viable sunquake driver for this specific event.
|
25 |
+
Keywords: Solar flares (1496), Solar flare spectra (1982), Solar particle emission (1517), Helioseismol-
|
26 |
+
ogy (709), Solar x-ray flares (1816), Solar white-light flares (1983)
|
27 |
+
1. INTRODUCTION
|
28 |
+
It is believed that solar flares are a result of rapid release of free magnetic energy stored in the solar corona.
|
29 |
+
Through magnetic reconnection, the magnetic energy is converted to a variety of forms, which are transported both
|
30 |
+
upward to the interplanetary space and downward to the solar lower atmosphere.
|
31 |
+
In some energetic flares, the
|
32 |
+
flare-powered perturbations can reach the dense photosphere to enhance the local helioseismic waves, which further
|
33 |
+
penetrate through the solar interior and get reflected back to the photosphere, termed as “sunquakes” (Wolff 1972).
|
34 |
+
The first sunquake observation was reported in Kosovichev & Zharkova (1998), where the wave signature is manifested
|
35 |
+
as circular “ripples” in Dopplergrams. Since then, more and more such sunquake events have been discovered (e.g.,
|
36 |
+
Donea et al. 1999; Kosovichev 2006; Zharkov et al. 2011).
|
37 |
+
Up to now, the origin of sunquakes has still been controversial. Several categories of driving mechanisms have been
|
38 |
+
proposed. The first category assumes flare-accelerated particles as the driver of sunquakes. The sunquakes are excited
|
39 |
+
either by direct impact of the energetic particles on the photosphere (Kosovichev & Zharkova 1998; Kosovichev 2007;
|
40 |
+
Zharkova & Zharkov 2007; Kosovichev 2006; Zharkova 2008), or due to pressure pulse from the heated chromosphere
|
41 |
+
by thick-target bremsstrahlung of the nonthermal electrons (Donea et al. 2006a; Lindsey & Donea 2008). This scenario
|
42 |
+
is analogous to the mechanism for white-light flares (WLFs) of type I (Hudson 1972; Chen & Ding 2005, 2006), and
|
43 |
+
is supported by a good correlation between the sunquake source, white-light (WL) enhancement, and hard X-ray
|
44 |
+
(HXR) emission revealed in many observations (Buitrago-Casas et al. 2015). In another category, it is assumed that a
|
45 |
+
Corresponding author: Y. Dai
|
46 | |
47 |
+
|
48 |
+
2
|
49 |
+
Wu et al.
|
50 |
+
downward Lorentz force resulting from abrupt and permanent changes of the photospheric magnetic field, which often
|
51 |
+
occur in strong flares (Sudol & Harvey 2005; Petrie & Sudol 2010; Fisher et al. 2012; Sun et al. 2017), can act as a
|
52 |
+
sunquake driver (Hudson et al. 2008; Fisher et al. 2012).
|
53 |
+
It has been shown that sunquakes tend to occur in strong flares (Sharykin & Kosovichev 2020). Nevertheless, only
|
54 |
+
a fraction of strong flares can produce a sunquake. Based on a statistical study of major flares in Solar Cycle 24
|
55 |
+
observed by the Solar Dynamics Observatory (SDO; Pesnell et al. 2012) mission, Chen & Zhao (2021, hereafter CZ21)
|
56 |
+
proposed a selection rule for sunquake generation: a sunquake is more likely to occur when the photosphere shows a
|
57 |
+
net downward oscillatory velocity. In such a case, the photospheric oscillation can be amplified by the in-phase flare-
|
58 |
+
excited impulse, facilitating the generation of a sunquake. Otherwise, the background oscillation should be weakened
|
59 |
+
instead. This may explain the relative rarity of sunquakes in real observations.
|
60 |
+
The selection role proposed by CZ21 provides a promising explanation for the occurrence rate of sunquakes. However,
|
61 |
+
the detailed mechanisms for sunquake generation are still poorly understood without resorting to other complementary
|
62 |
+
observations. In this Letter, we further include HXR imaging and spectroscopic data to the sample sunquakes analyzed
|
63 |
+
by CZ21, mainly focusing on the possible role of flare-accelerated electrons in producing the sunquakes.
|
64 |
+
2. INSTRUMENTS AND DATASET
|
65 |
+
The data used in this study mainly come from the Helioseismic and Magnetic Imager (HMI; Schou et al. 2012)
|
66 |
+
on board SDO and the Reuven Ramaty High Energy Solar Spectroscopic Imager (RHESSI ; Lin et al. 2002). HMI
|
67 |
+
measures full-disk Stokes profiles of the Fe I 6173 ˚A line with a pixel size of 0.5′′ and cadence of 45 s, from which data
|
68 |
+
products such as the continuum intensity (Ic), Doppler velocity, and vector magnetic field of the photosphere can be
|
69 |
+
derived. RHESSI is designed for imaging and spectroscopic observations of the Sun in X-rays and γ-rays. Using a
|
70 |
+
rotation modulation of nine detectors with a 4s period, the spacecraft achieves a spatial resolution as high as 2.3′′ and
|
71 |
+
spectral solution of 1–10 keV over an energy range from 3 keV to 17 MeV.
|
72 |
+
We start from the sample of events originally compiled in CZ21, which includes the strongest 60 flares in Solar Cycle
|
73 |
+
24 that occur within 75◦ in longitude. This yields a lower limit of M6.3 in GOES soft X-ray (SXR) class for the
|
74 |
+
candidate flares. As revealed in the HMI Ic images, all of the flares are strong enough to exhibit a distinguishable WL
|
75 |
+
emission enhancement, indicative of WLFs with the potential to produce sunquakes. Furthermore, the flare locations
|
76 |
+
not too close to the limb ensure that the parameters of the possible sunquakes can be credibly derived from the
|
77 |
+
reconstructed HMI egression power maps.
|
78 |
+
To investigate the possible role of flare-accelerated electrons in generating sunquakes, we focus on flares whose
|
79 |
+
impulsive phase is fully captured by RHESSI. We need to apply such an additional selection criterion since RHESSI
|
80 |
+
observations are routinely affected by orbit night and/or other gaps. Doing so reduces the original sample to 20 flare
|
81 |
+
events, of which 12 flares are in association with at least one sunquake, while the remaining 8 ones are seismically
|
82 |
+
quiet. If there are more than one sunquake events in a sunquake-active flare, we consider the most energetic one,
|
83 |
+
which is usually significantly stronger than the others. The general information of the flares under study, as well as
|
84 |
+
their characteristics to be quantified in the following analysis, are listed in Table 1. Here the sunquake information
|
85 |
+
is adopted from CZ21. We note that all but one (associated with the 2011 August 9 X6.9 flare, No. 4) sunquakes in
|
86 |
+
our list show a net downward oscillatory velocity (in either the 3–5 mHz frequency band or the 5-7 mHz one, or both)
|
87 |
+
during the flare impulsive phase.
|
88 |
+
3. ANALYSIS AND RESULTS
|
89 |
+
Figure 1 depicts the WL and X-ray observations of a typical sunquake-active flare that occurred on 2012 October
|
90 |
+
23 (No. 7) in NOAA active region 11598. The event has been extensively studied in the literature (e.g., Yang et al.
|
91 |
+
2015; Sharykin et al. 2017; Watanabe & Imada 2020), and was also selected as a typical example presented in CZ21.
|
92 |
+
According to the GOES 1–8 ˚A light curve (blue) plotted in Figure 1(a), the SXR flare starts at 03:14 UT, promptly
|
93 |
+
rises to its peak at 03:17 UT, and ends at 03:21 UT, registered as an X1.8-class flare. The HXR emission of the
|
94 |
+
flare, as revealed from the RHESSI 50–100 keV count rate (red line in Figure 1(a)), exhibits an even more impulsive
|
95 |
+
increase and peaks at around 03:16 UT, slightly earlier than the SXR emission, which implies that the “Neupert effect”
|
96 |
+
(Neupert 1968) applies to this flare. It is also seen that the flare WL emission, which is proxied by the HMI continuum
|
97 |
+
intensity (black line with triangle symbols in Figure 1(a)) summed over the main flaring region (dashed box in Figure
|
98 |
+
1(b)), shows a nearly synchronous enhancement with the HXR emission before reaching its maximum at 03:16:15 UT.
|
99 |
+
After then, the WL emission turns to a relatively gradual decay in comparison with the precipitous drop in HXR
|
100 |
+
emission.
|
101 |
+
|
102 |
+
ENERGETIC ELECTRONS AS A DRIVER OF SUNQUAKES
|
103 |
+
3
|
104 |
+
As shown in Figure 1(b), the WL enhancement at the peak is predominately manifested as two quasi-parallel flare
|
105 |
+
ribbons. Here, for clarity of viewing, we subtract a pre-flare image from the image at the flaring time to highlight the
|
106 |
+
WL enhancement, and plot the base-difference map in an inverse color scale where dark features indicate brightening.
|
107 |
+
When overplotting a simultaneous RHESSI image at 50–100 keV (red contours) on the HMI WL map, it is seen that
|
108 |
+
the HXR source well covers the WL ribbons, although the former seems more diffuse. According to Yang et al. (2015),
|
109 |
+
the WL ribbons correspond to the western segments of a pair of inner/outer circular ribbons that outline the base of
|
110 |
+
a fan-spine topology, while the HXR source is located around the south footpoint of a magnetic flux rope embedded
|
111 |
+
under the fan dome. The close temporal and spatial correlation between the WL and HXR emissions indicates that
|
112 |
+
this event belongs to a type I WL flare, in which the WL emission originates from the layers heated by a direct electron
|
113 |
+
bombardment and/or the following backwarming effect (Hudson 1972; Chen & Ding 2005, 2006; Hao et al. 2012).
|
114 |
+
For this sunquake-active flare, we also mark out the location of the sunquake epicenter (green asterisk in Figure 1(b)).
|
115 |
+
As CZ21 have verified a tight correlation between the WL enhancement and sunquake excitation, our complementary
|
116 |
+
HXR observations strongly suggest the same electron-driven scenario for the sunquake generation as that for the WL
|
117 |
+
enhancement in this flare (Sharykin et al. 2017; Watanabe & Imada 2020). By checking other sunquake events, we
|
118 |
+
find that all but one (the 2011 August 9 X6.9 flare, No. 4) of the sunquakes in our list show a good correlation with the
|
119 |
+
HXR emission both temporally and spatially, which further corroborates nonthermal electrons as a preferred driver of
|
120 |
+
the sunquakes.
|
121 |
+
To further quantify the energetics of flare-accelerated electrons, we fit the RHESSI spectra during the whole flare
|
122 |
+
impulsive phase (listed in Table 1) using the Object Spectral Executive (OSPEX) package. First, we divide the impul-
|
123 |
+
sive phase into several time intervals, each of which has a duration of 20 s. Then we use a thick-target bremsstrahlung
|
124 |
+
model (thick2), which assumes a broken power-law distribution of the flare-accelerated nonthermal electrons, plus a
|
125 |
+
single-temperature thermal model (vth) to perform the spectral fitting for each individual interval. Since we are only
|
126 |
+
concerned with nonthermal properties, the thermal component is introduced just to better constrain the low-energy
|
127 |
+
cutoff (Ec) of the nonthermal electrons. Therefore, the lower limit of the energy range for fitting is fixed at 10 keV to
|
128 |
+
exclude the Fe/Ni emission lines at ∼6.7 keV, which permits a simplification of the thermal component fitting by only
|
129 |
+
varying the temperature and emission measure while keeping the elemental abundance unchanged. On the other end,
|
130 |
+
the upper limit is determined such that the photon flux at that energy starts to drop below the background level.
|
131 |
+
Figure 2(a) shows the RHESSI spectrum around the HXR peak of the 2012 October 23 flare, as well as the spectral
|
132 |
+
fitting results. It is seen that the photon flux at 30 keV is as high as 68.9 photon s−1 cm−2 keV−1, among the typical
|
133 |
+
values observed in WLFs (Kuhar et al. 2016; Hao et al. 2017). More importantly, the flux keeps above the background
|
134 |
+
level until 400 keV, indicative of a significant fraction of electrons accelerated to very high energies. We note that this
|
135 |
+
is a common spectral feature for the sunquake-active flares. The spectral fitting reveals power-law indices of 3.96 and
|
136 |
+
3.42 for the nonthermal electrons below and above a break energy of 461 keV, respectively, reflecting a hardening of
|
137 |
+
the spectra toward higher energies.
|
138 |
+
For comparison, we also present in Figures 2(b) and (c) the spectra of the other two flares that are of similar GOES
|
139 |
+
classes but without sunquakes. For these sunquake-quiet flares, the photon flux at 30 keV is comparable to that for the
|
140 |
+
sunquake-active events. Toward higher energies, however, the HXR spectrum shows diverse variations either becoming
|
141 |
+
very soft such that the flux quickly drops below the background (the 2014 October 27 X2.0 flare, No. 18), or still
|
142 |
+
behaving like that of the sunquake-active events (the 2011 September 24 X1.9 flare, No. 6). Obviously, the diverse
|
143 |
+
spectral patterns imply that the population of high energy electrons in sunquake-quiet flares can be distinctly different
|
144 |
+
from case to case.
|
145 |
+
Based on the spectral fitting, we evaluate the total energy of nonthermal electrons using the integral
|
146 |
+
E =
|
147 |
+
��
|
148 |
+
εF(ε, t) dεdt,
|
149 |
+
(1)
|
150 |
+
where ε is the electron energy and F(ε, t) the fitted electron spectrum. The integration with respect to time is done
|
151 |
+
over the entire flare impulsive phase. As to the energy range for integration, we adopt fixed lower limits regardless of
|
152 |
+
the variable low-energy cutoffs derived from actual flares. Here we calculate the total energies of the electrons above 50
|
153 |
+
keV (E50) and that above 300 keV (E300), which characterize the energetics of mildly and highly energetic electrons,
|
154 |
+
respectively.
|
155 |
+
Figure 3 displays the histograms of E50 (left) and E300 (right) for the flares with (upper) and without (lower)
|
156 |
+
sunquakes, respectively. Note that we exclude the 2011 August 9 sunquake-active flare in which the sunquake originates
|
157 |
+
in a different place from that for the nonthermal electrons. It is found that the distribution of E50 for sunquake-active
|
158 |
+
|
159 |
+
4
|
160 |
+
Wu et al.
|
161 |
+
flares shows no significant difference from that for sunquake-quiet flares; both distributions span over a similar energy
|
162 |
+
range and peak at 1029.5–1030 erg (Figures 3(a) and (b)). Nevertheless, a systematic difference is seen in the distribution
|
163 |
+
of E300. The E300 value for the flares with sunquakes varies in a relatively narrow range, and is dominantly restricted
|
164 |
+
to a magnitude of 1027–1028 erg (Figure 3(c)), which is comparable to the estimated energy of sunquakes reported in
|
165 |
+
previous studies (Donea et al. 2006b; Chen & Zhao 2021). By contrast, the value of E300 for the sunquake-quiet flares
|
166 |
+
seems more scattered, which is either comparable to that for the sunquake-active flares, or several orders of magnitude
|
167 |
+
lower (Figure 3(d)). Such a bimodal distribution can be expected from the spectral fitting for the sunquake-quiet flares
|
168 |
+
shown in Figure 2.
|
169 |
+
We also calculate the corresponding electron power, which is obtained by dividing the total electron energy by the
|
170 |
+
duration of impulsive phase. As shown in Table 1, the length of impulsive phase just varies in a narrow range of 60–120
|
171 |
+
s from event to event. It is found that the distributions of the electron power (not shown here) are nearly the same as
|
172 |
+
those shown in Figure 3.
|
173 |
+
The above statistical result implies that the generation of the sunquakes is more relevant to highly energetic electrons
|
174 |
+
rather than electrons at moderate energies. However, the latter is more likely to be responsible for the enhancement of
|
175 |
+
WL emission. Furthermore, the electron-driven scenario for sunquakes can be reasonably accommodated in the frame
|
176 |
+
of the selection rule proposed by CZ21. In addition to being in phase with the background oscillation, the downward
|
177 |
+
electron beam should contain enough highly accelerated electrons in order to efficiently perturb the photosphere and
|
178 |
+
deep layers to produce a sunquake. As for the sunquake-quiet flares, however, either the electron-driven impulse is too
|
179 |
+
weak (e.g., the 2014 October 27 X2.0 flare shown in Figure 2(b)), or the impulse is out of phase with the background
|
180 |
+
oscillation (e.g., the 2011 September 24 X1.9 flare flare shown in Figure 2(c)), thus unable to generate a sunquake.
|
181 |
+
This is also the reason why the distribution of E300 is more scattered for the flares without sunquakes.
|
182 |
+
Among all the sunquake-active events, the 2011 August 9 flare is an exception in that its sunquake epicenter is
|
183 |
+
spatially offset with the HXR source, which requires an alternative explanation for the sunquake generation. Previous
|
184 |
+
observations have shown that some major solar flares can leave magnetic imprints (MIs) on the photosphere, which are
|
185 |
+
manifested as rapid and irreversible changes of the photospheric magnetic field (Lu et al. 2019). During this process,
|
186 |
+
the photospheric magnetic field becomes more horizontal, producing a downward Lorentz force on the photosphere
|
187 |
+
that possibly drives a sunquake (Hudson et al. 2008). In the following, we test the possibility of flare-induced Lorentz
|
188 |
+
force as the sunquake driver for this specific event.
|
189 |
+
To depict the MIs accurately, we use Space-weather HMI Active Region Patch (SHARP; Bobra et al. 2014) products,
|
190 |
+
whose data pipeline includes a remapping of the magnetic field vector in a cylindrical equal-area (CEA) projection.
|
191 |
+
The three components of the SHARP magnetic field vector are represented by Br (radial), Bp (southward), and Bt
|
192 |
+
(westward), respectively, from which the magnitude of the horizontal magnetic field is derived as Bh =
|
193 |
+
�
|
194 |
+
B2p + B2
|
195 |
+
t .
|
196 |
+
Since the flare-induced magnetic field change is mainly reflected in an increase of the horizontal magnetic field, we use
|
197 |
+
regions where δBh exceeds a threshold (e.g., 300 G) to approximate the spatial extent of MIs (cf. Lu et al. 2019).
|
198 |
+
We plot in Figure 4(a) the locations of the MIs (orange plus yellow contours), HXR source (red contours), and
|
199 |
+
sunquake epicenter (green asterisk) for the 2011 August 9 flare, which are overlaid on the corresponding HMI continuum
|
200 |
+
map. As shown in the figure, the MIs appear patch-like, and are located predominately in the vicinity of or over the
|
201 |
+
polarity inversion line (PIL) of SHARP Br, consistent with many previous observations (e.g., Petrie 2012, 2013;
|
202 |
+
Wang et al. 2012a,b; Sun et al. 2012). The sunquake epicenter lies exactly in a southern MI (distinguished with the
|
203 |
+
other MIs in yellow contours) but distant from the HXR source, which does suggest a Lorentz force-driven origin of
|
204 |
+
the sunquake.
|
205 |
+
Compared with other MIs, the sunquake-related MI is located in an isolated region near the far end of the PIL,
|
206 |
+
where the background magnetic field is relatively weaker than that in the AR core. In addition, it appears neither
|
207 |
+
too diffuse nor too compact. These facts may reflect necessary physical conditions for an MI to generate sunquakes.
|
208 |
+
Nevertheless, without other observations of such MI-related sunquakes our argument is not conclusive.
|
209 |
+
Quantitatively, we use the equation
|
210 |
+
δF = 1
|
211 |
+
8π
|
212 |
+
�
|
213 |
+
Aph
|
214 |
+
(δB2
|
215 |
+
r − δB2
|
216 |
+
h) dA
|
217 |
+
(2)
|
218 |
+
to calculate the Lorentz force δF over this sunquake-related MI (Hudson et al. 2008). When considering an MI area
|
219 |
+
of Aph = 1.3 × 1017 cm2 surrounding the sunquake epicenter if we select a threshold of δBh = 300 G (enclosed by the
|
220 |
+
outermost yellow contour), the resultant downward Lorentz force on this area is 1.2 × 1022 dyne. By further assuming
|
221 |
+
a displacement of 3 km that the Lorentz force pushes the photosphere downward (cf. Hudson et al. 2008), we derive
|
222 |
+
|
223 |
+
ENERGETIC ELECTRONS AS A DRIVER OF SUNQUAKES
|
224 |
+
5
|
225 |
+
a work of 3.8 × 1027 erg done by the Lorentz force, which is close to the sunquake energy for this event estimated in
|
226 |
+
CZ21. Compared with the impulsive perturbation by energetic electrons, the MI-induced Lorentz force should act on
|
227 |
+
the photosphere in a much more gentle manner. We note that this sunquake event presents a nearly zero net oscillatory
|
228 |
+
velocity in contrast to the other events.
|
229 |
+
Finally we present the corresponding observations of the 2012 October 23 event in Figure 4(b) for comparison.
|
230 |
+
Although the MIs in this flare still gather along the PIL, the sunquake epicenter shows an offset with respect to the
|
231 |
+
MIs in spite of a significant line-shortening due to a close-to-the-limb location of the flare. Instead, the sunquake site
|
232 |
+
should be located in the inner circular flare ribbon.
|
233 |
+
4. DISCUSSION AND CONCLUSION
|
234 |
+
In this Letter, we make a statistical study on sunquake generation using a sample of 20 strong solar flares that have a
|
235 |
+
full RHESSI coverage of the impulsive phase. For 11 out of 12 sunquake-active flares in our sample, the HXR emission
|
236 |
+
shows a good temporal and spatial correlation with the WL enhancement and the sunquake. Spectral analysis also
|
237 |
+
reveals a hard photon spectrum in which the photon flux is well above the background level until several hundred keV,
|
238 |
+
implying a significant population of flare-accelerated nonthermal electrons at high energies. Furthermore, the total
|
239 |
+
energies of electrons above 300 keV in sunquake-active flares are systematically different from those of sunquake-quiet
|
240 |
+
flares, while the difference is marginal for energies above 50 keV. All these facts support highly energetic electrons as a
|
241 |
+
preferred driver of the sunquakes. Besides the selection rule proposed in CZ21, i.e., the flare-induced impulsive heating
|
242 |
+
should be in phase with a downward background oscillation, a strong electron beam with in particular a significant
|
243 |
+
fraction of energy residing in highly energetic electrons should serve as another necessary condition for the sunquake
|
244 |
+
generation. If either of the two conditions is broken down, a sunquake is not likely to occur.
|
245 |
+
According to Neidig (1989), only electrons above an energy of ∼900 keV can penetrate to the photosphere. Nev-
|
246 |
+
ertheless, in a flaring atmosphere, the ionization, condensation, and evaporation of plasma may mitigate the energy
|
247 |
+
requirement for the electrons to reach such depths (Watanabe & Imada 2020). In this meaning, the electron-driven
|
248 |
+
sunquakes in our sample could be excited by the direct impact of extremely energetic electrons on the photosphere
|
249 |
+
(Kosovichev & Zharkova 1998; Kosovichev 2007; Zharkova & Zharkov 2007; Kosovichev 2006; Zharkova 2008). Nev-
|
250 |
+
ertheless, it is also possible that the pressure pulse from the heated chromosphere by less energetic electrons plays a
|
251 |
+
part role(Donea et al. 2006a; Lindsey & Donea 2008). Without sophisticated radiative hydrodynamic modeling, we
|
252 |
+
do not intend to clarify the quantitative contributions of these mechanisms for the sunquake generation, which should
|
253 |
+
be case-dependent.
|
254 |
+
There is also an exceptional event (the 2011 August 9 sunquake) in our sample, whose sunquake epicenter is cospatial
|
255 |
+
with an MI instead of the HXR source. We calculate the Lorentz force due to a permanent change of the photospheric
|
256 |
+
magnetic field over this MI, and estimate the work done by the downward Lorentz force. The quantitative analysis
|
257 |
+
shows that the magnetic reconfiguration can provide enough energy to power the sunquake. Therefore, although we
|
258 |
+
suggest highly energetic electrons as a main driver of sunquakes, we do not rule out the role of flare-induced Lorentz
|
259 |
+
force in some specific events (Hudson et al. 2008; Fisher et al. 2012).
|
260 |
+
The properties (location and oscillatory velocity) of the electron-driven sunquakes seem different from those of the
|
261 |
+
MI-related sunquake. Actually, we have checked all electron-driven sunquake events in Table 1, none of which shows
|
262 |
+
a spatial correspondence with an MI region. Whether it is of physical significance or just a coincidence, we need more
|
263 |
+
observations to address this issue.
|
264 |
+
This study only covers a sample of 20 events satisfying our selection criteria that the RHESSI era can provide. In
|
265 |
+
order to reach a more conclusive result, more events are required. RHESSI has been decommissioned since 2018.
|
266 |
+
Fortunately, we can make use of imaging and spectroscopic observations with the Spectrometer/Telescope for Imaging
|
267 |
+
X-rays (STIX) on board the newly launched Solar Orbiter (SolO) mission (Krucker et al. 2020) and the Hard X-ray
|
268 |
+
Imager (HXI) on board the upcoming Advanced Space-based Solar Observatory (ASO-S) emission (Zhang et al. 2019).
|
269 |
+
These new observational facilities will help us better understand the origin of sunquakes.
|
270 |
+
We are grateful to the anonymous referee for his/her insightful comments and suggestions, which led to a signifi-
|
271 |
+
cant improvement of the manuscript. This work was supported by National Natural Science Foundation of China
|
272 |
+
under grants 11733003 and 12127901. Y.D. is also sponsored by National Key R&D Program of China under grants
|
273 |
+
2019YFA0706601 and 2020YFC2201201. SDO is a mission of NASA’s Living With a Star (LWS) program.
|
274 |
+
|
275 |
+
6
|
276 |
+
Wu et al.
|
277 |
+
REFERENCES
|
278 |
+
Bobra, M. G., Sun, X., Hoeksema, J. T., et al. 2014, SoPh,
|
279 |
+
289, 3549, doi: 10.1007/s11207-014-0529-3
|
280 |
+
Buitrago-Casas, J. C., Mart´ınez Oliveros, J. C., Lindsey,
|
281 |
+
C., et al. 2015, SoPh, 290, 3151,
|
282 |
+
doi: 10.1007/s11207-015-0786-9
|
283 |
+
Chen, Q. R., & Ding, M. D. 2005, ApJ, 618, 537,
|
284 |
+
doi: 10.1086/425856
|
285 |
+
—. 2006, ApJ, 641, 1217, doi: 10.1086/500635
|
286 |
+
Chen, R., & Zhao, J. 2021, ApJ, 908, 182,
|
287 |
+
doi: 10.3847/1538-4357/abd240
|
288 |
+
Donea, A. C., Besliu-Ionescu, D., Cally, P., & Lindsey, C.
|
289 |
+
2006a, in Astronomical Society of the Pacific Conference
|
290 |
+
Series, Vol. 354, Solar MHD Theory and Observations: A
|
291 |
+
High Spatial Resolution Perspective, ed. J. Leibacher,
|
292 |
+
R. F. Stein, & H. Uitenbroek, 204
|
293 |
+
Donea, A. C., Besliu-Ionescu, D., Cally, P. S., Lindsey, C.,
|
294 |
+
& Zharkova, V. V. 2006b, SoPh, 239, 113,
|
295 |
+
doi: 10.1007/s11207-006-0108-3
|
296 |
+
Donea, A. C., Braun, D. C., & Lindsey, C. 1999, ApJL,
|
297 |
+
513, L143, doi: 10.1086/311915
|
298 |
+
Fisher, G. H., Bercik, D. J., Welsch, B. T., & Hudson, H. S.
|
299 |
+
2012, SoPh, 277, 59, doi: 10.1007/s11207-011-9907-2
|
300 |
+
Hao, Q., Guo, Y., Dai, Y., et al. 2012, A&A, 544, L17,
|
301 |
+
doi: 10.1051/0004-6361/201219941
|
302 |
+
Hao, Q., Yang, K., Cheng, X., et al. 2017, Nature
|
303 |
+
Communications, 8, 2202,
|
304 |
+
doi: 10.1038/s41467-017-02343-0
|
305 |
+
Hudson, H. S. 1972, SoPh, 24, 414,
|
306 |
+
doi: 10.1007/BF00153384
|
307 |
+
Hudson, H. S., Fisher, G. H., & Welsch, B. T. 2008, in
|
308 |
+
Astronomical Society of the Pacific Conference Series,
|
309 |
+
Vol. 383, Subsurface and Atmospheric Influences on Solar
|
310 |
+
Activity, ed. R. Howe, R. W. Komm, K. S.
|
311 |
+
Balasubramaniam, & G. J. D. Petrie, 221
|
312 |
+
Kosovichev, A. G. 2006, SoPh, 238, 1,
|
313 |
+
doi: 10.1007/s11207-006-0190-6
|
314 |
+
—. 2007, ApJL, 670, L65, doi: 10.1086/524036
|
315 |
+
Kosovichev, A. G., & Zharkova, V. V. 1998, Nature, 393,
|
316 |
+
317, doi: 10.1038/30629
|
317 |
+
Krucker, S., Hurford, G. J., Grimm, O., et al. 2020, A&A,
|
318 |
+
642, A15, doi: 10.1051/0004-6361/201937362
|
319 |
+
Kuhar, M., Krucker, S., Mart´ınez Oliveros, J. C., et al.
|
320 |
+
2016, ApJ, 816, 6, doi: 10.3847/0004-637X/816/1/6
|
321 |
+
Lin, R. P., Dennis, B. R., Hurford, G. J., et al. 2002, SoPh,
|
322 |
+
210, 3, doi: 10.1023/A:1022428818870
|
323 |
+
Lindsey, C., & Donea, A. C. 2008, SoPh, 251, 627,
|
324 |
+
doi: 10.1007/s11207-008-9140-9
|
325 |
+
Lu, Z., Cao, W., Jin, G., et al. 2019, ApJ, 876, 133,
|
326 |
+
doi: 10.3847/1538-4357/ab16d4
|
327 |
+
Neidig, D. F. 1989, SoPh, 121, 261,
|
328 |
+
doi: 10.1007/BF00161699
|
329 |
+
Neupert, W. M. 1968, ApJL, 153, L59, doi: 10.1086/180220
|
330 |
+
Pesnell, W. D., Thompson, B. J., & Chamberlin, P. C.
|
331 |
+
2012, SoPh, 275, 3, doi: 10.1007/s11207-011-9841-3
|
332 |
+
Petrie, G. J. D. 2012, ApJ, 759, 50,
|
333 |
+
doi: 10.1088/0004-637X/759/1/50
|
334 |
+
—. 2013, SoPh, 287, 415, doi: 10.1007/s11207-012-0071-0
|
335 |
+
Petrie, G. J. D., & Sudol, J. J. 2010, ApJ, 724, 1218,
|
336 |
+
doi: 10.1088/0004-637X/724/2/1218
|
337 |
+
Schou, J., Scherrer, P. H., Bush, R. I., et al. 2012, SoPh,
|
338 |
+
275, 229, doi: 10.1007/s11207-011-9842-2
|
339 |
+
Sharykin, I. N., & Kosovichev, A. G. 2020, ApJ, 895, 76,
|
340 |
+
doi: 10.3847/1538-4357/ab88d1
|
341 |
+
Sharykin, I. N., Kosovichev, A. G., Sadykov, V. M.,
|
342 |
+
Zimovets, I. V., & Myshyakov, I. I. 2017, ApJ, 843, 67,
|
343 |
+
doi: 10.3847/1538-4357/aa77f1
|
344 |
+
Sudol, J. J., & Harvey, J. W. 2005, ApJ, 635, 647,
|
345 |
+
doi: 10.1086/497361
|
346 |
+
Sun, X., Hoeksema, J. T., Liu, Y., Kazachenko, M., &
|
347 |
+
Chen, R. 2017, ApJ, 839, 67,
|
348 |
+
doi: 10.3847/1538-4357/aa69c1
|
349 |
+
Sun, X., Hoeksema, J. T., Liu, Y., et al. 2012, ApJ, 748, 77,
|
350 |
+
doi: 10.1088/0004-637X/748/2/77
|
351 |
+
Wang, S., Liu, C., Liu, R., et al. 2012a, ApJL, 745, L17,
|
352 |
+
doi: 10.1088/2041-8205/745/2/L17
|
353 |
+
Wang, S., Liu, C., & Wang, H. 2012b, ApJL, 757, L5,
|
354 |
+
doi: 10.1088/2041-8205/757/1/L5
|
355 |
+
Watanabe, K., & Imada, S. 2020, ApJ, 891, 88,
|
356 |
+
doi: 10.3847/1538-4357/ab711b
|
357 |
+
Wolff, C. L. 1972, ApJ, 176, 833, doi: 10.1086/151680
|
358 |
+
Yang, K., Guo, Y., & Ding, M. D. 2015, ApJ, 806, 171,
|
359 |
+
doi: 10.1088/0004-637X/806/2/171
|
360 |
+
Zhang, Z., Chen, D.-Y., Wu, J., et al. 2019, Research in
|
361 |
+
Astronomy and Astrophysics, 19, 160,
|
362 |
+
doi: 10.1088/1674-4527/19/11/160
|
363 |
+
Zharkov, S., Green, L. M., Matthews, S. A., & Zharkova,
|
364 |
+
V. V. 2011, ApJL, 741, L35,
|
365 |
+
doi: 10.1088/2041-8205/741/2/L35
|
366 |
+
Zharkova, V. V. 2008, SoPh, 251, 641,
|
367 |
+
doi: 10.1007/s11207-008-9216-6
|
368 |
+
Zharkova, V. V., & Zharkov, S. I. 2007, ApJ, 664, 573,
|
369 |
+
doi: 10.1086/518731
|
370 |
+
|
371 |
+
ENERGETIC ELECTRONS AS A DRIVER OF SUNQUAKES
|
372 |
+
7
|
373 |
+
Table 1. List of the Flares under study and the Sunquake Information
|
374 |
+
No.
|
375 |
+
Date
|
376 |
+
GOES
|
377 |
+
RHESSI HXR Information
|
378 |
+
HMI Sunquake Information
|
379 |
+
Class
|
380 |
+
Impulsive Phase
|
381 |
+
Peaka
|
382 |
+
E50
|
383 |
+
E300
|
384 |
+
Sunquake
|
385 |
+
Correlation
|
386 |
+
v35b
|
387 |
+
v57b
|
388 |
+
(UT)
|
389 |
+
(UT)
|
390 |
+
(1030 erg)
|
391 |
+
(1027 erg)
|
392 |
+
(Y/N)
|
393 |
+
(HXR/MI)
|
394 |
+
(m s−1)
|
395 |
+
(m s−1)
|
396 |
+
1
|
397 |
+
2011 Feb 13
|
398 |
+
M6.6
|
399 |
+
17:33:28–17:34:48
|
400 |
+
17:34:18
|
401 |
+
0.1
|
402 |
+
0.02
|
403 |
+
N
|
404 |
+
2
|
405 |
+
2011 Feb 15
|
406 |
+
X2.2
|
407 |
+
01:54:24–01:56:04
|
408 |
+
01:55:14
|
409 |
+
0.4
|
410 |
+
1.4
|
411 |
+
Y
|
412 |
+
HXR
|
413 |
+
27
|
414 |
+
29
|
415 |
+
3
|
416 |
+
2011 Jul 30
|
417 |
+
M9.3
|
418 |
+
02:07:28–02:08:48
|
419 |
+
02:08:18
|
420 |
+
0.2
|
421 |
+
0.3
|
422 |
+
Y
|
423 |
+
HXR
|
424 |
+
417
|
425 |
+
337
|
426 |
+
4
|
427 |
+
2011 Aug 9
|
428 |
+
X6.9
|
429 |
+
08:02:40–08:04:20
|
430 |
+
08:03:50
|
431 |
+
3.2
|
432 |
+
8.9
|
433 |
+
Y
|
434 |
+
MIc
|
435 |
+
· · ·
|
436 |
+
-3
|
437 |
+
5
|
438 |
+
2011 Sep 6
|
439 |
+
X2.1
|
440 |
+
22:18:20–22:19:40
|
441 |
+
22:19:10
|
442 |
+
0.8
|
443 |
+
29.3
|
444 |
+
Y
|
445 |
+
HXR
|
446 |
+
326
|
447 |
+
596
|
448 |
+
6
|
449 |
+
2011 Sep 24
|
450 |
+
X1.9
|
451 |
+
09:35:16–09:36:56
|
452 |
+
09:36:26
|
453 |
+
0.5
|
454 |
+
22.6
|
455 |
+
N
|
456 |
+
7
|
457 |
+
2012 Oct 23
|
458 |
+
X1.8
|
459 |
+
03:15:08–03:16:08
|
460 |
+
03:15:58
|
461 |
+
1.1
|
462 |
+
23.1
|
463 |
+
Y
|
464 |
+
HXR
|
465 |
+
1082
|
466 |
+
950
|
467 |
+
8
|
468 |
+
2013 May 15
|
469 |
+
X1.2
|
470 |
+
01:41:20–01:43:00
|
471 |
+
01:42:10
|
472 |
+
0.4
|
473 |
+
4.7
|
474 |
+
N
|
475 |
+
9
|
476 |
+
2013 Oct 25
|
477 |
+
X1.7
|
478 |
+
07:58:10–07:59:50
|
479 |
+
07:59:20
|
480 |
+
0.6
|
481 |
+
9.2
|
482 |
+
Y
|
483 |
+
HXR
|
484 |
+
· · ·
|
485 |
+
135
|
486 |
+
10
|
487 |
+
2013 Oct 25
|
488 |
+
X2.1
|
489 |
+
15:00:12–15:01:52
|
490 |
+
15:00:42
|
491 |
+
0.6
|
492 |
+
5.4
|
493 |
+
N
|
494 |
+
11
|
495 |
+
2013 Oct 28
|
496 |
+
X1.0
|
497 |
+
01:58:48–02:00:28
|
498 |
+
01:59:38
|
499 |
+
0.3
|
500 |
+
10.6
|
501 |
+
N
|
502 |
+
12
|
503 |
+
2013 Nov 10
|
504 |
+
X1.1
|
505 |
+
05:12:10–05:13:50
|
506 |
+
05:12:40
|
507 |
+
0.2
|
508 |
+
2.7
|
509 |
+
Y
|
510 |
+
HXR
|
511 |
+
445
|
512 |
+
508
|
513 |
+
13
|
514 |
+
2014 Jan 7
|
515 |
+
M7.2
|
516 |
+
10:10:48–10:12:28
|
517 |
+
10:11:38
|
518 |
+
0.5
|
519 |
+
5.6
|
520 |
+
Y
|
521 |
+
HXR
|
522 |
+
436
|
523 |
+
680
|
524 |
+
14
|
525 |
+
2014 Mar 29
|
526 |
+
X1.0
|
527 |
+
17:46:00–17:47:40
|
528 |
+
17:46:30
|
529 |
+
0.2
|
530 |
+
11.0
|
531 |
+
N
|
532 |
+
15
|
533 |
+
2014 Jun 11
|
534 |
+
X1.0
|
535 |
+
09:04:20–09:05:40
|
536 |
+
09:04:50
|
537 |
+
0.06
|
538 |
+
5.6
|
539 |
+
Y
|
540 |
+
HXR
|
541 |
+
· · ·
|
542 |
+
1338
|
543 |
+
16
|
544 |
+
2014 Oct 22
|
545 |
+
M8.7
|
546 |
+
01:38:36–01:40:16
|
547 |
+
01:39:26
|
548 |
+
0.3
|
549 |
+
1.0
|
550 |
+
Y
|
551 |
+
HXR
|
552 |
+
133
|
553 |
+
-1
|
554 |
+
17
|
555 |
+
2014 Oct 22
|
556 |
+
X1.6
|
557 |
+
14:05:00–14:06:40
|
558 |
+
14:06:30
|
559 |
+
3.9
|
560 |
+
1.4
|
561 |
+
Y
|
562 |
+
HXR
|
563 |
+
96
|
564 |
+
-41
|
565 |
+
18
|
566 |
+
2014 Oct 27
|
567 |
+
X2.0
|
568 |
+
14:21:20–14:23:20
|
569 |
+
14:23:10
|
570 |
+
1.4
|
571 |
+
0.04
|
572 |
+
N
|
573 |
+
19
|
574 |
+
2015 Mar 7
|
575 |
+
M9.2
|
576 |
+
22:03:40–22:05:00
|
577 |
+
22:04:30
|
578 |
+
0.01
|
579 |
+
1.4e-5
|
580 |
+
N
|
581 |
+
20
|
582 |
+
2017 Sep 7
|
583 |
+
M7.3
|
584 |
+
10:14:28–10:16:08
|
585 |
+
10:15:38
|
586 |
+
0.4
|
587 |
+
8.8
|
588 |
+
Y
|
589 |
+
HXR
|
590 |
+
534
|
591 |
+
344
|
592 |
+
Note—
|
593 |
+
a Peak time for HXR emission at 50–100 keV.
|
594 |
+
b Oscillatory velocities at 3–5 MHz (v35) and 5–7 MHz (v57), respectively. The values are adopted from CZ21.
|
595 |
+
c The estimated work done by the MI-induced Lorentz force is 3.8 × 1027 erg.
|
596 |
+
|
597 |
+
8
|
598 |
+
Wu et al.
|
599 |
+
Figure 1. WL and X-ray observations of the 2012 October 23 X1.8 flare. (a) time profiles of the HMI continuum intensity
|
600 |
+
around 6173 ˚A (black), RHESSI HXR count rate at 50–100 keV (red), and GOES SXR flux in 1–8 ˚A (blue). (b) the base-
|
601 |
+
difference HMI continuum map at the continuum peak time in an inverse scale, where the dashed box encloses the main flaring
|
602 |
+
region used for continuum calculation. Overplotted on the map is a simultaneous RHESSI 50–100 keV image reconstructed
|
603 |
+
using the Pixon algorithm, with contour levels corresponding to 30%, 60%, and 90% of the maximum intensity, respectively.
|
604 |
+
For this sunquake-active flare, the location of the sunquake epicenter is also marked out with an asterisk sign.
|
605 |
+
|
606 |
+
ENERGETIC ELECTRONS AS A DRIVER OF SUNQUAKES
|
607 |
+
9
|
608 |
+
Figure 2. Fitting results for the RHESSI spectra taken around the HXR peak in three flares. In each panel, the event number
|
609 |
+
in Table 1 is labeled in the upper left, the black and grey lines in histogram mode denote the background-subtracted photon
|
610 |
+
flux and the background, respectively, while the colored curves represent different components of the modeled spectrum based
|
611 |
+
on the best-fit parameters. In addition, the residual between the modeled and observed spectra is plotted in the bottom part of
|
612 |
+
each panel.
|
613 |
+
|
614 |
+
10
|
615 |
+
Wu et al.
|
616 |
+
Figure 3.
|
617 |
+
Histograms of the total energy of nonthermal electrons for the flare events with (upper) and without (lower)
|
618 |
+
sunquakes. The left panels are for the distributions of E50 while the right for E300. Note that a bin size of 0.5 dex is adopted
|
619 |
+
for the histogram plotting.
|
620 |
+
|
621 |
+
Figure 4. Locations of the MIs (orange plus yellow contours), HXR source (red contours), and sunquake epicenter (green
|
622 |
+
asterisk) for two flares. In each panel the background image is a corresponding HMI continuum map, with the PIL drawn in
|
623 |
+
blue line. The contours for MI indicate an increase of the horizontal magnetic field at levels of 300 G and 600 G, respectively.
|
624 |
+
Note that the sunquake-related MI in panel (a) is highlighted in yellow contours.
|
625 |
+
|
-NE1T4oBgHgl3EQfCgJv/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
.gitattributes
CHANGED
@@ -7440,3 +7440,61 @@ StE2T4oBgHgl3EQfCAbz/content/2301.03610v1.pdf filter=lfs diff=lfs merge=lfs -tex
|
|
7440 |
OdFPT4oBgHgl3EQfmzXU/content/2301.13127v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7441 |
sdAyT4oBgHgl3EQf0Pk5/content/2301.00713v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7442 |
9NFRT4oBgHgl3EQfqTc6/content/2301.13616v1.pdf filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7440 |
OdFPT4oBgHgl3EQfmzXU/content/2301.13127v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7441 |
sdAyT4oBgHgl3EQf0Pk5/content/2301.00713v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7442 |
9NFRT4oBgHgl3EQfqTc6/content/2301.13616v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7443 |
+
0dAzT4oBgHgl3EQfRPuW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7444 |
+
0NAyT4oBgHgl3EQfbfc0/content/2301.00262v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7445 |
+
NdE4T4oBgHgl3EQfjg0O/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7446 |
+
ltE4T4oBgHgl3EQftg2f/content/2301.05225v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7447 |
+
ZdFOT4oBgHgl3EQf-zSY/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7448 |
+
HdE2T4oBgHgl3EQfTwd_/content/2301.03806v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7449 |
+
c9AzT4oBgHgl3EQf3P6k/content/2301.01827v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7450 |
+
_tFJT4oBgHgl3EQfqizo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7451 |
+
VtAyT4oBgHgl3EQfu_k1/content/2301.00622v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7452 |
+
pdFPT4oBgHgl3EQfLzS8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7453 |
+
sNE2T4oBgHgl3EQfLQam/content/2301.03712v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7454 |
+
9NAzT4oBgHgl3EQfSft5/content/2301.01233v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7455 |
+
sNE2T4oBgHgl3EQfLQam/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7456 |
+
49E0T4oBgHgl3EQfvgE1/content/2301.02618v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7457 |
+
99AyT4oBgHgl3EQfRPYW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7458 |
+
9NFRT4oBgHgl3EQfqTc6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7459 |
+
a9E2T4oBgHgl3EQfaAcV/content/2301.03869v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7460 |
+
4dAyT4oBgHgl3EQf2Pkf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7461 |
+
Y9AzT4oBgHgl3EQfmv3V/content/2301.01570v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7462 |
+
VtAyT4oBgHgl3EQfu_k1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7463 |
+
_NE3T4oBgHgl3EQfrwrw/content/2301.04663v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7464 |
+
OdFPT4oBgHgl3EQfmzXU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7465 |
+
UdFLT4oBgHgl3EQfRC8l/content/2301.12035v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7466 |
+
pdE3T4oBgHgl3EQf7wvD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7467 |
+
KdAzT4oBgHgl3EQfkP0Y/content/2301.01527v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7468 |
+
StE2T4oBgHgl3EQfCAbz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7469 |
+
VtAyT4oBgHgl3EQfhvgZ/content/2301.00381v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7470 |
+
ydFJT4oBgHgl3EQfhyyK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7471 |
+
TNFLT4oBgHgl3EQfQC8d/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7472 |
+
_tFLT4oBgHgl3EQfwS-J/content/2301.12163v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7473 |
+
T9E3T4oBgHgl3EQfzwt3/content/2301.04731v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7474 |
+
ztE3T4oBgHgl3EQfmgqk/content/2301.04617v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7475 |
+
-9FQT4oBgHgl3EQf7Ta5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7476 |
+
a9E1T4oBgHgl3EQfKgN7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7477 |
+
9tAzT4oBgHgl3EQfSvsB/content/2301.01235v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7478 |
+
NdE4T4oBgHgl3EQfjg0O/content/2301.05142v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7479 |
+
lNAzT4oBgHgl3EQfNvsP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7480 |
+
_NE3T4oBgHgl3EQfrwrw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7481 |
+
JdAzT4oBgHgl3EQfH_vd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7482 |
+
lNAzT4oBgHgl3EQfNvsP/content/2301.01152v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7483 |
+
1dFKT4oBgHgl3EQfOy1w/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7484 |
+
F9E0T4oBgHgl3EQfzQJ7/content/2301.02670v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7485 |
+
WtAzT4oBgHgl3EQfKPud/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7486 |
+
cNE2T4oBgHgl3EQfwgg2/content/2301.04101v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7487 |
+
49E0T4oBgHgl3EQfvgE1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7488 |
+
_tFLT4oBgHgl3EQfwS-J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7489 |
+
gtAzT4oBgHgl3EQfov1j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7490 |
+
0dFAT4oBgHgl3EQfCRwI/content/2301.08408v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7491 |
+
ENAyT4oBgHgl3EQf4vqx/content/2301.00793v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7492 |
+
V9E1T4oBgHgl3EQfvQVU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7493 |
+
MNFOT4oBgHgl3EQf0zS8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7494 |
+
0dFAT4oBgHgl3EQfCRwI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7495 |
+
99AyT4oBgHgl3EQfRPYW/content/2301.00060v1.pdf filter=lfs diff=lfs merge=lfs -text
|
7496 |
+
ztE3T4oBgHgl3EQfmgqk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7497 |
+
a9E2T4oBgHgl3EQfaAcV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7498 |
+
TNE0T4oBgHgl3EQflAGw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7499 |
+
ENAyT4oBgHgl3EQf4vqx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
7500 |
+
59E0T4oBgHgl3EQfewCK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
0NAyT4oBgHgl3EQfbfc0/content/2301.00262v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c7978d0b44c05daa8022f6cc17182126b6a049df6f0c49bd5ee9846d84bda6aa
|
3 |
+
size 430706
|
0dAzT4oBgHgl3EQfRPuW/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a171f2e4892d4207e45fbd94be67ae3379dbac45d918c4f4782ef5e6c2af45e5
|
3 |
+
size 3866669
|
0dFAT4oBgHgl3EQfCRwI/content/2301.08408v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:b9cfcbf6fe447020db4ef1b4c1f01579a81f03003f7a86ec452c7183755e2d1c
|
3 |
+
size 1342573
|
0dFAT4oBgHgl3EQfCRwI/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8a9fb2e8335555144c85ae85aa5b374ff19a70541c9efd12dd32a65ea7b44276
|
3 |
+
size 1376301
|
0dFAT4oBgHgl3EQfCRwI/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6f09d63ef5d472aeab2f305e61f6ccdd93c4dbda0ca9a756bee6399bf76c0ded
|
3 |
+
size 59347
|
1NFST4oBgHgl3EQfWTh0/content/tmp_files/2301.13780v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1NFST4oBgHgl3EQfWTh0/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1dE3T4oBgHgl3EQfnQrW/content/tmp_files/2301.04624v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1dE3T4oBgHgl3EQfnQrW/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
1dFKT4oBgHgl3EQfOy1w/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1d2d06fe77db69e1def0a649b68c9122b4af3a87aad926865a34d2c6807a7f4c
|
3 |
+
size 19791917
|
49E0T4oBgHgl3EQfvgE1/content/2301.02618v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bf697899f84235fd864bcdd4155c39e41064de8e935e31247c3a21ca418d9642
|
3 |
+
size 1235445
|
49E0T4oBgHgl3EQfvgE1/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:01ed0fc8d780ad08308afaa722e8a119f7f55330b0f4114c922a6402e228004d
|
3 |
+
size 21954605
|
4dAyT4oBgHgl3EQf2Pkf/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6077b450b2925a13f70357261ae2477d134da87435827c8b38f77786c72ded6f
|
3 |
+
size 3801133
|
4tAyT4oBgHgl3EQfQPYV/content/tmp_files/2301.00039v1.pdf.txt
ADDED
@@ -0,0 +1,981 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
New Insights on the Stokes Paradox for Flow in
|
2 |
+
Unbounded Domains
|
3 |
+
Ingeborg G. Gjerde and L. Ridgway Scott
|
4 |
+
January 3, 2023
|
5 |
+
Abstract
|
6 |
+
Stokes flow equations, used to model creeping flow, are a commonly used simplifi-
|
7 |
+
cation of the Navier–Stokes equations. The simplification is valid for flows where the
|
8 |
+
inertial forces are negligible compared to the viscous forces. In infinite domains, this
|
9 |
+
simplification leads to a fundamental paradox.
|
10 |
+
In this work we review the Stokes paradox and present new insights related to
|
11 |
+
recent research. We approach the paradox from three different points of view: modern
|
12 |
+
functional analysis, numerical simulations, and classical analytic techniques. The first
|
13 |
+
approach yields a novel, rigorous derivation of the paradox. We also show that relaxing
|
14 |
+
the Stokes no-slip condition (by introducing a Navier’s friction condition) in one case
|
15 |
+
resolves the Stokes paradox but gives rise to d’Alembert’s paradox.
|
16 |
+
The Stokes paradox has previously been resolved by Oseen, who showed that it
|
17 |
+
is caused by a limited validity of Stokes’ approximation. We show that the paradox
|
18 |
+
still holds for the Reynolds–Orr equations describing kinetic energy flow instability,
|
19 |
+
meaning that flow instability steadily increases with domain size. We refer to this as
|
20 |
+
an instability paradox.
|
21 |
+
1
|
22 |
+
Introduction
|
23 |
+
Fluids like air and water can be modeled to high precision using the Navier–Stokes equa-
|
24 |
+
tions [29]. These equations are still intensively studied, and they have some very curious
|
25 |
+
mathematical features, often described as paradoxes, such as d’Alembert’s paradox [10, 26]
|
26 |
+
and Whitehead’s paradox [30, section 8.3]. Here we discuss one of the most well known,
|
27 |
+
namely the Stokes paradox. The Stokes paradox also arises for more exotic fluids, such as
|
28 |
+
Fermi electrons [17].
|
29 |
+
Consider a domain Ω ⊂ R3 containing an infinitely long cylinder with radius 1. The
|
30 |
+
cylinder has a boundary denoted Γ. The domain is filled with a fluid moving with velocity
|
31 |
+
u and pressure p past the cylinder. Mathematically, this can be described using the Navier–
|
32 |
+
Stokes equations
|
33 |
+
−∆u + ∇p = −R u · ∇u
|
34 |
+
in Ω,
|
35 |
+
∇· u = 0
|
36 |
+
in Ω,
|
37 |
+
(1)
|
38 |
+
together with the boundary condition
|
39 |
+
u = g on Γ.
|
40 |
+
(2)
|
41 |
+
1
|
42 |
+
arXiv:2301.00039v1 [physics.flu-dyn] 30 Dec 2022
|
43 |
+
|
44 |
+
In this form, the Navier–Stokes equations are posed with only one parameter, namely
|
45 |
+
the Reynolds number R [15]:
|
46 |
+
R = UL/ν.
|
47 |
+
(3)
|
48 |
+
Here, U is the representative flow velocity, L the representative length for the domain, and
|
49 |
+
ν is the kinematic fluid viscosity.
|
50 |
+
In this work, we are interested in the case where the Reynolds number will be small, and
|
51 |
+
we have R ≪ 1. In this case, it seems reasonable to drop the advective term, in which case
|
52 |
+
we have the simpler Stokes equations
|
53 |
+
−∆u + ∇p = 0 in Ω,
|
54 |
+
∇· u = 0 in Ω,
|
55 |
+
(4)
|
56 |
+
again with a boundary condition of the form (2).
|
57 |
+
If the domain Ω is taken to be infinitely large, however, this simplification leads to a
|
58 |
+
fundamental paradox [27, 6]. The Stokes paradox is that “creeping flow of an incompressible
|
59 |
+
Newtonian fluid around a cylinder in an unbounded fluid has no solution” [28]. Others have
|
60 |
+
characterized the paradox by saying
|
61 |
+
• [23, 1st paragraph] “Stokes (1851) established that there was no solution to the two-
|
62 |
+
dimensional, steady, incompressible, Navier–Stokes equations for asymptotically uni-
|
63 |
+
form flow around a cylinder.”
|
64 |
+
• [1, Remark 3.15] “no classical solution ... that tends to a nonzero vector at infinity.”
|
65 |
+
These statements require some clarification. Firstly, potential flow around a cylinder solves
|
66 |
+
the Stokes equations with the right boundary conditions at infinity. However, potential flow
|
67 |
+
(Figure 1a) does not satisfy no-slip boundary conditions on the cylinder; for this reason it
|
68 |
+
has commonly been discarded as physically incorrect.
|
69 |
+
To handle the no-slip boundary condition we instead look to the literature on functional
|
70 |
+
analysis. A precise mathematical theory for the Stokes equations in an unbounded domain
|
71 |
+
was developed in [9]. We can explain the results there informally as follows: That it is
|
72 |
+
a well posed problem to require a reasonable flow profile around a reasonable domain. A
|
73 |
+
solution therefore exists solving Stokes equations in an infinite domain enclosing a cylinder,
|
74 |
+
as long as we set reasonable boundary conditions on the cylinder. But the paradox is that
|
75 |
+
we cannot set a boundary condition at infinity.
|
76 |
+
This point is often misunderstood, saying instead that there is a “need to satisfy two
|
77 |
+
boundary conditions, one on the object and one at infinity” [4]. This is despite the fact
|
78 |
+
that many papers have dealt with the paradox and its resolution. The first resolution was
|
79 |
+
by Oseen [19] who realized that it was necessary to keep R > 0 in (1) and provided an
|
80 |
+
approximate (linearized) solution to Navier-Stokes. This observation has been substantially
|
81 |
+
amplified by Finn [6]. But many others have dealt with the paradox, for example by improv-
|
82 |
+
ing the Oseen approximation [14, 20]. For a survey and history of their methods, see [30,
|
83 |
+
Chapter V] where the so-called matched asymptotic expansions are traced back to seminal
|
84 |
+
work by K. O. Friedrichs.
|
85 |
+
The Sobolev space in which the solution exists provides important context for the Stokes
|
86 |
+
paradox. To be more precise, the solution exists in a special weighted Sobolev space in which
|
87 |
+
we give up control over the function as we get infinitely far from the cylinder. For this reason
|
88 |
+
it is not possible to prescribe the flow at infinity. We will show that, if the flow is specified
|
89 |
+
2
|
90 |
+
|
91 |
+
to be a constant on the cylinder, the flow must be that constant everywhere. Thus, while a
|
92 |
+
non-trivial solution exists, it may not be physically meaningful.
|
93 |
+
Due to the confusion related to the Stokes paradox, we examine it in some detail before
|
94 |
+
proceeding to the main results of the paper. We draw together disparate approaches to give
|
95 |
+
the fullest possible understanding. Although much of what we present at the beginning can
|
96 |
+
be found separately elsewhere, the combination of the different approaches gives a more
|
97 |
+
complete picture than has so far been presented in one place.
|
98 |
+
The article will proceed as follows. We begin in Section 2 by giving two analytic solutions
|
99 |
+
for Stokes flow around a cylinder and discuss their properties. Next, we give in Section 3
|
100 |
+
a derivation of the Stokes paradox, using the mathematical framework from [9]. In Section
|
101 |
+
4, we examine the impact of a different boundary condition on the cylinder, Navier’s slip
|
102 |
+
(friction) condition. We see that it is possible to resolve the Stokes paradox with one value
|
103 |
+
of the friction parameter, although that value seems to be nonphysical.
|
104 |
+
We next view the Stokes paradox through other lenses. In particular, we solve the Stokes
|
105 |
+
problem on a very large (but finite) domain surrounding the cylinder. In this case we can
|
106 |
+
pose any boundary conditions we like on the outer boundary. So what goes wrong as we let
|
107 |
+
the outer boundary go to infinity? In Section 5 we answer this in two ways, using modern
|
108 |
+
computational methods (Section 5.1) and classical analytical solution techniques (Section
|
109 |
+
5.2). We will see that they give the same answer: the solution goes to a constant. Thus
|
110 |
+
we have multiple ways of viewing the Stokes paradox, each with its own advantages and
|
111 |
+
limitations.
|
112 |
+
In Section 6 we review the resolution of the Stokes paradox by Oseen [19]. According
|
113 |
+
to Oseen, the paradox is caused by the limited validity of Stokes’ approximation, which
|
114 |
+
relies on the Reynolds number being small. To be more precise, we have two limits going to
|
115 |
+
infinity: the viscosity and the domain size. Either limit alone is well behaved, but jointly
|
116 |
+
they are not. Thus one must consider the full Navier-Stokes equations if the domain is
|
117 |
+
large. We also discuss briefly some open questions regarding the existence of a solution for
|
118 |
+
the Navier–Stokes equations when the Reynolds number grows large.
|
119 |
+
In Section 7 we describe extensions of the Stokes paradox concepts to other flow problems.
|
120 |
+
In particular, we discuss how the Stokes paradox relates to flow instabilities. The Reynolds-
|
121 |
+
Orr method gives a way to calculate the kinetic energy instability of a perturbed base
|
122 |
+
flow, where the most unstable flow perturbations are calculated by solving a Stokes type
|
123 |
+
eigenvalue problem. In [11], it was observed that the instability of a base flow kept increasing
|
124 |
+
as the domain grew. This can be explained as a particular instance of the Stokes paradox.
|
125 |
+
To the best of our knowledge, however, it cannot be resolved in any such way as Oseen’s
|
126 |
+
resolution of the Stokes paradox.
|
127 |
+
2
|
128 |
+
Classical solutions
|
129 |
+
Assume for the moment Γ to be an infinitely long cylinder of radius 1 in the z-direction with
|
130 |
+
origin (0, 0) in the x, y-plane. Consider now the Stokes flow equations (4) with boundary
|
131 |
+
condition (2). We now construct two analytic solutions. The strategy is to find a function
|
132 |
+
u that is divergence free so it satisfies the second equation in (4). If the Laplacian of u is a
|
133 |
+
gradient of some function, we can solve the first equation in (4) by construction by taking
|
134 |
+
the pressure equal to said function.
|
135 |
+
To find a function u that is divergence free, we use two different approaches. For the
|
136 |
+
first, we take φ to be a potential function, i.e. we set u = ∇φ = (φx, φy), where φi denotes
|
137 |
+
3
|
138 |
+
|
139 |
+
(a) Potential flow, β = −2ν
|
140 |
+
(b) Zero friction flow, β = 0
|
141 |
+
Figure 1: Stream function ψ, stream lines and flux u (cones) for two classically known
|
142 |
+
analytic solutions of the Stokes equations for flow past an infinitely long cylinder. Neither
|
143 |
+
solution satisfies the no-slip boundary condition.
|
144 |
+
the derivative of φ in the ith direction. Then if we want ∇·u = 0 we want ∇·∇φ = ∆φ = 0,
|
145 |
+
i.e. φ to be harmonic. Many harmonic functions are known in the literature; we take
|
146 |
+
φ(r, θ) = −(cos θ)
|
147 |
+
�
|
148 |
+
r − 1
|
149 |
+
r
|
150 |
+
�
|
151 |
+
= −x
|
152 |
+
�
|
153 |
+
1 − 1
|
154 |
+
r2
|
155 |
+
�
|
156 |
+
.
|
157 |
+
(5)
|
158 |
+
A straightforward calculation shows that φ is harmonic.
|
159 |
+
We also have
|
160 |
+
∆u = (∆φx, ∆φy) = ((∆φ)x, (∆φ)y) = 0.
|
161 |
+
Thus we have a solution to the Stokes equation (4) if the pressure is taken to be a constant
|
162 |
+
(so that ∇p = 0 as well).
|
163 |
+
Differentiating r =
|
164 |
+
�
|
165 |
+
x2 + y2 we find
|
166 |
+
rx = x
|
167 |
+
r ,
|
168 |
+
ry = y
|
169 |
+
r .
|
170 |
+
(6)
|
171 |
+
Using these, we have
|
172 |
+
φx = 1 − r−2 + 2yr−3ry = 1 + (y2 − x2)r−4,
|
173 |
+
φy = 2yr−3rx = 2xyr−4.
|
174 |
+
Then
|
175 |
+
u(x, y) = (φx(x, y), φy(x, y)) =
|
176 |
+
�
|
177 |
+
1 +
|
178 |
+
y2 − x2
|
179 |
+
(x2 + y2)2 ,
|
180 |
+
−2xy
|
181 |
+
(x2 + y2)2
|
182 |
+
�
|
183 |
+
.
|
184 |
+
(7)
|
185 |
+
This solution for u is commonly referred to as potential flow. The potential flow solution
|
186 |
+
is shown in Figure 1a together with its stream function and streamlines. We see that u goes
|
187 |
+
to uniform flow at infinity. Moreover, u · n = 0 on the cylinder. However, the tangential
|
188 |
+
4
|
189 |
+
|
190 |
+
u
|
191 |
+
2
|
192 |
+
1.5
|
193 |
+
0.5
|
194 |
+
0
|
195 |
+
7.5
|
196 |
+
4
|
197 |
+
2
|
198 |
+
0
|
199 |
+
-2
|
200 |
+
-4
|
201 |
+
-7.5n
|
202 |
+
2
|
203 |
+
1.5
|
204 |
+
0.5
|
205 |
+
0
|
206 |
+
20
|
207 |
+
10
|
208 |
+
0
|
209 |
+
-10
|
210 |
+
-20velocity u · τ ̸= 0, meaning that this solution does not satisfy a no-slip boundary condition
|
211 |
+
on Γ. This led Stokes to reject this solution.
|
212 |
+
Let us therefore make another analytic solution, this time trying the second approach
|
213 |
+
to making a divergence-free flux u. By augmenting our vectors with a z-component we
|
214 |
+
can define u to be the curl of a vector (0, 0, ψ) so that u = (ψy, −ψx, 0). Dropping the
|
215 |
+
z-coordinate again we have u = (ψy, −ψx) and ∇· u = ψyx − ψxy = 0 as long as ψ is
|
216 |
+
sufficiently smooth1. For example, define
|
217 |
+
ψ = (sin θ) r log r = y log r.
|
218 |
+
(8)
|
219 |
+
Then
|
220 |
+
u(x, y) =
|
221 |
+
�y2
|
222 |
+
r2 + log(r), −xy
|
223 |
+
r2
|
224 |
+
�
|
225 |
+
.
|
226 |
+
(9)
|
227 |
+
By construction u satisfies the second equation in (4). The first equation in (4) can
|
228 |
+
then be satisfied by choosing p so that ∇p = ∆u. We will show in Section 5.2 that such a
|
229 |
+
solution p exists.
|
230 |
+
Again, the solution does not satisfy the no-slip boundary condition on Γ. Moreover, the
|
231 |
+
solution diverges to infinity as r → ∞.
|
232 |
+
In the next section, we see how these analytic solutions are related to the Stokes paradox.
|
233 |
+
3
|
234 |
+
Derivation of Stokes paradox using the variational
|
235 |
+
framework
|
236 |
+
The Stokes paradox occurs for incompressible flow Stokes flow with no-slip boundary condi-
|
237 |
+
tions on the cylinder (i.e. g = 0 in (2)). The paradox can be derived in several ways. In this
|
238 |
+
work, we present three approaches: (i) a rigorous derivation using weighted Sobolev spaces,
|
239 |
+
(ii) a formal approach using simulations in domains of increasing size and (iii) a semi-formal
|
240 |
+
approach of deriving analytic solutions in bounded domains and passing to the limit.
|
241 |
+
3.1
|
242 |
+
Sobolev spaces for the Stokes equations
|
243 |
+
If the domain Ω is Lipschitz continuous [8, section 5.1]), the system is well posed with
|
244 |
+
u ∈ (H1(Ω))d, d ∈ {2, 3} being the dimension of the domain, and p ∈ L2(Ω/R), where
|
245 |
+
L2(Ω)/R =
|
246 |
+
�
|
247 |
+
v : Ω → R :
|
248 |
+
�
|
249 |
+
Ω
|
250 |
+
v2 dx < ∞,
|
251 |
+
�
|
252 |
+
Ω
|
253 |
+
v dx = 0
|
254 |
+
�
|
255 |
+
is the space of square-integrable functions, together with the norm given by
|
256 |
+
∥v∥L2(Ω) =
|
257 |
+
��
|
258 |
+
Ω
|
259 |
+
v2 dx.
|
260 |
+
We also define
|
261 |
+
H1(Ω) =
|
262 |
+
�
|
263 |
+
v ∈ L2(Ω) : ∇v ∈ L2(Ω)
|
264 |
+
�
|
265 |
+
1for example ψ ∈ C2(Ω), i.e. two times continuously differentiable. In this case we can change the order
|
266 |
+
of differentiation without issues.
|
267 |
+
5
|
268 |
+
|
269 |
+
and the norm
|
270 |
+
∥v∥H1(Ω) =
|
271 |
+
��
|
272 |
+
Ω
|
273 |
+
|∇v(x)|2 + v(x)2 dx,
|
274 |
+
where |v(x)| is the Euclidean norm of ∇v(x).
|
275 |
+
The notation u ∈ (H1(Ω))d then means
|
276 |
+
that every component of u is in H1(Ω). To simplify notation, we from now on drop the
|
277 |
+
superscript and simply write u ∈ H1(Ω).
|
278 |
+
In summary, given a bounded domain and reasonable f and g (for example f ∈ L2(Ω)
|
279 |
+
and g ∈ H1(Ω) [8]) there exists a unique solution pair u ∈ H1(Ω) and p ∈ L2(Ω) of (4).
|
280 |
+
Once we know there exists a unique solution, we can use numerical methods to solve for its
|
281 |
+
approximation.
|
282 |
+
If the domain Ω is infinite, the previous result no longer holds.
|
283 |
+
Instead, the Stokes
|
284 |
+
equation will be well posed with p ∈ L2(Ω)/R and u ∈ H1
|
285 |
+
w(Ω) defined by the norm
|
286 |
+
∥v∥H1w(Ω) =
|
287 |
+
��
|
288 |
+
Ω
|
289 |
+
|∇v(x)|2 +
|
290 |
+
�
|
291 |
+
1 + |x| log |x|
|
292 |
+
�−2|v(x)|2 dx.
|
293 |
+
(10)
|
294 |
+
Centrally, this is a weaker norm than the one we had for the H1(Ω). Both spaces require the
|
295 |
+
gradient of the function itself to be square-integrable, but in the H1
|
296 |
+
w(Ω)-space we only require
|
297 |
+
the function to be square-integrable when multiplied by a weight function
|
298 |
+
�
|
299 |
+
1+|x| log |x|
|
300 |
+
�−1.
|
301 |
+
As this weight function goes to zero as x → ∞, the function does not have to decay at all
|
302 |
+
as we move away from the cylinder. As we will see it may even diverge. Therefore we have
|
303 |
+
to be very careful about assigning limit values at infinity to functions u ∈ H1
|
304 |
+
w(Ω).
|
305 |
+
What can be said, based on [9], is that one cannot specify boundary conditions simulta-
|
306 |
+
neously on the cylinder and at infinity. That is, having specified conditions on the cylinder,
|
307 |
+
the conditions at infinity have already become specified. We will see that the resolution of
|
308 |
+
the Stokes paradox is simple once we know in what function spaces to look for solutions.
|
309 |
+
We now know that solutions exists for the Stokes problem, but only in a certain weighted
|
310 |
+
Sobolev space. Due to the weight going to zero as we move away from the cylinder, the
|
311 |
+
solution is allowed to behave more mischievously in this region.
|
312 |
+
In the time of Stokes
|
313 |
+
(1819–1903), the functional analysis approach to partial differential equations was still in
|
314 |
+
its infancy. Indeed, it was not until 1991 [9] that the appropriate function spaces were fully
|
315 |
+
clarified.
|
316 |
+
3.2
|
317 |
+
Derivation of the Stokes paradox
|
318 |
+
Now that we know there exists a solution, we can straightforwardly formulate the Stokes
|
319 |
+
paradox. For this, it is useful to choose moving coordinates. Instead of thinking of a fixed
|
320 |
+
cylinder in a moving fluid, let us reverse the point of view by using moving coordinates such
|
321 |
+
that the fluid appears at rest. If we think of a moving cylinder in an infinite fluid, we can pose
|
322 |
+
the (Navier–)Stokes equations as in (4) with a boundary function g = (1, 0), assuming the
|
323 |
+
cylinder is moving in the x-direction with unit speed. In view of [9], there is a unique solution
|
324 |
+
u ∈ H1
|
325 |
+
w(Ω), where Ω is the complement of the cylinder (i.e. {(x, y) ∈ R2 : x2 + y2 > 1})
|
326 |
+
and fixed in time.
|
327 |
+
But g ∈ H1
|
328 |
+
w(Ω), and g is a solution of (4), with constant pressure. And [9] proves that
|
329 |
+
g is the solution. Thus we have proved the following theorem.
|
330 |
+
Theorem 3.1 Suppose that we move an infinite cylinder in a direction perpendicular to the
|
331 |
+
axis of the cylinder with unit speed. If the entirety of the fluid is governed by the Stokes
|
332 |
+
6
|
333 |
+
|
334 |
+
equations (4) with a no-slip boundary condition on the cylinder, then the entirety of the fluid
|
335 |
+
is forced to move at unit speed.
|
336 |
+
In the variational framework, the Stokes paradox is not really a paradox: The Stokes
|
337 |
+
equation is well posed in infinite domains, but the appropriate function space for u is one
|
338 |
+
where we give up control of u as it approaches infinity. Thus it is not surprising that the
|
339 |
+
solution is non-physical away from the cylinder.
|
340 |
+
The fact that we are not able to specify the limiting value of the solution raises the
|
341 |
+
question of how badly the solution might behave. We investigate this in the next section.
|
342 |
+
3.2.1
|
343 |
+
Limit values of functions in H1
|
344 |
+
w
|
345 |
+
In the previous section we saw that moving an infinitely long cylinder through an infinite
|
346 |
+
domain Ω with given speed g = (1, 0) caused the entire solution flux to be u = (1, 0). In
|
347 |
+
fact, due to the weight function, any v ∈ H1
|
348 |
+
w(Ω) can tend to a nonzero constant at infinity.
|
349 |
+
Worse, it can grow like (log r)α for α < 1/2, as long as its gradient remains square integrable.
|
350 |
+
In particular, take u(r) = (log r)α. Then for r > 1,
|
351 |
+
|∇u| =
|
352 |
+
���α∇r
|
353 |
+
r (log r)α−1��� =
|
354 |
+
���α x
|
355 |
+
r2 (log r)α−1��� =
|
356 |
+
���α
|
357 |
+
r (log r)α−1���.
|
358 |
+
This expression is square integrable at infinity if
|
359 |
+
� ∞
|
360 |
+
K
|
361 |
+
r dr
|
362 |
+
r2(log r)2(1−α) < ∞.
|
363 |
+
Changing coordinates to s = log r (so that r−1dr = ds), our condition reduces to
|
364 |
+
� ∞
|
365 |
+
log K
|
366 |
+
ds
|
367 |
+
s2(1−α) < ∞.
|
368 |
+
This holds when α < 1/2.
|
369 |
+
Thus the Stokes equation posed in an infinite domain may have a solution that diverges
|
370 |
+
as |x| → ∞. An example of this is the zero friction solution (9), as we now discuss.
|
371 |
+
4
|
372 |
+
Navier’s revenge
|
373 |
+
In Section 3.2 we saw how the imposition of a no-slip boundary condition on the cylinder
|
374 |
+
leads to the Stokes paradox in unbounded domains. In this section we will discuss what
|
375 |
+
may happen for different boundary conditions. We will see that the Stokes paradox does
|
376 |
+
not occur for all boundary conditions.
|
377 |
+
Instead of the no-slip boundary condition (2) with g = 0, let us consider Navier’s slip
|
378 |
+
condition. This boundary condition, sometimes referred to as Navier’s friction condition
|
379 |
+
[18, 12, 5], links the tangential velocity and the shear stress on Γ:
|
380 |
+
β u · τ k = −ν nt(∇u + ∇ut)τ k,
|
381 |
+
k = 1, 2,
|
382 |
+
(11)
|
383 |
+
where τ i are orthogonal tangent vectors and β is the friction coefficient. This is coupled
|
384 |
+
with the no-penetration condition u·n = 0 on Γ. In our two-dimensional case of flow around
|
385 |
+
a cylinder, there is only one tangent vector τ. The other one is perpendicular to the plane
|
386 |
+
7
|
387 |
+
|
388 |
+
of the two-dimensional flow, that is, parallel to the cylinder axis. For β > 0, the Navier
|
389 |
+
slip condition works as a friction causing the fluid to slow down as it slips over the cylinder
|
390 |
+
boundary Γ.
|
391 |
+
The potential function φ and stream function ψ defined in (5) and (8) give rise to
|
392 |
+
two different solutions of the Stokes equations with Navier’s boundary condition (11), each
|
393 |
+
corresponding to a particular choice of β. The potential flow solution (7), i.e.
|
394 |
+
u = (φx, φy)
|
395 |
+
⇒
|
396 |
+
u(x, y) =
|
397 |
+
�
|
398 |
+
1 +
|
399 |
+
y2 − x2
|
400 |
+
(x2 + y2)2 ,
|
401 |
+
−2xy
|
402 |
+
(x2 + y2)2
|
403 |
+
�
|
404 |
+
,
|
405 |
+
solves the Navier–Stokes equations for all ν, and satisfies the Navier slip condition if β = −2ν
|
406 |
+
[11]. Moreover, this flow goes to the desired asymptotic limit (zero) at infinity. Thus (7)
|
407 |
+
resolves Stokes’ paradox for β = −2ν. For this particular boundary condition the solution
|
408 |
+
belongs to the standard Sobolev space H1(Ω) and exhibits reasonable physical behavior in
|
409 |
+
the entire domain.
|
410 |
+
This raises the question of what happens for other values of β. Interestingly, the other
|
411 |
+
analytic solution we have, i.e. (9), satisfies the friction boundary condition (11) if β = 0. To
|
412 |
+
see this, note that τ = (−y, x) and n = (−x, −y) on Γ. Computing (∇u) τ we find
|
413 |
+
(∇u)τ = τ · ∇u = ∂θ
|
414 |
+
�
|
415 |
+
sin2 θ + log(r), − cos θ sin θ
|
416 |
+
�
|
417 |
+
=
|
418 |
+
�
|
419 |
+
2 sin θ cos θ, − cos2 θ + sin2 θ
|
420 |
+
�
|
421 |
+
.
|
422 |
+
(12)
|
423 |
+
Therefore (omitting some trigonometric simplifications)
|
424 |
+
nt(∇u)τ|Γ = −(cos θ, sin θ)t�
|
425 |
+
2 sin θ cos θ, − cos2 θ + sin2 θ
|
426 |
+
�
|
427 |
+
= −2 sin θ cos2 θ + cos2 θ sin θ − sin3 θ = − sin θ.
|
428 |
+
(13)
|
429 |
+
Similarly
|
430 |
+
(∇u)n = n · ∇u = −r∂r
|
431 |
+
�
|
432 |
+
sin2 θ + log(r), − cos θ sin θ
|
433 |
+
�
|
434 |
+
=
|
435 |
+
�
|
436 |
+
− 1, 0
|
437 |
+
�
|
438 |
+
.
|
439 |
+
(14)
|
440 |
+
This says that
|
441 |
+
τ t(∇u)n|Γ = (− sin θ, cos θ) ·
|
442 |
+
�
|
443 |
+
− 1, 0
|
444 |
+
�
|
445 |
+
= sin θ.
|
446 |
+
(15)
|
447 |
+
Note that nt(∇ut)τ = τ t(∇u)n. Therefore
|
448 |
+
nt(∇u + ∇ut)τ|Γ =
|
449 |
+
�
|
450 |
+
nt(∇u)τ + τ t(∇u)n
|
451 |
+
�
|
452 |
+
|Γ = 0.
|
453 |
+
(16)
|
454 |
+
Thus the function in (9) solves the Stokes equations and satisfies the Navier slip condition
|
455 |
+
if β = 0. But this solution diverges as r → ∞, fast enough that the norm in (10) is not
|
456 |
+
finite. Thus (9) does not resolve the Stokes paradox.
|
457 |
+
It is worth noting that the fact that β = 0 does not mean that the drag on the cylinder is
|
458 |
+
zero [10]. It is known that the drag IS zero for β = −2ν, and this is the core of d’Alembert’s
|
459 |
+
paradox [10].
|
460 |
+
The computations above are sufficiently complex that it is useful to have a way to verify
|
461 |
+
them. This can be done by solving the Stokes equations with the Navier slip condition
|
462 |
+
numerically with β = 0 and check that the result approximately agrees with (9).
|
463 |
+
For β > 0, the Navier slip condition acts as a friction force, slowing the flow as it slips
|
464 |
+
over the cylinder. For β → ∞, the Navier friction boundary condition converges to the
|
465 |
+
Stokes no-slip condition. For other values of β, the techniques in section 5 could be used to
|
466 |
+
see if there are plausible solutions of the Stokes paradox.
|
467 |
+
8
|
468 |
+
|
469 |
+
In conclusion, we see that the Stokes paradox is resolved using the Navier slip boundary
|
470 |
+
condition with one particular value for β, but not for others. Navier died in 1836, so he
|
471 |
+
was not available to comment on Stokes’ paradox. We can only wonder what he might have
|
472 |
+
said.
|
473 |
+
5
|
474 |
+
Stokes flow on bounded domains of increasing size
|
475 |
+
In Section 3.1 we saw how the Stokes problem lost the ability to specify the value of the
|
476 |
+
solution on the boundary away from the cylinder. With this in mind, we now restrict our
|
477 |
+
attention to bounded domains, where it is possible to pose boundary conditions. We explore
|
478 |
+
two approaches, a computational one and an analytical one. We will see that as we increase
|
479 |
+
the size of the box, we again encounter the Stokes paradox.
|
480 |
+
5.1
|
481 |
+
Computational approach
|
482 |
+
Recent advances in software [2, 13] have made it easy to solve partial differential equations
|
483 |
+
(PDEs). Using such software, you can study PDEs without knowing detailed background
|
484 |
+
prerequisites [21]. We now indicate this approach for the Navier–Stokes equations.
|
485 |
+
Consider the domain Ωb defined by
|
486 |
+
Ωb = {x : |x| > 1, |xi| < b, i = 1, 2}
|
487 |
+
(17)
|
488 |
+
for b > 1. Let Γ denote the subset of ∂Ωb defined by
|
489 |
+
Γ = {x : |x| = 1} ,
|
490 |
+
that is, Γ represents the cylinder.
|
491 |
+
We keep our viewpoint of a cylinder moving through the larger domain where the fluid
|
492 |
+
is at rest. I.e., we consider solutions ub of the problem (4) with boundary conditions
|
493 |
+
ub = (1, 0) on Γ,
|
494 |
+
ub = 0 on ∂Ωb\Γ.
|
495 |
+
(18)
|
496 |
+
Figure 2 shows the solution for b = 4.
|
497 |
+
Figure 3 shows the horizontal component of the solution for (a) b = 16 and (b) b = 32.
|
498 |
+
We see that the support of the horizontal component spreads as the box gets bigger. Thus
|
499 |
+
we see that the horizontal component of the solutions is not really going to zero at the
|
500 |
+
boundary of the box. It remains positive as we go to the edge of the domain both upstream
|
501 |
+
and downstream of the cylinder.
|
502 |
+
To examine how the support of the horizontal component of the solution spreads as b is
|
503 |
+
increased, we considered a functional to examine the size of ub in regions of increasing size
|
504 |
+
d, but fixed independent of b. Thus we defined
|
505 |
+
�
|
506 |
+
Ωb
|
507 |
+
χd(x)2|ub(x)|2 dx
|
508 |
+
� �
|
509 |
+
Ωb
|
510 |
+
χd(x)2 dx
|
511 |
+
(19)
|
512 |
+
where χd(x) is the interpolant on the computational mesh of the cut-off function
|
513 |
+
1
|
514 |
+
2
|
515 |
+
�
|
516 |
+
1 − tanh
|
517 |
+
�
|
518 |
+
20
|
519 |
+
�
|
520 |
+
|x|2 − d2���
|
521 |
+
9
|
522 |
+
|
523 |
+
Figure 2: Plot of pressure p, flux u (glyphs) and streamlines for the solution the moving
|
524 |
+
cylinder problem (4) in the domain (17) with boundary conditions (18) for b = 7.5. Due to
|
525 |
+
no-slip boundary condition u = (0, 0) on the box walls, the fluid is forced to recirculate.
|
526 |
+
(a)
|
527 |
+
(b)
|
528 |
+
(c)
|
529 |
+
Figure 3: Plot of the horizontal component of the solution of (4) in the domain (17) with
|
530 |
+
boundary conditions (18) for (a) b = 16, M=64 and (b) b = 32, M=128. M is the mesh
|
531 |
+
parameter for mshr, with the number of segments for the definition of the circle chosen to
|
532 |
+
be M as well.
|
533 |
+
10
|
534 |
+
|
535 |
+
p
|
536 |
+
1.85
|
537 |
+
0
|
538 |
+
-1.85
|
539 |
+
u
|
540 |
+
0.5
|
541 |
+
0n
|
542 |
+
0.5
|
543 |
+
0
|
544 |
+
-0.25n
|
545 |
+
0.5
|
546 |
+
0
|
547 |
+
-0.250.75
|
548 |
+
0.5
|
549 |
+
0.25
|
550 |
+
-32
|
551 |
+
-16
|
552 |
+
0
|
553 |
+
16
|
554 |
+
3
|
555 |
+
-uo(x) for b=32
|
556 |
+
-uo(x) for b=16which is very close to 1 inside |x| < d and very close to zero outside of that. If ub → (1, 0)
|
557 |
+
as b → ∞, then we would expect the expression (19) to increase to 1. If on the other hand,
|
558 |
+
if ub → 0 as r → ∞, we would expect the expression (19) to converge to some value less
|
559 |
+
than 1 as b is increased.
|
560 |
+
Figure 4 gives the data for three values of d as a function of box size b. It appears
|
561 |
+
(19) indeed increases to 1, which points to ub → (1, 0) for |x| < d as b → ∞. This is in
|
562 |
+
accordance with the Stokes paradox as stated in Theorem 3.1; that as b → ∞, we have
|
563 |
+
u = (1, 0) everywhere. But then the fluid moves like a solid.
|
564 |
+
Interestingly, u = (1, 0) satisfies the Navier slip condition with β = 0 since ∇u = 0.
|
565 |
+
Thus this solution not only satisfies the no-slip boundary condition on the cylinder, but
|
566 |
+
also the Navier friction condition with β = 0. The other solution with β = 0, i.e. (9) has
|
567 |
+
different boundary values on the cylinder. It also diverges when r → ∞, unlike the solution
|
568 |
+
u = (1, 0).
|
569 |
+
(a)
|
570 |
+
(b)
|
571 |
+
Figure 4: Growth of (19) as a function of r (horizontal axis) for three values of d: (top)
|
572 |
+
d = 10, (middle) d = 20, (bottom) d = 30. (a) Stokes no-slip boundary condition, (b)
|
573 |
+
Navier friction boundary condition, β = 0.
|
574 |
+
5.2
|
575 |
+
Analytic solutions in bounded domains
|
576 |
+
Let us return from modern numerical software back to the classics.
|
577 |
+
In this section, we
|
578 |
+
consider analytical solutions in increasingly large circular domains, following [23]. These
|
579 |
+
domains are related to the so-called Leray approximate solutions [3].
|
580 |
+
Following [28, (12)], consider a general biharmonic stream function of the form
|
581 |
+
ψ = f(r) sin θ,
|
582 |
+
f(r) = Ar−1 + Br log r + Cr3 + Dr.
|
583 |
+
Now let us show that the fact that ψ is biharmonic implies that u = (ψy, −ψx) satisfies
|
584 |
+
the first equation in (4). For the sake of calculations, let us for the moment augment the
|
585 |
+
domain with a z-component and let ψ = (0, 0, ψ) so that we can define u = curl ψ. Note
|
586 |
+
that ∇ · ψ = 0 since ψ depends only on x and y. By using the vector calculus identity
|
587 |
+
curl (curl v) = ∇(∇ · v) − ∆v, we then see
|
588 |
+
curl ∆u = curl (∆(curl ψ)) = curl curl ∆ψ = ∇ (∇ · ∆ψ)
|
589 |
+
�
|
590 |
+
��
|
591 |
+
�
|
592 |
+
=0
|
593 |
+
−∆2ψ.
|
594 |
+
11
|
595 |
+
|
596 |
+
0.8
|
597 |
+
0.7
|
598 |
+
0.6
|
599 |
+
0.5
|
600 |
+
0.4
|
601 |
+
0.3
|
602 |
+
0.2
|
603 |
+
104
|
604 |
+
102
|
605 |
+
1030.8
|
606 |
+
0.7
|
607 |
+
0.6
|
608 |
+
0.5
|
609 |
+
0.4
|
610 |
+
0.3
|
611 |
+
0.2
|
612 |
+
102
|
613 |
+
103
|
614 |
+
104Since all four terms in ψ are biharmonic in any open set that excludes the origin, we can
|
615 |
+
then conclude that u satisfies the following: curl ∆u = −∆2ψ = 0 in any open set that
|
616 |
+
excludes the origin.
|
617 |
+
Invoking Stokes’ theorem [8, Theorem 2.9], we conclude that ∆u = ∇p for some scalar
|
618 |
+
function p. Thus u satisfies (4). Since u has the z-component zero, pz = 0, and hence p is
|
619 |
+
constant in z. Subtracting this constant, we can view p as being zero in the z-component and
|
620 |
+
in this sense independent of z. So we have proved that u is a solution of the two-dimensional
|
621 |
+
Stokes equations.
|
622 |
+
Using polar coordinates, we find
|
623 |
+
−uy = x sin θ
|
624 |
+
�f ′
|
625 |
+
r − f
|
626 |
+
r2
|
627 |
+
�
|
628 |
+
,
|
629 |
+
ux = f ′ sin2 θ + f cos2 θ
|
630 |
+
r
|
631 |
+
.
|
632 |
+
(20)
|
633 |
+
Impose constraints
|
634 |
+
f(1) = f ′(1) = 1,
|
635 |
+
f(b) = f ′(b) = 0.
|
636 |
+
(21)
|
637 |
+
The latter two constraints in (21) imply that u = curl ψ = 0 for r = b. The first two
|
638 |
+
constraints in (21) imply that
|
639 |
+
u(r = 1) = (1, 0).
|
640 |
+
Since we have identified four parameters and four constraints, we likely have found the
|
641 |
+
required solution. But to be sure, we need to solve these equations and see what happens
|
642 |
+
when b → ∞.
|
643 |
+
5.2.1
|
644 |
+
Algebraic solution of the PDE
|
645 |
+
Using the boundary conditions (21), we can evaluate the constants A, B, C, and D. We
|
646 |
+
have
|
647 |
+
B =
|
648 |
+
−2(b2 + 1)
|
649 |
+
2 + 2b2(log b − 1) + 2 log b =
|
650 |
+
−(1 + b−2)
|
651 |
+
log b − 1 + b−2(1 + log b) ≈ −1
|
652 |
+
log b
|
653 |
+
and
|
654 |
+
C =
|
655 |
+
1
|
656 |
+
2 + 2b2(log b − 1) + 2 log b ≈
|
657 |
+
1
|
658 |
+
2b2 log b,
|
659 |
+
together with
|
660 |
+
A = 1
|
661 |
+
2B + C
|
662 |
+
and
|
663 |
+
D = 1 − 1
|
664 |
+
2B − 2C.
|
665 |
+
Although its derivation is tedious and error-prone, such a result can be checked in various
|
666 |
+
ways. Thus as b → ∞,
|
667 |
+
B → 0, b2C → 0 =⇒ A → 0, D → 1.
|
668 |
+
Therefore ub → (1, 0) as b → ∞.
|
669 |
+
5.2.2
|
670 |
+
Asymptotic behavior
|
671 |
+
In particular, A, B, and b2C decay like 1/ log b. Using (20), we find
|
672 |
+
u(r, θ) = (f ′(r), 0) −
|
673 |
+
�
|
674 |
+
f ′(r) − r−1f(r)
|
675 |
+
�
|
676 |
+
(cos2 θ, cos θ sin θ).
|
677 |
+
Subtracting the expressions for f ′ and f/r, we find
|
678 |
+
��f ′(r) − r−1f(r)
|
679 |
+
�� =
|
680 |
+
����
|
681 |
+
−2A
|
682 |
+
r2
|
683 |
+
+ B + 2Cr2
|
684 |
+
���� ≤
|
685 |
+
c
|
686 |
+
log b.
|
687 |
+
12
|
688 |
+
|
689 |
+
Examining the expression for f ′, we see that it decays like 1/ log r. Thus we considered the
|
690 |
+
expression
|
691 |
+
χb(r) =
|
692 |
+
�
|
693 |
+
1 + 3 log r
|
694 |
+
2 log b
|
695 |
+
�
|
696 |
+
f ′(r).
|
697 |
+
(22)
|
698 |
+
A plot of χb for b = 10k for k = 2, 3, . . . , 8 is seen in Figure 5. From this figure, we see that
|
699 |
+
χb ≈ 1 for small r/b. Note that, by definition of χb,
|
700 |
+
ux ≈ f ′(r) =
|
701 |
+
�
|
702 |
+
1 + 3 log r
|
703 |
+
2 log b
|
704 |
+
�−1
|
705 |
+
χb(r).
|
706 |
+
(23)
|
707 |
+
Figure 5: Plot of χb defined in (22) for b = 10k for k = 2, 3, . . . , 8. The horizontal axis is r.
|
708 |
+
5.3
|
709 |
+
Friction boundary conditions
|
710 |
+
We performed a series of tests solving (4) in the domain (17) with Navier boundary condi-
|
711 |
+
tions (11) with β = 0, for various r.
|
712 |
+
Figure 4(b) gives the data for three values of d as a
|
713 |
+
function of box size r for Navier boundary conditions (11) with β = 0. These data suggest
|
714 |
+
that ur is converging to (1, 0) as r → ∞ with Navier boundary conditions.
|
715 |
+
6
|
716 |
+
Navier–Stokes: no paradox
|
717 |
+
According to [6, corollary to Theorem 7A], the nonlinear problem (1) has a solution with
|
718 |
+
g = 0 and u → u∞ with u∞ a constant, provided that |u∞| is sufficiently small; also see [7,
|
719 |
+
Theorem XII.5.1]. The realization that adding an advection term to the equations resolves
|
720 |
+
13
|
721 |
+
|
722 |
+
0.8
|
723 |
+
0.6
|
724 |
+
0.4
|
725 |
+
0.2
|
726 |
+
0
|
727 |
+
-0.2
|
728 |
+
-0.4
|
729 |
+
100
|
730 |
+
10
|
731 |
+
102
|
732 |
+
103
|
733 |
+
10°
|
734 |
+
105
|
735 |
+
106
|
736 |
+
10°
|
737 |
+
108the Stokes paradox began with the work of Oseen [19]. See [6] for more historical references.
|
738 |
+
The results of Finn [6] confirm that, for the Navier–Stokes equations, one can pose boundary
|
739 |
+
conditions both on the cylinder (or other bluff body) and at infinity.
|
740 |
+
The constant function g is also a solution of (1) (with constant pressure) for any R > 0.
|
741 |
+
But the boundary conditions are different in this case. We can sum up the Stokes paradox
|
742 |
+
by saying that a boundary condition is lost when we set the Reynolds number R to zero.
|
743 |
+
Thus fluid flow can be described accurately in unbounded domains only by a nonlinear
|
744 |
+
system.
|
745 |
+
For the cylinder problem, the diameter L gives us a length scale. Once we pick the flow
|
746 |
+
u∞ (or g), we have a speed U, and together with the kinematic viscosity ν, this determines
|
747 |
+
a Reynolds number R > 0 given by (3). The only way R can be zero is to have u∞ = g = 0
|
748 |
+
(or infinite viscosity, which does not sound like a fluid). Thus the Stokes equations can be
|
749 |
+
viewed as an approximation for small Reynolds numbers, and this approximation works well
|
750 |
+
for bounded domains. But it fails for infinite domains.
|
751 |
+
The existence of solutions of the Navier–Stokes system for large external flows, or equiv-
|
752 |
+
alently for large Reynolds numbers, is reviewed by Galdi in [7, section XII.6]. However, the
|
753 |
+
results there are not definitive; they present a condition that must hold if no such solutions
|
754 |
+
exist.
|
755 |
+
7
|
756 |
+
Extensions of the Stokes paradox
|
757 |
+
The Stokes paradox has implications for other flow problems. Here we mention two of them.
|
758 |
+
7.1
|
759 |
+
Flow instability
|
760 |
+
Determining the form of Reynolds–Orr instability modes for Navier–Stokes flow around a
|
761 |
+
cylinder requires solution of a generalized eigenproblem of the form [11]
|
762 |
+
−∆u + ∇p = λ−1BRu in Ω,
|
763 |
+
∇· u = 0 in Ω,
|
764 |
+
(24)
|
765 |
+
with homogeneous boundary conditions on Γ = ∂Ω. Here the multiplication operator BR is
|
766 |
+
defined by
|
767 |
+
BR(x) = 1
|
768 |
+
2
|
769 |
+
�
|
770 |
+
∇uR(x) + ∇ut
|
771 |
+
R(x)
|
772 |
+
�
|
773 |
+
,
|
774 |
+
where uR solves (1). Restricted to a bounded domain, this constitutes a symmetric gener-
|
775 |
+
alized eigenproblem, and thus it has real eigenvalues [25].
|
776 |
+
On an unbounded domain, we expect that some rate of decay for B would be required
|
777 |
+
in order that the eigenproblem is well behaved. Define
|
778 |
+
V =
|
779 |
+
�
|
780 |
+
v ∈ H1
|
781 |
+
w(Ω) : v = 0 on Γ
|
782 |
+
�
|
783 |
+
,
|
784 |
+
and we endow V with the norm of H1
|
785 |
+
w(Ω).
|
786 |
+
Lemma 7.1 Suppose that there is a positive constant CB such that
|
787 |
+
|B(x)| ≤ CB
|
788 |
+
�
|
789 |
+
1 + |x|−2 log2 |x|
|
790 |
+
�
|
791 |
+
∀x ∈ Ω.
|
792 |
+
(25)
|
793 |
+
Then the multiplication operator associated with B is a bounded operator from V to V ′.
|
794 |
+
14
|
795 |
+
|
796 |
+
In the statement of the lemma, |B(x)| denotes the Frobenius norm of B(x). To prove
|
797 |
+
the lemma, recall from [9, page 315] that
|
798 |
+
∥u∥V ′ =
|
799 |
+
sup
|
800 |
+
0̸=v∈V
|
801 |
+
�
|
802 |
+
Ω u(x) · v(x) dx
|
803 |
+
∥v∥H1w(Ω)
|
804 |
+
.
|
805 |
+
(26)
|
806 |
+
But H¨older’s inequality and (25) imply
|
807 |
+
���
|
808 |
+
�
|
809 |
+
Ω
|
810 |
+
B(x)u(x) · v(x) dx
|
811 |
+
���
|
812 |
+
2
|
813 |
+
≤
|
814 |
+
�
|
815 |
+
Ω
|
816 |
+
|B(x)| |u(x)|2 dx
|
817 |
+
�
|
818 |
+
Ω
|
819 |
+
|B(x)| |v(x)|2 dx
|
820 |
+
≤ C2
|
821 |
+
B∥u∥2
|
822 |
+
H1w(Ω)∥v∥2
|
823 |
+
H1w(Ω).
|
824 |
+
(27)
|
825 |
+
Thus we conclude that
|
826 |
+
∥Bu∥V ′ ≤ CB∥u∥H1w(Ω).
|
827 |
+
This completes the proof of Lemma 7.1.
|
828 |
+
Consider the operator K defined by Kv = u where u ∈ V solves
|
829 |
+
−∆u + ∇p = Bv in Ω,
|
830 |
+
∇· u = 0 in Ω.
|
831 |
+
(28)
|
832 |
+
Note that the eigenproblem for K, that is Ku = λu, provides a resolution of (24). The
|
833 |
+
following is a corollary of Lemma 7.1.
|
834 |
+
Theorem 7.1 Suppose that (25) holds. Then K is a bounded operator from V to V .
|
835 |
+
The proof of Theorem 7.1 follows from [9, Theorem 3.4] and Lemma 7.1.
|
836 |
+
From [7, Remark XII.8.3] we expect that
|
837 |
+
|∇uR(x)| = O
|
838 |
+
�
|
839 |
+
|x|−1 log2 |x|
|
840 |
+
�
|
841 |
+
for large |x|.
|
842 |
+
Thus (25) does not hold for BR, and the associated multiplication operator is not a bounded
|
843 |
+
operator on H1
|
844 |
+
w(Ω). Indeed it was found in [11] that the eigenvalues increase as the compu-
|
845 |
+
tational domain size is increased. We can summarize these observations as follows. Despite
|
846 |
+
the fact that the Navier–Stokes equations are well defined on unbounded domains, the
|
847 |
+
equations for their instabilities are not. We are tempted to call this the instability paradox.
|
848 |
+
7.2
|
849 |
+
Power-law fluids
|
850 |
+
Tanner [28] has shown that shear thinning power-law fluids do not suffer Stokes’ paradox,
|
851 |
+
but that shear thickening power-law fluids do. The Stokes power law model is given by [16,
|
852 |
+
(1.5)]
|
853 |
+
−ν∇·
|
854 |
+
�
|
855 |
+
|Du|r−2Du
|
856 |
+
�
|
857 |
+
+ ∇p = f
|
858 |
+
in Ω,
|
859 |
+
∇· u = 0
|
860 |
+
in Ω,
|
861 |
+
(29)
|
862 |
+
where Du = 1
|
863 |
+
2
|
864 |
+
�
|
865 |
+
∇u + ∇ut�
|
866 |
+
. The fluid model is shear thinning if r < 2 and shear thickening
|
867 |
+
if r > 2. The case r = 2 is the standard Stokes model.
|
868 |
+
Tanner showed that for flow around a cylinder, the Stokes paradox holds for r > 2, but
|
869 |
+
not for r < 2. The approach [9] can possibly extend this result to more general domains.
|
870 |
+
Due to the length of the current paper, we postpone such an investigation to a subsequent
|
871 |
+
study.
|
872 |
+
15
|
873 |
+
|
874 |
+
8
|
875 |
+
Numerical implementation
|
876 |
+
The curved boundary of the cylinder was approximated by polygons Ωh, where the edge
|
877 |
+
lengths of ∂Ωh are of order h in size. Then conventional finite elements can be employed,
|
878 |
+
with the various boundary expressions being approximated by appropriate quantities. For
|
879 |
+
the computations described in section 5.1, we used the Robin-type technique [22] together
|
880 |
+
with the Scott–Vogelius elements of degree 4. The order of approximation for the numerical
|
881 |
+
method is h7/2 in the gradient norm.
|
882 |
+
The remaining results were computed using the lowest-order Taylor–Hood approxi-
|
883 |
+
mation.
|
884 |
+
To implement the Navier-slip boundary condition, we used Nitsche’s method
|
885 |
+
[12, 24, 31] to enforce slip conditions in the limit of small mesh size. The details regarding
|
886 |
+
numerical implementation of (1) together with boundary conditions (2) and (11), are given
|
887 |
+
in [12]. The boundary integrals are approximated to order h2, but the order of approxima-
|
888 |
+
tion for the numerical method is only of order h3/2 in the gradient norm.
|
889 |
+
9
|
890 |
+
Conclusions
|
891 |
+
We have shown that examining the Stokes paradox from different angles enriches the un-
|
892 |
+
derstanding of the phenomenon. The approaches dovetail together in the final analysis, but
|
893 |
+
they allow answers to different questions related to the paradox. Perhaps the most critical
|
894 |
+
question relates to what goes wrong when we pose the Stokes problem on larger and larger
|
895 |
+
domains. We explored two different ways to consider this question, via numerical simulation
|
896 |
+
for general domains and analytical solutions on specific domains. Fortunately, they give the
|
897 |
+
same advice as to what happens in the limit, and this agrees with the functional analysis
|
898 |
+
formulation of the problem on an infinite domain. We showed that the Stokes paradox can
|
899 |
+
arise in other flow problems as well.
|
900 |
+
10
|
901 |
+
Acknowledgments
|
902 |
+
We thank Vivette Girault for valuable information and advice.
|
903 |
+
References
|
904 |
+
[1] F. Alliot and C. Amrouche. Weak solutions for the exterior Stokes problem in weighted
|
905 |
+
Sobolev spaces. Mathematical Methods in the Applied Sciences, 23(6):575–600, 2000.
|
906 |
+
[2] Martin Alnæs, Jan Blechta, Johan Hake, August Johansson, Benjamin Kehlet, Anders
|
907 |
+
Logg, Chris Richardson, Johannes Ring, Marie E. Rognes, and Garth N. Wells. The
|
908 |
+
FEniCS project version 1.5. Archive of Numerical Software, 3(100), 2015.
|
909 |
+
[3] Charles J. Amick. On Leray’s problem of steady Navier-Stokes flow past a body in the
|
910 |
+
plane. Acta Mathematica, 161:71–130, 1988.
|
911 |
+
[4] an anonymous referee, 2022.
|
912 |
+
[5] Anis Dhifaoui, Mohamed Meslameni, and Ulrich Razafison. Weighted Hilbert spaces for
|
913 |
+
the stationary exterior Stokes problem with Navier slip boundary conditions. Journal
|
914 |
+
of Mathematical Analysis and Applications, 472(2):1846–1871, 2019.
|
915 |
+
16
|
916 |
+
|
917 |
+
[6] Robert Finn. Mathematical questions relating to viscous fluid flow in an exterior do-
|
918 |
+
main. The Rocky Mountain Journal of Mathematics, 3(1):107–140, 1973.
|
919 |
+
[7] Giovanni Galdi. An introduction to the mathematical theory of the Navier-Stokes equa-
|
920 |
+
tions: Steady-state problems. Springer Science & Business Media, 2011.
|
921 |
+
[8] Vivette Girault and Pierre-Arnaud Raviart. Finite element methods for Navier-Stokes
|
922 |
+
equations: theory and algorithms, volume 5. Springer Science & Business Media, 1986.
|
923 |
+
[9] Vivette Girault and Ad´elia Sequeira.
|
924 |
+
A well-posed problem for the exterior Stokes
|
925 |
+
equations in two and three dimensions. Archive for Rational Mechanics and Analysis,
|
926 |
+
114(4):313–333, 1991.
|
927 |
+
[10] Ingeborg G. Gjerde and L. Ridgway Scott. Resolution of d’alembert’s paradox using
|
928 |
+
slip boundary conditions: The effect of the friction parameter on the drag coefficient.
|
929 |
+
arXiv e-prints, page arXiv:2204.12240, April 2022.
|
930 |
+
[11] Ingeborg G. Gjerde and L. Ridgway Scott. Kinetic-energy instability of flows with slip
|
931 |
+
boundary conditions. Journal of Mathematical Fluid Dynamics, 24(4):1–27, 2022.
|
932 |
+
[12] Ingeborg G. Gjerde and L. Ridgway Scott. Nitsche’s method for Navier-Stokes equations
|
933 |
+
with slip boundary conditions. Mathematics of Computation, 91(334):597–622, 2022.
|
934 |
+
[13] Fr´ed´eric Hecht. New development in freefem++. Journal of numerical mathematics,
|
935 |
+
20(3-4):251–266, 2012.
|
936 |
+
[14] Saul Kaplun and P. A. Lagerstrom. Asymptotic expansions of Navier-Stokes solutions
|
937 |
+
for small Reynolds numbers. Journal of Mathematics and Mechanics, pages 585–593,
|
938 |
+
1957.
|
939 |
+
[15] L. D. Landau and E. M. Lifshitz. Fluid Mechanics. Oxford: Pergammon Press, second
|
940 |
+
edition, 1987.
|
941 |
+
[16] Lew Lefton and Dongming Wei. A penalty method for approximations of the stationary
|
942 |
+
power-law Stokes problem. Electronic Journal of Differential Equations, (7):1–12, 2001.
|
943 |
+
[17] Andrew Lucas. Stokes paradox in electronic Fermi liquids. Phys. Rev. B, 95:115425,
|
944 |
+
Mar 2017.
|
945 |
+
[18] Chiara Neto, Drew R. Evans, Elmar Bonaccurso, Hans-J¨urgen Butt, and Vincent S. J.
|
946 |
+
Craig. Boundary slip in Newtonian liquids: a review of experimental studies. Reports
|
947 |
+
on Progress in Physics, 68(12):2859, 2005.
|
948 |
+
[19] Carl Wilhelm Oseen. Neuere Methoden und Ergebnisse in der Hydrodynamik. Leipzig:
|
949 |
+
Akademische Verlagsgesellschaft mb H., 1927.
|
950 |
+
[20] Ian Proudman and J. R. A. Pearson. Expansions at small Reynolds numbers for the
|
951 |
+
flow past a sphere and a circular cylinder. Journal of Fluid Mechanics, 2(3):237–262,
|
952 |
+
1957.
|
953 |
+
[21] L. Ridgway Scott. Introduction to Automated Modeling with FEniCS. Computational
|
954 |
+
Modeling Initiative, 2018.
|
955 |
+
17
|
956 |
+
|
957 |
+
[22] L. Ridgway Scott. High-order Navier–Stokes approximation on polygonally approx-
|
958 |
+
imated curved boundaries. Research Report UC/CS TR-2022-??, Dept. Comp. Sci.,
|
959 |
+
Univ. Chicago, 2022.
|
960 |
+
[23] William T. Shaw.
|
961 |
+
A simple resolution of Stokes’ paradox?
|
962 |
+
arXiv preprint
|
963 |
+
arXiv:0901.3621, 2009.
|
964 |
+
[24] Rolf Stenberg. On some techniques for approximating boundary conditions in the finite
|
965 |
+
element method. Journal of Computational and Applied Mathematics, 63(1-3):139–148,
|
966 |
+
1995.
|
967 |
+
[25] Gilbert W. Stewart. Matrix Algorithms. Volume II: Eigensystems. SIAM, 2001.
|
968 |
+
[26] Keith Stewartson. D’Alembert’s paradox. SIAM Review, 23(3):308–343, 1981.
|
969 |
+
[27] George Gabriel Stokes. On the effect of the internal friction of fluids on the motion of
|
970 |
+
pendulums. Trans. Camb. Phil. Soc., 9, Part II:8–106, 1851.
|
971 |
+
[28] Roger I. Tanner. Stokes paradox for power-law flow around a cylinder. Journal of
|
972 |
+
non-Newtonian Fluid Mechanics, 50(2-3):217–224, 1993.
|
973 |
+
[29] Roger Temam. Navier–Stokes equations: theory and numerical analysis. North-Holland,
|
974 |
+
third edition, 1984.
|
975 |
+
[30] Milton Van Dyke. Perturbation methods in fluid mechanics, annotated edition. The
|
976 |
+
Parabolic Press, Stanford, 1975.
|
977 |
+
[31] M. Winter, B. Schott, Andre Massing, and W. A. Wall. A Nitsche cut finite element
|
978 |
+
method for the Oseen problem with general Navier boundary conditions. Computer
|
979 |
+
Methods in Applied Mechanics and Engineering, 330:220–252, 2018.
|
980 |
+
18
|
981 |
+
|
4tAyT4oBgHgl3EQfQPYV/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
59E0T4oBgHgl3EQfewCK/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ee88038f73ff7f9cc908ea4f8fc3e95eb8bdec8ba8fe0bc62a6975861eb6666a
|
3 |
+
size 7798829
|
5tFJT4oBgHgl3EQfkyzq/content/tmp_files/2301.11581v1.pdf.txt
ADDED
@@ -0,0 +1,1187 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
A Green(er) World for A.I.
|
2 |
+
Dan Zhao∗, Nathan C. Frey∗, Joseph McDonald∗, Matthew Hubbell∗,
|
3 |
+
David Bestor∗, Michael Jones∗, Andrew Prout∗, Vijay Gadepally∗, Siddharth Samsi∗§
|
4 |
+
∗ MIT Lincoln Laboratory
|
5 |
+
©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including
|
6 |
+
reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or
|
7 |
+
reuse of any copyrighted component of this work in other works. DOI: 10.1109/IPDPSW55747.2022.00126
|
8 |
+
Abstract—As research and practice in artificial intelligence
|
9 |
+
(A.I.) grow in leaps and bounds, the resources necessary to
|
10 |
+
sustain and support their operations also grow at an increasing
|
11 |
+
pace. While innovations and applications from A.I. have brought
|
12 |
+
significant advances, from applications to vision and natural
|
13 |
+
language to improvements to fields like medical imaging and
|
14 |
+
materials engineering, their costs should not be neglected. As we
|
15 |
+
embrace a world with ever-increasing amounts of data as well as
|
16 |
+
research & development of A.I. applications, we are sure to face
|
17 |
+
an ever-mounting energy footprint to sustain these computational
|
18 |
+
budgets, data storage needs, and more. But, is this sustainable
|
19 |
+
and, more importantly, what kind of setting is best positioned
|
20 |
+
to nurture such sustainable A.I. in both research and practice?
|
21 |
+
In this paper, we outline our outlook for Green A.I.—a more
|
22 |
+
sustainable, energy-efficient and energy-aware ecosystem for
|
23 |
+
developing A.I. across the research, computing, and practitioner
|
24 |
+
communities alike—and the steps required to arrive there. We
|
25 |
+
present a bird’s eye view of various areas for potential changes
|
26 |
+
and improvements from the ground floor of AI’s operational
|
27 |
+
and hardware optimizations for datacenter/HPCs to the current
|
28 |
+
incentive structures in the world of A.I. research and practice,
|
29 |
+
and more. We hope these points will spur further discussion, and
|
30 |
+
action, on some of these issues and their potential solutions.
|
31 |
+
Index Terms—Green AI, sustainable AI, energy efficiency
|
32 |
+
I. INTRODUCTION
|
33 |
+
Issues of environmental sustainability and energy efficiency
|
34 |
+
have come to center stage as global warming, climate con-
|
35 |
+
cerns, and their consequences have permeated many aspects
|
36 |
+
of our economy and society. In finance, sustainable investing
|
37 |
+
has come to the fore where, in addition to traditional metrics
|
38 |
+
of assessing risk, themes of environmental, social, and gov-
|
39 |
+
ernance (ESG) have become important in evaluating financial
|
40 |
+
and purpose-driven outcomes. Throughout the private sector,
|
41 |
+
many companies have begun to re-examine and prioritize green
|
42 |
+
power usage and resource development [1] while governments
|
43 |
+
have begun to invest heavily in clean energy and climate
|
44 |
+
resilient infrastructure [2]—the list goes on.
|
45 |
+
While traditional sources of carbon emissions from agricul-
|
46 |
+
ture and transportation continue to contribute the lion’s share
|
47 |
+
of greenhouse gas emissions in the U.S., electricity usage
|
48 |
+
This material is based upon work supported by the Assistant Secretary of
|
49 |
+
Defense for Research and Engineering under Air Force Contract No. FA8702-
|
50 |
+
15-D-0001, and United States Air Force Research Laboratory Cooperative
|
51 |
+
Agreement Number FA8750-19-2-1000. Any opinions, findings, conclusions
|
52 |
+
or recommendations expressed in this material are those of the author(s) and
|
53 |
+
do not necessarily reflect the views of the Assistant Secretary of Defense
|
54 |
+
for Research and Engineering, or the United States Air Force. The U.S.
|
55 |
+
Government is authorized to reproduce and distribute reprints for Government
|
56 |
+
purposes notwithstanding any copyright notation herein.
|
57 |
+
§Corresponding author. Email : [email protected]
|
58 |
+
from the operation of supercomputing and data centers are
|
59 |
+
climbing with historical signs of compute costs and demand
|
60 |
+
accelerating further in the years ahead [3]. Estimates place
|
61 |
+
datacenters’ electricity consumption at 1% of global electricity
|
62 |
+
demand [4] with projections of electricity usage reaching 8%-
|
63 |
+
21% of global demand by 2030 [5], though extrapolation of
|
64 |
+
demand trends can be unreliable due to not accounting for new
|
65 |
+
improvements in energy efficiency [6]. However, even beyond
|
66 |
+
the energy footprint from electricity consumption, these data-
|
67 |
+
centers can take up significant amounts of water, either directly
|
68 |
+
for cooling or indirectly for electricity generation, bearing a
|
69 |
+
larger than expected environmental footprint—in the U.S., it is
|
70 |
+
estimated that 20% of datacenter servers’ direct water footprint
|
71 |
+
is sourced from moderately to highly stressed watersheds
|
72 |
+
and 50% of servers are at least partially supplied by power
|
73 |
+
plants in water stressed areas [7]. In addition to the energy
|
74 |
+
footprint datacenter/HPC operations, embodied carbon costs
|
75 |
+
[8] such as those associated with manufacturing hardware for
|
76 |
+
A.I. development and applications also matter, especially as
|
77 |
+
hardware continues to advance. As such, the environmental
|
78 |
+
footprint of A.I. may go beyond the costs represented by
|
79 |
+
carbon emissions of datacenters/HPCs alone.
|
80 |
+
Fig. 1: Modern AI’s Computational Demands. Note the steep
|
81 |
+
increase in just the past decade relative to the past 50 years. Source:
|
82 |
+
OpenAI & The Economist.
|
83 |
+
As industry adoption and incorporation of algorithms into
|
84 |
+
products and services become more commonplace, we have
|
85 |
+
seen significant growth in both the amounts of training data
|
86 |
+
and the size of the model itself [8] as the main means to
|
87 |
+
realize performance gains. Simultaneously, fundamental A.I.
|
88 |
+
research has continued to accomplish increasingly complex
|
89 |
+
tasks with increasingly complex models and large datasets.
|
90 |
+
These factors have, in turn, inevitably pushed similar growth
|
91 |
+
trends in infrastructure investments required to keep pace with
|
92 |
+
the increased amounts of training, inference, storage, and more
|
93 |
+
arXiv:2301.11581v1 [cs.AI] 27 Jan 2023
|
94 |
+
|
95 |
+
Deep and steep
|
96 |
+
Computing power used in training Al systems
|
97 |
+
Days spent calculating at one petaflop per second*, log scale
|
98 |
+
100
|
99 |
+
3.4-month
|
100 |
+
By fundamentals
|
101 |
+
AlphaGoZerobecomes itsown
|
102 |
+
doubling
|
103 |
+
10
|
104 |
+
teacher of the game Go
|
105 |
+
O Language
|
106 |
+
○ Speech
|
107 |
+
O Vision
|
108 |
+
6
|
109 |
+
1
|
110 |
+
OGames
|
111 |
+
0 Other
|
112 |
+
AlexNet, image classification with
|
113 |
+
0.1
|
114 |
+
deep convolutional neural networks
|
115 |
+
0.01
|
116 |
+
0.001
|
117 |
+
0.0001
|
118 |
+
Two-year doubling
|
119 |
+
0.00001
|
120 |
+
(Moore's Law)
|
121 |
+
←First era→
|
122 |
+
→ Modern era
|
123 |
+
0.000001
|
124 |
+
Perceptron, a simple artificial neural network
|
125 |
+
0.0000001
|
126 |
+
1960
|
127 |
+
70
|
128 |
+
80
|
129 |
+
90
|
130 |
+
2000
|
131 |
+
10
|
132 |
+
20
|
133 |
+
Source:OpenAl
|
134 |
+
*1petaflop=1015calculations(see Fig. 1). Coupled with the anticipated increase in internet
|
135 |
+
traffic, consumer devices, and demand for the very products
|
136 |
+
and services some of these algorithms support [5], these
|
137 |
+
worrying trends in energy demand and its associated energy
|
138 |
+
footprint are likely to only accelerate. Even so, in the arms-
|
139 |
+
race for A.I. superiority and operationalization, companies
|
140 |
+
and institutions involved in A.I. research and its applications
|
141 |
+
have continually expanded their datacenters and operations.
|
142 |
+
Google’s datacenter facilities span several countries while
|
143 |
+
Meta has recently announced the construction of a new A.I.
|
144 |
+
Research SuperCluster (RSC) claimed to be among the fastest
|
145 |
+
and largest supercomputing centers upon completion [9]. In
|
146 |
+
this race to construct an ever-increasing number (and size) of
|
147 |
+
datacenters, supercomputing clusters, and supporting facilities,
|
148 |
+
there are few signs that this race will slow down. Instead, com-
|
149 |
+
panies are accepting this as an inevitability and are looking for
|
150 |
+
ways to help offset their ever-increasing energy footprint, such
|
151 |
+
as building their own additional energy production facilities to
|
152 |
+
fuel their operations [10] [11].
|
153 |
+
Energy-efficient data infrastructure and green computing
|
154 |
+
are hardly new concepts and have seen continued work
|
155 |
+
and advances. From the development of efficient chips like
|
156 |
+
Google’s TPUs [12] and other computing efficiency gains
|
157 |
+
to the application of A.I. algorithms themselves to automate
|
158 |
+
datacenter operations, there is a long list of existing prac-
|
159 |
+
tices and current works-in-progress to address the energy-
|
160 |
+
hungry and data-intensive appetite necessary to sustain these
|
161 |
+
algorithms. Though these advances in efficiency have kept
|
162 |
+
pace with the increased computation/energy needs and offset
|
163 |
+
demand thus far, there may be signs that this is unlikely
|
164 |
+
to last [13]. There also exists some debate on the true
|
165 |
+
extent to which issues on A.I.’s sustainability and energy
|
166 |
+
footprint are accurately described, largely driven by notable
|
167 |
+
successes in realizing energy and computational efficiency
|
168 |
+
in model training, datacenter/HPC operation, and hardware.
|
169 |
+
However, changes in climate resulting in rising temperatures
|
170 |
+
and more extreme weather patterns are likely to stress cooling
|
171 |
+
and already strained resources in many areas. While larger,
|
172 |
+
well-equipped technology companies have the resources and
|
173 |
+
incentives to act, develop, and adopt efficiently, there are still
|
174 |
+
clear, unaddressed concerns if all A.I. workflows move to
|
175 |
+
the same hardware and software stack despite the efficiency
|
176 |
+
benefits from centralization. As we run up against the limits
|
177 |
+
of remaining efficiency gains, other ideas and implementations
|
178 |
+
are needed, either as an anticipatory or preventative measure,
|
179 |
+
in order to proactively develop strategies that bring the dis-
|
180 |
+
course to these problems and their potential solutions.
|
181 |
+
In the following sections, we discuss the prospects of
|
182 |
+
encouraging energy efficiency across various levels of the
|
183 |
+
research & development spectra of A.I. and its applications:
|
184 |
+
(1) the infrastructure and resource utilization level, (2) the
|
185 |
+
individual user and behavioral level, and (3) the group and
|
186 |
+
community of A.I. researchers and practitioners at large. These
|
187 |
+
three aspects cover issues from a micro-to-macro perspective
|
188 |
+
but also emphasize a key point—no single change on any
|
189 |
+
one level is likely to be as effective without corresponding
|
190 |
+
changes on the other levels since these three aspects are part
|
191 |
+
of a single whole. A concerted, unified effort is required in
|
192 |
+
order to transition effectively to a greener ecosystem for A.I.
|
193 |
+
research and practice. To make our analyses more concrete in
|
194 |
+
our discussions, we leverage data from the MIT SuperCloud
|
195 |
+
[14], an operational peta-scale HPC system that is actively
|
196 |
+
used for research, experimentation, and collaborations by the
|
197 |
+
MIT research community in several disciplines across machine
|
198 |
+
learning, deep learning, and more.
|
199 |
+
II. ENERGY & BEHAVIORAL CONSIDERATIONS
|
200 |
+
In this section, we discuss potential improvements towards
|
201 |
+
a more energy-aware compute and cluster optimization frame-
|
202 |
+
work. While we discuss traditional aspects of datacenter/HPC
|
203 |
+
management in reducing energy expenditure (e.g. hardware,
|
204 |
+
system-level), we also focus on non-traditional possibilities.
|
205 |
+
We touch upon issues such as the economic considerations
|
206 |
+
of energy consumption like the opportunity costs of energy
|
207 |
+
purchases, the role/effect of user behavior in designing mecha-
|
208 |
+
nisms to encourage energy-efficient behavior, changes in exist-
|
209 |
+
ing behaviors (e.g. from either the user side or datacenter/HPC
|
210 |
+
management side), and combining—but balancing—existing
|
211 |
+
energy saving mechanisms on the hardware/systems side with
|
212 |
+
ones accounting for user behavior and incentives.
|
213 |
+
When it comes to energy efficiency, a simplified optimiza-
|
214 |
+
tion framework is useful in understanding the objectives, the
|
215 |
+
available choices/mechanisms are at our disposal to affect
|
216 |
+
change, their dependence on one another, trade-offs, and more.
|
217 |
+
This way, we can simplify the overall optimization problem
|
218 |
+
that operational datacenters/HPCs face:
|
219 |
+
min
|
220 |
+
qs,p,c E(qd, qs, p, c, ε) s.t. A(qd, qs, p, c, ε) ≥ α
|
221 |
+
(1)
|
222 |
+
where total energy expenditure E(·) and activity level A(·) of
|
223 |
+
the datacenter/HPC can be affected by various factors: exam-
|
224 |
+
ples include the “quantity” of compute resources demanded
|
225 |
+
or currently utilized by users (qd) as well as their usage
|
226 |
+
behaviors including but not limited to efficient/inefficient
|
227 |
+
practices, the “quantity” of compute resources supplied or
|
228 |
+
available to users (qs) and associated resource settings, the
|
229 |
+
job scheduling system or resource allocation rule in place (p),
|
230 |
+
control mechanisms (c) such as hardware settings (e.g. power
|
231 |
+
caps, clock rate settings) or other physical interventions (e.g.
|
232 |
+
rack placements, cooling setups) and “softer” mechanisms
|
233 |
+
(e.g. algorithmic, instrumentation) that may be in place, and
|
234 |
+
ε which accounts for other factors such as temperature (e.g.,
|
235 |
+
ambient, distributions across racks, local climate) and others
|
236 |
+
(e.g. a datacenter’s fuel mix and energy purchasing patterns,
|
237 |
+
maintenance schedules, electricity prices and energy mix).
|
238 |
+
In other words, the goal is to minimize the energy ex-
|
239 |
+
penditure E(·) of the datacenter subject to a constraint: the
|
240 |
+
activity or performance level A(·) of the supercluster must be
|
241 |
+
above some minimum, acceptable threshold α. This constraint
|
242 |
+
expresses a fundamental trade-off at the heart of energy-
|
243 |
+
efficiency: reductions in energy consumption or expenditure
|
244 |
+
need to be weighed against trade-offs in performance (i.e. jobs
|
245 |
+
|
246 |
+
still need to be done at a reasonable pace). If the performance
|
247 |
+
level constraint α is not satisfied, attempts to reduce energy
|
248 |
+
expenditure may produce perverse, unintended effects; for
|
249 |
+
instance, if a change to reduce energy consumption results
|
250 |
+
in noticeable performance degradation, then users may run
|
251 |
+
more jobs for longer, producing the opposite effect. Although
|
252 |
+
one possibility is that higher throughput jobs can reduce total
|
253 |
+
energy consumption by driving up power consumption but
|
254 |
+
finishing in shorter periods as a result, we assume here that α
|
255 |
+
corresponds to a bare minimum performance level—beneath
|
256 |
+
which even these high throughput jobs contribute little to
|
257 |
+
the overall energy footprint compared to the other kinds of
|
258 |
+
workloads/operations present.
|
259 |
+
Traditionally, resource management in datacenters/HPCs
|
260 |
+
tends to take an approach closely aligned with the problem
|
261 |
+
as outlined (Eq. 1), minimizing energy expenditure primarily
|
262 |
+
through three main ways: adjusting the available “supply” or
|
263 |
+
amount of resources qs (e.g. number/types of GPUs), adjusting
|
264 |
+
resource allocation rules and schedulers p, and usage of control
|
265 |
+
mechanisms c (e.g. hardware settings). These mechanisms can
|
266 |
+
be quite effective, cheap, and can easily produce intended
|
267 |
+
results as they do not necessarily require coordination or know-
|
268 |
+
how from users. While much work has focused on optimiz-
|
269 |
+
ing energy efficiency through these traditional mechanisms—
|
270 |
+
affecting available compute resources, resource allocation and
|
271 |
+
queuing/scheduling rules, or hardware/software and physical
|
272 |
+
configurations [15] [16]—new sources of efficiency will likely
|
273 |
+
need to be claimed from ε as we hit diminishing returns and,
|
274 |
+
eventually, limits from traditional measures. As easy sources
|
275 |
+
of efficiency are exhausted, these limits will require looking
|
276 |
+
beyond more traditional levers (i.e., p, qs, c) and towards less-
|
277 |
+
traditional ones (i.e., qd, ε).
|
278 |
+
A. Energy, Power, & Opportunity Costs
|
279 |
+
When considering the energy expenditure or carbon foot-
|
280 |
+
print of HPCs/datacenters, what quantity should we focus on?
|
281 |
+
As framed in Eq. 1, the main objective E(·) can represent
|
282 |
+
any number of quantities correlated with energy expenditure:
|
283 |
+
kilowatt-hours, power usage effectiveness (PUE), pounds of
|
284 |
+
CO2 emitted, amount of water used in cooling, etc. Besides
|
285 |
+
these quantities, E(·) can also account for aspects like the fis-
|
286 |
+
cal costs of the datacenter’s energy bill or even the opportunity
|
287 |
+
costs of its choices, arising from the timing, the amounts, or
|
288 |
+
the fuel composition of its energy demand and usage as well as
|
289 |
+
how they affect the datacenter’s environmental footprint. The
|
290 |
+
economic costs of a choice accounts not only for its direct
|
291 |
+
fiscal or monetary costs, but also its opportunity costs—the
|
292 |
+
cost of the best alternatives foregone. In this subsection, we
|
293 |
+
discuss these opportunity costs and strategies to reduce these
|
294 |
+
costs by changing energy purchasing behaviors like the timing
|
295 |
+
of energy purchases and other usage patterns.
|
296 |
+
For instance, consider the usage patterns of the MIT Su-
|
297 |
+
perCloud system [14] within a given year. Naturally, the
|
298 |
+
demand and usage of the system’s overall resources will vary
|
299 |
+
throughout a year, exhibiting regular patterns on different time
|
300 |
+
scales within the year. Just as demand and load vary, power
|
301 |
+
2
|
302 |
+
4
|
303 |
+
6
|
304 |
+
8
|
305 |
+
10
|
306 |
+
12
|
307 |
+
Month
|
308 |
+
200
|
309 |
+
250
|
310 |
+
300
|
311 |
+
350
|
312 |
+
400
|
313 |
+
450
|
314 |
+
Avg. Power (kW)
|
315 |
+
Power Consumption vs. Sustainable Fuel Generation
|
316 |
+
5
|
317 |
+
6
|
318 |
+
7
|
319 |
+
8
|
320 |
+
% Total from Solar/Wind
|
321 |
+
Fig. 2: Power Consumption vs. Green Fuel Mix. Average monthly
|
322 |
+
power consumption of MIT’s E1 hypercluster plotted against monthly
|
323 |
+
average percentage of supplied total energy derived from solar
|
324 |
+
and wind (2020-21). There are potential opportunities—high power
|
325 |
+
consumption when green energy production is low and vice versa
|
326 |
+
instead of the opposite.
|
327 |
+
2
|
328 |
+
4
|
329 |
+
6
|
330 |
+
8
|
331 |
+
10
|
332 |
+
12
|
333 |
+
Month
|
334 |
+
20
|
335 |
+
25
|
336 |
+
30
|
337 |
+
35
|
338 |
+
40
|
339 |
+
45
|
340 |
+
50
|
341 |
+
Real Time Avg Price ($/MWh)
|
342 |
+
Energy Prices vs. Sustainable Fuel Generation
|
343 |
+
5
|
344 |
+
6
|
345 |
+
7
|
346 |
+
8
|
347 |
+
% Total from Solar/Wind
|
348 |
+
Fig. 3: Energy Prices vs. Green Fuel Mix. Average monthly
|
349 |
+
energy prices plotted against monthly average percentage of supplied
|
350 |
+
total energy derived from solar and wind (2020-21). Prices are
|
351 |
+
monthly locational marginal prices (LMP) from south eastern/central
|
352 |
+
MA. Note that energy prices tend to be lower when percentage of
|
353 |
+
sustainable energy is higher.
|
354 |
+
consumption will also vary—more users and jobs generally
|
355 |
+
translate into more computation and increased cooling costs,
|
356 |
+
increasing power draw from existing resources. Beyond the
|
357 |
+
dollars-and-cents of the HPC’s electricity bills, the make-up
|
358 |
+
or composition of the energy supplied by the power company
|
359 |
+
via the local grid can also influence the sustainability of a
|
360 |
+
datacenter/HPC’s operations albeit in a less direct way. The
|
361 |
+
different sources from which power is generated (i.e. the
|
362 |
+
fuel mix), supplied to, and consumed by the HPC carry an
|
363 |
+
implicit environmental opportunity cost: the usage or purchase
|
364 |
+
of power with a less sustainable fuel mix at a period in
|
365 |
+
time forgoes usage of power generated with a greener fuel
|
366 |
+
mix in that same time period. This, in turn, represents the
|
367 |
+
foregone opportunity to offset some portion of existing energy
|
368 |
+
expenditure while imposing an environment cost in the form
|
369 |
+
of greater energy inefficiency as an externality. One way to
|
370 |
+
then improve energy efficiency is to shift energy expenditure
|
371 |
+
more towards power sourced from higher ratios of sustainable
|
372 |
+
fuel mixes (i.e. generated with more sustainable sources like
|
373 |
+
solar and wind).
|
374 |
+
Figure 2 suggests there may be an opportunity to change
|
375 |
+
the datacenter/HPC’s purchasing behavior for this strategy to
|
376 |
+
be viable. Over the course of the year, we see that the total
|
377 |
+
share of fuel/energy produced from solar and wind is inversely
|
378 |
+
|
379 |
+
related to the average amount of power used per month. The
|
380 |
+
MIT Supercloud energy consumption has been relatively high
|
381 |
+
when the share of renewable energy is low around June to
|
382 |
+
August—similarly, energy consumption/expenditure is lower
|
383 |
+
when the share of renewable energy in the fuel mix of the
|
384 |
+
power supplied is higher. One strategy to take advantage of this
|
385 |
+
mis-match between power consumption and fuel mix, increase
|
386 |
+
energy efficiency, and reduce the environmental opportunity
|
387 |
+
cost is to purchase more power during times when sustainable
|
388 |
+
energy takes up a larger share of the fuel mix (e.g. March
|
389 |
+
to May) and either: (1) capitalize during that time period by
|
390 |
+
encouraging more cluster utilization during those months or
|
391 |
+
(2) store that energy to help offset energy consumption during
|
392 |
+
times where the fuel mix is less sustainably sourced.
|
393 |
+
Figure 3 suggests this strategy also carries financial ben-
|
394 |
+
efits. During springtime, from February to May, when the
|
395 |
+
sustainable energy share of fuel mix tends to be high (> 8%),
|
396 |
+
general energy prices tend to be extremely low ($20-$25 per
|
397 |
+
megawatt-hour) and are some of the lowest prices of the
|
398 |
+
year. However, it is important to note that renewable energies
|
399 |
+
like solar and wind may not always see stable generation;
|
400 |
+
moreover, there are additional fixed costs incurred from setting
|
401 |
+
up the relevant infrastructure that may be required in order to
|
402 |
+
pursue strategies like the ones described above. We explore
|
403 |
+
and discuss the application of A.I. to help stabilize sustainable
|
404 |
+
energy generation as well as infrastructure investments as they
|
405 |
+
relate to efficiency in the sections below.
|
406 |
+
B. Temperature-aware & Weatherized Compute Optimization
|
407 |
+
While changes in the regular, shorter-term behavior of
|
408 |
+
datacenters/HPCs can be helpful, like those described above,
|
409 |
+
longer-term structural changes and preparations are essential.
|
410 |
+
As changes in climate produce increasingly extreme weather
|
411 |
+
events and rising temperatures [17], traditional mechanisms
|
412 |
+
alone may be insufficient to brace for what is to come.
|
413 |
+
In light of these upcoming challenges, energy-aware cluster
|
414 |
+
optimization must find ways to explicitly account for factors
|
415 |
+
in ε that, though difficult to anticipate, carry significant
|
416 |
+
consequences to datacenter/HPC health and efficiency such
|
417 |
+
as weather and climate. How would existing concepts and
|
418 |
+
practices of cluster management and energy efficiency change
|
419 |
+
with more extreme climate and more frequent weather events?
|
420 |
+
What would weatherized compute optimization look like?
|
421 |
+
In Fig. 4, we see the monthly average temperature and
|
422 |
+
its trend along with those of power consumption for the
|
423 |
+
MIT Supercloud system. Throughout the year, there is a
|
424 |
+
monotonic, one-to-one relationship between average monthly
|
425 |
+
power consumption and average monthly (local) temperature.
|
426 |
+
As temperatures become warmer heading into the spring and
|
427 |
+
summer months, it takes more power to cool the facilities
|
428 |
+
and maintain a sufficiently low temperature for normal oper-
|
429 |
+
ations, resulting in increased power consumption. If average
|
430 |
+
temperatures continue to climb even in the colder months as
|
431 |
+
a consequence of climate change, cooling is likely to become
|
432 |
+
more difficult and costly as previously efficient mechanisms
|
433 |
+
for cooling facilities may suffer previously unseen stress.
|
434 |
+
Fig. 4: Power Consumption vs. Green Fuel Mix. Average monthly
|
435 |
+
power consumption of MIT Supercloud plotted against monthly aver-
|
436 |
+
age temperature (in Fahrenheit). Note the near one-to-one relationship
|
437 |
+
between temperature and power consumption.
|
438 |
+
As such, investments into infrastructure weatherization is
|
439 |
+
critical. As changes in climate induce more extreme weather
|
440 |
+
events and temperature ranges with increasing regularity, ex-
|
441 |
+
isting methods to realize energy efficiency may no longer be
|
442 |
+
as effective under more frequent or extreme weather/climate
|
443 |
+
conditions especially if mechanisms only function effectively
|
444 |
+
within a small band of temperature/climate conditions. Since
|
445 |
+
historical data points of extreme weather can be rare (for now),
|
446 |
+
a useful exercise can be a regularly conducted stress-test akin
|
447 |
+
to the Dodd-Frank stress tests [18] enacted after the 2008
|
448 |
+
financial crisis; these stress tests are conducted annually and
|
449 |
+
provide simulated stress scenarios that test the resiliency of
|
450 |
+
financial institutions in both its traditional functions/operations
|
451 |
+
as well as with less traditional risks (e.g. geopolitical, climate,
|
452 |
+
infrastructure), helping identify areas in need of remediation.
|
453 |
+
Similar stress scenarios and risk identification, conducted
|
454 |
+
and evaluated regularly, for not just regular datacenter/HPC
|
455 |
+
operations but also for climate and weather resiliency can
|
456 |
+
help anticipate what energy efficiency (and inefficiency) looks
|
457 |
+
like when considering future changes in weather and climate.
|
458 |
+
For institutions with more than one HPC/datacenter, these
|
459 |
+
exercises can provide opportunities to plan and coordinate
|
460 |
+
across geo-scattered HPCs/datacenters to improve their col-
|
461 |
+
lective resilience or develop re-routing backups in extreme
|
462 |
+
weather conditions. Most importantly, these exercises can help
|
463 |
+
anticipate and identify critical areas of infrastructure which
|
464 |
+
require both a significant time and financial investment that
|
465 |
+
may not come up otherwise.
|
466 |
+
C. Incentives, Behavior, & Mechanism Design
|
467 |
+
Hardware and system-level mechanisms can carry much of
|
468 |
+
the weight in producing energy savings under-the-hood and
|
469 |
+
abstracting away difficulties without taking away from user
|
470 |
+
experience. If these interventions run into diminishing returns,
|
471 |
+
then discovering remaining gains in efficiency will require
|
472 |
+
work not only from the “supply” side of computing but also
|
473 |
+
on the “demand” side, qd—the user. Compared to the macro-
|
474 |
+
level approach dealing with cluster/datacenter-wide hardware
|
475 |
+
and system-level interventions, this micro-level approach can
|
476 |
+
|
477 |
+
PowerConsumptionvs.MonthlyTemperature
|
478 |
+
450
|
479 |
+
70
|
480 |
+
400
|
481 |
+
Avg.MonthlyTemperature (F)
|
482 |
+
Power (kW)
|
483 |
+
350
|
484 |
+
60
|
485 |
+
300
|
486 |
+
50
|
487 |
+
250
|
488 |
+
40
|
489 |
+
200
|
490 |
+
2
|
491 |
+
4
|
492 |
+
6
|
493 |
+
8
|
494 |
+
10
|
495 |
+
12
|
496 |
+
Monthprovide additional flexibility but will require careful planning
|
497 |
+
around mechanism design, user behavior, and user incentives.
|
498 |
+
From this perspective, the optimization problem faced by the
|
499 |
+
datacenter changes from Eq. 1 to
|
500 |
+
min
|
501 |
+
i
|
502 |
+
ei(qd(i), qs, p, c, ε) s.t. ai(qd(i), qs, p, c, ε) ≥ αi ∀i
|
503 |
+
where
|
504 |
+
�
|
505 |
+
i
|
506 |
+
ei = E,
|
507 |
+
�
|
508 |
+
i
|
509 |
+
ai = A
|
510 |
+
(2)
|
511 |
+
for each individual or representative user (or workload) i.
|
512 |
+
Whereas before the datacenter/HPC in Eq. 1 had control
|
513 |
+
mainly through qs, p, and c, now the main mechanism is
|
514 |
+
through a specific user/profile/representative workload i. This
|
515 |
+
ultimately translates into the datacenter attempting to induce
|
516 |
+
changes in the quantity of resources demanded qd, as reflected
|
517 |
+
by qd(i). Instead of total across-the-board quantities like total
|
518 |
+
energy and total activity/performance, E(·) and A(·), we
|
519 |
+
now focus on individual (or representative) users, profiles, or
|
520 |
+
representative workloads and their energy usage and activity
|
521 |
+
profiles, as denoted by ei(·), ai(·), and αi. Naturally, by tailor-
|
522 |
+
ing energy minimization efforts to representative user profiles
|
523 |
+
and workloads, these mechanisms can reduce overall energy
|
524 |
+
expenditure selectively in ways that systematic hardware inter-
|
525 |
+
ventions cannot. These micro-level approaches aim to induce
|
526 |
+
behavioral changes in users through affecting incentives with
|
527 |
+
the support of predictive analytics and instrumentation.
|
528 |
+
One example is the design of queues for finer user and
|
529 |
+
workload segmentation; these queues can improve job schedul-
|
530 |
+
ing and execution using user-provided information (and other
|
531 |
+
information) like the user’s stated preferences on energy
|
532 |
+
efficiency, job urgency/patience, expected time completion,
|
533 |
+
type of workload, etc. Policies can then be tailored more
|
534 |
+
specifically with only the resources necessary, allowing for
|
535 |
+
more efficient design elements by reducing idle time, over-
|
536 |
+
allocation, and over-utilization of resources. However, if queue
|
537 |
+
selection and user intent conflict in situations where the user
|
538 |
+
has an incentive towards a specific resource configuration
|
539 |
+
different from the assigned one, this mechanism runs the risk
|
540 |
+
of adverse selection—users mis-characterize their preferences
|
541 |
+
and select themselves into queues where resources are fastest,
|
542 |
+
most plentiful, or the most available, leaving select queues
|
543 |
+
clogged and overtaxed and others largely, if not entirely, idle.
|
544 |
+
In the example above, too many self-characterizing choices
|
545 |
+
are made available for users to potentially mis-represent their
|
546 |
+
preferences and extract private benefits while imposing a social
|
547 |
+
cost on the whole system. One alternative to balance these two
|
548 |
+
factors of too much choice and too little control is to maintain
|
549 |
+
a two-part mechanism: a fixed component that guarantees a
|
550 |
+
specified minimum amount of energy efficiency and a variable
|
551 |
+
component that allows for user choice to further scale energy
|
552 |
+
efficient behavior, but only in certain respects. For instance,
|
553 |
+
it has been shown that optimal GPU power-caps provide an
|
554 |
+
effective way to control energy consumption with minimal
|
555 |
+
impact on training speed [15] and user experience. With these
|
556 |
+
optimal power caps as the fixed base component, the variable
|
557 |
+
component can be offered as a choice: if an user accepts
|
558 |
+
increasingly stringent power caps on his/her allocated GPUs
|
559 |
+
(or other restrictions), the user can then, in exchange, choose
|
560 |
+
to have more GPUs allocated to his/her tasks. These types of
|
561 |
+
choice mechanisms require a cost-benefit analyses to balance
|
562 |
+
individual net benefits/costs with system-level benefits/costs
|
563 |
+
but can help induce energy-efficient changes in user behavior
|
564 |
+
and computing demand.
|
565 |
+
Designing mechanisms can be difficult but predictive mod-
|
566 |
+
els and analytical tools can help in understanding and evaluat-
|
567 |
+
ing both utilization patterns as well as opportunities to affect
|
568 |
+
them in an energy-efficient way. Models that help forecast
|
569 |
+
and relate energy prices, fuel mix, as well as energy expen-
|
570 |
+
diture to one another can provide significant support in the
|
571 |
+
decision-making process for optimizing energy purchases and
|
572 |
+
consumption. Similarly, models leveraging data on compute
|
573 |
+
demand and usage (e.g. holidays, research deadlines) can help
|
574 |
+
with scheduling, maintenance, etc. Though these mechanisms
|
575 |
+
are not without their drawbacks, predictive analytics and in-
|
576 |
+
strumentation can help mitigate these shortfalls by anticipating
|
577 |
+
and analyzing behavior via data and inference.
|
578 |
+
III. CLIMATE-AWARE RESEARCH ECOSYSTEMS
|
579 |
+
A significant part of the A.I. research ecosystem is driven
|
580 |
+
and structured by incentives to publish in notable, high-
|
581 |
+
visibility conferences and journals. These venues serve as
|
582 |
+
important forums for the A.I. community—researchers, prac-
|
583 |
+
titioners, and the state of research as a whole—to disseminate
|
584 |
+
new and important findings, promote brands, seek/hire talent,
|
585 |
+
highlight significant contributions and problems, exchange
|
586 |
+
information, foster innovation and collaborative relationships,
|
587 |
+
and more. These contributions notwithstanding, the way the
|
588 |
+
research ecosystem is currently structured can create incen-
|
589 |
+
tives worth reconsidering when transitioning towards a more
|
590 |
+
sustainable research environment.
|
591 |
+
As both fundamental research and applications in A.I. to
|
592 |
+
various fields continue to grow, high-visibility venues will
|
593 |
+
likely receive more focus and submissions as researchers and
|
594 |
+
practitioners strive to publish in the “best” possible venue.
|
595 |
+
Many metrics of success in fundamental and applied research
|
596 |
+
are also heavily influenced, if not defined, by publishing
|
597 |
+
in these venues—preferring or requiring that researchers,
|
598 |
+
practitioners, and even job candidates to have publications
|
599 |
+
at notable venues—which continues to serve as a common
|
600 |
+
incentive and evaluative criterion. With such a significant focus
|
601 |
+
on publication in key conferences, how do these incentives
|
602 |
+
drive the pattern of research activity and what environmental
|
603 |
+
consequences do they carry, if any? Previous works have
|
604 |
+
studied the carbon footprint generated by participants traveling
|
605 |
+
to conferences [19] [20] but less attention has focused on the
|
606 |
+
effect of the distribution of deadlines themselves.
|
607 |
+
Conferences deadlines are typically scattered throughout the
|
608 |
+
year with each conference serving a specific domain or as
|
609 |
+
a general purpose venue (e.g. see Table I). Specific dates
|
610 |
+
are publicized several months ahead to give enough time for
|
611 |
+
preparation and planning. The distribution of these deadlines
|
612 |
+
may induce certain patterns in aggregate research activity,
|
613 |
+
|
614 |
+
compute demand, and therefore energy utilization, the last
|
615 |
+
of which we use as a proxy for activity/demand. As an
|
616 |
+
exploratory analysis, we compare the number of conference
|
617 |
+
deadlines per month from January 2020 to end of year 2021
|
618 |
+
with trends in monthly energy usage in the MIT Supercloud
|
619 |
+
system (Figure 5). To help account for the confounding
|
620 |
+
effects of seasonality, temperature, and other factors on energy
|
621 |
+
utilization, we include data across two years (2021 & 2022).
|
622 |
+
Given the way deadlines are structured, we might expect
|
623 |
+
a lagging relationship where activity or compute demand,
|
624 |
+
and hence energy utilization, might pick up in anticipation of
|
625 |
+
upcoming deadlines—the larger the number or concentration
|
626 |
+
of upcoming deadlines, the larger the increase in compute
|
627 |
+
demand. As deadlines approach, users are accelerating their
|
628 |
+
workloads, finishing or repeating experiments, and preparing
|
629 |
+
for conference submission. In Figure 5, we see some pick-
|
630 |
+
up in energy usage leading up to the months with a high
|
631 |
+
concentration of deadlines (i.e. July 2020)—such as the uptick
|
632 |
+
starting around March/April 2020 and leading up to July
|
633 |
+
2020—but this may also be due to higher temperatures and
|
634 |
+
cooling costs as noted earlier. However, there is a sharper
|
635 |
+
pickup in energy usage starting around Jan/Feb 2021 in
|
636 |
+
anticipation of a notable concentration of deadlines in the
|
637 |
+
subsequent months. This sharp increase in energy usage is
|
638 |
+
significantly higher than in the same period of the previous
|
639 |
+
year despite no significant differences in average temperature
|
640 |
+
or other known factors in those time periods between the two
|
641 |
+
years—the only difference being the concentration/number of
|
642 |
+
deadlines. Overall, we also see that many deadlines tend to
|
643 |
+
concentrate in the spring/summer across both years when the
|
644 |
+
combination of higher temperatures and increased compute
|
645 |
+
demand can exacerbate existing energy trends, resulting in
|
646 |
+
significantly higher energy usage that taxes the cluster. In the
|
647 |
+
same period (i.e. the summer months), the fuel mix of the
|
648 |
+
supplied power also has the lowest ratio of sustainable energy
|
649 |
+
of the year, as seen earlier (Fig. 2), which further contributes
|
650 |
+
to an enlarged environmental footprint.
|
651 |
+
A natural question that may arise is: can we structure
|
652 |
+
deadlines to spread out energy utilization and compute demand
|
653 |
+
to benefit energy efficiency? If the same amount of compute
|
654 |
+
is to be spent throughout an representative year of research
|
655 |
+
activity regardless, then several options may help distribute
|
656 |
+
that amount in a more sustainable fashion: (1) spread deadlines
|
657 |
+
more uniformly throughout the year, (2) concentrate deadlines
|
658 |
+
in the winter/spring months when preceding months are colder
|
659 |
+
or see more sustainable fuel generation, or (3) abolish fixed
|
660 |
+
deadlines in favor of rolling submissions. Some venues (e.g.
|
661 |
+
Transactions on Machine Learning Research) have already
|
662 |
+
shifted to rolling submissions albeit for different reasons.
|
663 |
+
We note that our preliminary analysis is intentionally limited
|
664 |
+
in scope as we focus exclusively on the MIT Supercloud
|
665 |
+
system. Additionally, it neither accounts for other confounding
|
666 |
+
factors explicitly nor does it show a definitive connection be-
|
667 |
+
tween conference timings and usage/energy intensity. Rather,
|
668 |
+
it is meant to bring attention to how structural incentives
|
669 |
+
in the current A.I. research ecosystem and community may
|
670 |
+
not align optimally with desirable aspects of sustainability—
|
671 |
+
with one example being conference deadlines. More work and
|
672 |
+
data are required to tease out the full picture of the degree
|
673 |
+
to which aggregate research activity and its energy footprint
|
674 |
+
are affected by conference timings. We hope that future
|
675 |
+
work will undertake a finer analysis, accounting for details
|
676 |
+
such as workload type, type of research activity represented,
|
677 |
+
breakdown of activity and energy use by domain (e.g. NLP),
|
678 |
+
etc. beyond just data from this cluster. This requires more data,
|
679 |
+
better data, data access, as well as willingness to share these
|
680 |
+
data, which may not currently exist in sufficient amounts, a
|
681 |
+
matter we discuss further below.
|
682 |
+
TABLE I: List of notable conferences. The following con-
|
683 |
+
ferences are considered for analysis (not exhaustive).
|
684 |
+
Area/Discipline
|
685 |
+
Conferences
|
686 |
+
NLP/Speech
|
687 |
+
EACL, InterSpeech, EMNLP, AKBC, ICASSP
|
688 |
+
ISMIR, AACL-IJCNLP, COLING, CoNNL,
|
689 |
+
WMT, EACL
|
690 |
+
Computer Vision
|
691 |
+
ICME, ICIP, SIGGRAPH, MIDL, ICCV,
|
692 |
+
FG, ICMI, BMVC, WACV
|
693 |
+
Robotics
|
694 |
+
IROS, RRS, CoRL, ICRA
|
695 |
+
General ML
|
696 |
+
COLT, ICCC, ICPR, AAMAS, AISTATS, CHIL
|
697 |
+
EMCL-PKDD, NeurIPS, ACML, AAAI, ICLR
|
698 |
+
Data Mining
|
699 |
+
SDM, KDD, SIGIR, RecSys, CIKM, ICDM
|
700 |
+
WSDM, WWW
|
701 |
+
Fig. 5: Energy Usage vs. Number of Conference Deadlines
|
702 |
+
Average monthly power consumption of MIT’s E1 cluster plotted
|
703 |
+
against number of monthly conference deadlines (Table I)
|
704 |
+
IV. CLIMATE-AWARE RESEARCH PRIORITIES
|
705 |
+
A discussion on the sustainability of the current A.I. re-
|
706 |
+
search ecosystem and its incentives would be incomplete
|
707 |
+
without discussing the thematic lines of work, both old and
|
708 |
+
new, such an ecosystem should prioritize in order to improve
|
709 |
+
its sustainability and keep its environmental footprint small.
|
710 |
+
A. Novelty, Redundancies, & Efficiency
|
711 |
+
Given the complexity and variety of research and appli-
|
712 |
+
cations in A.I., there are likely significant redundancies in
|
713 |
+
A.I. workflows. Many experiments usually begin with training
|
714 |
+
|
715 |
+
Energy Usage vs.Conference Deadlines
|
716 |
+
700
|
717 |
+
EnergyUsage
|
718 |
+
6
|
719 |
+
600
|
720 |
+
5
|
721 |
+
Conference Deadlines
|
722 |
+
(Avg. Power kW)
|
723 |
+
500
|
724 |
+
4
|
725 |
+
400
|
726 |
+
3
|
727 |
+
300
|
728 |
+
2
|
729 |
+
200
|
730 |
+
1
|
731 |
+
2020
|
732 |
+
6-2020
|
733 |
+
9-2020
|
734 |
+
-2020
|
735 |
+
-2020
|
736 |
+
2021
|
737 |
+
8-2021
|
738 |
+
10-2021
|
739 |
+
6known and proven models up to some pre-specified level
|
740 |
+
of performance, depending on the research direction, before
|
741 |
+
building atop these results. Doing so may require some hyper-
|
742 |
+
parameter search, if not full-blown optimization, resulting in
|
743 |
+
multiple training runs and inevitably redundant runs, wasted
|
744 |
+
compute, and additional energy costs. Some redundancies can
|
745 |
+
play a helpful role by training students and researchers when
|
746 |
+
they start working on A.I. research where experience obtained
|
747 |
+
from reproducing results can help shape best practices down
|
748 |
+
the road. However, problems with reproducability of research
|
749 |
+
only compound these redundancies as (multiple) attempts at
|
750 |
+
replication also waste resources and energy when researchers
|
751 |
+
and practitioners attempt to build off existing work or put
|
752 |
+
previous work into practice. These difficulties in replicating
|
753 |
+
published results are wide-spread and well-documented [21],
|
754 |
+
resulting from inconsistent reporting of sensitivity to hyper-
|
755 |
+
parameters and training settings (or complete lack thereof),
|
756 |
+
poor communication, missed opportunities from reviewers,
|
757 |
+
mis-representation, or some combination of the above.
|
758 |
+
In the ever-changing landscape of new research and model
|
759 |
+
frameworks, problems with redundancy and reproducibility
|
760 |
+
can carry additional implications for energy efficiency. If
|
761 |
+
incentives to develop better performing models overshadow
|
762 |
+
those for reproducibility and transparency, research efforts
|
763 |
+
devoted to producing newer, better models will outpace efforts
|
764 |
+
for clearer benchmarking and reporting, leaving transparency
|
765 |
+
and resource efficiency efforts forever playing catch-up. For
|
766 |
+
instance, when GPT-3 debuted, despite its impressive perfor-
|
767 |
+
mance on generative language tasks, its training (not including
|
768 |
+
experimentation during its development) was prohibitively
|
769 |
+
costly and estimated at around $5 million using a specially
|
770 |
+
designed supercomputer by Microsoft [22], making it very
|
771 |
+
difficult for researchers to train and test on their own—
|
772 |
+
only after its introduction, extensive usage, and popularization
|
773 |
+
did work focus addressing its efficiency and other issues
|
774 |
+
(e.g. safety, A.I. alignment, etc.). Over-parameterization and
|
775 |
+
big data may offer easy performance improvements, but an
|
776 |
+
emphasis on jointly co-optimizing efficiency and performance
|
777 |
+
in research may help avoid this efficiency-in-hindsight ap-
|
778 |
+
proach and front-loading significant energy costs in model
|
779 |
+
development. Some progress has been made in addressing
|
780 |
+
these problems as Google, Meta, and other large players have
|
781 |
+
highlighted best practices and standards that have helped to
|
782 |
+
significantly reduce their own carbon footprints [23] [8] for
|
783 |
+
state-of-the-art NLP models, such as efficient model selections
|
784 |
+
and hardware/system choices. Despite this, however, the fun-
|
785 |
+
damental problem of information reporting and data availabil-
|
786 |
+
ity still remains. To remedy this, there needs to be an active,
|
787 |
+
systematic, and consistent approach towards collecting and
|
788 |
+
reporting data/information (on energy usage, training settings,
|
789 |
+
etc.) that incentivizes voluntary contribution and surveys a
|
790 |
+
sufficiently broad swath of sources to be representative of the
|
791 |
+
diversity of workloads in research and practice.
|
792 |
+
B. Measurement, Reporting, & Transparency
|
793 |
+
Various works have produced estimates in attempts to
|
794 |
+
quantify the carbon or energy footprint of deep learning
|
795 |
+
model training with estimates ranging from as high as 5x the
|
796 |
+
average lifetime emissions of a car [24] to as low as 10−5
|
797 |
+
times that amount [23] for state-of-the-art transformers. These
|
798 |
+
estimates are inherently variable and difficult—not only due
|
799 |
+
to differences in aspects like hardware (e.g. GPU vs. TPU)—
|
800 |
+
in both the approach taken to quantify these costs and their
|
801 |
+
resulting accuracy. These difficulties in accurate estimation
|
802 |
+
highlight the importance of regularly detailing energy usage
|
803 |
+
and other information in research alongside typical items like
|
804 |
+
performance results and ablation tests. Moreover, while many
|
805 |
+
estimates have focused on training costs, even less clear are
|
806 |
+
the costs arising through a model’s entire life-cycle, which are
|
807 |
+
particularly important in industry and applied settings. Even
|
808 |
+
so, there exist even less data on the costs of inference.
|
809 |
+
The discrepancies in, and even availability of, these esti-
|
810 |
+
mates can be due to several reasons. The first is resource
|
811 |
+
asymmetry—not only do different companies, groups, and
|
812 |
+
individuals have different amounts of computational resources,
|
813 |
+
they also have different computational setups so certain met-
|
814 |
+
rics and calculations may naturally vary depending on the
|
815 |
+
underlying technological stack. This differentiation similarly
|
816 |
+
applies in academic disciplines where a base model (e.g.
|
817 |
+
graph neural networks) may branch out into highly special-
|
818 |
+
ized, differentiated variants depending on the field or task
|
819 |
+
(e.g. social networks vs. molecular predictions), resulting in
|
820 |
+
significantly different training procedures, learning dynam-
|
821 |
+
ics, energy footprints, and more. Different needs, resources,
|
822 |
+
and constraints largely determine variations across research
|
823 |
+
and development workflows; as such, when a company or
|
824 |
+
institution reports realized gains in efficiency or savings,
|
825 |
+
these gains may only be realizable on their systems, with
|
826 |
+
their resources/hardware/configuration, or limited to a specific
|
827 |
+
class of models that are reported by, or essential to, said
|
828 |
+
organization. Though a seemingly simple solution would be
|
829 |
+
to move over to services provided by organizations with the
|
830 |
+
hardware and technical capabilities to realize such efficiencies,
|
831 |
+
there are ethical concerns and market concentration issues that
|
832 |
+
require addressing. Even with similar tasks across companies
|
833 |
+
and industries, different domains are also characterized by
|
834 |
+
other considerations and constraints such as the lack of tech-
|
835 |
+
nical expertise, specific resource and regulatory constraints,
|
836 |
+
and other requirements like model privacy or interpretability
|
837 |
+
that may outweigh model performance and efficiency. At
|
838 |
+
its worst, resource asymmetries can hamper reproducibility
|
839 |
+
and verification efforts: if state-of-the-art models developed
|
840 |
+
by large, well-equipped research groups are too costly and
|
841 |
+
resource-intensive to train for others, how can their results
|
842 |
+
and estimates be reproduced or verified?
|
843 |
+
Along with the resource asymmetry, information asymmetry
|
844 |
+
can discourage and dis-incentivize researchers and practition-
|
845 |
+
ers from reporting necessary or relevant information. Some
|
846 |
+
examples of these asymmetries, besides ones mentioned earlier
|
847 |
+
|
848 |
+
like inconsistent reporting of training settings as well as poor
|
849 |
+
communication and presentation of research results, can arise
|
850 |
+
in part from incentives to preserve competitive advantages
|
851 |
+
and other sensitive information. Incentives to protect and
|
852 |
+
preserve a competitive edge from peers and competitors can
|
853 |
+
discourage full, transparent reporting of information especially
|
854 |
+
if these models and research tie into a company’s products
|
855 |
+
and services. Even when reporting, these incentives may
|
856 |
+
limit the amount of information made available to the wider
|
857 |
+
research community, leading to confusion around estimates
|
858 |
+
and methodologies. Incentives to keep information, and its
|
859 |
+
benefits, private for competitive advantage can lead to con-
|
860 |
+
tinued information asymmetries in a self-reinforcing cycle.
|
861 |
+
Voluntary reporting may then be dominated by larger, better-
|
862 |
+
equipped groups with the resources and technical ability to
|
863 |
+
optimize their operations which, though well-intentioned, will
|
864 |
+
likely not reflect the true extent of the overall, or even the
|
865 |
+
average, environmental footprint of A.I. and its applications.
|
866 |
+
Moreover, despite the focus on the footprint and costs of
|
867 |
+
training, data and estimates on inference are even scarcer
|
868 |
+
despite its significance—the few estimates, where available,
|
869 |
+
put inference at 90% of production ML infrastructure costs
|
870 |
+
[25] and 80%-90% of energy costs [26]. While training enjoys
|
871 |
+
scaling benefits that saturate GPUs, the different performance
|
872 |
+
requirements of inference can result in poor GPU utilization
|
873 |
+
since inference queries are unable to realize the parallelism
|
874 |
+
that offline mini-batch training enjoys [27]. Low resource-
|
875 |
+
efficiency and utilization is quite common: AWS reports p3
|
876 |
+
GPU instances at only 10%-30% utilization [25] and even
|
877 |
+
Google’s TPUs exhibit a utilization of 28% on average [28].
|
878 |
+
The issues outlined above all point to a common set of
|
879 |
+
problems that require (1) a better, more representative idea of
|
880 |
+
the kind of A.I. models, and the underlying resources, used
|
881 |
+
across disciplines, domains, and communities, (2) a common
|
882 |
+
set of meaningful metrics, and (3) incentives through both
|
883 |
+
existing avenues (e.g. conferences, papers) and new ones such
|
884 |
+
as forums, competitions, leaderboards, or open challenges to
|
885 |
+
encourage reporting of energy/utilization data and develop-
|
886 |
+
ment of more energy-efficient models rather than just better
|
887 |
+
performing ones. To accurately quantify the environmental
|
888 |
+
footprint, it is essential to capture costs with metrics that
|
889 |
+
realistically reflect and represent the workloads undertaken in
|
890 |
+
A.I. research and practice—as well as the burdens and en-
|
891 |
+
ergy footprint associated with state-of-the-art models on more
|
892 |
+
representative computational setups rather than in the most
|
893 |
+
efficient, advanced settings. To incentivize consistent reporting
|
894 |
+
and sharing of data, the research community needs forums
|
895 |
+
that prioritize energy-efficient models and methodologies. For
|
896 |
+
instance, a Green A.I. challenge (in development) that aims to
|
897 |
+
cast the problem explicitly by challenging participants to max-
|
898 |
+
imize performance given explicit training and energy budgets.
|
899 |
+
Lastly, facilities should also provide the central infrastructure,
|
900 |
+
user interfaces, and analytical tools/instrumentation/logging
|
901 |
+
to further encourage easy reporting and sharing of data,
|
902 |
+
especially since not all users are equipped with the expertise
|
903 |
+
to manually report relevant data and information.
|
904 |
+
C. A.I. for Energy Savings, Generation, & Discovery
|
905 |
+
Despite its potential environmental footprint, some of the
|
906 |
+
most impressive applications of A.I. algorithms have included
|
907 |
+
ones that help generate energy savings themselves. One exam-
|
908 |
+
ple has been Google and DeepMind’s use of neural networks to
|
909 |
+
monitor and optimize their datacenters, reducing the amount of
|
910 |
+
energy spent for cooling by 40% and PUE by 15% in live tests
|
911 |
+
[29]. Similar examples abound, but beyond energy savings,
|
912 |
+
continued and improved sustainability will also require work
|
913 |
+
from the other side of the equation: energy generation.
|
914 |
+
The study and application of A.I. to energy discovery and
|
915 |
+
generation should be strongly incentivized given its immediate
|
916 |
+
benefits. Current examples include the application of algo-
|
917 |
+
rithms to stabilize and boost sustainable energy generation:
|
918 |
+
wind farms provide inexpensive, carbon-free energy but can
|
919 |
+
be unpredictable, making planning and energy delivery/storage
|
920 |
+
difficult. In response, DeepMind has developed neural net-
|
921 |
+
works trained on weather forecasts and historical turbine
|
922 |
+
data to forecast energy output 36 hours ahead, making early
|
923 |
+
recommendations on optimal hourly delivery commitments
|
924 |
+
to the grid possible [30]. Beyond existing energy sources,
|
925 |
+
A.I. research can help push forward new sustainable energy
|
926 |
+
sources. Recent work has shown how deep reinforcement
|
927 |
+
learning can help control nuclear fusion [31] by learning to
|
928 |
+
control and change the shape of plasma via manipulation of
|
929 |
+
its magnetic field. Scientific collaborations, especially as they
|
930 |
+
relate to development of new energy sources or improvements
|
931 |
+
in existing energy generation, should receive equal priority
|
932 |
+
and recognition as state-of-the-art performance improvements
|
933 |
+
in areas like vision and NLP. To do so, partnerships with
|
934 |
+
scientific and energy researchers should be encouraged and
|
935 |
+
made more accessible to A.I. researchers and practitioners.
|
936 |
+
Similarly, benchmark energy datasets should be constructed
|
937 |
+
and made easily accessible just like standard data benchmarks
|
938 |
+
in NLP and vision—moreover, these energy datasets should
|
939 |
+
receive continuous updates and testing due to the inherently
|
940 |
+
variable behavior of wind, weather, etc.
|
941 |
+
V. CONCLUSION
|
942 |
+
There are many dimensions of this multi-faceted problem
|
943 |
+
that are not addressed in this paper due to space limitations
|
944 |
+
but are important for consideration nonetheless such as the
|
945 |
+
equity and accessibility aspects of energy-efficient computing.
|
946 |
+
Though daunting, we hope our discussions of these problems
|
947 |
+
and their potential solutions will provide a framework that
|
948 |
+
spurs further discussion, and most importantly action, on these
|
949 |
+
various issues.
|
950 |
+
ACKNOWLEDGMENT
|
951 |
+
The authors acknowledge the MIT SuperCloud [14] and
|
952 |
+
Lincoln Laboratory Supercomputing Center for providing HPC
|
953 |
+
and consultation resources that have contributed to the research
|
954 |
+
results reported within this paper. The authors acknowledge
|
955 |
+
the MIT SuperCloud team: William Arcand, William Berg-
|
956 |
+
eron, Chansup Byun, Michael Houle, Jeremy Kepner, Anna
|
957 |
+
Klein, Peter Michaleas, Lauren Milechin, Julie Mullen, Albert
|
958 |
+
|
959 |
+
Reuther, Antonio Rosa, and Charles Yee. The authors also
|
960 |
+
wish to acknowledge the following individuals for their con-
|
961 |
+
tributions and support: Bob Bond, Allan Vanterpool, Tucker
|
962 |
+
Hamilton, Jeff Gottschalk, Tim Kraska, Mike Kanaan, Charles
|
963 |
+
Leiserson, Dave Martinez, John Radovan, Steve Rejto, Daniela
|
964 |
+
Rus, Marc Zissman.
|
965 |
+
REFERENCES
|
966 |
+
[1] U.S. Environmental Protection Agency,
|
967 |
+
“Green
|
968 |
+
power
|
969 |
+
partnership
|
970 |
+
national top 100,” 2022. [Online]. Available: https://www.epa.gov/
|
971 |
+
greenpower/green-power-partnership-national-top-100
|
972 |
+
[2] The White House,
|
973 |
+
“Fact
|
974 |
+
sheet:
|
975 |
+
The
|
976 |
+
bipartisan
|
977 |
+
infrastructure
|
978 |
+
deal
|
979 |
+
boosts
|
980 |
+
clean
|
981 |
+
energy
|
982 |
+
jobs,
|
983 |
+
strengthens
|
984 |
+
resilience,
|
985 |
+
and
|
986 |
+
advances
|
987 |
+
environmental
|
988 |
+
justice,”
|
989 |
+
2021.
|
990 |
+
[Online].
|
991 |
+
Available:
|
992 |
+
https://www.whitehouse.gov/briefing-room/statements-releases/2021/
|
993 |
+
11/08/fact-sheet-the-bipartisan-infrastructure-deal-boosts-clean-ener\
|
994 |
+
gy-jobs-strengthens-resilience-and-advances-environmental-justice/
|
995 |
+
[3] J. Sevilla, L. Heim, A. Ho et al., “Compute trends across three eras of
|
996 |
+
machine learning,” arXiv preprint arXiv:2202.05924, 2022.
|
997 |
+
[4] International Energy Agency, “Data centres and data transmission
|
998 |
+
networks,”
|
999 |
+
2021.
|
1000 |
+
[Online].
|
1001 |
+
Available:
|
1002 |
+
https://www.iea.org/reports/
|
1003 |
+
data-centres-and-data-transmission-networks
|
1004 |
+
[5] Nature News Feature, “How to stop data centres from gobbling up the
|
1005 |
+
world’s electricity,” 2020. [Online]. Available: https://www.nature.com/
|
1006 |
+
articles/d41586-018-06610-y
|
1007 |
+
[6] E.
|
1008 |
+
Masanet,
|
1009 |
+
A.
|
1010 |
+
Shehabi,
|
1011 |
+
N.
|
1012 |
+
Lei
|
1013 |
+
et
|
1014 |
+
al.,
|
1015 |
+
“Recalibrating global data center energy-use estimates,”
|
1016 |
+
Science
|
1017 |
+
Vol 367, Issue 6481, pp. 984-986, 2020.
|
1018 |
+
[7] M.
|
1019 |
+
AbuBakar
|
1020 |
+
Siddik,
|
1021 |
+
A.
|
1022 |
+
Shehabi,
|
1023 |
+
and
|
1024 |
+
L.
|
1025 |
+
Marston,
|
1026 |
+
“The environmental footprint of data centers in the United States,”
|
1027 |
+
Environmental Research Letters, vol. 16, no. 6, 2021.
|
1028 |
+
[8] C.-J. Wu, R. Raghavendra, U. Gupta et al., “Sustainable AI: Envi-
|
1029 |
+
ronmental implications, challenges and opportunities,” arXiv preprint
|
1030 |
+
arXiv:2111.00364, 2021.
|
1031 |
+
[9] M. AI, “Introducing the ai research supercluster — meta’s cutting-
|
1032 |
+
edge ai supercomputer for ai research,” 2022. [Online]. Available:
|
1033 |
+
https://ai.facebook.com/blog/ai-rsc/
|
1034 |
+
[10] Data Center Dynamics,
|
1035 |
+
“Google
|
1036 |
+
plans
|
1037 |
+
$1.2bn
|
1038 |
+
nevada
|
1039 |
+
data
|
1040 |
+
center
|
1041 |
+
expansion
|
1042 |
+
in
|
1043 |
+
henderson
|
1044 |
+
and
|
1045 |
+
tahoe
|
1046 |
+
reno,”
|
1047 |
+
2020.
|
1048 |
+
[Online].
|
1049 |
+
Available:
|
1050 |
+
https://www.datacenterdynamics.com/en/news/
|
1051 |
+
googles-nevada-data-center-be-powered-billion-dollar-solar-farm/
|
1052 |
+
[11] Microsoft,
|
1053 |
+
“Microsoft’s
|
1054 |
+
newest
|
1055 |
+
sustainable
|
1056 |
+
datacenter
|
1057 |
+
region
|
1058 |
+
coming
|
1059 |
+
to
|
1060 |
+
arizona
|
1061 |
+
in
|
1062 |
+
2021,”
|
1063 |
+
2020.
|
1064 |
+
[Online].
|
1065 |
+
Available:
|
1066 |
+
https://azure.microsoft.com/en-us/blog/microsoft-s-newest-sustain\
|
1067 |
+
able-datacenter-region-coming-to-arizona-in-2021/
|
1068 |
+
[12] Google
|
1069 |
+
Cloud,
|
1070 |
+
“Cloud Tensor Processing Units (TPUs).”
|
1071 |
+
[Online].
|
1072 |
+
Available: https://cloud.google.com/tpu/docs/tpus
|
1073 |
+
[13] Uptime
|
1074 |
+
Institute,
|
1075 |
+
“Is PUE actually going up?”
|
1076 |
+
2019.
|
1077 |
+
[Online].
|
1078 |
+
Available: https://journal.uptimeinstitute.com/is-pue-actually-going-up/
|
1079 |
+
[14] A. Reuther, J. Kepner, C. Byun et al., “Interactive supercomputing on
|
1080 |
+
40,000 cores for machine learning and data analysis,” in 2018 IEEE High
|
1081 |
+
Performance extreme Computing Conference (HPEC). IEEE, 2018, pp.
|
1082 |
+
1–6.
|
1083 |
+
[15] N. C. Frey, B. Li, J. McDonald et al., “Benchmarking resource usage
|
1084 |
+
for efficient distributed deep learning,” arXiv preprint arXiv:2201.12423,
|
1085 |
+
2022.
|
1086 |
+
[16] A. Radovanovic, R. Koningstein, I. Schneider et al., “Carbon-aware
|
1087 |
+
computing for datacenters,” arXiv:2106.11750, 2021.
|
1088 |
+
[17] U.S. Environmental Protection Agency, “Climate change indicators:
|
1089 |
+
weather
|
1090 |
+
and
|
1091 |
+
climate.”
|
1092 |
+
[Online].
|
1093 |
+
Available:
|
1094 |
+
https://www.epa.gov/
|
1095 |
+
climate-indicators/weather-climate
|
1096 |
+
[18] Board of Governors of the Federal Reserve System, “Stress tests and
|
1097 |
+
capital planning.” [Online]. Available: https://www.federalreserve.gov/
|
1098 |
+
supervisionreg/dfa-stress-tests.htm
|
1099 |
+
[19] D. Spinellis and P. Louridas, “The carbon footprint of conference
|
1100 |
+
papers,” PLoS ONE, vol. 8, no. 6, pp. 414–419, 2013.
|
1101 |
+
[20] M. F. Astudillo and H. AzariJafari, “Estimating the global warming
|
1102 |
+
emissions of the lcaxvii conference: connecting flights matter,” Interna-
|
1103 |
+
tional Journal of Life Cycle Assessment, vol. 23, no. 7, pp. 1512–1516,
|
1104 |
+
2018.
|
1105 |
+
[21] B. Haibe-Kains, G. A. Adam, A. Hosny et al., “Transparency and
|
1106 |
+
reproducibility in artificial intelligence,” Nature, vol. 586, no. 7829, pp.
|
1107 |
+
E14–E16, 2020.
|
1108 |
+
[22] Microsoft, The AI Blog, “Microsoft announces new supercomputer,
|
1109 |
+
lays out vision for future ai work,” 2020. [Online]. Available:
|
1110 |
+
https://blogs.microsoft.com/ai/openai-azure-supercomputer/
|
1111 |
+
[23] D. P. Patterson, J. Gonzalez, U. Hölzle et al., “The carbon footprint
|
1112 |
+
of machine learning training will plateau, then shrink,” in 2022
|
1113 |
+
IEEE
|
1114 |
+
Computer
|
1115 |
+
(Upcoming).
|
1116 |
+
IEEE,
|
1117 |
+
2022.
|
1118 |
+
[Online].
|
1119 |
+
Available:
|
1120 |
+
https://www.techrxiv.org/articles/preprint/The_Carbon_Footprint_of_
|
1121 |
+
Machine_Learning_Training_Will_Plateau_Then_Shrink/19139645/1
|
1122 |
+
[24] E. Strubell, A. Ganesh, and A. McCallum, “Energy and policy con-
|
1123 |
+
siderations for deep learning in nlp,” arXiv preprint arXiv:1906.02243,
|
1124 |
+
2019.
|
1125 |
+
[25] A. Jassy, “Amazon AWS ReInvent Keynote,” 2018. [Online]. Available:
|
1126 |
+
https://www.youtube.com/watch?v=ZOIkOnW640A
|
1127 |
+
[26] Moor Insights and Strategy,
|
1128 |
+
“Google
|
1129 |
+
cloud
|
1130 |
+
doubles
|
1131 |
+
down
|
1132 |
+
on
|
1133 |
+
NVIDIA GPUs
|
1134 |
+
for
|
1135 |
+
inference,”
|
1136 |
+
2019.
|
1137 |
+
[Online].
|
1138 |
+
Available:
|
1139 |
+
https://www.forbes.com/sites/moorinsights/2019/05/
|
1140 |
+
09/google-cloud-doubles-down-on-nvidia-gpus-for-inference/?sh=
|
1141 |
+
75bd710a6792
|
1142 |
+
[27] P.
|
1143 |
+
Jain,
|
1144 |
+
X.
|
1145 |
+
Mo,
|
1146 |
+
A.
|
1147 |
+
Jain
|
1148 |
+
et
|
1149 |
+
al.,
|
1150 |
+
“The OoO VLIW JIT Compiler for GPU Inference,”
|
1151 |
+
arXiv
|
1152 |
+
preprint
|
1153 |
+
arXiv:1901.10008, 2019.
|
1154 |
+
[28] N. Jouppi, C. Young, N. Patil et al., “In-datacenter performance analysis
|
1155 |
+
of a tensor processing unit,” in 2018 IEEE High Performance extreme
|
1156 |
+
Computing Conference (HPEC).
|
1157 |
+
ISCA ’17: Proceedings of the 44th
|
1158 |
+
Annual International Symposium on Computer Architecture, 2017, pp.
|
1159 |
+
1–12.
|
1160 |
+
[29] DeepMind,
|
1161 |
+
“DeepMind AI
|
1162 |
+
reduces
|
1163 |
+
google
|
1164 |
+
data
|
1165 |
+
center
|
1166 |
+
cooling
|
1167 |
+
bill,”
|
1168 |
+
2016.
|
1169 |
+
[Online].
|
1170 |
+
Available:
|
1171 |
+
https://deepmind.com/blog/article/
|
1172 |
+
deepmind-ai-reduces-google-data-centre-cooling-bill-40
|
1173 |
+
[30] DeepMind,
|
1174 |
+
“Machine
|
1175 |
+
learning
|
1176 |
+
can
|
1177 |
+
boost
|
1178 |
+
the
|
1179 |
+
value
|
1180 |
+
of
|
1181 |
+
wind
|
1182 |
+
energy,” 2019. [Online]. Available: https://deepmind.com/blog/article/
|
1183 |
+
machine-learning-can-boost-value-wind-energy
|
1184 |
+
[31] J. Degrave, F. Felici, J. Buchli et al., “Magnetic control of tokamak
|
1185 |
+
plasmas through deep reinforcement learning,” Nature, vol. 602, no.
|
1186 |
+
7897, pp. 414–419, 2022.
|
1187 |
+
|
5tFJT4oBgHgl3EQfkyzq/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
6NE3T4oBgHgl3EQfpgqP/content/tmp_files/2301.04643v1.pdf.txt
ADDED
@@ -0,0 +1,794 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
tieval: AN EVALUATION FRAMEWORK FOR
|
2 |
+
TEMPORAL INFORMATION EXTRACTION SYSTEMS
|
3 |
+
Hugo Sousa
|
4 |
+
1,2, Alípio Jorge
|
5 |
+
1,2, and Ricardo Campos
|
6 |
+
1,3,4
|
7 |
+
1INESC TEC, Portugal
|
8 |
+
2University of Porto, Portugal
|
9 |
+
3Polytechnic Institute of Tomar, Portugal
|
10 |
+
4Ci2 - Smart Cities Research Center, Portugal
|
11 |
+
{hugo.o.sousa, alipio.jorge, ricardo.campos}@inesctec.pt
|
12 |
+
January 12, 2023
|
13 |
+
ABSTRACT
|
14 |
+
Temporal information extraction (TIE) has attracted a great deal of interest over the last two decades,
|
15 |
+
leading to the development of a significant number of datasets. Despite its benefits, having access to
|
16 |
+
a large volume of corpora makes it difficult when it comes to benchmark TIE systems. On the one
|
17 |
+
hand, different datasets have different annotation schemes, thus hindering the comparison between
|
18 |
+
competitors across different corpora. On the other hand, the fact that each corpus is commonly
|
19 |
+
disseminated in a different format requires a considerable engineering effort for a researcher/prac-
|
20 |
+
titioner to develop parsers for all of them. This constraint forces researchers to select a limited
|
21 |
+
amount of datasets to evaluate their systems which consequently limits the comparability of the
|
22 |
+
systems. Yet another obstacle that hinders the comparability of the TIE systems is the evaluation
|
23 |
+
metric employed. While most research works adopt traditional metrics such as precision, recall, and
|
24 |
+
F1, a few others prefer temporal awareness – a metric tailored to be more comprehensive on the
|
25 |
+
evaluation of temporal systems. Although the reason for the absence of temporal awareness in the
|
26 |
+
evaluation of most systems is not clear, one of the factors that certainly weights this decision is the
|
27 |
+
necessity to implement the temporal closure algorithm in order to compute temporal awareness, which
|
28 |
+
is not straightforward to implement neither is currently easily available. All in all, these problems
|
29 |
+
have limited the fair comparison between approaches and consequently, the development of temporal
|
30 |
+
extraction systems. To mitigate these problems, we have developed tieval, a Python library that
|
31 |
+
provides a concise interface for importing different corpora and is equipped with domain-specific
|
32 |
+
operations that facilitate system evaluation. In this paper, we present the first public release of tieval
|
33 |
+
and highlight its most relevant features. The library is available as open source, under MIT License,
|
34 |
+
at PyPI1 and GitHub2.
|
35 |
+
Figure 1: tieval logo.
|
36 |
+
1https://pypi.org/project/tieval/
|
37 |
+
2https://github.com/LIAAD/tieval
|
38 |
+
arXiv:2301.04643v1 [cs.CL] 11 Jan 2023
|
39 |
+
|
40 |
+
ti
|
41 |
+
Valtieval
|
42 |
+
1
|
43 |
+
Introduction
|
44 |
+
Understanding the temporal order of events is essential to human communication. We, humans, can easily understand
|
45 |
+
the relative order of events in a conversation or when reading a news article. However, many challenges are raised when
|
46 |
+
we try to automate such tasks with a computer program. The first difficulty that emerges is how to represent temporal
|
47 |
+
information. Since in most cases we do not explicitly specify the start and end time of each event, temporal information,
|
48 |
+
such as order and time span, ends up being inferred from the events themselves. To this regard, computer algorithms
|
49 |
+
can make use of temporal clues in the text, and of external sources, such as knowledge-bases, to anchor events on a
|
50 |
+
timeline. For instance, in the sentence “We went to dinner after the game.”, two events, “dinner” and “game”, can be
|
51 |
+
automatically identified and used, despite the lack of explicit temporal information, to recreate a timeline of events
|
52 |
+
(see Figure 2) supported on the word “after”. The ordering of events and the knowledge about them, can be further
|
53 |
+
expanded if used together with appropriate external sources. For instance, the event “game” can be contextualized
|
54 |
+
and anchored on the timeline by searching for information on a knowledge-base. However, in the case of the “dinner”
|
55 |
+
event, it turns out impossible to know the exact time of occurrence unless it is specified in the text. This shows that
|
56 |
+
representing temporal information is not a trivial task, since there are several borderline cases for which no standard
|
57 |
+
approach has been established.
|
58 |
+
Figure 2: Relative timeline of events that can be inferred from the running example.
|
59 |
+
Over the years, and particularly in the last two decades, this problem has been highly studied, leading to several
|
60 |
+
proposals from the research community Campos et al. [2014], Leeuwenberg and Moens [2019]. Most of the proposals
|
61 |
+
were in the origin of the emergence of different annotation schemes and the various corpora that we have today at our
|
62 |
+
disposal Naik et al. [2019], Ning et al. [2018a], UzZaman et al. [2013]. Although these efforts have been essential
|
63 |
+
to mature temporal information extraction and its subtasks – such as temporal expression identification or temporal
|
64 |
+
relation classification – they also pose some problems upon the process of benchmarking different methods. One of the
|
65 |
+
problems has its roots in the fact that evaluating the methods, often requires reading multiple corpora, each of which has
|
66 |
+
a different perspective on temporal representation, ultimately preventing comparability among the different methods
|
67 |
+
and corpora. This is compounded by the fact that corpora are stored in a variety of formats (e.g., XML, TimeML, or
|
68 |
+
table ), which requires a considerable engineering effort to load them all.
|
69 |
+
Another issue that limits the comparison between systems is the lack of standardization in the metrics used in the
|
70 |
+
evaluation process. This is a particular problem of temporal relation extraction – a subtask of TIE, which deals with the
|
71 |
+
identification and classification of the temporal relations between entities – where different metrics are often employed
|
72 |
+
during the evaluation process. While initially systems were evaluated and compared using standard metrics, such as
|
73 |
+
recall, precision, and F-score Verhagen et al. [2007, 2010], more recently, metrics such as temporal awareness UzZaman
|
74 |
+
and Allen [2011] have proven to be more reliable in the evaluation of temporal relation extraction methods. The
|
75 |
+
reasoning behind this is that, while traditional metrics focus on the local effectiveness of the model, temporal awareness
|
76 |
+
better understands the relative order of events by considering the global temporal structure of the predictions. This is
|
77 |
+
accomplished by taking into account the temporal relations that can be inferred from the established ones (a process
|
78 |
+
typically referred to as temporal closure), making this a more comprehensive metric for evaluating temporal systems.
|
79 |
+
Despite the emergence of this temporal awareness, many studies still rely solely on traditional metrics to evaluate
|
80 |
+
their system. We speculate that this is due to the fact that temporal awareness requires domain-specific operations
|
81 |
+
such as temporal closure – which are not (yet) readily available in every framework and therefore require individual
|
82 |
+
implementation by each research group. In addition, temporal awareness requires the implementation of a strategy to
|
83 |
+
deal with inconsistent predictions of the system, which is generally not explored in recent studies.
|
84 |
+
To mitigate the above issues, we developed tieval, a Python library that enables the development and evaluation of
|
85 |
+
TIE systems. This framework provides a simple interface to download and read TIE corpora in various formats. It
|
86 |
+
currently covers well-known corpus – such as TempEval-3 UzZaman et al. [2013], TDDiscource Naik et al. [2019], and
|
87 |
+
MeanTime Minard et al. [2016] – however, it lays the foundations for others to be included by providing base classes
|
88 |
+
for the construction of the corpus. It also provides domain-specific operations – such as temporal closure and simple
|
89 |
+
translation of intervals into point relations – that can be used to develop TIE systems. In addition to this, it includes an
|
90 |
+
evaluation infrastructure for a comprehensive assessment of the effectiveness of the different models being evaluated.
|
91 |
+
Because tieval supports the entire development pipeline of TIE, it can also be used to ensure reproducibility and fair
|
92 |
+
benchmarking of future research. The main contributions of tieval are the following:
|
93 |
+
2
|
94 |
+
|
95 |
+
tieval
|
96 |
+
1. it gathers the multiple corpora for the development of TIE systems, making it easy to access with just a few
|
97 |
+
lines of code;
|
98 |
+
2. it facilitates access to domain-specific operations, such as interval to point relation and temporal closure, as
|
99 |
+
well as metrics such as temporal awareness;
|
100 |
+
3. it provides a standard framework, thus making it easy for new methods to be compared against previous ones.
|
101 |
+
The remaining of the paper is organized as follows: The next section, provides an overview of recent work in TIE and
|
102 |
+
some of its software. We then proceed to present the tieval package in section 3. We start with a general introduction
|
103 |
+
and then go into some of its most relevant features. Section 5 serves to present our thoughts on what we strive to be
|
104 |
+
next steps in the development of the framework.
|
105 |
+
2
|
106 |
+
Related Work
|
107 |
+
Extracting temporal information from documents written in natural language in an inter-operable format has long
|
108 |
+
been an interest of the artificial intelligence community Ling and Weld [2010], Derczynski et al. [2015]. Since the
|
109 |
+
introduction of the Time Markup Language (TimeML) Pustejovsky et al. [2003a], in 2003, the temporal graph has
|
110 |
+
become the de-facto standard to represent temporal information. In this graph, the nodes are temporal entities and the
|
111 |
+
edges are the temporal relation that hold between them. The temporal entities can take two forms: event expressions,
|
112 |
+
which are defined as situations that happened (e.g., “went” or “bought”); and temporal expressions (timex), which can
|
113 |
+
convey temporal information explicitly (e.g., “October 27, 199”) or implicitly (e.g., “a few years ago”) Campos et al.
|
114 |
+
[2017]. The temporal relations are held in the form of temporal links (tlink) that contain temporal relations between
|
115 |
+
pairs of events (E-E relations), events and time expressions (E-T relations), and events and document creation time
|
116 |
+
(E-DCT relations), where DCT is a special timex that stores document creation time. Overall, these temporal relations
|
117 |
+
can take thirteen types, which is the number of relations that can exist between two time intervals Allen [1983].
|
118 |
+
The first corpus that was annotated with this scheme was TimeBank Pustejovsky et al. [2003b]. The release of this
|
119 |
+
corpus, dated from 2003, sparked a wave of research in the field later on also used on the TempEval shared tasks
|
120 |
+
UzZaman et al. [2013], Verhagen et al. [2007, 2010]. These tasks end up segmenting TIE into a set of sub-problems
|
121 |
+
that can be conceptually defined as temporal entity identification, tlink identification, and tlink classification. Although
|
122 |
+
some works developed systems for more than one of these sub-tasks, most of the systems are concerned with only one
|
123 |
+
of them. Furthermore, temporal entity identification systems are traditionally partitioned into subsystems for the several
|
124 |
+
classes of temporal entities. For example, for the TimeBank corpus, one system is usually trained to identify events and
|
125 |
+
another to identify timexs. The tieval architecture follows this natural decomposition of the TIE.
|
126 |
+
The TimeBank corpus, and more abstractly, the TimeML annotation scheme was widely studied by the community.
|
127 |
+
Such scrutiny lead to the emergence of several new corpora. Some used the TimeML annotation scheme to create
|
128 |
+
new corpora, such as AQUAINT Graff [2002] and the Platinum corpus UzZaman et al. [2013], while others were
|
129 |
+
concerned in extending the annotation scheme to other languages. The most remarkable effort on this domain was
|
130 |
+
the TempEval-2 shared task Verhagen et al. [2010] that produced corpora for Chinese Li et al. [2014], French Bittar
|
131 |
+
et al. [2011], Italian Caselli et al. [2011], and the Spanish Nieto and Saurí [2012] language. Another noteworthy effort
|
132 |
+
is the MeanTime corpus Minard et al. [2016] in which the authors annotated 120 news articles written in English
|
133 |
+
from Wikinews3, and translated the texts into Italian, Spanish, and Dutch. Costa and Branco Costa and Branco [2012]
|
134 |
+
followed a similar process to construct TimeBankPT, translating the original TimeBank to Portuguese and adapting
|
135 |
+
the annotations when needed. Apart from the extensions to other languages, the TimeML annotation scheme was also
|
136 |
+
extended to other domains. A concrete example is the case of the clinical domain for which two corpora have been
|
137 |
+
produced, the i2b2 Sun et al. [2013] and THYME Styler IV et al. [2014]4. Further significant contributions were the
|
138 |
+
proposals that explored ways to mitigate some of the issues found on the TimeBank annotation effort, such as: sparse
|
139 |
+
annotation – TimeBank-Dense Cassidy et al. [2014] and TDDiscourse Naik et al. [2019]; improve inter-annotator
|
140 |
+
agreement – MATRES Ning et al. [2018a]; and include other sources of knowledge – TCR Ning et al. [2018b] and
|
141 |
+
RED O’Gorman et al. [2016].
|
142 |
+
Aside from the TimeML, and related approaches, there have also been other proposals that were explored by the
|
143 |
+
research community. One of them is absolute timeline placement, in which the temporal entities are directly anchored
|
144 |
+
on a timeline by labeling each entity with the time (or time span) of occurrence. The most remarkable efforts in this
|
145 |
+
direction were produced by Reimers et al. Reimers et al. [2016] – which produced the EventTime corpus by annotating
|
146 |
+
the events in TimeBank with a specific day, or span of days – and Leeuwenberg and Moens Leeuwenberg and Moens
|
147 |
+
3https://en.wikinews.org/
|
148 |
+
4These corpora are not available for open access and, as a consequence, we were not able to include them on the framework.
|
149 |
+
3
|
150 |
+
|
151 |
+
tieval
|
152 |
+
[2020] – which annotated 169 clinical records from the i2b2 corpus with the most likely start and end time of each
|
153 |
+
event along with a lower and upper bound.
|
154 |
+
This shows that several corpora have been introduced for the TIE task. However, the fact that they were released in
|
155 |
+
different formats makes it hard to leverage their power, which is one of the issues mitigated by tieval.
|
156 |
+
To the best of our knowledge, the only framework that made available TIE operations – including temporal closure
|
157 |
+
and temporal awareness – is the Anafora Tools project5 which was built to work with files stored in the Anafora XML
|
158 |
+
format Chen and Styler [2013], used to annotate the THYME corpus Styler IV et al. [2014]. The framework presented
|
159 |
+
in this paper aims to be a more general tool, unifying all corpora in a single format.
|
160 |
+
3
|
161 |
+
tieval
|
162 |
+
Our vision for tieval was to build a framework that would support and facilitate the evaluation of TIE systems. With
|
163 |
+
the development of libraries such as Numpy, TensorFlow, and PyTorch, Python has established itself as the programming
|
164 |
+
language of choice within the machine learning community. For that reason, we built tieval in Python. To facilitate
|
165 |
+
the installation we made it available on Python Package Index (PyPI)6. Thus, the toolkit can be easily installed through
|
166 |
+
pip, as follows:
|
167 |
+
$ pip install tieval==0.0.6
|
168 |
+
In this paper, we will use version 0.0.6, which is the first and the most recent version of the package. However, the
|
169 |
+
reader is advised to install the newest release at the time of reading the paper and refer to the project repository for
|
170 |
+
up-to-date documentation. Furthermore, for users that might be interested in contributing to tieval, we encourage
|
171 |
+
forking the source repository and making a pull request.
|
172 |
+
tieval contains three modules that represent the three cornerstones of any machine learning project: datasets,
|
173 |
+
models, and evaluation. The datasets module is responsible for downloading and reading the corpora available for
|
174 |
+
TIE, the models module is responsible for the construction of the models, and the evaluation module has methods to
|
175 |
+
make a proper evaluation for each of the TIE tasks. In the following sections, we will present the inner workings of the
|
176 |
+
framework with scripts to exemplify the usability of the framework.
|
177 |
+
3.1
|
178 |
+
Datasets
|
179 |
+
With tieval, we wanted to mitigate the issues referred above by making it easy for the user to work with several
|
180 |
+
corpora with a few lines of code. To that end, we developed an architecture that would unify the different annotations
|
181 |
+
and storing formats of the corpus. This architecture is composed of several objects which are depicted in Figure 3.
|
182 |
+
Figure 3: Objects used to represent a dataset on tieval. The arrow represent a relation of “Iterable”.
|
183 |
+
The Dataset object is the final representation of each corpus. It compiles the set of all the documents in the corpus on
|
184 |
+
the documents attribute which is segmented into the train and test attributes whenever provided in the original paper7.
|
185 |
+
Each document is then stored as an instance of the Document class (see the Document grey box in Figure 3), which
|
186 |
+
contains all the information necessary for TIE, more specifically:
|
187 |
+
name a string that contains the name of the document (e.g. “wsj_0026.tml”);
|
188 |
+
5https://github.com/bethard/anaforatools
|
189 |
+
6https://pypi.org/project/tieval/
|
190 |
+
7When no standard train/test split is provided by the authors all the documents are placed on the train attribute.
|
191 |
+
4
|
192 |
+
|
193 |
+
Dataset
|
194 |
+
Document
|
195 |
+
Entity
|
196 |
+
TLink
|
197 |
+
.documents
|
198 |
+
.name
|
199 |
+
.text
|
200 |
+
.source
|
201 |
+
.train
|
202 |
+
.text
|
203 |
+
.value
|
204 |
+
.target
|
205 |
+
.test
|
206 |
+
.dct
|
207 |
+
.endpoints
|
208 |
+
.relation
|
209 |
+
.entities
|
210 |
+
**kwargs
|
211 |
+
**kwargs
|
212 |
+
.tlinkstieval
|
213 |
+
text a string with the raw text of the document;
|
214 |
+
dct is a Timex that contains the document creation time (e.g. Timex("12-10-2004"));
|
215 |
+
entities is the set of Entities – either a Timex or Event – that are annotated on the corpus. Each Entity is, at is core, a
|
216 |
+
data class made to store all the info provided on the annotation. Therefore, it has to be flexible to accommodate
|
217 |
+
for the different types of information provided in different corpus. For instances, the GraphEve corpus provides
|
218 |
+
the lemma for each event while TempEval-2 does not;
|
219 |
+
tlinks a set o TLink’s that stores the temporal relations annotated on the document. Each TLink contains a source and
|
220 |
+
target entity as well as the temporal relation between them – on the relation attribute.
|
221 |
+
A special remark needs to be made about the relation attribute of the TLink object. When initiating a TLink instance
|
222 |
+
one needs to pass the temporal relation that holds between the two temporal entities (the source and the target). In
|
223 |
+
most of the corpora this is one of the thirteen temporal relations Allen [1983] that can hold between two time intervals,
|
224 |
+
however, there are corpora where the annotators were more flexible on the type of relations. Examples of this are the
|
225 |
+
TempEval-2 and the MATRES corpus. On TempEval-2 the annotators were allowed to give more ambiguous relations as
|
226 |
+
“BEFORE-OR-OVERLAP” and “OVERLAP-OR-AFTER”. In MATRES the annotators were asked to provide the temporal
|
227 |
+
relation between the start points of the temporal entities. In order to accommodate the several types of annotations, we
|
228 |
+
build TemporalRelation object, which handles the relation that was annotated. Inside this object, every relation is
|
229 |
+
represented in point relations – instead of the traditional interval relations. Figure 4 shows how to represent the interval
|
230 |
+
relation “BEFORE” into a point relation. A relative relation is also included in the figure for illustrative purposes.
|
231 |
+
Figure 4: Relative timeline of events that can be inferred from the running example.
|
232 |
+
Note that the “BEFORE-OR-OVERLAP” relation on TempEval-2 represents an uncertainty of the annotator between the
|
233 |
+
end time of the source entity and the start time of the target entity, however, the annotator is certain about the remaining
|
234 |
+
point relations. Further note that, although we explicitly state four-point relations in Figure 4, upon the adaptation of
|
235 |
+
the current datasets into tieval format, three of them are redundant, as the point relation “end A < start B” completely
|
236 |
+
defines the remaining point relations. Therefore, on tieval, whenever there is a new dataset to include, the user can
|
237 |
+
provide the relation in the way that is most appropriate, as shown in Listing 1.
|
238 |
+
Listing 1: Different ways to pass the temporal relation to the TLink object. The first argument (X) is the source entity,
|
239 |
+
the second (Y) is the target entity, and the third is the temporal relation between them. This can be passed as an interval
|
240 |
+
relation, “before”, or as a point relation, in the form of a dictionary structure. On the latter, the interpretation for the
|
241 |
+
expected keys is the following: “x” and “y” stands for the source and target entity, respectively; while the “s” and “e”
|
242 |
+
stand for “start” and “end”. As an example, “xe_ys” is the point relation between the source end and the target start.
|
243 |
+
from tieval.links import TLink
|
244 |
+
tl1 = TLink("X", "Y", "before")
|
245 |
+
tl2 = TLink("X", "Y", {"xe_ys": "<"})
|
246 |
+
tl3 = TLink("X", "Y", {"xs_ys": "<", "xs_ye": "<", "xe_ys": "<", "xe_ye": "<" ,})
|
247 |
+
In order to reach a standardized representation for the different corpora, we developed a reader for each of the
|
248 |
+
corpus. Each dataset reader has inherited from an abstract base class, named BaseDocumentReader, which requires the
|
249 |
+
implementation of five methods named after the five attributes used to create an instance of a Document: name, text, dct,
|
250 |
+
entities, and tlinks. To extract this information, the base class contains three attributes: the path for the document being
|
251 |
+
read; the content of the dictionary produced by parsing the document with the xmltodict8 library; and the xml attribute
|
252 |
+
that results from parsing the file with the xml9 library. Note that, while json is nowadays the standard format for the
|
253 |
+
8https://pypi.org/project/xmltodict/
|
254 |
+
9https://docs.python.org/3/library/xml.etree.elementtree.html
|
255 |
+
5
|
256 |
+
|
257 |
+
Relative Relation
|
258 |
+
Interval Relation
|
259 |
+
Point Relationtieval
|
260 |
+
exchange of the information, we had to resort to xml as most datasets were stored in that format. The script presented in
|
261 |
+
Listing 2 illustrates how to read a document from the TempEval-3 corpus with the TempEval3DocumentReader.
|
262 |
+
Listing 2: Read a document of the TempEval-3 corpus.
|
263 |
+
from tieval import datasets
|
264 |
+
path = "tempeval -3/ wsj_0026.tml"
|
265 |
+
reader = datasets.TempEval3DocumentReader(path)
|
266 |
+
doc = reader.read()
|
267 |
+
To fully integrate a new corpus on the library – and automatically read the entire corpus – the user just needs to add
|
268 |
+
an entry on the DATASETS_METADATA dictionary with the metadata necessary to read the document. This information
|
269 |
+
will be used on the read function of the datasets module, which only requires the name of the corpus to produce
|
270 |
+
an instance of the Dataset object with all the annotations provided in there. The script in Listing 3 presents how to
|
271 |
+
perform such operation.
|
272 |
+
Listing 3: Read the TempEval-3 corpus.
|
273 |
+
from tieval import datasets
|
274 |
+
te3 = datasets.read("TempEval -3")
|
275 |
+
The current version of tieval natively supports the download and reading of an extensive list of corpora for TIE. A
|
276 |
+
complete list of the corpora considered is provided in Table 1. In order to ensure long-term support for these corpora,
|
277 |
+
we created a repository with them. Besides that, it also has the advantage that we can standardize the structure of the
|
278 |
+
folders and add useful information to the raw datasets (for instance, the spans of the temporal entities identified on the
|
279 |
+
text) and fix errors on the original annotation10. For that reason, we were careful to verify the license for each of the
|
280 |
+
corpora and publish only the ones that allowed for redistribution or did not provide any license.
|
281 |
+
Table 1: The corpora currently supported on tieval.
|
282 |
+
Language
|
283 |
+
# Docs
|
284 |
+
# Events
|
285 |
+
# Timexs
|
286 |
+
# Tlinks
|
287 |
+
AncientTimes
|
288 |
+
Arabic
|
289 |
+
5
|
290 |
+
0
|
291 |
+
106
|
292 |
+
0
|
293 |
+
Dutch
|
294 |
+
5
|
295 |
+
0
|
296 |
+
130
|
297 |
+
0
|
298 |
+
English
|
299 |
+
5
|
300 |
+
0
|
301 |
+
311
|
302 |
+
0
|
303 |
+
French
|
304 |
+
5
|
305 |
+
0
|
306 |
+
290
|
307 |
+
0
|
308 |
+
German
|
309 |
+
5
|
310 |
+
0
|
311 |
+
196
|
312 |
+
0
|
313 |
+
Italian
|
314 |
+
5
|
315 |
+
0
|
316 |
+
234
|
317 |
+
0
|
318 |
+
Spanish
|
319 |
+
5
|
320 |
+
0
|
321 |
+
217
|
322 |
+
0
|
323 |
+
Vietnamese
|
324 |
+
4
|
325 |
+
0
|
326 |
+
120
|
327 |
+
0
|
328 |
+
Aquaint
|
329 |
+
English
|
330 |
+
72
|
331 |
+
4,351
|
332 |
+
639
|
333 |
+
5,832
|
334 |
+
EventTime
|
335 |
+
English
|
336 |
+
36
|
337 |
+
1,498
|
338 |
+
0
|
339 |
+
0
|
340 |
+
GraphEVE
|
341 |
+
English
|
342 |
+
103
|
343 |
+
4,298
|
344 |
+
0
|
345 |
+
18,204
|
346 |
+
KRAUTS
|
347 |
+
German
|
348 |
+
192
|
349 |
+
0
|
350 |
+
1,282
|
351 |
+
0
|
352 |
+
MATRES
|
353 |
+
English
|
354 |
+
274
|
355 |
+
6,065
|
356 |
+
0
|
357 |
+
13,504
|
358 |
+
MeanTime
|
359 |
+
English
|
360 |
+
120
|
361 |
+
1,882
|
362 |
+
349
|
363 |
+
1,753
|
364 |
+
Spanish
|
365 |
+
120
|
366 |
+
2,000
|
367 |
+
344
|
368 |
+
1,975
|
369 |
+
Dutch
|
370 |
+
120
|
371 |
+
1,346
|
372 |
+
346
|
373 |
+
1,487
|
374 |
+
Italian
|
375 |
+
120
|
376 |
+
1,980
|
377 |
+
338
|
378 |
+
1,675
|
379 |
+
Narrative Container
|
380 |
+
English
|
381 |
+
63
|
382 |
+
3,559
|
383 |
+
439
|
384 |
+
737
|
385 |
+
Continued on next page
|
386 |
+
10The changes made on the original corpus are detailed on the file logbook.rst in the docs folder of the project repository.
|
387 |
+
6
|
388 |
+
|
389 |
+
tieval
|
390 |
+
Table 1: The corpora currently supported on tieval. (Continued)
|
391 |
+
Professor Heideltime
|
392 |
+
English
|
393 |
+
24,642
|
394 |
+
0
|
395 |
+
254,803
|
396 |
+
0
|
397 |
+
French
|
398 |
+
27,154
|
399 |
+
0
|
400 |
+
83,431
|
401 |
+
0
|
402 |
+
German
|
403 |
+
19,095
|
404 |
+
0
|
405 |
+
194,043
|
406 |
+
0
|
407 |
+
Italian
|
408 |
+
9,619
|
409 |
+
0
|
410 |
+
58,823
|
411 |
+
0
|
412 |
+
Portuguese
|
413 |
+
24,293
|
414 |
+
0
|
415 |
+
111,810
|
416 |
+
0
|
417 |
+
Spanish
|
418 |
+
33,266
|
419 |
+
0
|
420 |
+
348,011
|
421 |
+
0
|
422 |
+
Platinum (TempEval-3)
|
423 |
+
English
|
424 |
+
20
|
425 |
+
748
|
426 |
+
158
|
427 |
+
929
|
428 |
+
TimeBank
|
429 |
+
Spanish
|
430 |
+
210
|
431 |
+
12,384
|
432 |
+
1,532
|
433 |
+
21,107
|
434 |
+
French
|
435 |
+
108
|
436 |
+
2,115
|
437 |
+
533
|
438 |
+
2,303
|
439 |
+
Portuguese
|
440 |
+
182
|
441 |
+
7,887
|
442 |
+
1,409
|
443 |
+
6,538
|
444 |
+
English
|
445 |
+
183
|
446 |
+
6,681
|
447 |
+
1,426
|
448 |
+
5,120
|
449 |
+
TimeBank 1.2
|
450 |
+
English
|
451 |
+
183
|
452 |
+
7,940
|
453 |
+
1,414
|
454 |
+
6,413
|
455 |
+
TCR
|
456 |
+
English
|
457 |
+
25
|
458 |
+
1,134
|
459 |
+
242
|
460 |
+
3,515
|
461 |
+
TDDiscourse
|
462 |
+
English
|
463 |
+
34
|
464 |
+
1,101
|
465 |
+
0
|
466 |
+
6,150
|
467 |
+
TempEval 2
|
468 |
+
Chinese
|
469 |
+
52
|
470 |
+
4,783
|
471 |
+
946
|
472 |
+
7,802
|
473 |
+
English
|
474 |
+
182
|
475 |
+
6,656
|
476 |
+
1,390
|
477 |
+
5,945
|
478 |
+
French
|
479 |
+
83
|
480 |
+
1,301
|
481 |
+
367
|
482 |
+
372
|
483 |
+
Italian
|
484 |
+
64
|
485 |
+
5,377
|
486 |
+
653
|
487 |
+
6,884
|
488 |
+
Korean
|
489 |
+
18
|
490 |
+
2,583
|
491 |
+
317
|
492 |
+
0
|
493 |
+
Spanish
|
494 |
+
210
|
495 |
+
12,384
|
496 |
+
1,502
|
497 |
+
13,304
|
498 |
+
English
|
499 |
+
275
|
500 |
+
11,780
|
501 |
+
2,223
|
502 |
+
11,881
|
503 |
+
TimeBank Dense
|
504 |
+
English
|
505 |
+
36
|
506 |
+
1,712
|
507 |
+
289
|
508 |
+
12,715
|
509 |
+
TrainT3 (TempEval-3)
|
510 |
+
Spanish
|
511 |
+
175
|
512 |
+
10,686
|
513 |
+
1,269
|
514 |
+
17,283
|
515 |
+
Wikiwars
|
516 |
+
English
|
517 |
+
22
|
518 |
+
0
|
519 |
+
2,662
|
520 |
+
0
|
521 |
+
German
|
522 |
+
22
|
523 |
+
0
|
524 |
+
2,239
|
525 |
+
0
|
526 |
+
3.2
|
527 |
+
Models
|
528 |
+
The current version of tieval has four built-in models, namely: a baseline for timex identification; the HeidelTime
|
529 |
+
model Strötgen et al. [2013] for timex identification and classification; a baseline for event identification; and the
|
530 |
+
CogCompTime 2.0 model Ning et al. [2019] for tlink classification. The availability of these four models is intended for
|
531 |
+
practitioners that may want to experiment using any layer of temporal information in their specific application. Apart
|
532 |
+
from that, it also provide researchers the implementation of baseline models for reference in their work.
|
533 |
+
For the baseline models, we provide pre-trained weights, however, the user can also train the model from scratch. A
|
534 |
+
description of each of the models is provided below:
|
535 |
+
TimexIdentificationBaseline For this baseline we trained – from scratch – the spaCy11 named entity recognition
|
536 |
+
model to identify the timexs on the TempEval-3 corpus.
|
537 |
+
EventIdentificationBaseline This model has the same architecture of the TimexIdentificationBaseline but was
|
538 |
+
trained to identify events rather than timexs on the TempEval-3 corpus.
|
539 |
+
HeidelTime This model is a widely recognized multilingual temporal tagger which was original written in Java12.
|
540 |
+
However there have been efforts to build python wrappers. In tieval we used the py_heideltime wrapper
|
541 |
+
which is available on GitHub13.
|
542 |
+
11https://spacy.io/
|
543 |
+
12https://github.com/HeidelTime/heideltime
|
544 |
+
13https://github.com/hmosousa/py_heideltime
|
545 |
+
7
|
546 |
+
|
547 |
+
tieval
|
548 |
+
CogCompTime2 This model leverages the ELMo Peters et al. [2018] word embeddings and the TempProb Ning et al.
|
549 |
+
[2018c] knowledge base to classify the temporal relation between a pair of temporal entities Ning et al. [2019].
|
550 |
+
Our implementation was adapted from the repository made available14 by the authors.
|
551 |
+
Listing 4 presents a script that would download the baseline model for temporal expression identification
|
552 |
+
(TimexIdentificationBaseline), train the model on the TempEval-3 train set, and produce predictions for the
|
553 |
+
TempEval-3 test set.
|
554 |
+
Listing 4: How to download, train, and predict with for the temporal identification task.
|
555 |
+
from tieval import models
|
556 |
+
model = model.TimexIdentificationBaseline ()
|
557 |
+
model.fit(te3.train)
|
558 |
+
predictions = model.predict(te3.test)
|
559 |
+
A user interested in releasing his/her model in tieval can do it by creating a subclass of one of our base classes for
|
560 |
+
models. There are two base classes: a BaseModel which just requires the implementation of the predict method
|
561 |
+
which is intended for models that are available in other repositories – for instance, the HeidelTime model – and a
|
562 |
+
BaseTrainableModel which, besides the predict, requires the implementation of the fit method, which implements
|
563 |
+
the training loop for the model.
|
564 |
+
3.3
|
565 |
+
Evaluation
|
566 |
+
tieval provides an evaluation function for four subtasks of TIE, more specifically: timex identification, event
|
567 |
+
identification, tlink identification, and tlink classification.
|
568 |
+
Table 2: The results obtained by evaluating the four models integrated in tieval on the Platinum (TempEval-3 test set),
|
569 |
+
TCR, and MeanTime (the English version) corpus. P stands for precision, R for recall, F1 is the F1-score, and TF1 is
|
570 |
+
the temporal awareness. All the results in the table are micro metrics.
|
571 |
+
Platinum
|
572 |
+
TCR
|
573 |
+
MeanTime
|
574 |
+
P
|
575 |
+
R
|
576 |
+
F1 (TF1)
|
577 |
+
P
|
578 |
+
R
|
579 |
+
F1 (TF1)
|
580 |
+
P
|
581 |
+
R
|
582 |
+
F1 (TF1)
|
583 |
+
TimexBaseline
|
584 |
+
88.1
|
585 |
+
75.4
|
586 |
+
81.2
|
587 |
+
75.4
|
588 |
+
82.0
|
589 |
+
78.6
|
590 |
+
23.7
|
591 |
+
57.1
|
592 |
+
33.5
|
593 |
+
HeidelTime
|
594 |
+
84.0
|
595 |
+
79.4
|
596 |
+
81.8
|
597 |
+
70.6
|
598 |
+
80.6
|
599 |
+
75.3
|
600 |
+
26.5
|
601 |
+
65.8
|
602 |
+
37.8
|
603 |
+
EventBaseline
|
604 |
+
74.6
|
605 |
+
80.5
|
606 |
+
77.5
|
607 |
+
48.3
|
608 |
+
92.6
|
609 |
+
63.5
|
610 |
+
25.8
|
611 |
+
54.1
|
612 |
+
34.9
|
613 |
+
CogCompTime2
|
614 |
+
39.7
|
615 |
+
39.7
|
616 |
+
39.7 (39.3)
|
617 |
+
75.4
|
618 |
+
75.4
|
619 |
+
75.4 (69.3)
|
620 |
+
30.7
|
621 |
+
28.6
|
622 |
+
29.6 (28.9)
|
623 |
+
The input is standard for all the evaluation functions: annotations, a dictionary with the name of the documents
|
624 |
+
as keys and the annotations as values; predictions, follows the same structure of the annotations but for each
|
625 |
+
document key contains the predictions made by a model. The output of the functions is dependent on the task being
|
626 |
+
evaluated. For the identification tasks (timex, event, and tlink) the function produces the standard macro and micro
|
627 |
+
metrics for precision, recall, and f1-score. Listing 5 presents a script that evaluates the predictions made by the event
|
628 |
+
baseline model in the TempEval-3 test set.
|
629 |
+
Listing 5: Evaluate event baseline model on the TempEval-3 test set.
|
630 |
+
from tieval import evaluate
|
631 |
+
annotations = {doc.name: doc.events for doc in te3.test}
|
632 |
+
result = evaluate.event_identification(annotations , predictions)
|
633 |
+
Table 2 depicts the results obtained by the implemented on benchmark corpora. Note that TF1 is the temproal awareness
|
634 |
+
metric and is only computed for CogCompTime2 (the only tlink classification system). Another interesting remark is
|
635 |
+
the fact that the TimexBaseline achieves effectiveness comparable to HeidelTime despite its simplicity.
|
636 |
+
The tlink classification is the most elaborate evaluator as it also computes the temporal awareness metric UzZaman and
|
637 |
+
Allen [2011]. The complexity of the calculation of temporal awareness lies in the computation of temporal closure. With
|
638 |
+
temporal_closure the closure operation can be easily performed on the document level, with the closure method of
|
639 |
+
14https://github.com/qiangning/NeuralTemporalRelation-EMNLP19
|
640 |
+
8
|
641 |
+
|
642 |
+
tieval
|
643 |
+
the Document object, or applied to a set of tlink’s with the temporal_closure function available on the library. The
|
644 |
+
script in Listing 6 illustrates how to perform such operations.
|
645 |
+
Listing 6: How to compute the temporal closure with a Document object and with a set of TLink’s.
|
646 |
+
from tieval import temporal_closure
|
647 |
+
doc = te3["wsj_0026.tml"]
|
648 |
+
closure_tlinks = doc.closure
|
649 |
+
closure_tlinks = temporal_closure(doc.tlinks)
|
650 |
+
For the temporal closure to be efficiently performed, on the back-end, the closure operation is executed with a point-
|
651 |
+
based reasoner which was inspired by the work of Gerevini et al. Gerevini et al. [1993]. As stated above, each TLink
|
652 |
+
instance contains an attribute named relation which is an instance of the TemporalRelation object. Within the
|
653 |
+
TemporalRelation all temporal relations are represented as the point relations by the means of a PointRelation
|
654 |
+
instance. In the point representation there are only four types of temporal relations, namely before (<), after (>), equal
|
655 |
+
(=), and not defined (None). With this point relation one can build a directed graph (henceforth referred as timegraph)
|
656 |
+
where the nodes are the entities endpoints (start and end of the entity) and the edges represent the before (<) relation.
|
657 |
+
This is accomplished by reflecting the after (>) relations and aggregating the equal (=) relations in a single node.
|
658 |
+
In the timegraph, inferring temporal relations is reduced to the problem of finding if two entities endpoints are connected,
|
659 |
+
i.e., they are in the same subgraph (by subgraph we mean a fully connected graph of the timegraph). If that is the case,
|
660 |
+
one can retrieve the endpoints on the entity pair and validate if the order of the entity endpoints is a valid temporal
|
661 |
+
relation. To clarify this concept, Figure 5 presents the timegraph built for a scenario where two tlinks were provided:
|
662 |
+
X MEETS Y and Y STARTS Z. To infer the temporal relation between X and Z one must query the endpoints in the
|
663 |
+
timegraph. In this case, one would get the following sequence of endpoints: sX < ex = sZ < eZ. After retrieving the
|
664 |
+
sequence of endpoints one just needs to validate if that sequence is a valid interval relation. In this example, one can
|
665 |
+
conclude that the temporal relation between X and Z is MEETS.
|
666 |
+
Figure 5: On the top part of the image is the relative relations between entities X, Y, and Z. On the bottom is the
|
667 |
+
graphical representation of the timegraph that would be generated.
|
668 |
+
To get a practical understanding of the runtime of the temporal closure algorithm, we executed it on all documents
|
669 |
+
currently available intieval. On a computer with an Intel Core i5-8500 CPU, the algorithm took less than half a second
|
670 |
+
for 95% of the documents, while the worst-case scenario took roughly 1.6 seconds.
|
671 |
+
This finalizes the presentation of the main functionalities, and some inner workings, of the first version of tieval. The
|
672 |
+
current version already provides functionalities that (we believe) will be beneficial for the TIE community. However,
|
673 |
+
we already have some ideas to further improve this library. These ideas are discussed in section 5.
|
674 |
+
4
|
675 |
+
Observations
|
676 |
+
While building tieval, and in particular the datasets module, we found some inconsistencies in the corpus we were
|
677 |
+
working with. For instances, we found that the articles APW20000115.0209 and APW20000107.0088 of the AQUAINT
|
678 |
+
corpus contained the same news article, differing only in the annotations and in the value of the document creation
|
679 |
+
time. This type of inconsistencies were mitigated by implementing data cleaning processes that changed the original
|
680 |
+
annotations. Consequently, the results on the tieval framework will (most frequently) not resemble the exact result
|
681 |
+
that was reported in previous works, even if the same model is employed.
|
682 |
+
9
|
683 |
+
|
684 |
+
Relative Relation
|
685 |
+
Timegraphtieval
|
686 |
+
5
|
687 |
+
Conclusion and Future Work
|
688 |
+
This work presented the first public release of the tieval package, an open-source Python library for the development
|
689 |
+
and evaluation of TIE systems. tieval provides several functionalities to facilitate research in this field. These include
|
690 |
+
the import of multiple benchmark corpora in different formats, domain-specific operations such as temporal closure or
|
691 |
+
transformation from interval to point relations, out-of-the-box baseline systems, and evaluation measures for TIE tasks.
|
692 |
+
Therefore, it provides the community with a standard way to benchmark TIE systems in a fair and comparable way,
|
693 |
+
while enabling the development of reproducible systems.
|
694 |
+
For future versions of the package, we aim to extend its functionalities. One idea we are keen to implement is
|
695 |
+
visualization techniques to display the relative timeline of events from the annotations. In addition, we will add methods
|
696 |
+
to include other levels of information when available such as coreference resolution in the MeanTime corpus Minard
|
697 |
+
et al. [2016] and causality relations in the TCR corpus Ning et al. [2018b]. We also intend to extend the list of supported
|
698 |
+
corpora and baseline models, in particular, to support corpora that cast the TIE task as a question-answer problem, such
|
699 |
+
as MCTaco Zhou et al. [2019] and TORQUE Ning et al. [2020]. This will allow us to produce a reproducibility study to
|
700 |
+
investigate several state-of-the-art systems and benchmark them in the different corpora.
|
701 |
+
References
|
702 |
+
Ricardo Campos, Gaël Dias, Alípio M Jorge, and Adam Jatowt. Survey of temporal information retrieval and related
|
703 |
+
applications. ACM Computing Surveys (CSUR), 47(2):1–41, 2014.
|
704 |
+
Artuur Leeuwenberg and Marie-Francine Moens. A survey on temporal reasoning for temporal information extraction
|
705 |
+
from text. Journal of Artificial Intelligence Research, 66:341–380, 2019.
|
706 |
+
Aakanksha Naik, Luke Breitfeller, and Carolyn Rose. Tddiscourse: A dataset for discourse-level temporal ordering of
|
707 |
+
events. In Proceedings of the 20th Annual SIGdial Meeting on Discourse and Dialogue, pages 239–249, 2019.
|
708 |
+
Qiang Ning, Hao Wu, and Dan Roth. A multi-axis annotation scheme for event temporal relations. arXiv preprint
|
709 |
+
arXiv:1804.07828, 2018a.
|
710 |
+
Naushad UzZaman, Hector Llorens, Leon Derczynski, James Allen, Marc Verhagen, and James Pustejovsky. Semeval-
|
711 |
+
2013 task 1: Tempeval-3: Evaluating time expressions, events, and temporal relations. In Second Joint Conference
|
712 |
+
on Lexical and Computational Semantics (* SEM), Volume 2: Proceedings of the Seventh International Workshop on
|
713 |
+
Semantic Evaluation (SemEval 2013), pages 1–9, 2013.
|
714 |
+
Marc Verhagen, Robert Gaizauskas, Frank Schilder, Mark Hepple, Graham Katz, and James Pustejovsky. Semeval-2007
|
715 |
+
task 15: Tempeval temporal relation identification. In Proceedings of the Fourth International Workshop on Semantic
|
716 |
+
Evaluations (SemEval-2007), pages 75–80, 2007.
|
717 |
+
Marc Verhagen, Roser Sauri, Tommaso Caselli, and James Pustejovsky. Semeval-2010 task 13: Tempeval-2. In
|
718 |
+
Proceedings of the 5th International Workshop on Semantic Evaluation, pages 57–62, 2010.
|
719 |
+
Naushad UzZaman and James Allen. Temporal evaluation. In Proceedings of the 49th Annual Meeting of the Association
|
720 |
+
for Computational Linguistics: Human Language Technologies, pages 351–356, 2011.
|
721 |
+
Anne-Lyse Minard, Manuela Speranza, Ruben Urizar, Begona Altuna, Marieke Van Erp, Anneleen Schoen, and Chantal
|
722 |
+
Van Son. Meantime, the newsreader multilingual event and time corpus. In Proceedings of the Tenth International
|
723 |
+
Conference on Language Resources and Evaluation (LREC’16), pages 4417–4422, 2016.
|
724 |
+
Xiao Ling and Daniel S Weld. Temporal information extraction. In Twenty-Fourth AAAI Conference on Artificial
|
725 |
+
Intelligence, 2010.
|
726 |
+
Leon Derczynski, Jannik Strotgen, Ricardo Campos, and Omar Alonso. Time and information retrieval: Introduction to
|
727 |
+
the special issue. Inf. Process. Manag., 51:786–790, 2015.
|
728 |
+
James Pustejovsky, José M Castano, Robert Ingria, Roser Sauri, Robert J Gaizauskas, Andrea Setzer, Graham Katz,
|
729 |
+
and Dragomir R Radev. Timeml: Robust specification of event and temporal expressions in text. New Directions in
|
730 |
+
Question Answering, 3:28–34, 2003a.
|
731 |
+
Ricardo Campos, Gaël Dias, Alípio Mário Jorge, and Célia Nunes. Identifying top relevant dates for implicit time
|
732 |
+
sensitive queries. Information Retrieval Journal, 20(4):363–398, 2017.
|
733 |
+
James F Allen. Maintaining knowledge about temporal intervals. Communications of the ACM, 26(11):832–843, 1983.
|
734 |
+
James Pustejovsky, Patrick Hanks, Roser Sauri, Andrew See, Robert Gaizauskas, Andrea Setzer, Dragomir Radev,
|
735 |
+
Beth Sundheim, David Day, Lisa Ferro, et al. The timebank corpus. In Corpus Linguistics, volume 2003, page 40.
|
736 |
+
Lancaster, UK., 2003b.
|
737 |
+
10
|
738 |
+
|
739 |
+
tieval
|
740 |
+
David Graff. The AQUAINT Corpus of English News Text LDC2002T31. Linguistic Data Consortium, 2002.
|
741 |
+
Hui Li, Jannik Strötgen, Julian Zell, and Michael Gertz. Chinese temporal tagging with heideltime. In Proceedings of
|
742 |
+
the 14th Conference of the European Chapter of the Association for Computational Linguistics, Volume 2: Short
|
743 |
+
Papers, pages 133–137, 2014.
|
744 |
+
André Bittar, Pascal Amsili, Pascal Denis, and Laurence Danlos. French timebank: an iso-timeml annotated reference
|
745 |
+
corpus. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human
|
746 |
+
Language Technologies, pages 130–134, 2011.
|
747 |
+
Tommaso Caselli, Valentina Bartalesi Lenzi, Rachele Sprugnoli, Emanuele Pianta, and Irina Prodanof. Annotating
|
748 |
+
events, temporal expressions and relations in italian: the it-timeml experience for the ita-timebank. In Proceedings of
|
749 |
+
the 5th Linguistic Annotation Workshop, pages 143–151, 2011.
|
750 |
+
Marta Guerrero Nieto and Roser Saurí. Modes timebank 1.0. Linguistic Data Consortium (LDC), Philadelphia, PA,
|
751 |
+
USA, 2012.
|
752 |
+
Francisco Costa and António Branco. TimeBankPT: A TimeML annotated corpus of Portuguese. In Proceedings
|
753 |
+
of the Eighth International Conference on Language Resources and Evaluation (LREC’12), pages 3727–3734,
|
754 |
+
Istanbul, Turkey, May 2012. European Language Resources Association (ELRA). URL http://www.lrec-conf.
|
755 |
+
org/proceedings/lrec2012/pdf/246_Paper.pdf.
|
756 |
+
Weiyi Sun, Anna Rumshisky, and Ozlem Uzuner. Evaluating temporal relations in clinical text: 2012 i2b2 challenge.
|
757 |
+
Journal of the American Medical Informatics Association, 20(5):806–813, 2013.
|
758 |
+
William F Styler IV, Steven Bethard, Sean Finan, Martha Palmer, Sameer Pradhan, Piet C De Groen, Brad Erickson,
|
759 |
+
Timothy Miller, Chen Lin, Guergana Savova, et al. Temporal annotation in the clinical domain. Transactions of the
|
760 |
+
Association for Computational Linguistics, 2:143–154, 2014.
|
761 |
+
Taylor Cassidy, Bill McDowell, Nathanel Chambers, and Steven Bethard. An annotation framework for dense event
|
762 |
+
ordering. Technical report, CARNEGIE-MELLON UNIV PITTSBURGH PA, 2014.
|
763 |
+
Qiang Ning, Zhili Feng, Hao Wu, and Dan Roth. Joint reasoning for temporal and causal relations. arXiv preprint
|
764 |
+
arXiv:1906.04941, 2018b.
|
765 |
+
Tim O’Gorman, Kristin Wright-Bettner, and Martha Palmer. Richer event description: Integrating event coreference
|
766 |
+
with temporal, causal and bridging annotation. In Proceedings of the 2nd Workshop on Computing News Storylines
|
767 |
+
(CNS 2016), pages 47–56, 2016.
|
768 |
+
Nils Reimers, Nazanin Dehghani, and Iryna Gurevych. Temporal anchoring of events for the timebank corpus. In
|
769 |
+
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers),
|
770 |
+
pages 2195–2204, 2016.
|
771 |
+
Artuur Leeuwenberg and Marie-Francine Moens. Towards extracting absolute event timelines from english clinical
|
772 |
+
reports. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 28:2710–2719, 2020.
|
773 |
+
Wei-Te Chen and Will Styler.
|
774 |
+
Anafora: A web-based general purpose annotation tool.
|
775 |
+
In Proceedings of the
|
776 |
+
2013 NAACL HLT Demonstration Session, pages 14–19. Association for Computational Linguistics, 2013. URL
|
777 |
+
http://www.aclweb.org/anthology/N13-3004.
|
778 |
+
Jannik Strötgen, Julian Zell, and Michael Gertz. Heideltime: Tuning english and developing spanish resources for
|
779 |
+
tempeval-3. In Second Joint Conference on Lexical and Computational Semantics (* SEM), Volume 2: Proceedings
|
780 |
+
of the Seventh International Workshop on Semantic Evaluation (SemEval 2013), pages 15–19, 2013.
|
781 |
+
Qiang Ning, Sanjay Subramanian, and Dan Roth. An improved neural baseline for temporal relation extraction. arXiv
|
782 |
+
preprint arXiv:1909.00429, 2019.
|
783 |
+
Matthew E. Peters, Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher Clark, Kenton Lee, and Luke Zettlemoyer.
|
784 |
+
Deep contextualized word representations. In NAACL, 2018.
|
785 |
+
Qiang Ning, Hao Wu, Haoruo Peng, and Dan Roth. Improving temporal relation extraction with a globally acquired
|
786 |
+
statistical resource. arXiv preprint arXiv:1804.06020, 2018c.
|
787 |
+
Alfonso Gerevini, Lenhart Schubert, and Stephanie Schaeffer. Temporal reasoning in timegraph i–ii. ACM SIGART
|
788 |
+
Bulletin, 4(3):21–25, 1993.
|
789 |
+
Ben Zhou, Daniel Khashabi, Qiang Ning, and Dan Roth. " going on a vacation" takes longer than" going for a walk": A
|
790 |
+
study of temporal commonsense understanding. arXiv preprint arXiv:1909.03065, 2019.
|
791 |
+
Qiang Ning, Hao Wu, Rujun Han, Nanyun Peng, Matt Gardner, and Dan Roth. Torque: A reading comprehension
|
792 |
+
dataset of temporal ordering questions. arXiv preprint arXiv:2005.00242, 2020.
|
793 |
+
11
|
794 |
+
|
6NE3T4oBgHgl3EQfpgqP/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
8NAzT4oBgHgl3EQfE_qO/content/tmp_files/2301.01003v1.pdf.txt
ADDED
@@ -0,0 +1,867 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Astronomy & Astrophysics manuscript no. main
|
2 |
+
©ESO 2023
|
3 |
+
January 4, 2023
|
4 |
+
Letter to the Editor
|
5 |
+
Polarised radio pulsations from a new T dwarf binary
|
6 |
+
H. K. Vedantham1, 2, Trent J. Dupuy3, E. L. Evans3, A. Sanghi4, J. R. Callingham1, 5, T. W. Shimwell1, 5, W. M. J.
|
7 |
+
Best5, M. C. Liu6 and P. Zarka7
|
8 |
+
1 ASTRON, Netherlands Institute for Radio Astronomy, Oude Hoogeveensedijk 4, Dwingeloo, 7991 PD, The Netherlands
|
9 |
+
2 Kapteyn Astronomical Institute, University of Groningen, PO Box 72, 97200 AB, Groningen, The Netherlands
|
10 |
+
3 Institute for Astronomy, University of Edinburgh, Royal Observatory, Blackford Hill, Edinburgh, EH9 3HJ, UK
|
11 |
+
4 The University of Texas at Austin, Department of Astronomy, 2515 Speedway, C1400, Austin, TX 78712, USA
|
12 |
+
5 Leiden Observatory, Leiden University, PO Box 9513, 2300 RA, Leiden, The Netherlands
|
13 |
+
6 Institute for Astronomy, University of Hawaii, 2680 Woodlawn Drive, Honolulu, HI 96822, USA
|
14 |
+
7 LESIA, CNRS – Observatoire de Paris, PSL 92190, Meudon, France
|
15 |
+
Received XXX; accepted YYY
|
16 |
+
ABSTRACT
|
17 |
+
Brown dwarfs display Jupiter-like auroral phenomena such as magnetospheric Hα emission and coherent radio emission. Coherent
|
18 |
+
radio emission is a probe of magnetospheric acceleration mechanisms and provides a direct measurement of the magnetic field strength
|
19 |
+
at the emitter’s location, both of which are difficult to access by other means. Observations of the coldest brown dwarfs (spectral
|
20 |
+
types T and Y) are particularly interesting as their magnetospheric phenomena may be very similar to those in gas-giant exoplanets.
|
21 |
+
Here we present 144 MHz radio and infrared adaptive optics observations of the brown dwarf WISEP J101905.63+652954.2 made
|
22 |
+
using the LOFAR and Keck telescopes respectively. The radio data shows pulsed highly circularly polarised emission which yields a
|
23 |
+
rotation rate of 0.32 ± 0.03 hr−1. The infrared imaging reveals the source to be a binary with a projected separation of 423.0 ± 1.6 mas
|
24 |
+
between components of spectral type T5.5 ± 0.5 and T7.0 ± 0.5. With a simple “toy model” we show that the radio emission can
|
25 |
+
in principle be powered by the interaction between the two dwarfs with a mass-loss rates of at least 25 times the Jovian value.
|
26 |
+
WISEP J101905.63+652954.2 is interesting because it is the first pulsed methane dwarf detected in a low radio-frequency search.
|
27 |
+
Unlike previous gigahertz-frequency searches that were only sensitive to objects with kiloGauss fields, our low-frequency search is
|
28 |
+
sensitive to surface magnetic fields of ≈ 50 Gauss and above which might reveal the coldest radio-loud objects down to planetary
|
29 |
+
mass-scales.
|
30 |
+
1. Introduction
|
31 |
+
High energy charges around brown dwarfs are expected to be
|
32 |
+
created by auroral (or magnetospheric) processes akin to that
|
33 |
+
seen on gas-giant planets, as opposed to coronal and chro-
|
34 |
+
mospheric acceleration expected on stars (Nichols et al. 2012;
|
35 |
+
Williams 2018; Turnpenney et al. 2017). This paradigm has
|
36 |
+
been established based on highly circularly polarised and ro-
|
37 |
+
tationally modulated radio pulses and Hα emission observed
|
38 |
+
on brown dwarfs (Hallinan et al. 2007, 2008, 2015; Route &
|
39 |
+
Wolszczan 2012, 2016a; Williams et al. 2017). The radio emis-
|
40 |
+
sion is of particular interest because it is expected to occur at
|
41 |
+
the local cyclotron frequency, which in the non-relativistic limit,
|
42 |
+
only depends on the ambient magnetic field strength (Melrose
|
43 |
+
& Dulk 1982). Because Zeeman splitting observations become
|
44 |
+
very challenging in such cold objects as brown dwarfs due to
|
45 |
+
the lack of non-broadened spectral lines, radio observations may
|
46 |
+
be the only viable technique to directly measure their magnetic
|
47 |
+
field strengths and topologies. In addition, unlike rocky plan-
|
48 |
+
ets, gas giants and brown dwarfs have predictable and relatively
|
49 |
+
simple internal structures at depths where their magnetic field
|
50 |
+
is expected to be generated (Chabrier & Baraffe 2000). This
|
51 |
+
makes them ideal targets to test dynamo scaling laws (e.g., Chris-
|
52 |
+
tensen et al. 2009) that are likely applicable even in the exoplanet
|
53 |
+
regime.
|
54 |
+
Despite concerted searches, radio detections of the cold-
|
55 |
+
est brown dwarfs are rare. The coldest, spectral type Y brown
|
56 |
+
dwarfs have not been detected in the radio (Kao et al. 2019). At
|
57 |
+
the warmer spectral type T, four brown dwarfs have been de-
|
58 |
+
tected in dedicated surveys at radio frequencies of 5 GHz and
|
59 |
+
above (Route & Wolszczan 2012; Kao et al. 2016; Route &
|
60 |
+
Wolszczan 2016b,a; Kao et al. 2016, 2018). Recently, we re-
|
61 |
+
ported the first direct discovery of a brown dwarf made by virtue
|
62 |
+
of its radio emission (Vedantham et al. 2020) using the LO-
|
63 |
+
FAR radio telescope (van Haarlem et al. 2013) at 144 MHz.
|
64 |
+
Here we report our second discovery also made with LO-
|
65 |
+
FAR. WISEP J101905.63+652954.2 was originally discovered
|
66 |
+
by Kirkpatrick et al. (2011) in Wide-field Infrared Survey Ex-
|
67 |
+
plorer (WISE) data (Wright et al. 2010) and, using spectroscopic
|
68 |
+
data, assigned optical and near-infrared spectral types of T7 and
|
69 |
+
T6, respectively.
|
70 |
+
Cold brown dwarfs share their radio phenomenology with
|
71 |
+
Jupiter. The radio emission consists of two components. A quasi-
|
72 |
+
quiescent component that is unpolarised or weakly polarised and
|
73 |
+
a highly circularly polarised pulsed component that repeats at
|
74 |
+
the rotation rate (Williams 2018; Antonova et al. 2013; Hallinan
|
75 |
+
et al. 2008; Berger 2006). However, the radio energetics of the
|
76 |
+
detected brown dwarfs is orders of magnitude larger than that
|
77 |
+
seen in Jupiter. This combined with a lack of detection of UV or
|
78 |
+
H3+ from brown dwarfs (Saur et al. 2021; Gibbs & Fitzgerald
|
79 |
+
2022) suggest that the Jovian auroral energetics cannot be simply
|
80 |
+
scaled to brown dwarfs. In any case, magnetic field lower lim-
|
81 |
+
its derived from the pulsed component in three of the detected
|
82 |
+
T dwarfs have been over a factor of three larger than the pre-
|
83 |
+
dictions of leading dynamo scaling laws that can successfully
|
84 |
+
predict the field strength of some solar system planets and low
|
85 |
+
mass stars (Kao et al. 2018). This suggests that the model is
|
86 |
+
inadequate, or it is also possible that by virtue of observing at
|
87 |
+
Article number, page 1 of 7
|
88 |
+
arXiv:2301.01003v1 [astro-ph.SR] 3 Jan 2023
|
89 |
+
|
90 |
+
A&A proofs: manuscript no. main
|
91 |
+
high frequencies, the previous radio surveys were only sensitive
|
92 |
+
to objects with anomalously large magnetic fields. For instance,
|
93 |
+
Christensen et al. (2009) predict a field strength of 103 Gauss for
|
94 |
+
a 50 MJup brown dwarf with an age of 109 yr and a surface tem-
|
95 |
+
perature of 1500 K (late-L dwarf). The corresponding peak cy-
|
96 |
+
clotron frequency in its magnetosphere is about 2.8 GHz which
|
97 |
+
will make such an object undetectable in a 5 GHz survey even
|
98 |
+
if it were ‘typical’ of the predicted population. The 144 MHz
|
99 |
+
LOFAR data can detect objects with surface field strengths as
|
100 |
+
low as 50 G. Therefore, the LOFAR-detected objects such as
|
101 |
+
WISEP J101905.63+652954.2 are beginning to provide a more
|
102 |
+
complete sample to critically test dynamo scaling laws over a
|
103 |
+
larger range in magnetic field strengths.
|
104 |
+
This paper is organised as follows: §2 presents details of the
|
105 |
+
radio and infrared observations and the analysis of the radio light
|
106 |
+
curve. In §3 we discuss the possible mechanisms driving the ra-
|
107 |
+
dio emission, and present our conclusions and outlook in §4.
|
108 |
+
2. Observations
|
109 |
+
2.1. LOFAR 144 MHz observations
|
110 |
+
WISEP J101905.63+652954.2
|
111 |
+
was discovered as part of our
|
112 |
+
ongoing search (e.g. Callingham et al. 2021) for stars, brown
|
113 |
+
dwarfs, and exoplanets using data from the LOFAR Two Metre
|
114 |
+
Sky Survey (LoTSS; Shimwell et al. 2022). Our methodology
|
115 |
+
has typically involved searching for circularly polarised sources
|
116 |
+
in deep 8 hr exposure LoTSS images. This is how we found
|
117 |
+
Elegast, the first radio-selected brown dwarf (Vedantham et al.
|
118 |
+
2020). Because brown dwarf auroral emission is typically pulsed
|
119 |
+
at the rotation period, we have since implemented a search al-
|
120 |
+
gorithm to construct Stokes-V light curves on various time-bin
|
121 |
+
widths and search for on-off and periodic pulsations from known
|
122 |
+
brown dwarfs. Although we plan to conduct an untargeted search
|
123 |
+
for such pulses over the Northern sky, we first validated our ap-
|
124 |
+
proach by a targeted search of ten known T- and Y-type brown
|
125 |
+
dwarfs which led to the discovery of Stokes-V radio pulsations
|
126 |
+
from WISEP J101905.63+652954.2.
|
127 |
+
Our current pipeline takes in the standard calibrated visi-
|
128 |
+
bilities from the LoTSS survey. We first subtract the LoTSS-
|
129 |
+
detected sources from the visibilities using their direction depen-
|
130 |
+
dent gains while retaining on-axis sources in the direction of the
|
131 |
+
target for an additional round of self-calibration as described in
|
132 |
+
van Weeren et al. (2021). We then modelled and subtracted these
|
133 |
+
sources using their clean components from wsclean. We then
|
134 |
+
imaged the target fields using wsclean (Offringa et al. 2014) at
|
135 |
+
a cadence of 4 minutes and extracted the light curves from these
|
136 |
+
images after averaging over the available bandwidth. The light
|
137 |
+
curve of WISEP J101905.63+652954.2 shows a statistically sig-
|
138 |
+
nificant burst (Fig. 1). The on and flanking off-burst snapshot im-
|
139 |
+
ages are also shown. The figure also shows the light curve binned
|
140 |
+
to a resolution of 16 min in red that reveals a hint of periodicity
|
141 |
+
at around a 3 hr period.
|
142 |
+
Polarised radio emission from planets and brown dwarfs is
|
143 |
+
expected to have a periodic signature at the rotation period of
|
144 |
+
the object due to beaming (akin to a light house). To ascertain
|
145 |
+
the period signature in the light curve, we computed the Lomb-
|
146 |
+
Scargle periodogram of the light curve using the astropy (As-
|
147 |
+
tropy Collaboration et al. 2013, 2018) implementation (See Fig.
|
148 |
+
2). To compute the significance of the periodogram peaks we
|
149 |
+
computed the false alarm rate based on the bootstrap method de-
|
150 |
+
scribed in VanderPlas (2018). We detect a dominant peak at a
|
151 |
+
frequency of 0.324 hr−1 with a false alarm rate of under 3%. We
|
152 |
+
compute an uncertainty in the peak’s location of 0.033 hr−1 using
|
153 |
+
the method prescribed in equation 52 of VanderPlas (2018).
|
154 |
+
2.2. Keck/NIRC2 LGS AO
|
155 |
+
We observed WISEP J101905.63+652954.2 on 2015 January
|
156 |
+
15 UT and 2022 January 24 UT with the facility imager NIRC2
|
157 |
+
at the Keck II telescope in concert with the laser guide star (LGS)
|
158 |
+
adaptive optics (AO) system (van Dam et al. 2006; Wizinowich
|
159 |
+
et al. 2006). For tip-tilt correction, we used the star USNO-
|
160 |
+
B1.0 1554-0140735, which is 23′′ away from the target and pro-
|
161 |
+
vided flux to the tip-tilt sensor equivalent to R = 18.2 mag. The
|
162 |
+
wavefront sensor monitoring the LGS measured flux equivalent
|
163 |
+
to a V = 10.2 mag star in 2015 and V = 8.5 mag in 2022, thanks
|
164 |
+
to the intervening LGS upgrade (Chin et al. 2016). We obtained
|
165 |
+
images with standard Maunakea Observatories filters in the J
|
166 |
+
and H bands (Tokunaga et al. 2002) as well as CH4s, a medium-
|
167 |
+
bandwidth filter centred on the H-band flux peak of T dwarfs.
|
168 |
+
For each filter, we obtained between four and six dithered 180-s
|
169 |
+
images in 2015 and 60-s images in 2022 while keeping the LGS
|
170 |
+
fixed to the centre of NIRC2’s narrow camera (0′′.01 pixel−1)
|
171 |
+
field-of-view (10′′ × 10′′). In 2015, the AO correction deterio-
|
172 |
+
rated significantly as we collected data, and the quality of our
|
173 |
+
H-band data set was too poor to be included in our analysis.
|
174 |
+
We reduced our data using the same custom scripts as in
|
175 |
+
our previous work (e.g., Liu et al. 2008; Dupuy et al. 2015),
|
176 |
+
and examples of individual exposures are shown in Figure 3.
|
177 |
+
We measured the separation, position angle (PA), and magnitude
|
178 |
+
difference in individual exposures using three-component, two-
|
179 |
+
dimensional Gaussians, and computed the means and standard
|
180 |
+
deviations of measurements from individual exposures as the fi-
|
181 |
+
nal measurements and their uncertainties. For our 2015 data, we
|
182 |
+
used the astrometric calibration of Yelda et al. (2010) to correct
|
183 |
+
for nonlinear distortion, the orientation of NIRC2 (by subtracting
|
184 |
+
0◦.252), and the pixel scale (9.952±0.002 mas pixel−1). Likewise,
|
185 |
+
for our 2022 data we used the calibration of Service et al. (2016).
|
186 |
+
The resulting binary parameters are given in Table 1. Our relative
|
187 |
+
astrometry is consistent within the errors at each epoch, and the
|
188 |
+
repeated observations in J and CH4s filters show no significant
|
189 |
+
change in flux ratio.
|
190 |
+
To compute the final relative astrometry at each epoch, we
|
191 |
+
took the weighted average of our relative astrometry measure-
|
192 |
+
ments and added a systematic error of 1.5 mas to account for the
|
193 |
+
uncertainty in the distortion corrections of NIRC2. This gives
|
194 |
+
separations of 423.0 ± 1.6 mas and 468.2 ± 1.6 mas and PAs of
|
195 |
+
161◦.71±0◦.23 and 166◦.87±0◦.20, in 2015 and 2022, respectively.
|
196 |
+
The observed motion of ≈ 7 mas yr−1 is much lower than the
|
197 |
+
proper motion of the system (150.6 ± 1.1 mas yr−1) measured by
|
198 |
+
Kirkpatrick et al. (2019), so we conclude the companion shares
|
199 |
+
a common proper motion with the primary and is physically
|
200 |
+
bound.
|
201 |
+
Our Keck images also showed a fainter point source ≈2′′
|
202 |
+
away from WISEP J101905.63+652954.2 at a position angle of
|
203 |
+
≈200◦. We identified this source in the Pan-STARRS1 3π Survey
|
204 |
+
catalog (Chambers et al. 2016) as PSO J154.7727+65.4978. It is
|
205 |
+
visible in stacked rizyP1 images and appears brightest in zP1. Its
|
206 |
+
(z − y)P1 = 0.41 ± 0.13 mag color (using stacked photometry) is
|
207 |
+
far too blue to be a fainter, later-T or Y dwarf (Best et al. 2018),
|
208 |
+
so we conclude this is a background star or galaxy. Although this
|
209 |
+
source is only about 2′′ from the nominal position of the radio
|
210 |
+
detection, it is almost certainly not the source of the observed
|
211 |
+
radio emission. The high circular polarisation in the radio-band
|
212 |
+
is inconsistent with an extragalactic origin, so we only need con-
|
213 |
+
sider the Galactic stellar hypothesis. The absolute radio astrom-
|
214 |
+
Article number, page 2 of 7
|
215 |
+
|
216 |
+
Vedantham et al.: Radio pulsation from new T-dwarf binary
|
217 |
+
10h19m15s
|
218 |
+
10s
|
219 |
+
05s
|
220 |
+
00s
|
221 |
+
65±3003000
|
222 |
+
0000
|
223 |
+
2903000
|
224 |
+
0000
|
225 |
+
RA (J2000)
|
226 |
+
Dec (J2000)
|
227 |
+
Stokes V
|
228 |
+
10h19m15s
|
229 |
+
10s
|
230 |
+
05s
|
231 |
+
00s
|
232 |
+
65±3003000
|
233 |
+
0000
|
234 |
+
2903000
|
235 |
+
0000
|
236 |
+
RA (J2000)
|
237 |
+
Dec (J2000)
|
238 |
+
Stokes V
|
239 |
+
10h19m15s
|
240 |
+
10s
|
241 |
+
05s
|
242 |
+
00s
|
243 |
+
65±3003000
|
244 |
+
0000
|
245 |
+
2903000
|
246 |
+
0000
|
247 |
+
RA (J2000)
|
248 |
+
Dec (J2000)
|
249 |
+
Stokes V
|
250 |
+
(a)
|
251 |
+
(b)
|
252 |
+
(c)
|
253 |
+
(d)
|
254 |
+
Fig. 1. Panel (a) shows the Stokes-V radio lightcurve of WISEP J101905.63+652954.2 with a bin width of 4 minutes (black points with ±1σ
|
255 |
+
errorbars) and 16 minutes (red curve with shaded ±1σ uncertainty). The point marked with the black square is a significant detection with a
|
256 |
+
flux-density of −4.1(7) mJy whose Stokes-V image is shown in panel (c). Panels (b) and (d) show similar 4 min exposure images bracketing the
|
257 |
+
integration show in panel (c).
|
258 |
+
Table 1. Keck LGS AO Relative Astrometry and Photometry of WISEP J101905.63+652954.2.
|
259 |
+
Epoch (MJD)
|
260 |
+
Filter
|
261 |
+
Separation (mas)
|
262 |
+
PA (deg)
|
263 |
+
∆m (mag)
|
264 |
+
57037.5382
|
265 |
+
J
|
266 |
+
416 ± 7
|
267 |
+
161.5 ± 0.6
|
268 |
+
0.37 ± 0.06
|
269 |
+
57037.5246
|
270 |
+
CH4s
|
271 |
+
423.1 ± 0.6
|
272 |
+
161.72 ± 0.12
|
273 |
+
0.489 ± 0.019
|
274 |
+
59603.5270
|
275 |
+
J
|
276 |
+
467.2 ± 1.1
|
277 |
+
166.78 ± 0.12
|
278 |
+
0.494 ± 0.021
|
279 |
+
59603.5218
|
280 |
+
CH4s
|
281 |
+
467 ± 3
|
282 |
+
166.82 ± 0.18
|
283 |
+
0.48 ± 0.03
|
284 |
+
59603.5174
|
285 |
+
H
|
286 |
+
468.7 ± 0.7
|
287 |
+
166.97 ± 0.10
|
288 |
+
0.579 ± 0.013
|
289 |
+
Note. Error bars given here are the standard deviation of individual measurements and do not account for the 1.5 mas systematic
|
290 |
+
error on the absolute astrometric reference frame of NIRC2 due to the optical distortion correction for such a wide binary.
|
291 |
+
Relative photometry is given as the difference in magnitude ∆m ≡ mB − mA.
|
292 |
+
etry has a Gaussian-equivalent standard deviation of σ ≈ 0′′.5
|
293 |
+
(Shimwell et al. 2022) yielding a 4σ discrepancy in position.
|
294 |
+
The Pan-STARRS1 z − y colour suggests that the source is a mid
|
295 |
+
M-dwarf whose zP1 = 21.06±0.06 mag places it at a photometric
|
296 |
+
distance of over 300 pc. This is well beyond the sensitivity hori-
|
297 |
+
zon of LOFAR for M-dwarfs’ cyclotron maser emission (Call-
|
298 |
+
ingham et al. 2021). Finally, the rotation rate implied by the radio
|
299 |
+
observations of 0.32 hr−1 is unusually large for a mid M-dwarf
|
300 |
+
(Popinchalk et al. 2021). For these reasons, we reject the associ-
|
301 |
+
ation between the radio source and PSO J154.7727+65.4978.
|
302 |
+
In order to compute CH4s−H colors for the two components
|
303 |
+
of WISEP J101905.63+652954.2 from Keck LGS AO imag-
|
304 |
+
ing, we used its IRTF/SpeX spectrum from 2010 May 27 UT
|
305 |
+
(Kirkpatrick et al. 2011) to measure integrated-light colors of
|
306 |
+
CH4s−H = −0.42 mag and J −H = −0.34 mag. Combined with
|
307 |
+
the 2MASS measurement of J = 16.589 ± 0.055 mag, these col-
|
308 |
+
ors give integrated-light photometry of H = 16.93±0.06 mag and
|
309 |
+
CH4s = 16.51±0.06 mag. Combined with our measured magni-
|
310 |
+
tude differences in CH4s and H, we find colors of CH4s − H =
|
311 |
+
−0.382 ± 0.013 mag and −0.481 ± 0.020 mag for the primary
|
312 |
+
and secondary. Using the spectral type-colour relation detailed
|
313 |
+
by Liu et al. (2008), we determine methane-photometry-based
|
314 |
+
spectral types of T5.5 ± 0.5 and T7.0 ± 0.5.
|
315 |
+
Article number, page 3 of 7
|
316 |
+
|
317 |
+
A&A proofs: manuscript no. main
|
318 |
+
0
|
319 |
+
1
|
320 |
+
2
|
321 |
+
3
|
322 |
+
4
|
323 |
+
Frequency [1/hour]
|
324 |
+
−0.025
|
325 |
+
0.000
|
326 |
+
0.025
|
327 |
+
0.050
|
328 |
+
0.075
|
329 |
+
0.100
|
330 |
+
0.125
|
331 |
+
0.150
|
332 |
+
Lomb-Scargle power
|
333 |
+
FAR 0.1
|
334 |
+
FAR 0.03
|
335 |
+
FAR 0.01
|
336 |
+
Sampling window
|
337 |
+
Data
|
338 |
+
Fig. 2. Lomb Scargle periodogram of the radio light curve from Fig. 1.
|
339 |
+
The dominant peak with a false alarm rate of under 3% is at 0.324 ±
|
340 |
+
0.033 hr−1.
|
341 |
+
3. Discussion
|
342 |
+
3.1. Mass and magnetic field estimates
|
343 |
+
We computed the combined-light bolometric luminosity of
|
344 |
+
WISEP J101905.63+652954.2 by direct integration of its unre-
|
345 |
+
solved optical to mid-infrared (MIR) spectral energy distribution
|
346 |
+
(SED). The assembled SED consists of available Pan-STARRS-
|
347 |
+
1 (PS1; Chambers et al. 2016) optical photometry (z, y), the
|
348 |
+
near-infrared (NIR) IRTF/SpeX prism spectrum, NIR photom-
|
349 |
+
etry from 2MASS (Cutri et al. 2003) and MKO (Best et al.
|
350 |
+
2021), and MIR photometry from the CatWISE catalog (W1
|
351 |
+
and W2 bands; Eisenhardt et al. 2020; Marocco et al. 2021),
|
352 |
+
AllWISE catalog (W3 and W4 bands; Cutri et al. 2013), and
|
353 |
+
Spitzer/IRAC Channels 1 and 2 (Fazio et al. 2004). First, we
|
354 |
+
flux-calibrated the SpeX spectrum using the weighted average
|
355 |
+
of scale factors derived from PS1 y, 2MASS JHKs, and MKO
|
356 |
+
JHK photometry, assuming a systematic noise floor of 0.01 mag
|
357 |
+
for all the filters. We then integrated the flux-calibrated SpeX
|
358 |
+
spectrum to determine the NIR contribution to the bolometric
|
359 |
+
flux, accounting for the uncertainties in the spectral data points
|
360 |
+
and the flux calibration procedures. We determined the opti-
|
361 |
+
cal and MIR contributions to the bolometric flux by simultane-
|
362 |
+
ously fitting ATMO model atmospheres (Phillips et al. 2020) to
|
363 |
+
the PS1 and WISE photometry (computing synthetic photom-
|
364 |
+
etry from the models) and the SpeX spectrum (with the mod-
|
365 |
+
els degraded to the non-linear spectral resolution of the 0′′.5
|
366 |
+
slit). We found the best-fitting ATMO model had Teff = 1000
|
367 |
+
K and log g = 5.5 dex. Our final bolometric flux was found
|
368 |
+
by adding the NIR contribution to the integration of the model
|
369 |
+
outside the wavelength range of the SpeX spectrum. The uncer-
|
370 |
+
tainty in the optical+MIR contribution was obtained from the
|
371 |
+
standard deviation of the corresponding measurements derived
|
372 |
+
using the three model spectra adjacent in Teff and log g to the
|
373 |
+
best-fitting model. Using WISEPA J101905.63+652954.2’s par-
|
374 |
+
allax of 42.9 ± 1.8 mas, we calculated its bolometric luminosity
|
375 |
+
log(Lbol/L⊙) = −4.994 ± 0.063 dex.
|
376 |
+
To determine the mass of each component in the binary sys-
|
377 |
+
tem, we combined their luminosities and ages with the Saumon
|
378 |
+
& Marley (2008) (SM08) hybrid evolutionary model. Each com-
|
379 |
+
ponent’s luminosity is estimated using the bolometric luminosity
|
380 |
+
vs spectral type relations from Filippazzo et al. (2015). We find
|
381 |
+
that ≈70% of the luminosity is contributed by the T5.5 dwarf
|
382 |
+
and ≈30% is contributed by the T7 dwarf. For each object, we
|
383 |
+
adopt the field-age distribution from Dupuy & Liu (DL17 2017).
|
384 |
+
For our mass calculations, we use the Bayesian rejection sam-
|
385 |
+
pling technique described in Dupuy & Liu (2017). First, we draw
|
386 |
+
106 random (luminosity, age) samples from a uniform distribu-
|
387 |
+
tion spanning the bolometric luminosity range of the evolution-
|
388 |
+
ary model grid and the intersection of the DL17 age range and
|
389 |
+
the evolutionary model grid age range. Second, we compute the
|
390 |
+
probability of each sample based on the χ2 of the drawn lumi-
|
391 |
+
nosity with respect to the measured value and the likelihood of
|
392 |
+
drawing the sample’s age from the DL17 distribution. Third, we
|
393 |
+
randomly draw 106 uniform variates (u) distributed in the range
|
394 |
+
from 0 to 1 and reject any samples where p < u. The fourth and
|
395 |
+
final step is to linearly interpolate the evolutionary models (in
|
396 |
+
logarithmic space) at each accepted luminosity-age point to cal-
|
397 |
+
culate the corresponding mass. We find a mass of 41 ± 18 MJup
|
398 |
+
for the T5.5 component and 32 ± 16 MJup for the T7 component.
|
399 |
+
Armed with the mass and luminosity values, we can estimate
|
400 |
+
the magnetic fields of the two objects using so-called dynamo
|
401 |
+
scaling laws. We employed the ‘saturated dynamo’ scaling law
|
402 |
+
proposed by Christensen et al. (2009) that relates the magnetic
|
403 |
+
field to the heat flux and mean density of the brown dwarf. We
|
404 |
+
used the law in the form given by Reiners & Christensen (2010,
|
405 |
+
their equation 1). We also used their correction to estimate the
|
406 |
+
surface dipolar field from the field at the top of the dynamo as
|
407 |
+
predicted by the scaling law (Reiners & Christensen 2010, their
|
408 |
+
equation 2). Although the objects’ luminosities are have small
|
409 |
+
errors, the mass estimates and the normalising constant in the
|
410 |
+
scaling law have large fractional errors. To properly incorporate
|
411 |
+
these errors into the predicted magnetic field strength, we ran
|
412 |
+
a Monte-Carlo simulation where we drew the normalising con-
|
413 |
+
stant from a uniform distribution (Reiners et al. 2009, their equa-
|
414 |
+
tion 1), and the mass from a normal distribution. In each step
|
415 |
+
of the Monte Carlo run we interpolated the evolutionary mod-
|
416 |
+
els of Baraffe et al. (2003) to find the relationship between mass
|
417 |
+
and field strength for the measured luminosity (i.e. for different
|
418 |
+
ages). The resulting distribution of polar dipole field strengths
|
419 |
+
for the T5.5 and T7 objects had a mean and standard deviation
|
420 |
+
of 660 ± 300 G and 460 ± 210 G respectively.
|
421 |
+
The observed cyclotron maser emission itself places a lower
|
422 |
+
limit on the polar surface magnetic field strength of 51.4 G (cy-
|
423 |
+
clotron frequency at the mid-point of the LOFAR data’s radio
|
424 |
+
band). While this is consistent with the field estimates made
|
425 |
+
above, higher frequency observations are necessary to critically
|
426 |
+
test the dynamo scaling law. In what follows, we will leave the
|
427 |
+
polar surface field as a variable while normalising our equations
|
428 |
+
at B = 1 kG.
|
429 |
+
3.2. Energetics
|
430 |
+
WISEP J101905.63+652954.2 has not yet been detected at the
|
431 |
+
gigahertz-frequencies where quiescent incoherent synchrotron
|
432 |
+
emission is typically observed. A non-detection in the VLA Sky
|
433 |
+
Survey (Lacy et al. 2020) quick-look images yields a 3σ up-
|
434 |
+
per limit of 0.34 mJy in the 2–4 GHz band. Although incoher-
|
435 |
+
ent radio emission has widely been used as proxy for the en-
|
436 |
+
Article number, page 4 of 7
|
437 |
+
|
438 |
+
Vedantham et al.: Radio pulsation from new T-dwarf binary
|
439 |
+
|
440 |
+
|
441 |
+
|
442 |
+
|
443 |
+
|
444 |
+
|
445 |
+
|
446 |
+
|
447 |
+
|
448 |
+
|
449 |
+
|
450 |
+
|
451 |
+
|
452 |
+
|
453 |
+
|
454 |
+
|
455 |
+
CH4s
|
456 |
+
|
457 |
+
|
458 |
+
|
459 |
+
|
460 |
+
|
461 |
+
|
462 |
+
|
463 |
+
|
464 |
+
|
465 |
+
|
466 |
+
|
467 |
+
|
468 |
+
|
469 |
+
|
470 |
+
|
471 |
+
2015 Jan 15
|
472 |
+
0.5"
|
473 |
+
J
|
474 |
+
|
475 |
+
|
476 |
+
|
477 |
+
|
478 |
+
|
479 |
+
|
480 |
+
|
481 |
+
|
482 |
+
|
483 |
+
|
484 |
+
|
485 |
+
|
486 |
+
|
487 |
+
|
488 |
+
|
489 |
+
|
490 |
+
H
|
491 |
+
|
492 |
+
|
493 |
+
|
494 |
+
|
495 |
+
|
496 |
+
|
497 |
+
|
498 |
+
|
499 |
+
|
500 |
+
|
501 |
+
|
502 |
+
|
503 |
+
|
504 |
+
|
505 |
+
|
506 |
+
|
507 |
+
CH4s
|
508 |
+
|
509 |
+
|
510 |
+
|
511 |
+
|
512 |
+
|
513 |
+
|
514 |
+
|
515 |
+
|
516 |
+
|
517 |
+
|
518 |
+
|
519 |
+
|
520 |
+
|
521 |
+
|
522 |
+
|
523 |
+
2022 Jan 24
|
524 |
+
0.5"
|
525 |
+
J
|
526 |
+
Fig. 3. Contour plots of one typical individual exposure for each filter in which we obtained data. Contours are drawn in logarithmic intervals
|
527 |
+
from the peak flux down to 10% of the peak flux in each image. The images are all 1′′.5 across with North up. In 2015, despite the AO correction
|
528 |
+
deteriorating from 0′′.09 in the CH4s band to 0′′.13 in the J-band, the binary was still well resolved. We used the more precise differential magnitudes
|
529 |
+
from the higher-quality, and fully contemporaneous 2022 images in our analysis.
|
530 |
+
ergetics of magnetospheric and coronal emitters (Pineda et al.
|
531 |
+
2017; Leto et al. 2021; Benz & Guedel 1994), here we use the
|
532 |
+
pulsed radio emission to calculate the energetics of the auroral
|
533 |
+
electrons. We posit that the radio pulsations are due to beam-
|
534 |
+
ing combined with rotation and that the beam solid angle of the
|
535 |
+
radio emission is 1.6 sr — identical to that of Jupiter’s auroral
|
536 |
+
radio emission due to its magnetosphere–ionosphere coupling
|
537 |
+
(Zarka et al. 2004). The radio spectral luminosity for a pulse
|
538 |
+
flux density of 2 mJy (see Fig. 1) and a measured distance of
|
539 |
+
23.3 pc (Kirkpatrick et al. 2019) is then (2 mJy) × (23.3 pc)2 ×
|
540 |
+
(1.6 sr) ≈ 1.7 × 1014 erg s−1 Hz−1. Let us further assume that the
|
541 |
+
total bandwidth of the radio emission is equal to the cyclotron
|
542 |
+
frequency at the surface of the object. Then the auroral radio
|
543 |
+
power is 4.6 × 1023 (B/kG) erg s−1. Assuming a 1% efficiency
|
544 |
+
in the conversion of the available auroral power to radio waves
|
545 |
+
(Zarka 2007; Lamy et al. 2011), we obtain an auroral power of
|
546 |
+
4.6×1025 (B/kG) erg s−1. For comparison, the auroral power out-
|
547 |
+
put of Jupiter is ∼ 1020 erg s−1 (Bhardwaj & Gladstone 2000),
|
548 |
+
and Turnpenney et al. (2017) predict auroral powers of up to
|
549 |
+
1026.5 erg s−1 (assuming the same 1% radio efficiency) for the Jo-
|
550 |
+
vian magnetosphere-ionosphere paradigm applied to ultra-cool
|
551 |
+
dwarfs.
|
552 |
+
3.3. Is binary interaction powering the radio emission?
|
553 |
+
Magnetic interaction between the two objects can accelerate
|
554 |
+
charges that eventually emit cyclotron maser radio emission,
|
555 |
+
as seen in the Jupiter-Io system (Goldreich & Lynden-Bell
|
556 |
+
1969; Neubauer 1998; Zarka 1998). The projected separation
|
557 |
+
of the two brown dwarfs in WISEP J101905.63+652954.2 is
|
558 |
+
9.9±0.4 au, given their parallactic distance of 23.3±1.0 pc (Kirk-
|
559 |
+
patrick et al. 2019). We explored the full range of orbital parame-
|
560 |
+
ters for the binary by fitting the two epochs of relative astrometry
|
561 |
+
from Section 2.2 with the orvara orbit analysis tool (Brandt et al.
|
562 |
+
2021). We used a prior on the total mass of 0.071 ± 0.033 M⊙
|
563 |
+
based on our mass estimates from Section 3.1. As expected, the
|
564 |
+
orbital parameters are poorly constrained, but we can place 3σ
|
565 |
+
limits on the semimajor axis (> 5.2 au), period (> 30 yr), in-
|
566 |
+
clination (< 86◦), and eccentricity (< 0.96). The posterior dis-
|
567 |
+
tributions have medians and 1σ confidence intervals of 11+4
|
568 |
+
−6 au,
|
569 |
+
160+120
|
570 |
+
−130 yr, and 69+13
|
571 |
+
−11 deg, but we caution that these are highly
|
572 |
+
influenced by the priors. (The eccentricity posterior is almost un-
|
573 |
+
changed from the uniform prior below the upper limit we quote.)
|
574 |
+
Based on the radio rotation rate of the emitter, its light cylin-
|
575 |
+
der is at a radial distance of about 3.4 au. Therefore, even if the
|
576 |
+
magnetospheres are not loaded with plasma (i.e. under force-free
|
577 |
+
electrodynamics), direct magnetic interaction between the two
|
578 |
+
dipolar magnetospheres is not possible and we must consider in-
|
579 |
+
terception by one brown dwarf of the Poynting flux radiated by
|
580 |
+
the other. The Poynting flux radiated by an oblique rotator (akin
|
581 |
+
to a Pulsar’s dipole emission) is of the order L ∼ B2
|
582 |
+
0R6
|
583 |
+
0Ω4/c3
|
584 |
+
(Condon & Ransom 2016) where B0 is the surface magnetic
|
585 |
+
field, Ω is the angular rotation rate, and R0 is the object’s ra-
|
586 |
+
dius. For characteristic values of B0 = 103 G, R0 = 7 × 109 cm,
|
587 |
+
and Ω = 5.6 × 10−4 s−1, we get L ∼ 1020 erg s−1 which falls well
|
588 |
+
short of the value necessary to power the radio emission.
|
589 |
+
Next, consider a scenario where the magnetospheres are
|
590 |
+
loaded by plasma and drive a feeble wind. For simplicity, let
|
591 |
+
us assume that the two magnetospheres and their co-rotation
|
592 |
+
rates are similar. Due to the fast rotation, the balance between
|
593 |
+
the centrifugal force of the co-rotating plasma and magnetic
|
594 |
+
pressure must determine the structure of the magnetosphere in
|
595 |
+
this case (i.e. gravitational force can be safely neglected) and
|
596 |
+
the eventual Poynting flux. The centrifugal pressure felt by the
|
597 |
+
plasma is Fc = ρΩ2R2/2 where R is the radial distance, Ω is
|
598 |
+
the angular rotation rate and ρ = ρ(R) is the plasma density at
|
599 |
+
radius R. The magnetic pressure for a dipole at distance R is
|
600 |
+
FB = B2
|
601 |
+
0R−6R6
|
602 |
+
0/(8π) where R0 is the object’s radius and B0 is
|
603 |
+
the surface magnetic field strength. In our simple ‘toy model’,
|
604 |
+
at low radii, FB dominates enforcing co-rotation with a dipolar
|
605 |
+
field. This breaks at a critical radius when FB = FC. Beyond
|
606 |
+
this radius, we assume that the field lines open up into a Parker-
|
607 |
+
spiral type configuration. Note that FB = FC is equivalent to
|
608 |
+
saying that the co-rotation speed equals the local Alfvén speed.
|
609 |
+
The critical radius is therefore the so-called Alfvén point:
|
610 |
+
rA =
|
611 |
+
������
|
612 |
+
B2
|
613 |
+
0R6
|
614 |
+
0
|
615 |
+
4πΩ2ρ(rA)
|
616 |
+
������
|
617 |
+
1/8
|
618 |
+
,
|
619 |
+
(1)
|
620 |
+
In the open field zone, the azimuthal field dominates, falling
|
621 |
+
off with distance, R as R−1. We therefore assume B(R)
|
622 |
+
=
|
623 |
+
B(rA)(R/rA)−1 where B(rA) = B0(rA/R0)−3. The brown dwarf
|
624 |
+
wind beyond rA is assumed to to have a radial flow speed, vr
|
625 |
+
equal to the co-rotation speed at rA as suggested for the Jovian
|
626 |
+
case by Hill et al. (1974). With these assumptions, the Poynting
|
627 |
+
luminosity can be readily computed as S = (B2/8π)×vr ×(4πR2)
|
628 |
+
at any closed surface of radius R > rA. The mass-loss rate is
|
629 |
+
given by ˙M = (4πr2
|
630 |
+
A) × vr × ρ(rA). For parameters applicable to
|
631 |
+
WISEP J101905.63+652954.2 of R0 = 7 × 109 cm, B0 = 103 G,
|
632 |
+
Ω = 5.6 × 10−4 s−1, we find that the necessary Poynting lumi-
|
633 |
+
nosity of ≈ 1025.5 erg s−1 can be achieved with a mass-loss rate
|
634 |
+
of ≈ 25 tonnes per second. The corresponding Alfvén point is
|
635 |
+
at rA = 188R0. If instead we assume B0 = 100 G then we get
|
636 |
+
the necessary Poynting flux for
|
637 |
+
˙M ≈ 550 tonnes per second
|
638 |
+
and rA = 40R0. For comparison, Io’s volcanism is the princi-
|
639 |
+
pal source of Jovian magnetospheric plasma whose loss rate is
|
640 |
+
about 1 tonne per second. In any case, a significant fraction of
|
641 |
+
Article number, page 5 of 7
|
642 |
+
|
643 |
+
A&A proofs: manuscript no. main
|
644 |
+
the emitted Poynting flux must be intercepted by the magneto-
|
645 |
+
sphere of the companion for conversion of this Poynting flux
|
646 |
+
into radiation emission due to binary interaction. We therefore
|
647 |
+
conclude that while energetically feasible in principle, further
|
648 |
+
work on the precise details of the wind–wind interaction and the
|
649 |
+
source of mass-loss must be worked out to ascertain whether
|
650 |
+
this interaction could have powered the observed radio emission
|
651 |
+
from WISEP J101905.63+652954.2.
|
652 |
+
3.4. Auroral signatures
|
653 |
+
Regardless
|
654 |
+
of
|
655 |
+
the
|
656 |
+
veracity
|
657 |
+
of
|
658 |
+
the
|
659 |
+
interaction-powered
|
660 |
+
emission scenario, let us assume that at the emitter in
|
661 |
+
WISEP J101905.63+652954.2, an auroral mechanism similar
|
662 |
+
to that seen on Jupiter is at play. Such aurorae have also
|
663 |
+
been suggested as the radio emission mechanism in other
|
664 |
+
brown dwarfs and ultracool dwarfs (e.g. Hallinan et al. 2015;
|
665 |
+
Turnpenney et al. 2017). Jupiter’s aurorae emit compara-
|
666 |
+
ble amounts of power in the radio and Hα line (Bhardwaj
|
667 |
+
& Gladstone 2000; Zarka 1998). Assuming the same for
|
668 |
+
WISEP J101905.63+652954.2, we would anticipate an Hα lu-
|
669 |
+
minosity of 4.6 × 1023 (B/kG) erg s−1. Assuming a characteristic
|
670 |
+
line width of 6Å (Pineda et al. 2016), the expected Hα flux
|
671 |
+
density is ≈ 7 × 10−18 (B/kG) erg s−1 cm−2 Å−1. Based on the
|
672 |
+
optical spectrum or WISEP J101905.63+652954.2 presented
|
673 |
+
by Kirkpatrick et al. (2011), we derive a 2σ upper limit on the
|
674 |
+
Hα luminosity of 2.8 × 10−18 erg s−1 cm−2 Å−1. This suggests
|
675 |
+
that the surface magnetic field of WISEP J101905.63+652954.2
|
676 |
+
is B ≲ 103 G which is broadly consistent with our magnetic
|
677 |
+
field estimate from §3.1. Nevertheless, we caution that it is
|
678 |
+
not possible to make definite statements on the magnetic field
|
679 |
+
strength because the radio and Hα efficiencies and the radio
|
680 |
+
beam solid angle can only be trusted to within an order of
|
681 |
+
magnitude. In conclusion, we find that the available data are
|
682 |
+
consistent with a Jupiter-like auroral process driving the radio
|
683 |
+
emission in a magnetosphere with a surface strength of order ap
|
684 |
+
kiloGauss.
|
685 |
+
4. Conclusions & Outlook
|
686 |
+
Magnetospheric emissions from the coldest brown dwarfs pro-
|
687 |
+
vide a rare glimpse into magnetism in the planetary mass
|
688 |
+
regime outside the solar system. Here we have presented our
|
689 |
+
second detection of a methane-bearing, T-type brown dwarf—
|
690 |
+
WISEP J101905.63+652954.2—with LOFAR at 144 MHz. The
|
691 |
+
radio emission is pulsed and periodic, from which we de-
|
692 |
+
rive a rotation rate of 0.32 ± 0.03 hr−1 (1σ bounds). We
|
693 |
+
have also presented infrared adaptive optics observations of
|
694 |
+
WISEP J101905.63+652954.2 that show it to be a T-dwarf bi-
|
695 |
+
nary with a separation of 9.9±0.4 au and spectral types T5.5±0.5
|
696 |
+
and T7.0 ± 0.5, making it the first T-dwarf binary to be de-
|
697 |
+
tected in the radio band. We considered binarity as the cause
|
698 |
+
of the radio emission. We find that while energetically feasible
|
699 |
+
for mass-loss rates of ≳ 25 tonnes per second, precise details of
|
700 |
+
the interaction region must be studied before binary-interaction
|
701 |
+
can be posited as the probably cause of the emission. In this
|
702 |
+
regard, it is interesting to note that Kao & Sebastian Pineda
|
703 |
+
(2022) have suggested (based on detection rates and luminosi-
|
704 |
+
ties) that binary ultracool dwarfs may be more radio-loud than
|
705 |
+
their single counterparts. If this is true, then a radio-selection
|
706 |
+
as we have done here might reveal a population of close binary
|
707 |
+
brown dwarfs upon infrared follow-up observations, similar to
|
708 |
+
WISEP J101905.63+652954.2.
|
709 |
+
WISEP J101905.63+652954.2 is the first brown dwarf de-
|
710 |
+
tected at 144 MHz with the canonical periodic pulsed emission
|
711 |
+
profile similar to that seen in the cm-wave band and on Jupiter
|
712 |
+
at ν ≲ 40 MHz. Three previously detected T-dwarfs in the cm-
|
713 |
+
wave band have, unexpectedly, shown pulses up to 10 and/or 15
|
714 |
+
GHz with no sign of a distinct high-frequency cut off (Kao et al.
|
715 |
+
2018). This suggests magnetic field strengths well in excess of
|
716 |
+
that anticipated by some dynamo scaling laws suggesting that the
|
717 |
+
laws need to be revised. However, it is also possible that by virtue
|
718 |
+
of a survey bias, the high frequency surveys have preferentially
|
719 |
+
detected a small population of T dwarfs that have anomalously
|
720 |
+
high field strengths possibly in smaller magnetic loops rather
|
721 |
+
than the large scale field predictions made from dynamo mod-
|
722 |
+
els. Because WISEP J101905.63+652954.2 was selected from a
|
723 |
+
144 MHz survey that does not have this selection bias, it will be
|
724 |
+
very interesting to see if its spectral cut-of continues to unex-
|
725 |
+
pected trend discovered by Kao et al. (2018).
|
726 |
+
We end by noting that WISEP J101905.63+652954.2 is the
|
727 |
+
second detected, and first pulsed, brown dwarf system found
|
728 |
+
in the ongoing LOFAR Two Metre Sky Survey. As demon-
|
729 |
+
strated by Vedantham et al. (2020), because the radio emission
|
730 |
+
is non-thermal in origin, radio surveys may be able to discover
|
731 |
+
a population of the coldest brown dwarfs that are too faint to
|
732 |
+
be found in canonical infrared surveys. The pulsed emission
|
733 |
+
from WISEP J101905.63+652954.2 therefore motivates an all-
|
734 |
+
sky, untargeted search for pulsed, circularly-polarised emitters
|
735 |
+
in LoTTS survey data.
|
736 |
+
References
|
737 |
+
Antonova, A., Hallinan, G., Doyle, J. G., et al. 2013, A&A, 549, A131
|
738 |
+
Astropy Collaboration, Price-Whelan, A. M., Sip˝ocz, B. M., et al. 2018, AJ, 156,
|
739 |
+
123
|
740 |
+
Astropy Collaboration, Robitaille, T. P., Tollerud, E. J., et al. 2013, A&A, 558,
|
741 |
+
A33
|
742 |
+
Baraffe, I., Chabrier, G., Barman, T. S., Allard, F., & Hauschildt, P. H. 2003,
|
743 |
+
A&A, 402, 701
|
744 |
+
Benz, A. O. & Guedel, M. 1994, A&A, 285, 621
|
745 |
+
Berger, E. 2006, ApJ, 648, 629
|
746 |
+
Best, W. M. J., Liu, M. C., Magnier, E. A., & Dupuy, T. J. 2021, AJ, 161, 42
|
747 |
+
Best, W. M. J., Magnier, E. A., Liu, M. C., et al. 2018, ApJS, 234, 1
|
748 |
+
Bhardwaj, A. & Gladstone, G. R. 2000, Reviews of Geophysics, 38, 295
|
749 |
+
Brandt, T. D., Dupuy, T. J., Li, Y., et al. 2021, AJ, 162, 186
|
750 |
+
Callingham, J. R., Vedantham, H. K., Shimwell, T. W., et al. 2021, Nature As-
|
751 |
+
tronomy, 5, 1233
|
752 |
+
Chabrier, G. & Baraffe, I. 2000, ARA&A, 38, 337
|
753 |
+
Chambers, K. C., Magnier, E. A., Metcalfe, N., et al. 2016, arXiv e-prints,
|
754 |
+
arXiv:1612.05560
|
755 |
+
Chin, J. C. Y., Wizinowich, P., Wetherell, E., et al. 2016, in Society of Photo-
|
756 |
+
Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 9909,
|
757 |
+
Adaptive Optics Systems V, ed. E. Marchetti, L. M. Close, & J.-P. Véran,
|
758 |
+
99090S
|
759 |
+
Christensen, U. R., Holzwarth, V., & Reiners, A. 2009, Nature, 457, 167
|
760 |
+
Condon, J. J. & Ransom, S. M. 2016, Essential Radio Astronomy
|
761 |
+
Cutri, R. M., Skrutskie, M. F., van Dyk, S., et al. 2003, 2MASS All Sky Catalog
|
762 |
+
of point sources.
|
763 |
+
Cutri, R. M., Wright, E. L., Conrow, T., et al. 2013, Explanatory Supplement
|
764 |
+
to the AllWISE Data Release Products, Explanatory Supplement to the All-
|
765 |
+
WISE Data Release Products, by R. M. Cutri et al.
|
766 |
+
Dupuy, T. J. & Liu, M. C. 2017, ApJS, 231, 15
|
767 |
+
Dupuy, T. J., Liu, M. C., & Leggett, S. K. 2015, ApJ, 803, 102
|
768 |
+
Eisenhardt, P. R. M., Marocco, F., Fowler, J. W., et al. 2020, ApJS, 247, 69
|
769 |
+
Fazio, G. G., Hora, J. L., Allen, L. E., et al. 2004, ApJS, 154, 10
|
770 |
+
Filippazzo, J. C., Rice, E. L., Faherty, J., et al. 2015, ApJ, 810, 158
|
771 |
+
Gibbs, A. & Fitzgerald, M. P. 2022, AJ, 164, 63
|
772 |
+
Goldreich, P. & Lynden-Bell, D. 1969, ApJ, 156, 59
|
773 |
+
Hallinan, G., Antonova, A., Doyle, J. G., et al. 2008, ApJ, 684, 644
|
774 |
+
Hallinan, G., Bourke, S., Lane, C., et al. 2007, ApJ, 663, L25
|
775 |
+
Hallinan, G., Littlefair, S. P., Cotter, G., et al. 2015, Nature, 523, 568
|
776 |
+
Hill, T. W., Dessler, A. J., & Michel, F. C. 1974, Geophys. Res. Lett., 1, 3
|
777 |
+
Kao, M. M., Hallinan, G., & Pineda, J. S. 2019, MNRAS, 487, 1994
|
778 |
+
Kao, M. M., Hallinan, G., Pineda, J. S., et al. 2016, ApJ, 818, 24
|
779 |
+
Article number, page 6 of 7
|
780 |
+
|
781 |
+
Vedantham et al.: Radio pulsation from new T-dwarf binary
|
782 |
+
Kao, M. M., Hallinan, G., Pineda, J. S., Stevenson, D., & Burgasser, A. 2018,
|
783 |
+
ApJS, 237, 25
|
784 |
+
Kao, M. M. & Sebastian Pineda, J. 2022, ApJ, 932, 21
|
785 |
+
Kirkpatrick, J. D., Cushing, M. C., Gelino, C. R., et al. 2011, ApJS, 197, 19
|
786 |
+
Kirkpatrick, J. D., Martin, E. C., Smart, R. L., et al. 2019, ApJS, 240, 19
|
787 |
+
Lacy, M., Baum, S. A., Chandler, C. J., et al. 2020, PASP, 132, 035001
|
788 |
+
Lamy, L., Cecconi, B., Zarka, P., et al. 2011, Journal of Geophysical Research
|
789 |
+
(Space Physics), 116, A04212
|
790 |
+
Leto, P., Trigilio, C., Krtiˇcka, J., et al. 2021, MNRAS, 507, 1979
|
791 |
+
Liu, M. C., Dupuy, T. J., & Ireland, M. J. 2008, ApJ, 689, 436
|
792 |
+
Marocco, F., Eisenhardt, P. R. M., Fowler, J. W., et al. 2021, ApJS, 253, 8
|
793 |
+
Melrose, D. B. & Dulk, G. A. 1982, ApJ, 259, 844
|
794 |
+
Neubauer, F. M. 1998, J. Geophys. Res., 103, 19843
|
795 |
+
Nichols, J. D., Burleigh, M. R., Casewell, S. L., et al. 2012, ApJ, 760, 59
|
796 |
+
Offringa, A. R., McKinley, B., Hurley-Walker, N., et al. 2014, MNRAS, 444,
|
797 |
+
606
|
798 |
+
Phillips, M. W., Tremblin, P., Baraffe, I., et al. 2020, A&A, 637, A38
|
799 |
+
Pineda, J. S., Hallinan, G., & Kao, M. M. 2017, ApJ, 846, 75
|
800 |
+
Pineda, J. S., Hallinan, G., Kirkpatrick, J. D., et al. 2016, ApJ, 826, 73
|
801 |
+
Popinchalk, M., Faherty, J. K., Kiman, R., et al. 2021, ApJ, 916, 77
|
802 |
+
Reiners, A., Basri, G., & Christensen, U. R. 2009, ApJ, 697, 373
|
803 |
+
Reiners, A. & Christensen, U. R. 2010, A&A, 522, A13
|
804 |
+
Route, M. & Wolszczan, A. 2012, ApJ, 747, L22
|
805 |
+
Route, M. & Wolszczan, A. 2016a, ApJ, 821, L21
|
806 |
+
Route, M. & Wolszczan, A. 2016b, ApJ, 830, 85
|
807 |
+
Saumon, D. & Marley, M. S. 2008, ApJ, 689, 1327
|
808 |
+
Saur, J., Willmes, C., Fischer, C., et al. 2021, A&A, 655, A75
|
809 |
+
Service, M., Lu, J. R., Campbell, R., et al. 2016, PASP, 128, 095004
|
810 |
+
Shimwell, T. W., Hardcastle, M. J., Tasse, C., et al. 2022, A&A, 659, A1
|
811 |
+
Tokunaga, A. T., Simons, D. A., & Vacca, W. D. 2002, PASP, 114, 180
|
812 |
+
Turnpenney, S., Nichols, J. D., Wynn, G. A., & Casewell, S. L. 2017, MNRAS,
|
813 |
+
470, 4274
|
814 |
+
van Dam, M. A., Bouchez, A. H., Le Mignant, D., et al. 2006, PASP, 118, 310
|
815 |
+
van Haarlem, M. P., Wise, M. W., Gunst, A. W., et al. 2013, A&A, 556, A2
|
816 |
+
van Weeren, R. J., Shimwell, T. W., Botteon, A., et al. 2021, A&A, 651, A115
|
817 |
+
VanderPlas, J. T. 2018, ApJS, 236, 16
|
818 |
+
Vedantham, H. K., Callingham, J. R., Shimwell, T. W., et al. 2020, ApJ, 903, L33
|
819 |
+
Williams, P. K. G. 2018, in Handbook of Exoplanets, ed. H. J. Deeg & J. A.
|
820 |
+
Belmonte, 171
|
821 |
+
Williams, P. K. G., Gizis, J. E., & Berger, E. 2017, ApJ, 834, 117
|
822 |
+
Wizinowich, P. L., Le Mignant, D., Bouchez, A. H., et al. 2006, PASP, 118, 297
|
823 |
+
Wright, E. L., Eisenhardt, P. R. M., Mainzer, A. K., et al. 2010, AJ, 140, 1868
|
824 |
+
Yelda, S., Lu, J. R., Ghez, A. M., et al. 2010, ApJ, 725, 331
|
825 |
+
Zarka, P. 1998, J. Geophys. Res., 103, 20159
|
826 |
+
Zarka, P. 2007, Planet. Space Sci., 55, 598
|
827 |
+
Zarka, P., Cecconi, B., & Kurth, W. S. 2004, Journal of Geophysical Research
|
828 |
+
(Space Physics), 109, A09S15
|
829 |
+
Acknowledgements. We thank Dr. Davy Kirkpatrick for making the Keck optical
|
830 |
+
spectrum of WISEP J101905.63+652954.2 available to us in machine-readable
|
831 |
+
format. HKV acknowledges funding from the Dutch Research Council (NWO)
|
832 |
+
for the project e-MAPS (project number Vi.Vidi.203.093) under the NWO tal-
|
833 |
+
ent scheme VIDI. JRC thanks NWO for support via the Talent Programme Veni
|
834 |
+
grant. LOFAR is the Low Frequency Array designed and constructed by AS-
|
835 |
+
TRON. It has observing, data processing, and data storage facilities in sev-
|
836 |
+
eral countries, that are owned by various parties (each with their own fund-
|
837 |
+
ing sources), and that are collectively operated by the ILT foundation under a
|
838 |
+
joint scientific policy. The ILT resources have benefitted from the following re-
|
839 |
+
cent major funding sources: CNRS-INSU, Observatoire de Paris and Université
|
840 |
+
d’Orléans, France; BMBF, MIWF-NRW, MPG, Germany; Science Foundation
|
841 |
+
Ireland (SFI), Department of Business, Enterprise and Innovation (DBEI), Ire-
|
842 |
+
land; NWO, The Netherlands; The Science and Technology Facilities Council,
|
843 |
+
UK. This research made use of the Dutch national e-infrastructure with the sup-
|
844 |
+
port of the SURF Cooperative (e-infra 180169) and the LOFAR e-infra group.
|
845 |
+
The Jülich LOFAR Long Term Archive and the German LOFAR network are
|
846 |
+
both coordinated and operated by the Jülich Supercomputing Centre (JSC), and
|
847 |
+
computing resources on the supercomputer JUWELS at JSC were provided by
|
848 |
+
the Gauss Centre for Supercomputing e.V. (grant CHTB00) through the John von
|
849 |
+
Neumann Institute for Computing (NIC). This research made use of the Uni-
|
850 |
+
versity of Hertfordshire high-performance computing facility and the LOFAR-
|
851 |
+
UK computing facility located at the University of Hertfordshire and supported
|
852 |
+
by STFC [ST/P000096/1], and of the Italian LOFAR IT computing infrastruc-
|
853 |
+
ture supported and operated by INAF, and by the Physics Department of Turin
|
854 |
+
University (under an agreement with Consorzio Interuniversitario per la Fisica
|
855 |
+
Spaziale) at the C3S Supercomputing Centre, Italy. Some of The data presented
|
856 |
+
herein were obtained at the W. M. Keck Observatory, which is operated as a sci-
|
857 |
+
entific partnership among the California Institute of Technology, the University
|
858 |
+
of California and the National Aeronautics and Space Administration. The Ob-
|
859 |
+
servatory was made possible by the generous financial support of the W. M. Keck
|
860 |
+
Foundation. The authors wish to recognise and acknowledge the very significant
|
861 |
+
cultural role and reverence that the summit of Maunakea has always had within
|
862 |
+
the indigenous Hawaiian community. We are most fortunate to have the opportu-
|
863 |
+
nity to conduct observations from this mountain. For the purpose of open access,
|
864 |
+
the author has applied a Creative Commons Attribution (CC BY) licence to any
|
865 |
+
Author Accepted Manuscript version arising from this submission.
|
866 |
+
Article number, page 7 of 7
|
867 |
+
|
8NAzT4oBgHgl3EQfE_qO/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
8NAzT4oBgHgl3EQfSPtl/content/tmp_files/2301.01229v1.pdf.txt
ADDED
@@ -0,0 +1,340 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.01229v1 [hep-lat] 3 Jan 2023
|
2 |
+
Deconfinement in pure gauge SU(3) Yang-Mills theory: the
|
3 |
+
ghost propagator
|
4 |
+
Orlando Oliveira1,∗, Vítor Paiva1,∗∗, and Paulo Silva1,∗∗∗
|
5 |
+
1CFisUC, Department of Physics, University of Coimbra, 3004-516 Coimbra, Portugal
|
6 |
+
Abstract. The ghost propagator in Landau gauge is studied at finite temperature
|
7 |
+
below and above Tc using lattice QCD simulations. For high temperatures, we
|
8 |
+
find that the ghost propagator is enhanced, compared to the confined phase.
|
9 |
+
The results suggest that the ghost propagator can be used to identify the phase
|
10 |
+
transition, similarly to the gluon propagator case.
|
11 |
+
1 Introduction
|
12 |
+
The QCD phase diagram has been the subject of several recent theoretical studies, motivated
|
13 |
+
by heavy ion experimental programs. At zero density, one expects a phase transition where
|
14 |
+
quarks and gluons become deconfined at high temperatures. The Polyakov loop L is the order
|
15 |
+
parameter for this transition: for temperatures below the critical temperature Tc, L = 0 and
|
16 |
+
quarks and gluons are confined inside hadrons. For pure gauge theories Tc = 270 MeV; the
|
17 |
+
inclusion of dynamical quarks lowers this value to Tc ∼ 170 MeV.
|
18 |
+
In QCD, propagators of fundamental fields encode information about non-perturbative
|
19 |
+
phenomena, such as confinement, deconfinement and chiral symmetry breaking. Following
|
20 |
+
our previous studies of the Landau gauge gluon [1, 2] and quark [3, 4] propagators at finite
|
21 |
+
temperature, here we study the behaviour of the ghost propagator in Landau gauge at finite
|
22 |
+
temperature.
|
23 |
+
2 Ghost Propagator
|
24 |
+
2.1 Setup
|
25 |
+
On the lattice, the computation of the ghost propagator relies on the inversion of a discretized
|
26 |
+
version of the Faddeev-Popov matrix. For details see, for example, [5].
|
27 |
+
In order to evaluate the behaviour of the ghost propagator below and above the critical
|
28 |
+
temperature, a number of lattice ensembles were considered, covering a range of temperatures
|
29 |
+
from 121 MeV up to 486 MeV, as summarized in table 1, where Ls is the number of lattice
|
30 |
+
sites in any spatial direction, Lt is the number of lattice sites in the temporal direction and a
|
31 |
+
is the lattice spacing. The temperature is defined as T = 1/(aLt). Following previous works,
|
32 |
+
here we only consider the first Matsubara frequency.
|
33 |
+
∗e-mail: [email protected]
|
34 |
+
∗∗e-mail: [email protected]
|
35 |
+
∗∗∗e-mail: [email protected]
|
36 |
+
|
37 |
+
Table 1. Lattice setup.
|
38 |
+
Temp. (MeV)
|
39 |
+
β
|
40 |
+
Ls
|
41 |
+
Lt
|
42 |
+
a [fm]
|
43 |
+
1/a (GeV)
|
44 |
+
121
|
45 |
+
6.0000
|
46 |
+
64
|
47 |
+
16
|
48 |
+
0.1016
|
49 |
+
1.943
|
50 |
+
194
|
51 |
+
6.0000
|
52 |
+
64
|
53 |
+
10
|
54 |
+
0.1016
|
55 |
+
1.943
|
56 |
+
243
|
57 |
+
6.0000
|
58 |
+
64
|
59 |
+
8
|
60 |
+
0.1016
|
61 |
+
1.943
|
62 |
+
260
|
63 |
+
6.0347
|
64 |
+
68
|
65 |
+
8
|
66 |
+
0.09502
|
67 |
+
2.0767
|
68 |
+
265
|
69 |
+
5.8876
|
70 |
+
52
|
71 |
+
6
|
72 |
+
0.1243
|
73 |
+
1.5881
|
74 |
+
275
|
75 |
+
6.0684
|
76 |
+
72
|
77 |
+
8
|
78 |
+
0.08974
|
79 |
+
2.1989
|
80 |
+
324
|
81 |
+
6.0000
|
82 |
+
64
|
83 |
+
6
|
84 |
+
0.1016
|
85 |
+
1.943
|
86 |
+
366
|
87 |
+
6.0684
|
88 |
+
72
|
89 |
+
6
|
90 |
+
0.08974
|
91 |
+
2.1989
|
92 |
+
486
|
93 |
+
6.0000
|
94 |
+
64
|
95 |
+
4
|
96 |
+
0.1016
|
97 |
+
1.943
|
98 |
+
For each of the temperatures studied, we used a lattice ensemble of 100 configurations.
|
99 |
+
Since an “all-to-all” propagatorwould be computationally extremely costly, two point sources
|
100 |
+
are considered for each configuration, one at the origin of the lattice, (0, 0, 0, 0), and one at
|
101 |
+
the lattice’s spatial midpoint, (Ls/2, Ls/2, Ls/2, 0). A simple average over the two is taken in
|
102 |
+
order to mimic an “all-to-all” propagator with “point-to-all” propagators.
|
103 |
+
In order to account for lattice artefacts for large momenta, the (physical) momenta above
|
104 |
+
1 GeV were subject to a cylindrical cut [6] where only momenta whose distance, d, from the
|
105 |
+
lattice’s diagonal was such that d a < 4 (2π/Ls) were considered in the final data – that is,
|
106 |
+
momenta less than four spatial units away from the lattice’s diagonal, (p, p, p, 0).
|
107 |
+
The propagators pertaining to different temperatures were renormalized at µ = 4 GeV, by
|
108 |
+
imposing G(µ2) = 1/µ2. In order to do so, a fit was performed to the propagators, with the
|
109 |
+
functional form
|
110 |
+
G(p2) =
|
111 |
+
b + cp2
|
112 |
+
p4 + dp2 + e
|
113 |
+
,
|
114 |
+
(1)
|
115 |
+
where b, c, d and e are adjustable parameters.
|
116 |
+
2.2 Temperature Dependence
|
117 |
+
The effect of temperature in the ghost propagator for all momentum range is exhibited in
|
118 |
+
figures 1 and 2. Note that our results are similar to previous results using quenched ensembles
|
119 |
+
with smaller lattice volumes [7].
|
120 |
+
The distinction between the behaviour below and above the critical temperature is only
|
121 |
+
made clear at lower values of the momenta, as was also observed for the gluon propagator.
|
122 |
+
Figure 2 zooms in on the infrared (IR) region of the ghost propagator, where the enhancement
|
123 |
+
of the propagator above Tc, relative to the confined case, is visible. Below the critical temper-
|
124 |
+
ature, the propagators for the different temperatures are compatible within statistical errors.
|
125 |
+
As Figure 3 further illustrates for the four lowest accessible momenta, the enhancement effect
|
126 |
+
rapidly decreases as the momentum increases and the two regimes become indistinguishable
|
127 |
+
for high momenta.
|
128 |
+
2.3 Z3 Dependence
|
129 |
+
On the lattice, gauge configurations related to each other through a center (or Z3) transforma-
|
130 |
+
tion are equivalent. The Wilson gauge action is invariant under a center transformation, which
|
131 |
+
consists in the multiplication of all time links in a constant temporal hyperplane, x4 = const,
|
132 |
+
|
133 |
+
0
|
134 |
+
1
|
135 |
+
2
|
136 |
+
3
|
137 |
+
4
|
138 |
+
5
|
139 |
+
6
|
140 |
+
7
|
141 |
+
8
|
142 |
+
p(GeV)
|
143 |
+
0,01
|
144 |
+
0,1
|
145 |
+
1
|
146 |
+
10
|
147 |
+
100
|
148 |
+
G(p
|
149 |
+
2)
|
150 |
+
T = 121 MeV
|
151 |
+
T = 194 MeV
|
152 |
+
T = 243 MeV
|
153 |
+
T = 260 MeV
|
154 |
+
T = 265 MeV
|
155 |
+
T = 275 MeV
|
156 |
+
T = 324 MeV
|
157 |
+
T = 366 MeV
|
158 |
+
T = 486 MeV
|
159 |
+
Ghost Propagator at finite temperature
|
160 |
+
Renormalized at 4 GeV
|
161 |
+
Figure 1. Renormalized ghost propagator at finite temperature.
|
162 |
+
0
|
163 |
+
0,2
|
164 |
+
0,4
|
165 |
+
0,6
|
166 |
+
0,8
|
167 |
+
1
|
168 |
+
p(GeV)
|
169 |
+
0
|
170 |
+
10
|
171 |
+
20
|
172 |
+
30
|
173 |
+
40
|
174 |
+
50
|
175 |
+
60
|
176 |
+
70
|
177 |
+
80
|
178 |
+
90
|
179 |
+
G(p
|
180 |
+
2)
|
181 |
+
T = 121 MeV
|
182 |
+
T = 194 MeV
|
183 |
+
T = 243 MeV
|
184 |
+
T = 260 MeV
|
185 |
+
T = 265 MeV
|
186 |
+
T = 275 MeV
|
187 |
+
T = 324 MeV
|
188 |
+
T = 366 MeV
|
189 |
+
T = 486 MeV
|
190 |
+
Ghost Propagator at finite temperature
|
191 |
+
Renormalized at 4 GeV
|
192 |
+
Figure 2. Renormalized ghost propagator at finite temperature in the IR region.
|
193 |
+
by an element z of the center (or Z3) group,
|
194 |
+
Z3 = {e−i 2π
|
195 |
+
3 , 1, ei 2π
|
196 |
+
3 } .
|
197 |
+
(2)
|
198 |
+
The symmetry holds for closed loops like the Wilson loop. The Polyakov loop, L(⃗x), however,
|
199 |
+
is not invariant under such a transformation, L(⃗x) → zL(⃗x). It thus constitutes an order
|
200 |
+
parameter for the deconfinement phase transition. Below Tc, center symmetry holds and
|
201 |
+
⟨L⟩ = 0; above Tc, center symmetry is spontaneously broken, the Z3 sectors are not equally
|
202 |
+
populated and ⟨L⟩ � 0.
|
203 |
+
Previous works have shown that the gluon [2] and quark propagators [4] are sensitive
|
204 |
+
to the Z3 sector of the gauge configurations. Our preliminary results suggest that the ghost
|
205 |
+
propagator is also sensitive to the Z3 sector above Tc. Figure 4 shows the IR region of two
|
206 |
+
lattice simulations with Ls = 72 and Lt = 8 with β = 6.058 (left-hand panel) and β = 6.066
|
207 |
+
(right-hand panel). The results show that the ghost propagator behaves differently below and
|
208 |
+
|
209 |
+
100
|
210 |
+
200
|
211 |
+
300
|
212 |
+
400
|
213 |
+
500
|
214 |
+
T (MeV)
|
215 |
+
75
|
216 |
+
80
|
217 |
+
85
|
218 |
+
90
|
219 |
+
G(p
|
220 |
+
2)
|
221 |
+
Ghost Propagator as a function of temperature
|
222 |
+
p = 191 MeV
|
223 |
+
100
|
224 |
+
200
|
225 |
+
300
|
226 |
+
400
|
227 |
+
500
|
228 |
+
T (MeV)
|
229 |
+
33
|
230 |
+
36
|
231 |
+
39
|
232 |
+
42
|
233 |
+
G(p
|
234 |
+
2)
|
235 |
+
Ghost Propagator as a function of temperature
|
236 |
+
p = 270 MeV
|
237 |
+
100
|
238 |
+
200
|
239 |
+
300
|
240 |
+
400
|
241 |
+
500
|
242 |
+
T (MeV)
|
243 |
+
20
|
244 |
+
22
|
245 |
+
24
|
246 |
+
G(p
|
247 |
+
2)
|
248 |
+
Ghost Propagator as a function of temperature
|
249 |
+
p = 330 MeV
|
250 |
+
100
|
251 |
+
200
|
252 |
+
300
|
253 |
+
400
|
254 |
+
500
|
255 |
+
T (MeV)
|
256 |
+
14
|
257 |
+
15
|
258 |
+
16
|
259 |
+
17
|
260 |
+
G(p
|
261 |
+
2)
|
262 |
+
Ghost Propagator as a function of temperature
|
263 |
+
p = 381 MeV
|
264 |
+
Figure 3. Ghost propagator as a function of temperature for p = 191 MeV (top left panel), p = 270
|
265 |
+
MeV (top right panel), p = 330 MeV (left bottom panel) and p = 381 MeV (right bottom panel). The
|
266 |
+
red vertical line indicates the critical temperature Tc.
|
267 |
+
0
|
268 |
+
0,2
|
269 |
+
0,4
|
270 |
+
0,6
|
271 |
+
0,8
|
272 |
+
1
|
273 |
+
p (GeV)
|
274 |
+
0
|
275 |
+
20
|
276 |
+
40
|
277 |
+
60
|
278 |
+
80
|
279 |
+
G(p
|
280 |
+
2)
|
281 |
+
sector -1
|
282 |
+
sector 0
|
283 |
+
sector 1
|
284 |
+
0
|
285 |
+
0,2
|
286 |
+
0,4
|
287 |
+
0,6
|
288 |
+
0,8
|
289 |
+
1
|
290 |
+
p (GeV)
|
291 |
+
0
|
292 |
+
20
|
293 |
+
40
|
294 |
+
60
|
295 |
+
80
|
296 |
+
G(p
|
297 |
+
2)
|
298 |
+
sector -1
|
299 |
+
sector 0
|
300 |
+
sector 1
|
301 |
+
Figure 4. Ghost propagator’s sector dependence below Tc (left-hand panel at T = 270 MeV) and above
|
302 |
+
Tc (right-hand panel at T = 274 MeV).
|
303 |
+
above Tc, with a suppression of the ±1 sectors relative to the 0 sector for the deconfined phase.
|
304 |
+
As we found previously for the gluon propagator [2], the ±1 sectors are indistinguishable
|
305 |
+
above Tc.
|
306 |
+
|
307 |
+
3 Conclusions and outlook
|
308 |
+
In this paper we study the Landau gauge ghost propagator at finite temperature using lattice
|
309 |
+
simulations. We found an enhancement of the ghost form factor above the critical tempera-
|
310 |
+
ture Tc, already found in previous SU(3) studies on smaller volumes [7]. Note that early
|
311 |
+
SU(2) studies concluded in favour of a nearly independent ghost propagator with the temper-
|
312 |
+
ature [8]. We also show preliminary results for the Z3 dependence of the ghost propagator.
|
313 |
+
Although the propagators in the various sectors are indistinguishable below Tc, we found a
|
314 |
+
suppression, above Tc, of the ±1 sectors in comparison with the 0 sector. However, in the
|
315 |
+
deconfined phase the ±1 sectors are still compatible within errors.
|
316 |
+
We are currently extending the study of the Z3 dependence for other temperatures. In the
|
317 |
+
near future we also plan to study the QCD propagators at finite temperature using dynamical
|
318 |
+
configurations.
|
319 |
+
Acknowledgements
|
320 |
+
This work was partly supported by the FCT – Fundação para a Ciência e a Tecnolo-
|
321 |
+
gia, I.P., under Projects Nos.
|
322 |
+
UIDB/04564/2020, UIDP/04564/2020 and CERN/FIS-
|
323 |
+
COM/0029/2017. P. J. S. acknowledges financial support from FCT (Portugal) under Con-
|
324 |
+
tract No. CEECIND/00488/2017. The authors acknowledge the Laboratory for Advanced
|
325 |
+
Computing at the University of Coimbra (http://www.uc.pt/lca) for providing access to the
|
326 |
+
HPC resource Navigator.
|
327 |
+
References
|
328 |
+
[1] P.J. Silva, O. Oliveira, P. Bicudo, N. Cardoso, Phys. Rev. D 89, 074503 (2014),
|
329 |
+
1310.5629
|
330 |
+
[2] P.J. Silva, O. Oliveira, Phys. Rev. D 93, 114509 (2016), 1601.01594
|
331 |
+
[3] O. Oliveira, P.J. Silva, Eur. Phys. J. C 79, 793 (2019), 1903.00263
|
332 |
+
[4] P.J. Silva, O. Oliveira, PoS LATTICE2019, 047 (2020), 1912.13061
|
333 |
+
[5] A. Cucchieri, D. Dudal, T. Mendes, O. Oliveira, M. Roelfs, P.J. Silva, PoS LAT-
|
334 |
+
TICE2018, 252 (2018), 1811.11521
|
335 |
+
[6] D.B. Leinweber, J.I. Skullerud, A.G. Williams, C. Parrinello (UKQCD), Phys. Rev. D
|
336 |
+
60, 094507 (1999), [Erratum: Phys.Rev.D 61, 079901 (2000)], hep-lat/9811027
|
337 |
+
[7] R. Aouane, V.G. Bornyakov, E.M. Ilgenfritz, V.K. Mitrjushkin, M. Müller-Preussker,
|
338 |
+
A. Sternbeck, Phys. Rev. D 85, 034501 (2012)
|
339 |
+
[8] A. Cucchieri, A. Maas, T. Mendes, Phys. Rev. D 75, 076003 (2007), hep-lat/0702022
|
340 |
+
|
8NAzT4oBgHgl3EQfSPtl/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,226 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf,len=225
|
2 |
+
page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
3 |
+
page_content='01229v1 [hep-lat] 3 Jan 2023 Deconfinement in pure gauge SU(3) Yang-Mills theory: the ghost propagator Orlando Oliveira1,∗, Vítor Paiva1,∗∗, and Paulo Silva1,∗∗∗ 1CFisUC, Department of Physics, University of Coimbra, 3004-516 Coimbra, Portugal Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
4 |
+
page_content=' The ghost propagator in Landau gauge is studied at finite temperature below and above Tc using lattice QCD simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
5 |
+
page_content=' For high temperatures, we find that the ghost propagator is enhanced, compared to the confined phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
6 |
+
page_content=' The results suggest that the ghost propagator can be used to identify the phase transition, similarly to the gluon propagator case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
7 |
+
page_content=' 1 Introduction The QCD phase diagram has been the subject of several recent theoretical studies, motivated by heavy ion experimental programs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
8 |
+
page_content=' At zero density, one expects a phase transition where quarks and gluons become deconfined at high temperatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
9 |
+
page_content=' The Polyakov loop L is the order parameter for this transition: for temperatures below the critical temperature Tc, L = 0 and quarks and gluons are confined inside hadrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
10 |
+
page_content=' For pure gauge theories Tc = 270 MeV;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
11 |
+
page_content=' the inclusion of dynamical quarks lowers this value to Tc ∼ 170 MeV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
12 |
+
page_content=' In QCD, propagators of fundamental fields encode information about non-perturbative phenomena, such as confinement, deconfinement and chiral symmetry breaking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
13 |
+
page_content=' Following our previous studies of the Landau gauge gluon [1, 2] and quark [3, 4] propagators at finite temperature, here we study the behaviour of the ghost propagator in Landau gauge at finite temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
14 |
+
page_content=' 2 Ghost Propagator 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
15 |
+
page_content='1 Setup On the lattice, the computation of the ghost propagator relies on the inversion of a discretized version of the Faddeev-Popov matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
16 |
+
page_content=' For details see, for example, [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
17 |
+
page_content=' In order to evaluate the behaviour of the ghost propagator below and above the critical temperature, a number of lattice ensembles were considered, covering a range of temperatures from 121 MeV up to 486 MeV, as summarized in table 1, where Ls is the number of lattice sites in any spatial direction, Lt is the number of lattice sites in the temporal direction and a is the lattice spacing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
18 |
+
page_content=' The temperature is defined as T = 1/(aLt).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
19 |
+
page_content=' Following previous works, here we only consider the first Matsubara frequency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
20 |
+
page_content=' ∗e-mail: orlando@uc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
21 |
+
page_content='pt ∗∗e-mail: vpaiva462@gmail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
22 |
+
page_content='com ∗∗∗e-mail: psilva@uc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
23 |
+
page_content='pt Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
24 |
+
page_content=' Lattice setup.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
25 |
+
page_content=' Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
26 |
+
page_content=' (MeV) β Ls Lt a [fm] 1/a (GeV) 121 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
27 |
+
page_content='0000 64 16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
28 |
+
page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
29 |
+
page_content='943 194 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
30 |
+
page_content='0000 64 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
31 |
+
page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
32 |
+
page_content='943 243 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
33 |
+
page_content='0000 64 8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
34 |
+
page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
35 |
+
page_content='943 260 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
36 |
+
page_content='0347 68 8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
37 |
+
page_content='09502 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
38 |
+
page_content='0767 265 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
39 |
+
page_content='8876 52 6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
40 |
+
page_content='1243 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
41 |
+
page_content='5881 275 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
42 |
+
page_content='0684 72 8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
43 |
+
page_content='08974 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
44 |
+
page_content='1989 324 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
45 |
+
page_content='0000 64 6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
46 |
+
page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
47 |
+
page_content='943 366 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
48 |
+
page_content='0684 72 6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
49 |
+
page_content='08974 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
50 |
+
page_content='1989 486 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
51 |
+
page_content='0000 64 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
52 |
+
page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
53 |
+
page_content='943 For each of the temperatures studied, we used a lattice ensemble of 100 configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
54 |
+
page_content=' Since an “all-to-all” propagatorwould be computationally extremely costly, two point sources are considered for each configuration, one at the origin of the lattice, (0, 0, 0, 0), and one at the lattice’s spatial midpoint, (Ls/2, Ls/2, Ls/2, 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
55 |
+
page_content=' A simple average over the two is taken in order to mimic an “all-to-all” propagator with “point-to-all” propagators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
56 |
+
page_content=' In order to account for lattice artefacts for large momenta, the (physical) momenta above 1 GeV were subject to a cylindrical cut [6] where only momenta whose distance, d, from the lattice’s diagonal was such that d a < 4 (2π/Ls) were considered in the final data – that is, momenta less than four spatial units away from the lattice’s diagonal, (p, p, p, 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
57 |
+
page_content=' The propagators pertaining to different temperatures were renormalized at µ = 4 GeV, by imposing G(µ2) = 1/µ2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
58 |
+
page_content=' In order to do so, a fit was performed to the propagators, with the functional form G(p2) = b + cp2 p4 + dp2 + e , (1) where b, c, d and e are adjustable parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
59 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
60 |
+
page_content='2 Temperature Dependence The effect of temperature in the ghost propagator for all momentum range is exhibited in figures 1 and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
61 |
+
page_content=' Note that our results are similar to previous results using quenched ensembles with smaller lattice volumes [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
62 |
+
page_content=' The distinction between the behaviour below and above the critical temperature is only made clear at lower values of the momenta, as was also observed for the gluon propagator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
63 |
+
page_content=' Figure 2 zooms in on the infrared (IR) region of the ghost propagator, where the enhancement of the propagator above Tc, relative to the confined case, is visible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
64 |
+
page_content=' Below the critical temper- ature, the propagators for the different temperatures are compatible within statistical errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
65 |
+
page_content=' As Figure 3 further illustrates for the four lowest accessible momenta, the enhancement effect rapidly decreases as the momentum increases and the two regimes become indistinguishable for high momenta.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
66 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
67 |
+
page_content='3 Z3 Dependence On the lattice, gauge configurations related to each other through a center (or Z3) transforma- tion are equivalent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
68 |
+
page_content=' The Wilson gauge action is invariant under a center transformation, which consists in the multiplication of all time links in a constant temporal hyperplane, x4 = const, 0 1 2 3 4 5 6 7 8 p(GeV) 0,01 0,1 1 10 100 G(p 2) T = 121 MeV T = 194 MeV T = 243 MeV T = 260 MeV T = 265 MeV T = 275 MeV T = 324 MeV T = 366 MeV T = 486 MeV Ghost Propagator at finite temperature Renormalized at 4 GeV Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
69 |
+
page_content=' Renormalized ghost propagator at finite temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
70 |
+
page_content=' 0 0,2 0,4 0,6 0,8 1 p(GeV) 0 10 20 30 40 50 60 70 80 90 G(p 2) T = 121 MeV T = 194 MeV T = 243 MeV T = 260 MeV T = 265 MeV T = 275 MeV T = 324 MeV T = 366 MeV T = 486 MeV Ghost Propagator at finite temperature Renormalized at 4 GeV Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
71 |
+
page_content=' Renormalized ghost propagator at finite temperature in the IR region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
72 |
+
page_content=' by an element z of the center (or Z3) group, Z3 = {e−i 2π 3 , 1, ei 2π 3 } .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
73 |
+
page_content=' (2) The symmetry holds for closed loops like the Wilson loop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
74 |
+
page_content=' The Polyakov loop, L(⃗x), however, is not invariant under such a transformation, L(⃗x) → zL(⃗x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
75 |
+
page_content=' It thus constitutes an order parameter for the deconfinement phase transition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
76 |
+
page_content=' Below Tc, center symmetry holds and ⟨L⟩ = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
77 |
+
page_content=' above Tc, center symmetry is spontaneously broken, the Z3 sectors are not equally populated and ⟨L⟩ � 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
78 |
+
page_content=' Previous works have shown that the gluon [2] and quark propagators [4] are sensitive to the Z3 sector of the gauge configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
79 |
+
page_content=' Our preliminary results suggest that the ghost propagator is also sensitive to the Z3 sector above Tc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
80 |
+
page_content=' Figure 4 shows the IR region of two lattice simulations with Ls = 72 and Lt = 8 with β = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
81 |
+
page_content='058 (left-hand panel) and β = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
82 |
+
page_content='066 (right-hand panel).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
83 |
+
page_content=' The results show that the ghost propagator behaves differently below and ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
84 |
+
page_content='100 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
85 |
+
page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
86 |
+
page_content='300 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
87 |
+
page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
88 |
+
page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
89 |
+
page_content='T (MeV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
90 |
+
page_content='75 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
91 |
+
page_content='80 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
92 |
+
page_content='85 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
93 |
+
page_content='90 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
94 |
+
page_content='G(p ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
95 |
+
page_content='2) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
96 |
+
page_content='Ghost Propagator as a function of temperature ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
97 |
+
page_content='p = 191 MeV ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
98 |
+
page_content='100 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
99 |
+
page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
100 |
+
page_content='300 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
101 |
+
page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
102 |
+
page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
103 |
+
page_content='T (MeV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
104 |
+
page_content='33 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
105 |
+
page_content='36 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
106 |
+
page_content='39 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
107 |
+
page_content='42 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
108 |
+
page_content='G(p ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
109 |
+
page_content='2) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
110 |
+
page_content='Ghost Propagator as a function of temperature ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
111 |
+
page_content='p = 270 MeV ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
112 |
+
page_content='100 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
113 |
+
page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
114 |
+
page_content='300 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
115 |
+
page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
116 |
+
page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
117 |
+
page_content='T (MeV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
118 |
+
page_content='20 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
119 |
+
page_content='22 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
120 |
+
page_content='24 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
121 |
+
page_content='G(p ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
122 |
+
page_content='2) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
123 |
+
page_content='Ghost Propagator as a function of temperature ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
124 |
+
page_content='p = 330 MeV ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
125 |
+
page_content='100 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
126 |
+
page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
127 |
+
page_content='300 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
128 |
+
page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
129 |
+
page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
130 |
+
page_content='T (MeV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
131 |
+
page_content='14 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
132 |
+
page_content='15 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
133 |
+
page_content='16 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
134 |
+
page_content='17 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
135 |
+
page_content='G(p ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
136 |
+
page_content='2) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
137 |
+
page_content='Ghost Propagator as a function of temperature ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
138 |
+
page_content='p = 381 MeV ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
139 |
+
page_content='Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
140 |
+
page_content=' Ghost propagator as a function of temperature for p = 191 MeV (top left panel), p = 270 MeV (top right panel), p = 330 MeV (left bottom panel) and p = 381 MeV (right bottom panel).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
141 |
+
page_content=' The red vertical line indicates the critical temperature Tc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
142 |
+
page_content=' 0 0,2 0,4 0,6 0,8 1 p (GeV) 0 20 40 60 80 G(p 2) sector -1 sector 0 sector 1 0 0,2 0,4 0,6 0,8 1 p (GeV) 0 20 40 60 80 G(p 2) sector -1 sector 0 sector 1 Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
143 |
+
page_content=' Ghost propagator’s sector dependence below Tc (left-hand panel at T = 270 MeV) and above Tc (right-hand panel at T = 274 MeV).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
144 |
+
page_content=' above Tc, with a suppression of the ±1 sectors relative to the 0 sector for the deconfined phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
145 |
+
page_content=' As we found previously for the gluon propagator [2], the ±1 sectors are indistinguishable above Tc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
146 |
+
page_content=' 3 Conclusions and outlook In this paper we study the Landau gauge ghost propagator at finite temperature using lattice simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
147 |
+
page_content=' We found an enhancement of the ghost form factor above the critical tempera- ture Tc, already found in previous SU(3) studies on smaller volumes [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
148 |
+
page_content=' Note that early SU(2) studies concluded in favour of a nearly independent ghost propagator with the temper- ature [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
149 |
+
page_content=' We also show preliminary results for the Z3 dependence of the ghost propagator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
150 |
+
page_content=' Although the propagators in the various sectors are indistinguishable below Tc, we found a suppression, above Tc, of the ±1 sectors in comparison with the 0 sector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
151 |
+
page_content=' However, in the deconfined phase the ±1 sectors are still compatible within errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
152 |
+
page_content=' We are currently extending the study of the Z3 dependence for other temperatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
153 |
+
page_content=' In the near future we also plan to study the QCD propagators at finite temperature using dynamical configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
154 |
+
page_content=' Acknowledgements This work was partly supported by the FCT – Fundação para a Ciência e a Tecnolo- gia, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
155 |
+
page_content='P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
156 |
+
page_content=', under Projects Nos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
157 |
+
page_content=' UIDB/04564/2020, UIDP/04564/2020 and CERN/FIS- COM/0029/2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
158 |
+
page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
159 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
160 |
+
page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
161 |
+
page_content=' acknowledges financial support from FCT (Portugal) under Con- tract No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
162 |
+
page_content=' CEECIND/00488/2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
163 |
+
page_content=' The authors acknowledge the Laboratory for Advanced Computing at the University of Coimbra (http://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
164 |
+
page_content='uc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
165 |
+
page_content='pt/lca) for providing access to the HPC resource Navigator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
166 |
+
page_content=' References [1] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
167 |
+
page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
168 |
+
page_content=' Silva, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
169 |
+
page_content=' Oliveira, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
170 |
+
page_content=' Bicudo, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
171 |
+
page_content=' Cardoso, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
172 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
173 |
+
page_content=' D 89, 074503 (2014), 1310.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
174 |
+
page_content='5629 [2] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
175 |
+
page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
176 |
+
page_content=' Silva, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
177 |
+
page_content=' Oliveira, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
178 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
179 |
+
page_content=' D 93, 114509 (2016), 1601.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
180 |
+
page_content='01594 [3] O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
181 |
+
page_content=' Oliveira, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
182 |
+
page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
183 |
+
page_content=' Silva, Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
184 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
185 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
186 |
+
page_content=' C 79, 793 (2019), 1903.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
187 |
+
page_content='00263 [4] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
188 |
+
page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
189 |
+
page_content=' Silva, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
190 |
+
page_content=' Oliveira, PoS LATTICE2019, 047 (2020), 1912.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
191 |
+
page_content='13061 [5] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
192 |
+
page_content=' Cucchieri, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
193 |
+
page_content=' Dudal, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
194 |
+
page_content=' Mendes, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
195 |
+
page_content=' Oliveira, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
196 |
+
page_content=' Roelfs, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
197 |
+
page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
198 |
+
page_content=' Silva, PoS LAT- TICE2018, 252 (2018), 1811.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
199 |
+
page_content='11521 [6] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
200 |
+
page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
201 |
+
page_content=' Leinweber, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
202 |
+
page_content='I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
203 |
+
page_content=' Skullerud, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
204 |
+
page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
205 |
+
page_content=' Williams, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
206 |
+
page_content=' Parrinello (UKQCD), Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
207 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
208 |
+
page_content=' D 60, 094507 (1999), [Erratum: Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
209 |
+
page_content='Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
210 |
+
page_content='D 61, 079901 (2000)], hep-lat/9811027 [7] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
211 |
+
page_content=' Aouane, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
212 |
+
page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
213 |
+
page_content=' Bornyakov, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
214 |
+
page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
215 |
+
page_content=' Ilgenfritz, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
216 |
+
page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
217 |
+
page_content=' Mitrjushkin, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
218 |
+
page_content=' Müller-Preussker, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
219 |
+
page_content=' Sternbeck, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
220 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
221 |
+
page_content=' D 85, 034501 (2012) [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
222 |
+
page_content=' Cucchieri, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
223 |
+
page_content=' Maas, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
224 |
+
page_content=' Mendes, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
225 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
226 |
+
page_content=' D 75, 076003 (2007), hep-lat/0702022' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
|
8dE5T4oBgHgl3EQfQg7H/content/tmp_files/2301.05514v1.pdf.txt
ADDED
@@ -0,0 +1,383 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Primal-Dual Cops and Robber
|
2 |
+
Minh Tuan Ha �
|
3 |
+
Karlsruhe Institute of Technology, Germany
|
4 |
+
Paul Jungeblut �
|
5 |
+
Karlsruhe Institute of Technology, Germany
|
6 |
+
Torsten Ueckerdt �
|
7 |
+
Karlsruhe Institute of Technology, Germany
|
8 |
+
Abstract
|
9 |
+
Cops and Robber is a family of two-player games played on graphs in which one player controls a
|
10 |
+
number of cops and the other player controls a robber. In alternating turns, each player moves (all)
|
11 |
+
his/her figures. The cops try to capture the robber while the latter tries to flee indefinitely. In this
|
12 |
+
paper we consider a variant of the game played on a planar graph where the robber moves between
|
13 |
+
adjacent vertices while the cops move between adjacent faces. The cops capture the robber if they
|
14 |
+
occupy all incident faces. We prove that a constant number of cops suffices to capture the robber on
|
15 |
+
any planar graph of maximum degree ∆ if and only if ∆ ≤ 4.
|
16 |
+
2012 ACM Subject Classification Mathematics of computing → Discrete mathematics → Combi-
|
17 |
+
natorics → Combinatoric problems
|
18 |
+
Keywords and phrases Cops and robber, planar graph, dual graph
|
19 |
+
1
|
20 |
+
Introduction
|
21 |
+
Cops and Robber is probably the most classical combinatorial pursuit-evasion game on graphs.
|
22 |
+
The robber models an intruder in a network that the cops try to capture. Two players play
|
23 |
+
with complete information on a fixed finite graph G = (V, E). The cop player controls a set
|
24 |
+
of k cops, each occupying a vertex of G (possibly several cops on the same vertex), while
|
25 |
+
the robber player controls a single robber that also occupies a vertex of G. The players
|
26 |
+
take alternating turns, where the cop player in his turn can decide for each cop individually
|
27 |
+
whether to stay at its position or move the cop along an edge of G onto an adjacent vertex.
|
28 |
+
Similarly, the robber player on her turn can leave the robber at its position or move it along
|
29 |
+
an edge of G. The cop player starts by choosing starting positions for his k cops and wins
|
30 |
+
the game as soon as at least one cop occupies the same vertex as the robber, i.e., when
|
31 |
+
the robber is captured. The robber player, seeing the cops positions, chooses the starting
|
32 |
+
position for her robber and wins if she can avoid capture indefinitely. The least integer k for
|
33 |
+
which, assuming perfect play on either side, k cops can always capture the robber, is called
|
34 |
+
the cop number of G, usually denoted by c(G).
|
35 |
+
In this paper, we introduce Primal-Dual Cops and Robber which is played on a plane
|
36 |
+
graph G, i.e., with a fixed plane embedding. Here, the cops occupy the faces of G and can
|
37 |
+
move between adjacent faces (i.e., faces that share an edge), while the robber still moves
|
38 |
+
along edges between adjacent vertices of G. In this game, the robber is captured if every
|
39 |
+
face incident to the robber’s vertex is occupied by at least one cop. Analogously, we call the
|
40 |
+
least integer k for which k cops can always capture the robber in the Primal-Dual Cops and
|
41 |
+
Robber game the primal-dual cop number of G and denote it by c∗(G).
|
42 |
+
An obvious lower bound for c∗(G) is the maximum number of faces incident to any vertex
|
43 |
+
in G: The robber can choose such a vertex as its start position and just stay there indefinitely
|
44 |
+
(note that there is no zugzwang, i.e., no obligation to move during ones turn). In particular,
|
45 |
+
if G has maximum degree ∆(G) and there exists a vertex v with deg(v) = ∆(G), which is
|
46 |
+
not a cut-vertex, then c∗(G) ≥ ∆(G). E.g., c∗(K2,n) = ∆(K2,n) = n for any n ≥ 2.
|
47 |
+
arXiv:2301.05514v1 [math.CO] 13 Jan 2023
|
48 |
+
|
49 |
+
2
|
50 |
+
Primal-Dual Cops and Robber
|
51 |
+
Our contribution.
|
52 |
+
We investigate, whether the primal-dual cop number c∗(G) is bounded
|
53 |
+
in terms of ∆(G) for all plane graphs G. The answer is ‘Yes’ if ∆(G) ≤ 4 and ‘No’ otherwise.
|
54 |
+
▶ Theorem 1. Each of the following holds.
|
55 |
+
1. For every plane graph G with ∆(G) ≤ 3 we have c∗(G) ≤ 3.
|
56 |
+
2. For every plane graph G with ∆(G) ≤ 4 we have c∗(G) ≤ 12.
|
57 |
+
3. For some n-vertex plane graphs G with ∆(G) = 5 we have c∗(G) = Ω
|
58 |
+
��
|
59 |
+
log(n)
|
60 |
+
�
|
61 |
+
.
|
62 |
+
Related work.
|
63 |
+
Let us just briefly mention that Cops and Robber was introduced by
|
64 |
+
Nowakowski and Winkler [10] and Quillot [12] for one cop and Aigner and Fromme [1] for k
|
65 |
+
cops 40 years ago. Since then numerous results and variants were presented, see e.g., [2, 3].
|
66 |
+
Perhaps most similar to our new variant are the recent surrounding variant of Burgess et
|
67 |
+
al. [5] with vertex-cops and the containment variant of Cryster et al. [6, 11] with edge-cops.
|
68 |
+
In these variants the robber is captured if every adjacent vertex, respectively every incident
|
69 |
+
edge, is occupied by a cop. The smallest number of cops that always suffices for any planar
|
70 |
+
graph G is 3 in the classical variant [1], 7 in the surrounding variant [4], 7∆(G) in the
|
71 |
+
containment variant [6] and 3 when both, cops and robber, move on edges [7].
|
72 |
+
2
|
73 |
+
Cops win always if the maximum degree is at most four
|
74 |
+
We start with an observation that simplifies the proofs of items 1 and 2 in Theorem 1.
|
75 |
+
▶ Observation 2. Let the robber be on a vertex u with a neighbor v of degree 1. Then the
|
76 |
+
robber is never required to move to v to evade the cops.
|
77 |
+
This is true because the set of faces required to capture the robber at v is a subset of the
|
78 |
+
faces required to capture him at u. Further, his only possible moves at v are either staying
|
79 |
+
there or moving back to u. As there is no zugzwang, he could just stay at u all along.
|
80 |
+
In both of the following proofs we assume that the graph contains only degree-3-vertices
|
81 |
+
(respectively degree-4-vertices) and degree-1-vertices. This can always be achieved by adding
|
82 |
+
leaves to vertices not yet having the correct degree.
|
83 |
+
Proof of item 1 in Theorem 1. We give a winning strategy for three cops c1, c2, c3 in a
|
84 |
+
planar graph G with ∆(G) ≤ 3. First the cops choose arbitrary faces to start on. Then the
|
85 |
+
robber chooses its start vertex u, which we assume to be of degree 3 by Observation 2 (it
|
86 |
+
is trivial to capture him if all vertices have degree 1). Let ∠u
|
87 |
+
1, ∠u
|
88 |
+
2, ∠u
|
89 |
+
3 be the three angles
|
90 |
+
incident to u. We denote the face containing an angle ∠ by f(∠) and define for each cop ci a
|
91 |
+
target face fi, i = 1, 2, 3. Initially we set fi = f(∠u
|
92 |
+
i ). The goal of each cop is to reach his
|
93 |
+
target face, thereby capturing the robber when all three cops arrive. If the robber moves,
|
94 |
+
each cop updates his target face. Our strategy guarantees that the total distance of all three
|
95 |
+
cops to their targets faces decreases over time, so it reaches zero after finitely many turns.
|
96 |
+
Clearly, in every game the robber has to move at some point to avoid being captured.
|
97 |
+
Assume that the robber moves from vertex u to vertex v (both of degree 3 by Observation 2).
|
98 |
+
Without loss of generality the angles around u and v are labeled as in Figure 1 with fi = f(∠u
|
99 |
+
i )
|
100 |
+
being the current target face of cop ci, i = 1, 2, 3.
|
101 |
+
First assume that c3 (or symmetrically c2) has not reached his target face yet. In this
|
102 |
+
case we assign the new target faces f1 = f(∠v
|
103 |
+
1), f2 = f(∠v
|
104 |
+
2) and f3 = f(∠v
|
105 |
+
3). Note that
|
106 |
+
for i = 1, 2 faces f(∠u
|
107 |
+
i ) and f(∠v
|
108 |
+
i ) are adjacent, so cop ci can keep his distance to his target
|
109 |
+
face unchanged (or even decrease it) during his next turn. Further note that f(∠u
|
110 |
+
3) = f(∠v
|
111 |
+
3),
|
112 |
+
|
113 |
+
M. T. Ha, P. Jungeblut and T. Ueckerdt
|
114 |
+
3
|
115 |
+
̸
|
116 |
+
u
|
117 |
+
1
|
118 |
+
̸
|
119 |
+
u
|
120 |
+
2
|
121 |
+
̸
|
122 |
+
u
|
123 |
+
3
|
124 |
+
̸
|
125 |
+
v
|
126 |
+
1
|
127 |
+
̸
|
128 |
+
v
|
129 |
+
2
|
130 |
+
̸
|
131 |
+
v
|
132 |
+
3
|
133 |
+
u
|
134 |
+
v
|
135 |
+
w
|
136 |
+
Figure 1 Labeling of the angles for a robber move from u to v (and possibly further to w).
|
137 |
+
v
|
138 |
+
u
|
139 |
+
̸
|
140 |
+
u
|
141 |
+
1
|
142 |
+
̸
|
143 |
+
u
|
144 |
+
2
|
145 |
+
̸
|
146 |
+
u
|
147 |
+
3
|
148 |
+
̸
|
149 |
+
v
|
150 |
+
1
|
151 |
+
̸
|
152 |
+
v
|
153 |
+
2
|
154 |
+
̸
|
155 |
+
v
|
156 |
+
3
|
157 |
+
̸
|
158 |
+
u
|
159 |
+
4
|
160 |
+
̸
|
161 |
+
v
|
162 |
+
4
|
163 |
+
Figure 2 A vertex cop and its four accompanying face-cops moving from u to v.
|
164 |
+
so cop c3 can even decrease his distance by one during the next turn. Thus the total distance
|
165 |
+
of the three cops to their target faces decreased by at least one.
|
166 |
+
It remains the case that c2 and c3 have already reached their target faces (but c1 did not,
|
167 |
+
as the game would be over otherwise). In this case we move c1 one step towards his target
|
168 |
+
face f1 = f(∠u
|
169 |
+
1) and c2, c3 both to f(∠v
|
170 |
+
2). Now its the robber’s turn again. If she does not
|
171 |
+
move, we assign target faces fi = f(∠v
|
172 |
+
i ), i = 1, 2, 3, and the total distance decreases after the
|
173 |
+
cops’ next turn. If she moves back to u, we assign target faces fi = f(∠u
|
174 |
+
i ), i = 1, 2, 3, and
|
175 |
+
the total distance decreases after the cops’ next turn. The last possibility for the robber is to
|
176 |
+
move towards another neighbor w of v, see Figure 1. Then we assign f1 = f(∠v
|
177 |
+
1) and f2, f3
|
178 |
+
to be the faces containing the other two angles at w. In their next turn, c2 and c3 can again
|
179 |
+
reach their target faces, while c1 can decrease his distance to his target face f(∠v
|
180 |
+
1) by one
|
181 |
+
compared to the initial situation with the robber at vertex u. Again, the total distance is
|
182 |
+
decreased, which concludes the proof.
|
183 |
+
◀
|
184 |
+
To prove item 2 in Theorem 1, we reduce our Primal-Dual Cops and Robber to the
|
185 |
+
classical Cops and Robber with cops on vertices of G and then use a result from the literature.
|
186 |
+
▶ Lemma 3. In a plane graph G with ∆(G) ≤ 4, four face-cops can simulate a vertex-cop.
|
187 |
+
Proof. Let c be a vertex-cop starting at a vertex u ∈ V (G) with up to four incident angles ∠u
|
188 |
+
i
|
189 |
+
(for i ∈ {1, 2, 3, 4}). We place four face-cops on the (up to) four faces f(∠u
|
190 |
+
i ). If the vertex-cop
|
191 |
+
moves to an adjacent vertex v, the four face cops around it can in one step also move to
|
192 |
+
faces containing the angles incident to v, see Figure 2 for the case that u and v both have
|
193 |
+
degree 4. For vertices of degree less then 4 it only gets easier for the face-cops.
|
194 |
+
◀
|
195 |
+
An immediate corollary of Lemma 3 is that c∗(G) ≤ 4 · c(G) for planar graphs G
|
196 |
+
with ∆(G) ≤ 4. With c(G) ≤ 3 for all planar graphs G [1], item 2 in Theorem 1 follows.
|
197 |
+
3
|
198 |
+
Robber wins sometimes if the maximum degree is at least five
|
199 |
+
In this section we prove item 3 in Theorem 1, i.e., that c∗(G) = Ω
|
200 |
+
��
|
201 |
+
log(n)
|
202 |
+
�
|
203 |
+
for some
|
204 |
+
n-vertex plane graphs G with ∆(G) ≥ 5. We utilize a result of Nisse and Suchan [9] about
|
205 |
+
the cop number cp,q(G) for a different variant of Cops and Robber for any graph G and
|
206 |
+
|
207 |
+
4
|
208 |
+
Primal-Dual Cops and Robber
|
209 |
+
Figure 3 G4,2,2: An n × n grid with each edge subdivided four times and two rings. Faces are
|
210 |
+
colored according to their closest grid vertex. Deep and shallow faces are light and dark, respectively.
|
211 |
+
positive integers p and q. Here (as in the classical variant) the cops and the robber are on
|
212 |
+
the vertices of G. However, in each turn the cops may traverse up to p edges of G, while the
|
213 |
+
robber may traverse up to q edges of G. We refer to p and q as the velocities of the cops and
|
214 |
+
the robber, respectively.
|
215 |
+
▶ Theorem 4 ([8, 9]). Let Gn be the n × n grid graph, p be the velocity of the cops and q be
|
216 |
+
the velocity of the robber. If p < q, then cp,q(Gn) = Ω
|
217 |
+
��
|
218 |
+
log(n)
|
219 |
+
�
|
220 |
+
.
|
221 |
+
The idea to prove item 3 in Theorem 1 is to construct a “grid-like” graph Gn,s,r for
|
222 |
+
positive integers n, s, r in which the robber in the primal-dual variant can move around faster
|
223 |
+
than the cops. Then she can simulate the evasion strategy of the robber in the variant of
|
224 |
+
Nisse and Suchan.
|
225 |
+
We start with the n × n grid graph Gn, n ≥ 3, with a planar embedding such that the
|
226 |
+
4-faces are the inner faces. We call the vertices of Gn the grid vertices. Then, each edge
|
227 |
+
of Gn is subdivided by 2s new vertices, called subdivision vertices, to obtain Gn,s. Two grid
|
228 |
+
vertices are called neighboring if they are adjacent in Gn. Further, inside each inner face of
|
229 |
+
Gn,s we add r nested cycles, called rings, of length 12s each and call their vertices the ring
|
230 |
+
vertices. Between any two consecutive rings we add a planar matching of 12s edges. Each
|
231 |
+
inner face of Gn,s has 8s subdivision vertices on its boundary and 12s ring vertices on its
|
232 |
+
outermost ring. At last, we add (in a crossing-free way) three edges from each subdivision
|
233 |
+
vertex to the outermost ring vertices in the two incident faces of Gn,s such that two edges
|
234 |
+
go to one ring, the third edge to the other ring, and every ring vertex receives exactly one
|
235 |
+
such edge. Along the 2s vertices of each subdivision path in Gn,s the side with two edges to
|
236 |
+
the ring should always switch. Thus each inner face of Gn,s receives 12s edges which are
|
237 |
+
connected to the 12s vertices of the outermost ring such that the drawing remains planar.
|
238 |
+
Call the resulting graph Gn,s,r and note that ∆(Gn,s,r) = 5. See also Figure 3. We
|
239 |
+
shall use a robber strategy in which she only focuses on grid vertices and moves between
|
240 |
+
these through the paths of subdivision vertices, i.e., only plays on Gn,s. The purpose of the
|
241 |
+
additional rings in Gn,s,r is to slow down the cops and force them to stay close to grid and
|
242 |
+
subdivision vertices, too, thereby simulating the game of Nisse and Suchan on Gn.
|
243 |
+
Formally, we call an inner face of Gn,s,r shallow if it is incident to some subdivision
|
244 |
+
vertex, and deep otherwise. Our first lemma implies that, due to the number of rings, cops
|
245 |
+
should not use deep faces.
|
246 |
+
▶ Lemma 5. Let a1, a2 be two shallow faces of Gn,s,r inside the same inner face A of Gn.
|
247 |
+
|
248 |
+
M. T. Ha, P. Jungeblut and T. Ueckerdt
|
249 |
+
5
|
250 |
+
If r > 3s, then any cop moving from a1 to a2 along a shortest path without leaving A uses
|
251 |
+
only shallow faces.
|
252 |
+
Proof of Lemma 5. First observe that there are exactly 12s shallow faces inside A; one for
|
253 |
+
each edge of the outermost ring. Hence, the cop may move from a1 to a2 using only shallow
|
254 |
+
faces in no more than 6s steps. On the other hand, the deep face b inside the innermost
|
255 |
+
ring is at distance r > 3s from each of a1, a2 and hence no shortest path between a1 and a2
|
256 |
+
uses b.
|
257 |
+
Let H be the subgraph of the plane dual of Gn,s,r induced by all inner faces inside A,
|
258 |
+
except b. Then H ∼= Pr □ C12s is a square grid on a cylinder of height r and circumference 12s,
|
259 |
+
with the shallow faces forming a boundary cycle C. Since a1, a2 are on C and each shortest
|
260 |
+
path lies inside H, such path is contained in C, i.e., uses only shallow faces.
|
261 |
+
◀
|
262 |
+
We have to hinder the cops from taking shortcuts through the outer face f0 of Gn,s,r. To
|
263 |
+
this end let G′
|
264 |
+
n,s,r be a copy of Gn,s,r with outer face f ′
|
265 |
+
0. Change the outer face of G′
|
266 |
+
n,s,r
|
267 |
+
such that f ′
|
268 |
+
0 is an inner face (while not changing the cyclic ordering of the edges around the
|
269 |
+
vertices) and define Gn,s,r to be the graph obtained from gluing Gn,s,r into face f ′
|
270 |
+
0 of G′
|
271 |
+
n,s,r
|
272 |
+
and identifying corresponding vertices. The robber will always stay on vertices of Gn,s,r and
|
273 |
+
whenever a cop uses a vertex v′ of G′
|
274 |
+
n,s,r she acts as if he was on the corresponding vertex v
|
275 |
+
of Gn,s,r. Without loss of generality, we can therefore assume below that the game is played
|
276 |
+
on Gn,s,r with the cops being prohibited to enter the outer face.
|
277 |
+
For a face f ∈ F, we denote by vf be the grid vertex closest to f, breaking ties arbitrarily.
|
278 |
+
▶ Lemma 6. Let a, b be two shallow faces whose closest grid vertices va, vb have distance d
|
279 |
+
in Gn. If r > 3s, then in Gn,s,r the robber moving from va to vb needs at most (2s + 1)d
|
280 |
+
steps, while any cop moving from a to b needs at least 3s(d − 4) steps.
|
281 |
+
Proof of Lemma 6. For the first part it is enough to observe that the robber may go along
|
282 |
+
subdivision vertices, taking exactly 2s + 1 steps for every corresponding edge in Gn.
|
283 |
+
For the second part, i.e., the lower bound on the number of moves for a cop, let A
|
284 |
+
and B be the inner faces of Gn containing the inner faces a and b of Gn,s,r, respectively.
|
285 |
+
We assume that d ≥ 5, as otherwise 3s(d − 4) ≤ 0 and there is nothing to show, and hence
|
286 |
+
we have A ̸= B. More precisely, traveling from a to b, the cop must traverse (inner faces
|
287 |
+
of Gn,s,r corresponding to) at least d − 1 different inner faces of Gn. Cutting off the initial
|
288 |
+
part inside A and final part inside B, Lemma 5 implies that the remaining shortest path for
|
289 |
+
the cop uses only shallow faces. Thus, on her way, the cop visits shallow faces incident to at
|
290 |
+
least d − 3 distinct grid vertices, i.e., d − 4 transitions from a shallow face at a grid vertex to
|
291 |
+
a shallow face at a neighboring grid vertex. As each such transition requires 3s moves, the
|
292 |
+
claim follows.
|
293 |
+
◀
|
294 |
+
Proof of item 3 in Theorem 1. Nisse and Suchan [9] (see also [8] for the omitted proofs)
|
295 |
+
describe an evasion strategy for a robber with velocity q that requires Ω
|
296 |
+
��
|
297 |
+
log(n)
|
298 |
+
�
|
299 |
+
vertex-cops
|
300 |
+
with velocity p to capture him in Gn, provided q > p; see Theorem 4. We describe how
|
301 |
+
a robber with velocity 1 in Gn,s,r (for sufficiently large n, s, r) can simulate this strategy
|
302 |
+
against face-cops with velocity 1.
|
303 |
+
We choose p = 15, q = 16 and consider the game of Nisse and Suchan for these velocities.
|
304 |
+
For their graph Gn in which the robber can win against k = Ω
|
305 |
+
��
|
306 |
+
log(n)
|
307 |
+
�
|
308 |
+
vertex-cops, we
|
309 |
+
then consider Gn,s,r with s = 16 and r = 3s + 1 = 49. Now we copy the evasion strategy S
|
310 |
+
for the robber as follows: Whenever it is the robber’s turn and the face-cops occupy faces
|
311 |
+
f1, f2, . . . , fk in Gn,s,r, consider the corresponding situation in Gn where the vertex-cops
|
312 |
+
occupy vf1, vf2, . . . , vfk. Based on these positions, S tells the robber to go to a vertex v at
|
313 |
+
|
314 |
+
6
|
315 |
+
Primal-Dual Cops and Robber
|
316 |
+
distance d ≤ q = 16 from the current position of the robber in Gn. By Lemma 5, the robber
|
317 |
+
in Gn,r,s can go to v in at most (2s + 1)d ≤ (2 · 16 + 1) · 16 = 528 turns.
|
318 |
+
In the meantime, each face-cop also makes up to 528 moves in Gn,r,s, traveling from some
|
319 |
+
face a to some face b, which is interpreted in Gn as the corresponding vertex-cop traveling
|
320 |
+
from va to vb. For va and vb to be at distance d′ ≥ 16 in Gn, by Lemma 5 the face-cop needs
|
321 |
+
at least 3s(d′ − 4) ≥ 3 · 16 · 12 = 576 turns, which is strictly more than 528. Thus, after 528
|
322 |
+
turns, each vertex-cop made at most p = 15 steps in Gn, as required for strategy S.
|
323 |
+
Hence, the robber can evade k face-cops in Gn,s,r, proving c(Gn,s,r) > k. Since Gn,s,r
|
324 |
+
for s, r ∈ O(1) has O(n2) vertices, this completes the proof.
|
325 |
+
◀
|
326 |
+
4
|
327 |
+
Conclusions
|
328 |
+
Let c∗
|
329 |
+
∆ denote the largest primal-dual cop number among all plane graphs with maximum
|
330 |
+
degree ∆. We have shown that c∗
|
331 |
+
3 = 3, c∗
|
332 |
+
4 ≤ 12 (this bound is certainly not optimal), and
|
333 |
+
c∗
|
334 |
+
5 = ∞, while it is easy to see that c∗
|
335 |
+
1 = 1, c∗
|
336 |
+
2 = 2, and c∗
|
337 |
+
∆ = ∞ for all ∆ > 5. Let us remark
|
338 |
+
that our proof for ∆ = 5 also holds for a variant of the game where the robber is already
|
339 |
+
captured when one cop is on one incident face. On the other hand, our proof for ∆ = 3 holds
|
340 |
+
verbatim to prove that three cops also suffice in a variant of the game where the graph is
|
341 |
+
embedded without crossings in any other surface, which makes it is interesting to consider
|
342 |
+
∆ = 4 here.
|
343 |
+
References
|
344 |
+
1
|
345 |
+
Martin S. Aigner and M. Fromme. A Game of Cops and Robbers. Discrete Applied Mathematics,
|
346 |
+
8(1):1–12, 1984. doi:10.1016/0166-218X(84)90073-8.
|
347 |
+
2
|
348 |
+
Anthony Bonato. An Invitation to Pursuit-Evasion Games and Graph Theory. American
|
349 |
+
Mathematical Society, 2022.
|
350 |
+
3
|
351 |
+
Anthony Bonato and Richard J. Nowakowski. The Game of Cops and Robbers on Graphs.
|
352 |
+
American Mathematical Society, 2011. doi:10.1090/stml/061.
|
353 |
+
4
|
354 |
+
Peter Bradshaw and Seyyed Aliasghar Hosseini. Surrounding Cops and Robbers on Graphs of
|
355 |
+
Bounded Genus, 2019. arXiv:1909.09916.
|
356 |
+
5
|
357 |
+
Andrea C. Burgess, Rosalind A. Cameron, Nancy E. Clarke, Peter Danziger, Stephen Finbow,
|
358 |
+
Caleb W. Jones, and David A. Pike. Cops that surround a robber. Discrete Applied Mathematics,
|
359 |
+
285:552–566, 2020. doi:10.1016/j.dam.2020.06.019.
|
360 |
+
6
|
361 |
+
Danny Crytser, Natasha Komarov, and John Mackey. Containment: A Variation of Cops and
|
362 |
+
Robber. Graphs and Combinatorics, 36(3):591–605, 2020. doi:10.1007/s00373-020-02140-5.
|
363 |
+
7
|
364 |
+
Andrzej Dudek, Przemysław Gordinowicz, and Paweł Prałat. Cops and Robbers playing on
|
365 |
+
edges. Journal of Combinatorics, 5(1):131–153, 2014. doi:10.4310/JOC.2014.v5.n1.a6.
|
366 |
+
8
|
367 |
+
Fedor V. Fomin, Petr A. Golovach, Jan Kratochvíl, Nicolas Nisse, and Karol Suchan. Pursuing
|
368 |
+
a fast robber on a graph. Theoretical Computer Science, 411(7–9):1167–1181, 2010. doi:
|
369 |
+
10.1016/j.tcs.2009.12.010.
|
370 |
+
9
|
371 |
+
Nicolas Nisse and Karol Suchan. Fast Robber in Planar Graphs. In Hajo Broersma, Thomas
|
372 |
+
Erlebach, Tom Friedetzky, and Daniel Paulusma, editors, Graph-Theoretic Concepts in Com-
|
373 |
+
puter Science (WG 2008), volume 5344 of Lecture Notes in Computer Science, pages 312–323,
|
374 |
+
2008. doi:10.1007/978-3-540-92248-3_28.
|
375 |
+
10
|
376 |
+
Richard J. Nowakowski and Peter Winkler. Vertex-to-Vertex Pursuit in a Graph. Discrete
|
377 |
+
Mathematics, 43(2–3):235–239, 1983. doi:10.1016/0012-365X(83)90160-7.
|
378 |
+
11
|
379 |
+
Paweł Prałat. Containment Game Played on Random Graphs: Another Zig-Zag Theorem.
|
380 |
+
The Electronic Journal of Combinatorics, 22(2), 2015. doi:10.37236/4777.
|
381 |
+
12
|
382 |
+
Alain Quilliot. Jeux et pointes fixes sur les graphes. PhD thesis, Université de Paris VI, 1978.
|
383 |
+
|
8dE5T4oBgHgl3EQfQg7H/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,281 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf,len=280
|
2 |
+
page_content='Primal-Dual Cops and Robber Minh Tuan Ha � Karlsruhe Institute of Technology, Germany Paul Jungeblut � Karlsruhe Institute of Technology, Germany Torsten Ueckerdt � Karlsruhe Institute of Technology, Germany Abstract Cops and Robber is a family of two-player games played on graphs in which one player controls a number of cops and the other player controls a robber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
3 |
+
page_content=' In alternating turns, each player moves (all) his/her figures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
4 |
+
page_content=' The cops try to capture the robber while the latter tries to flee indefinitely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
5 |
+
page_content=' In this paper we consider a variant of the game played on a planar graph where the robber moves between adjacent vertices while the cops move between adjacent faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
6 |
+
page_content=' The cops capture the robber if they occupy all incident faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
7 |
+
page_content=' We prove that a constant number of cops suffices to capture the robber on any planar graph of maximum degree ∆ if and only if ∆ ≤ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
8 |
+
page_content=' 2012 ACM Subject Classification Mathematics of computing → Discrete mathematics → Combi- natorics → Combinatoric problems Keywords and phrases Cops and robber, planar graph, dual graph 1 Introduction Cops and Robber is probably the most classical combinatorial pursuit-evasion game on graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
9 |
+
page_content=' The robber models an intruder in a network that the cops try to capture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
10 |
+
page_content=' Two players play with complete information on a fixed finite graph G = (V, E).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
11 |
+
page_content=' The cop player controls a set of k cops, each occupying a vertex of G (possibly several cops on the same vertex), while the robber player controls a single robber that also occupies a vertex of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
12 |
+
page_content=' The players take alternating turns, where the cop player in his turn can decide for each cop individually whether to stay at its position or move the cop along an edge of G onto an adjacent vertex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
13 |
+
page_content=' Similarly, the robber player on her turn can leave the robber at its position or move it along an edge of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
14 |
+
page_content=' The cop player starts by choosing starting positions for his k cops and wins the game as soon as at least one cop occupies the same vertex as the robber, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
15 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
16 |
+
page_content=', when the robber is captured.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
17 |
+
page_content=' The robber player, seeing the cops positions, chooses the starting position for her robber and wins if she can avoid capture indefinitely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
18 |
+
page_content=' The least integer k for which, assuming perfect play on either side, k cops can always capture the robber, is called the cop number of G, usually denoted by c(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
19 |
+
page_content=' In this paper, we introduce Primal-Dual Cops and Robber which is played on a plane graph G, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
20 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
21 |
+
page_content=', with a fixed plane embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
22 |
+
page_content=' Here, the cops occupy the faces of G and can move between adjacent faces (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
23 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
24 |
+
page_content=', faces that share an edge), while the robber still moves along edges between adjacent vertices of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
25 |
+
page_content=' In this game, the robber is captured if every face incident to the robber’s vertex is occupied by at least one cop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
26 |
+
page_content=' Analogously, we call the least integer k for which k cops can always capture the robber in the Primal-Dual Cops and Robber game the primal-dual cop number of G and denote it by c∗(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
27 |
+
page_content=' An obvious lower bound for c∗(G) is the maximum number of faces incident to any vertex in G: The robber can choose such a vertex as its start position and just stay there indefinitely (note that there is no zugzwang, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
28 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
29 |
+
page_content=', no obligation to move during ones turn).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
30 |
+
page_content=' In particular, if G has maximum degree ∆(G) and there exists a vertex v with deg(v) = ∆(G), which is not a cut-vertex, then c∗(G) ≥ ∆(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
31 |
+
page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
32 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
33 |
+
page_content=', c∗(K2,n) = ∆(K2,n) = n for any n ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
34 |
+
page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
35 |
+
page_content='05514v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
36 |
+
page_content='CO] 13 Jan 2023 2 Primal-Dual Cops and Robber Our contribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
37 |
+
page_content=' We investigate, whether the primal-dual cop number c∗(G) is bounded in terms of ∆(G) for all plane graphs G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
38 |
+
page_content=' The answer is ‘Yes’ if ∆(G) ≤ 4 and ‘No’ otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
39 |
+
page_content=' ▶ Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
40 |
+
page_content=' Each of the following holds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
41 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
42 |
+
page_content=' For every plane graph G with ∆(G) ≤ 3 we have c∗(G) ≤ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
43 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
44 |
+
page_content=' For every plane graph G with ∆(G) ≤ 4 we have c∗(G) ≤ 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
45 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
46 |
+
page_content=' For some n-vertex plane graphs G with ∆(G) = 5 we have c∗(G) = Ω �� log(n) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
47 |
+
page_content=' Related work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
48 |
+
page_content=' Let us just briefly mention that Cops and Robber was introduced by Nowakowski and Winkler [10] and Quillot [12] for one cop and Aigner and Fromme [1] for k cops 40 years ago.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
49 |
+
page_content=' Since then numerous results and variants were presented, see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
50 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
51 |
+
page_content=', [2, 3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
52 |
+
page_content=' Perhaps most similar to our new variant are the recent surrounding variant of Burgess et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
53 |
+
page_content=' [5] with vertex-cops and the containment variant of Cryster et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
54 |
+
page_content=' [6, 11] with edge-cops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
55 |
+
page_content=' In these variants the robber is captured if every adjacent vertex, respectively every incident edge, is occupied by a cop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
56 |
+
page_content=' The smallest number of cops that always suffices for any planar graph G is 3 in the classical variant [1], 7 in the surrounding variant [4], 7∆(G) in the containment variant [6] and 3 when both, cops and robber, move on edges [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
57 |
+
page_content=' 2 Cops win always if the maximum degree is at most four We start with an observation that simplifies the proofs of items 1 and 2 in Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
58 |
+
page_content=' ▶ Observation 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
59 |
+
page_content=' Let the robber be on a vertex u with a neighbor v of degree 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
60 |
+
page_content=' Then the robber is never required to move to v to evade the cops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
61 |
+
page_content=' This is true because the set of faces required to capture the robber at v is a subset of the faces required to capture him at u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
62 |
+
page_content=' Further, his only possible moves at v are either staying there or moving back to u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
63 |
+
page_content=' As there is no zugzwang, he could just stay at u all along.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
64 |
+
page_content=' In both of the following proofs we assume that the graph contains only degree-3-vertices (respectively degree-4-vertices) and degree-1-vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
65 |
+
page_content=' This can always be achieved by adding leaves to vertices not yet having the correct degree.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
66 |
+
page_content=' Proof of item 1 in Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
67 |
+
page_content=' We give a winning strategy for three cops c1, c2, c3 in a planar graph G with ∆(G) ≤ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
68 |
+
page_content=' First the cops choose arbitrary faces to start on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
69 |
+
page_content=' Then the robber chooses its start vertex u, which we assume to be of degree 3 by Observation 2 (it is trivial to capture him if all vertices have degree 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
70 |
+
page_content=' Let ∠u 1, ∠u 2, ∠u 3 be the three angles incident to u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
71 |
+
page_content=' We denote the face containing an angle ∠ by f(∠) and define for each cop ci a target face fi, i = 1, 2, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
72 |
+
page_content=' Initially we set fi = f(∠u i ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
73 |
+
page_content=' The goal of each cop is to reach his target face, thereby capturing the robber when all three cops arrive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
74 |
+
page_content=' If the robber moves, each cop updates his target face.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
75 |
+
page_content=' Our strategy guarantees that the total distance of all three cops to their targets faces decreases over time, so it reaches zero after finitely many turns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
76 |
+
page_content=' Clearly, in every game the robber has to move at some point to avoid being captured.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
77 |
+
page_content=' Assume that the robber moves from vertex u to vertex v (both of degree 3 by Observation 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
78 |
+
page_content=' Without loss of generality the angles around u and v are labeled as in Figure 1 with fi = f(∠u i ) being the current target face of cop ci, i = 1, 2, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
79 |
+
page_content=' First assume that c3 (or symmetrically c2) has not reached his target face yet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
80 |
+
page_content=' In this case we assign the new target faces f1 = f(∠v 1), f2 = f(∠v 2) and f3 = f(∠v 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
81 |
+
page_content=' Note that for i = 1, 2 faces f(∠u i ) and f(∠v i ) are adjacent, so cop ci can keep his distance to his target face unchanged (or even decrease it) during his next turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
82 |
+
page_content=' Further note that f(∠u 3) = f(∠v 3), M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
83 |
+
page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
84 |
+
page_content=' Ha, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
85 |
+
page_content=' Jungeblut and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
86 |
+
page_content=' Ueckerdt 3 ̸ u 1 ̸ u 2 ̸ u 3 ̸ v 1 ̸ v 2 ̸ v 3 u v w Figure 1 Labeling of the angles for a robber move from u to v (and possibly further to w).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
87 |
+
page_content=' v u ̸ u 1 ̸ u 2 ̸ u 3 ̸ v 1 ̸ v 2 ̸ v 3 ̸ u 4 ̸ v 4 Figure 2 A vertex cop and its four accompanying face-cops moving from u to v.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
88 |
+
page_content=' so cop c3 can even decrease his distance by one during the next turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
89 |
+
page_content=' Thus the total distance of the three cops to their target faces decreased by at least one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
90 |
+
page_content=' It remains the case that c2 and c3 have already reached their target faces (but c1 did not, as the game would be over otherwise).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
91 |
+
page_content=' In this case we move c1 one step towards his target face f1 = f(∠u 1) and c2, c3 both to f(∠v 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
92 |
+
page_content=' Now its the robber’s turn again.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
93 |
+
page_content=' If she does not move, we assign target faces fi = f(∠v i ), i = 1, 2, 3, and the total distance decreases after the cops’ next turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
94 |
+
page_content=' If she moves back to u, we assign target faces fi = f(∠u i ), i = 1, 2, 3, and the total distance decreases after the cops’ next turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
95 |
+
page_content=' The last possibility for the robber is to move towards another neighbor w of v, see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
96 |
+
page_content=' Then we assign f1 = f(∠v 1) and f2, f3 to be the faces containing the other two angles at w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
97 |
+
page_content=' In their next turn, c2 and c3 can again reach their target faces, while c1 can decrease his distance to his target face f(∠v 1) by one compared to the initial situation with the robber at vertex u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
98 |
+
page_content=' Again, the total distance is decreased, which concludes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
99 |
+
page_content=' ◀ To prove item 2 in Theorem 1, we reduce our Primal-Dual Cops and Robber to the classical Cops and Robber with cops on vertices of G and then use a result from the literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
100 |
+
page_content=' ▶ Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
101 |
+
page_content=' In a plane graph G with ∆(G) ≤ 4, four face-cops can simulate a vertex-cop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
102 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
103 |
+
page_content=' Let c be a vertex-cop starting at a vertex u ∈ V (G) with up to four incident angles ∠u i (for i ∈ {1, 2, 3, 4}).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
104 |
+
page_content=' We place four face-cops on the (up to) four faces f(∠u i ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
105 |
+
page_content=' If the vertex-cop moves to an adjacent vertex v, the four face cops around it can in one step also move to faces containing the angles incident to v, see Figure 2 for the case that u and v both have degree 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
106 |
+
page_content=' For vertices of degree less then 4 it only gets easier for the face-cops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
107 |
+
page_content=' ◀ An immediate corollary of Lemma 3 is that c∗(G) ≤ 4 · c(G) for planar graphs G with ∆(G) ≤ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
108 |
+
page_content=' With c(G) ≤ 3 for all planar graphs G [1], item 2 in Theorem 1 follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
109 |
+
page_content=' 3 Robber wins sometimes if the maximum degree is at least five In this section we prove item 3 in Theorem 1, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
110 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
111 |
+
page_content=', that c∗(G) = Ω �� log(n) � for some n-vertex plane graphs G with ∆(G) ≥ 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
112 |
+
page_content=' We utilize a result of Nisse and Suchan [9] about the cop number cp,q(G) for a different variant of Cops and Robber for any graph G and 4 Primal-Dual Cops and Robber Figure 3 G4,2,2: An n × n grid with each edge subdivided four times and two rings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
113 |
+
page_content=' Faces are colored according to their closest grid vertex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
114 |
+
page_content=' Deep and shallow faces are light and dark, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
115 |
+
page_content=' positive integers p and q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
116 |
+
page_content=' Here (as in the classical variant) the cops and the robber are on the vertices of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
117 |
+
page_content=' However, in each turn the cops may traverse up to p edges of G, while the robber may traverse up to q edges of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
118 |
+
page_content=' We refer to p and q as the velocities of the cops and the robber, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
119 |
+
page_content=' ▶ Theorem 4 ([8, 9]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
120 |
+
page_content=' Let Gn be the n × n grid graph, p be the velocity of the cops and q be the velocity of the robber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
121 |
+
page_content=' If p < q, then cp,q(Gn) = ٠�� log(n) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
122 |
+
page_content=' The idea to prove item 3 in Theorem 1 is to construct a “grid-like” graph Gn,s,r for positive integers n, s, r in which the robber in the primal-dual variant can move around faster than the cops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
123 |
+
page_content=' Then she can simulate the evasion strategy of the robber in the variant of Nisse and Suchan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
124 |
+
page_content=' We start with the n × n grid graph Gn, n ≥ 3, with a planar embedding such that the 4-faces are the inner faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
125 |
+
page_content=' We call the vertices of Gn the grid vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
126 |
+
page_content=' Then, each edge of Gn is subdivided by 2s new vertices, called subdivision vertices, to obtain Gn,s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
127 |
+
page_content=' Two grid vertices are called neighboring if they are adjacent in Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
128 |
+
page_content=' Further, inside each inner face of Gn,s we add r nested cycles, called rings, of length 12s each and call their vertices the ring vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
129 |
+
page_content=' Between any two consecutive rings we add a planar matching of 12s edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
130 |
+
page_content=' Each inner face of Gn,s has 8s subdivision vertices on its boundary and 12s ring vertices on its outermost ring.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
131 |
+
page_content=' At last, we add (in a crossing-free way) three edges from each subdivision vertex to the outermost ring vertices in the two incident faces of Gn,s such that two edges go to one ring, the third edge to the other ring, and every ring vertex receives exactly one such edge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
132 |
+
page_content=' Along the 2s vertices of each subdivision path in Gn,s the side with two edges to the ring should always switch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
133 |
+
page_content=' Thus each inner face of Gn,s receives 12s edges which are connected to the 12s vertices of the outermost ring such that the drawing remains planar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
134 |
+
page_content=' Call the resulting graph Gn,s,r and note that ∆(Gn,s,r) = 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
135 |
+
page_content=' See also Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
136 |
+
page_content=' We shall use a robber strategy in which she only focuses on grid vertices and moves between these through the paths of subdivision vertices, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
137 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
138 |
+
page_content=', only plays on Gn,s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
139 |
+
page_content=' The purpose of the additional rings in Gn,s,r is to slow down the cops and force them to stay close to grid and subdivision vertices, too, thereby simulating the game of Nisse and Suchan on Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
140 |
+
page_content=' Formally, we call an inner face of Gn,s,r shallow if it is incident to some subdivision vertex, and deep otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
141 |
+
page_content=' Our first lemma implies that, due to the number of rings, cops should not use deep faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
142 |
+
page_content=' ▶ Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
143 |
+
page_content=' Let a1, a2 be two shallow faces of Gn,s,r inside the same inner face A of Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
144 |
+
page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
145 |
+
page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
146 |
+
page_content=' Ha, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
147 |
+
page_content=' Jungeblut and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
148 |
+
page_content=' Ueckerdt 5 If r > 3s, then any cop moving from a1 to a2 along a shortest path without leaving A uses only shallow faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
149 |
+
page_content=' Proof of Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
150 |
+
page_content=' First observe that there are exactly 12s shallow faces inside A;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
151 |
+
page_content=' one for each edge of the outermost ring.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
152 |
+
page_content=' Hence, the cop may move from a1 to a2 using only shallow faces in no more than 6s steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
153 |
+
page_content=' On the other hand, the deep face b inside the innermost ring is at distance r > 3s from each of a1, a2 and hence no shortest path between a1 and a2 uses b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
154 |
+
page_content=' Let H be the subgraph of the plane dual of Gn,s,r induced by all inner faces inside A, except b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
155 |
+
page_content=' Then H ∼= Pr □ C12s is a square grid on a cylinder of height r and circumference 12s, with the shallow faces forming a boundary cycle C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
156 |
+
page_content=' Since a1, a2 are on C and each shortest path lies inside H, such path is contained in C, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
157 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
158 |
+
page_content=', uses only shallow faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
159 |
+
page_content=' ◀ We have to hinder the cops from taking shortcuts through the outer face f0 of Gn,s,r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
160 |
+
page_content=' To this end let G′ n,s,r be a copy of Gn,s,r with outer face f ′ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
161 |
+
page_content=' Change the outer face of G′ n,s,r such that f ′ 0 is an inner face (while not changing the cyclic ordering of the edges around the vertices) and define Gn,s,r to be the graph obtained from gluing Gn,s,r into face f ′ 0 of G′ n,s,r and identifying corresponding vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
162 |
+
page_content=' The robber will always stay on vertices of Gn,s,r and whenever a cop uses a vertex v′ of G′ n,s,r she acts as if he was on the corresponding vertex v of Gn,s,r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
163 |
+
page_content=' Without loss of generality, we can therefore assume below that the game is played on Gn,s,r with the cops being prohibited to enter the outer face.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
164 |
+
page_content=' For a face f ∈ F, we denote by vf be the grid vertex closest to f, breaking ties arbitrarily.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
165 |
+
page_content=' ▶ Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
166 |
+
page_content=' Let a, b be two shallow faces whose closest grid vertices va, vb have distance d in Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
167 |
+
page_content=' If r > 3s, then in Gn,s,r the robber moving from va to vb needs at most (2s + 1)d steps, while any cop moving from a to b needs at least 3s(d − 4) steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
168 |
+
page_content=' Proof of Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
169 |
+
page_content=' For the first part it is enough to observe that the robber may go along subdivision vertices, taking exactly 2s + 1 steps for every corresponding edge in Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
170 |
+
page_content=' For the second part, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
171 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
172 |
+
page_content=', the lower bound on the number of moves for a cop, let A and B be the inner faces of Gn containing the inner faces a and b of Gn,s,r, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
173 |
+
page_content=' We assume that d ≥ 5, as otherwise 3s(d − 4) ≤ 0 and there is nothing to show, and hence we have A ̸= B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
174 |
+
page_content=' More precisely, traveling from a to b, the cop must traverse (inner faces of Gn,s,r corresponding to) at least d − 1 different inner faces of Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
175 |
+
page_content=' Cutting off the initial part inside A and final part inside B, Lemma 5 implies that the remaining shortest path for the cop uses only shallow faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
176 |
+
page_content=' Thus, on her way, the cop visits shallow faces incident to at least d − 3 distinct grid vertices, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
177 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
178 |
+
page_content=', d − 4 transitions from a shallow face at a grid vertex to a shallow face at a neighboring grid vertex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
179 |
+
page_content=' As each such transition requires 3s moves, the claim follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
180 |
+
page_content=' ◀ Proof of item 3 in Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
181 |
+
page_content=' Nisse and Suchan [9] (see also [8] for the omitted proofs) describe an evasion strategy for a robber with velocity q that requires ٠�� log(n) � vertex-cops with velocity p to capture him in Gn, provided q > p;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
182 |
+
page_content=' see Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
183 |
+
page_content=' We describe how a robber with velocity 1 in Gn,s,r (for sufficiently large n, s, r) can simulate this strategy against face-cops with velocity 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
184 |
+
page_content=' We choose p = 15, q = 16 and consider the game of Nisse and Suchan for these velocities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
185 |
+
page_content=' For their graph Gn in which the robber can win against k = ٠�� log(n) � vertex-cops, we then consider Gn,s,r with s = 16 and r = 3s + 1 = 49.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
186 |
+
page_content=' Now we copy the evasion strategy S for the robber as follows: Whenever it is the robber’s turn and the face-cops occupy faces f1, f2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
187 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
188 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
189 |
+
page_content=' , fk in Gn,s,r, consider the corresponding situation in Gn where the vertex-cops occupy vf1, vf2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
190 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
191 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
192 |
+
page_content=' , vfk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
193 |
+
page_content=' Based on these positions, S tells the robber to go to a vertex v at 6 Primal-Dual Cops and Robber distance d ≤ q = 16 from the current position of the robber in Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
194 |
+
page_content=' By Lemma 5, the robber in Gn,r,s can go to v in at most (2s + 1)d ≤ (2 · 16 + 1) · 16 = 528 turns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
195 |
+
page_content=' In the meantime, each face-cop also makes up to 528 moves in Gn,r,s, traveling from some face a to some face b, which is interpreted in Gn as the corresponding vertex-cop traveling from va to vb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
196 |
+
page_content=' For va and vb to be at distance d′ ≥ 16 in Gn, by Lemma 5 the face-cop needs at least 3s(d′ − 4) ≥ 3 · 16 · 12 = 576 turns, which is strictly more than 528.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
197 |
+
page_content=' Thus, after 528 turns, each vertex-cop made at most p = 15 steps in Gn, as required for strategy S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
198 |
+
page_content=' Hence, the robber can evade k face-cops in Gn,s,r, proving c(Gn,s,r) > k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
199 |
+
page_content=' Since Gn,s,r for s, r ∈ O(1) has O(n2) vertices, this completes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
200 |
+
page_content=' ◀ 4 Conclusions Let c∗ ∆ denote the largest primal-dual cop number among all plane graphs with maximum degree ∆.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
201 |
+
page_content=' We have shown that c∗ 3 = 3, c∗ 4 ≤ 12 (this bound is certainly not optimal), and c∗ 5 = ∞, while it is easy to see that c∗ 1 = 1, c∗ 2 = 2, and c∗ ∆ = ∞ for all ∆ > 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
202 |
+
page_content=' Let us remark that our proof for ∆ = 5 also holds for a variant of the game where the robber is already captured when one cop is on one incident face.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
203 |
+
page_content=' On the other hand, our proof for ∆ = 3 holds verbatim to prove that three cops also suffice in a variant of the game where the graph is embedded without crossings in any other surface, which makes it is interesting to consider ∆ = 4 here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
204 |
+
page_content=' References 1 Martin S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
205 |
+
page_content=' Aigner and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
206 |
+
page_content=' Fromme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
207 |
+
page_content=' A Game of Cops and Robbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
208 |
+
page_content=' Discrete Applied Mathematics, 8(1):1–12, 1984.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
209 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
210 |
+
page_content='1016/0166-218X(84)90073-8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
211 |
+
page_content=' 2 Anthony Bonato.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
212 |
+
page_content=' An Invitation to Pursuit-Evasion Games and Graph Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
213 |
+
page_content=' American Mathematical Society, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
214 |
+
page_content=' 3 Anthony Bonato and Richard J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
215 |
+
page_content=' Nowakowski.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
216 |
+
page_content=' The Game of Cops and Robbers on Graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
217 |
+
page_content=' American Mathematical Society, 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
218 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
219 |
+
page_content='1090/stml/061.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
220 |
+
page_content=' 4 Peter Bradshaw and Seyyed Aliasghar Hosseini.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
221 |
+
page_content=' Surrounding Cops and Robbers on Graphs of Bounded Genus, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
222 |
+
page_content=' arXiv:1909.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
223 |
+
page_content='09916.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
224 |
+
page_content=' 5 Andrea C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
225 |
+
page_content=' Burgess, Rosalind A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
226 |
+
page_content=' Cameron, Nancy E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
227 |
+
page_content=' Clarke, Peter Danziger, Stephen Finbow, Caleb W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
228 |
+
page_content=' Jones, and David A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
229 |
+
page_content=' Pike.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
230 |
+
page_content=' Cops that surround a robber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
231 |
+
page_content=' Discrete Applied Mathematics, 285:552–566, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
232 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
233 |
+
page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
234 |
+
page_content='dam.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
235 |
+
page_content='2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
236 |
+
page_content='06.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
237 |
+
page_content='019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
238 |
+
page_content=' 6 Danny Crytser, Natasha Komarov, and John Mackey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
239 |
+
page_content=' Containment: A Variation of Cops and Robber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
240 |
+
page_content=' Graphs and Combinatorics, 36(3):591–605, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
241 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
242 |
+
page_content='1007/s00373-020-02140-5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
243 |
+
page_content=' 7 Andrzej Dudek, Przemysław Gordinowicz, and Paweł Prałat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
244 |
+
page_content=' Cops and Robbers playing on edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
245 |
+
page_content=' Journal of Combinatorics, 5(1):131–153, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
246 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
247 |
+
page_content='4310/JOC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
248 |
+
page_content='2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
249 |
+
page_content='v5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
250 |
+
page_content='n1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
251 |
+
page_content='a6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
252 |
+
page_content=' 8 Fedor V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
253 |
+
page_content=' Fomin, Petr A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
254 |
+
page_content=' Golovach, Jan Kratochvíl, Nicolas Nisse, and Karol Suchan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
255 |
+
page_content=' Pursuing a fast robber on a graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
256 |
+
page_content=' Theoretical Computer Science, 411(7–9):1167–1181, 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
257 |
+
page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
258 |
+
page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
259 |
+
page_content='tcs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
260 |
+
page_content='2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
261 |
+
page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
262 |
+
page_content='010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
263 |
+
page_content=' 9 Nicolas Nisse and Karol Suchan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
264 |
+
page_content=' Fast Robber in Planar Graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
265 |
+
page_content=' In Hajo Broersma, Thomas Erlebach, Tom Friedetzky, and Daniel Paulusma, editors, Graph-Theoretic Concepts in Com- puter Science (WG 2008), volume 5344 of Lecture Notes in Computer Science, pages 312–323, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
266 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
267 |
+
page_content='1007/978-3-540-92248-3_28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
268 |
+
page_content=' 10 Richard J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
269 |
+
page_content=' Nowakowski and Peter Winkler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
270 |
+
page_content=' Vertex-to-Vertex Pursuit in a Graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
271 |
+
page_content=' Discrete Mathematics, 43(2–3):235–239, 1983.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
272 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
273 |
+
page_content='1016/0012-365X(83)90160-7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
274 |
+
page_content=' 11 Paweł Prałat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
275 |
+
page_content=' Containment Game Played on Random Graphs: Another Zig-Zag Theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
276 |
+
page_content=' The Electronic Journal of Combinatorics, 22(2), 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
277 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
278 |
+
page_content='37236/4777.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
279 |
+
page_content=' 12 Alain Quilliot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
280 |
+
page_content=' Jeux et pointes fixes sur les graphes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
281 |
+
page_content=' PhD thesis, Université de Paris VI, 1978.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
|
99AyT4oBgHgl3EQfRPYW/content/2301.00060v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6230f7c04d72c3aa6e5cdad131b13461e2a2f574013259b955154e64117e8eb3
|
3 |
+
size 6124651
|
99AyT4oBgHgl3EQfRPYW/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d1c34d29b3877eb29b3f1d8e2d5e5faf4df3301cc1de115f8be7269bcbdfa914
|
3 |
+
size 2555949
|
9NAzT4oBgHgl3EQfSft5/content/2301.01233v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2ac5ba0c57f42f47a35a9a872ddf2c4fed1252fb735aa894ab923b7cb7d61553
|
3 |
+
size 1173598
|
9NAzT4oBgHgl3EQfSft5/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d9ed96f69b63bb2a726a618874dcaf7b1dfcc5a94d9c28f71861d491d2f8b7d8
|
3 |
+
size 132353
|
9NFRT4oBgHgl3EQfqTc6/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7d8449ee0e254b9bb73e8ab90077e9675ee41f906326528d633383ee2805122a
|
3 |
+
size 6553645
|
9tAzT4oBgHgl3EQfSvsB/content/2301.01235v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ee0f53120c70cb82188fe2e0c49835299d92385eb2435250dbea8a058a0034bd
|
3 |
+
size 2035073
|
9tAzT4oBgHgl3EQfSvsB/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:024f2ec98b6ccb44e9899e632b989febfb897a4f80d7f986c403d42fb0634658
|
3 |
+
size 165682
|
AtE0T4oBgHgl3EQfxwIb/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:78dfa4a90bfe0f98b4c053d99b774d7d7b46bdc2e8c113b4ec92ff13cf0146a7
|
3 |
+
size 163433
|
B9FRT4oBgHgl3EQfvjiF/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:386c5dcebb827ae6014b9c4a6822dfa8ebd4cda57da9c9eb2aad5cffd090c8f8
|
3 |
+
size 177761
|
C9E2T4oBgHgl3EQfSAeL/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d83d65a09a7ee4b9d83fd7daec861c1e6ba7ca43f582733e7d9084a4e5c6337c
|
3 |
+
size 122384
|
D9E1T4oBgHgl3EQfqQU2/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4355b339245bbd15b86c962f10f238e5c5cc444e913e778c5b2b6f4ad42d1e1d
|
3 |
+
size 72853
|
ENAyT4oBgHgl3EQf4vqx/content/2301.00793v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:efe9f570e95ee23bbe437084e0514518498f7a305c708c2e021d89918624ca45
|
3 |
+
size 824926
|
ENAyT4oBgHgl3EQf4vqx/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:13af0136ee829e5abaf4b3bbfa8ca20a743581625545aea5aab50e8fbcea54fc
|
3 |
+
size 5505069
|
ENAyT4oBgHgl3EQf4vqx/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3e7cea6786996746e4bae4364733ffb55068041dc60304a4813b399bdf222554
|
3 |
+
size 239041
|
EdE4T4oBgHgl3EQf6g7g/content/tmp_files/2301.05333v1.pdf.txt
ADDED
@@ -0,0 +1,2754 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
2 |
+
YOSHIHIRO SHIRAI
|
3 |
+
Department of Mathematics, University of Maryland, College Park
|
4 |
+
Abstract. The purpose of this paper is to utilize statistical methodologies to infer from market
|
5 |
+
prices of assets and their derivatives the magnitude of the set of a measure M that defines acceptance
|
6 |
+
sets of risky future cash flows. We assume that M contains the collection of bilateral gamma random
|
7 |
+
variables, and estimate upper and lower boundaries of the compensation needed for a given bilateral
|
8 |
+
gamma distributed future cash flow to be acceptable. We show that prospects theory provides a
|
9 |
+
natural interpretation of the behaviors implied by such boundaries, which are not compatible with
|
10 |
+
expected utility theory. Boundaries for bilateral gamma risk neutral scale parameters for given speed
|
11 |
+
parameters are also estimated and tested against market data and, in particular, comparisons are
|
12 |
+
made with known empirical facts about the magnitude of the acceptance set of a common class of
|
13 |
+
risk measures.
|
14 |
+
1. Introduction
|
15 |
+
The definition of acceptable risks, based on the axiomatization of the concept of coherent risk
|
16 |
+
measure given in Artzner et al. (1999) and their convex generalization (Follmer & Schied (2002)),
|
17 |
+
is a major recent advance in mathematical finance, as, among other applications, it provides an
|
18 |
+
operative framework for superhedging in incomplete markets. Starting from a monetary measure,
|
19 |
+
such as Value at Risk, that only satisfies the basic requirements of monotonicity and cash invariance,
|
20 |
+
practical considerations (e.g. that the combined exposure of two trading desks ought to be less
|
21 |
+
risky than that of the two desks taken separately, or that lack of liquidity may affect the future net
|
22 |
+
worth of a single, large, position) lead one to require that a measure of risk also satisfy subadditivity
|
23 |
+
and positive homogeneity. A measure of risk ρ then defines a set Aρ of acceptable risks as those
|
24 |
+
random variables X such that ρ(X) ≥ 0. Conversely, it is possible to show that given a cone A of
|
25 |
+
acceptable risks, the functional
|
26 |
+
ρ(X) = inf{m ∈ R : m + X ∈ A}
|
27 |
+
(1.1)
|
28 |
+
satisfies monotonicity, cash invariance, subadditivity and positive homogeneity. Based on convex
|
29 |
+
duality, a risk measure is also specified by a set of equivalent probability measures M as
|
30 |
+
ρ(X) = inf
|
31 |
+
Q∈M EQ[X].
|
32 |
+
(1.2)
|
33 |
+
The class M can be interpreted as the set of possible and credible macroeconomic/financial models,
|
34 |
+
so that 1.2 is referred to as the robust representation of ρ, and risk measures become natural tools
|
35 |
+
for the purpose of modeling uncertainty. For convex risk measures, a penalty α(Q) is added to 1.2
|
36 |
+
to take into account that some models Q ∈ M may be more or less plausible than others.
|
37 |
+
E-mail address: [email protected].
|
38 |
+
Date: January 16, 2023.
|
39 |
+
2020 Mathematics Subject Classification. 60G18, 60G51, 91G20.
|
40 |
+
Key words and phrases. Bilateral Gamma, Prospects Theory, Knightian Uncertainty, Risk Measures, Nonlinear
|
41 |
+
Levy Processes, Diffusion Map, Quantile Regression, Distorted Regression, Gaussian Process Regression.
|
42 |
+
1
|
43 |
+
arXiv:2301.05333v1 [q-fin.MF] 13 Jan 2023
|
44 |
+
|
45 |
+
2
|
46 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
47 |
+
Typical examples of risk measures are those based on certainty equivalent, such as the entropic
|
48 |
+
risk measure, which are known in general as utility-based shortfall risk measures and are defined
|
49 |
+
by the acceptance set
|
50 |
+
A = {X : E[u(X)] ≥ u(c)}
|
51 |
+
for a given convex utility u and a threshold c, and those obtained by modifying the tails of the
|
52 |
+
underline statistical measure P, such as the expected shortfall, which are known in general as
|
53 |
+
spectral risk measures and are defined by the Choquet integral
|
54 |
+
ρ(X) =
|
55 |
+
� ∞
|
56 |
+
0
|
57 |
+
Ψ(P(X+ ≥ a))da −
|
58 |
+
� ∞
|
59 |
+
0
|
60 |
+
ˆΨ(P(X− ≥ a))da,
|
61 |
+
where Ψ : [0, 1] → [0, 1] is increasing and convex and ˆΨ(u) = 1 − Ψ(1 − u).
|
62 |
+
As the above examples confirm, relatively little is known in general about the set M. Note,
|
63 |
+
however, that a risk measure is an expected value under a worst case scenario measure, and, as
|
64 |
+
such, it defines a minimal current valuation (or maximal bid price) of the future cash flow X, while
|
65 |
+
−ρ(−X) gives a maximal valuation (or the minimal ask price). Assuming that market prices of
|
66 |
+
traded assets are random variables whose distribution belong to a specific class and is determined by
|
67 |
+
a set Θ ∈ RD of parameters, observed market prices imply specific boundaries for the set Θ and, in
|
68 |
+
turn, for M. For instance, if M is (or contains) the class of normal random variables parameterized
|
69 |
+
by pairs (µ, σ2) of mean and variance of assets returns, one can ask what are maximal and minimal
|
70 |
+
bounds for µ given σ2 that are implied by historically observed pairs (µ, σ2) of traded assets, in
|
71 |
+
turn estimated from market prices. These bounds are then naturally interpreted as structural limits
|
72 |
+
for the reward µ given the risk σ2 that the economic system can offer without compromising its
|
73 |
+
financial stability, as defined by the regulator.
|
74 |
+
To fix a reference framework, consider a market composed only of one risky asset with log return
|
75 |
+
X and a riskless one in zero net supply with zero risk free rate. Then,
|
76 |
+
1 = EQ[eX] = E[ηeX],
|
77 |
+
(1.3)
|
78 |
+
where Q is a risk neutral measure, η the corresponding stochastic discount factor. If the distribution
|
79 |
+
of X under the statistical measure P is parameterized by θ ∈ RD, and assuming the existence of
|
80 |
+
a representative investor with utility U defined by a set of parameters ξ ∈ Rm, there is a function
|
81 |
+
V : RD × Rm → R that evaluates to 1 at (θ, ξ). Specifically (see e.g. Madan (2020a)), the risk
|
82 |
+
neutral density (with respect to the log return) is given by
|
83 |
+
h(x, θ, ξ) =
|
84 |
+
U ′
|
85 |
+
ξ(ex)fθ(x)
|
86 |
+
�
|
87 |
+
R U ′
|
88 |
+
ξ(es)fθ(s)ds,
|
89 |
+
(1.4)
|
90 |
+
where fθ is the statistical density of X. Based on 1.3 and 1.4, if the prospects offered by the risky
|
91 |
+
asset suddenly deteriorate, 1with θ replaced by a riskier θ′, a decrease in the equilibrium risk free
|
92 |
+
rate is needed to compensate. In extreme cases, however, investors may no longer be allowed to
|
93 |
+
hold such an asset which will be liquidated and may, ultimately, stop trading in some markets. As
|
94 |
+
an example, one may think of pension funds, which are not allowed to hold speculative grade bonds,
|
95 |
+
or to those asset classes, such as hedge funds, that are only reserved to institutional investors.
|
96 |
+
In the case of normal returns, as it is well known (Markovitz (1952), Tobin (1958), Sharpe (1964),
|
97 |
+
Lintner (1965)), the efficient frontier essentially provides the upper limit for the reward µp given
|
98 |
+
a risk defined by σ2, and also the lower one, as this is the upper limit for a short position. In
|
99 |
+
general, however, this result lies on the assumption that investors have mean-variance preferences,
|
100 |
+
and that, in particular, they are expected utility maximizers. Empirical observations, on the other
|
101 |
+
hand, have shown in many occasions that asset returns are not compatible with such axioms - a
|
102 |
+
well known example being the equity premium puzzle, according to which U.S. equity risk premia
|
103 |
+
|
104 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
105 |
+
3
|
106 |
+
over Treasury Bills rates reflect an implausible level of aversion to risk under expected utility theory
|
107 |
+
(Mehra & Prescott (1985)).
|
108 |
+
An alternative to expected utility theory, termed “prospects theory”, is based on a series of ex-
|
109 |
+
periments conducted by psychologists D. Kahneman and A. Tverski (Kahneman & Tverski (1979)).
|
110 |
+
One of their results, in particular, is that humans tend to be risk seekers rather than risk averse in
|
111 |
+
the case of pure losses prospects. For instance, the prospect of winning 1000 dollars with probability
|
112 |
+
1/2 and winning zero otherwise is generally dominated by the prospect of winning 500 dollars with
|
113 |
+
probability 1, but the prospect of losing 1000 dollars with probability 1/2 and losing zero otherwise
|
114 |
+
dominates the prospect of losing 500 dollars with probability 1, independently of initial wealth.
|
115 |
+
Based on such evidence, one is then led to interpret an asset’s return as the sum of two prospects,
|
116 |
+
one consisting of pure gains, and the other one of pure losses, and investors rank different assets’
|
117 |
+
returns based on the expectations and variances (µp, σ2
|
118 |
+
p, µn, σ2
|
119 |
+
n) of gains and losses. In particular,
|
120 |
+
higher variance of losses is compensated, ceteris paribus, by lower expectation µp of the gains.
|
121 |
+
The bilateral gamma distribution (Kuchler & Tappe (2008)) and its multivariate version (Madan
|
122 |
+
(2020b)) provide a natural modeling framework for such a preference specification for several rea-
|
123 |
+
sons. Firstly, it is the difference of two independent gamma variates, interpretable as gains and
|
124 |
+
losses, and it is completely specified by the vector (µp, σp, µn, σn) of their expected values and stan-
|
125 |
+
dard deviations. Secondly, even in a continuous time setting, the bilateral gamma process is the
|
126 |
+
difference of two independent gamma processes, while, for instance, path realizations of diffusion
|
127 |
+
processes have infinite variation. Thirdly, the bilateral gamma distribution provides a very good
|
128 |
+
fit to the (log) returns distribution implied by time series of returns and also by options prices
|
129 |
+
(Kuchler & Tappe (2008)), which shows that it is more suitable than, e.g., the normal distribution
|
130 |
+
for the purpose of modeling asset returns. Finally, as shown below, the expected utility of an asset
|
131 |
+
with bilateral gamma return X is a function F : (µp, σp, µn, σn) → E[u(X)], increasing in µp, and
|
132 |
+
decreasing in σp, µn and σn, so that under expected utility theory variations in (σp, µn, σn) are
|
133 |
+
compensated by variations of equal sign in µp.
|
134 |
+
Based on this considerations, we assume in this paper that the set of credible models M includes
|
135 |
+
the set of bilateral gamma random variables, and we learn bounds fM, fm : (σp, µp, σn) → µp for
|
136 |
+
µp given risks (σ2
|
137 |
+
p, µn, σ2
|
138 |
+
n) via quantile and/or distorted linear and/or Gaussian process regression.
|
139 |
+
An interesting result obtained is that both boundaries are generally increasing in (σp, µp), but
|
140 |
+
decreasing in σn, suggesting that investors, independently of their wealth, seek for lower (resp.
|
141 |
+
higher) risk when it comes to purely positive (resp. negative) processes. We test the boundaries
|
142 |
+
computed by assessing how well their implied performance measures (Sharpe ratio and acceptability
|
143 |
+
index) compare with those typically observed in the financial markets. Furthermore, we investigate
|
144 |
+
the linearity of fM and fm by comparing the results of a linear lower dimensional embedding and a
|
145 |
+
nonlinear one, and we show through a simple variation of a Lucas tree economy Lucas (1978) that
|
146 |
+
the behaviors observed are indeed consistent with prospects theory.
|
147 |
+
Finally, we move our attention to the risk neutral world, based on the suggestive interpretation
|
148 |
+
given in Madan (2020a) that, for bilateral gamma returns, the scale parameters (bp, bn) determine
|
149 |
+
the structure of limit orders, while the speed parameters (cp, cn) determine that of market orders.
|
150 |
+
It is then natural to assume that a relationship exists between the two pairs of parameters, in the
|
151 |
+
sense that for given (cp, cn), the scale parameters (bp, bn) are bounded to a specific range, as the
|
152 |
+
structure of market orders cannot be too independent from that of limit orders and viceversa. As
|
153 |
+
done for the statistical moments, the boundaries of such range are learned through quantile and
|
154 |
+
distorted regression. In this case, we determine theoretical boundaries as well based on the well
|
155 |
+
known robust representation of spectral risk measures (Madan & Schoutens (2021)), and evidence
|
156 |
+
is offered of their comparability with the empirically estimated ones.
|
157 |
+
The rest of the paper is organized as follows. First we show that for bilateral gamma returns,
|
158 |
+
risks and compensations are identified by the vector (σp, µn, σn) and µp respectively. Empirical
|
159 |
+
|
160 |
+
4
|
161 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
162 |
+
observations are reported in section 3, and the variation on Lucas Tree model is presented in
|
163 |
+
section 4. Risk neutral parameters are analyzed in 5. Section 6 concludes.
|
164 |
+
2. Bilateral Gamma Returns
|
165 |
+
2.1. From Brownian Motion to Bilateral Gamma Process. Given its central role in this
|
166 |
+
paper, the construction and properties of the bilateral gamma process are reviewed in this section.
|
167 |
+
In Black & Scholes (1973), F. Black and M. Scholes proposed to model the dynamics of log-returns as
|
168 |
+
a Brownian motion (GBM), as prices exhibit exponential growth and on the assumption, rooted in
|
169 |
+
an entropy maximization argument (Madan (2020a)), that log returns are asymptotically normally
|
170 |
+
distributed.
|
171 |
+
However, returns exhibit heavier tails than those implied by the normal distribution (Fama
|
172 |
+
(1965)) and frequent discontinuities in their path trajectories. In addition, risk aversion results in
|
173 |
+
periods of intense trading, determined by widespread selling in securities, alternating with lower
|
174 |
+
activity ones, thus implying that returns’ quadratic variation is not linear in time. It also results
|
175 |
+
in higher demand for out of the money (OTM) than for the corresponding OTM calls, generating
|
176 |
+
a volatility smile.
|
177 |
+
Another entropy maximization argument then suggests modeling economic time as a gamma
|
178 |
+
process, and stock market log returns as Brownian motion evaluated at such gamma time. The
|
179 |
+
resulting process, pioneered by D. Madan and E. Seneta (Madan & Seneta (1990)) and termed the
|
180 |
+
variance gamma process, is a pure jump Levy process with infinite activity and finite variation. In
|
181 |
+
fact, such process is the difference of two i.i.d. gamma processes, which naturally correspond to
|
182 |
+
gains and losses. Finally, motivated by the fact that downward jumps in prices are generally higher
|
183 |
+
than upward ones, the bilateral gamma process is defined as the difference of two independent
|
184 |
+
gamma processes with different shape and scale parameters (Kuchler & Tappe (2008)). The gains
|
185 |
+
and losses increments have BG distribution βΓ(bp, cp, bn, cn), defined by the convolution
|
186 |
+
βΓ(bp, cp, bn, cn) = Γ(bp, cp) ∗ Γ(−bn, cn),
|
187 |
+
where bp, cp, bn, cn > 0 and, for α > 0, λ ∈ R, a Γ(λ, α)-distributed random variable has density
|
188 |
+
f(x) =
|
189 |
+
1
|
190 |
+
Γ(α)|λ|α |x|α−1e−|x|/|λ| �
|
191 |
+
11{λ>0}(x)11{x>0}(x) + 11{λ<0}(x)11{x<0}(x)
|
192 |
+
�
|
193 |
+
, x ∈ R
|
194 |
+
with Γ(α) the Gamma function at α. Then, expected value and standard deviation of gains and
|
195 |
+
losses, denoted respectively by µp, σp, µn and σn, are given by
|
196 |
+
µp = cpbp, σp = √cpbp, µn = cnbn, σn = √cnbn.
|
197 |
+
By the convolution theorem, the characteristic function of the increments in t units of time is
|
198 |
+
ϕt(u) = (1 − iubp)−tcp (1 + iubn)−tcn ,
|
199 |
+
(2.1)
|
200 |
+
and it follows easily from 2.1 that BG densities are stable under convolution and are infinitely
|
201 |
+
divisible, and so the BG process is a well defined Levy process. From formula 2.1 and the Levy-
|
202 |
+
Khintchine representation we also deduce its Levy density to be
|
203 |
+
k(x) =
|
204 |
+
�cp
|
205 |
+
x e−x/bp11{(0,∞)}(x) + cn
|
206 |
+
|x|e−|x|/bn11{(−∞,0)}(x)
|
207 |
+
�
|
208 |
+
, x ∈ R
|
209 |
+
which shows that a BG process enjoys the self decomposability property.1 Then (see Carr et al.
|
210 |
+
(207) and the references therein) a BG distributed random variable X is a limit law, i.e. there
|
211 |
+
are centering and scaling constants {cn}n∈N and {bn}n∈N and a sequence {Zk}k∈N of i.i.d. random
|
212 |
+
variables such that the distribution of bnSn + cn converges in distribution to X, where Sn =
|
213 |
+
1A random variable X is self decomposable if for any 0 < c < 1 there is an independent random variable XC such
|
214 |
+
that X
|
215 |
+
d= cX + Xc. A Levy process enjoys the self decomposability property if its increments are self decomposable.
|
216 |
+
|
217 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
218 |
+
5
|
219 |
+
�n
|
220 |
+
k=1 Zk. This is a remarkable property, since if returns consist of some average of a large number
|
221 |
+
of independent news or other type of influences, it is reasonable to expect that their distribution
|
222 |
+
should be well approximated by a limit law. In the GBM case such law is the Gaussian, but, as
|
223 |
+
noticed in Carr et al. (207), there is “no compelling economic motivation” for the scaling constants
|
224 |
+
to be √n as in the classical central limit theorem.
|
225 |
+
Evidence of the goodness of fit of the BG density to returns distributions is presented in Kuchler
|
226 |
+
& Tappe (2008), where, using data on DAX between 1996 and 1998, it is shown that the null
|
227 |
+
hypothesis that the log returns distribution is in the BG class is not rejected. Furthermore, as
|
228 |
+
proved in Kuchler & Tappe (2008), for all BG parameters there exists a measure Q equivalent
|
229 |
+
to P such that, under Q, the discounted exponential BG process is a (local) martingale and an
|
230 |
+
exponential BG process, and one typically succeed in fitting the option prices surface, at least for
|
231 |
+
a single fixed maturity, through an exponential BG process.
|
232 |
+
2.2. Bilateral Gamma Returns under Expected Utility Theory. The notion and character-
|
233 |
+
izations of second order stochastic dominance (SSD) are recalled below (see Rothschild & Stiglitz
|
234 |
+
(1970)).
|
235 |
+
Definition 2.1. Given random variables X and Y , one says that X first (resp. second) order
|
236 |
+
stochastically dominates Y , i.e. X ⪰1 Y (resp. X ⪰2 Y ) if and only if E[u(X)] ≥ E[u(Y )] for
|
237 |
+
every increasing (resp. increasing and concave) real valued function u.
|
238 |
+
Theorem 2.2. Let X and Y be random variables with distribution functions F and G respectively.
|
239 |
+
Then, X ⪰1 Y if and only if G(t) ≥ F(t) for every t ∈ R.
|
240 |
+
Theorem 2.3. Let X and Y be random variables with distribution functions F and G respectively.
|
241 |
+
Then, the following are equivalent
|
242 |
+
(i) X ⪰2 Y ;
|
243 |
+
(ii) there are random variables Z and ε such that Y ∼ X + Z + ε, Z ≤ 0 and E[ε|X + Z] = 0;
|
244 |
+
(iii)
|
245 |
+
� t
|
246 |
+
−∞ G(s)ds ≥
|
247 |
+
� s
|
248 |
+
−∞ F(s)ds for every t ∈ R.
|
249 |
+
In addition, if E[X] = E[Y ], then the following are equivalent:
|
250 |
+
(i) X ⪰2 Y ;
|
251 |
+
(ii) there is a random variable ε such that Y ∼ X + ε and E[ε|X + Z] = 0;
|
252 |
+
(iii) E[u(X)] ≥ E[u(Y )] for every u concave.
|
253 |
+
Corollary 2.4. Suppose X ⪰2 Y . Then, E[X] ≥ E[Y ] and if E[X] = E[Y ] then V (X) ≤ V (Y ).
|
254 |
+
Proof. That E[X] ≥ E[Y ] if X ⪰2 Y follows immediately from the fact that the identity is non
|
255 |
+
decreasing and concave. If E[X] = E[Y ], then E[u(X)] ≥ E[u(Y )] for every u concave, and so,
|
256 |
+
setting u(x) = −x2 + E[X], one obtains V (X) = E[X2 − E[X]] ≤ E[Y 2 − E[X]] = V [Y ].
|
257 |
+
□
|
258 |
+
Thus, for bilateral gamma returns, SSD implies higher expected gains and/or lower expected
|
259 |
+
losses, and, for equal expected gains and losses, lower standard deviation of gains and/or losses. A
|
260 |
+
partial converse of this statement is shown below, and is based on the following results.
|
261 |
+
Theorem 2.5. Let X and Y be random variables with densities f and g. If the likelihood ratio f
|
262 |
+
g
|
263 |
+
is monotonically increasing, than X ⪰1 Y . If the likelihood ratio is monotonically increasing on
|
264 |
+
(−∞, x0) ∪ (x1, ∞) and decreasing on (x0, x1), with x0 < x1 ∈ R, then X ⪰2 Y .
|
265 |
+
Proof. See Ali (1975) and the references therein.
|
266 |
+
□
|
267 |
+
Theorem 2.6. Let X and Y be two gamma distributed random variable with scale and shape
|
268 |
+
parameters (b, c) and (b′, c′) respectively. Then,
|
269 |
+
(i) if b = b′, then c > c′ iff X ⪰2 Y ;
|
270 |
+
(ii) if c = c′, then b > b′ iff X ⪰2 Y ;
|
271 |
+
|
272 |
+
6
|
273 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
274 |
+
(ii)
|
275 |
+
c
|
276 |
+
c′ ≤ max(1, b′
|
277 |
+
b ) with strict inequality at least when b′
|
278 |
+
b = 1 iff X ⪰2 Y .
|
279 |
+
Proof. Based on showing that the assumptions of theorem 2.5 are satisfied. See Ali (1975).
|
280 |
+
□
|
281 |
+
Corollary 2.7. Let X and Y be two gamma distributed random variables with scale and shape
|
282 |
+
parameters (b, c) and (b′, c′) respectively.
|
283 |
+
Then, X second order stochastically dominates Y if
|
284 |
+
E[X] ≥ E[Y ] and V [X] ≤ V [Y ] with at least one strict inequality. Similarly, −X second order
|
285 |
+
stochastically dominates −Y if E[X] ≤ E[Y ] and V [X] ≤ V [Y ] with at least one strict inequality.
|
286 |
+
Proof. Suppose E[X] ≥ E[Y ] and V [X] ≤ V [Y ] with at least one strict inequality, i.e. bc ≥ b′c′ and
|
287 |
+
b2c ≤ b′2c′ with at least one strict inequality. Then, c
|
288 |
+
c′ ≥ b′
|
289 |
+
b , and
|
290 |
+
b′
|
291 |
+
b = b′2c′
|
292 |
+
b2c
|
293 |
+
bc
|
294 |
+
b′c′ > 1
|
295 |
+
so X ⪰2 Y by Theorem 2.6. The result for −X and −Y follows from adapting Theorem 2.6 to the
|
296 |
+
case of the negative of gamma distributions.
|
297 |
+
□
|
298 |
+
Corollary 2.8. Let X+, X−, Y +, Y − be four gamma distributed random variable with scale and
|
299 |
+
shape parameters (bp, cp), (bn, cn), (b′
|
300 |
+
p, c′
|
301 |
+
p) and (b′
|
302 |
+
n, c′
|
303 |
+
n) respectively. Then, X := X+ − X− second
|
304 |
+
order stochastically dominates Y := Y +−Y − if E[X+] ≥ E[Y +], E[X−] ≤ E[Y −], V [X+] ≤ V [Y +],
|
305 |
+
and V [X−] ≤ V [Y −] with exactly one strict inequality.
|
306 |
+
Proof. Suppose for instance E[X+] > E[Y +]. Then, by Corollary 2.7, X+ ⪰2 Y +, and so, for all
|
307 |
+
t ∈ [0, ∞)
|
308 |
+
� t
|
309 |
+
0
|
310 |
+
F +(s) − G+(s)ds ≤ 0,
|
311 |
+
where F + and G+ denote the cumulative distribution function of X+ and Y + respectively. Then,
|
312 |
+
using Tonelli’s theorem,
|
313 |
+
� t
|
314 |
+
0
|
315 |
+
F(s) − G(s)ds =
|
316 |
+
� ∞
|
317 |
+
0
|
318 |
+
� t
|
319 |
+
0
|
320 |
+
F +(s − ξ) − G+(s − ξ)dsdF −(ξ) ≤ 0,
|
321 |
+
where F − is the (common) distribution of −X− and −Y −, and the conclusion follows from Theorem
|
322 |
+
2.3. The other cases are similar.
|
323 |
+
□
|
324 |
+
Based on the last corollary and transitivity of SSD, the observation that a positive variation in
|
325 |
+
µp can compensate a positive variation in any among the upside volatility σp, the expected loss
|
326 |
+
prospect µn or the downside volatility σn is evidence of investors’ risk seeking behaviors.
|
327 |
+
Note that µp is not, in general, a “reward” accessible to an investor holding the asset. In fact,
|
328 |
+
for a given time horizon T the expected return for holding the asset is the value µ(T) that satisfies
|
329 |
+
S0eµ(T) = E[S0eXT ], and so the variation
|
330 |
+
lim
|
331 |
+
T↓0
|
332 |
+
µ(T)
|
333 |
+
T
|
334 |
+
=
|
335 |
+
�
|
336 |
+
R
|
337 |
+
(ex − 1)k(x)dx = (1 − bp)−cp(1 + bn)−cn
|
338 |
+
(2.2)
|
339 |
+
better serves this purpose. Thus, we refer to µp as a “compensation” for the risks (σp, µn, σn).
|
340 |
+
2.2.1. Log-Returns and Kelly’s Criterion. In the case log returns are assumed to be bilateral gamma
|
341 |
+
variates, these results cannot hold anymore, since, for instance, an increase in σp and/or σn im-
|
342 |
+
plies higher expected value of the return, and it cannot imply second order stochastic dominance.
|
343 |
+
However, a traditional assumption in the financial and economics literature, justified by some ev-
|
344 |
+
idence (Arrow (1971)), is to assume that investors maximize log-returns. In our context, such an
|
345 |
+
assumption implies that an asset is preferred to another one if and only if the expected log-return
|
346 |
+
is higher. More generally, for asset allocation problems, logarithmic utility yields the best return
|
347 |
+
in the long run, assuming the investor faces a long sequence of investment decisions (Kelly (1956),
|
348 |
+
|
349 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
350 |
+
7
|
351 |
+
Merton (1969), Cover (1991)), but for an investor with a short/medium term horizon, a logarithmic
|
352 |
+
utility will not capture aversion to short term high volatility (Samuelson (1979)), thus leading to
|
353 |
+
consider a utility specification with a coefficient of relative risk aversion (CRRA) bounded below by
|
354 |
+
1.2 It then follows from the results of this section and proposition 2.2.1 below that, for a reasonable
|
355 |
+
utility specification such as u(log(·)), risks and their compensation are captured by (σp, µn, σn) and
|
356 |
+
µp respectively even when log-returns belong to the bilateral gamma class.
|
357 |
+
Proposition 2.9. A strictly increasing and concave function v ∈ C2 ((0, ∞)) has CRRA coefficient
|
358 |
+
greater than 1 if and only if there is a strictly increasing and concave function u ∈ C2(R) such that
|
359 |
+
v(x) = u(log(x)) for every x ∈ (0, ∞).
|
360 |
+
Proof. Suppose such a u exists. Then, for all x ∈ (0, ∞), u′′(log(x)) ≥ 0 and u′(log(x)) < 0
|
361 |
+
xv′′(x)
|
362 |
+
v′(x) = −x
|
363 |
+
d2
|
364 |
+
dx2 u(log(x))
|
365 |
+
d
|
366 |
+
dxu(log(x)) = 1 − u′′(log(x))
|
367 |
+
u′(log(x)) ≥ 1.
|
368 |
+
On the other hand, if v has CRRA bounded below by 1, then, setting u(y) = v(ey) for every y ∈ R,
|
369 |
+
we obtain u′(y) = v′(ey)ey > 0 and u′′(y) = v′′(ey)e2y + v′(ey)ey ≤ 0.
|
370 |
+
□
|
371 |
+
3. The Acceptance Set
|
372 |
+
3.1. Learning the Boundaries. As mentioned in the introduction, not all quadruples (µp, σp, µn, σn)
|
373 |
+
can be traded, or, in other words, there are structural limits to how high and/or low is the level
|
374 |
+
of rewards that can be offered for given risks. In order to determine such limits, moments of gains
|
375 |
+
and losses were estimated for 184 stocks (whose ticker is reported in appendix A) for the period
|
376 |
+
01/01/2008 to 31/12/2020 using one year of data for each estimate.3 Assuming the boundaries are
|
377 |
+
defined by functions fm, fM : (σp, µn, σn) → µp, we find fM and fm by solving, respectively,
|
378 |
+
min
|
379 |
+
f∈F(1 − τM)
|
380 |
+
�
|
381 |
+
i
|
382 |
+
[µp(i) − fM(σp(i), µn(i), σn(i))]+ − τM
|
383 |
+
�
|
384 |
+
i
|
385 |
+
[µp(i) − fM(σp(i), µn(i), σn(i))]− ,
|
386 |
+
min
|
387 |
+
f∈F(1 − τm)
|
388 |
+
�
|
389 |
+
i
|
390 |
+
[µp(i) − fm(σp(i), µn(i), σn(i))]+ − τm
|
391 |
+
�
|
392 |
+
i
|
393 |
+
[µp(i) − fm(σp(i), µn(i), σn(i))]− ,
|
394 |
+
where F is a suitable class of functions which is here assumed to be the class of linear Gaussian
|
395 |
+
process (GPR) regressors, τM = 0.95 and τm = 0.05. In our implementation of quantile GPR,
|
396 |
+
the kernel hyperparameters were estimated using the standard loss function, while the regression
|
397 |
+
coefficients are chosen to maximize the quantile loss function. Specifically, recall that GPR assumes
|
398 |
+
µp = α + h(σp, µnσn)T β + f(σp, µnσn) + ε,
|
399 |
+
(3.1)
|
400 |
+
where ε is noise with variance σ2
|
401 |
+
ε, h is the map to features space (here assumed to be the identity),
|
402 |
+
and where any finite number collection {f(σp, µnσn)} is assumed to have Gaussian distribution with
|
403 |
+
mean 0 and covariance function κ((σp, µnσn), (σp, µnσn)′). The prediction µp for x = (σp, µn, σn)
|
404 |
+
given n observations (µi
|
405 |
+
p, σi
|
406 |
+
p, µi
|
407 |
+
n, σi
|
408 |
+
n) is then given by (see Rasmussen & Williams (2006))
|
409 |
+
µp =
|
410 |
+
�κ(x1, x)
|
411 |
+
...
|
412 |
+
κ(xn, x)�
|
413 |
+
�
|
414 |
+
�
|
415 |
+
�
|
416 |
+
�
|
417 |
+
��
|
418 |
+
(κ(x1, x1)
|
419 |
+
. . .
|
420 |
+
κ(x1, xn)
|
421 |
+
...
|
422 |
+
(κ(xn, x1)
|
423 |
+
. . .
|
424 |
+
κ(xn, xn)
|
425 |
+
�
|
426 |
+
��
|
427 |
+
i,j
|
428 |
+
+ σ2
|
429 |
+
εI
|
430 |
+
�
|
431 |
+
�
|
432 |
+
�
|
433 |
+
−1 �
|
434 |
+
��
|
435 |
+
µ1
|
436 |
+
p
|
437 |
+
...
|
438 |
+
µn
|
439 |
+
p
|
440 |
+
�
|
441 |
+
�� ,
|
442 |
+
where we let xi = (σi
|
443 |
+
p, µi
|
444 |
+
n, σi
|
445 |
+
n). Here we take κ to be the squared exponential kernel, with parameters
|
446 |
+
estimated based on the standard loss function. The vector β and the intercept α are instead chosen
|
447 |
+
by minimization of the quantile loss function.
|
448 |
+
2In fact, several empirical studies provide evidence for this to be the case (see e.g. Friend & Blume (1975)).
|
449 |
+
3Observations are results of likelihood optimization, so 1% of outliers were excluded.
|
450 |
+
|
451 |
+
8
|
452 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
453 |
+
The linear estimates obtained for fm and fM are
|
454 |
+
fm(σp, µn, σn) = 0.0017 + 0.2029σp + 0.9951µn − 0.3711σn,
|
455 |
+
fM(σp, µn, σn) = 0.0017 + 0.2710σp + 1.0102µn − 0.2311σn.
|
456 |
+
Note, in particular, the negative relationship between σn and µp.
|
457 |
+
Similarly, for quantile GPR, ∂fm
|
458 |
+
∂σn are always negative, while ∂fM
|
459 |
+
∂σn are positive at all but two of 16
|
460 |
+
representative points (table 1).
|
461 |
+
∂fM
|
462 |
+
∂σp
|
463 |
+
∂fM
|
464 |
+
∂µn
|
465 |
+
∂fM
|
466 |
+
∂σn
|
467 |
+
∂fm
|
468 |
+
∂σp
|
469 |
+
∂fm
|
470 |
+
∂µn
|
471 |
+
∂fm
|
472 |
+
∂σn
|
473 |
+
0.2667
|
474 |
+
2.4704
|
475 |
+
0.7577
|
476 |
+
-0.0130
|
477 |
+
2.0042
|
478 |
+
-0.2421
|
479 |
+
0.8691
|
480 |
+
1.9402
|
481 |
+
-1.3539
|
482 |
+
1.1140
|
483 |
+
1.8974
|
484 |
+
-0.8361
|
485 |
+
1.5243
|
486 |
+
1.9553
|
487 |
+
-1.1134
|
488 |
+
1.4108
|
489 |
+
1.9274
|
490 |
+
-1.2346
|
491 |
+
1.0459
|
492 |
+
2.0254
|
493 |
+
-0.4887
|
494 |
+
0.5666
|
495 |
+
1.9927
|
496 |
+
-1.2635
|
497 |
+
1.0867
|
498 |
+
1.9956
|
499 |
+
-1.0836
|
500 |
+
0.8823
|
501 |
+
2.0199
|
502 |
+
-1.2220
|
503 |
+
0.4639
|
504 |
+
2.0065
|
505 |
+
-1.4194
|
506 |
+
0.6053
|
507 |
+
2.0648
|
508 |
+
-1.1568
|
509 |
+
1.3013
|
510 |
+
2.0509
|
511 |
+
-1.4681
|
512 |
+
1.2715
|
513 |
+
2.0128
|
514 |
+
-1.4149
|
515 |
+
0.9669
|
516 |
+
2.0019
|
517 |
+
-0.2462
|
518 |
+
0.4477
|
519 |
+
1.9760
|
520 |
+
-1.0806
|
521 |
+
1.4434
|
522 |
+
2.2522
|
523 |
+
0.3978
|
524 |
+
0.5052
|
525 |
+
2.0026
|
526 |
+
-0.5761
|
527 |
+
0.9710
|
528 |
+
1.9465
|
529 |
+
-0.9840
|
530 |
+
0.9472
|
531 |
+
1.8900
|
532 |
+
-0.8995
|
533 |
+
1.0653
|
534 |
+
1.9423
|
535 |
+
-1.4702
|
536 |
+
1.3075
|
537 |
+
1.9230
|
538 |
+
-0.9990
|
539 |
+
0.9307
|
540 |
+
1.9594
|
541 |
+
-0.5941
|
542 |
+
0.6044
|
543 |
+
1.9087
|
544 |
+
-1.0416
|
545 |
+
1.3390
|
546 |
+
2.0444
|
547 |
+
-1.8664
|
548 |
+
1.4529
|
549 |
+
2.0287
|
550 |
+
-1.5394
|
551 |
+
0.8652
|
552 |
+
1.9872
|
553 |
+
-1.3001
|
554 |
+
0.9281
|
555 |
+
2.0499
|
556 |
+
-1.0898
|
557 |
+
1.1957
|
558 |
+
2.0398
|
559 |
+
-0.9586
|
560 |
+
0.9027
|
561 |
+
1.9967
|
562 |
+
-1.3931
|
563 |
+
0.9283
|
564 |
+
1.9956
|
565 |
+
-0.0906
|
566 |
+
0.3913
|
567 |
+
1.9830
|
568 |
+
-0.9539
|
569 |
+
Table 1. Boundaries gradients (estimated via Quantile GPR), at 16 representative points.
|
570 |
+
Alternatively, fm and fM can be obtained via distorted least square (Madan & Schoutens (2021)),
|
571 |
+
i.e. solving
|
572 |
+
min
|
573 |
+
f∈F
|
574 |
+
�
|
575 |
+
i
|
576 |
+
r2
|
577 |
+
i
|
578 |
+
�
|
579 |
+
Ψ(qi) − Ψ
|
580 |
+
�
|
581 |
+
qi − 1
|
582 |
+
n
|
583 |
+
��
|
584 |
+
,
|
585 |
+
(3.2)
|
586 |
+
where, for every i,
|
587 |
+
ri := µp(i) − f(σp(i), µn(i), σn(i)
|
588 |
+
is the residual corresponding to the i-th observation, Ψ : [0, 1] → [0, 1] is a distribution function
|
589 |
+
(called a distortion) concave for fm and convex for fM, and qi is the i-th quantile of the residual’s
|
590 |
+
empirical distribution.
|
591 |
+
The idea behind 3.2 is as follows. First, Ψ defines a distorted expectation EΨ[X] of a random
|
592 |
+
variable X with distribution function F, as the Stjielties integral with respect to the distribution
|
593 |
+
function Ψ ◦ F:
|
594 |
+
EΨ[X] :=
|
595 |
+
�
|
596 |
+
R
|
597 |
+
xdΨ(F(x)).
|
598 |
+
If Ψ is concave, lower values of X are weighted higher, thus implying EΨ[X] ≤ E[X], while the
|
599 |
+
opposite is true if Ψ is convex. Next, given observations {xi}n
|
600 |
+
i=0 of X, EΨ[X] is estimated by
|
601 |
+
n
|
602 |
+
�
|
603 |
+
i=1
|
604 |
+
x(i)
|
605 |
+
�
|
606 |
+
Ψ(F(x(i))) − Ψ(F(x(i−1)))
|
607 |
+
�
|
608 |
+
|
609 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
610 |
+
9
|
611 |
+
where {xi}i=1,...,n is the ordered sample. If F is unknown, this estimator can be replaced by
|
612 |
+
n
|
613 |
+
�
|
614 |
+
i=1
|
615 |
+
xi
|
616 |
+
�
|
617 |
+
Ψ (qi) − Ψ
|
618 |
+
�
|
619 |
+
qi − 1
|
620 |
+
n
|
621 |
+
��
|
622 |
+
,
|
623 |
+
so the loss function 3.2 corresponds to minimizing the estimated distorted expectation of the squared
|
624 |
+
residual. By the tower property of (nonlinear) conditional expectations, the solution to problem
|
625 |
+
3.2 minimizes the distorted squared distance to the estimate of EΨ[µp|σp, µn, σn] and so, for an
|
626 |
+
appropriate distortion, it can be thought as a lower/upper bound to the range of compensation µp
|
627 |
+
given the risks (σp, µn, σn). Following Madan & Schoutens (2021), we set γ = 0.75 and define, for
|
628 |
+
u ∈ [0, 1],
|
629 |
+
Ψ(u) = 1 −
|
630 |
+
�
|
631 |
+
1 − u
|
632 |
+
1
|
633 |
+
1+γ
|
634 |
+
�1+γ
|
635 |
+
.
|
636 |
+
(3.3)
|
637 |
+
The linear estimates obtained for fm and fM obtained via distorted least square are
|
638 |
+
fm(σp, µn, σn) = 0.0024 + 0.1118σp + 0.9276µn − 0.2596σn,
|
639 |
+
fM(σp, µn, σn) = 0.0002 + 0.3604σp + 1.0196µn − 0.1798σn,
|
640 |
+
while the gradient at 16 representative points of the GPR estimates is shown in table 2.
|
641 |
+
∂fM
|
642 |
+
∂σp
|
643 |
+
∂fM
|
644 |
+
∂µn
|
645 |
+
∂fM
|
646 |
+
∂σn
|
647 |
+
∂fm
|
648 |
+
∂σp
|
649 |
+
∂fm
|
650 |
+
∂µn
|
651 |
+
∂fm
|
652 |
+
∂σn
|
653 |
+
-0.0887
|
654 |
+
1.9864
|
655 |
+
0.6572
|
656 |
+
0.0790
|
657 |
+
2.0073
|
658 |
+
-0.1164
|
659 |
+
1.4815
|
660 |
+
1.9431
|
661 |
+
-0.3117
|
662 |
+
0.5231
|
663 |
+
1.8825
|
664 |
+
-1.8317
|
665 |
+
1.1663
|
666 |
+
1.9467
|
667 |
+
-1.8564
|
668 |
+
1.6447
|
669 |
+
1.9112
|
670 |
+
-0.6290
|
671 |
+
0.8911
|
672 |
+
2.0018
|
673 |
+
-0.7190
|
674 |
+
0.6395
|
675 |
+
1.9916
|
676 |
+
-1.1617
|
677 |
+
1.2837
|
678 |
+
1.9852
|
679 |
+
-0.6655
|
680 |
+
0.6932
|
681 |
+
2.0128
|
682 |
+
-1.5889
|
683 |
+
0.7569
|
684 |
+
1.9771
|
685 |
+
-0.9006
|
686 |
+
0.3673
|
687 |
+
2.1029
|
688 |
+
-1.5779
|
689 |
+
1.6313
|
690 |
+
2.0300
|
691 |
+
-0.8589
|
692 |
+
0.9376
|
693 |
+
2.0127
|
694 |
+
-2.0179
|
695 |
+
0.7577
|
696 |
+
1.9821
|
697 |
+
-0.5676
|
698 |
+
0.5676
|
699 |
+
1.9736
|
700 |
+
-0.8992
|
701 |
+
0.5482
|
702 |
+
2.0124
|
703 |
+
-0.3588
|
704 |
+
0.7854
|
705 |
+
2.0058
|
706 |
+
-0.0587
|
707 |
+
1.2923
|
708 |
+
1.9270
|
709 |
+
-0.3932
|
710 |
+
0.6114
|
711 |
+
1.8902
|
712 |
+
-1.5024
|
713 |
+
1.5750
|
714 |
+
1.9676
|
715 |
+
-0.7003
|
716 |
+
0.8115
|
717 |
+
1.8921
|
718 |
+
-1.7373
|
719 |
+
0.9369
|
720 |
+
1.9325
|
721 |
+
-0.5317
|
722 |
+
0.5394
|
723 |
+
1.9128
|
724 |
+
-1.1926
|
725 |
+
1.8380
|
726 |
+
2.0261
|
727 |
+
-0.9785
|
728 |
+
0.9812
|
729 |
+
2.0308
|
730 |
+
-2.3639
|
731 |
+
1.2369
|
732 |
+
1.9782
|
733 |
+
-0.6258
|
734 |
+
0.6211
|
735 |
+
2.0585
|
736 |
+
-1.6346
|
737 |
+
1.2424
|
738 |
+
2.0136
|
739 |
+
-0.8368
|
740 |
+
0.8070
|
741 |
+
1.9979
|
742 |
+
-1.5882
|
743 |
+
0.6792
|
744 |
+
1.9826
|
745 |
+
-0.4806
|
746 |
+
0.5497
|
747 |
+
1.9767
|
748 |
+
-0.7058
|
749 |
+
Table 2. Boundaries gradients via Distorted GPR at 16 representative points.
|
750 |
+
Finally, we show in table 3 the percentages of observations represented by each of the 16 quantized
|
751 |
+
points.
|
752 |
+
µp
|
753 |
+
0.0694
|
754 |
+
0.0208
|
755 |
+
0.0343
|
756 |
+
0.0167
|
757 |
+
0.0685
|
758 |
+
0.1428
|
759 |
+
0.0308
|
760 |
+
0.0119
|
761 |
+
%
|
762 |
+
0.70
|
763 |
+
0.76
|
764 |
+
3.53
|
765 |
+
10.49
|
766 |
+
1.79
|
767 |
+
0.72
|
768 |
+
5.66
|
769 |
+
14.99
|
770 |
+
µp
|
771 |
+
0.0467
|
772 |
+
0.0165
|
773 |
+
0.0260
|
774 |
+
0.0130
|
775 |
+
0.0453
|
776 |
+
0.1002
|
777 |
+
0.0225
|
778 |
+
0.0088
|
779 |
+
%
|
780 |
+
2.11
|
781 |
+
11.22
|
782 |
+
5.52
|
783 |
+
12.11
|
784 |
+
2.87
|
785 |
+
1.19
|
786 |
+
8.33
|
787 |
+
11.00
|
788 |
+
Table 3. Percentage of observations represented by quantized point µp.
|
789 |
+
|
790 |
+
10
|
791 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
792 |
+
3.2. Implied Boundaries for Performance Measures. Table 4-15 show boundaries for µp,
|
793 |
+
Sharpe ratio and acceptability index at the 16 quantized points. 4
|
794 |
+
As observed in Madan & Eberlein (2009), typically acceptability indexes based on the MIN-
|
795 |
+
MAXVAR distortion for returns on stocks and indexes are less than 0.15, with median values of
|
796 |
+
0.04 and more than 5% of observations at 0. These findings are consistent with the boundaries for
|
797 |
+
the acceptability index at the 16 representative points shown in table 13 for both short and long
|
798 |
+
positions. Note also that the acceptability index tends to be higher for long positions, which is also
|
799 |
+
to be expected.
|
800 |
+
Upper
|
801 |
+
Boundary
|
802 |
+
Observation
|
803 |
+
Lower
|
804 |
+
Boundary
|
805 |
+
Upper
|
806 |
+
Boundary
|
807 |
+
Observation
|
808 |
+
Lower
|
809 |
+
Boundary
|
810 |
+
0.0752
|
811 |
+
0.0694
|
812 |
+
0.0653
|
813 |
+
0.0512
|
814 |
+
0.0467
|
815 |
+
0.0427
|
816 |
+
0.0228
|
817 |
+
0.0208
|
818 |
+
0.0189
|
819 |
+
0.0180
|
820 |
+
0.0165
|
821 |
+
0.0149
|
822 |
+
0.0379
|
823 |
+
0.0343
|
824 |
+
0.0315
|
825 |
+
0.0287
|
826 |
+
0.0260
|
827 |
+
0.0238
|
828 |
+
0.0177
|
829 |
+
0.0167
|
830 |
+
0.0157
|
831 |
+
0.0143
|
832 |
+
0.0130
|
833 |
+
0.0119
|
834 |
+
0.0701
|
835 |
+
0.0685
|
836 |
+
0.0665
|
837 |
+
0.0470
|
838 |
+
0.0453
|
839 |
+
0.0432
|
840 |
+
0.1459
|
841 |
+
0.1428
|
842 |
+
0.1402
|
843 |
+
0.1025
|
844 |
+
0.1002
|
845 |
+
0.0980
|
846 |
+
0.0324
|
847 |
+
0.0308
|
848 |
+
0.0292
|
849 |
+
0.0238
|
850 |
+
0.0225
|
851 |
+
0.0212
|
852 |
+
0.0127
|
853 |
+
0.0119
|
854 |
+
0.0109
|
855 |
+
0.0097
|
856 |
+
0.0088
|
857 |
+
0.0082
|
858 |
+
Table 4. µp boundaries estimated via Quantile Regression, at 16 representative points.
|
859 |
+
Upper
|
860 |
+
Boundary
|
861 |
+
Observation
|
862 |
+
Lower
|
863 |
+
Boundary
|
864 |
+
Upper
|
865 |
+
Boundary
|
866 |
+
Observation
|
867 |
+
Lower
|
868 |
+
Boundary
|
869 |
+
0.0856
|
870 |
+
0.0694
|
871 |
+
0.0697
|
872 |
+
0.0536
|
873 |
+
0.0467
|
874 |
+
0.0469
|
875 |
+
0.0224
|
876 |
+
0.0208
|
877 |
+
0.0190
|
878 |
+
0.0184
|
879 |
+
0.0165
|
880 |
+
0.0143
|
881 |
+
0.0348
|
882 |
+
0.0343
|
883 |
+
0.0339
|
884 |
+
0.0269
|
885 |
+
0.0260
|
886 |
+
0.0252
|
887 |
+
0.0180
|
888 |
+
0.0167
|
889 |
+
0.0153
|
890 |
+
0.0147
|
891 |
+
0.0130
|
892 |
+
0.0112
|
893 |
+
0.0706
|
894 |
+
0.0685
|
895 |
+
0.0661
|
896 |
+
0.0473
|
897 |
+
0.0453
|
898 |
+
0.0428
|
899 |
+
0.1440
|
900 |
+
0.1428
|
901 |
+
0.1421
|
902 |
+
0.1024
|
903 |
+
0.1002
|
904 |
+
0.0986
|
905 |
+
0.0329
|
906 |
+
0.0308
|
907 |
+
0.0284
|
908 |
+
0.0243
|
909 |
+
0.0225
|
910 |
+
0.0204
|
911 |
+
0.0127
|
912 |
+
0.0119
|
913 |
+
0.0107
|
914 |
+
0.0092
|
915 |
+
0.0088
|
916 |
+
0.0081
|
917 |
+
Table 5. µp boundaries estimated via Quantile GPR, at 16 representative points.
|
918 |
+
3.3. Dimensional Analysis. As visible from tables 4-7, the different methodologies do not pro-
|
919 |
+
duce significantly different estimates for the boundaries fm and fM, and one may wonder if such
|
920 |
+
boundaries are indeed linear. As the boundaries are close to each others one way to assess if this is
|
921 |
+
the case is to compare the variance of the noise of a linear lower dimensional embedding with that
|
922 |
+
of a nonlinear one.5 Our results, summarized in table, provide evidence of the linearity of fm and
|
923 |
+
fM.
|
924 |
+
4The definition of Sharpe ratio adopted here is simply given by
|
925 |
+
µ
|
926 |
+
√
|
927 |
+
t
|
928 |
+
σ , with µ = µp − µn, σ2 = σ2
|
929 |
+
p + σ2
|
930 |
+
n and
|
931 |
+
t = 250 business days. The acceptability index is defined in Madan & Eberlein (2009) as the maximal γ such that
|
932 |
+
the distorted expectation EΨγ [X] is nonnegative (or nonpositive for short position), where Ψγ is again taken as the
|
933 |
+
MINMAXVAR distortion.
|
934 |
+
5For the nonlinear embedding we utilize the Diffusion map algorithm, recently introduced in Coifman & Lafon
|
935 |
+
(2006).
|
936 |
+
|
937 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
938 |
+
11
|
939 |
+
Upper
|
940 |
+
Boundary
|
941 |
+
Observation
|
942 |
+
Lower
|
943 |
+
Boundary
|
944 |
+
Upper
|
945 |
+
Boundary
|
946 |
+
Observation
|
947 |
+
Lower
|
948 |
+
Boundary
|
949 |
+
0.0756
|
950 |
+
0.0694
|
951 |
+
0.0644
|
952 |
+
0.0513
|
953 |
+
0.0467
|
954 |
+
0.0427
|
955 |
+
0.0223
|
956 |
+
0.0208
|
957 |
+
0.0193
|
958 |
+
0.0175
|
959 |
+
0.0165
|
960 |
+
0.0154
|
961 |
+
0.0377
|
962 |
+
0.0343
|
963 |
+
0.0317
|
964 |
+
0.0284
|
965 |
+
0.0260
|
966 |
+
0.0241
|
967 |
+
0.0172
|
968 |
+
0.0167
|
969 |
+
0.0161
|
970 |
+
0.0137
|
971 |
+
0.0130
|
972 |
+
0.0123
|
973 |
+
0.0699
|
974 |
+
0.0685
|
975 |
+
0.0676
|
976 |
+
0.0467
|
977 |
+
0.0453
|
978 |
+
0.0439
|
979 |
+
0.1461
|
980 |
+
0.1428
|
981 |
+
0.1416
|
982 |
+
0.1025
|
983 |
+
0.1002
|
984 |
+
0.0992
|
985 |
+
0.0320
|
986 |
+
0.0308
|
987 |
+
0.0297
|
988 |
+
0.0233
|
989 |
+
0.0225
|
990 |
+
0.0216
|
991 |
+
0.0121
|
992 |
+
0.0119
|
993 |
+
0.0114
|
994 |
+
0.0090
|
995 |
+
0.0088
|
996 |
+
0.0086
|
997 |
+
Table 6. µp boundaries via Distorted LS at 16 representative points.
|
998 |
+
Upper
|
999 |
+
Boundary
|
1000 |
+
Observation
|
1001 |
+
Lower
|
1002 |
+
Boundary
|
1003 |
+
Upper
|
1004 |
+
Boundary
|
1005 |
+
Observation
|
1006 |
+
Lower
|
1007 |
+
Boundary
|
1008 |
+
0.0751
|
1009 |
+
0.0694
|
1010 |
+
0.0694
|
1011 |
+
0.0511
|
1012 |
+
0.0467
|
1013 |
+
0.0453
|
1014 |
+
0.0245
|
1015 |
+
0.0208
|
1016 |
+
0.0167
|
1017 |
+
0.0182
|
1018 |
+
0.0165
|
1019 |
+
0.0143
|
1020 |
+
0.0409
|
1021 |
+
0.0343
|
1022 |
+
0.0274
|
1023 |
+
0.0325
|
1024 |
+
0.0260
|
1025 |
+
0.0193
|
1026 |
+
0.0172
|
1027 |
+
0.0167
|
1028 |
+
0.0161
|
1029 |
+
0.0138
|
1030 |
+
0.0130
|
1031 |
+
0.0120
|
1032 |
+
0.0694
|
1033 |
+
0.0685
|
1034 |
+
0.0664
|
1035 |
+
0.0475
|
1036 |
+
0.0453
|
1037 |
+
0.0420
|
1038 |
+
0.1446
|
1039 |
+
0.1428
|
1040 |
+
0.1410
|
1041 |
+
0.1021
|
1042 |
+
0.1002
|
1043 |
+
0.0982
|
1044 |
+
0.0324
|
1045 |
+
0.0308
|
1046 |
+
0.0284
|
1047 |
+
0.0233
|
1048 |
+
0.0225
|
1049 |
+
0.0212
|
1050 |
+
0.0122
|
1051 |
+
0.0119
|
1052 |
+
0.0114
|
1053 |
+
0.0091
|
1054 |
+
0.0088
|
1055 |
+
0.0086
|
1056 |
+
Table 7. µp boundaries via Distorted GPR at 16 representative points.
|
1057 |
+
Upper
|
1058 |
+
Boundary
|
1059 |
+
Observation
|
1060 |
+
Lower
|
1061 |
+
Boundary
|
1062 |
+
Upper
|
1063 |
+
Boundary
|
1064 |
+
Observation
|
1065 |
+
Lower
|
1066 |
+
Boundary
|
1067 |
+
1.3983
|
1068 |
+
-0.1280
|
1069 |
+
-1.2170
|
1070 |
+
1.0860
|
1071 |
+
-0.2864
|
1072 |
+
-1.5225
|
1073 |
+
1.6557
|
1074 |
+
0.3176
|
1075 |
+
-0.9488
|
1076 |
+
1.9242
|
1077 |
+
0.6302
|
1078 |
+
-0.6800
|
1079 |
+
1.1930
|
1080 |
+
-0.2494
|
1081 |
+
-1.4179
|
1082 |
+
1.4190
|
1083 |
+
-0.0292
|
1084 |
+
-1.1870
|
1085 |
+
2.9743
|
1086 |
+
1.6717
|
1087 |
+
0.3023
|
1088 |
+
2.3051
|
1089 |
+
0.9589
|
1090 |
+
-0.2970
|
1091 |
+
2.4155
|
1092 |
+
0.9010
|
1093 |
+
-0.9568
|
1094 |
+
2.0173
|
1095 |
+
0.7184
|
1096 |
+
-0.9007
|
1097 |
+
2.5615
|
1098 |
+
0.5177
|
1099 |
+
-1.2321
|
1100 |
+
2.5085
|
1101 |
+
0.6926
|
1102 |
+
-1.0699
|
1103 |
+
2.1170
|
1104 |
+
0.7360
|
1105 |
+
-0.6640
|
1106 |
+
2.4731
|
1107 |
+
1.1418
|
1108 |
+
-0.2466
|
1109 |
+
3.1653
|
1110 |
+
1.8893
|
1111 |
+
0.5564
|
1112 |
+
3.5950
|
1113 |
+
2.2045
|
1114 |
+
1.0172
|
1115 |
+
Table 8. Sharpe ratio boundaries via Quantile Regression at 16 representative points.
|
1116 |
+
Upper
|
1117 |
+
Boundary
|
1118 |
+
Observation
|
1119 |
+
Lower
|
1120 |
+
Boundary
|
1121 |
+
Upper
|
1122 |
+
Boundary
|
1123 |
+
Observation
|
1124 |
+
Lower
|
1125 |
+
Boundary
|
1126 |
+
4.0960
|
1127 |
+
-0.1253
|
1128 |
+
-0.0500
|
1129 |
+
1.7966
|
1130 |
+
-0.2803
|
1131 |
+
-0.2231
|
1132 |
+
1.4038
|
1133 |
+
0.3108
|
1134 |
+
-0.8727
|
1135 |
+
2.2708
|
1136 |
+
0.6168
|
1137 |
+
-1.1672
|
1138 |
+
-0.0615
|
1139 |
+
-0.2441
|
1140 |
+
-0.4023
|
1141 |
+
0.4234
|
1142 |
+
-0.0286
|
1143 |
+
-0.4702
|
1144 |
+
3.2179
|
1145 |
+
1.6361
|
1146 |
+
-0.1370
|
1147 |
+
2.7574
|
1148 |
+
0.9385
|
1149 |
+
-0.9590
|
1150 |
+
2.7685
|
1151 |
+
0.8818
|
1152 |
+
-1.3389
|
1153 |
+
2.1867
|
1154 |
+
0.7031
|
1155 |
+
-1.2120
|
1156 |
+
1.2525
|
1157 |
+
0.5067
|
1158 |
+
0.0483
|
1159 |
+
2.3867
|
1160 |
+
0.6779
|
1161 |
+
-0.5442
|
1162 |
+
2.4903
|
1163 |
+
0.7203
|
1164 |
+
-1.2574
|
1165 |
+
2.9818
|
1166 |
+
1.1174
|
1167 |
+
-0.9577
|
1168 |
+
3.0642
|
1169 |
+
1.8490
|
1170 |
+
0.2862
|
1171 |
+
2.7892
|
1172 |
+
2.1576
|
1173 |
+
0.9789
|
1174 |
+
Table 9. Sharpe ratio boundaries via Quantile GPR, at 16 representative points.
|
1175 |
+
|
1176 |
+
12
|
1177 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
1178 |
+
Upper
|
1179 |
+
Boundary
|
1180 |
+
Observation
|
1181 |
+
Lower
|
1182 |
+
Boundary
|
1183 |
+
Upper
|
1184 |
+
Boundary
|
1185 |
+
Observation
|
1186 |
+
Lower
|
1187 |
+
Boundary
|
1188 |
+
1.5043
|
1189 |
+
-0.1280
|
1190 |
+
-1.4702
|
1191 |
+
1.1167
|
1192 |
+
-0.2864
|
1193 |
+
-1.5371
|
1194 |
+
1.3725
|
1195 |
+
0.3176
|
1196 |
+
-0.6988
|
1197 |
+
1.4923
|
1198 |
+
0.6302
|
1199 |
+
-0.3014
|
1200 |
+
1.1352
|
1201 |
+
-0.2494
|
1202 |
+
-1.3296
|
1203 |
+
1.2542
|
1204 |
+
-0.0292
|
1205 |
+
-1.0275
|
1206 |
+
2.2277
|
1207 |
+
1.6717
|
1208 |
+
0.8526
|
1209 |
+
1.6831
|
1210 |
+
0.9589
|
1211 |
+
0.2273
|
1212 |
+
2.1671
|
1213 |
+
0.9010
|
1214 |
+
0.0706
|
1215 |
+
1.7605
|
1216 |
+
0.7184
|
1217 |
+
-0.3756
|
1218 |
+
2.7175
|
1219 |
+
0.5177
|
1220 |
+
-0.2952
|
1221 |
+
2.4707
|
1222 |
+
0.6926
|
1223 |
+
-0.1181
|
1224 |
+
1.7489
|
1225 |
+
0.7360
|
1226 |
+
-0.2058
|
1227 |
+
1.9404
|
1228 |
+
1.1418
|
1229 |
+
0.2373
|
1230 |
+
2.2607
|
1231 |
+
1.8893
|
1232 |
+
1.1881
|
1233 |
+
2.4546
|
1234 |
+
2.2045
|
1235 |
+
1.8048
|
1236 |
+
Table 10. Sharpe ratio boundaries via Distorted LS at 16 representative points.
|
1237 |
+
Upper
|
1238 |
+
Boundary
|
1239 |
+
Observation
|
1240 |
+
Lower
|
1241 |
+
Boundary
|
1242 |
+
Upper
|
1243 |
+
Boundary
|
1244 |
+
Observation
|
1245 |
+
Lower
|
1246 |
+
Boundary
|
1247 |
+
1.3460
|
1248 |
+
-0.1253
|
1249 |
+
-0.1301
|
1250 |
+
1.0333
|
1251 |
+
-0.2803
|
1252 |
+
-0.7017
|
1253 |
+
2.7489
|
1254 |
+
0.3108
|
1255 |
+
-2.4183
|
1256 |
+
2.0463
|
1257 |
+
0.6168
|
1258 |
+
-1.2065
|
1259 |
+
2.3787
|
1260 |
+
-0.2441
|
1261 |
+
-3.0308
|
1262 |
+
3.3902
|
1263 |
+
-0.0286
|
1264 |
+
-3.5272
|
1265 |
+
2.1957
|
1266 |
+
1.6361
|
1267 |
+
0.8460
|
1268 |
+
1.7904
|
1269 |
+
0.9385
|
1270 |
+
-0.1558
|
1271 |
+
1.6968
|
1272 |
+
0.8818
|
1273 |
+
-1.0488
|
1274 |
+
2.3775
|
1275 |
+
0.7031
|
1276 |
+
-1.8278
|
1277 |
+
1.6345
|
1278 |
+
0.5067
|
1279 |
+
-0.6340
|
1280 |
+
2.1028
|
1281 |
+
0.6779
|
1282 |
+
-0.9154
|
1283 |
+
2.0997
|
1284 |
+
0.7203
|
1285 |
+
-1.2531
|
1286 |
+
1.9408
|
1287 |
+
1.1174
|
1288 |
+
-0.2121
|
1289 |
+
2.3064
|
1290 |
+
1.8490
|
1291 |
+
1.2318
|
1292 |
+
2.5459
|
1293 |
+
2.1576
|
1294 |
+
1.7381
|
1295 |
+
Table 11. Sharpe ratio boundaries via Distorted GPR at 16 representative points.
|
1296 |
+
Upper
|
1297 |
+
Boundary
|
1298 |
+
Observation
|
1299 |
+
Lower
|
1300 |
+
Boundary
|
1301 |
+
Upper
|
1302 |
+
Boundary
|
1303 |
+
Observation
|
1304 |
+
Lower
|
1305 |
+
Boundary
|
1306 |
+
0.0570
|
1307 |
+
0.0036
|
1308 |
+
-0.0000
|
1309 |
+
0.0457
|
1310 |
+
-0.0000
|
1311 |
+
0.0000
|
1312 |
+
0.0667
|
1313 |
+
0.0188
|
1314 |
+
0.0000
|
1315 |
+
0.0750
|
1316 |
+
0.0283
|
1317 |
+
-0.0000
|
1318 |
+
0.0497
|
1319 |
+
-0.0000
|
1320 |
+
0.0000
|
1321 |
+
0.0578
|
1322 |
+
0.0065
|
1323 |
+
0.0000
|
1324 |
+
0.1132
|
1325 |
+
0.0637
|
1326 |
+
0.0123
|
1327 |
+
0.0877
|
1328 |
+
0.0394
|
1329 |
+
0.0000
|
1330 |
+
0.0949
|
1331 |
+
0.0378
|
1332 |
+
0.0000
|
1333 |
+
0.0809
|
1334 |
+
0.0306
|
1335 |
+
0.0000
|
1336 |
+
0.1027
|
1337 |
+
0.0249
|
1338 |
+
-0.0000
|
1339 |
+
0.1002
|
1340 |
+
0.0309
|
1341 |
+
0.0000
|
1342 |
+
0.0831
|
1343 |
+
0.0303
|
1344 |
+
0.0000
|
1345 |
+
0.0957
|
1346 |
+
0.0448
|
1347 |
+
-0.0000
|
1348 |
+
0.1207
|
1349 |
+
0.0740
|
1350 |
+
0.0210
|
1351 |
+
0.1367
|
1352 |
+
0.0858
|
1353 |
+
0.0376
|
1354 |
+
Table 12. Acceptability index boundaries via Quantile Regression at 16 representative
|
1355 |
+
points.
|
1356 |
+
Upper
|
1357 |
+
Boundary
|
1358 |
+
Observation
|
1359 |
+
Lower
|
1360 |
+
Boundary
|
1361 |
+
Upper
|
1362 |
+
Boundary
|
1363 |
+
Observation
|
1364 |
+
Lower
|
1365 |
+
Boundary
|
1366 |
+
0.1513
|
1367 |
+
-0.0039
|
1368 |
+
-0.0030
|
1369 |
+
0.0646
|
1370 |
+
-0.0097
|
1371 |
+
-0.0087
|
1372 |
+
0.0506
|
1373 |
+
0.0308
|
1374 |
+
-0.0109
|
1375 |
+
0.0824
|
1376 |
+
0.0413
|
1377 |
+
-0.0222
|
1378 |
+
-0.0150
|
1379 |
+
-0.0083
|
1380 |
+
-0.0017
|
1381 |
+
0.0174
|
1382 |
+
-0.0153
|
1383 |
+
-0.0008
|
1384 |
+
0.1171
|
1385 |
+
0.0588
|
1386 |
+
-0.0057
|
1387 |
+
0.1004
|
1388 |
+
0.0338
|
1389 |
+
-0.0338
|
1390 |
+
0.1010
|
1391 |
+
0.0487
|
1392 |
+
-0.0322
|
1393 |
+
0.0793
|
1394 |
+
0.0440
|
1395 |
+
-0.0255
|
1396 |
+
0.0454
|
1397 |
+
0.0188
|
1398 |
+
0.0006
|
1399 |
+
0.0870
|
1400 |
+
0.0248
|
1401 |
+
-0.0203
|
1402 |
+
0.0904
|
1403 |
+
0.0455
|
1404 |
+
-0.0261
|
1405 |
+
0.1089
|
1406 |
+
0.0403
|
1407 |
+
-0.0346
|
1408 |
+
0.1120
|
1409 |
+
0.0674
|
1410 |
+
0.0092
|
1411 |
+
0.1017
|
1412 |
+
0.0781
|
1413 |
+
0.0341
|
1414 |
+
Table 13. Acceptability index boundaries via Quantile GPR at 16 representative points.
|
1415 |
+
|
1416 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
1417 |
+
13
|
1418 |
+
Upper
|
1419 |
+
Boundary
|
1420 |
+
Observation
|
1421 |
+
Lower
|
1422 |
+
Boundary
|
1423 |
+
Upper
|
1424 |
+
Boundary
|
1425 |
+
Observation
|
1426 |
+
Lower
|
1427 |
+
Boundary
|
1428 |
+
0.0544
|
1429 |
+
0.0036
|
1430 |
+
-0.0000
|
1431 |
+
0.0408
|
1432 |
+
0.0000
|
1433 |
+
0.0000
|
1434 |
+
0.0504
|
1435 |
+
0.0189
|
1436 |
+
-0.0000
|
1437 |
+
0.0525
|
1438 |
+
0.0288
|
1439 |
+
-0.0000
|
1440 |
+
0.0413
|
1441 |
+
0.0000
|
1442 |
+
-0.0000
|
1443 |
+
0.0456
|
1444 |
+
0.0065
|
1445 |
+
0.0000
|
1446 |
+
0.0801
|
1447 |
+
0.0637
|
1448 |
+
0.0365
|
1449 |
+
0.0586
|
1450 |
+
0.0395
|
1451 |
+
0.0135
|
1452 |
+
0.0804
|
1453 |
+
0.0378
|
1454 |
+
0.0130
|
1455 |
+
0.0650
|
1456 |
+
0.0306
|
1457 |
+
-0.0000
|
1458 |
+
0.1017
|
1459 |
+
0.0249
|
1460 |
+
0.0013
|
1461 |
+
0.0920
|
1462 |
+
0.0308
|
1463 |
+
0.0070
|
1464 |
+
0.0641
|
1465 |
+
0.0305
|
1466 |
+
0.0024
|
1467 |
+
0.0702
|
1468 |
+
0.0451
|
1469 |
+
0.0166
|
1470 |
+
0.0813
|
1471 |
+
0.0734
|
1472 |
+
0.0493
|
1473 |
+
0.0877
|
1474 |
+
0.0856
|
1475 |
+
0.0695
|
1476 |
+
Table 14. Acceptability index boundaries via Distorted LS, at 16 representative points.
|
1477 |
+
Upper
|
1478 |
+
Boundary
|
1479 |
+
Observation
|
1480 |
+
Lower
|
1481 |
+
Boundary
|
1482 |
+
Upper
|
1483 |
+
Boundary
|
1484 |
+
Observation
|
1485 |
+
Lower
|
1486 |
+
Boundary
|
1487 |
+
0.0490
|
1488 |
+
-0.0058
|
1489 |
+
-0.0036
|
1490 |
+
0.0369
|
1491 |
+
-0.0256
|
1492 |
+
-0.0099
|
1493 |
+
0.0995
|
1494 |
+
0.0866
|
1495 |
+
-0.0107
|
1496 |
+
0.0741
|
1497 |
+
0.0427
|
1498 |
+
-0.0222
|
1499 |
+
0.1140
|
1500 |
+
-0.0838
|
1501 |
+
-0.0102
|
1502 |
+
0.1328
|
1503 |
+
-0.1211
|
1504 |
+
-0.0027
|
1505 |
+
0.0796
|
1506 |
+
0.0588
|
1507 |
+
0.0290
|
1508 |
+
0.0650
|
1509 |
+
0.0337
|
1510 |
+
-0.0053
|
1511 |
+
0.0616
|
1512 |
+
0.0382
|
1513 |
+
-0.0322
|
1514 |
+
0.0861
|
1515 |
+
0.0662
|
1516 |
+
-0.0255
|
1517 |
+
0.0593
|
1518 |
+
0.0235
|
1519 |
+
-0.0188
|
1520 |
+
0.0765
|
1521 |
+
0.0335
|
1522 |
+
-0.0248
|
1523 |
+
0.0757
|
1524 |
+
0.0454
|
1525 |
+
-0.0262
|
1526 |
+
0.0701
|
1527 |
+
0.0403
|
1528 |
+
-0.0083
|
1529 |
+
0.0835
|
1530 |
+
0.0670
|
1531 |
+
0.0423
|
1532 |
+
0.0922
|
1533 |
+
0.0777
|
1534 |
+
0.0614
|
1535 |
+
Table 15. Acceptability index boundaries via Distorted GPR, at 16 representative points.
|
1536 |
+
PCA
|
1537 |
+
cumulative weight (in %)
|
1538 |
+
Diffusion Map
|
1539 |
+
cumulative weight (in %)
|
1540 |
+
λ1
|
1541 |
+
2.7529
|
1542 |
+
68.82
|
1543 |
+
0.0113
|
1544 |
+
70.27
|
1545 |
+
λ2
|
1546 |
+
1.1778
|
1547 |
+
98.27
|
1548 |
+
0.0045
|
1549 |
+
98.58
|
1550 |
+
λ3
|
1551 |
+
0.0685
|
1552 |
+
99.98
|
1553 |
+
0.0002
|
1554 |
+
99.64
|
1555 |
+
λ4
|
1556 |
+
0.0009
|
1557 |
+
100.0
|
1558 |
+
0.0001
|
1559 |
+
100.0
|
1560 |
+
Table 16. Eigenvalues’s weights for PCA and diffusion map on the quantized dataset.
|
1561 |
+
4. A Simple Modification of a Lucas Tree Economy
|
1562 |
+
To formally link the risk-seeking behaviors observed above with those of prospects theory consider
|
1563 |
+
the following modification of a Lucas tree economy (Lucas (1978)). There are two periods, and each
|
1564 |
+
agent is endowed with a single risky asset with payoff Si at the end of period i, i = 0, 1. Assume
|
1565 |
+
S1 = S0eG−L, where G and L are independent gamma distributed random variables. Suppose there
|
1566 |
+
is a risk-free asset in zero net supply with risk-free rate rf, and that agents decide how mucht to
|
1567 |
+
borrow/lend at time 0. Denoting such amount by ℓ, consumption Ci at period i, i = 0, 1, is
|
1568 |
+
C0 = S0 + ℓ, C1 = S0eG−L − ℓerf .
|
1569 |
+
Finally, setting X = G−L and s0 = log(S0), suppose that, for some 0 < ρ, β < 1, agents preferences
|
1570 |
+
are described by
|
1571 |
+
U(C0, C1) = (log(C0))1−ρ
|
1572 |
+
1 − ρ
|
1573 |
+
+ e−βE
|
1574 |
+
�(log(C1))1−ρ
|
1575 |
+
1 − ρ
|
1576 |
+
11{s0+X≥0} − (− log(C1))1−ρ
|
1577 |
+
1 − ρ
|
1578 |
+
11{s0+X≤0}
|
1579 |
+
�
|
1580 |
+
.
|
1581 |
+
(4.1)
|
1582 |
+
This is a slight modification of the specification introduced in Kahneman & Tverski (1992) to pro-
|
1583 |
+
vide a working framework that includes prospects theory experimental observations. In particular,
|
1584 |
+
the investor is risk averse if and only if the log-return G − L is above the threshold s0, and this is
|
1585 |
+
a behavior that cannot be captured by preferences over terminal wealth.
|
1586 |
+
|
1587 |
+
14
|
1588 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
1589 |
+
0
|
1590 |
+
0.005
|
1591 |
+
0.01
|
1592 |
+
0.015
|
1593 |
+
0.02
|
1594 |
+
0.025
|
1595 |
+
0.03
|
1596 |
+
0.035
|
1597 |
+
3
|
1598 |
+
4
|
1599 |
+
5
|
1600 |
+
6
|
1601 |
+
7
|
1602 |
+
8
|
1603 |
+
9
|
1604 |
+
10
|
1605 |
+
10-3
|
1606 |
+
(a)
|
1607 |
+
0
|
1608 |
+
0.01
|
1609 |
+
0.02
|
1610 |
+
0.03
|
1611 |
+
0.04
|
1612 |
+
0.05
|
1613 |
+
0.06
|
1614 |
+
0.07
|
1615 |
+
-0.06
|
1616 |
+
-0.04
|
1617 |
+
-0.02
|
1618 |
+
0
|
1619 |
+
0.02
|
1620 |
+
0.04
|
1621 |
+
0.06
|
1622 |
+
0.08
|
1623 |
+
(b)
|
1624 |
+
Figure 1. Equilibrium rate as a function of σp (a) and of µp (b).
|
1625 |
+
0
|
1626 |
+
0.02
|
1627 |
+
0.04
|
1628 |
+
0.06
|
1629 |
+
0.08
|
1630 |
+
0.1
|
1631 |
+
0.12
|
1632 |
+
0.14
|
1633 |
+
0.16
|
1634 |
+
0.18
|
1635 |
+
0
|
1636 |
+
0.05
|
1637 |
+
0.1
|
1638 |
+
0.15
|
1639 |
+
0.2
|
1640 |
+
0.25
|
1641 |
+
(a)
|
1642 |
+
0
|
1643 |
+
0.01
|
1644 |
+
0.02
|
1645 |
+
0.03
|
1646 |
+
0.04
|
1647 |
+
0.05
|
1648 |
+
0.06
|
1649 |
+
0.07
|
1650 |
+
-0.08
|
1651 |
+
-0.06
|
1652 |
+
-0.04
|
1653 |
+
-0.02
|
1654 |
+
0
|
1655 |
+
0.02
|
1656 |
+
0.04
|
1657 |
+
0.06
|
1658 |
+
0.08
|
1659 |
+
(b)
|
1660 |
+
Figure 2. Equilibrium rate as a function of σn (a) and of µn (b).
|
1661 |
+
In equilibrium, ℓ = 0, and so
|
1662 |
+
s−ρ
|
1663 |
+
0
|
1664 |
+
− erf e−β �
|
1665 |
+
E[(s0 + X)−ρe−X11{s0+X≥0}] − E[(−s0 − X))−ρe−X11{s0+X≤0}]
|
1666 |
+
�
|
1667 |
+
= 0,
|
1668 |
+
and so the equilibrium interest rate re
|
1669 |
+
f satisfies
|
1670 |
+
re
|
1671 |
+
f = β − ρ log(s0) − log
|
1672 |
+
�
|
1673 |
+
E[(s0 + X)−ρe−X11{s0+X≥0}] − E[(−s0 − X))−ρe−X11{s0+X≤0}]
|
1674 |
+
�
|
1675 |
+
.
|
1676 |
+
(4.2)
|
1677 |
+
For a risk averse individual, higher risks correspond to lower equilibrium risk free rate, as lending
|
1678 |
+
becomes more attractive. Therefore, if the sign of ∂re
|
1679 |
+
f/∂σn is negative, and that of ∂re
|
1680 |
+
f/∂σp and
|
1681 |
+
∂re
|
1682 |
+
f/∂µn are positive, the simple setting here described provides an explanation of our empirical
|
1683 |
+
findings. In general, it is possible to find values of (µp, σp, µn, σn) and of ρ such that this is indeed
|
1684 |
+
the case. For instance, setting (µp, σp, µn, σn) = (0.03, 0.01, 0.03, 0.01), which are the average values
|
1685 |
+
observed in the dataset above described, and setting ρ = 0.1 and β = 0.01, the value of re
|
1686 |
+
f computed
|
1687 |
+
via Montecarlo simulation as any of the variables (µp, σp, µn, σn) changes is shown in figures 1 and
|
1688 |
+
2. As σp and/or σn increases the Montecarlo inegration estimate becomes less accurate as the
|
1689 |
+
variance of X is higher, but the patterns in figures 1 and 2 confirm the behaviors above observed.
|
1690 |
+
|
1691 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
1692 |
+
15
|
1693 |
+
5. The Risks-Neutral Acceptance Set
|
1694 |
+
In this section we analyze the “risk-neutral” acceptance set of quadruples (bp, cp, bn, cn) of BG
|
1695 |
+
parameters estimated to option prices. The results reported are interesting on their own, but also
|
1696 |
+
test the methodology employed to analyze the acceptance set of statistical parameters.
|
1697 |
+
To better fit option prices, risk neutral log returns are modeled as ωt + Xt, where Xt is a BG
|
1698 |
+
process, ω := r + log ((1 − bp)cp(1 + bn)cn) and r is the risk free rate. We calibrated the 10 sector
|
1699 |
+
ETFs to the mid prices of options for four different maturities6, and obtained a risk neutral dataset
|
1700 |
+
of 4812 observations. Figure 3 shows pairs (bp, cp) and (bn, cn) excluding 1% of outliers. Boundaries
|
1701 |
+
for bp and bn in terms of (cp, bn, cn) and (cp, bn, cn) are estimated via quantile7 and distorted GPR.
|
1702 |
+
8 Estimates are visualized in figure 4 and reported in table 17 and 18.
|
1703 |
+
We observe that both quantile and distorted regression tend to break down in estimating the
|
1704 |
+
boundaries of bp for large values of cp, mostly because this parameter ranges between 0 and 105,
|
1705 |
+
with approximately 60% of the observations concentrated in the range [0, 30] and the remaining
|
1706 |
+
ones being sparse (compare figure 3.A and 4.A) and corresponding to relatively small variations
|
1707 |
+
in (bp, cn, bn). To avoid this issue, which - it is worth noting - does not occur when estimating
|
1708 |
+
boundaries of bn (note that the range of observations for cn is [0, 50]), the regression algorithms for
|
1709 |
+
the boundaries of bp are only based on observations corresponding to cp < 30.
|
1710 |
+
Upper
|
1711 |
+
Boundary
|
1712 |
+
Observation
|
1713 |
+
Lower
|
1714 |
+
Boundary
|
1715 |
+
Upper
|
1716 |
+
Boundary
|
1717 |
+
Observation
|
1718 |
+
Lower
|
1719 |
+
Boundary
|
1720 |
+
0.0603
|
1721 |
+
0.0451
|
1722 |
+
0.0363
|
1723 |
+
0.0304
|
1724 |
+
0.0220
|
1725 |
+
0.0136
|
1726 |
+
0.0684
|
1727 |
+
0.0557
|
1728 |
+
0.0370
|
1729 |
+
0.0327
|
1730 |
+
0.0265
|
1731 |
+
0.0155
|
1732 |
+
0.0466
|
1733 |
+
0.0382
|
1734 |
+
0.0285
|
1735 |
+
0.0307
|
1736 |
+
0.0216
|
1737 |
+
0.0165
|
1738 |
+
0.0385
|
1739 |
+
0.0320
|
1740 |
+
0.0248
|
1741 |
+
0.0317
|
1742 |
+
0.0215
|
1743 |
+
0.0205
|
1744 |
+
0.0362
|
1745 |
+
0.0296
|
1746 |
+
0.0196
|
1747 |
+
0.0393
|
1748 |
+
0.0313
|
1749 |
+
0.0244
|
1750 |
+
0.0317
|
1751 |
+
0.0243
|
1752 |
+
0.0189
|
1753 |
+
0.0282
|
1754 |
+
0.0202
|
1755 |
+
0.0145
|
1756 |
+
0.0356
|
1757 |
+
0.0276
|
1758 |
+
0.0229
|
1759 |
+
0.0263
|
1760 |
+
0.0192
|
1761 |
+
0.0125
|
1762 |
+
0.0329
|
1763 |
+
0.0248
|
1764 |
+
0.0180
|
1765 |
+
0.0291
|
1766 |
+
0.0197
|
1767 |
+
0.0152
|
1768 |
+
Table 17. Boundaries for bp via quantile GPR at 16 representative points (with cp < 30).
|
1769 |
+
Upper
|
1770 |
+
Boundary
|
1771 |
+
Observation
|
1772 |
+
Lower
|
1773 |
+
Boundary
|
1774 |
+
Upper
|
1775 |
+
Boundary
|
1776 |
+
Observation
|
1777 |
+
Lower
|
1778 |
+
Boundary
|
1779 |
+
0.0728
|
1780 |
+
0.0593
|
1781 |
+
0.0430
|
1782 |
+
0.2394
|
1783 |
+
0.1862
|
1784 |
+
0.1266
|
1785 |
+
0.0541
|
1786 |
+
0.0346
|
1787 |
+
0.0261
|
1788 |
+
0.2422
|
1789 |
+
0.1885
|
1790 |
+
0.1284
|
1791 |
+
0.2576
|
1792 |
+
0.1992
|
1793 |
+
0.1347
|
1794 |
+
0.2378
|
1795 |
+
0.1852
|
1796 |
+
0.1268
|
1797 |
+
0.2392
|
1798 |
+
0.1857
|
1799 |
+
0.1261
|
1800 |
+
0.2198
|
1801 |
+
0.1701
|
1802 |
+
0.1193
|
1803 |
+
0.2597
|
1804 |
+
0.2012
|
1805 |
+
0.1356
|
1806 |
+
0.2175
|
1807 |
+
0.1674
|
1808 |
+
0.1194
|
1809 |
+
0.2452
|
1810 |
+
0.1906
|
1811 |
+
0.1291
|
1812 |
+
0.2259
|
1813 |
+
0.1756
|
1814 |
+
0.1215
|
1815 |
+
0.2703
|
1816 |
+
0.2089
|
1817 |
+
0.1406
|
1818 |
+
0.2113
|
1819 |
+
0.1679
|
1820 |
+
0.1214
|
1821 |
+
0.2638
|
1822 |
+
0.2041
|
1823 |
+
0.1374
|
1824 |
+
0.2302
|
1825 |
+
0.1764
|
1826 |
+
0.1280
|
1827 |
+
Table 18. Boundaries for bn via quantile GPR at 16 representative points.
|
1828 |
+
6Of all the traded maturities, the middle four were considered. Tickers considered are SPY, XLB, XLE, XLF,
|
1829 |
+
XLI, XLK, XLP, XLU, XLV, XLY. Calibration was performed every 10 days between 1/01/2015 through 31/12/2020.
|
1830 |
+
7For quantile GPR, the optimization was performed employing a quasi-Newton method, with the quantile loss
|
1831 |
+
function approximated by S(x) = τx + α log(1 − e−x/α) as in Zheng (2011), with α = 10−4.
|
1832 |
+
8In both cases, the hyperparameters of the kernel matrix K are estimated using the standard MSE loss function,
|
1833 |
+
while α ∈ Rn and β ∈ R are computed so that β + Kα minimizes the quantile loss function.
|
1834 |
+
|
1835 |
+
16
|
1836 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
1837 |
+
0
|
1838 |
+
0.5
|
1839 |
+
1
|
1840 |
+
1.5
|
1841 |
+
2
|
1842 |
+
2.5
|
1843 |
+
3
|
1844 |
+
3.5
|
1845 |
+
4
|
1846 |
+
105
|
1847 |
+
0
|
1848 |
+
0.02
|
1849 |
+
0.04
|
1850 |
+
0.06
|
1851 |
+
0.08
|
1852 |
+
0.1
|
1853 |
+
0.12
|
1854 |
+
0.14
|
1855 |
+
(a)
|
1856 |
+
0
|
1857 |
+
10
|
1858 |
+
20
|
1859 |
+
30
|
1860 |
+
40
|
1861 |
+
50
|
1862 |
+
60
|
1863 |
+
0
|
1864 |
+
0.05
|
1865 |
+
0.1
|
1866 |
+
0.15
|
1867 |
+
0.2
|
1868 |
+
0.25
|
1869 |
+
0.3
|
1870 |
+
0.35
|
1871 |
+
0.4
|
1872 |
+
0.45
|
1873 |
+
0.5
|
1874 |
+
(b)
|
1875 |
+
Figure 3. Scatter plot of observed pairs (bp, cp) and (bn, cn) of risk neutral parameters.
|
1876 |
+
0
|
1877 |
+
5
|
1878 |
+
10
|
1879 |
+
15
|
1880 |
+
20
|
1881 |
+
25
|
1882 |
+
30
|
1883 |
+
0
|
1884 |
+
0.02
|
1885 |
+
0.04
|
1886 |
+
0.06
|
1887 |
+
0.08
|
1888 |
+
0.1
|
1889 |
+
0.12
|
1890 |
+
0.14
|
1891 |
+
(a)
|
1892 |
+
0
|
1893 |
+
5
|
1894 |
+
10
|
1895 |
+
15
|
1896 |
+
20
|
1897 |
+
25
|
1898 |
+
30
|
1899 |
+
0
|
1900 |
+
0.05
|
1901 |
+
0.1
|
1902 |
+
0.15
|
1903 |
+
0.2
|
1904 |
+
0.25
|
1905 |
+
0.3
|
1906 |
+
0.35
|
1907 |
+
0.4
|
1908 |
+
0.45
|
1909 |
+
0.5
|
1910 |
+
(b)
|
1911 |
+
Figure 4. Boundaries around randomly selected point (in red) via quantile GPR with
|
1912 |
+
(τ = 0.05).
|
1913 |
+
0
|
1914 |
+
5
|
1915 |
+
10
|
1916 |
+
15
|
1917 |
+
20
|
1918 |
+
25
|
1919 |
+
30
|
1920 |
+
35
|
1921 |
+
0
|
1922 |
+
0.02
|
1923 |
+
0.04
|
1924 |
+
0.06
|
1925 |
+
0.08
|
1926 |
+
0.1
|
1927 |
+
0.12
|
1928 |
+
0.14
|
1929 |
+
(a)
|
1930 |
+
0
|
1931 |
+
5
|
1932 |
+
10
|
1933 |
+
15
|
1934 |
+
20
|
1935 |
+
25
|
1936 |
+
30
|
1937 |
+
0
|
1938 |
+
0.05
|
1939 |
+
0.1
|
1940 |
+
0.15
|
1941 |
+
0.2
|
1942 |
+
0.25
|
1943 |
+
0.3
|
1944 |
+
0.35
|
1945 |
+
0.4
|
1946 |
+
0.45
|
1947 |
+
0.5
|
1948 |
+
(b)
|
1949 |
+
Figure 5. Boundaries around randomly selected point (in red) via distorted GPR (γ =
|
1950 |
+
0.75).
|
1951 |
+
|
1952 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
1953 |
+
17
|
1954 |
+
5.1. Speed Uncertainty. As mentioned, scale and shape parameters represent, respectively, limit
|
1955 |
+
and market orders. Typically, professional traders place limit orders based on stable patterns and
|
1956 |
+
strategies, and so the scale parameters arguably represent the phase of the economic cycle, and so
|
1957 |
+
the speed parameters can be thought of as noisy responses to it.9 This would be, however, outside
|
1958 |
+
of the theory of risk measures, as changing measure does not change speed parameters. Thus,
|
1959 |
+
theoretical boundaries similar to those derived in the next section would require a notion of “speed
|
1960 |
+
uncertainty”, similar to that of volatility uncertainty of G-Brownian motion (Peng (2006)). Such
|
1961 |
+
notion can be implemented via nonlinear Levy processes (Neufeld & Nutz (2017)), according to
|
1962 |
+
which, e.g., the ask price of a claim C = f(XT ), where X is a bilateral gamma process, is the
|
1963 |
+
unique viscosity solutions of
|
1964 |
+
�
|
1965 |
+
ru(t, x) + supcp,cn∈Θ
|
1966 |
+
��
|
1967 |
+
R\{0}[u(t, x + y) − u(t, x)]k(y)dy
|
1968 |
+
�
|
1969 |
+
= ut(t, x),
|
1970 |
+
u(0, x) = f(x)
|
1971 |
+
where Θ ⊂ R2 is compact. There is however a large literature on the magnitude of the spread
|
1972 |
+
between upper and lower valuations based on spectral risk measure, and since our empirical analysis
|
1973 |
+
in the next sections is based on it, this approach was not further investigated.
|
1974 |
+
5.2. An Equation for the Boundaries of Acceptable Risk Neutral Parameters. As men-
|
1975 |
+
tioned in the introduction, the boundaries found for the risk neutral parameters are naturally linked
|
1976 |
+
to acceptance sets implied by risk measures. In particular, given a fixed probability space (Ω, F, P)
|
1977 |
+
and an asset’s bid and ask price processes {Bt}t≥0 and {At}t≥0, a version of the first fundamental
|
1978 |
+
theorem of asset pricing with transaction costs asserts the existence of a probability measure Q and
|
1979 |
+
a processes {St}t≥0 such that Q is equivalent to P, Bt ≤ St ≤ At for every t ≥ 0 and {e−rtSt}t≥0 is
|
1980 |
+
a martingale under Q.10 Note that the measure Q is, approximately, a risk neutral measure in the
|
1981 |
+
sense that the process St approximates the price at which one can buy and sell the asset. One can
|
1982 |
+
then assume that the asset’s bid and ask prices be given by
|
1983 |
+
B0 = inf
|
1984 |
+
Q∈M EQ[S0e−r+ω+X1], A0 = sup
|
1985 |
+
Q∈M
|
1986 |
+
EQ[S0e−r+ω+X1].
|
1987 |
+
where M is a collection of probability measures that are equivalent to the statistical measure P.
|
1988 |
+
Such collection is a financial primitive of the economy that, as anticipated in the introduction,
|
1989 |
+
depends on regulator’s requirements for financial stability as well as trading, costs and incentives of
|
1990 |
+
market operators, and a risk Z is deemed acceptable if EQ[Z] ≥ 0, ∀Q ∈ M. For our purposes, M
|
1991 |
+
is defined as the set of measures associated to the spectral risk measure that arise from a distortion
|
1992 |
+
Ψ ((one can employ e.g. the MINMAXVAR defined by 3.3). Bid and ask prices are then computed
|
1993 |
+
as integrals of distorted probabilities of tail events (see Madan & Schoutens (2021)), and the higher
|
1994 |
+
their distortion the higher size of the set M and the bid-ask spread.
|
1995 |
+
Next, suppose that for given risk neutral parameters (ˆcp,ˆbn, ˆcn), the corresponding bp lies in the
|
1996 |
+
interval [bp, bp]. It is natural to assume that
|
1997 |
+
{Qbp}bp∈[bp,bp] ⊂ M.
|
1998 |
+
(5.1)
|
1999 |
+
where, for every bp ∈ [bp, bp], Qbp is a measure under which {Xt}t≥0 is a BG process with parameters
|
2000 |
+
(bp, ˆcp,ˆbn, ˆcn). Note that, by proposition 6.1 in Kuchler & Tappe (2008), such a measure exists and
|
2001 |
+
is equivalent to the risk neutral measure Q (and thus also to the statistical measure P). Since
|
2002 |
+
(5.2)
|
2003 |
+
inf
|
2004 |
+
bp∈[bp,bp]
|
2005 |
+
EQbp[e−r+ω+X1] = (1 − ˆbp)ˆcp
|
2006 |
+
(1 − bp)ˆcp ,
|
2007 |
+
sup
|
2008 |
+
bp∈[bp,bp]
|
2009 |
+
EQbp[e−r+ω+X1] = (1 − ˆbp)ˆcp
|
2010 |
+
(1 − bp)ˆcp ,
|
2011 |
+
9Diffusion map showed that more than 95% of the dataset variance is explained by two eigenvectors.
|
2012 |
+
10For the existence of Q and the associated processes {St}t≥0 see Jouini & Kallal (1995) and Schachermeyer (2004).
|
2013 |
+
|
2014 |
+
18
|
2015 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
2016 |
+
where ω = r + log((1 − ˆbp)ˆcp(1 + ˆbn)ˆcn), 5.1 implies
|
2017 |
+
(5.3)
|
2018 |
+
B0
|
2019 |
+
S0
|
2020 |
+
≤ (1 − ˆbp)ˆcp
|
2021 |
+
(1 − bp)ˆcp ≤ (1 − ˆbp)ˆcp
|
2022 |
+
(1 − bp)ˆcp ≤ A0
|
2023 |
+
S0
|
2024 |
+
.
|
2025 |
+
Further pushing 5.1 to be satisfied with an equality, we obtain the following relation for the upper
|
2026 |
+
and lower boundaries bp and bp:
|
2027 |
+
(5.4)
|
2028 |
+
B0
|
2029 |
+
A0
|
2030 |
+
= (1 − bp)ˆcp
|
2031 |
+
(1 − bp)ˆcp
|
2032 |
+
Note that, in 5.4, B0 and A0 are functions of ˆcp,ˆbn, ˆcn. In other words, the parameters ˆcp,ˆbn, ˆcn
|
2033 |
+
are measures of economic activity and thus, together with the structural limits bp, bn, determine
|
2034 |
+
bid and ask prices. Similarly, if ˆcp and ˆcn determine boundaries for bp and bn,
|
2035 |
+
(5.5)
|
2036 |
+
B0(ˆcp, ˆcn)
|
2037 |
+
A0(ˆcp, ˆcn) = (1 − bp)ˆcp
|
2038 |
+
(1 − bp)ˆcp
|
2039 |
+
(1 + bn)ˆcn
|
2040 |
+
(1 + bn)ˆcn .
|
2041 |
+
5.3. Empirical Verifications. Typically, equations 5.4 and/or 5.5 are not satisfied, at least with
|
2042 |
+
respect to daily closing bid-ask ratios. However, since large orders are executed over several days,
|
2043 |
+
one can consider other distorted valuations, such as 5-days high/low prices. In general, one can
|
2044 |
+
compare the size of M required for 5.1 to hold with typically observed acceptability indexes. To
|
2045 |
+
do so, we let νbp denote the BG Levy measure with parameters (bp, ˆcp,ˆbn, ˆcn), and replace 5.1 with
|
2046 |
+
{νbp}bp∈[bp,bp] ⊂ N,
|
2047 |
+
(5.6)
|
2048 |
+
The collection N is such that distorted rewards are defined by
|
2049 |
+
µ = ω −
|
2050 |
+
� ∞
|
2051 |
+
0
|
2052 |
+
G+(ν(ex − 1 < −a))da +
|
2053 |
+
� ∞
|
2054 |
+
0
|
2055 |
+
(G−(ν(ex − 1 > a))da,
|
2056 |
+
µ = ω −
|
2057 |
+
� ∞
|
2058 |
+
0
|
2059 |
+
G−(ν(ex − 1 < −a))da +
|
2060 |
+
� ∞
|
2061 |
+
0
|
2062 |
+
(G+(ν(ex − 1 > a))da
|
2063 |
+
where ν is the Levy measure of X under Q and G+ and G− are (see Eberlein et al. (2013))
|
2064 |
+
G+(x) = x + 1
|
2065 |
+
c(1 − e−cx)1/(1+γ), G−(x) = x − 1
|
2066 |
+
c(1 − e−cx).
|
2067 |
+
Then, as proved in Madan & Schoutens (2021), ˜ν ∈ N if and only if d˜ν
|
2068 |
+
dν satisfies
|
2069 |
+
(5.7)
|
2070 |
+
S(λ) : =
|
2071 |
+
�
|
2072 |
+
R
|
2073 |
+
�d˜ν
|
2074 |
+
dν − λ
|
2075 |
+
�+
|
2076 |
+
dν(x) ≤ Φ(λ), λ > 1,
|
2077 |
+
˜S(λ) : =
|
2078 |
+
�
|
2079 |
+
R
|
2080 |
+
�
|
2081 |
+
λ − d˜ν
|
2082 |
+
dν
|
2083 |
+
�+
|
2084 |
+
dν(x) ≤ −˜Φ(λ), 0 ≤ λ < 1,
|
2085 |
+
where Φ and ˜Φ are Fenchel conjugates of G+ and G− respectively, and are given by
|
2086 |
+
Φ(λ) := 1
|
2087 |
+
c
|
2088 |
+
�
|
2089 |
+
−(1 − λ) log(u(λ)) + (1 − u(λ))1/(1+γ)�
|
2090 |
+
,
|
2091 |
+
−˜Φ(λ) := 1
|
2092 |
+
c[λ + (1 − λ) log(1 − λ)],
|
2093 |
+
with u : (1, ∞) → (0, 1) defined as the unique solution of
|
2094 |
+
u
|
2095 |
+
(1 − u)γ/(1+γ) = (λ − 1)(1 + γ).
|
2096 |
+
|
2097 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
2098 |
+
19
|
2099 |
+
Next, we find requirements on c, γ for 5.6 to hold. Note that, for ˜ν = νbp,
|
2100 |
+
S(λ) =
|
2101 |
+
� ∞
|
2102 |
+
L(λ)
|
2103 |
+
cp
|
2104 |
+
x
|
2105 |
+
�
|
2106 |
+
e−x/bp − λe−x/ˆbp�
|
2107 |
+
dx = cp
|
2108 |
+
�
|
2109 |
+
Ei
|
2110 |
+
�L(λ)
|
2111 |
+
bp
|
2112 |
+
�
|
2113 |
+
− λEi
|
2114 |
+
�
|
2115 |
+
L(λ)
|
2116 |
+
ˆbp
|
2117 |
+
��
|
2118 |
+
and, similarly, for ˜ν = νbp,
|
2119 |
+
˜S(λ) =
|
2120 |
+
� ∞
|
2121 |
+
˜L(λ)
|
2122 |
+
cp
|
2123 |
+
x
|
2124 |
+
�
|
2125 |
+
λe−x/ˆbp − e−x/bp
|
2126 |
+
�
|
2127 |
+
dx = cp
|
2128 |
+
�
|
2129 |
+
λEi
|
2130 |
+
�
|
2131 |
+
L(λ)
|
2132 |
+
ˆbp
|
2133 |
+
�
|
2134 |
+
− Ei
|
2135 |
+
�L(λ)
|
2136 |
+
bp
|
2137 |
+
��
|
2138 |
+
,
|
2139 |
+
where Ei is the exponential integral function and
|
2140 |
+
L(λ) = log(λ)bpˆbp
|
2141 |
+
bp − ˆbp
|
2142 |
+
, ˜L(λ) = −log(λ)ˆbpbp
|
2143 |
+
ˆbp − bp
|
2144 |
+
.
|
2145 |
+
Lemma 5.1. Suppose bp > 0.55ˆbp. Then, νbp ∈ N holds for every bp ∈ [bp,ˆbp] if and only if
|
2146 |
+
c ≤ lim
|
2147 |
+
λ→1−
|
2148 |
+
1
|
2149 |
+
˜S(λ)
|
2150 |
+
(5.8)
|
2151 |
+
Proof. Note that for every 0 < λ < 1
|
2152 |
+
−˜Φ′(λ) − ˜S′(λ) = − log(1 − λ)
|
2153 |
+
c
|
2154 |
+
− cp
|
2155 |
+
�
|
2156 |
+
Ei
|
2157 |
+
�
|
2158 |
+
L(λ)
|
2159 |
+
ˆbp
|
2160 |
+
�
|
2161 |
+
− λe−L(λ)/ˆbp L′(λ)
|
2162 |
+
L(λ) + e−L(λ)/bp L′(λ)
|
2163 |
+
L(λ)
|
2164 |
+
�
|
2165 |
+
= − log(1 − λ)
|
2166 |
+
c
|
2167 |
+
− cpEi
|
2168 |
+
�
|
2169 |
+
L(λ)
|
2170 |
+
ˆbp
|
2171 |
+
�
|
2172 |
+
,
|
2173 |
+
so that a stationary point ℓ of −˜Φ − ˜S must satisfy ccp = − log(1 − ℓ)/Ei
|
2174 |
+
�
|
2175 |
+
L(ℓ)
|
2176 |
+
ˆbp
|
2177 |
+
�
|
2178 |
+
. Since
|
2179 |
+
d
|
2180 |
+
dλ
|
2181 |
+
− log(1 − λ)
|
2182 |
+
Ei
|
2183 |
+
�
|
2184 |
+
L(λ)
|
2185 |
+
ˆbp
|
2186 |
+
�
|
2187 |
+
=
|
2188 |
+
Ei
|
2189 |
+
�
|
2190 |
+
L(ℓ)
|
2191 |
+
ˆbp
|
2192 |
+
�
|
2193 |
+
1−λ
|
2194 |
+
− e−L(λ)/ˆbp log(1−λ)
|
2195 |
+
λ log(λ)
|
2196 |
+
Ei
|
2197 |
+
�
|
2198 |
+
L(ℓ)
|
2199 |
+
ˆbp
|
2200 |
+
�2
|
2201 |
+
≤ e−L(λ)/ˆbp
|
2202 |
+
log
|
2203 |
+
�
|
2204 |
+
1−
|
2205 |
+
bp
|
2206 |
+
(ˆbp−bp) log(λ)
|
2207 |
+
�
|
2208 |
+
1−λ
|
2209 |
+
− log(1−λ)
|
2210 |
+
λ log(λ)
|
2211 |
+
Ei
|
2212 |
+
�
|
2213 |
+
L(ℓ)
|
2214 |
+
ˆbp
|
2215 |
+
�2
|
2216 |
+
,
|
2217 |
+
the function −˜Φ − ˜S admits at most one stationary point in (0, 1) if
|
2218 |
+
log
|
2219 |
+
�
|
2220 |
+
1 −
|
2221 |
+
bp
|
2222 |
+
(ˆbp−bp) log(λ)
|
2223 |
+
�
|
2224 |
+
1 − λ
|
2225 |
+
− log(1 − λ)
|
2226 |
+
λ log(λ)
|
2227 |
+
< 0, ⇔ log(λ)
|
2228 |
+
�
|
2229 |
+
1 − (1 − λ)
|
2230 |
+
1−λ
|
2231 |
+
λ log(λ)
|
2232 |
+
�
|
2233 |
+
<
|
2234 |
+
bp
|
2235 |
+
(ˆbp − bp)
|
2236 |
+
.
|
2237 |
+
(5.9)
|
2238 |
+
Since, for 0 < λ < 1, log(λ)
|
2239 |
+
�
|
2240 |
+
1 − (1 − λ)
|
2241 |
+
1−λ
|
2242 |
+
λ log(λ)
|
2243 |
+
�
|
2244 |
+
< 1.2, condition 5.9 holds if 0.55ˆbp < bp. Since
|
2245 |
+
lim
|
2246 |
+
λ→0+ −˜Φ(λ) = lim
|
2247 |
+
λ→0+ ˜S(λ) = 0,
|
2248 |
+
lim
|
2249 |
+
λ→0+
|
2250 |
+
−˜Φ(λ)
|
2251 |
+
˜S(λ)
|
2252 |
+
= ∞
|
2253 |
+
lim
|
2254 |
+
λ→1− −˜Φ′(λ) = lim
|
2255 |
+
λ→1− ˜S′(λ) = ∞,
|
2256 |
+
lim
|
2257 |
+
λ→1−
|
2258 |
+
−˜Φ′(λ)
|
2259 |
+
˜S′(λ)
|
2260 |
+
= 0,
|
2261 |
+
|
2262 |
+
20
|
2263 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
2264 |
+
it must be the case that if limλ→1− −˜Φ(λ) ≥ limλ→1− ˜S(λ), which is 5.8, then −˜Φ − ˜S admits
|
2265 |
+
a positive maximum in (0, λ). Therefore, if 0.55ˆbp < bp and 5.8 are satisfied, −˜Φ − ˜S must be
|
2266 |
+
nonnegative on (0, 1), since it would otherwise admit two stationary points.
|
2267 |
+
□
|
2268 |
+
We note that 0.55ˆbp < bp for all the 16 representative points. The next two lemmas identify
|
2269 |
+
necessary and sufficient conditions for the case bp ≥ ˆbp.
|
2270 |
+
Lemma 5.2. Suppose bp ∈ [ˆbp, bp]. Then, it is necessary for νbp ∈ N to hold that
|
2271 |
+
γ > bp − ˆbp
|
2272 |
+
ˆbp
|
2273 |
+
:= ˜γ
|
2274 |
+
(5.10)
|
2275 |
+
c ≤ 1
|
2276 |
+
cp
|
2277 |
+
.
|
2278 |
+
(5.11)
|
2279 |
+
Proof. Note that
|
2280 |
+
lim
|
2281 |
+
λ→∞ Φ(λ) = lim
|
2282 |
+
λ→∞ S(λ) = 0,
|
2283 |
+
so, by l’Hopital’s theorem, Φ(λ) ≥ S(λ) implies
|
2284 |
+
S′′(λ)
|
2285 |
+
Φ′′(λ) = O(1)
|
2286 |
+
as λ → ∞. Furthermore, using the implicit definition of u,
|
2287 |
+
Φ′(λ) = 1
|
2288 |
+
c log(u(λ)), Φ′′(λ) = u′(λ)
|
2289 |
+
cu(λ), S′(λ) = −cpEi
|
2290 |
+
�
|
2291 |
+
L(λ)
|
2292 |
+
ˆbp
|
2293 |
+
�
|
2294 |
+
, S′′(λ) = cp
|
2295 |
+
1
|
2296 |
+
λbp/(bp−ˆbp)+1 log(λ)
|
2297 |
+
,
|
2298 |
+
and, using implicit differentiation,
|
2299 |
+
u′(λ) =
|
2300 |
+
�
|
2301 |
+
u2+1/γ
|
2302 |
+
(1 − u + γ)(1 + γ)1/γ
|
2303 |
+
� �
|
2304 |
+
1
|
2305 |
+
(λ − 1)
|
2306 |
+
�2+1/γ
|
2307 |
+
∼
|
2308 |
+
�
|
2309 |
+
1
|
2310 |
+
(γ)(1 + γ)1/γ
|
2311 |
+
� � 1
|
2312 |
+
λ
|
2313 |
+
�2+1/γ
|
2314 |
+
.
|
2315 |
+
We thus need
|
2316 |
+
2 + 1
|
2317 |
+
γ <
|
2318 |
+
bp
|
2319 |
+
bp − ˆbp
|
2320 |
+
+ 1 ⇒ γ > ˜γ.
|
2321 |
+
For 5.11 simply note that
|
2322 |
+
lim
|
2323 |
+
λ→1+
|
2324 |
+
Φ(λ)
|
2325 |
+
S(λ) = 1
|
2326 |
+
ccp
|
2327 |
+
.
|
2328 |
+
□
|
2329 |
+
Lemma 5.3. There is a function κp : (˜γ, ∞) → (0, ˜c], where
|
2330 |
+
˜c := min
|
2331 |
+
�
|
2332 |
+
lim
|
2333 |
+
λ→1−
|
2334 |
+
1
|
2335 |
+
˜S(λ)
|
2336 |
+
, 1
|
2337 |
+
cp
|
2338 |
+
�
|
2339 |
+
,
|
2340 |
+
such that, for every γ that satisfies 5.10, νbp ∈ N if c < κp(γ) and νbp /∈ N if c > κp(γ).
|
2341 |
+
Proof. Fix γ > ˜γ. As in the previous lemma, and since u does not depend on c, there is ℓ > 1
|
2342 |
+
independent of c such that for every λ > ℓ,
|
2343 |
+
−(1 − λ) log(u(λ)) + (1 − u(λ))1/(1+γ)
|
2344 |
+
Ei
|
2345 |
+
�
|
2346 |
+
L(λ)
|
2347 |
+
bp
|
2348 |
+
�
|
2349 |
+
− λEi
|
2350 |
+
�
|
2351 |
+
L(λ)
|
2352 |
+
ˆbp
|
2353 |
+
�
|
2354 |
+
≥ 1.
|
2355 |
+
Hence, if c < ˜c, Φ(λ) > S(λ) for every λ > ℓ. Since Φ − S is continuous and decreasing in c for
|
2356 |
+
every λ ∈ [1, ℓ], with limc→0 Φ − S = ∞, limc→∞ Φ − S = −S < 0, there is a bounded set of values
|
2357 |
+
|
2358 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
2359 |
+
21
|
2360 |
+
1
|
2361 |
+
2
|
2362 |
+
3
|
2363 |
+
4
|
2364 |
+
5
|
2365 |
+
6
|
2366 |
+
7
|
2367 |
+
8
|
2368 |
+
9
|
2369 |
+
10
|
2370 |
+
0
|
2371 |
+
1
|
2372 |
+
2
|
2373 |
+
3
|
2374 |
+
4
|
2375 |
+
5
|
2376 |
+
6
|
2377 |
+
7
|
2378 |
+
8
|
2379 |
+
9
|
2380 |
+
(a)
|
2381 |
+
Figure 6. The function Φ(λ)/S(λ) for the first of the 16 representative points, with c = ˜c
|
2382 |
+
and assuming γ = ˜γ + 0.005 (blue) and γ = ˜γ (red).
|
2383 |
+
c > 0 such that Φ(λ)−S(λ) ≥ 0 for every λ ∈ [1, ℓ]. Letting c denote the supremum of such values,
|
2384 |
+
one can set κ(γ) = min{c, ˜c}.
|
2385 |
+
□
|
2386 |
+
The function κp typically grows very fast, so that κp(γ) = ˜c for values of γ that are slightly larger
|
2387 |
+
than ˜γ. For instance, figure 6 depicts the function Φ(λ/S(λ) for γ = ˜γ and γ′ = ˜γ + 0.005, and
|
2388 |
+
for c = ˜c and the bilateral gamma parameters set as in the most representative of the quantized
|
2389 |
+
points. In fact, this is the case for each of the 16 quantized points, as shown in table 19.
|
2390 |
+
c
|
2391 |
+
γ
|
2392 |
+
˜γ
|
2393 |
+
c
|
2394 |
+
γ
|
2395 |
+
˜γ
|
2396 |
+
c
|
2397 |
+
γ
|
2398 |
+
˜γ
|
2399 |
+
c
|
2400 |
+
γ
|
2401 |
+
˜γ
|
2402 |
+
0.462
|
2403 |
+
0.357
|
2404 |
+
0.347
|
2405 |
+
0.212
|
2406 |
+
0.259
|
2407 |
+
0.219
|
2408 |
+
0.075
|
2409 |
+
0.400
|
2410 |
+
0.380
|
2411 |
+
0.138
|
2412 |
+
0.288
|
2413 |
+
0.258
|
2414 |
+
0.666
|
2415 |
+
0.263
|
2416 |
+
0.233
|
2417 |
+
0.130
|
2418 |
+
0.336
|
2419 |
+
0.296
|
2420 |
+
0.169
|
2421 |
+
0.256
|
2422 |
+
0.216
|
2423 |
+
0.061
|
2424 |
+
0.397
|
2425 |
+
0.377
|
2426 |
+
0.262
|
2427 |
+
0.252
|
2428 |
+
0.232
|
2429 |
+
0.126
|
2430 |
+
0.327
|
2431 |
+
0.287
|
2432 |
+
0.069
|
2433 |
+
0.484
|
2434 |
+
0.424
|
2435 |
+
0.039
|
2436 |
+
0.387
|
2437 |
+
0.357
|
2438 |
+
0.219
|
2439 |
+
0.209
|
2440 |
+
0.199
|
2441 |
+
0.096
|
2442 |
+
0.358
|
2443 |
+
0.328
|
2444 |
+
0.056
|
2445 |
+
0.529
|
2446 |
+
0.469
|
2447 |
+
0.040
|
2448 |
+
0.527
|
2449 |
+
0.467
|
2450 |
+
Table 19. Triples (˜c, γ, ˜γ) where γ is the minimal value ensuring 5.6 with c = ˜c.
|
2451 |
+
Remark. Recalling that γ is similar to the acceptability index for probability distortions, while 10
|
2452 |
+
c
|
2453 |
+
roughly corresponds to the maximum distorted frequencies (so higher c corresponds to smaller N),
|
2454 |
+
we note that the values reported in 19 have the same magnitude and are consistent in general with
|
2455 |
+
those typically seen in the literature (see for instance Eberlein et al. (2013), Elliot et al. (2022) and
|
2456 |
+
Madan & Schoutens (2021)).
|
2457 |
+
We observe, in particular, that
|
2458 |
+
i. the three most representative points (top left corner of table 19), are consistent with the pair
|
2459 |
+
(0.25, 0.25) used in Madan & Schoutens (2021) to estimate capital requirements (chapter
|
2460 |
+
15.5.2), and that the relatively high values of γ is compensated by high values of c;
|
2461 |
+
ii. for each triple, ˜c is higher, and in the less frequent cases close to, the value 0.01, which, as
|
2462 |
+
shown in Elliot et al. (2022), generates higher returns compared to c = 1 and c = 0.25 for
|
2463 |
+
a portfolio constructed by maximization of the lower valuation.
|
2464 |
+
6. Conclusions
|
2465 |
+
For an asset with (log) returns in the bilateral gamma class, a justification is provided, based on
|
2466 |
+
expected utility theory, that risks from holding the asset can be decomposed into a three dimensional
|
2467 |
+
|
2468 |
+
22
|
2469 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
2470 |
+
vector of expected losses, variance of gains and variance of losses, while compensation for the risks
|
2471 |
+
is given by expected gains. Evidence is then provided that moments of bilateral gamma returns lie
|
2472 |
+
on a manifold with boundaries, and such boundaries are estimated via quantile and distorted linear
|
2473 |
+
and nonlinear regressions. It is observed that they imply a positive relationship between expected
|
2474 |
+
gains and variance of gains/expected losses, but a negative one between compensation and variance
|
2475 |
+
of losses thus implying market’s operators being risk seekers in pure loss prospects. The claim that
|
2476 |
+
such finding are compatible with the experimental evidence that constitute prospects theory is
|
2477 |
+
then justified through a simple modification of Lucas Tree model. The analysis is corroborated
|
2478 |
+
by performing a similar one to the case of risk neutral parameters, assuming a separate drift to
|
2479 |
+
satisfy the martingale condition. An inverse relationship between shape and scale parameters of loss
|
2480 |
+
and gain process is observed and a theoretical boundary for scale parameters, in line with certain
|
2481 |
+
empirical observations, is described based on the theory of Conic finance. Finally, we observed
|
2482 |
+
that our estimates of the boundaries are generally larger than those implied by regulatory capital
|
2483 |
+
requirements.
|
2484 |
+
7. Acknowledgment
|
2485 |
+
This paper is a revised version of the second chapter of the author’s doctoral dissertation, which
|
2486 |
+
was conducted under the supervision of Professor Dilip B. Madan at the Department of Mathematics
|
2487 |
+
of the University of Maryland, College Park.
|
2488 |
+
8. Appendix A: Assets Tickers
|
2489 |
+
The list of tickers of the assets considered in the empirical analyses performed in this research
|
2490 |
+
are reported in table 20 below.
|
2491 |
+
a
|
2492 |
+
aapl
|
2493 |
+
abc
|
2494 |
+
abt
|
2495 |
+
adbe
|
2496 |
+
adm
|
2497 |
+
aep
|
2498 |
+
afl
|
2499 |
+
akam
|
2500 |
+
all
|
2501 |
+
amat
|
2502 |
+
amp
|
2503 |
+
amt
|
2504 |
+
amzn
|
2505 |
+
antm
|
2506 |
+
aon
|
2507 |
+
apa
|
2508 |
+
apd
|
2509 |
+
axp
|
2510 |
+
ba
|
2511 |
+
bac
|
2512 |
+
bax
|
2513 |
+
bby
|
2514 |
+
bdx
|
2515 |
+
ben
|
2516 |
+
biib
|
2517 |
+
bk
|
2518 |
+
bmy
|
2519 |
+
c
|
2520 |
+
cah
|
2521 |
+
cat
|
2522 |
+
ccl
|
2523 |
+
cf
|
2524 |
+
chrw
|
2525 |
+
cl
|
2526 |
+
cma
|
2527 |
+
cmcsa
|
2528 |
+
cmi
|
2529 |
+
cms
|
2530 |
+
cof
|
2531 |
+
cop
|
2532 |
+
cost
|
2533 |
+
crm
|
2534 |
+
csco
|
2535 |
+
ctsh
|
2536 |
+
ctxs
|
2537 |
+
cvs
|
2538 |
+
cvx
|
2539 |
+
d
|
2540 |
+
de
|
2541 |
+
dgx
|
2542 |
+
dhr
|
2543 |
+
dis
|
2544 |
+
dov
|
2545 |
+
duk
|
2546 |
+
ebay
|
2547 |
+
ecl
|
2548 |
+
el
|
2549 |
+
eog
|
2550 |
+
eqt
|
2551 |
+
etn
|
2552 |
+
f
|
2553 |
+
fcx
|
2554 |
+
fdx
|
2555 |
+
fitb
|
2556 |
+
flr
|
2557 |
+
fls
|
2558 |
+
fslr
|
2559 |
+
gd
|
2560 |
+
ge
|
2561 |
+
gild
|
2562 |
+
gis
|
2563 |
+
glw
|
2564 |
+
gs
|
2565 |
+
hal
|
2566 |
+
hd
|
2567 |
+
hes
|
2568 |
+
hog
|
2569 |
+
hon
|
2570 |
+
hp
|
2571 |
+
hpq
|
2572 |
+
hum
|
2573 |
+
ibm
|
2574 |
+
ice
|
2575 |
+
intc
|
2576 |
+
isrg
|
2577 |
+
itw
|
2578 |
+
ivz
|
2579 |
+
jci
|
2580 |
+
jnj
|
2581 |
+
jnpr
|
2582 |
+
jpm
|
2583 |
+
jwn
|
2584 |
+
k
|
2585 |
+
kim
|
2586 |
+
klac
|
2587 |
+
kmb
|
2588 |
+
ko
|
2589 |
+
kr
|
2590 |
+
kss
|
2591 |
+
lmt
|
2592 |
+
lnc
|
2593 |
+
low
|
2594 |
+
m
|
2595 |
+
ma
|
2596 |
+
mcd
|
2597 |
+
mck
|
2598 |
+
mdt
|
2599 |
+
met
|
2600 |
+
mmc
|
2601 |
+
mmm
|
2602 |
+
mo
|
2603 |
+
mrk
|
2604 |
+
mro
|
2605 |
+
ms
|
2606 |
+
msft
|
2607 |
+
mtb
|
2608 |
+
mur
|
2609 |
+
nem
|
2610 |
+
nke
|
2611 |
+
nov
|
2612 |
+
nsc
|
2613 |
+
ntap
|
2614 |
+
nvda
|
2615 |
+
nyt
|
2616 |
+
orcl
|
2617 |
+
oxy
|
2618 |
+
payx
|
2619 |
+
pcar
|
2620 |
+
pfe
|
2621 |
+
pg
|
2622 |
+
ph
|
2623 |
+
pnc
|
2624 |
+
ppg
|
2625 |
+
pru
|
2626 |
+
pxd
|
2627 |
+
rf
|
2628 |
+
rhi
|
2629 |
+
rl
|
2630 |
+
rok
|
2631 |
+
rrc
|
2632 |
+
sbux
|
2633 |
+
schw
|
2634 |
+
slb
|
2635 |
+
so
|
2636 |
+
spg
|
2637 |
+
spx
|
2638 |
+
spy
|
2639 |
+
stt
|
2640 |
+
stz
|
2641 |
+
syk
|
2642 |
+
syy
|
2643 |
+
t
|
2644 |
+
tgt
|
2645 |
+
tjx
|
2646 |
+
tmo
|
2647 |
+
trv
|
2648 |
+
txn
|
2649 |
+
txt
|
2650 |
+
unh
|
2651 |
+
unp
|
2652 |
+
ups
|
2653 |
+
usb
|
2654 |
+
vix
|
2655 |
+
vlo
|
2656 |
+
vno
|
2657 |
+
vz
|
2658 |
+
wfc
|
2659 |
+
whr
|
2660 |
+
wmb
|
2661 |
+
wmt
|
2662 |
+
wy
|
2663 |
+
x
|
2664 |
+
xlb
|
2665 |
+
xle
|
2666 |
+
xlf
|
2667 |
+
xli
|
2668 |
+
xlk
|
2669 |
+
xlp
|
2670 |
+
xlu
|
2671 |
+
xlv
|
2672 |
+
xly
|
2673 |
+
xom
|
2674 |
+
xrx
|
2675 |
+
Table 20
|
2676 |
+
References
|
2677 |
+
Ali, M. 1975. Stochastic Dominance and Portfolio Analysis. Journal of Financial Economics, 2,
|
2678 |
+
205–229.
|
2679 |
+
Arrow, K. 1971. Essay in the Theory of Risk-Bearing. North-Holland.
|
2680 |
+
Artzner, P., Delbaen, F., Eber, J.M., & Heath, D. 1999. Coherent Measures of Risk. Mathematical
|
2681 |
+
Finance, 9(3), 203–228.
|
2682 |
+
|
2683 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
2684 |
+
23
|
2685 |
+
Black, F., & Scholes, M. 1973. The Pricing of Options and Corporate Liabilities. The Journal of
|
2686 |
+
Political Economy, 81(3), 637–654.
|
2687 |
+
Carr, P., Geman, H., Madan, D., & Yor, M. 207. Self-Decomposabilitt and option pricing. Mathe-
|
2688 |
+
matical Finance, 17, 31–57.
|
2689 |
+
Coifman, R., & Lafon, S. 2006. Diffusion maps. Appl. Comput. Harmon. Anal., 21, 5–30.
|
2690 |
+
Cover, T. 1991. Universal Portfolios. Mathematical Finance, 1, 1–29.
|
2691 |
+
Eberlein, E., Madan, D., Pistorius, M., & Yor, M. 2013. A Simple Stochastic Rate Model for Rate
|
2692 |
+
Equity Hybrid Products. Applied Mathematical Finance, 20(5), 461–488.
|
2693 |
+
Elliot, R., Madan, D., & Wang, K. 2022. High Dimensional Markov Trading of a Single Stock.
|
2694 |
+
SSRN Electronic Journal.
|
2695 |
+
Fama, E. 1965. The Behavior of Stock Market Prices. Journal of Business, 38, 34–105.
|
2696 |
+
Follmer, H., & Schied, A. 2002. Convex MEasures of Risk and Trading Constraints. Finance and
|
2697 |
+
Stochastics, 6(4), 429–447.
|
2698 |
+
Friend, I., & Blume, M. 1975. The Demand for Risky Assets. The American Economic Review,
|
2699 |
+
65(2), 900–922.
|
2700 |
+
Jouini, E., & Kallal, H. 1995. Efficient Trading Strategies in the Presence of Market Frictions.
|
2701 |
+
Review of Financial Studies, 14(2), 343–369.
|
2702 |
+
Kahneman, D., & Tverski, A. 1979. Prospect Theory: an analysis of decision under risk. Econo-
|
2703 |
+
metrica, 47, 263–291.
|
2704 |
+
Kahneman, D., & Tverski, A. 1992. Advences in Prospects Theory: Cumulative Representation of
|
2705 |
+
Uncertainty. Journal of Risk and Uncertainty, 5, 297–293.
|
2706 |
+
Kelly, J. 1956.
|
2707 |
+
A New Interpretation of Information Rate.
|
2708 |
+
IRE Transactions on Information
|
2709 |
+
Theory, 2, 185–189.
|
2710 |
+
Kuchler, U., & Tappe, S. 2008. Bilateral Gamma Distributions and Processes in Financial Mathe-
|
2711 |
+
matics. Stochastic Processes and its Applications, 118, 261–283.
|
2712 |
+
Lintner, J. 1965. Security Prices, Risk, and Mximal Gains from Diversification. The Journal of
|
2713 |
+
Finance, 20(4), 587–615.
|
2714 |
+
Lucas, R. 1978. Asset Prices in an Exchange Economy. Econometrica, 46(6), 1429–1445.
|
2715 |
+
Madan, D. 2020a. Bilateral Multiple Gamma Returns: Their Risks and Rewards. International
|
2716 |
+
Journal of Financial Engineering, 7(1), 1–27.
|
2717 |
+
Madan, D. 2020b.
|
2718 |
+
Multivariate Distributions for Financial Returns.
|
2719 |
+
International Journal of
|
2720 |
+
Theoretical and Applied Finance, 23(6).
|
2721 |
+
Madan, D., & Eberlein, E. 2009. Hedge Fund Performance: Sources and Measures. International
|
2722 |
+
Journal of Theoretical and Applied Finance, 12(3), 267–282.
|
2723 |
+
Madan, D., & Schoutens, W. 2021. Measure Distorted Valuation For Financial Decision Making.
|
2724 |
+
preprint.
|
2725 |
+
Madan, D., & Seneta, E. 1990.
|
2726 |
+
The Variance Gamma Model for Share Market Returns.
|
2727 |
+
The
|
2728 |
+
Journal of Business, 63, 511–24.
|
2729 |
+
Markovitz, H. 1952. Portfolio Selection. Journal of Finance, 7(1), 77–91.
|
2730 |
+
Mehra, R., & Prescott, E. 1985. The Equity Premium: a Puzzle. Journal of Monetary Economics,
|
2731 |
+
15, 145–161.
|
2732 |
+
Merton, R.C. 1969. Lifetime portfolio selection under uncertainty: the continuous time model.
|
2733 |
+
Review of Economic Studies, 51, 247–257.
|
2734 |
+
Neufeld, A., & Nutz, M. 2017. Nonlinear Levy Processes and their characteristics. Transwactions
|
2735 |
+
of the American Mathematical Society, 369(1), 69–95.
|
2736 |
+
Peng, S. 2006. G-Expectation, G-Brownian motion and related stochastic calculus of Ito type.
|
2737 |
+
arXiv:math/0601035v2 [math.PR].
|
2738 |
+
Rasmussen, C., & Williams, C. 2006. Gaussian Processes for Machine Learning. MIT Press.
|
2739 |
+
|
2740 |
+
24
|
2741 |
+
ACCEPTABLE BILATERAL GAMMA PARAMETERS
|
2742 |
+
Rothschild, M., & Stiglitz, J. 1970. Increasing Risk: I. A Definition. Journal of Economic Theory,
|
2743 |
+
2, 225–243.
|
2744 |
+
Samuelson, P. 1979. Why We Should Not Make Mean Log of Wealth Bit Though Years to Act are
|
2745 |
+
Long. Journal of Banking and Finance, 3, 305–307.
|
2746 |
+
Schachermeyer, W. 2004. The Fundamental Theorem of Asset Pricing Under Proportional Trans-
|
2747 |
+
action Costs in Finite Discrete Time. Mathematical Finance, 14(1), 19–48.
|
2748 |
+
Sharpe, W. 1964. Capital Asset Prices: a Theory of Market Equilibrium under Conditions of Risk.
|
2749 |
+
The Journal of Finance, 19(3), 425–442.
|
2750 |
+
Tobin, J. 1958. Liquidity Preference as Behavior towards Risk. The Review of Economic Studies,
|
2751 |
+
25, 65–86.
|
2752 |
+
Zheng, S. 2011. Gradient descent algorithms for quantile regression with smooth approximation.
|
2753 |
+
International Journal of Machine Learning and Cybernetics, 191–207.
|
2754 |
+
|
EdE4T4oBgHgl3EQf6g7g/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
F9E0T4oBgHgl3EQfzQJ7/content/2301.02670v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:63c40deec531400874f9f27d20788f76d1015f8134b562df74dbca6be5dc1449
|
3 |
+
size 739963
|
F9E0T4oBgHgl3EQfzQJ7/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2fce90e88c70839abd750d56ed1b580b94bbece7cc436c376f8aabbb22139a6b
|
3 |
+
size 184785
|
GNAyT4oBgHgl3EQf5Pq2/content/tmp_files/2301.00802v1.pdf.txt
ADDED
@@ -0,0 +1,1157 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
G-CEALS: Gaussian Cluster Embedding in Autoencoder
|
2 |
+
Latent Space for Tabular Data Representation
|
3 |
+
Manar D. Samad and Sakib Abrar
|
4 |
+
Department of Computer Science
|
5 |
+
Tennessee State University
|
6 |
+
Nashville, TN, USA
|
7 | |
8 |
+
January 3, 2023
|
9 |
+
ABSTRACT
|
10 |
+
The latent space of autoencoders has been improved for clustering image data by jointly learning a
|
11 |
+
t-distributed embedding with a clustering algorithm inspired by the neighborhood embedding con-
|
12 |
+
cept proposed for data visualization. However, multivariate tabular data pose different challenges
|
13 |
+
in representation learning than image data, where traditional machine learning is often superior to
|
14 |
+
deep tabular data learning. In this paper, we address the challenge of learning tabular data in con-
|
15 |
+
trast to image data and present a novel Gaussian Cluster Embedding in Autoencoder Latent Space
|
16 |
+
(G-CEALS) algorithm by replacing t-distributions with multivariate Gaussian clusters. Unlike cur-
|
17 |
+
rent methods, the proposed method defines the Gaussian embedding and the target cluster distribu-
|
18 |
+
tion independently to accommodate any clustering algorithm in representation learning. A trained
|
19 |
+
G-CEALS model extracts a quality embedding for unseen test data. Based on the embedding clus-
|
20 |
+
tering accuracy, the average rank of the proposed G-CEALS method is 1.4 (0.7), which is superior
|
21 |
+
to all eight baseline clustering and cluster embedding methods on seven tabular data sets. This pa-
|
22 |
+
per shows one of the first algorithms to jointly learn embedding and clustering for improving the
|
23 |
+
representation of multivariate tabular data in downstream clustering.
|
24 |
+
Keywords embedding clustering, tabular data, Gaussian clusters, autoencoder, representation learning, multivariate
|
25 |
+
distribution
|
26 |
+
1
|
27 |
+
Introduction
|
28 |
+
Deep learning has replaced traditional machine learning in many data-intensive research and applications due to its
|
29 |
+
ability to perform concurrent and efficient representation learning and classification. This concurrent learning approach
|
30 |
+
outperforms traditional machine learning that requires handcrafted features to perform supervised classification [1, 2].
|
31 |
+
However, representation learning via supervisory signals from ground truth labels may be prone to overfitting [3] and
|
32 |
+
adversarial attacks [4]. Moreover, human annotations for supervised representation learning and classification may
|
33 |
+
not be available in all data domains or for all data samples. To address these pitfalls, representation learning via
|
34 |
+
unsupervised clustering algorithms may be a strong alternative to supervised learning methods.
|
35 |
+
The limitation of supervised representation learning may be overcome using self-supervision or pseudo labels that do
|
36 |
+
not require human-annotated supervisory signals [5, 6]. In a self-supervised autoencoder, the objective is to preserve
|
37 |
+
all information of input data in a low-dimensional embedding for data reconstruction. However, embeddings for data
|
38 |
+
reconstruction do not emphasize representations essential for downstream classification or clustering tasks. Therefore,
|
39 |
+
unsupervised methods have been proposed for jointly learning embedding with clustering to yield clustering friendly
|
40 |
+
representations [7, 8, 9, 10, 11]. The existing cluster embedding literature suggests several strict assumptions about
|
41 |
+
clustering algorithms (k-means), cluster distributions (t-distribution), and data modality (image data). While deep
|
42 |
+
representation learning of image data is well studied using convolutional neural networks (CNN), deep learning has
|
43 |
+
not seen much success with structured tabular data. There is strong evidence in the literature that traditional machine
|
44 |
+
arXiv:2301.00802v1 [cs.LG] 2 Jan 2023
|
45 |
+
|
46 |
+
A PREPRINT - JANUARY 3, 2023
|
47 |
+
learning still outperforms deep models in learning tabular data [12, 13, 14, 15, 16]. In this paper, we review the
|
48 |
+
assumptions made in the cluster embedding literature and revise those assumptions for the representation learning of
|
49 |
+
tabular data. Accordingly, a novel joint learning framework is proposed considering the architectural and algorithmic
|
50 |
+
differences in learning image and tabular data.
|
51 |
+
The remainder of this manuscript is organized as follows. Section 2 provides a review of the state-of-the-art literature
|
52 |
+
on deep cluster embedding. Section 3 introduces tabular data with some theoretical underpinnings of neighborhood
|
53 |
+
embedding and cluster embedding in support of our proposed representation learning framework. Section 4 outlines
|
54 |
+
the proposed joint cluster embedding framework to obtain a quality representation of tabular data for downstream
|
55 |
+
clustering or classification. Section 5 summarizes the tabular data sets and experiments for evaluating the proposed
|
56 |
+
joint learning framework. Section 6 provides the results following the experiments and compares our proposed method
|
57 |
+
with similar methods in the literature. Section 7 summarizes the findings with additional insights into the results and
|
58 |
+
limitations. The paper concludes in Section 8.
|
59 |
+
2
|
60 |
+
Related work
|
61 |
+
One of the earliest studies on cluster embedding, Deep Embedded Clustering (DEC) [7], is inspired by the seminal
|
62 |
+
work on t-distributed stochastic neighborhood embedding (t-SNE) [17]. The DEC approach first trains a deep autoen-
|
63 |
+
coder by minimizing the data reconstruction loss. The trained encoder part (excluding the decoder) is then fine-tuned
|
64 |
+
by minimizing the Kullback-Leibler (KL) divergence between a t-distributed cluster distribution (Q) on the embed-
|
65 |
+
ding and a target distribution (P). The target distribution is obtained via a closed-form solution by taking the first
|
66 |
+
derivative of the KL divergence loss between P and Q distributions with respect to P and equating it to zero. There-
|
67 |
+
fore, the assumption of t-distribution holds for both Q and P distributions in similar work. The k-means clustering in
|
68 |
+
the DEC approach is later replaced by spectral clustering to improve the quality of embedding in terms of clustering
|
69 |
+
performance [18]. The DEC approach is also enhanced by an improved DEC (IDEC) framework [8]. In IDEC, the
|
70 |
+
autoencoder reconstruction loss and the KL divergence loss are jointly minimized to update the weights of a deep
|
71 |
+
autoencoder and produce the embedding. Similar approaches, including t-distributions, k-means clustering, and KL
|
72 |
+
divergence loss, are adopted in joint embedding and cluster learning (JECL) for multimodal representation learning
|
73 |
+
of text-image data pairs [19]. The Deep Clustering via Joint Convolutional Autoencoder (DEPICT) approach learns
|
74 |
+
image embedding via a de-noising autoencoder [20]. The embedding is mapped to a softmax function to obtain a clus-
|
75 |
+
ter distribution or likelihood (Q) instead of assuming a distribution. Following a series of mathematical derivations
|
76 |
+
and assumptions, their final learning objective includes a cross-entropy loss involving P and Q distributions and an
|
77 |
+
embedding reconstruction loss for each layer of the convolutional autoencoder.
|
78 |
+
A general trend in the cluster embedding literature shows that K-means is the most common clustering method [7, 8,
|
79 |
+
10, 9, 21, 19, 20]. The assumption of t-distributed cluster embedding made in the DEC method [7] continues to appear
|
80 |
+
in the literature [22, 23, 8, 18, 19, 24] without any alternatives. The assumption of t-distribution is originally made in
|
81 |
+
the t-SNE algorithm for data visualization using neighborhood embedding maps [17]. We argue that the assumptions of
|
82 |
+
neighborhood embedding for data visualization are not aligned with the requirements of cluster embedding. Moreover,
|
83 |
+
cluster embedding methods proposed in the literature are invariably evaluated on benchmark image data sets. The
|
84 |
+
methods for image learning may not be optimal or even ready to learn tabular data representations. To the best of our
|
85 |
+
knowledge, similar cluster embedding methods have not been studied on multivariate tabular data.
|
86 |
+
2.1
|
87 |
+
Contributions
|
88 |
+
This paper is one of the first to investigate the performance of joint cluster embedding methods on tabular data. The
|
89 |
+
limitations of state-of-the-art joint cluster embedding methods are addressed to contribute a new cluster embedding
|
90 |
+
algorithm as follows. First, we replace the current assumption of t-distributed embedding with a mixture of mul-
|
91 |
+
tivariate Gaussian distributions for multivariate tabular data by providing a theoretical underpinning for this choice.
|
92 |
+
Second, a new cluster embedding algorithm is proposed using multivariate Gaussian distributions that can jointly learn
|
93 |
+
distributions with any clustering algorithm. Third, we define the target cluster distribution on the tabular data space
|
94 |
+
instead of deriving it from the embedding because traditional machine learning of tabular data is still superior to deep
|
95 |
+
learning and can add complementary benefits to the embedding learned via an autoencoder. Therefore, our embedding
|
96 |
+
and target distributions are independent of each other to flexibly learn any target cluster distribution depending on the
|
97 |
+
application domain.
|
98 |
+
2
|
99 |
+
|
100 |
+
A PREPRINT - JANUARY 3, 2023
|
101 |
+
Factors
|
102 |
+
Image data
|
103 |
+
Tabular data
|
104 |
+
Heterogeneity
|
105 |
+
Homogeneous pixel distribution
|
106 |
+
Heterogeneous or multivariate distribution
|
107 |
+
Spatial Regularity
|
108 |
+
Yes
|
109 |
+
No
|
110 |
+
Sample size
|
111 |
+
Large, >50,000
|
112 |
+
Small, median size ∼ 660
|
113 |
+
Benchmark data set
|
114 |
+
MNIST, CIFAR
|
115 |
+
No standard benchmark
|
116 |
+
Data dimensionality
|
117 |
+
High, >1000
|
118 |
+
Low, median 18
|
119 |
+
Best method
|
120 |
+
Deep CNN
|
121 |
+
Traditional machine learning
|
122 |
+
Deep approaches
|
123 |
+
transfer learning, image augmentation
|
124 |
+
None
|
125 |
+
Table 1: Contrasts between image and tabular data that require significant rework of deep architectures proposed for
|
126 |
+
images in learning tabular data. Median sample size and data dimensionality are obtained from 100 most downloaded
|
127 |
+
tabular data sets from the UCI machine learning repository [25].
|
128 |
+
30
|
129 |
+
20
|
130 |
+
10
|
131 |
+
0
|
132 |
+
10
|
133 |
+
20
|
134 |
+
Projected Space 1
|
135 |
+
20
|
136 |
+
10
|
137 |
+
0
|
138 |
+
10
|
139 |
+
20
|
140 |
+
Projected Space 2
|
141 |
+
CNV
|
142 |
+
DME
|
143 |
+
Drusen
|
144 |
+
Normal
|
145 |
+
(a) t-SNE projected
|
146 |
+
50
|
147 |
+
0
|
148 |
+
50
|
149 |
+
100
|
150 |
+
150
|
151 |
+
Projected Space 1
|
152 |
+
50
|
153 |
+
0
|
154 |
+
50
|
155 |
+
100
|
156 |
+
150
|
157 |
+
Projected Space 2
|
158 |
+
CNV
|
159 |
+
DME
|
160 |
+
Drusen
|
161 |
+
Normal
|
162 |
+
(b) PCA projected
|
163 |
+
Figure 1: Two-dimensional embeddings of high dimensional image features extracted from a deep convolutional neural
|
164 |
+
network obtained from [26].
|
165 |
+
3
|
166 |
+
Theoretical background
|
167 |
+
This section provides preliminaries on tabular data in contrast to image data. We draw multiple contrasts between
|
168 |
+
neighborhood embedding proposed for data visualization and cluster embedding proposed for representation learning
|
169 |
+
to underpin our proposed approach.
|
170 |
+
3.1
|
171 |
+
Preliminaries
|
172 |
+
A tabular data set is represented in a matrix X ∈ ℜn×d with n i.i.d samples in rows. Each sample (Xi) is represented
|
173 |
+
by a d-dimensional feature vector, Xi ∈ ℜd = {x1, x2, . . . , xd}, where i = {1, 2, . . . , n}. Compared to a pixel
|
174 |
+
distribution P(I) of an image I, tabular data contain multivariate distributions P(x1, x2, . . . , xd) of heterogeneous
|
175 |
+
variables in relatively much lower dimensions with limited samples. Table 1 shows contrasts between image and
|
176 |
+
tabular data. One may argue that some high-dimensional sequential data, such as genomics and the MNIST images
|
177 |
+
converted to pixel vectors, can be structured as tabular data. However, these tabular representations still include
|
178 |
+
regularity or homogeneity in patterns that do not pose the unique challenges of heterogeneous tabular data. Therefore,
|
179 |
+
tabular data in business, health records, and many domains fail to take advantage of deep convolutional learning
|
180 |
+
due to the absence of sequential patterns or image-like spatial regularities. The current literature selectively chooses
|
181 |
+
data sets with high dimensionality and large sample sizes to take the full benefits of deep learning. In contrast, the
|
182 |
+
most commonly studied tabular data sets are of low-dimensions and limited samples (Table 1) and are almost never
|
183 |
+
considered in deep representation learning. Therefore, tabular data sets are identified as the last ”unconquered castle”
|
184 |
+
for deep learning [15], where traditional machine learning methods are still competing strongly against advanced
|
185 |
+
neural network architectures [15, 14]. Similar to image learning, there is a need for robust tabular data learning
|
186 |
+
methods to outperform superior traditional machine learning or clustering methods.
|
187 |
+
3.2
|
188 |
+
Neighborhood embedding
|
189 |
+
A neighborhood embedding is a low-dimensional map that preserves the similarity between data points (xi and xj)
|
190 |
+
observed in a higher dimension. Maaten and Hinton propose a Student’s t-distribution to model the similarity between
|
191 |
+
3
|
192 |
+
|
193 |
+
A PREPRINT - JANUARY 3, 2023
|
194 |
+
t-SNE
|
195 |
+
DEC [7]/
|
196 |
+
[17]
|
197 |
+
IDEC [8]
|
198 |
+
Purpose
|
199 |
+
Neighborhood embedding
|
200 |
+
Cluster embedding
|
201 |
+
Low-dimensional
|
202 |
+
Sampled from Gaussian
|
203 |
+
Autoencoder
|
204 |
+
embedding (zi)
|
205 |
+
with low σ2
|
206 |
+
latent space
|
207 |
+
Distance or similarity
|
208 |
+
Between sample
|
209 |
+
Between point & cluster
|
210 |
+
measure
|
211 |
+
points (xi, xj)
|
212 |
+
centroid (xi, µj)
|
213 |
+
Embedding
|
214 |
+
t-distribution,
|
215 |
+
t-distribution,
|
216 |
+
distribution (qij)
|
217 |
+
α = 1
|
218 |
+
α = 1
|
219 |
+
Target
|
220 |
+
Gaussian in high-dimensional
|
221 |
+
A function of
|
222 |
+
distribution (pij)
|
223 |
+
space (x)
|
224 |
+
t-distributed qij
|
225 |
+
Learning
|
226 |
+
zi+1 = zi + d KLD(p,q)
|
227 |
+
d(zi)
|
228 |
+
wi+1 = wi + d KLD(p,q)
|
229 |
+
d(w)
|
230 |
+
Purpose
|
231 |
+
Visualization in d = 2
|
232 |
+
Clustering in d > 2
|
233 |
+
Table 2: Comparison between neighborhood embedding proposed in t-SNE for data visualization [17] and cluster
|
234 |
+
embedding proposed in DEC [7] inspired by t-SNE. α = degrees of freedom of t-distribution, d = dimension of low-
|
235 |
+
dimensional embedding. W represents the trainable parameter of an autoencoder.
|
236 |
+
samples in neighborhood embedding (zi, zj) of high-dimensional data points (xi and xj) for data visualization [17].
|
237 |
+
First, the similarity between two sample points (xi and xj) in the high dimension is modeled by a Gaussian distribution,
|
238 |
+
pij in Equation 1. Similar joint distribution can be defined for a pair of points in the low-dimensional embedding (zi,
|
239 |
+
zj) as qij below.
|
240 |
+
pij =
|
241 |
+
exp(−||xi − xj||2/2σ2)
|
242 |
+
�
|
243 |
+
k̸=l exp(−||xk − xl||2/2σ2),
|
244 |
+
qij =
|
245 |
+
exp(−||zi − zj||2/2σ2
|
246 |
+
�
|
247 |
+
k̸=l exp(−||zk − zl||2/2σ2)
|
248 |
+
(1)
|
249 |
+
The divergence between the target (pij) and embedding (qij) distributions is measured using a KL divergence loss,
|
250 |
+
which is minimized to iteratively optimize the neighborhood embedding.
|
251 |
+
KL (P||Q) =
|
252 |
+
�
|
253 |
+
i
|
254 |
+
�
|
255 |
+
j
|
256 |
+
pijlog pij
|
257 |
+
qij
|
258 |
+
(2)
|
259 |
+
To facilitate high-dimensional data visualization in two dimensions (2D), the embedding distribution (qij) is mod-
|
260 |
+
eled by a Student’s t-distribution, as shown in Equation 3. One primary justification for t-distribution is its heavier
|
261 |
+
tails compared to a Gaussian distribution. A heavier tail aids in an efficient mapping of outliers observed in high
|
262 |
+
dimensional space to the 2D space for data visualization.
|
263 |
+
qij =
|
264 |
+
(1 + ||zi − zj||)−1
|
265 |
+
�
|
266 |
+
k̸=l(1 + ||zk − zl||)−1
|
267 |
+
(3)
|
268 |
+
Therefore, data points placed at a moderate distance in high-dimension are pulled farther by a t-distribution to aid
|
269 |
+
visualization in 2D space. In the context of cluster embedding, we argue that the additional separation between points
|
270 |
+
in low dimensions may alter their cluster assignments. To illustrate this phenomenon, we project high-dimensional
|
271 |
+
deep convolutional image features on 2D using 1) t-SNE and 2) two principal components, as shown in Figure 1.
|
272 |
+
The scattering of data points is evident in the t-SNE mapping (Figure 1 (a)), where one blue point appears on the
|
273 |
+
left side of the figure leading to a wrong cluster assignment, unlike the PCA mapping (Figure 1 (b)). In general,
|
274 |
+
the expectations of data visualization and clustering tasks are different, as highlighted in Table 2, which should be
|
275 |
+
considered in respective representation learning.
|
276 |
+
3.3
|
277 |
+
Cluster embedding
|
278 |
+
Cluster embedding is achieved by infusing cluster separation information into the low-dimensional latent space. While
|
279 |
+
neighborhood embedding is initialized by sampling from a Gaussian distribution, cluster embedding methods use
|
280 |
+
embedding learned from an autoencoder’s latent space. However, the current cluster embedding methods use the same
|
281 |
+
t-distribution (Equation 3) to define the embedding distribution (qij), similar to neighborhood embedding. The target
|
282 |
+
distribution (pij) is derived as a function of qij, as shown below.
|
283 |
+
sij =
|
284 |
+
q2
|
285 |
+
ij
|
286 |
+
�
|
287 |
+
i qij
|
288 |
+
, pij =
|
289 |
+
sij
|
290 |
+
�
|
291 |
+
j sij
|
292 |
+
.
|
293 |
+
(4)
|
294 |
+
4
|
295 |
+
|
296 |
+
A PREPRINT - JANUARY 3, 2023
|
297 |
+
While pair-wise sample distances in neighborhood embedding have a complexity of O (N 2), the distances from the
|
298 |
+
centroids in embedding are O(N*K). Here, K is the number of clusters, which is much smaller than the number
|
299 |
+
of samples (N). While an outlier point results in N large distances (extremely small pij values) in neighborhood
|
300 |
+
embedding, there will be much fewer (K<<N) of those large distances in cluster embedding. Therefore, the effect
|
301 |
+
of outliers on cluster embedding can be assumed to be much lower compared to the assumption in neighborhood
|
302 |
+
embedding.
|
303 |
+
4
|
304 |
+
Proposed Method
|
305 |
+
We propose a novel cluster embedding method, Gaussian Cluster Embedding in Autoencoder Latent Space (G-
|
306 |
+
CEALS), by replacing the t-distribution (Equation 3) with a multivariate Gaussian distribution and the target distri-
|
307 |
+
bution (Equation 4) with the Gaussian likelihood of individual tabular data samples (Xi) belonging to a given cluster
|
308 |
+
(Cj) as P (Xi | Cj) or pij. Two clustering algorithms are used separately in training and evaluating the proposed joint
|
309 |
+
cluster embedding method: 1) k-means and 2) Gaussian mixture model (GMM). The clustering on tabular data space
|
310 |
+
(Xi ∈ ℜd) yields K cluster assignments for individual samples. Each cluster j is characterized by a centroid vector
|
311 |
+
(µj ∈ ℜd) and a covariance matrix (Σj ∈ ℜdxd). Because the dimensionality of tabular data is not as large as image
|
312 |
+
data, Σ and µ parameters can be reasonably sized for computation. Therefore, the soft cluster assignment (Sx(i, j))
|
313 |
+
for individual samples can be obtained using a Gaussian kernel, which is the negative exponent of the Mahalanobis
|
314 |
+
distance (dx(i, j)) between the point (Xi) and the j-th cluster centroid vector, as shown in Equations 5 and 6.
|
315 |
+
dx(i, j)
|
316 |
+
=
|
317 |
+
�
|
318 |
+
(Xi − µx
|
319 |
+
j ) Σ−1
|
320 |
+
x
|
321 |
+
(Xi − µj)T
|
322 |
+
(5)
|
323 |
+
Sx(i, j)
|
324 |
+
=
|
325 |
+
exp (−d2
|
326 |
+
x(i, j))
|
327 |
+
(6)
|
328 |
+
To ensure that the sum of all soft cluster assignments equals one for a given sample, we obtain a joint cluster distribu-
|
329 |
+
tion, P (xi, µj) or pij, as shown in Equation 7. We set pij, obtained via superior traditional machine learning, as the
|
330 |
+
target distribution to improve the autoencoder embedding (zi) of tabular data. Similarly, the embedding distribution
|
331 |
+
(qij) can be obtained using soft Gaussian cluster assignments (Sz) on the low-dimensional latent space (zi), as shown
|
332 |
+
in Equation 7.
|
333 |
+
pij =
|
334 |
+
Sx(i, j)
|
335 |
+
�
|
336 |
+
j Sx(i, j),
|
337 |
+
qij =
|
338 |
+
Sz(i, j)
|
339 |
+
�
|
340 |
+
j Sz(i, j)
|
341 |
+
(7)
|
342 |
+
Therefore, our P and Q distributions are independent, unlike the current cluster embedding methods. Additionally,
|
343 |
+
the covariance of the target (Σx) and embedding (Σz) distributions can regulate the scatter or compactness of data
|
344 |
+
clusters, which is impossible with t-distributed embedding.
|
345 |
+
Algorithm 1 Proposed G-CEALS Algorithm
|
346 |
+
Input: d-dimensional tabular data, X ∈ ℜn×d, where Xi ∈ ℜd
|
347 |
+
Output: Tabular data embedding, Z ∈ ℜn×m, m<<d
|
348 |
+
j − th cluster parameters, {µx
|
349 |
+
j , Σx
|
350 |
+
j } ← K-means or GMM clustering of X
|
351 |
+
pij ← {µx
|
352 |
+
j , Σx
|
353 |
+
j }, in Equation 7
|
354 |
+
Initialize: W 0 ={Wencoder, Wdecoder}
|
355 |
+
for t = 1 → n epochs do
|
356 |
+
{ ˆX, Zt} ← Encoder (X, W t
|
357 |
+
encoder)
|
358 |
+
{µz
|
359 |
+
j, qij} ← K-means or GMM clustering of Zt and using qij in Equation 7
|
360 |
+
L← Lauto + γ ∗ Lcluster, measure the loss terms in Equation 9
|
361 |
+
W t ← AutoEncoder (W t−1), update weights minimizing the joint loss in Equation 9
|
362 |
+
end for
|
363 |
+
4.1
|
364 |
+
Low-dimensional embedding optimization
|
365 |
+
A single-layer autoencoder is trained to encode the input (X) to a latent space (Z), which is then decoded to reconstruct
|
366 |
+
the original input ( ˆ
|
367 |
+
Xi), as shown in Equation 8.
|
368 |
+
Lauto = argmin
|
369 |
+
θ,Φ
|
370 |
+
N
|
371 |
+
�
|
372 |
+
i=1
|
373 |
+
||Xi − ˆ
|
374 |
+
Xi||2
|
375 |
+
2.
|
376 |
+
(8)
|
377 |
+
5
|
378 |
+
|
379 |
+
A PREPRINT - JANUARY 3, 2023
|
380 |
+
Data set
|
381 |
+
Sample size
|
382 |
+
Dimensions
|
383 |
+
Classes
|
384 |
+
Domain
|
385 |
+
Breast Cancer
|
386 |
+
569
|
387 |
+
30
|
388 |
+
2
|
389 |
+
Diagnostic
|
390 |
+
Dermatology
|
391 |
+
358
|
392 |
+
34
|
393 |
+
6
|
394 |
+
Histopathological
|
395 |
+
E. coli
|
396 |
+
336
|
397 |
+
7
|
398 |
+
8
|
399 |
+
Protein cell
|
400 |
+
TUANDROMD
|
401 |
+
4465
|
402 |
+
241
|
403 |
+
2
|
404 |
+
Android malware
|
405 |
+
Mice Protein
|
406 |
+
552
|
407 |
+
78
|
408 |
+
8
|
409 |
+
Protein expression
|
410 |
+
Olive
|
411 |
+
572
|
412 |
+
10
|
413 |
+
3
|
414 |
+
Food & beverage
|
415 |
+
Vehicle
|
416 |
+
846
|
417 |
+
18
|
418 |
+
4
|
419 |
+
Silhouette features
|
420 |
+
Table 3: Summary of tabular data sets used for comparing clustering performance
|
421 |
+
Here, θ and Φ denote the trainable parameters of the encoder and decoder, respectively. The embedding obtained
|
422 |
+
following each epoch of training is clustered using a clustering algorithm to obtain the cluster parameters (µ, Σ) and
|
423 |
+
the embedding distribution (qij). Given the target distribution (pij) (Equation 7), one of the learning objectives of
|
424 |
+
G-CEALS is to minimize the KL divergence between P and Q distributions (Lcluster), as shown in Equation 9 below.
|
425 |
+
The overall learning objective of G-CEALS is to update the autoencoder’s weights by minimizing a joint cost function,
|
426 |
+
the encoder reconstruction loss and the KL divergence loss, as below.
|
427 |
+
L
|
428 |
+
=
|
429 |
+
Lauto + γ ∗ Lcluster
|
430 |
+
=
|
431 |
+
argmin
|
432 |
+
θ,Φ
|
433 |
+
N
|
434 |
+
�
|
435 |
+
i=1
|
436 |
+
||Xi − ˆ
|
437 |
+
Xi||2
|
438 |
+
2 + γ ∗
|
439 |
+
N
|
440 |
+
�
|
441 |
+
i=1
|
442 |
+
K
|
443 |
+
�
|
444 |
+
j=1
|
445 |
+
pijlog pij
|
446 |
+
qij
|
447 |
+
(9)
|
448 |
+
Here, γ is a trade-off hyperparameter to balance the contribution of cluster divergence Lcluster during representation
|
449 |
+
learning. The G-CEALS algorithm is summarized in Algorithm 1.
|
450 |
+
5
|
451 |
+
Experiments
|
452 |
+
All experimental steps and algorithms are implemented and evaluated in Python. The neural networks are built using
|
453 |
+
the PyTorch package, and clustering modules are developed using the sci-kit-learn package1 We evaluate the proposed
|
454 |
+
and baseline methods on seven multi-domain and multivariate tabular data sets. A summary of these tabular data sets
|
455 |
+
is provided in Table 3.
|
456 |
+
5.1
|
457 |
+
Adapting image learning architectures to tabular data
|
458 |
+
A concurrent study compares the baseline embedding clustering methods on tabular data sets [27]. The comparison
|
459 |
+
results reveal that state-of-the-art embedding clustering methods proposed for image data may not be optimal baselines
|
460 |
+
for non-image tabular data. For example, Caron et al. have learned visual features from images using AlexNet and
|
461 |
+
VGG-16 after Sobel filtering for color removal and contrast enhancement, which do not apply to tabular data [6]. Their
|
462 |
+
deepCluster architecture has five convolutional layers with up to 384 2D image filters to learn image texture. Transfer
|
463 |
+
learning of tabular data, similar to VGG-16 on images, is not intuitive because tabular datasets do not share transferable
|
464 |
+
textures. Furthermore, these deep architectures can easily overfit data with limited sample size and dimensionality,
|
465 |
+
similar to tabular data sets. The DEPICT method uses a convolutional denoising autoencoder for reconstructing
|
466 |
+
original images from corrupted images [20]. Because similar image corruption is not trivial on data tables, we use
|
467 |
+
standard CNN autoencoders with single and three layers as baseline methods. The deep clustering network (DCN)
|
468 |
+
method uses a fully-connected deep neural network (FC-DNN) with 2000, 1000, 1000, 1000, and 50 neurons for
|
469 |
+
learning high-dimensional image data [11], whereas tabular data can have as low as ten input features. They avoid
|
470 |
+
CNN architecture to focus on their DCN learning objective instead of exhaustively searching all learning architectures.
|
471 |
+
However, they leverage a stacked deep autoencoder architecture instead of using a regular autoencoder model, which
|
472 |
+
may overshadow the original contribution of the algorithm. Similarly, the deep k-means (DKM) method used FC-
|
473 |
+
DNN instead of CNN for image learning [9]. The DKM method is compared against the ones that use FC-DNN
|
474 |
+
(excluding all CNN-based methods) to avoid architectural bias. We use the original DKM method to reproduce cluster
|
475 |
+
embedding on tabular data. Recently, Mrabah et al., in their Dynamic Autoencoder (DynAE) method, have used image
|
476 |
+
augmentation (shifting and rotation), which is not intuitive with tabular data, and a 2D convolutional adversarial
|
477 |
+
autoencoder for image data, which needs substantial customization of the adversarial network for learning feature
|
478 |
+
vectors in tabular format [10]. One limitation of the DynAE and DKM methods is that the latent dimension is restricted
|
479 |
+
to the number of clusters, whereas our method is proposed for any latent dimension.
|
480 |
+
1The source code will be shared publicly and kept private for anonymity during peer review.
|
481 |
+
6
|
482 |
+
|
483 |
+
A PREPRINT - JANUARY 3, 2023
|
484 |
+
1
|
485 |
+
2
|
486 |
+
3
|
487 |
+
4
|
488 |
+
5
|
489 |
+
Data
|
490 |
+
folds
|
491 |
+
Trained model
|
492 |
+
with best ?
|
493 |
+
? = [0.1, 0.2, 0.3, .... 1.0]
|
494 |
+
Accuracy
|
495 |
+
NMI
|
496 |
+
Hyperparameter
|
497 |
+
search
|
498 |
+
(p,q)
|
499 |
+
Z
|
500 |
+
x
|
501 |
+
x?
|
502 |
+
Test fold
|
503 |
+
....... .
|
504 |
+
.
|
505 |
+
. ... ... ..
|
506 |
+
Clustering
|
507 |
+
Z
|
508 |
+
Figure 2: Five-fold cross-validation scheme for training and tuning the model with the best γ value (Equation 9). The
|
509 |
+
clustering accuracy is reported on the embedding of the left-out test data fold.
|
510 |
+
5.2
|
511 |
+
Baseline methods
|
512 |
+
The comparison of six state-of-the-art cluster embedding methods on tabular data sets reveals the IDEC method as the
|
513 |
+
best performing, followed by traditional clustering (k-means and GMM) as the second best competitive baseline [27].
|
514 |
+
Furthermore, we detail in the previous section why existing methods for image learning may not be appropriate
|
515 |
+
baselines for tabular data sets without some customization. The limited sample size and dimensionality of tabular
|
516 |
+
data may require a simpler learning architecture than image data. For example, the latent space size is set to 256 for
|
517 |
+
image learning, whereas the input dimension of tabular data can be as low as 10.
|
518 |
+
Considering these factors, we compare our proposed method against four competitive baseline methods. First, the
|
519 |
+
k-means and GMM clustering are performed on input tabular data (X) because traditional machine learning methods
|
520 |
+
are known to produce competitive results on tabular data, unlike image data. Second, a two-stage method is used:
|
521 |
+
1) the embedding (Z) extraction by training a single-layer autoencoder and then 2) perform clustering on Z [28,
|
522 |
+
29]. Third, embedding learning and clustering are performed jointly on tabular data. We compare fully-connected
|
523 |
+
autoencoder (FC-AE) and CNN autoencoder (similar to the DEPICT method [20]) in single-layer and three-layer
|
524 |
+
settings to investigate a suitable learning architecture for tabular data. Fourth, despite the challenges in adapting
|
525 |
+
image learning methods to tabular data learning as mentioned in the previous section, we use two pioneering methods
|
526 |
+
for cluster embedding, DEC [7], IDEC [8], and a more recent method (deep k-means) DKM [9] for tabular data
|
527 |
+
to compare with our proposed method. Although sophisticated autoencoder architectures proposed in the literature
|
528 |
+
(stacked, variational, adversarial, convolutional) can be compared in an exhaustive search for the best method, it will
|
529 |
+
introduce architectural bias in our claim for the best learning algorithm. Therefore, we use a single-layer autoencoder
|
530 |
+
to make a fair comparison between our and the baseline learning algorithms, especially considering the size and
|
531 |
+
dimensionality of tabular data.
|
532 |
+
5.3
|
533 |
+
Evaluation
|
534 |
+
The proposed G-CEALS model training involves self-supervised data reconstruction and unsupervised clustering with-
|
535 |
+
out requiring any ground truth. However, existing studies show that the hyperparameter (γ in Equation 9) value is
|
536 |
+
data-dependent and is tuned based on clustering accuracy that requires ground truth labels. The quality of cluster
|
537 |
+
embedding is evaluated in downstream clustering tasks using two standard metrics: clustering accuracy (ACC) [30]
|
538 |
+
and normalized mutual information (NMI) [31]. We follow the same metrics for hyperparameter tuning and cluster
|
539 |
+
embedding evaluation. However, existing methods report the clustering accuracy on the same training data set because
|
540 |
+
of the unsupervised nature of the problem. In contrast, we use a semi-supervised five-fold cross-validation scheme to
|
541 |
+
obtain reproducible and transferable learning for downstream clustering or classification. As shown in Figure 2, four
|
542 |
+
data folds are used in unsupervised training and supervised tuning, which is then used to obtain the embedding of a
|
543 |
+
left-out test data fold. We report the average ACC and NMI scores across the five left-out data folds to compare the
|
544 |
+
proposed and baseline methods. These metrics score between 0 (failure) and 1 (perfect clusters). For all evaluation
|
545 |
+
purposes, the cluster number is set to the number of class labels for a given data set. The scores are multiplied by 100
|
546 |
+
to represent the numbers in percentage.
|
547 |
+
7
|
548 |
+
|
549 |
+
A PREPRINT - JANUARY 3, 2023
|
550 |
+
Data set
|
551 |
+
FC-AE
|
552 |
+
FC-AE
|
553 |
+
CNN
|
554 |
+
CNN
|
555 |
+
CNN
|
556 |
+
FC-AE
|
557 |
+
GMM
|
558 |
+
K-means
|
559 |
+
GMM
|
560 |
+
K-means
|
561 |
+
GMM
|
562 |
+
GMM
|
563 |
+
NHL
|
564 |
+
1
|
565 |
+
1
|
566 |
+
1
|
567 |
+
1
|
568 |
+
3
|
569 |
+
3
|
570 |
+
Breast cancer
|
571 |
+
ACC
|
572 |
+
91.2 (4.8)
|
573 |
+
85.8 (3.3)
|
574 |
+
92.6 (3.3)
|
575 |
+
89.8 (4.3)
|
576 |
+
62.7 (3.1)
|
577 |
+
85.4 (12.0)
|
578 |
+
NMI
|
579 |
+
59.2 (18.1)
|
580 |
+
43.8 (10.6)
|
581 |
+
63.8 (11.7)
|
582 |
+
55.4 (11.2)
|
583 |
+
0.0 (0.0)
|
584 |
+
49.4 (24.0)
|
585 |
+
Dermatology
|
586 |
+
ACC
|
587 |
+
77.2 (9.8)
|
588 |
+
76.4 (10.1)
|
589 |
+
75.7 (5.4)
|
590 |
+
72.3 (4.9)
|
591 |
+
31.0 (3.8)
|
592 |
+
74.3 (6.6)
|
593 |
+
NMI
|
594 |
+
77.6 (5.8)
|
595 |
+
77.4 (5.4)
|
596 |
+
77.8 (4.5)
|
597 |
+
76.1 (4.5)
|
598 |
+
0.0 (0.0)
|
599 |
+
82.9 (5.0)
|
600 |
+
E. coli
|
601 |
+
ACC
|
602 |
+
32.2 (3.7)
|
603 |
+
31.6 (3.7)
|
604 |
+
27.7 (2.3)
|
605 |
+
29.2 (2.5)
|
606 |
+
34.2 (4.6)
|
607 |
+
32.4 (1.5)
|
608 |
+
NMI
|
609 |
+
18.0 (6.8)
|
610 |
+
17.4 (3.1)
|
611 |
+
17.7 (4.2)
|
612 |
+
17.1 (3.7)
|
613 |
+
13.3 (3.3)
|
614 |
+
15.6 (3.2)
|
615 |
+
TUANDROMD
|
616 |
+
ACC
|
617 |
+
83.4 (6.6)
|
618 |
+
40.8 (4.0)
|
619 |
+
79.4 (1.6)
|
620 |
+
79.6 (1.2)
|
621 |
+
79.4 (1.6)
|
622 |
+
80.6 (4.5)
|
623 |
+
NMI
|
624 |
+
18.8 (23.8)
|
625 |
+
36.0 (3.3)
|
626 |
+
0.4 (0.2)
|
627 |
+
2.3 (1.0)
|
628 |
+
0.4 (0.2)
|
629 |
+
7.9 (14.6)
|
630 |
+
Mice protein
|
631 |
+
ACC
|
632 |
+
42.0 (1.8)
|
633 |
+
40.6 (1.7)
|
634 |
+
37.7 (2.2)
|
635 |
+
36.2 (3.0)
|
636 |
+
18.8 (2.4)
|
637 |
+
39.9 (2.1)
|
638 |
+
NMI
|
639 |
+
40.4 (3.0)
|
640 |
+
38.0 (3.9)
|
641 |
+
36.4 (1.3)
|
642 |
+
33.3 (2.7)
|
643 |
+
0.0 (0.0)
|
644 |
+
40.8 (3.3)
|
645 |
+
Olive
|
646 |
+
ACC
|
647 |
+
70.8 (7.9)
|
648 |
+
73.6 (6.4)
|
649 |
+
58.9 (5.5)
|
650 |
+
71.2 (10.6)
|
651 |
+
56.5 (6.1)
|
652 |
+
66.8 (8.7)
|
653 |
+
NMI
|
654 |
+
42.6 (9.0)
|
655 |
+
47.0 (6.6)
|
656 |
+
30.7 (6.9)
|
657 |
+
44.4 (10.2)
|
658 |
+
0.0 (0.0)
|
659 |
+
39.8 (10.4)
|
660 |
+
Vehicle
|
661 |
+
ACC
|
662 |
+
41.2 (3.3)
|
663 |
+
44.2 (3.5)
|
664 |
+
40.8 (2.2)
|
665 |
+
42.4 (4.6)
|
666 |
+
40.7 (4.3)
|
667 |
+
42.1 (4.2)
|
668 |
+
NMI
|
669 |
+
11.8 (2.8)
|
670 |
+
14.6 (2.2)
|
671 |
+
11.5 (2.3)
|
672 |
+
13.5 (4.9)
|
673 |
+
12.7 (1.9)
|
674 |
+
14.8 (3.4)
|
675 |
+
Table 4: Comparing fully-connected autoencoder (FC-AE) with CNN-autoencoder for the proposed G-CEALS algo-
|
676 |
+
rithm in single or three-layer settings. NHL = Number of hidden or convolutional layers.
|
677 |
+
6
|
678 |
+
Results
|
679 |
+
All experiments are conducted on a Dell Precision 5820 workstation running Ubuntu 20.04 with 64GB RAM and an
|
680 |
+
NVIDIA GeForce RTX 3080 GPU with 10GB memory. We standardize all tabular data using the mean and standard
|
681 |
+
deviation of individual variables before training the autoencoder or performing clustering.
|
682 |
+
6.1
|
683 |
+
Learning architecture and model selection
|
684 |
+
We compare the performance of fully connected autoencoders (FC-AE) and convolutional autoencoders (CNN-AE)
|
685 |
+
in single- and three-layer architectures for our tabular data sets. Table 4 clearly shows the superiority of single-
|
686 |
+
layer FC-AE architecture over CNN and deeper architectures, which we select in our subsequent analysis. A single-
|
687 |
+
layer autoencoder maps a d-dimensional tabular data sample to a five-dimensional autoencoder latent space (d>5),
|
688 |
+
considering the range of dimensionality of our tabular data sets (seven to 241). For all experiments, the learning rate is
|
689 |
+
set to 0.0001 with an Adam optimizer. The best autoencoder model jointly trained clustering is selected by searching
|
690 |
+
the best epoch point and γ value while training it for a maximum of 5000 epochs. The best gamma value is searched
|
691 |
+
from a range between 0.1 and 1.0.
|
692 |
+
6.2
|
693 |
+
Clustering of tabular data versus latent space
|
694 |
+
Tables 5 and 6 show clustering scores and rank ordering for nine methods, respectively. Traditional clustering (K-
|
695 |
+
means and GMM) on tabular data yields the top three scores for the dermatology, breast cancer, mice protein, and
|
696 |
+
olive data sets. This finding is at odds with the previous finding that direct clustering of images in pixel space yields
|
697 |
+
the worst performance. This is because tabular data sets have relatively lower dimensionality and the absence of
|
698 |
+
regularity in patterns makes such data still suitable for traditional machine learning. For example, these clustering
|
699 |
+
methods yield the worst (<1.0, max. 100) NMI scores for the highest dimensional (241) TUANDROMD data set.
|
700 |
+
Alternatively, clustering methods (GMM, K-means) can be applied to the autoencoder’s latent space (Z). A trained
|
701 |
+
autoencoder is used to obtain the embedding on test data folds. The test data embedding is then clustered using GMM
|
702 |
+
and K-means, which are presented as GMM on Z and K-means on Z in Table 5, respectively. Except for the E. coli
|
703 |
+
data set, GMM on Z performs worse than GMM clustering of other data sets. Similarly, K-means clustering of tabular
|
704 |
+
data yields substantially better accuracy than K-means clustering of Z, except for the vehicle data set.
|
705 |
+
6.3
|
706 |
+
Clustering of joint cluster embedding
|
707 |
+
The autoencoder latent space Z is jointly learned with data cluster distributions in this method. Our results on tabular
|
708 |
+
data are reproduced using two pioneering cluster embedding methods: DEC [7] and IDEC [8]. The DEC method
|
709 |
+
appears to be among the worst of nine methods presented in Table 5, except for the vehicle data set. Therefore, a
|
710 |
+
method proposed for image learning may not perform equally well on tabular data. However, the improved DEC
|
711 |
+
8
|
712 |
+
|
713 |
+
A PREPRINT - JANUARY 3, 2023
|
714 |
+
Data set
|
715 |
+
GMM
|
716 |
+
K-means
|
717 |
+
GMM
|
718 |
+
K-means
|
719 |
+
DEC
|
720 |
+
IDEC
|
721 |
+
DKM
|
722 |
+
G-CEALS
|
723 |
+
G-CEALS
|
724 |
+
on X
|
725 |
+
on X
|
726 |
+
on Z
|
727 |
+
on Z
|
728 |
+
GMM
|
729 |
+
K-means
|
730 |
+
Breast cancer
|
731 |
+
ACC
|
732 |
+
89.8 (4.6)
|
733 |
+
90.2 (4.3)
|
734 |
+
82.2 (7.4)
|
735 |
+
82.8 (5.7)
|
736 |
+
68.0 (3.0)
|
737 |
+
86.0 (3.6)
|
738 |
+
64.2 (3.9)
|
739 |
+
91.2 (4.8)
|
740 |
+
85.8 (3.3)
|
741 |
+
NMI
|
742 |
+
55.4 (17.6)
|
743 |
+
56.2 (17.0)
|
744 |
+
40.6 (19.6)
|
745 |
+
39.2 (15.9)
|
746 |
+
9.2 (6.2)
|
747 |
+
44.4 (11.3)
|
748 |
+
2.7 (7.2)
|
749 |
+
59.2 (18.1)
|
750 |
+
43.8 (10.6)
|
751 |
+
Dermatology
|
752 |
+
ACC
|
753 |
+
76.8 (8.8)
|
754 |
+
76.2 (9.2)
|
755 |
+
72.2 (8.8)
|
756 |
+
63.0 (4.7)
|
757 |
+
50.4 (7.4)
|
758 |
+
76.6 (12.2)
|
759 |
+
23.2 (0.5)
|
760 |
+
77.2 (9.8)
|
761 |
+
76.4 (10.1)
|
762 |
+
NMI
|
763 |
+
82.4 (4.2)
|
764 |
+
83.4 (5.0)
|
765 |
+
73.4 (5.0)
|
766 |
+
70.8 (4.4)
|
767 |
+
45.2 (6.9)
|
768 |
+
80.6 (7.2)
|
769 |
+
3.5 (0.3)
|
770 |
+
77.6 (5.8)
|
771 |
+
77.4 (5.4)
|
772 |
+
Ecoli
|
773 |
+
ACC
|
774 |
+
29.4 (4.5)
|
775 |
+
29.2 (3.2)
|
776 |
+
30.6 (4.7)
|
777 |
+
29.0 (4.0)
|
778 |
+
26.2 (2.1)
|
779 |
+
32.6 (3.7)
|
780 |
+
35.4 (2.9)
|
781 |
+
32.2 (3.7)
|
782 |
+
31.6 (3.7)
|
783 |
+
NMI
|
784 |
+
19.6 (6.6)
|
785 |
+
18.4 (5.6)
|
786 |
+
17.8 (6.5)
|
787 |
+
18.6 (6.3)
|
788 |
+
15.0 (5.3)
|
789 |
+
17.4 (6.3)
|
790 |
+
14.1 (2.7)
|
791 |
+
18.0 (6.8)
|
792 |
+
17.4 (3.1)
|
793 |
+
TUANDROMD
|
794 |
+
ACC
|
795 |
+
79.1 (1.7)
|
796 |
+
79.1 (1.7)
|
797 |
+
77.4 (2.6)
|
798 |
+
77.2 (3.6)
|
799 |
+
79.2 (1.5)
|
800 |
+
82.0 (4.1)
|
801 |
+
48.7 (11.3)
|
802 |
+
83.4 (6.6)
|
803 |
+
40.8 (4.0)
|
804 |
+
NMI
|
805 |
+
0.5 (0.2)
|
806 |
+
0.6 (0.1)
|
807 |
+
1.6 (2.1)
|
808 |
+
0.5 (0.2)
|
809 |
+
0.8 (0.7)
|
810 |
+
13.8 (9.7)
|
811 |
+
6.8 (5.6)
|
812 |
+
18.8 (23.8)
|
813 |
+
36.0 (3.3)
|
814 |
+
Mice protein
|
815 |
+
ACC
|
816 |
+
40.8 (1.7)
|
817 |
+
40.2 (5.7)
|
818 |
+
36.4 (5.1)
|
819 |
+
35.0 (2.5)
|
820 |
+
34.8 (3.1)
|
821 |
+
35.6 (2.3)
|
822 |
+
17.2 (2.7)
|
823 |
+
42.0 (1.8)
|
824 |
+
40.6 (1.7)
|
825 |
+
NMI
|
826 |
+
42.0 (3.2)
|
827 |
+
40.6 (4.5)
|
828 |
+
31.6 (3.8)
|
829 |
+
34.2 (4.2)
|
830 |
+
30.8 (6.2)
|
831 |
+
35.6 (3.6)
|
832 |
+
3.1 (9.1)
|
833 |
+
40.4 (3.0)
|
834 |
+
38.0 (3.9)
|
835 |
+
Olive
|
836 |
+
ACC
|
837 |
+
67.2 (11.5)
|
838 |
+
71.4 (10.8)
|
839 |
+
57.6 (11.2)
|
840 |
+
59.4 (12.7)
|
841 |
+
55.8 (5.5)
|
842 |
+
77.2 (4.0)
|
843 |
+
56.5 (0.0)
|
844 |
+
70.8 (7.9)
|
845 |
+
73.6 (6.4)
|
846 |
+
NMI
|
847 |
+
39.4 (12.6)
|
848 |
+
43.2 (11.7)
|
849 |
+
30.0 (13.2)
|
850 |
+
32.6 (14.0)
|
851 |
+
25.4 (5.5)
|
852 |
+
49.4 (5.2)
|
853 |
+
0.0 (0.0)
|
854 |
+
42.6 (9.0)
|
855 |
+
47.0 (6.6)
|
856 |
+
Vehicle
|
857 |
+
ACC
|
858 |
+
39.4 (2.9)
|
859 |
+
37.2 (1.7)
|
860 |
+
39.0 (2.6)
|
861 |
+
39.0 (2.8)
|
862 |
+
41.4 (3.3)
|
863 |
+
42.8 (3.4)
|
864 |
+
31.1 (5.6)
|
865 |
+
41.2 (3.3)
|
866 |
+
44.2 (3.5)
|
867 |
+
NMI
|
868 |
+
13.6 (1.0)
|
869 |
+
12.4 (1.6)
|
870 |
+
13.2 (1.5)
|
871 |
+
13.0 (1.7)
|
872 |
+
12.8 (1.5)
|
873 |
+
17.6 (3.8)
|
874 |
+
6.4 (6.3)
|
875 |
+
11.8 (2.8)
|
876 |
+
14.6 (2.2)
|
877 |
+
Table 5: Clustering accuracy (ACC) and normalized mutual information (NMI) scores of proposed and baseline meth-
|
878 |
+
ods. Z = autoencoder latent space without joint learning. X = tabular data space. The DKM method is used on
|
879 |
+
tabular data set without customizing this image learning method for tabular data. Otherwise, a single-layer autoen-
|
880 |
+
coder without pre-training is used for all representation learning methods to avoid architectural bias in comparing the
|
881 |
+
algorithms.
|
882 |
+
Data set
|
883 |
+
GMM
|
884 |
+
K-means
|
885 |
+
GMM
|
886 |
+
K-means
|
887 |
+
DEC
|
888 |
+
IDEC
|
889 |
+
DKM
|
890 |
+
CNN
|
891 |
+
Proposed
|
892 |
+
on X
|
893 |
+
on X
|
894 |
+
on Z
|
895 |
+
on Z
|
896 |
+
GMM
|
897 |
+
G-CEALS
|
898 |
+
Breast cancer
|
899 |
+
4
|
900 |
+
3
|
901 |
+
7
|
902 |
+
6
|
903 |
+
8
|
904 |
+
5
|
905 |
+
9
|
906 |
+
1
|
907 |
+
2
|
908 |
+
Dermatology
|
909 |
+
2
|
910 |
+
4
|
911 |
+
6
|
912 |
+
7
|
913 |
+
8
|
914 |
+
3
|
915 |
+
9
|
916 |
+
5
|
917 |
+
1
|
918 |
+
E. coli
|
919 |
+
5
|
920 |
+
6
|
921 |
+
4
|
922 |
+
7
|
923 |
+
9
|
924 |
+
2
|
925 |
+
1
|
926 |
+
8
|
927 |
+
3
|
928 |
+
TUANDROMD
|
929 |
+
5
|
930 |
+
6
|
931 |
+
7
|
932 |
+
8
|
933 |
+
4
|
934 |
+
2
|
935 |
+
9
|
936 |
+
3
|
937 |
+
1
|
938 |
+
Mice protein
|
939 |
+
2
|
940 |
+
3
|
941 |
+
5
|
942 |
+
7
|
943 |
+
8
|
944 |
+
6
|
945 |
+
9
|
946 |
+
4
|
947 |
+
1
|
948 |
+
Olive
|
949 |
+
4
|
950 |
+
2
|
951 |
+
7
|
952 |
+
5
|
953 |
+
9
|
954 |
+
1
|
955 |
+
8
|
956 |
+
6
|
957 |
+
3
|
958 |
+
Vehicle
|
959 |
+
5
|
960 |
+
8
|
961 |
+
6
|
962 |
+
7
|
963 |
+
3
|
964 |
+
2
|
965 |
+
9
|
966 |
+
4
|
967 |
+
1
|
968 |
+
Average
|
969 |
+
3.9 (1.3)
|
970 |
+
4.6 (2.0)
|
971 |
+
6.0 (1.1)
|
972 |
+
6.7 (0.9)
|
973 |
+
7.0 (2.3)
|
974 |
+
3.0 (1.7)
|
975 |
+
7.7 (2.8)
|
976 |
+
4.4 (2.1)
|
977 |
+
1.4 (0.7)
|
978 |
+
Table 6: Data set-specific and average ranks of the proposed and baseline methods based on clustering accuracy.
|
979 |
+
CNN-GMM is a single convolutional layer autoencoder trained jointly with GMM via the proposed algorithm. The
|
980 |
+
DKM method is used without any customization or pretraining.
|
981 |
+
(IDEC) method shows substantial improvement over the DEC method. The IDEC method always outperforms the
|
982 |
+
GMM on Z except for the mice protein data set. K-means clustering on Z is always inferior to the IDEC method.
|
983 |
+
The IDEC is the best of all methods for the olive data sets. Unlike DEC and IDEC methods, we do not modify the
|
984 |
+
DKM method for the tabular data sets. Using the original image learning architecture (500-500-2000 neurons) on
|
985 |
+
tabular data, the DKM method yields the worst of all clustering accuracy with a zero NMI score for the olive data set.
|
986 |
+
However, it performs the best for the Ecoli data set with the lowest dimensionality (8) of all data sets.
|
987 |
+
6.4
|
988 |
+
Proposed G-CEALS method
|
989 |
+
Table 5 shows that our proposed G-CEALS method jointly trained with GMM clustering (ACC: 91.2) outperforms
|
990 |
+
the second-best method, K-means clustering (ACC: 90.2), for the breast cancer data set. The proposed G-CEALS
|
991 |
+
method with GMM clustering (ACC: 77.2) also outperforms the second-best method, GMM clustering (ACC: 76.8)
|
992 |
+
for the dermatology data set. For the E. coli data set, the proposed method (ACC: 32.2) is on par with the second-
|
993 |
+
best method, IDEC (ACC: 32.6). The G-CEALS method (ACC: 83.4) outperforms the second-best IDEC (ACC:82.0)
|
994 |
+
method on the TUANDROMD data set. The proposed method with GMM clustering (ACC: 42.0) again outperforms
|
995 |
+
the second-best method, GMM clustering (ACC: 40.8), on the mice protein data set. Only for the Olive data set,
|
996 |
+
the IDEC method (ACC: 77.2) outperforms the proposed G-CEALS method with K-means clustering (ACC: 73.6).
|
997 |
+
However, the G-CEALS method with K-means clustering (ACC: 44.2) outperforms the second best method, IDEC
|
998 |
+
(ACC: 42.8) on the vehicle data set. Table 6 shows that the proposed G-CEALS method ranks the best method on
|
999 |
+
four of the seven data sets. For the other three data sets, G-CEALS ranks among the top three. The average ranking
|
1000 |
+
reveals that our method (average rank: 1.4) substantially outperforms the second-best (IDEC, average rank: 3.0) and
|
1001 |
+
the third-best method: GMM clustering of tabular data (average rank: 3.9).
|
1002 |
+
9
|
1003 |
+
|
1004 |
+
A PREPRINT - JANUARY 3, 2023
|
1005 |
+
7
|
1006 |
+
Discussion of results
|
1007 |
+
The paper is one of the first studies to jointly learn embedding and clustering in an autoencoder latent space with
|
1008 |
+
tabular data. The findings of this article can be summarized as follows. First, traditional clustering on tabular data
|
1009 |
+
is competitive with clustering on the autoencoder latent space. Our method outperforms these superior methods for
|
1010 |
+
clustering. Second, joint embedding learning with a cluster distribution (IDEC and our method) shows improved data
|
1011 |
+
representation over all disjoint learning methods (DEC, K-means on Z, GMM on Z) and GMM/K-means clustering
|
1012 |
+
on tabular data. Including the DKM method, cluster embedding methods yield the best performance on all seven
|
1013 |
+
tabular data sets. Third, our assumption of Gaussian clusters and an independent target distribution have improved the
|
1014 |
+
clustering accuracy over the methods using t-distributed clusters and all other baselines on average. We elaborate on
|
1015 |
+
these findings in the following sections.
|
1016 |
+
7.1
|
1017 |
+
Image versus tabular data embedding
|
1018 |
+
In computer vision, clustering images on high-dimensional image pixel space is ineffective, as reported in previous
|
1019 |
+
studies. On the other hand, deep learning methods simultaneously and efficiently achieve dimensionality reduction,
|
1020 |
+
feature learning via convolution operations, and classification in an end-to-end framework. In contrast, tabular data
|
1021 |
+
sets appear with relatively smaller sample sizes and dimensionality than image data and do not contain regularity in
|
1022 |
+
features to leverage the benefit of convolutional feature extraction. Our results confirm that deep models with three
|
1023 |
+
hidden layers or convolutional networks or clustering on autoencoder embedding are not effective for tabular data.
|
1024 |
+
This finding confirms the superiority of traditional machine learning on tabular data over deep learning. However, our
|
1025 |
+
proposed representation learning method outperforms the superior clustering method to demonstrate that tabular data
|
1026 |
+
need special algorithms to perform effectively with neural network-based learning architectures. G-CEALS performs
|
1027 |
+
good with the GMM clustering algorithm may be due to the multivariate Gaussian modeling of the embedding distri-
|
1028 |
+
butions. Clustering on autoencoder embedding (Z) is unsatisfactory because the reconstruction loss may have altered
|
1029 |
+
the cluster distribution in the latent space. Therefore, setting the superior cluster distribution on tabular data space
|
1030 |
+
as the target may have helped in improving the quality of the cluster embedding. The G-CEALS method is designed
|
1031 |
+
for tabular data and may not be appropriate for images because the target distribution would be ineffective on pixel
|
1032 |
+
space. Overall, the cluster embedding of tabular data requires a learning algorithm and architecture distinct from those
|
1033 |
+
proposed for image data.
|
1034 |
+
7.2
|
1035 |
+
Trade-off between data reconstruction and cluster divergence loss
|
1036 |
+
We observe that one of the first successful deep cluster embedding methods proposed for image clustering (DEC [7])
|
1037 |
+
performs the worst among all approaches with tabular data sets 6. The DEC method first pretrains an autoencoder
|
1038 |
+
and then separately finetunes the KL divergence loss after modeling a t-distributed embedding for clustering. There is
|
1039 |
+
no γ parameter because the Lauto and Lcluster optimizations happen separately in DEC. Conversely, the introduction
|
1040 |
+
of γ parameter in IDEC and our method has substantially improved the quality of cluster embedding. While the
|
1041 |
+
autoencoder reconstruction loss Lauto retains all information in the latent space, Lcluster (Equation 9) disrupts the
|
1042 |
+
latent space to learn the clusters. A disproportionate contribution of these two loss terms can collapse the cluster
|
1043 |
+
distribution in the embedding leading to poor cluster performance. Therefore, tuning the γ parameter is a crucial step
|
1044 |
+
in cluster embedding methods.
|
1045 |
+
7.3
|
1046 |
+
G-CEALS versus other methods
|
1047 |
+
Our results show that the IDEC method performs better in cases where the clustering on tabular data space is sub-
|
1048 |
+
stantially worse (E. coli and Olive data sets in Table 6). It may be because the IDEC method does not learn from
|
1049 |
+
the cluster distribution on the tabular data space, similarly to the proposed G-CEALS method. In IDEC, the target
|
1050 |
+
distribution is derived from the t-distributed embedding instead. Overall, finding an appropriate target distribution for
|
1051 |
+
optimizing the KL divergence loss remains an open problem for future work. Another common observation is that
|
1052 |
+
the Olive and E. coli data sets have the lowest dimensionality among the seven tabular data sets (Table 3) with only
|
1053 |
+
ten and seven variables, respectively. Therefore, it may be inferred that the IDEC method is superior to the proposed
|
1054 |
+
G-CEALS method when the dimensionality of tabular data is less than ten. For tabular data sets with the highest
|
1055 |
+
dimensionality ( TUANDROMD (241) and mice protein (78)), the G-CEALS method outperforms the IDEC method
|
1056 |
+
as the best-performing method. This observation suggests that Gaussian embedding may be more suitable over its
|
1057 |
+
t-distributed counterparts when a tabular data set has higher dimensionality.
|
1058 |
+
10
|
1059 |
+
|
1060 |
+
A PREPRINT - JANUARY 3, 2023
|
1061 |
+
7.4
|
1062 |
+
Limitations
|
1063 |
+
While tunable parameters provide sufficient flexibility to optimize the embedding, finding the best parameter setting
|
1064 |
+
can be computationally expensive and data-demanding. The quality of embedding can be sensitive to the choice of
|
1065 |
+
these hyperparameters due to the lack of large training samples. The G-CEALS method in this paper uses the clustering
|
1066 |
+
accuracy (ACC) metric to search and select the trained model for embedding generation. This may help the model
|
1067 |
+
obtain the best ACC scores on test data embedding. As mentioned earlier, the G-CEALS method is not suitable for
|
1068 |
+
image data because the target distribution is obtained in the high-dimensional input feature space.
|
1069 |
+
8
|
1070 |
+
Conclusions
|
1071 |
+
This paper presents a novel cluster embedding method in one of the first studies on tabular data sets. The superiority
|
1072 |
+
of our G-CEALS method suggests that multivariate Gaussian distribution is superior to the widely used t-distribution
|
1073 |
+
assumption for learning tabular data embedding. Our findings show that tabular data sets require learning algorithms
|
1074 |
+
and architectures distinct from those proposed for image learning. This data-centric learning approach may improve a
|
1075 |
+
deep model’s performance on tabular data over its currently known superior machine learning counterparts. The pro-
|
1076 |
+
posed joint learning framework provides a promising representation learning of tabular data over its superior machine
|
1077 |
+
learning counterparts.
|
1078 |
+
Acknowledgements
|
1079 |
+
References
|
1080 |
+
[1] Lei Lin, Wencheng Wu, Zhongkai Shangguan, Safwan Wshah, Ramadan Elmoudi, and Beilei Xu. Hpt-rl: Cali-
|
1081 |
+
brating power system models based on hierarchical parameter tuning and reinforcement learning. In 2020 19th
|
1082 |
+
IEEE International Conference on Machine Learning and Applications (ICMLA), pages 1231–1237. IEEE, 2020.
|
1083 |
+
[2] M Alam, M D Samad, L Vidyaratne, A Glandon, and K M Iftekharuddin. Survey on Deep Neural Networks in
|
1084 |
+
Speech and Vision Systems. Neurocomputing, 417:302–321, 2020.
|
1085 |
+
[3] Xue Ying. An overview of overfitting and its solutions. In Journal of physics: Conference series, volume 1168,
|
1086 |
+
page 022022. IOP Publishing, 2019.
|
1087 |
+
[4] Sandy Huang, Nicolas Papernot, Ian Goodfellow, Yan Duan, and Pieter Abbeel. Adversarial attacks on neural
|
1088 |
+
network policies. arXiv preprint arXiv:1702.02284, 2017.
|
1089 |
+
[5] Ahc`ene Boubekki, Michael Kampffmeyer, Ulf Brefeld, and Robert Jenssen. Joint optimization of an autoencoder
|
1090 |
+
for clustering and embedding, volume 110. Springer US, 2021.
|
1091 |
+
[6] Mathilde Caron, Piotr Bojanowski, Armand Joulin, and Matthijs Douze. Deep clustering for unsupervised learn-
|
1092 |
+
ing of visual features. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial
|
1093 |
+
Intelligence and Lecture Notes in Bioinformatics), volume 11218 LNCS, pages 139–156, jul 2018.
|
1094 |
+
[7] Junyuan Xie, Ross Girshick, and Ali Farhadi. Unsupervised deep embedding for clustering analysis. In 33rd
|
1095 |
+
International Conference on Machine Learning, ICML 2016, volume 1, pages 740–749, 2016.
|
1096 |
+
[8] Xifeng Guo, Long Gao, Xinwang Liu, and Jianping Yin. Improved deep embedded clustering with local structure
|
1097 |
+
preservation. IJCAI International Joint Conference on Artificial Intelligence, 0:1753–1759, 2017.
|
1098 |
+
[9] Maziar Moradi Fard, Thibaut Thonet, and Eric Gaussier. Deep k-Means: Jointly clustering with k-Means and
|
1099 |
+
learning representations. Pattern Recognition Letters, 138:185–192, 2020.
|
1100 |
+
[10] Nairouz Mrabah, Naimul Mefraz Khan, Riadh Ksantini, and Zied Lachiri. Deep clustering with a dynamic
|
1101 |
+
autoencoder: From reconstruction towards centroids construction. Neural Networks, 130:206–228, oct 2020.
|
1102 |
+
[11] Bo Yang, Xiao Fu, Nicholas D Sidiropoulos, and Mingyi Hong. Towards K-means-friendly spaces: Simultaneous
|
1103 |
+
deep learning and clustering. In 34th International Conference on Machine Learning, ICML 2017, volume 8,
|
1104 |
+
pages 5888–5901, 2017.
|
1105 |
+
[12] Niklas Kohler, Maren Buttner, and Fabian Theis. Deep learning does not outperform classical machine learning
|
1106 |
+
for cell-type annotation. bioRxiv, page 653907, 2019.
|
1107 |
+
11
|
1108 |
+
|
1109 |
+
A PREPRINT - JANUARY 3, 2023
|
1110 |
+
[13] Aaron M. Smith, Jonathan R. Walsh, John Long, Craig B. Davis, Peter Henstock, Martin R. Hodge, Mateusz Ma-
|
1111 |
+
ciejewski, Xinmeng Jasmine Mu, Stephen Ra, Shanrong Zhao, Daniel Ziemek, and Charles K. Fisher. Standard
|
1112 |
+
machine learning approaches outperform deep representation learning on phenotype prediction from transcrip-
|
1113 |
+
tomics data. BMC Bioinformatics, 21(1):119, dec 2020.
|
1114 |
+
[14] Vadim Borisov, Tobias Leemann, Kathrin Seßler, Johannes Haug, Martin Pawelczyk, and Gjergji Kasneci. Deep
|
1115 |
+
Neural Networks and Tabular Data: A Survey. arXiv preprint arXiv:2110.01889, oct 2021.
|
1116 |
+
[15] Arlind Kadra, Marius Lindauer, Frank Hutter, and Josif Grabocka. Well-tuned simple nets excel on tabular
|
1117 |
+
datasets. Advances in neural information processing systems, 34:23928–23941, 2021.
|
1118 |
+
[16] Ravid Shwartz-Ziv and Amitai Armon. Tabular data: Deep learning is not all you need. Information Fusion,
|
1119 |
+
81:84–90, may 2022.
|
1120 |
+
[17] Laurens Van Der Maaten and Geoffrey Hinton. Visualizing data using t-SNE. Journal of Machine Learning
|
1121 |
+
Research, 9:2579–2625, 2008.
|
1122 |
+
[18] Liang Duan, Charu Aggarwal, Shuai Ma, and Saket Sathe. Improving spectral clustering with deep embed-
|
1123 |
+
ding and cluster estimation.
|
1124 |
+
Proceedings - IEEE International Conference on Data Mining, ICDM, 2019-
|
1125 |
+
Novem(Icdm):170–179, 2019.
|
1126 |
+
[19] Sean T. Yang, Kuan Hao Huang, and Bill Howe. JECL: Joint embedding and cluster learning for image-text
|
1127 |
+
pairs. Proceedings - International Conference on Pattern Recognition, pages 8344–8351, 2020.
|
1128 |
+
[20] Kamran Ghasedi Dizaji, Amirhossein Herandi, Cheng Deng, Weidong Cai, and Heng Huang. Deep Clustering
|
1129 |
+
via Joint Convolutional Autoencoder Embedding and Relative Entropy Minimization. In Proceedings of the
|
1130 |
+
IEEE International Conference on Computer Vision, volume 2017-Octob, pages 5747–5756, 2017.
|
1131 |
+
[21] Rui Zhang, Yinglong Xia, Hanghang Tong, and Yada Zhu. Robust embedded deep K-means clustering. Interna-
|
1132 |
+
tional Conference on Information and Knowledge Management, Proceedings, pages 1181–1190, 2019.
|
1133 |
+
[22] Yazhou Ren, Kangrong Hu, Xinyi Dai, Lili Pan, Steven C.H. Hoi, and Zenglin Xu.
|
1134 |
+
Semi-supervised deep
|
1135 |
+
embedded clustering. Neurocomputing, 325:121–130, jan 2019.
|
1136 |
+
[23] Joseph Enguehard, Peter O’Halloran, and Ali Gholipour. Semi-supervised learning with deep embedded cluster-
|
1137 |
+
ing for image classification and segmentation. IEEE Access, 7:11093–11104, 2019.
|
1138 |
+
[24] Lirong Wu, Lifan Yuan, Guojiang Zhao, Haitao Lin, and Stan Z. Li. Deep Clustering and Visualization for End-
|
1139 |
+
to-End High-Dimensional Data Analysis. IEEE Transactions on Neural Networks and Learning Systems, pages
|
1140 |
+
1–12, 2022.
|
1141 |
+
[25] Dheeru Dua and Casey Graff. UCI machine learning repository, 2017.
|
1142 |
+
[26] Raisul Arefin, Manar D. Samad, Furkan A. Akyelken, and Arash Davanian. Non-transfer Deep Learning of
|
1143 |
+
Optical Coherence Tomography for Post-hoc Explanation of Macular Disease Classification. In 2021 IEEE 9th
|
1144 |
+
International Conference on Healthcare Informatics (ICHI), pages 48–52. IEEE, aug 2021.
|
1145 |
+
[27] Sakib Abrar and Manar D. Samad. Are deep image embedding clustering methods effective for heterogeneous
|
1146 |
+
tabular data? (arXiv:2212.14111), 2022.
|
1147 |
+
[28] Xi Peng, Shijie Xiao, Jiashi Feng, Wei-Yun Yau, and Zhang Yi. Deep subspace clustering with sparsity prior.
|
1148 |
+
In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI’16, page
|
1149 |
+
1925–1931. AAAI Press, 2016.
|
1150 |
+
[29] Fei Tian, Bin Gao, Qing Cui, Enhong Chen, and Tie-Yan Liu. Learning deep representations for graph clustering.
|
1151 |
+
Proceedings of the AAAI Conference on Artificial Intelligence, 28(1), Jun. 2014.
|
1152 |
+
[30] H. W. Kuhn. The hungarian method for the assignment problem. Naval Research Logistics Quarterly, 2:83–97,
|
1153 |
+
3 1955.
|
1154 |
+
[31] Pablo A. Est´evez, Michel Tesmer, Claudio A. Perez, and Jacek M. Zurada. Normalized mutual information
|
1155 |
+
feature selection. IEEE Transactions on Neural Networks, 20:189–201, 2009.
|
1156 |
+
12
|
1157 |
+
|
GNAyT4oBgHgl3EQf5Pq2/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|