jackkuo commited on
Commit
fb54c55
·
verified ·
1 Parent(s): 88700d5

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -9FQT4oBgHgl3EQf7Ta5/vector_store/index.faiss +3 -0
  2. -NE1T4oBgHgl3EQfCgJv/content/tmp_files/2301.02865v1.pdf.txt +625 -0
  3. -NE1T4oBgHgl3EQfCgJv/content/tmp_files/load_file.txt +0 -0
  4. .gitattributes +58 -0
  5. 0NAyT4oBgHgl3EQfbfc0/content/2301.00262v1.pdf +3 -0
  6. 0dAzT4oBgHgl3EQfRPuW/vector_store/index.faiss +3 -0
  7. 0dFAT4oBgHgl3EQfCRwI/content/2301.08408v1.pdf +3 -0
  8. 0dFAT4oBgHgl3EQfCRwI/vector_store/index.faiss +3 -0
  9. 0dFAT4oBgHgl3EQfCRwI/vector_store/index.pkl +3 -0
  10. 1NFST4oBgHgl3EQfWTh0/content/tmp_files/2301.13780v1.pdf.txt +0 -0
  11. 1NFST4oBgHgl3EQfWTh0/content/tmp_files/load_file.txt +0 -0
  12. 1dE3T4oBgHgl3EQfnQrW/content/tmp_files/2301.04624v1.pdf.txt +0 -0
  13. 1dE3T4oBgHgl3EQfnQrW/content/tmp_files/load_file.txt +0 -0
  14. 1dFKT4oBgHgl3EQfOy1w/vector_store/index.faiss +3 -0
  15. 49E0T4oBgHgl3EQfvgE1/content/2301.02618v1.pdf +3 -0
  16. 49E0T4oBgHgl3EQfvgE1/vector_store/index.faiss +3 -0
  17. 4dAyT4oBgHgl3EQf2Pkf/vector_store/index.faiss +3 -0
  18. 4tAyT4oBgHgl3EQfQPYV/content/tmp_files/2301.00039v1.pdf.txt +981 -0
  19. 4tAyT4oBgHgl3EQfQPYV/content/tmp_files/load_file.txt +0 -0
  20. 59E0T4oBgHgl3EQfewCK/vector_store/index.faiss +3 -0
  21. 5tFJT4oBgHgl3EQfkyzq/content/tmp_files/2301.11581v1.pdf.txt +1187 -0
  22. 5tFJT4oBgHgl3EQfkyzq/content/tmp_files/load_file.txt +0 -0
  23. 6NE3T4oBgHgl3EQfpgqP/content/tmp_files/2301.04643v1.pdf.txt +794 -0
  24. 6NE3T4oBgHgl3EQfpgqP/content/tmp_files/load_file.txt +0 -0
  25. 8NAzT4oBgHgl3EQfE_qO/content/tmp_files/2301.01003v1.pdf.txt +867 -0
  26. 8NAzT4oBgHgl3EQfE_qO/content/tmp_files/load_file.txt +0 -0
  27. 8NAzT4oBgHgl3EQfSPtl/content/tmp_files/2301.01229v1.pdf.txt +340 -0
  28. 8NAzT4oBgHgl3EQfSPtl/content/tmp_files/load_file.txt +226 -0
  29. 8dE5T4oBgHgl3EQfQg7H/content/tmp_files/2301.05514v1.pdf.txt +383 -0
  30. 8dE5T4oBgHgl3EQfQg7H/content/tmp_files/load_file.txt +281 -0
  31. 99AyT4oBgHgl3EQfRPYW/content/2301.00060v1.pdf +3 -0
  32. 99AyT4oBgHgl3EQfRPYW/vector_store/index.faiss +3 -0
  33. 9NAzT4oBgHgl3EQfSft5/content/2301.01233v1.pdf +3 -0
  34. 9NAzT4oBgHgl3EQfSft5/vector_store/index.pkl +3 -0
  35. 9NFRT4oBgHgl3EQfqTc6/vector_store/index.faiss +3 -0
  36. 9tAzT4oBgHgl3EQfSvsB/content/2301.01235v1.pdf +3 -0
  37. 9tAzT4oBgHgl3EQfSvsB/vector_store/index.pkl +3 -0
  38. AtE0T4oBgHgl3EQfxwIb/vector_store/index.pkl +3 -0
  39. B9FRT4oBgHgl3EQfvjiF/vector_store/index.pkl +3 -0
  40. C9E2T4oBgHgl3EQfSAeL/vector_store/index.pkl +3 -0
  41. D9E1T4oBgHgl3EQfqQU2/vector_store/index.pkl +3 -0
  42. ENAyT4oBgHgl3EQf4vqx/content/2301.00793v1.pdf +3 -0
  43. ENAyT4oBgHgl3EQf4vqx/vector_store/index.faiss +3 -0
  44. ENAyT4oBgHgl3EQf4vqx/vector_store/index.pkl +3 -0
  45. EdE4T4oBgHgl3EQf6g7g/content/tmp_files/2301.05333v1.pdf.txt +2754 -0
  46. EdE4T4oBgHgl3EQf6g7g/content/tmp_files/load_file.txt +0 -0
  47. F9E0T4oBgHgl3EQfzQJ7/content/2301.02670v1.pdf +3 -0
  48. F9E0T4oBgHgl3EQfzQJ7/vector_store/index.pkl +3 -0
  49. GNAyT4oBgHgl3EQf5Pq2/content/tmp_files/2301.00802v1.pdf.txt +1157 -0
  50. GNAyT4oBgHgl3EQf5Pq2/content/tmp_files/load_file.txt +0 -0
-9FQT4oBgHgl3EQf7Ta5/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e8e425b54c1fd54fe9442c5c2227e662af06d01200f56a473c31922829e1ad02
3
+ size 7471149
-NE1T4oBgHgl3EQfCgJv/content/tmp_files/2301.02865v1.pdf.txt ADDED
@@ -0,0 +1,625 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02865v1 [astro-ph.SR] 7 Jan 2023
2
+ Draft version January 10, 2023
3
+ Typeset using LATEX default style in AASTeX631
4
+ Highly Energetic Electrons Accelerated in Strong Solar Flares as a Preferred Driver of Sunquakes
5
+ H. Wu,1 Y. Dai,1, 2 and M. D. Ding1, 2
6
+ 1School of Astronomy and Space Science, Nanjing University, Nanjing 210023, People’s Republic of China
7
+ 2Key Laboratory of Modern Astronomy and Astrophysics (Nanjing University), Ministry of Education, Nanjing 210023, People’s Republic
8
+ of China
9
+ ABSTRACT
10
+ Sunquakes are enhanced seismic waves excited in some energetic solar flares. Up to now, their origin
11
+ has still been controversial. In this Letter, we select and study 20 strong flares in Solar Cycle 24,
12
+ whose impulse phase is fully captured by the Reuven Ramaty High Energy Solar Spectroscopic Imager
13
+ (RHESSI ). For 11 out of 12 sunquake-active flares in our sample, the hard X-ray (HXR) emission shows
14
+ a good temporal and spatial correlation with the white-light (WL) enhancement and the sunquake.
15
+ Spectral analysis also reveals a harder photon spectrum that extends to several hundred keV, implying
16
+ a considerable population of flare-accelerated nonthermal electrons at high energies. Quantitatively,
17
+ the total energy of electrons above 300 keV in sunquake-active flares is systematically different from
18
+ that in sunquake-quiet flares, while the difference is marginal for electrons above 50 keV. All these
19
+ facts support highly energetic electrons as a preferred driver of the sunquakes. Such an electron-driven
20
+ scenario can be reasonably accommodated in the framework of a recently proposed selection rule for
21
+ sunquake generation. For the remaining one event, the sunquake epicenter is cospatial with a magnetic
22
+ imprint, i.e., a permanent change of magnetic field on the photosphere. Quantitative calculation shows
23
+ that the flare-induced downward Lorentz force can do enough work to power the sunquake, acting as
24
+ a viable sunquake driver for this specific event.
25
+ Keywords: Solar flares (1496), Solar flare spectra (1982), Solar particle emission (1517), Helioseismol-
26
+ ogy (709), Solar x-ray flares (1816), Solar white-light flares (1983)
27
+ 1. INTRODUCTION
28
+ It is believed that solar flares are a result of rapid release of free magnetic energy stored in the solar corona.
29
+ Through magnetic reconnection, the magnetic energy is converted to a variety of forms, which are transported both
30
+ upward to the interplanetary space and downward to the solar lower atmosphere.
31
+ In some energetic flares, the
32
+ flare-powered perturbations can reach the dense photosphere to enhance the local helioseismic waves, which further
33
+ penetrate through the solar interior and get reflected back to the photosphere, termed as “sunquakes” (Wolff 1972).
34
+ The first sunquake observation was reported in Kosovichev & Zharkova (1998), where the wave signature is manifested
35
+ as circular “ripples” in Dopplergrams. Since then, more and more such sunquake events have been discovered (e.g.,
36
+ Donea et al. 1999; Kosovichev 2006; Zharkov et al. 2011).
37
+ Up to now, the origin of sunquakes has still been controversial. Several categories of driving mechanisms have been
38
+ proposed. The first category assumes flare-accelerated particles as the driver of sunquakes. The sunquakes are excited
39
+ either by direct impact of the energetic particles on the photosphere (Kosovichev & Zharkova 1998; Kosovichev 2007;
40
+ Zharkova & Zharkov 2007; Kosovichev 2006; Zharkova 2008), or due to pressure pulse from the heated chromosphere
41
+ by thick-target bremsstrahlung of the nonthermal electrons (Donea et al. 2006a; Lindsey & Donea 2008). This scenario
42
+ is analogous to the mechanism for white-light flares (WLFs) of type I (Hudson 1972; Chen & Ding 2005, 2006), and
43
+ is supported by a good correlation between the sunquake source, white-light (WL) enhancement, and hard X-ray
44
+ (HXR) emission revealed in many observations (Buitrago-Casas et al. 2015). In another category, it is assumed that a
45
+ Corresponding author: Y. Dai
46
47
+
48
+ 2
49
+ Wu et al.
50
+ downward Lorentz force resulting from abrupt and permanent changes of the photospheric magnetic field, which often
51
+ occur in strong flares (Sudol & Harvey 2005; Petrie & Sudol 2010; Fisher et al. 2012; Sun et al. 2017), can act as a
52
+ sunquake driver (Hudson et al. 2008; Fisher et al. 2012).
53
+ It has been shown that sunquakes tend to occur in strong flares (Sharykin & Kosovichev 2020). Nevertheless, only
54
+ a fraction of strong flares can produce a sunquake. Based on a statistical study of major flares in Solar Cycle 24
55
+ observed by the Solar Dynamics Observatory (SDO; Pesnell et al. 2012) mission, Chen & Zhao (2021, hereafter CZ21)
56
+ proposed a selection rule for sunquake generation: a sunquake is more likely to occur when the photosphere shows a
57
+ net downward oscillatory velocity. In such a case, the photospheric oscillation can be amplified by the in-phase flare-
58
+ excited impulse, facilitating the generation of a sunquake. Otherwise, the background oscillation should be weakened
59
+ instead. This may explain the relative rarity of sunquakes in real observations.
60
+ The selection role proposed by CZ21 provides a promising explanation for the occurrence rate of sunquakes. However,
61
+ the detailed mechanisms for sunquake generation are still poorly understood without resorting to other complementary
62
+ observations. In this Letter, we further include HXR imaging and spectroscopic data to the sample sunquakes analyzed
63
+ by CZ21, mainly focusing on the possible role of flare-accelerated electrons in producing the sunquakes.
64
+ 2. INSTRUMENTS AND DATASET
65
+ The data used in this study mainly come from the Helioseismic and Magnetic Imager (HMI; Schou et al. 2012)
66
+ on board SDO and the Reuven Ramaty High Energy Solar Spectroscopic Imager (RHESSI ; Lin et al. 2002). HMI
67
+ measures full-disk Stokes profiles of the Fe I 6173 ˚A line with a pixel size of 0.5′′ and cadence of 45 s, from which data
68
+ products such as the continuum intensity (Ic), Doppler velocity, and vector magnetic field of the photosphere can be
69
+ derived. RHESSI is designed for imaging and spectroscopic observations of the Sun in X-rays and γ-rays. Using a
70
+ rotation modulation of nine detectors with a 4s period, the spacecraft achieves a spatial resolution as high as 2.3′′ and
71
+ spectral solution of 1–10 keV over an energy range from 3 keV to 17 MeV.
72
+ We start from the sample of events originally compiled in CZ21, which includes the strongest 60 flares in Solar Cycle
73
+ 24 that occur within 75◦ in longitude. This yields a lower limit of M6.3 in GOES soft X-ray (SXR) class for the
74
+ candidate flares. As revealed in the HMI Ic images, all of the flares are strong enough to exhibit a distinguishable WL
75
+ emission enhancement, indicative of WLFs with the potential to produce sunquakes. Furthermore, the flare locations
76
+ not too close to the limb ensure that the parameters of the possible sunquakes can be credibly derived from the
77
+ reconstructed HMI egression power maps.
78
+ To investigate the possible role of flare-accelerated electrons in generating sunquakes, we focus on flares whose
79
+ impulsive phase is fully captured by RHESSI. We need to apply such an additional selection criterion since RHESSI
80
+ observations are routinely affected by orbit night and/or other gaps. Doing so reduces the original sample to 20 flare
81
+ events, of which 12 flares are in association with at least one sunquake, while the remaining 8 ones are seismically
82
+ quiet. If there are more than one sunquake events in a sunquake-active flare, we consider the most energetic one,
83
+ which is usually significantly stronger than the others. The general information of the flares under study, as well as
84
+ their characteristics to be quantified in the following analysis, are listed in Table 1. Here the sunquake information
85
+ is adopted from CZ21. We note that all but one (associated with the 2011 August 9 X6.9 flare, No. 4) sunquakes in
86
+ our list show a net downward oscillatory velocity (in either the 3–5 mHz frequency band or the 5-7 mHz one, or both)
87
+ during the flare impulsive phase.
88
+ 3. ANALYSIS AND RESULTS
89
+ Figure 1 depicts the WL and X-ray observations of a typical sunquake-active flare that occurred on 2012 October
90
+ 23 (No. 7) in NOAA active region 11598. The event has been extensively studied in the literature (e.g., Yang et al.
91
+ 2015; Sharykin et al. 2017; Watanabe & Imada 2020), and was also selected as a typical example presented in CZ21.
92
+ According to the GOES 1–8 ˚A light curve (blue) plotted in Figure 1(a), the SXR flare starts at 03:14 UT, promptly
93
+ rises to its peak at 03:17 UT, and ends at 03:21 UT, registered as an X1.8-class flare. The HXR emission of the
94
+ flare, as revealed from the RHESSI 50–100 keV count rate (red line in Figure 1(a)), exhibits an even more impulsive
95
+ increase and peaks at around 03:16 UT, slightly earlier than the SXR emission, which implies that the “Neupert effect”
96
+ (Neupert 1968) applies to this flare. It is also seen that the flare WL emission, which is proxied by the HMI continuum
97
+ intensity (black line with triangle symbols in Figure 1(a)) summed over the main flaring region (dashed box in Figure
98
+ 1(b)), shows a nearly synchronous enhancement with the HXR emission before reaching its maximum at 03:16:15 UT.
99
+ After then, the WL emission turns to a relatively gradual decay in comparison with the precipitous drop in HXR
100
+ emission.
101
+
102
+ ENERGETIC ELECTRONS AS A DRIVER OF SUNQUAKES
103
+ 3
104
+ As shown in Figure 1(b), the WL enhancement at the peak is predominately manifested as two quasi-parallel flare
105
+ ribbons. Here, for clarity of viewing, we subtract a pre-flare image from the image at the flaring time to highlight the
106
+ WL enhancement, and plot the base-difference map in an inverse color scale where dark features indicate brightening.
107
+ When overplotting a simultaneous RHESSI image at 50–100 keV (red contours) on the HMI WL map, it is seen that
108
+ the HXR source well covers the WL ribbons, although the former seems more diffuse. According to Yang et al. (2015),
109
+ the WL ribbons correspond to the western segments of a pair of inner/outer circular ribbons that outline the base of
110
+ a fan-spine topology, while the HXR source is located around the south footpoint of a magnetic flux rope embedded
111
+ under the fan dome. The close temporal and spatial correlation between the WL and HXR emissions indicates that
112
+ this event belongs to a type I WL flare, in which the WL emission originates from the layers heated by a direct electron
113
+ bombardment and/or the following backwarming effect (Hudson 1972; Chen & Ding 2005, 2006; Hao et al. 2012).
114
+ For this sunquake-active flare, we also mark out the location of the sunquake epicenter (green asterisk in Figure 1(b)).
115
+ As CZ21 have verified a tight correlation between the WL enhancement and sunquake excitation, our complementary
116
+ HXR observations strongly suggest the same electron-driven scenario for the sunquake generation as that for the WL
117
+ enhancement in this flare (Sharykin et al. 2017; Watanabe & Imada 2020). By checking other sunquake events, we
118
+ find that all but one (the 2011 August 9 X6.9 flare, No. 4) of the sunquakes in our list show a good correlation with the
119
+ HXR emission both temporally and spatially, which further corroborates nonthermal electrons as a preferred driver of
120
+ the sunquakes.
121
+ To further quantify the energetics of flare-accelerated electrons, we fit the RHESSI spectra during the whole flare
122
+ impulsive phase (listed in Table 1) using the Object Spectral Executive (OSPEX) package. First, we divide the impul-
123
+ sive phase into several time intervals, each of which has a duration of 20 s. Then we use a thick-target bremsstrahlung
124
+ model (thick2), which assumes a broken power-law distribution of the flare-accelerated nonthermal electrons, plus a
125
+ single-temperature thermal model (vth) to perform the spectral fitting for each individual interval. Since we are only
126
+ concerned with nonthermal properties, the thermal component is introduced just to better constrain the low-energy
127
+ cutoff (Ec) of the nonthermal electrons. Therefore, the lower limit of the energy range for fitting is fixed at 10 keV to
128
+ exclude the Fe/Ni emission lines at ∼6.7 keV, which permits a simplification of the thermal component fitting by only
129
+ varying the temperature and emission measure while keeping the elemental abundance unchanged. On the other end,
130
+ the upper limit is determined such that the photon flux at that energy starts to drop below the background level.
131
+ Figure 2(a) shows the RHESSI spectrum around the HXR peak of the 2012 October 23 flare, as well as the spectral
132
+ fitting results. It is seen that the photon flux at 30 keV is as high as 68.9 photon s−1 cm−2 keV−1, among the typical
133
+ values observed in WLFs (Kuhar et al. 2016; Hao et al. 2017). More importantly, the flux keeps above the background
134
+ level until 400 keV, indicative of a significant fraction of electrons accelerated to very high energies. We note that this
135
+ is a common spectral feature for the sunquake-active flares. The spectral fitting reveals power-law indices of 3.96 and
136
+ 3.42 for the nonthermal electrons below and above a break energy of 461 keV, respectively, reflecting a hardening of
137
+ the spectra toward higher energies.
138
+ For comparison, we also present in Figures 2(b) and (c) the spectra of the other two flares that are of similar GOES
139
+ classes but without sunquakes. For these sunquake-quiet flares, the photon flux at 30 keV is comparable to that for the
140
+ sunquake-active events. Toward higher energies, however, the HXR spectrum shows diverse variations either becoming
141
+ very soft such that the flux quickly drops below the background (the 2014 October 27 X2.0 flare, No. 18), or still
142
+ behaving like that of the sunquake-active events (the 2011 September 24 X1.9 flare, No. 6). Obviously, the diverse
143
+ spectral patterns imply that the population of high energy electrons in sunquake-quiet flares can be distinctly different
144
+ from case to case.
145
+ Based on the spectral fitting, we evaluate the total energy of nonthermal electrons using the integral
146
+ E =
147
+ ��
148
+ εF(ε, t) dεdt,
149
+ (1)
150
+ where ε is the electron energy and F(ε, t) the fitted electron spectrum. The integration with respect to time is done
151
+ over the entire flare impulsive phase. As to the energy range for integration, we adopt fixed lower limits regardless of
152
+ the variable low-energy cutoffs derived from actual flares. Here we calculate the total energies of the electrons above 50
153
+ keV (E50) and that above 300 keV (E300), which characterize the energetics of mildly and highly energetic electrons,
154
+ respectively.
155
+ Figure 3 displays the histograms of E50 (left) and E300 (right) for the flares with (upper) and without (lower)
156
+ sunquakes, respectively. Note that we exclude the 2011 August 9 sunquake-active flare in which the sunquake originates
157
+ in a different place from that for the nonthermal electrons. It is found that the distribution of E50 for sunquake-active
158
+
159
+ 4
160
+ Wu et al.
161
+ flares shows no significant difference from that for sunquake-quiet flares; both distributions span over a similar energy
162
+ range and peak at 1029.5–1030 erg (Figures 3(a) and (b)). Nevertheless, a systematic difference is seen in the distribution
163
+ of E300. The E300 value for the flares with sunquakes varies in a relatively narrow range, and is dominantly restricted
164
+ to a magnitude of 1027–1028 erg (Figure 3(c)), which is comparable to the estimated energy of sunquakes reported in
165
+ previous studies (Donea et al. 2006b; Chen & Zhao 2021). By contrast, the value of E300 for the sunquake-quiet flares
166
+ seems more scattered, which is either comparable to that for the sunquake-active flares, or several orders of magnitude
167
+ lower (Figure 3(d)). Such a bimodal distribution can be expected from the spectral fitting for the sunquake-quiet flares
168
+ shown in Figure 2.
169
+ We also calculate the corresponding electron power, which is obtained by dividing the total electron energy by the
170
+ duration of impulsive phase. As shown in Table 1, the length of impulsive phase just varies in a narrow range of 60–120
171
+ s from event to event. It is found that the distributions of the electron power (not shown here) are nearly the same as
172
+ those shown in Figure 3.
173
+ The above statistical result implies that the generation of the sunquakes is more relevant to highly energetic electrons
174
+ rather than electrons at moderate energies. However, the latter is more likely to be responsible for the enhancement of
175
+ WL emission. Furthermore, the electron-driven scenario for sunquakes can be reasonably accommodated in the frame
176
+ of the selection rule proposed by CZ21. In addition to being in phase with the background oscillation, the downward
177
+ electron beam should contain enough highly accelerated electrons in order to efficiently perturb the photosphere and
178
+ deep layers to produce a sunquake. As for the sunquake-quiet flares, however, either the electron-driven impulse is too
179
+ weak (e.g., the 2014 October 27 X2.0 flare shown in Figure 2(b)), or the impulse is out of phase with the background
180
+ oscillation (e.g., the 2011 September 24 X1.9 flare flare shown in Figure 2(c)), thus unable to generate a sunquake.
181
+ This is also the reason why the distribution of E300 is more scattered for the flares without sunquakes.
182
+ Among all the sunquake-active events, the 2011 August 9 flare is an exception in that its sunquake epicenter is
183
+ spatially offset with the HXR source, which requires an alternative explanation for the sunquake generation. Previous
184
+ observations have shown that some major solar flares can leave magnetic imprints (MIs) on the photosphere, which are
185
+ manifested as rapid and irreversible changes of the photospheric magnetic field (Lu et al. 2019). During this process,
186
+ the photospheric magnetic field becomes more horizontal, producing a downward Lorentz force on the photosphere
187
+ that possibly drives a sunquake (Hudson et al. 2008). In the following, we test the possibility of flare-induced Lorentz
188
+ force as the sunquake driver for this specific event.
189
+ To depict the MIs accurately, we use Space-weather HMI Active Region Patch (SHARP; Bobra et al. 2014) products,
190
+ whose data pipeline includes a remapping of the magnetic field vector in a cylindrical equal-area (CEA) projection.
191
+ The three components of the SHARP magnetic field vector are represented by Br (radial), Bp (southward), and Bt
192
+ (westward), respectively, from which the magnitude of the horizontal magnetic field is derived as Bh =
193
+
194
+ B2p + B2
195
+ t .
196
+ Since the flare-induced magnetic field change is mainly reflected in an increase of the horizontal magnetic field, we use
197
+ regions where δBh exceeds a threshold (e.g., 300 G) to approximate the spatial extent of MIs (cf. Lu et al. 2019).
198
+ We plot in Figure 4(a) the locations of the MIs (orange plus yellow contours), HXR source (red contours), and
199
+ sunquake epicenter (green asterisk) for the 2011 August 9 flare, which are overlaid on the corresponding HMI continuum
200
+ map. As shown in the figure, the MIs appear patch-like, and are located predominately in the vicinity of or over the
201
+ polarity inversion line (PIL) of SHARP Br, consistent with many previous observations (e.g., Petrie 2012, 2013;
202
+ Wang et al. 2012a,b; Sun et al. 2012). The sunquake epicenter lies exactly in a southern MI (distinguished with the
203
+ other MIs in yellow contours) but distant from the HXR source, which does suggest a Lorentz force-driven origin of
204
+ the sunquake.
205
+ Compared with other MIs, the sunquake-related MI is located in an isolated region near the far end of the PIL,
206
+ where the background magnetic field is relatively weaker than that in the AR core. In addition, it appears neither
207
+ too diffuse nor too compact. These facts may reflect necessary physical conditions for an MI to generate sunquakes.
208
+ Nevertheless, without other observations of such MI-related sunquakes our argument is not conclusive.
209
+ Quantitatively, we use the equation
210
+ δF = 1
211
+
212
+
213
+ Aph
214
+ (δB2
215
+ r − δB2
216
+ h) dA
217
+ (2)
218
+ to calculate the Lorentz force δF over this sunquake-related MI (Hudson et al. 2008). When considering an MI area
219
+ of Aph = 1.3 × 1017 cm2 surrounding the sunquake epicenter if we select a threshold of δBh = 300 G (enclosed by the
220
+ outermost yellow contour), the resultant downward Lorentz force on this area is 1.2 × 1022 dyne. By further assuming
221
+ a displacement of 3 km that the Lorentz force pushes the photosphere downward (cf. Hudson et al. 2008), we derive
222
+
223
+ ENERGETIC ELECTRONS AS A DRIVER OF SUNQUAKES
224
+ 5
225
+ a work of 3.8 × 1027 erg done by the Lorentz force, which is close to the sunquake energy for this event estimated in
226
+ CZ21. Compared with the impulsive perturbation by energetic electrons, the MI-induced Lorentz force should act on
227
+ the photosphere in a much more gentle manner. We note that this sunquake event presents a nearly zero net oscillatory
228
+ velocity in contrast to the other events.
229
+ Finally we present the corresponding observations of the 2012 October 23 event in Figure 4(b) for comparison.
230
+ Although the MIs in this flare still gather along the PIL, the sunquake epicenter shows an offset with respect to the
231
+ MIs in spite of a significant line-shortening due to a close-to-the-limb location of the flare. Instead, the sunquake site
232
+ should be located in the inner circular flare ribbon.
233
+ 4. DISCUSSION AND CONCLUSION
234
+ In this Letter, we make a statistical study on sunquake generation using a sample of 20 strong solar flares that have a
235
+ full RHESSI coverage of the impulsive phase. For 11 out of 12 sunquake-active flares in our sample, the HXR emission
236
+ shows a good temporal and spatial correlation with the WL enhancement and the sunquake. Spectral analysis also
237
+ reveals a hard photon spectrum in which the photon flux is well above the background level until several hundred keV,
238
+ implying a significant population of flare-accelerated nonthermal electrons at high energies. Furthermore, the total
239
+ energies of electrons above 300 keV in sunquake-active flares are systematically different from those of sunquake-quiet
240
+ flares, while the difference is marginal for energies above 50 keV. All these facts support highly energetic electrons as a
241
+ preferred driver of the sunquakes. Besides the selection rule proposed in CZ21, i.e., the flare-induced impulsive heating
242
+ should be in phase with a downward background oscillation, a strong electron beam with in particular a significant
243
+ fraction of energy residing in highly energetic electrons should serve as another necessary condition for the sunquake
244
+ generation. If either of the two conditions is broken down, a sunquake is not likely to occur.
245
+ According to Neidig (1989), only electrons above an energy of ∼900 keV can penetrate to the photosphere. Nev-
246
+ ertheless, in a flaring atmosphere, the ionization, condensation, and evaporation of plasma may mitigate the energy
247
+ requirement for the electrons to reach such depths (Watanabe & Imada 2020). In this meaning, the electron-driven
248
+ sunquakes in our sample could be excited by the direct impact of extremely energetic electrons on the photosphere
249
+ (Kosovichev & Zharkova 1998; Kosovichev 2007; Zharkova & Zharkov 2007; Kosovichev 2006; Zharkova 2008). Nev-
250
+ ertheless, it is also possible that the pressure pulse from the heated chromosphere by less energetic electrons plays a
251
+ part role(Donea et al. 2006a; Lindsey & Donea 2008). Without sophisticated radiative hydrodynamic modeling, we
252
+ do not intend to clarify the quantitative contributions of these mechanisms for the sunquake generation, which should
253
+ be case-dependent.
254
+ There is also an exceptional event (the 2011 August 9 sunquake) in our sample, whose sunquake epicenter is cospatial
255
+ with an MI instead of the HXR source. We calculate the Lorentz force due to a permanent change of the photospheric
256
+ magnetic field over this MI, and estimate the work done by the downward Lorentz force. The quantitative analysis
257
+ shows that the magnetic reconfiguration can provide enough energy to power the sunquake. Therefore, although we
258
+ suggest highly energetic electrons as a main driver of sunquakes, we do not rule out the role of flare-induced Lorentz
259
+ force in some specific events (Hudson et al. 2008; Fisher et al. 2012).
260
+ The properties (location and oscillatory velocity) of the electron-driven sunquakes seem different from those of the
261
+ MI-related sunquake. Actually, we have checked all electron-driven sunquake events in Table 1, none of which shows
262
+ a spatial correspondence with an MI region. Whether it is of physical significance or just a coincidence, we need more
263
+ observations to address this issue.
264
+ This study only covers a sample of 20 events satisfying our selection criteria that the RHESSI era can provide. In
265
+ order to reach a more conclusive result, more events are required. RHESSI has been decommissioned since 2018.
266
+ Fortunately, we can make use of imaging and spectroscopic observations with the Spectrometer/Telescope for Imaging
267
+ X-rays (STIX) on board the newly launched Solar Orbiter (SolO) mission (Krucker et al. 2020) and the Hard X-ray
268
+ Imager (HXI) on board the upcoming Advanced Space-based Solar Observatory (ASO-S) emission (Zhang et al. 2019).
269
+ These new observational facilities will help us better understand the origin of sunquakes.
270
+ We are grateful to the anonymous referee for his/her insightful comments and suggestions, which led to a signifi-
271
+ cant improvement of the manuscript. This work was supported by National Natural Science Foundation of China
272
+ under grants 11733003 and 12127901. Y.D. is also sponsored by National Key R&D Program of China under grants
273
+ 2019YFA0706601 and 2020YFC2201201. SDO is a mission of NASA’s Living With a Star (LWS) program.
274
+
275
+ 6
276
+ Wu et al.
277
+ REFERENCES
278
+ Bobra, M. G., Sun, X., Hoeksema, J. T., et al. 2014, SoPh,
279
+ 289, 3549, doi: 10.1007/s11207-014-0529-3
280
+ Buitrago-Casas, J. C., Mart´ınez Oliveros, J. C., Lindsey,
281
+ C., et al. 2015, SoPh, 290, 3151,
282
+ doi: 10.1007/s11207-015-0786-9
283
+ Chen, Q. R., & Ding, M. D. 2005, ApJ, 618, 537,
284
+ doi: 10.1086/425856
285
+ —. 2006, ApJ, 641, 1217, doi: 10.1086/500635
286
+ Chen, R., & Zhao, J. 2021, ApJ, 908, 182,
287
+ doi: 10.3847/1538-4357/abd240
288
+ Donea, A. C., Besliu-Ionescu, D., Cally, P., & Lindsey, C.
289
+ 2006a, in Astronomical Society of the Pacific Conference
290
+ Series, Vol. 354, Solar MHD Theory and Observations: A
291
+ High Spatial Resolution Perspective, ed. J. Leibacher,
292
+ R. F. Stein, & H. Uitenbroek, 204
293
+ Donea, A. C., Besliu-Ionescu, D., Cally, P. S., Lindsey, C.,
294
+ & Zharkova, V. V. 2006b, SoPh, 239, 113,
295
+ doi: 10.1007/s11207-006-0108-3
296
+ Donea, A. C., Braun, D. C., & Lindsey, C. 1999, ApJL,
297
+ 513, L143, doi: 10.1086/311915
298
+ Fisher, G. H., Bercik, D. J., Welsch, B. T., & Hudson, H. S.
299
+ 2012, SoPh, 277, 59, doi: 10.1007/s11207-011-9907-2
300
+ Hao, Q., Guo, Y., Dai, Y., et al. 2012, A&A, 544, L17,
301
+ doi: 10.1051/0004-6361/201219941
302
+ Hao, Q., Yang, K., Cheng, X., et al. 2017, Nature
303
+ Communications, 8, 2202,
304
+ doi: 10.1038/s41467-017-02343-0
305
+ Hudson, H. S. 1972, SoPh, 24, 414,
306
+ doi: 10.1007/BF00153384
307
+ Hudson, H. S., Fisher, G. H., & Welsch, B. T. 2008, in
308
+ Astronomical Society of the Pacific Conference Series,
309
+ Vol. 383, Subsurface and Atmospheric Influences on Solar
310
+ Activity, ed. R. Howe, R. W. Komm, K. S.
311
+ Balasubramaniam, & G. J. D. Petrie, 221
312
+ Kosovichev, A. G. 2006, SoPh, 238, 1,
313
+ doi: 10.1007/s11207-006-0190-6
314
+ —. 2007, ApJL, 670, L65, doi: 10.1086/524036
315
+ Kosovichev, A. G., & Zharkova, V. V. 1998, Nature, 393,
316
+ 317, doi: 10.1038/30629
317
+ Krucker, S., Hurford, G. J., Grimm, O., et al. 2020, A&A,
318
+ 642, A15, doi: 10.1051/0004-6361/201937362
319
+ Kuhar, M., Krucker, S., Mart´ınez Oliveros, J. C., et al.
320
+ 2016, ApJ, 816, 6, doi: 10.3847/0004-637X/816/1/6
321
+ Lin, R. P., Dennis, B. R., Hurford, G. J., et al. 2002, SoPh,
322
+ 210, 3, doi: 10.1023/A:1022428818870
323
+ Lindsey, C., & Donea, A. C. 2008, SoPh, 251, 627,
324
+ doi: 10.1007/s11207-008-9140-9
325
+ Lu, Z., Cao, W., Jin, G., et al. 2019, ApJ, 876, 133,
326
+ doi: 10.3847/1538-4357/ab16d4
327
+ Neidig, D. F. 1989, SoPh, 121, 261,
328
+ doi: 10.1007/BF00161699
329
+ Neupert, W. M. 1968, ApJL, 153, L59, doi: 10.1086/180220
330
+ Pesnell, W. D., Thompson, B. J., & Chamberlin, P. C.
331
+ 2012, SoPh, 275, 3, doi: 10.1007/s11207-011-9841-3
332
+ Petrie, G. J. D. 2012, ApJ, 759, 50,
333
+ doi: 10.1088/0004-637X/759/1/50
334
+ —. 2013, SoPh, 287, 415, doi: 10.1007/s11207-012-0071-0
335
+ Petrie, G. J. D., & Sudol, J. J. 2010, ApJ, 724, 1218,
336
+ doi: 10.1088/0004-637X/724/2/1218
337
+ Schou, J., Scherrer, P. H., Bush, R. I., et al. 2012, SoPh,
338
+ 275, 229, doi: 10.1007/s11207-011-9842-2
339
+ Sharykin, I. N., & Kosovichev, A. G. 2020, ApJ, 895, 76,
340
+ doi: 10.3847/1538-4357/ab88d1
341
+ Sharykin, I. N., Kosovichev, A. G., Sadykov, V. M.,
342
+ Zimovets, I. V., & Myshyakov, I. I. 2017, ApJ, 843, 67,
343
+ doi: 10.3847/1538-4357/aa77f1
344
+ Sudol, J. J., & Harvey, J. W. 2005, ApJ, 635, 647,
345
+ doi: 10.1086/497361
346
+ Sun, X., Hoeksema, J. T., Liu, Y., Kazachenko, M., &
347
+ Chen, R. 2017, ApJ, 839, 67,
348
+ doi: 10.3847/1538-4357/aa69c1
349
+ Sun, X., Hoeksema, J. T., Liu, Y., et al. 2012, ApJ, 748, 77,
350
+ doi: 10.1088/0004-637X/748/2/77
351
+ Wang, S., Liu, C., Liu, R., et al. 2012a, ApJL, 745, L17,
352
+ doi: 10.1088/2041-8205/745/2/L17
353
+ Wang, S., Liu, C., & Wang, H. 2012b, ApJL, 757, L5,
354
+ doi: 10.1088/2041-8205/757/1/L5
355
+ Watanabe, K., & Imada, S. 2020, ApJ, 891, 88,
356
+ doi: 10.3847/1538-4357/ab711b
357
+ Wolff, C. L. 1972, ApJ, 176, 833, doi: 10.1086/151680
358
+ Yang, K., Guo, Y., & Ding, M. D. 2015, ApJ, 806, 171,
359
+ doi: 10.1088/0004-637X/806/2/171
360
+ Zhang, Z., Chen, D.-Y., Wu, J., et al. 2019, Research in
361
+ Astronomy and Astrophysics, 19, 160,
362
+ doi: 10.1088/1674-4527/19/11/160
363
+ Zharkov, S., Green, L. M., Matthews, S. A., & Zharkova,
364
+ V. V. 2011, ApJL, 741, L35,
365
+ doi: 10.1088/2041-8205/741/2/L35
366
+ Zharkova, V. V. 2008, SoPh, 251, 641,
367
+ doi: 10.1007/s11207-008-9216-6
368
+ Zharkova, V. V., & Zharkov, S. I. 2007, ApJ, 664, 573,
369
+ doi: 10.1086/518731
370
+
371
+ ENERGETIC ELECTRONS AS A DRIVER OF SUNQUAKES
372
+ 7
373
+ Table 1. List of the Flares under study and the Sunquake Information
374
+ No.
375
+ Date
376
+ GOES
377
+ RHESSI HXR Information
378
+ HMI Sunquake Information
379
+ Class
380
+ Impulsive Phase
381
+ Peaka
382
+ E50
383
+ E300
384
+ Sunquake
385
+ Correlation
386
+ v35b
387
+ v57b
388
+ (UT)
389
+ (UT)
390
+ (1030 erg)
391
+ (1027 erg)
392
+ (Y/N)
393
+ (HXR/MI)
394
+ (m s−1)
395
+ (m s−1)
396
+ 1
397
+ 2011 Feb 13
398
+ M6.6
399
+ 17:33:28–17:34:48
400
+ 17:34:18
401
+ 0.1
402
+ 0.02
403
+ N
404
+ 2
405
+ 2011 Feb 15
406
+ X2.2
407
+ 01:54:24–01:56:04
408
+ 01:55:14
409
+ 0.4
410
+ 1.4
411
+ Y
412
+ HXR
413
+ 27
414
+ 29
415
+ 3
416
+ 2011 Jul 30
417
+ M9.3
418
+ 02:07:28–02:08:48
419
+ 02:08:18
420
+ 0.2
421
+ 0.3
422
+ Y
423
+ HXR
424
+ 417
425
+ 337
426
+ 4
427
+ 2011 Aug 9
428
+ X6.9
429
+ 08:02:40–08:04:20
430
+ 08:03:50
431
+ 3.2
432
+ 8.9
433
+ Y
434
+ MIc
435
+ · · ·
436
+ -3
437
+ 5
438
+ 2011 Sep 6
439
+ X2.1
440
+ 22:18:20–22:19:40
441
+ 22:19:10
442
+ 0.8
443
+ 29.3
444
+ Y
445
+ HXR
446
+ 326
447
+ 596
448
+ 6
449
+ 2011 Sep 24
450
+ X1.9
451
+ 09:35:16–09:36:56
452
+ 09:36:26
453
+ 0.5
454
+ 22.6
455
+ N
456
+ 7
457
+ 2012 Oct 23
458
+ X1.8
459
+ 03:15:08–03:16:08
460
+ 03:15:58
461
+ 1.1
462
+ 23.1
463
+ Y
464
+ HXR
465
+ 1082
466
+ 950
467
+ 8
468
+ 2013 May 15
469
+ X1.2
470
+ 01:41:20–01:43:00
471
+ 01:42:10
472
+ 0.4
473
+ 4.7
474
+ N
475
+ 9
476
+ 2013 Oct 25
477
+ X1.7
478
+ 07:58:10–07:59:50
479
+ 07:59:20
480
+ 0.6
481
+ 9.2
482
+ Y
483
+ HXR
484
+ · · ·
485
+ 135
486
+ 10
487
+ 2013 Oct 25
488
+ X2.1
489
+ 15:00:12–15:01:52
490
+ 15:00:42
491
+ 0.6
492
+ 5.4
493
+ N
494
+ 11
495
+ 2013 Oct 28
496
+ X1.0
497
+ 01:58:48–02:00:28
498
+ 01:59:38
499
+ 0.3
500
+ 10.6
501
+ N
502
+ 12
503
+ 2013 Nov 10
504
+ X1.1
505
+ 05:12:10–05:13:50
506
+ 05:12:40
507
+ 0.2
508
+ 2.7
509
+ Y
510
+ HXR
511
+ 445
512
+ 508
513
+ 13
514
+ 2014 Jan 7
515
+ M7.2
516
+ 10:10:48–10:12:28
517
+ 10:11:38
518
+ 0.5
519
+ 5.6
520
+ Y
521
+ HXR
522
+ 436
523
+ 680
524
+ 14
525
+ 2014 Mar 29
526
+ X1.0
527
+ 17:46:00–17:47:40
528
+ 17:46:30
529
+ 0.2
530
+ 11.0
531
+ N
532
+ 15
533
+ 2014 Jun 11
534
+ X1.0
535
+ 09:04:20–09:05:40
536
+ 09:04:50
537
+ 0.06
538
+ 5.6
539
+ Y
540
+ HXR
541
+ · · ·
542
+ 1338
543
+ 16
544
+ 2014 Oct 22
545
+ M8.7
546
+ 01:38:36–01:40:16
547
+ 01:39:26
548
+ 0.3
549
+ 1.0
550
+ Y
551
+ HXR
552
+ 133
553
+ -1
554
+ 17
555
+ 2014 Oct 22
556
+ X1.6
557
+ 14:05:00–14:06:40
558
+ 14:06:30
559
+ 3.9
560
+ 1.4
561
+ Y
562
+ HXR
563
+ 96
564
+ -41
565
+ 18
566
+ 2014 Oct 27
567
+ X2.0
568
+ 14:21:20–14:23:20
569
+ 14:23:10
570
+ 1.4
571
+ 0.04
572
+ N
573
+ 19
574
+ 2015 Mar 7
575
+ M9.2
576
+ 22:03:40–22:05:00
577
+ 22:04:30
578
+ 0.01
579
+ 1.4e-5
580
+ N
581
+ 20
582
+ 2017 Sep 7
583
+ M7.3
584
+ 10:14:28–10:16:08
585
+ 10:15:38
586
+ 0.4
587
+ 8.8
588
+ Y
589
+ HXR
590
+ 534
591
+ 344
592
+ Note—
593
+ a Peak time for HXR emission at 50–100 keV.
594
+ b Oscillatory velocities at 3–5 MHz (v35) and 5–7 MHz (v57), respectively. The values are adopted from CZ21.
595
+ c The estimated work done by the MI-induced Lorentz force is 3.8 × 1027 erg.
596
+
597
+ 8
598
+ Wu et al.
599
+ Figure 1. WL and X-ray observations of the 2012 October 23 X1.8 flare. (a) time profiles of the HMI continuum intensity
600
+ around 6173 ˚A (black), RHESSI HXR count rate at 50–100 keV (red), and GOES SXR flux in 1–8 ˚A (blue). (b) the base-
601
+ difference HMI continuum map at the continuum peak time in an inverse scale, where the dashed box encloses the main flaring
602
+ region used for continuum calculation. Overplotted on the map is a simultaneous RHESSI 50–100 keV image reconstructed
603
+ using the Pixon algorithm, with contour levels corresponding to 30%, 60%, and 90% of the maximum intensity, respectively.
604
+ For this sunquake-active flare, the location of the sunquake epicenter is also marked out with an asterisk sign.
605
+
606
+ ENERGETIC ELECTRONS AS A DRIVER OF SUNQUAKES
607
+ 9
608
+ Figure 2. Fitting results for the RHESSI spectra taken around the HXR peak in three flares. In each panel, the event number
609
+ in Table 1 is labeled in the upper left, the black and grey lines in histogram mode denote the background-subtracted photon
610
+ flux and the background, respectively, while the colored curves represent different components of the modeled spectrum based
611
+ on the best-fit parameters. In addition, the residual between the modeled and observed spectra is plotted in the bottom part of
612
+ each panel.
613
+
614
+ 10
615
+ Wu et al.
616
+ Figure 3.
617
+ Histograms of the total energy of nonthermal electrons for the flare events with (upper) and without (lower)
618
+ sunquakes. The left panels are for the distributions of E50 while the right for E300. Note that a bin size of 0.5 dex is adopted
619
+ for the histogram plotting.
620
+
621
+ Figure 4. Locations of the MIs (orange plus yellow contours), HXR source (red contours), and sunquake epicenter (green
622
+ asterisk) for two flares. In each panel the background image is a corresponding HMI continuum map, with the PIL drawn in
623
+ blue line. The contours for MI indicate an increase of the horizontal magnetic field at levels of 300 G and 600 G, respectively.
624
+ Note that the sunquake-related MI in panel (a) is highlighted in yellow contours.
625
+
-NE1T4oBgHgl3EQfCgJv/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
.gitattributes CHANGED
@@ -7440,3 +7440,61 @@ StE2T4oBgHgl3EQfCAbz/content/2301.03610v1.pdf filter=lfs diff=lfs merge=lfs -tex
7440
  OdFPT4oBgHgl3EQfmzXU/content/2301.13127v1.pdf filter=lfs diff=lfs merge=lfs -text
7441
  sdAyT4oBgHgl3EQf0Pk5/content/2301.00713v1.pdf filter=lfs diff=lfs merge=lfs -text
7442
  9NFRT4oBgHgl3EQfqTc6/content/2301.13616v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
7440
  OdFPT4oBgHgl3EQfmzXU/content/2301.13127v1.pdf filter=lfs diff=lfs merge=lfs -text
7441
  sdAyT4oBgHgl3EQf0Pk5/content/2301.00713v1.pdf filter=lfs diff=lfs merge=lfs -text
7442
  9NFRT4oBgHgl3EQfqTc6/content/2301.13616v1.pdf filter=lfs diff=lfs merge=lfs -text
7443
+ 0dAzT4oBgHgl3EQfRPuW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7444
+ 0NAyT4oBgHgl3EQfbfc0/content/2301.00262v1.pdf filter=lfs diff=lfs merge=lfs -text
7445
+ NdE4T4oBgHgl3EQfjg0O/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7446
+ ltE4T4oBgHgl3EQftg2f/content/2301.05225v1.pdf filter=lfs diff=lfs merge=lfs -text
7447
+ ZdFOT4oBgHgl3EQf-zSY/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7448
+ HdE2T4oBgHgl3EQfTwd_/content/2301.03806v1.pdf filter=lfs diff=lfs merge=lfs -text
7449
+ c9AzT4oBgHgl3EQf3P6k/content/2301.01827v1.pdf filter=lfs diff=lfs merge=lfs -text
7450
+ _tFJT4oBgHgl3EQfqizo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7451
+ VtAyT4oBgHgl3EQfu_k1/content/2301.00622v1.pdf filter=lfs diff=lfs merge=lfs -text
7452
+ pdFPT4oBgHgl3EQfLzS8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7453
+ sNE2T4oBgHgl3EQfLQam/content/2301.03712v1.pdf filter=lfs diff=lfs merge=lfs -text
7454
+ 9NAzT4oBgHgl3EQfSft5/content/2301.01233v1.pdf filter=lfs diff=lfs merge=lfs -text
7455
+ sNE2T4oBgHgl3EQfLQam/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7456
+ 49E0T4oBgHgl3EQfvgE1/content/2301.02618v1.pdf filter=lfs diff=lfs merge=lfs -text
7457
+ 99AyT4oBgHgl3EQfRPYW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7458
+ 9NFRT4oBgHgl3EQfqTc6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7459
+ a9E2T4oBgHgl3EQfaAcV/content/2301.03869v1.pdf filter=lfs diff=lfs merge=lfs -text
7460
+ 4dAyT4oBgHgl3EQf2Pkf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7461
+ Y9AzT4oBgHgl3EQfmv3V/content/2301.01570v1.pdf filter=lfs diff=lfs merge=lfs -text
7462
+ VtAyT4oBgHgl3EQfu_k1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7463
+ _NE3T4oBgHgl3EQfrwrw/content/2301.04663v1.pdf filter=lfs diff=lfs merge=lfs -text
7464
+ OdFPT4oBgHgl3EQfmzXU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7465
+ UdFLT4oBgHgl3EQfRC8l/content/2301.12035v1.pdf filter=lfs diff=lfs merge=lfs -text
7466
+ pdE3T4oBgHgl3EQf7wvD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7467
+ KdAzT4oBgHgl3EQfkP0Y/content/2301.01527v1.pdf filter=lfs diff=lfs merge=lfs -text
7468
+ StE2T4oBgHgl3EQfCAbz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7469
+ VtAyT4oBgHgl3EQfhvgZ/content/2301.00381v1.pdf filter=lfs diff=lfs merge=lfs -text
7470
+ ydFJT4oBgHgl3EQfhyyK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7471
+ TNFLT4oBgHgl3EQfQC8d/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7472
+ _tFLT4oBgHgl3EQfwS-J/content/2301.12163v1.pdf filter=lfs diff=lfs merge=lfs -text
7473
+ T9E3T4oBgHgl3EQfzwt3/content/2301.04731v1.pdf filter=lfs diff=lfs merge=lfs -text
7474
+ ztE3T4oBgHgl3EQfmgqk/content/2301.04617v1.pdf filter=lfs diff=lfs merge=lfs -text
7475
+ -9FQT4oBgHgl3EQf7Ta5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7476
+ a9E1T4oBgHgl3EQfKgN7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7477
+ 9tAzT4oBgHgl3EQfSvsB/content/2301.01235v1.pdf filter=lfs diff=lfs merge=lfs -text
7478
+ NdE4T4oBgHgl3EQfjg0O/content/2301.05142v1.pdf filter=lfs diff=lfs merge=lfs -text
7479
+ lNAzT4oBgHgl3EQfNvsP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7480
+ _NE3T4oBgHgl3EQfrwrw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7481
+ JdAzT4oBgHgl3EQfH_vd/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7482
+ lNAzT4oBgHgl3EQfNvsP/content/2301.01152v1.pdf filter=lfs diff=lfs merge=lfs -text
7483
+ 1dFKT4oBgHgl3EQfOy1w/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7484
+ F9E0T4oBgHgl3EQfzQJ7/content/2301.02670v1.pdf filter=lfs diff=lfs merge=lfs -text
7485
+ WtAzT4oBgHgl3EQfKPud/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7486
+ cNE2T4oBgHgl3EQfwgg2/content/2301.04101v1.pdf filter=lfs diff=lfs merge=lfs -text
7487
+ 49E0T4oBgHgl3EQfvgE1/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7488
+ _tFLT4oBgHgl3EQfwS-J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7489
+ gtAzT4oBgHgl3EQfov1j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7490
+ 0dFAT4oBgHgl3EQfCRwI/content/2301.08408v1.pdf filter=lfs diff=lfs merge=lfs -text
7491
+ ENAyT4oBgHgl3EQf4vqx/content/2301.00793v1.pdf filter=lfs diff=lfs merge=lfs -text
7492
+ V9E1T4oBgHgl3EQfvQVU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7493
+ MNFOT4oBgHgl3EQf0zS8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7494
+ 0dFAT4oBgHgl3EQfCRwI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7495
+ 99AyT4oBgHgl3EQfRPYW/content/2301.00060v1.pdf filter=lfs diff=lfs merge=lfs -text
7496
+ ztE3T4oBgHgl3EQfmgqk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7497
+ a9E2T4oBgHgl3EQfaAcV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7498
+ TNE0T4oBgHgl3EQflAGw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7499
+ ENAyT4oBgHgl3EQf4vqx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
7500
+ 59E0T4oBgHgl3EQfewCK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0NAyT4oBgHgl3EQfbfc0/content/2301.00262v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c7978d0b44c05daa8022f6cc17182126b6a049df6f0c49bd5ee9846d84bda6aa
3
+ size 430706
0dAzT4oBgHgl3EQfRPuW/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:a171f2e4892d4207e45fbd94be67ae3379dbac45d918c4f4782ef5e6c2af45e5
3
+ size 3866669
0dFAT4oBgHgl3EQfCRwI/content/2301.08408v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b9cfcbf6fe447020db4ef1b4c1f01579a81f03003f7a86ec452c7183755e2d1c
3
+ size 1342573
0dFAT4oBgHgl3EQfCRwI/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8a9fb2e8335555144c85ae85aa5b374ff19a70541c9efd12dd32a65ea7b44276
3
+ size 1376301
0dFAT4oBgHgl3EQfCRwI/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6f09d63ef5d472aeab2f305e61f6ccdd93c4dbda0ca9a756bee6399bf76c0ded
3
+ size 59347
1NFST4oBgHgl3EQfWTh0/content/tmp_files/2301.13780v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
1NFST4oBgHgl3EQfWTh0/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1dE3T4oBgHgl3EQfnQrW/content/tmp_files/2301.04624v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
1dE3T4oBgHgl3EQfnQrW/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
1dFKT4oBgHgl3EQfOy1w/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1d2d06fe77db69e1def0a649b68c9122b4af3a87aad926865a34d2c6807a7f4c
3
+ size 19791917
49E0T4oBgHgl3EQfvgE1/content/2301.02618v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bf697899f84235fd864bcdd4155c39e41064de8e935e31247c3a21ca418d9642
3
+ size 1235445
49E0T4oBgHgl3EQfvgE1/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:01ed0fc8d780ad08308afaa722e8a119f7f55330b0f4114c922a6402e228004d
3
+ size 21954605
4dAyT4oBgHgl3EQf2Pkf/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6077b450b2925a13f70357261ae2477d134da87435827c8b38f77786c72ded6f
3
+ size 3801133
4tAyT4oBgHgl3EQfQPYV/content/tmp_files/2301.00039v1.pdf.txt ADDED
@@ -0,0 +1,981 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ New Insights on the Stokes Paradox for Flow in
2
+ Unbounded Domains
3
+ Ingeborg G. Gjerde and L. Ridgway Scott
4
+ January 3, 2023
5
+ Abstract
6
+ Stokes flow equations, used to model creeping flow, are a commonly used simplifi-
7
+ cation of the Navier–Stokes equations. The simplification is valid for flows where the
8
+ inertial forces are negligible compared to the viscous forces. In infinite domains, this
9
+ simplification leads to a fundamental paradox.
10
+ In this work we review the Stokes paradox and present new insights related to
11
+ recent research. We approach the paradox from three different points of view: modern
12
+ functional analysis, numerical simulations, and classical analytic techniques. The first
13
+ approach yields a novel, rigorous derivation of the paradox. We also show that relaxing
14
+ the Stokes no-slip condition (by introducing a Navier’s friction condition) in one case
15
+ resolves the Stokes paradox but gives rise to d’Alembert’s paradox.
16
+ The Stokes paradox has previously been resolved by Oseen, who showed that it
17
+ is caused by a limited validity of Stokes’ approximation. We show that the paradox
18
+ still holds for the Reynolds–Orr equations describing kinetic energy flow instability,
19
+ meaning that flow instability steadily increases with domain size. We refer to this as
20
+ an instability paradox.
21
+ 1
22
+ Introduction
23
+ Fluids like air and water can be modeled to high precision using the Navier–Stokes equa-
24
+ tions [29]. These equations are still intensively studied, and they have some very curious
25
+ mathematical features, often described as paradoxes, such as d’Alembert’s paradox [10, 26]
26
+ and Whitehead’s paradox [30, section 8.3]. Here we discuss one of the most well known,
27
+ namely the Stokes paradox. The Stokes paradox also arises for more exotic fluids, such as
28
+ Fermi electrons [17].
29
+ Consider a domain Ω ⊂ R3 containing an infinitely long cylinder with radius 1. The
30
+ cylinder has a boundary denoted Γ. The domain is filled with a fluid moving with velocity
31
+ u and pressure p past the cylinder. Mathematically, this can be described using the Navier–
32
+ Stokes equations
33
+ −∆u + ∇p = −R u · ∇u
34
+ in Ω,
35
+ ∇· u = 0
36
+ in Ω,
37
+ (1)
38
+ together with the boundary condition
39
+ u = g on Γ.
40
+ (2)
41
+ 1
42
+ arXiv:2301.00039v1 [physics.flu-dyn] 30 Dec 2022
43
+
44
+ In this form, the Navier–Stokes equations are posed with only one parameter, namely
45
+ the Reynolds number R [15]:
46
+ R = UL/ν.
47
+ (3)
48
+ Here, U is the representative flow velocity, L the representative length for the domain, and
49
+ ν is the kinematic fluid viscosity.
50
+ In this work, we are interested in the case where the Reynolds number will be small, and
51
+ we have R ≪ 1. In this case, it seems reasonable to drop the advective term, in which case
52
+ we have the simpler Stokes equations
53
+ −∆u + ∇p = 0 in Ω,
54
+ ∇· u = 0 in Ω,
55
+ (4)
56
+ again with a boundary condition of the form (2).
57
+ If the domain Ω is taken to be infinitely large, however, this simplification leads to a
58
+ fundamental paradox [27, 6]. The Stokes paradox is that “creeping flow of an incompressible
59
+ Newtonian fluid around a cylinder in an unbounded fluid has no solution” [28]. Others have
60
+ characterized the paradox by saying
61
+ • [23, 1st paragraph] “Stokes (1851) established that there was no solution to the two-
62
+ dimensional, steady, incompressible, Navier–Stokes equations for asymptotically uni-
63
+ form flow around a cylinder.”
64
+ • [1, Remark 3.15] “no classical solution ... that tends to a nonzero vector at infinity.”
65
+ These statements require some clarification. Firstly, potential flow around a cylinder solves
66
+ the Stokes equations with the right boundary conditions at infinity. However, potential flow
67
+ (Figure 1a) does not satisfy no-slip boundary conditions on the cylinder; for this reason it
68
+ has commonly been discarded as physically incorrect.
69
+ To handle the no-slip boundary condition we instead look to the literature on functional
70
+ analysis. A precise mathematical theory for the Stokes equations in an unbounded domain
71
+ was developed in [9]. We can explain the results there informally as follows: That it is
72
+ a well posed problem to require a reasonable flow profile around a reasonable domain. A
73
+ solution therefore exists solving Stokes equations in an infinite domain enclosing a cylinder,
74
+ as long as we set reasonable boundary conditions on the cylinder. But the paradox is that
75
+ we cannot set a boundary condition at infinity.
76
+ This point is often misunderstood, saying instead that there is a “need to satisfy two
77
+ boundary conditions, one on the object and one at infinity” [4]. This is despite the fact
78
+ that many papers have dealt with the paradox and its resolution. The first resolution was
79
+ by Oseen [19] who realized that it was necessary to keep R > 0 in (1) and provided an
80
+ approximate (linearized) solution to Navier-Stokes. This observation has been substantially
81
+ amplified by Finn [6]. But many others have dealt with the paradox, for example by improv-
82
+ ing the Oseen approximation [14, 20]. For a survey and history of their methods, see [30,
83
+ Chapter V] where the so-called matched asymptotic expansions are traced back to seminal
84
+ work by K. O. Friedrichs.
85
+ The Sobolev space in which the solution exists provides important context for the Stokes
86
+ paradox. To be more precise, the solution exists in a special weighted Sobolev space in which
87
+ we give up control over the function as we get infinitely far from the cylinder. For this reason
88
+ it is not possible to prescribe the flow at infinity. We will show that, if the flow is specified
89
+ 2
90
+
91
+ to be a constant on the cylinder, the flow must be that constant everywhere. Thus, while a
92
+ non-trivial solution exists, it may not be physically meaningful.
93
+ Due to the confusion related to the Stokes paradox, we examine it in some detail before
94
+ proceeding to the main results of the paper. We draw together disparate approaches to give
95
+ the fullest possible understanding. Although much of what we present at the beginning can
96
+ be found separately elsewhere, the combination of the different approaches gives a more
97
+ complete picture than has so far been presented in one place.
98
+ The article will proceed as follows. We begin in Section 2 by giving two analytic solutions
99
+ for Stokes flow around a cylinder and discuss their properties. Next, we give in Section 3
100
+ a derivation of the Stokes paradox, using the mathematical framework from [9]. In Section
101
+ 4, we examine the impact of a different boundary condition on the cylinder, Navier’s slip
102
+ (friction) condition. We see that it is possible to resolve the Stokes paradox with one value
103
+ of the friction parameter, although that value seems to be nonphysical.
104
+ We next view the Stokes paradox through other lenses. In particular, we solve the Stokes
105
+ problem on a very large (but finite) domain surrounding the cylinder. In this case we can
106
+ pose any boundary conditions we like on the outer boundary. So what goes wrong as we let
107
+ the outer boundary go to infinity? In Section 5 we answer this in two ways, using modern
108
+ computational methods (Section 5.1) and classical analytical solution techniques (Section
109
+ 5.2). We will see that they give the same answer: the solution goes to a constant. Thus
110
+ we have multiple ways of viewing the Stokes paradox, each with its own advantages and
111
+ limitations.
112
+ In Section 6 we review the resolution of the Stokes paradox by Oseen [19]. According
113
+ to Oseen, the paradox is caused by the limited validity of Stokes’ approximation, which
114
+ relies on the Reynolds number being small. To be more precise, we have two limits going to
115
+ infinity: the viscosity and the domain size. Either limit alone is well behaved, but jointly
116
+ they are not. Thus one must consider the full Navier-Stokes equations if the domain is
117
+ large. We also discuss briefly some open questions regarding the existence of a solution for
118
+ the Navier–Stokes equations when the Reynolds number grows large.
119
+ In Section 7 we describe extensions of the Stokes paradox concepts to other flow problems.
120
+ In particular, we discuss how the Stokes paradox relates to flow instabilities. The Reynolds-
121
+ Orr method gives a way to calculate the kinetic energy instability of a perturbed base
122
+ flow, where the most unstable flow perturbations are calculated by solving a Stokes type
123
+ eigenvalue problem. In [11], it was observed that the instability of a base flow kept increasing
124
+ as the domain grew. This can be explained as a particular instance of the Stokes paradox.
125
+ To the best of our knowledge, however, it cannot be resolved in any such way as Oseen’s
126
+ resolution of the Stokes paradox.
127
+ 2
128
+ Classical solutions
129
+ Assume for the moment Γ to be an infinitely long cylinder of radius 1 in the z-direction with
130
+ origin (0, 0) in the x, y-plane. Consider now the Stokes flow equations (4) with boundary
131
+ condition (2). We now construct two analytic solutions. The strategy is to find a function
132
+ u that is divergence free so it satisfies the second equation in (4). If the Laplacian of u is a
133
+ gradient of some function, we can solve the first equation in (4) by construction by taking
134
+ the pressure equal to said function.
135
+ To find a function u that is divergence free, we use two different approaches. For the
136
+ first, we take φ to be a potential function, i.e. we set u = ∇φ = (φx, φy), where φi denotes
137
+ 3
138
+
139
+ (a) Potential flow, β = −2ν
140
+ (b) Zero friction flow, β = 0
141
+ Figure 1: Stream function ψ, stream lines and flux u (cones) for two classically known
142
+ analytic solutions of the Stokes equations for flow past an infinitely long cylinder. Neither
143
+ solution satisfies the no-slip boundary condition.
144
+ the derivative of φ in the ith direction. Then if we want ∇·u = 0 we want ∇·∇φ = ∆φ = 0,
145
+ i.e. φ to be harmonic. Many harmonic functions are known in the literature; we take
146
+ φ(r, θ) = −(cos θ)
147
+
148
+ r − 1
149
+ r
150
+
151
+ = −x
152
+
153
+ 1 − 1
154
+ r2
155
+
156
+ .
157
+ (5)
158
+ A straightforward calculation shows that φ is harmonic.
159
+ We also have
160
+ ∆u = (∆φx, ∆φy) = ((∆φ)x, (∆φ)y) = 0.
161
+ Thus we have a solution to the Stokes equation (4) if the pressure is taken to be a constant
162
+ (so that ∇p = 0 as well).
163
+ Differentiating r =
164
+
165
+ x2 + y2 we find
166
+ rx = x
167
+ r ,
168
+ ry = y
169
+ r .
170
+ (6)
171
+ Using these, we have
172
+ φx = 1 − r−2 + 2yr−3ry = 1 + (y2 − x2)r−4,
173
+ φy = 2yr−3rx = 2xyr−4.
174
+ Then
175
+ u(x, y) = (φx(x, y), φy(x, y)) =
176
+
177
+ 1 +
178
+ y2 − x2
179
+ (x2 + y2)2 ,
180
+ −2xy
181
+ (x2 + y2)2
182
+
183
+ .
184
+ (7)
185
+ This solution for u is commonly referred to as potential flow. The potential flow solution
186
+ is shown in Figure 1a together with its stream function and streamlines. We see that u goes
187
+ to uniform flow at infinity. Moreover, u · n = 0 on the cylinder. However, the tangential
188
+ 4
189
+
190
+ u
191
+ 2
192
+ 1.5
193
+ 0.5
194
+ 0
195
+ 7.5
196
+ 4
197
+ 2
198
+ 0
199
+ -2
200
+ -4
201
+ -7.5n
202
+ 2
203
+ 1.5
204
+ 0.5
205
+ 0
206
+ 20
207
+ 10
208
+ 0
209
+ -10
210
+ -20velocity u · τ ̸= 0, meaning that this solution does not satisfy a no-slip boundary condition
211
+ on Γ. This led Stokes to reject this solution.
212
+ Let us therefore make another analytic solution, this time trying the second approach
213
+ to making a divergence-free flux u. By augmenting our vectors with a z-component we
214
+ can define u to be the curl of a vector (0, 0, ψ) so that u = (ψy, −ψx, 0). Dropping the
215
+ z-coordinate again we have u = (ψy, −ψx) and ∇· u = ψyx − ψxy = 0 as long as ψ is
216
+ sufficiently smooth1. For example, define
217
+ ψ = (sin θ) r log r = y log r.
218
+ (8)
219
+ Then
220
+ u(x, y) =
221
+ �y2
222
+ r2 + log(r), −xy
223
+ r2
224
+
225
+ .
226
+ (9)
227
+ By construction u satisfies the second equation in (4). The first equation in (4) can
228
+ then be satisfied by choosing p so that ∇p = ∆u. We will show in Section 5.2 that such a
229
+ solution p exists.
230
+ Again, the solution does not satisfy the no-slip boundary condition on Γ. Moreover, the
231
+ solution diverges to infinity as r → ∞.
232
+ In the next section, we see how these analytic solutions are related to the Stokes paradox.
233
+ 3
234
+ Derivation of Stokes paradox using the variational
235
+ framework
236
+ The Stokes paradox occurs for incompressible flow Stokes flow with no-slip boundary condi-
237
+ tions on the cylinder (i.e. g = 0 in (2)). The paradox can be derived in several ways. In this
238
+ work, we present three approaches: (i) a rigorous derivation using weighted Sobolev spaces,
239
+ (ii) a formal approach using simulations in domains of increasing size and (iii) a semi-formal
240
+ approach of deriving analytic solutions in bounded domains and passing to the limit.
241
+ 3.1
242
+ Sobolev spaces for the Stokes equations
243
+ If the domain Ω is Lipschitz continuous [8, section 5.1]), the system is well posed with
244
+ u ∈ (H1(Ω))d, d ∈ {2, 3} being the dimension of the domain, and p ∈ L2(Ω/R), where
245
+ L2(Ω)/R =
246
+
247
+ v : Ω → R :
248
+
249
+
250
+ v2 dx < ∞,
251
+
252
+
253
+ v dx = 0
254
+
255
+ is the space of square-integrable functions, together with the norm given by
256
+ ∥v∥L2(Ω) =
257
+ ��
258
+
259
+ v2 dx.
260
+ We also define
261
+ H1(Ω) =
262
+
263
+ v ∈ L2(Ω) : ∇v ∈ L2(Ω)
264
+
265
+ 1for example ψ ∈ C2(Ω), i.e. two times continuously differentiable. In this case we can change the order
266
+ of differentiation without issues.
267
+ 5
268
+
269
+ and the norm
270
+ ∥v∥H1(Ω) =
271
+ ��
272
+
273
+ |∇v(x)|2 + v(x)2 dx,
274
+ where |v(x)| is the Euclidean norm of ∇v(x).
275
+ The notation u ∈ (H1(Ω))d then means
276
+ that every component of u is in H1(Ω). To simplify notation, we from now on drop the
277
+ superscript and simply write u ∈ H1(Ω).
278
+ In summary, given a bounded domain and reasonable f and g (for example f ∈ L2(Ω)
279
+ and g ∈ H1(Ω) [8]) there exists a unique solution pair u ∈ H1(Ω) and p ∈ L2(Ω) of (4).
280
+ Once we know there exists a unique solution, we can use numerical methods to solve for its
281
+ approximation.
282
+ If the domain Ω is infinite, the previous result no longer holds.
283
+ Instead, the Stokes
284
+ equation will be well posed with p ∈ L2(Ω)/R and u ∈ H1
285
+ w(Ω) defined by the norm
286
+ ∥v∥H1w(Ω) =
287
+ ��
288
+
289
+ |∇v(x)|2 +
290
+
291
+ 1 + |x| log |x|
292
+ �−2|v(x)|2 dx.
293
+ (10)
294
+ Centrally, this is a weaker norm than the one we had for the H1(Ω). Both spaces require the
295
+ gradient of the function itself to be square-integrable, but in the H1
296
+ w(Ω)-space we only require
297
+ the function to be square-integrable when multiplied by a weight function
298
+
299
+ 1+|x| log |x|
300
+ �−1.
301
+ As this weight function goes to zero as x → ∞, the function does not have to decay at all
302
+ as we move away from the cylinder. As we will see it may even diverge. Therefore we have
303
+ to be very careful about assigning limit values at infinity to functions u ∈ H1
304
+ w(Ω).
305
+ What can be said, based on [9], is that one cannot specify boundary conditions simulta-
306
+ neously on the cylinder and at infinity. That is, having specified conditions on the cylinder,
307
+ the conditions at infinity have already become specified. We will see that the resolution of
308
+ the Stokes paradox is simple once we know in what function spaces to look for solutions.
309
+ We now know that solutions exists for the Stokes problem, but only in a certain weighted
310
+ Sobolev space. Due to the weight going to zero as we move away from the cylinder, the
311
+ solution is allowed to behave more mischievously in this region.
312
+ In the time of Stokes
313
+ (1819–1903), the functional analysis approach to partial differential equations was still in
314
+ its infancy. Indeed, it was not until 1991 [9] that the appropriate function spaces were fully
315
+ clarified.
316
+ 3.2
317
+ Derivation of the Stokes paradox
318
+ Now that we know there exists a solution, we can straightforwardly formulate the Stokes
319
+ paradox. For this, it is useful to choose moving coordinates. Instead of thinking of a fixed
320
+ cylinder in a moving fluid, let us reverse the point of view by using moving coordinates such
321
+ that the fluid appears at rest. If we think of a moving cylinder in an infinite fluid, we can pose
322
+ the (Navier–)Stokes equations as in (4) with a boundary function g = (1, 0), assuming the
323
+ cylinder is moving in the x-direction with unit speed. In view of [9], there is a unique solution
324
+ u ∈ H1
325
+ w(Ω), where Ω is the complement of the cylinder (i.e. {(x, y) ∈ R2 : x2 + y2 > 1})
326
+ and fixed in time.
327
+ But g ∈ H1
328
+ w(Ω), and g is a solution of (4), with constant pressure. And [9] proves that
329
+ g is the solution. Thus we have proved the following theorem.
330
+ Theorem 3.1 Suppose that we move an infinite cylinder in a direction perpendicular to the
331
+ axis of the cylinder with unit speed. If the entirety of the fluid is governed by the Stokes
332
+ 6
333
+
334
+ equations (4) with a no-slip boundary condition on the cylinder, then the entirety of the fluid
335
+ is forced to move at unit speed.
336
+ In the variational framework, the Stokes paradox is not really a paradox: The Stokes
337
+ equation is well posed in infinite domains, but the appropriate function space for u is one
338
+ where we give up control of u as it approaches infinity. Thus it is not surprising that the
339
+ solution is non-physical away from the cylinder.
340
+ The fact that we are not able to specify the limiting value of the solution raises the
341
+ question of how badly the solution might behave. We investigate this in the next section.
342
+ 3.2.1
343
+ Limit values of functions in H1
344
+ w
345
+ In the previous section we saw that moving an infinitely long cylinder through an infinite
346
+ domain Ω with given speed g = (1, 0) caused the entire solution flux to be u = (1, 0). In
347
+ fact, due to the weight function, any v ∈ H1
348
+ w(Ω) can tend to a nonzero constant at infinity.
349
+ Worse, it can grow like (log r)α for α < 1/2, as long as its gradient remains square integrable.
350
+ In particular, take u(r) = (log r)α. Then for r > 1,
351
+ |∇u| =
352
+ ���α∇r
353
+ r (log r)α−1��� =
354
+ ���α x
355
+ r2 (log r)α−1��� =
356
+ ���α
357
+ r (log r)α−1���.
358
+ This expression is square integrable at infinity if
359
+ � ∞
360
+ K
361
+ r dr
362
+ r2(log r)2(1−α) < ∞.
363
+ Changing coordinates to s = log r (so that r−1dr = ds), our condition reduces to
364
+ � ∞
365
+ log K
366
+ ds
367
+ s2(1−α) < ∞.
368
+ This holds when α < 1/2.
369
+ Thus the Stokes equation posed in an infinite domain may have a solution that diverges
370
+ as |x| → ∞. An example of this is the zero friction solution (9), as we now discuss.
371
+ 4
372
+ Navier’s revenge
373
+ In Section 3.2 we saw how the imposition of a no-slip boundary condition on the cylinder
374
+ leads to the Stokes paradox in unbounded domains. In this section we will discuss what
375
+ may happen for different boundary conditions. We will see that the Stokes paradox does
376
+ not occur for all boundary conditions.
377
+ Instead of the no-slip boundary condition (2) with g = 0, let us consider Navier’s slip
378
+ condition. This boundary condition, sometimes referred to as Navier’s friction condition
379
+ [18, 12, 5], links the tangential velocity and the shear stress on Γ:
380
+ β u · τ k = −ν nt(∇u + ∇ut)τ k,
381
+ k = 1, 2,
382
+ (11)
383
+ where τ i are orthogonal tangent vectors and β is the friction coefficient. This is coupled
384
+ with the no-penetration condition u·n = 0 on Γ. In our two-dimensional case of flow around
385
+ a cylinder, there is only one tangent vector τ. The other one is perpendicular to the plane
386
+ 7
387
+
388
+ of the two-dimensional flow, that is, parallel to the cylinder axis. For β > 0, the Navier
389
+ slip condition works as a friction causing the fluid to slow down as it slips over the cylinder
390
+ boundary Γ.
391
+ The potential function φ and stream function ψ defined in (5) and (8) give rise to
392
+ two different solutions of the Stokes equations with Navier’s boundary condition (11), each
393
+ corresponding to a particular choice of β. The potential flow solution (7), i.e.
394
+ u = (φx, φy)
395
+
396
+ u(x, y) =
397
+
398
+ 1 +
399
+ y2 − x2
400
+ (x2 + y2)2 ,
401
+ −2xy
402
+ (x2 + y2)2
403
+
404
+ ,
405
+ solves the Navier–Stokes equations for all ν, and satisfies the Navier slip condition if β = −2ν
406
+ [11]. Moreover, this flow goes to the desired asymptotic limit (zero) at infinity. Thus (7)
407
+ resolves Stokes’ paradox for β = −2ν. For this particular boundary condition the solution
408
+ belongs to the standard Sobolev space H1(Ω) and exhibits reasonable physical behavior in
409
+ the entire domain.
410
+ This raises the question of what happens for other values of β. Interestingly, the other
411
+ analytic solution we have, i.e. (9), satisfies the friction boundary condition (11) if β = 0. To
412
+ see this, note that τ = (−y, x) and n = (−x, −y) on Γ. Computing (∇u) τ we find
413
+ (∇u)τ = τ · ∇u = ∂θ
414
+
415
+ sin2 θ + log(r), − cos θ sin θ
416
+
417
+ =
418
+
419
+ 2 sin θ cos θ, − cos2 θ + sin2 θ
420
+
421
+ .
422
+ (12)
423
+ Therefore (omitting some trigonometric simplifications)
424
+ nt(∇u)τ|Γ = −(cos θ, sin θ)t�
425
+ 2 sin θ cos θ, − cos2 θ + sin2 θ
426
+
427
+ = −2 sin θ cos2 θ + cos2 θ sin θ − sin3 θ = − sin θ.
428
+ (13)
429
+ Similarly
430
+ (∇u)n = n · ∇u = −r∂r
431
+
432
+ sin2 θ + log(r), − cos θ sin θ
433
+
434
+ =
435
+
436
+ − 1, 0
437
+
438
+ .
439
+ (14)
440
+ This says that
441
+ τ t(∇u)n|Γ = (− sin θ, cos θ) ·
442
+
443
+ − 1, 0
444
+
445
+ = sin θ.
446
+ (15)
447
+ Note that nt(∇ut)τ = τ t(∇u)n. Therefore
448
+ nt(∇u + ∇ut)τ|Γ =
449
+
450
+ nt(∇u)τ + τ t(∇u)n
451
+
452
+ |Γ = 0.
453
+ (16)
454
+ Thus the function in (9) solves the Stokes equations and satisfies the Navier slip condition
455
+ if β = 0. But this solution diverges as r → ∞, fast enough that the norm in (10) is not
456
+ finite. Thus (9) does not resolve the Stokes paradox.
457
+ It is worth noting that the fact that β = 0 does not mean that the drag on the cylinder is
458
+ zero [10]. It is known that the drag IS zero for β = −2ν, and this is the core of d’Alembert’s
459
+ paradox [10].
460
+ The computations above are sufficiently complex that it is useful to have a way to verify
461
+ them. This can be done by solving the Stokes equations with the Navier slip condition
462
+ numerically with β = 0 and check that the result approximately agrees with (9).
463
+ For β > 0, the Navier slip condition acts as a friction force, slowing the flow as it slips
464
+ over the cylinder. For β → ∞, the Navier friction boundary condition converges to the
465
+ Stokes no-slip condition. For other values of β, the techniques in section 5 could be used to
466
+ see if there are plausible solutions of the Stokes paradox.
467
+ 8
468
+
469
+ In conclusion, we see that the Stokes paradox is resolved using the Navier slip boundary
470
+ condition with one particular value for β, but not for others. Navier died in 1836, so he
471
+ was not available to comment on Stokes’ paradox. We can only wonder what he might have
472
+ said.
473
+ 5
474
+ Stokes flow on bounded domains of increasing size
475
+ In Section 3.1 we saw how the Stokes problem lost the ability to specify the value of the
476
+ solution on the boundary away from the cylinder. With this in mind, we now restrict our
477
+ attention to bounded domains, where it is possible to pose boundary conditions. We explore
478
+ two approaches, a computational one and an analytical one. We will see that as we increase
479
+ the size of the box, we again encounter the Stokes paradox.
480
+ 5.1
481
+ Computational approach
482
+ Recent advances in software [2, 13] have made it easy to solve partial differential equations
483
+ (PDEs). Using such software, you can study PDEs without knowing detailed background
484
+ prerequisites [21]. We now indicate this approach for the Navier–Stokes equations.
485
+ Consider the domain Ωb defined by
486
+ Ωb = {x : |x| > 1, |xi| < b, i = 1, 2}
487
+ (17)
488
+ for b > 1. Let Γ denote the subset of ∂Ωb defined by
489
+ Γ = {x : |x| = 1} ,
490
+ that is, Γ represents the cylinder.
491
+ We keep our viewpoint of a cylinder moving through the larger domain where the fluid
492
+ is at rest. I.e., we consider solutions ub of the problem (4) with boundary conditions
493
+ ub = (1, 0) on Γ,
494
+ ub = 0 on ∂Ωb\Γ.
495
+ (18)
496
+ Figure 2 shows the solution for b = 4.
497
+ Figure 3 shows the horizontal component of the solution for (a) b = 16 and (b) b = 32.
498
+ We see that the support of the horizontal component spreads as the box gets bigger. Thus
499
+ we see that the horizontal component of the solutions is not really going to zero at the
500
+ boundary of the box. It remains positive as we go to the edge of the domain both upstream
501
+ and downstream of the cylinder.
502
+ To examine how the support of the horizontal component of the solution spreads as b is
503
+ increased, we considered a functional to examine the size of ub in regions of increasing size
504
+ d, but fixed independent of b. Thus we defined
505
+
506
+ Ωb
507
+ χd(x)2|ub(x)|2 dx
508
+ � �
509
+ Ωb
510
+ χd(x)2 dx
511
+ (19)
512
+ where χd(x) is the interpolant on the computational mesh of the cut-off function
513
+ 1
514
+ 2
515
+
516
+ 1 − tanh
517
+
518
+ 20
519
+
520
+ |x|2 − d2���
521
+ 9
522
+
523
+ Figure 2: Plot of pressure p, flux u (glyphs) and streamlines for the solution the moving
524
+ cylinder problem (4) in the domain (17) with boundary conditions (18) for b = 7.5. Due to
525
+ no-slip boundary condition u = (0, 0) on the box walls, the fluid is forced to recirculate.
526
+ (a)
527
+ (b)
528
+ (c)
529
+ Figure 3: Plot of the horizontal component of the solution of (4) in the domain (17) with
530
+ boundary conditions (18) for (a) b = 16, M=64 and (b) b = 32, M=128. M is the mesh
531
+ parameter for mshr, with the number of segments for the definition of the circle chosen to
532
+ be M as well.
533
+ 10
534
+
535
+ p
536
+ 1.85
537
+ 0
538
+ -1.85
539
+ u
540
+ 0.5
541
+ 0n
542
+ 0.5
543
+ 0
544
+ -0.25n
545
+ 0.5
546
+ 0
547
+ -0.250.75
548
+ 0.5
549
+ 0.25
550
+ -32
551
+ -16
552
+ 0
553
+ 16
554
+ 3
555
+ -uo(x) for b=32
556
+ -uo(x) for b=16which is very close to 1 inside |x| < d and very close to zero outside of that. If ub → (1, 0)
557
+ as b → ∞, then we would expect the expression (19) to increase to 1. If on the other hand,
558
+ if ub → 0 as r → ∞, we would expect the expression (19) to converge to some value less
559
+ than 1 as b is increased.
560
+ Figure 4 gives the data for three values of d as a function of box size b. It appears
561
+ (19) indeed increases to 1, which points to ub → (1, 0) for |x| < d as b → ∞. This is in
562
+ accordance with the Stokes paradox as stated in Theorem 3.1; that as b → ∞, we have
563
+ u = (1, 0) everywhere. But then the fluid moves like a solid.
564
+ Interestingly, u = (1, 0) satisfies the Navier slip condition with β = 0 since ∇u = 0.
565
+ Thus this solution not only satisfies the no-slip boundary condition on the cylinder, but
566
+ also the Navier friction condition with β = 0. The other solution with β = 0, i.e. (9) has
567
+ different boundary values on the cylinder. It also diverges when r → ∞, unlike the solution
568
+ u = (1, 0).
569
+ (a)
570
+ (b)
571
+ Figure 4: Growth of (19) as a function of r (horizontal axis) for three values of d: (top)
572
+ d = 10, (middle) d = 20, (bottom) d = 30. (a) Stokes no-slip boundary condition, (b)
573
+ Navier friction boundary condition, β = 0.
574
+ 5.2
575
+ Analytic solutions in bounded domains
576
+ Let us return from modern numerical software back to the classics.
577
+ In this section, we
578
+ consider analytical solutions in increasingly large circular domains, following [23]. These
579
+ domains are related to the so-called Leray approximate solutions [3].
580
+ Following [28, (12)], consider a general biharmonic stream function of the form
581
+ ψ = f(r) sin θ,
582
+ f(r) = Ar−1 + Br log r + Cr3 + Dr.
583
+ Now let us show that the fact that ψ is biharmonic implies that u = (ψy, −ψx) satisfies
584
+ the first equation in (4). For the sake of calculations, let us for the moment augment the
585
+ domain with a z-component and let ψ = (0, 0, ψ) so that we can define u = curl ψ. Note
586
+ that ∇ · ψ = 0 since ψ depends only on x and y. By using the vector calculus identity
587
+ curl (curl v) = ∇(∇ · v) − ∆v, we then see
588
+ curl ∆u = curl (∆(curl ψ)) = curl curl ∆ψ = ∇ (∇ · ∆ψ)
589
+
590
+ ��
591
+
592
+ =0
593
+ −∆2ψ.
594
+ 11
595
+
596
+ 0.8
597
+ 0.7
598
+ 0.6
599
+ 0.5
600
+ 0.4
601
+ 0.3
602
+ 0.2
603
+ 104
604
+ 102
605
+ 1030.8
606
+ 0.7
607
+ 0.6
608
+ 0.5
609
+ 0.4
610
+ 0.3
611
+ 0.2
612
+ 102
613
+ 103
614
+ 104Since all four terms in ψ are biharmonic in any open set that excludes the origin, we can
615
+ then conclude that u satisfies the following: curl ∆u = −∆2ψ = 0 in any open set that
616
+ excludes the origin.
617
+ Invoking Stokes’ theorem [8, Theorem 2.9], we conclude that ∆u = ∇p for some scalar
618
+ function p. Thus u satisfies (4). Since u has the z-component zero, pz = 0, and hence p is
619
+ constant in z. Subtracting this constant, we can view p as being zero in the z-component and
620
+ in this sense independent of z. So we have proved that u is a solution of the two-dimensional
621
+ Stokes equations.
622
+ Using polar coordinates, we find
623
+ −uy = x sin θ
624
+ �f ′
625
+ r − f
626
+ r2
627
+
628
+ ,
629
+ ux = f ′ sin2 θ + f cos2 θ
630
+ r
631
+ .
632
+ (20)
633
+ Impose constraints
634
+ f(1) = f ′(1) = 1,
635
+ f(b) = f ′(b) = 0.
636
+ (21)
637
+ The latter two constraints in (21) imply that u = curl ψ = 0 for r = b. The first two
638
+ constraints in (21) imply that
639
+ u(r = 1) = (1, 0).
640
+ Since we have identified four parameters and four constraints, we likely have found the
641
+ required solution. But to be sure, we need to solve these equations and see what happens
642
+ when b → ∞.
643
+ 5.2.1
644
+ Algebraic solution of the PDE
645
+ Using the boundary conditions (21), we can evaluate the constants A, B, C, and D. We
646
+ have
647
+ B =
648
+ −2(b2 + 1)
649
+ 2 + 2b2(log b − 1) + 2 log b =
650
+ −(1 + b−2)
651
+ log b − 1 + b−2(1 + log b) ≈ −1
652
+ log b
653
+ and
654
+ C =
655
+ 1
656
+ 2 + 2b2(log b − 1) + 2 log b ≈
657
+ 1
658
+ 2b2 log b,
659
+ together with
660
+ A = 1
661
+ 2B + C
662
+ and
663
+ D = 1 − 1
664
+ 2B − 2C.
665
+ Although its derivation is tedious and error-prone, such a result can be checked in various
666
+ ways. Thus as b → ∞,
667
+ B → 0, b2C → 0 =⇒ A → 0, D → 1.
668
+ Therefore ub → (1, 0) as b → ∞.
669
+ 5.2.2
670
+ Asymptotic behavior
671
+ In particular, A, B, and b2C decay like 1/ log b. Using (20), we find
672
+ u(r, θ) = (f ′(r), 0) −
673
+
674
+ f ′(r) − r−1f(r)
675
+
676
+ (cos2 θ, cos θ sin θ).
677
+ Subtracting the expressions for f ′ and f/r, we find
678
+ ��f ′(r) − r−1f(r)
679
+ �� =
680
+ ����
681
+ −2A
682
+ r2
683
+ + B + 2Cr2
684
+ ���� ≤
685
+ c
686
+ log b.
687
+ 12
688
+
689
+ Examining the expression for f ′, we see that it decays like 1/ log r. Thus we considered the
690
+ expression
691
+ χb(r) =
692
+
693
+ 1 + 3 log r
694
+ 2 log b
695
+
696
+ f ′(r).
697
+ (22)
698
+ A plot of χb for b = 10k for k = 2, 3, . . . , 8 is seen in Figure 5. From this figure, we see that
699
+ χb ≈ 1 for small r/b. Note that, by definition of χb,
700
+ ux ≈ f ′(r) =
701
+
702
+ 1 + 3 log r
703
+ 2 log b
704
+ �−1
705
+ χb(r).
706
+ (23)
707
+ Figure 5: Plot of χb defined in (22) for b = 10k for k = 2, 3, . . . , 8. The horizontal axis is r.
708
+ 5.3
709
+ Friction boundary conditions
710
+ We performed a series of tests solving (4) in the domain (17) with Navier boundary condi-
711
+ tions (11) with β = 0, for various r.
712
+ Figure 4(b) gives the data for three values of d as a
713
+ function of box size r for Navier boundary conditions (11) with β = 0. These data suggest
714
+ that ur is converging to (1, 0) as r → ∞ with Navier boundary conditions.
715
+ 6
716
+ Navier–Stokes: no paradox
717
+ According to [6, corollary to Theorem 7A], the nonlinear problem (1) has a solution with
718
+ g = 0 and u → u∞ with u∞ a constant, provided that |u∞| is sufficiently small; also see [7,
719
+ Theorem XII.5.1]. The realization that adding an advection term to the equations resolves
720
+ 13
721
+
722
+ 0.8
723
+ 0.6
724
+ 0.4
725
+ 0.2
726
+ 0
727
+ -0.2
728
+ -0.4
729
+ 100
730
+ 10
731
+ 102
732
+ 103
733
+ 10°
734
+ 105
735
+ 106
736
+ 10°
737
+ 108the Stokes paradox began with the work of Oseen [19]. See [6] for more historical references.
738
+ The results of Finn [6] confirm that, for the Navier–Stokes equations, one can pose boundary
739
+ conditions both on the cylinder (or other bluff body) and at infinity.
740
+ The constant function g is also a solution of (1) (with constant pressure) for any R > 0.
741
+ But the boundary conditions are different in this case. We can sum up the Stokes paradox
742
+ by saying that a boundary condition is lost when we set the Reynolds number R to zero.
743
+ Thus fluid flow can be described accurately in unbounded domains only by a nonlinear
744
+ system.
745
+ For the cylinder problem, the diameter L gives us a length scale. Once we pick the flow
746
+ u∞ (or g), we have a speed U, and together with the kinematic viscosity ν, this determines
747
+ a Reynolds number R > 0 given by (3). The only way R can be zero is to have u∞ = g = 0
748
+ (or infinite viscosity, which does not sound like a fluid). Thus the Stokes equations can be
749
+ viewed as an approximation for small Reynolds numbers, and this approximation works well
750
+ for bounded domains. But it fails for infinite domains.
751
+ The existence of solutions of the Navier–Stokes system for large external flows, or equiv-
752
+ alently for large Reynolds numbers, is reviewed by Galdi in [7, section XII.6]. However, the
753
+ results there are not definitive; they present a condition that must hold if no such solutions
754
+ exist.
755
+ 7
756
+ Extensions of the Stokes paradox
757
+ The Stokes paradox has implications for other flow problems. Here we mention two of them.
758
+ 7.1
759
+ Flow instability
760
+ Determining the form of Reynolds–Orr instability modes for Navier–Stokes flow around a
761
+ cylinder requires solution of a generalized eigenproblem of the form [11]
762
+ −∆u + ∇p = λ−1BRu in Ω,
763
+ ∇· u = 0 in Ω,
764
+ (24)
765
+ with homogeneous boundary conditions on Γ = ∂Ω. Here the multiplication operator BR is
766
+ defined by
767
+ BR(x) = 1
768
+ 2
769
+
770
+ ∇uR(x) + ∇ut
771
+ R(x)
772
+
773
+ ,
774
+ where uR solves (1). Restricted to a bounded domain, this constitutes a symmetric gener-
775
+ alized eigenproblem, and thus it has real eigenvalues [25].
776
+ On an unbounded domain, we expect that some rate of decay for B would be required
777
+ in order that the eigenproblem is well behaved. Define
778
+ V =
779
+
780
+ v ∈ H1
781
+ w(Ω) : v = 0 on Γ
782
+
783
+ ,
784
+ and we endow V with the norm of H1
785
+ w(Ω).
786
+ Lemma 7.1 Suppose that there is a positive constant CB such that
787
+ |B(x)| ≤ CB
788
+
789
+ 1 + |x|−2 log2 |x|
790
+
791
+ ∀x ∈ Ω.
792
+ (25)
793
+ Then the multiplication operator associated with B is a bounded operator from V to V ′.
794
+ 14
795
+
796
+ In the statement of the lemma, |B(x)| denotes the Frobenius norm of B(x). To prove
797
+ the lemma, recall from [9, page 315] that
798
+ ∥u∥V ′ =
799
+ sup
800
+ 0̸=v∈V
801
+
802
+ Ω u(x) · v(x) dx
803
+ ∥v∥H1w(Ω)
804
+ .
805
+ (26)
806
+ But H¨older’s inequality and (25) imply
807
+ ���
808
+
809
+
810
+ B(x)u(x) · v(x) dx
811
+ ���
812
+ 2
813
+
814
+
815
+
816
+ |B(x)| |u(x)|2 dx
817
+
818
+
819
+ |B(x)| |v(x)|2 dx
820
+ ≤ C2
821
+ B∥u∥2
822
+ H1w(Ω)∥v∥2
823
+ H1w(Ω).
824
+ (27)
825
+ Thus we conclude that
826
+ ∥Bu∥V ′ ≤ CB∥u∥H1w(Ω).
827
+ This completes the proof of Lemma 7.1.
828
+ Consider the operator K defined by Kv = u where u ∈ V solves
829
+ −∆u + ∇p = Bv in Ω,
830
+ ∇· u = 0 in Ω.
831
+ (28)
832
+ Note that the eigenproblem for K, that is Ku = λu, provides a resolution of (24). The
833
+ following is a corollary of Lemma 7.1.
834
+ Theorem 7.1 Suppose that (25) holds. Then K is a bounded operator from V to V .
835
+ The proof of Theorem 7.1 follows from [9, Theorem 3.4] and Lemma 7.1.
836
+ From [7, Remark XII.8.3] we expect that
837
+ |∇uR(x)| = O
838
+
839
+ |x|−1 log2 |x|
840
+
841
+ for large |x|.
842
+ Thus (25) does not hold for BR, and the associated multiplication operator is not a bounded
843
+ operator on H1
844
+ w(Ω). Indeed it was found in [11] that the eigenvalues increase as the compu-
845
+ tational domain size is increased. We can summarize these observations as follows. Despite
846
+ the fact that the Navier–Stokes equations are well defined on unbounded domains, the
847
+ equations for their instabilities are not. We are tempted to call this the instability paradox.
848
+ 7.2
849
+ Power-law fluids
850
+ Tanner [28] has shown that shear thinning power-law fluids do not suffer Stokes’ paradox,
851
+ but that shear thickening power-law fluids do. The Stokes power law model is given by [16,
852
+ (1.5)]
853
+ −ν∇·
854
+
855
+ |Du|r−2Du
856
+
857
+ + ∇p = f
858
+ in Ω,
859
+ ∇· u = 0
860
+ in Ω,
861
+ (29)
862
+ where Du = 1
863
+ 2
864
+
865
+ ∇u + ∇ut�
866
+ . The fluid model is shear thinning if r < 2 and shear thickening
867
+ if r > 2. The case r = 2 is the standard Stokes model.
868
+ Tanner showed that for flow around a cylinder, the Stokes paradox holds for r > 2, but
869
+ not for r < 2. The approach [9] can possibly extend this result to more general domains.
870
+ Due to the length of the current paper, we postpone such an investigation to a subsequent
871
+ study.
872
+ 15
873
+
874
+ 8
875
+ Numerical implementation
876
+ The curved boundary of the cylinder was approximated by polygons Ωh, where the edge
877
+ lengths of ∂Ωh are of order h in size. Then conventional finite elements can be employed,
878
+ with the various boundary expressions being approximated by appropriate quantities. For
879
+ the computations described in section 5.1, we used the Robin-type technique [22] together
880
+ with the Scott–Vogelius elements of degree 4. The order of approximation for the numerical
881
+ method is h7/2 in the gradient norm.
882
+ The remaining results were computed using the lowest-order Taylor–Hood approxi-
883
+ mation.
884
+ To implement the Navier-slip boundary condition, we used Nitsche’s method
885
+ [12, 24, 31] to enforce slip conditions in the limit of small mesh size. The details regarding
886
+ numerical implementation of (1) together with boundary conditions (2) and (11), are given
887
+ in [12]. The boundary integrals are approximated to order h2, but the order of approxima-
888
+ tion for the numerical method is only of order h3/2 in the gradient norm.
889
+ 9
890
+ Conclusions
891
+ We have shown that examining the Stokes paradox from different angles enriches the un-
892
+ derstanding of the phenomenon. The approaches dovetail together in the final analysis, but
893
+ they allow answers to different questions related to the paradox. Perhaps the most critical
894
+ question relates to what goes wrong when we pose the Stokes problem on larger and larger
895
+ domains. We explored two different ways to consider this question, via numerical simulation
896
+ for general domains and analytical solutions on specific domains. Fortunately, they give the
897
+ same advice as to what happens in the limit, and this agrees with the functional analysis
898
+ formulation of the problem on an infinite domain. We showed that the Stokes paradox can
899
+ arise in other flow problems as well.
900
+ 10
901
+ Acknowledgments
902
+ We thank Vivette Girault for valuable information and advice.
903
+ References
904
+ [1] F. Alliot and C. Amrouche. Weak solutions for the exterior Stokes problem in weighted
905
+ Sobolev spaces. Mathematical Methods in the Applied Sciences, 23(6):575–600, 2000.
906
+ [2] Martin Alnæs, Jan Blechta, Johan Hake, August Johansson, Benjamin Kehlet, Anders
907
+ Logg, Chris Richardson, Johannes Ring, Marie E. Rognes, and Garth N. Wells. The
908
+ FEniCS project version 1.5. Archive of Numerical Software, 3(100), 2015.
909
+ [3] Charles J. Amick. On Leray’s problem of steady Navier-Stokes flow past a body in the
910
+ plane. Acta Mathematica, 161:71–130, 1988.
911
+ [4] an anonymous referee, 2022.
912
+ [5] Anis Dhifaoui, Mohamed Meslameni, and Ulrich Razafison. Weighted Hilbert spaces for
913
+ the stationary exterior Stokes problem with Navier slip boundary conditions. Journal
914
+ of Mathematical Analysis and Applications, 472(2):1846–1871, 2019.
915
+ 16
916
+
917
+ [6] Robert Finn. Mathematical questions relating to viscous fluid flow in an exterior do-
918
+ main. The Rocky Mountain Journal of Mathematics, 3(1):107–140, 1973.
919
+ [7] Giovanni Galdi. An introduction to the mathematical theory of the Navier-Stokes equa-
920
+ tions: Steady-state problems. Springer Science & Business Media, 2011.
921
+ [8] Vivette Girault and Pierre-Arnaud Raviart. Finite element methods for Navier-Stokes
922
+ equations: theory and algorithms, volume 5. Springer Science & Business Media, 1986.
923
+ [9] Vivette Girault and Ad´elia Sequeira.
924
+ A well-posed problem for the exterior Stokes
925
+ equations in two and three dimensions. Archive for Rational Mechanics and Analysis,
926
+ 114(4):313–333, 1991.
927
+ [10] Ingeborg G. Gjerde and L. Ridgway Scott. Resolution of d’alembert’s paradox using
928
+ slip boundary conditions: The effect of the friction parameter on the drag coefficient.
929
+ arXiv e-prints, page arXiv:2204.12240, April 2022.
930
+ [11] Ingeborg G. Gjerde and L. Ridgway Scott. Kinetic-energy instability of flows with slip
931
+ boundary conditions. Journal of Mathematical Fluid Dynamics, 24(4):1–27, 2022.
932
+ [12] Ingeborg G. Gjerde and L. Ridgway Scott. Nitsche’s method for Navier-Stokes equations
933
+ with slip boundary conditions. Mathematics of Computation, 91(334):597–622, 2022.
934
+ [13] Fr´ed´eric Hecht. New development in freefem++. Journal of numerical mathematics,
935
+ 20(3-4):251–266, 2012.
936
+ [14] Saul Kaplun and P. A. Lagerstrom. Asymptotic expansions of Navier-Stokes solutions
937
+ for small Reynolds numbers. Journal of Mathematics and Mechanics, pages 585–593,
938
+ 1957.
939
+ [15] L. D. Landau and E. M. Lifshitz. Fluid Mechanics. Oxford: Pergammon Press, second
940
+ edition, 1987.
941
+ [16] Lew Lefton and Dongming Wei. A penalty method for approximations of the stationary
942
+ power-law Stokes problem. Electronic Journal of Differential Equations, (7):1–12, 2001.
943
+ [17] Andrew Lucas. Stokes paradox in electronic Fermi liquids. Phys. Rev. B, 95:115425,
944
+ Mar 2017.
945
+ [18] Chiara Neto, Drew R. Evans, Elmar Bonaccurso, Hans-J¨urgen Butt, and Vincent S. J.
946
+ Craig. Boundary slip in Newtonian liquids: a review of experimental studies. Reports
947
+ on Progress in Physics, 68(12):2859, 2005.
948
+ [19] Carl Wilhelm Oseen. Neuere Methoden und Ergebnisse in der Hydrodynamik. Leipzig:
949
+ Akademische Verlagsgesellschaft mb H., 1927.
950
+ [20] Ian Proudman and J. R. A. Pearson. Expansions at small Reynolds numbers for the
951
+ flow past a sphere and a circular cylinder. Journal of Fluid Mechanics, 2(3):237–262,
952
+ 1957.
953
+ [21] L. Ridgway Scott. Introduction to Automated Modeling with FEniCS. Computational
954
+ Modeling Initiative, 2018.
955
+ 17
956
+
957
+ [22] L. Ridgway Scott. High-order Navier–Stokes approximation on polygonally approx-
958
+ imated curved boundaries. Research Report UC/CS TR-2022-??, Dept. Comp. Sci.,
959
+ Univ. Chicago, 2022.
960
+ [23] William T. Shaw.
961
+ A simple resolution of Stokes’ paradox?
962
+ arXiv preprint
963
+ arXiv:0901.3621, 2009.
964
+ [24] Rolf Stenberg. On some techniques for approximating boundary conditions in the finite
965
+ element method. Journal of Computational and Applied Mathematics, 63(1-3):139–148,
966
+ 1995.
967
+ [25] Gilbert W. Stewart. Matrix Algorithms. Volume II: Eigensystems. SIAM, 2001.
968
+ [26] Keith Stewartson. D’Alembert’s paradox. SIAM Review, 23(3):308–343, 1981.
969
+ [27] George Gabriel Stokes. On the effect of the internal friction of fluids on the motion of
970
+ pendulums. Trans. Camb. Phil. Soc., 9, Part II:8–106, 1851.
971
+ [28] Roger I. Tanner. Stokes paradox for power-law flow around a cylinder. Journal of
972
+ non-Newtonian Fluid Mechanics, 50(2-3):217–224, 1993.
973
+ [29] Roger Temam. Navier–Stokes equations: theory and numerical analysis. North-Holland,
974
+ third edition, 1984.
975
+ [30] Milton Van Dyke. Perturbation methods in fluid mechanics, annotated edition. The
976
+ Parabolic Press, Stanford, 1975.
977
+ [31] M. Winter, B. Schott, Andre Massing, and W. A. Wall. A Nitsche cut finite element
978
+ method for the Oseen problem with general Navier boundary conditions. Computer
979
+ Methods in Applied Mechanics and Engineering, 330:220–252, 2018.
980
+ 18
981
+
4tAyT4oBgHgl3EQfQPYV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
59E0T4oBgHgl3EQfewCK/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ee88038f73ff7f9cc908ea4f8fc3e95eb8bdec8ba8fe0bc62a6975861eb6666a
3
+ size 7798829
5tFJT4oBgHgl3EQfkyzq/content/tmp_files/2301.11581v1.pdf.txt ADDED
@@ -0,0 +1,1187 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A Green(er) World for A.I.
2
+ Dan Zhao∗, Nathan C. Frey∗, Joseph McDonald∗, Matthew Hubbell∗,
3
+ David Bestor∗, Michael Jones∗, Andrew Prout∗, Vijay Gadepally∗, Siddharth Samsi∗§
4
+ ∗ MIT Lincoln Laboratory
5
+ ©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including
6
+ reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or
7
+ reuse of any copyrighted component of this work in other works. DOI: 10.1109/IPDPSW55747.2022.00126
8
+ Abstract—As research and practice in artificial intelligence
9
+ (A.I.) grow in leaps and bounds, the resources necessary to
10
+ sustain and support their operations also grow at an increasing
11
+ pace. While innovations and applications from A.I. have brought
12
+ significant advances, from applications to vision and natural
13
+ language to improvements to fields like medical imaging and
14
+ materials engineering, their costs should not be neglected. As we
15
+ embrace a world with ever-increasing amounts of data as well as
16
+ research & development of A.I. applications, we are sure to face
17
+ an ever-mounting energy footprint to sustain these computational
18
+ budgets, data storage needs, and more. But, is this sustainable
19
+ and, more importantly, what kind of setting is best positioned
20
+ to nurture such sustainable A.I. in both research and practice?
21
+ In this paper, we outline our outlook for Green A.I.—a more
22
+ sustainable, energy-efficient and energy-aware ecosystem for
23
+ developing A.I. across the research, computing, and practitioner
24
+ communities alike—and the steps required to arrive there. We
25
+ present a bird’s eye view of various areas for potential changes
26
+ and improvements from the ground floor of AI’s operational
27
+ and hardware optimizations for datacenter/HPCs to the current
28
+ incentive structures in the world of A.I. research and practice,
29
+ and more. We hope these points will spur further discussion, and
30
+ action, on some of these issues and their potential solutions.
31
+ Index Terms—Green AI, sustainable AI, energy efficiency
32
+ I. INTRODUCTION
33
+ Issues of environmental sustainability and energy efficiency
34
+ have come to center stage as global warming, climate con-
35
+ cerns, and their consequences have permeated many aspects
36
+ of our economy and society. In finance, sustainable investing
37
+ has come to the fore where, in addition to traditional metrics
38
+ of assessing risk, themes of environmental, social, and gov-
39
+ ernance (ESG) have become important in evaluating financial
40
+ and purpose-driven outcomes. Throughout the private sector,
41
+ many companies have begun to re-examine and prioritize green
42
+ power usage and resource development [1] while governments
43
+ have begun to invest heavily in clean energy and climate
44
+ resilient infrastructure [2]—the list goes on.
45
+ While traditional sources of carbon emissions from agricul-
46
+ ture and transportation continue to contribute the lion’s share
47
+ of greenhouse gas emissions in the U.S., electricity usage
48
+ This material is based upon work supported by the Assistant Secretary of
49
+ Defense for Research and Engineering under Air Force Contract No. FA8702-
50
+ 15-D-0001, and United States Air Force Research Laboratory Cooperative
51
+ Agreement Number FA8750-19-2-1000. Any opinions, findings, conclusions
52
+ or recommendations expressed in this material are those of the author(s) and
53
+ do not necessarily reflect the views of the Assistant Secretary of Defense
54
+ for Research and Engineering, or the United States Air Force. The U.S.
55
+ Government is authorized to reproduce and distribute reprints for Government
56
+ purposes notwithstanding any copyright notation herein.
57
+ §Corresponding author. Email : [email protected]
58
+ from the operation of supercomputing and data centers are
59
+ climbing with historical signs of compute costs and demand
60
+ accelerating further in the years ahead [3]. Estimates place
61
+ datacenters’ electricity consumption at 1% of global electricity
62
+ demand [4] with projections of electricity usage reaching 8%-
63
+ 21% of global demand by 2030 [5], though extrapolation of
64
+ demand trends can be unreliable due to not accounting for new
65
+ improvements in energy efficiency [6]. However, even beyond
66
+ the energy footprint from electricity consumption, these data-
67
+ centers can take up significant amounts of water, either directly
68
+ for cooling or indirectly for electricity generation, bearing a
69
+ larger than expected environmental footprint—in the U.S., it is
70
+ estimated that 20% of datacenter servers’ direct water footprint
71
+ is sourced from moderately to highly stressed watersheds
72
+ and 50% of servers are at least partially supplied by power
73
+ plants in water stressed areas [7]. In addition to the energy
74
+ footprint datacenter/HPC operations, embodied carbon costs
75
+ [8] such as those associated with manufacturing hardware for
76
+ A.I. development and applications also matter, especially as
77
+ hardware continues to advance. As such, the environmental
78
+ footprint of A.I. may go beyond the costs represented by
79
+ carbon emissions of datacenters/HPCs alone.
80
+ Fig. 1: Modern AI’s Computational Demands. Note the steep
81
+ increase in just the past decade relative to the past 50 years. Source:
82
+ OpenAI & The Economist.
83
+ As industry adoption and incorporation of algorithms into
84
+ products and services become more commonplace, we have
85
+ seen significant growth in both the amounts of training data
86
+ and the size of the model itself [8] as the main means to
87
+ realize performance gains. Simultaneously, fundamental A.I.
88
+ research has continued to accomplish increasingly complex
89
+ tasks with increasingly complex models and large datasets.
90
+ These factors have, in turn, inevitably pushed similar growth
91
+ trends in infrastructure investments required to keep pace with
92
+ the increased amounts of training, inference, storage, and more
93
+ arXiv:2301.11581v1 [cs.AI] 27 Jan 2023
94
+
95
+ Deep and steep
96
+ Computing power used in training Al systems
97
+ Days spent calculating at one petaflop per second*, log scale
98
+ 100
99
+ 3.4-month
100
+ By fundamentals
101
+ AlphaGoZerobecomes itsown
102
+ doubling
103
+ 10
104
+ teacher of the game Go
105
+ O Language
106
+ ○ Speech
107
+ O Vision
108
+ 6
109
+ 1
110
+ OGames
111
+ 0 Other
112
+ AlexNet, image classification with
113
+ 0.1
114
+ deep convolutional neural networks
115
+ 0.01
116
+ 0.001
117
+ 0.0001
118
+ Two-year doubling
119
+ 0.00001
120
+ (Moore's Law)
121
+ ←First era→
122
+ → Modern era
123
+ 0.000001
124
+ Perceptron, a simple artificial neural network
125
+ 0.0000001
126
+ 1960
127
+ 70
128
+ 80
129
+ 90
130
+ 2000
131
+ 10
132
+ 20
133
+ Source:OpenAl
134
+ *1petaflop=1015calculations(see Fig. 1). Coupled with the anticipated increase in internet
135
+ traffic, consumer devices, and demand for the very products
136
+ and services some of these algorithms support [5], these
137
+ worrying trends in energy demand and its associated energy
138
+ footprint are likely to only accelerate. Even so, in the arms-
139
+ race for A.I. superiority and operationalization, companies
140
+ and institutions involved in A.I. research and its applications
141
+ have continually expanded their datacenters and operations.
142
+ Google’s datacenter facilities span several countries while
143
+ Meta has recently announced the construction of a new A.I.
144
+ Research SuperCluster (RSC) claimed to be among the fastest
145
+ and largest supercomputing centers upon completion [9]. In
146
+ this race to construct an ever-increasing number (and size) of
147
+ datacenters, supercomputing clusters, and supporting facilities,
148
+ there are few signs that this race will slow down. Instead, com-
149
+ panies are accepting this as an inevitability and are looking for
150
+ ways to help offset their ever-increasing energy footprint, such
151
+ as building their own additional energy production facilities to
152
+ fuel their operations [10] [11].
153
+ Energy-efficient data infrastructure and green computing
154
+ are hardly new concepts and have seen continued work
155
+ and advances. From the development of efficient chips like
156
+ Google’s TPUs [12] and other computing efficiency gains
157
+ to the application of A.I. algorithms themselves to automate
158
+ datacenter operations, there is a long list of existing prac-
159
+ tices and current works-in-progress to address the energy-
160
+ hungry and data-intensive appetite necessary to sustain these
161
+ algorithms. Though these advances in efficiency have kept
162
+ pace with the increased computation/energy needs and offset
163
+ demand thus far, there may be signs that this is unlikely
164
+ to last [13]. There also exists some debate on the true
165
+ extent to which issues on A.I.’s sustainability and energy
166
+ footprint are accurately described, largely driven by notable
167
+ successes in realizing energy and computational efficiency
168
+ in model training, datacenter/HPC operation, and hardware.
169
+ However, changes in climate resulting in rising temperatures
170
+ and more extreme weather patterns are likely to stress cooling
171
+ and already strained resources in many areas. While larger,
172
+ well-equipped technology companies have the resources and
173
+ incentives to act, develop, and adopt efficiently, there are still
174
+ clear, unaddressed concerns if all A.I. workflows move to
175
+ the same hardware and software stack despite the efficiency
176
+ benefits from centralization. As we run up against the limits
177
+ of remaining efficiency gains, other ideas and implementations
178
+ are needed, either as an anticipatory or preventative measure,
179
+ in order to proactively develop strategies that bring the dis-
180
+ course to these problems and their potential solutions.
181
+ In the following sections, we discuss the prospects of
182
+ encouraging energy efficiency across various levels of the
183
+ research & development spectra of A.I. and its applications:
184
+ (1) the infrastructure and resource utilization level, (2) the
185
+ individual user and behavioral level, and (3) the group and
186
+ community of A.I. researchers and practitioners at large. These
187
+ three aspects cover issues from a micro-to-macro perspective
188
+ but also emphasize a key point—no single change on any
189
+ one level is likely to be as effective without corresponding
190
+ changes on the other levels since these three aspects are part
191
+ of a single whole. A concerted, unified effort is required in
192
+ order to transition effectively to a greener ecosystem for A.I.
193
+ research and practice. To make our analyses more concrete in
194
+ our discussions, we leverage data from the MIT SuperCloud
195
+ [14], an operational peta-scale HPC system that is actively
196
+ used for research, experimentation, and collaborations by the
197
+ MIT research community in several disciplines across machine
198
+ learning, deep learning, and more.
199
+ II. ENERGY & BEHAVIORAL CONSIDERATIONS
200
+ In this section, we discuss potential improvements towards
201
+ a more energy-aware compute and cluster optimization frame-
202
+ work. While we discuss traditional aspects of datacenter/HPC
203
+ management in reducing energy expenditure (e.g. hardware,
204
+ system-level), we also focus on non-traditional possibilities.
205
+ We touch upon issues such as the economic considerations
206
+ of energy consumption like the opportunity costs of energy
207
+ purchases, the role/effect of user behavior in designing mecha-
208
+ nisms to encourage energy-efficient behavior, changes in exist-
209
+ ing behaviors (e.g. from either the user side or datacenter/HPC
210
+ management side), and combining—but balancing—existing
211
+ energy saving mechanisms on the hardware/systems side with
212
+ ones accounting for user behavior and incentives.
213
+ When it comes to energy efficiency, a simplified optimiza-
214
+ tion framework is useful in understanding the objectives, the
215
+ available choices/mechanisms are at our disposal to affect
216
+ change, their dependence on one another, trade-offs, and more.
217
+ This way, we can simplify the overall optimization problem
218
+ that operational datacenters/HPCs face:
219
+ min
220
+ qs,p,c E(qd, qs, p, c, ε) s.t. A(qd, qs, p, c, ε) ≥ α
221
+ (1)
222
+ where total energy expenditure E(·) and activity level A(·) of
223
+ the datacenter/HPC can be affected by various factors: exam-
224
+ ples include the “quantity” of compute resources demanded
225
+ or currently utilized by users (qd) as well as their usage
226
+ behaviors including but not limited to efficient/inefficient
227
+ practices, the “quantity” of compute resources supplied or
228
+ available to users (qs) and associated resource settings, the
229
+ job scheduling system or resource allocation rule in place (p),
230
+ control mechanisms (c) such as hardware settings (e.g. power
231
+ caps, clock rate settings) or other physical interventions (e.g.
232
+ rack placements, cooling setups) and “softer” mechanisms
233
+ (e.g. algorithmic, instrumentation) that may be in place, and
234
+ ε which accounts for other factors such as temperature (e.g.,
235
+ ambient, distributions across racks, local climate) and others
236
+ (e.g. a datacenter’s fuel mix and energy purchasing patterns,
237
+ maintenance schedules, electricity prices and energy mix).
238
+ In other words, the goal is to minimize the energy ex-
239
+ penditure E(·) of the datacenter subject to a constraint: the
240
+ activity or performance level A(·) of the supercluster must be
241
+ above some minimum, acceptable threshold α. This constraint
242
+ expresses a fundamental trade-off at the heart of energy-
243
+ efficiency: reductions in energy consumption or expenditure
244
+ need to be weighed against trade-offs in performance (i.e. jobs
245
+
246
+ still need to be done at a reasonable pace). If the performance
247
+ level constraint α is not satisfied, attempts to reduce energy
248
+ expenditure may produce perverse, unintended effects; for
249
+ instance, if a change to reduce energy consumption results
250
+ in noticeable performance degradation, then users may run
251
+ more jobs for longer, producing the opposite effect. Although
252
+ one possibility is that higher throughput jobs can reduce total
253
+ energy consumption by driving up power consumption but
254
+ finishing in shorter periods as a result, we assume here that α
255
+ corresponds to a bare minimum performance level—beneath
256
+ which even these high throughput jobs contribute little to
257
+ the overall energy footprint compared to the other kinds of
258
+ workloads/operations present.
259
+ Traditionally, resource management in datacenters/HPCs
260
+ tends to take an approach closely aligned with the problem
261
+ as outlined (Eq. 1), minimizing energy expenditure primarily
262
+ through three main ways: adjusting the available “supply” or
263
+ amount of resources qs (e.g. number/types of GPUs), adjusting
264
+ resource allocation rules and schedulers p, and usage of control
265
+ mechanisms c (e.g. hardware settings). These mechanisms can
266
+ be quite effective, cheap, and can easily produce intended
267
+ results as they do not necessarily require coordination or know-
268
+ how from users. While much work has focused on optimiz-
269
+ ing energy efficiency through these traditional mechanisms—
270
+ affecting available compute resources, resource allocation and
271
+ queuing/scheduling rules, or hardware/software and physical
272
+ configurations [15] [16]—new sources of efficiency will likely
273
+ need to be claimed from ε as we hit diminishing returns and,
274
+ eventually, limits from traditional measures. As easy sources
275
+ of efficiency are exhausted, these limits will require looking
276
+ beyond more traditional levers (i.e., p, qs, c) and towards less-
277
+ traditional ones (i.e., qd, ε).
278
+ A. Energy, Power, & Opportunity Costs
279
+ When considering the energy expenditure or carbon foot-
280
+ print of HPCs/datacenters, what quantity should we focus on?
281
+ As framed in Eq. 1, the main objective E(·) can represent
282
+ any number of quantities correlated with energy expenditure:
283
+ kilowatt-hours, power usage effectiveness (PUE), pounds of
284
+ CO2 emitted, amount of water used in cooling, etc. Besides
285
+ these quantities, E(·) can also account for aspects like the fis-
286
+ cal costs of the datacenter’s energy bill or even the opportunity
287
+ costs of its choices, arising from the timing, the amounts, or
288
+ the fuel composition of its energy demand and usage as well as
289
+ how they affect the datacenter’s environmental footprint. The
290
+ economic costs of a choice accounts not only for its direct
291
+ fiscal or monetary costs, but also its opportunity costs—the
292
+ cost of the best alternatives foregone. In this subsection, we
293
+ discuss these opportunity costs and strategies to reduce these
294
+ costs by changing energy purchasing behaviors like the timing
295
+ of energy purchases and other usage patterns.
296
+ For instance, consider the usage patterns of the MIT Su-
297
+ perCloud system [14] within a given year. Naturally, the
298
+ demand and usage of the system’s overall resources will vary
299
+ throughout a year, exhibiting regular patterns on different time
300
+ scales within the year. Just as demand and load vary, power
301
+ 2
302
+ 4
303
+ 6
304
+ 8
305
+ 10
306
+ 12
307
+ Month
308
+ 200
309
+ 250
310
+ 300
311
+ 350
312
+ 400
313
+ 450
314
+ Avg. Power (kW)
315
+ Power Consumption vs. Sustainable Fuel Generation
316
+ 5
317
+ 6
318
+ 7
319
+ 8
320
+ % Total from Solar/Wind
321
+ Fig. 2: Power Consumption vs. Green Fuel Mix. Average monthly
322
+ power consumption of MIT’s E1 hypercluster plotted against monthly
323
+ average percentage of supplied total energy derived from solar
324
+ and wind (2020-21). There are potential opportunities—high power
325
+ consumption when green energy production is low and vice versa
326
+ instead of the opposite.
327
+ 2
328
+ 4
329
+ 6
330
+ 8
331
+ 10
332
+ 12
333
+ Month
334
+ 20
335
+ 25
336
+ 30
337
+ 35
338
+ 40
339
+ 45
340
+ 50
341
+ Real Time Avg Price ($/MWh)
342
+ Energy Prices vs. Sustainable Fuel Generation
343
+ 5
344
+ 6
345
+ 7
346
+ 8
347
+ % Total from Solar/Wind
348
+ Fig. 3: Energy Prices vs. Green Fuel Mix. Average monthly
349
+ energy prices plotted against monthly average percentage of supplied
350
+ total energy derived from solar and wind (2020-21). Prices are
351
+ monthly locational marginal prices (LMP) from south eastern/central
352
+ MA. Note that energy prices tend to be lower when percentage of
353
+ sustainable energy is higher.
354
+ consumption will also vary—more users and jobs generally
355
+ translate into more computation and increased cooling costs,
356
+ increasing power draw from existing resources. Beyond the
357
+ dollars-and-cents of the HPC’s electricity bills, the make-up
358
+ or composition of the energy supplied by the power company
359
+ via the local grid can also influence the sustainability of a
360
+ datacenter/HPC’s operations albeit in a less direct way. The
361
+ different sources from which power is generated (i.e. the
362
+ fuel mix), supplied to, and consumed by the HPC carry an
363
+ implicit environmental opportunity cost: the usage or purchase
364
+ of power with a less sustainable fuel mix at a period in
365
+ time forgoes usage of power generated with a greener fuel
366
+ mix in that same time period. This, in turn, represents the
367
+ foregone opportunity to offset some portion of existing energy
368
+ expenditure while imposing an environment cost in the form
369
+ of greater energy inefficiency as an externality. One way to
370
+ then improve energy efficiency is to shift energy expenditure
371
+ more towards power sourced from higher ratios of sustainable
372
+ fuel mixes (i.e. generated with more sustainable sources like
373
+ solar and wind).
374
+ Figure 2 suggests there may be an opportunity to change
375
+ the datacenter/HPC’s purchasing behavior for this strategy to
376
+ be viable. Over the course of the year, we see that the total
377
+ share of fuel/energy produced from solar and wind is inversely
378
+
379
+ related to the average amount of power used per month. The
380
+ MIT Supercloud energy consumption has been relatively high
381
+ when the share of renewable energy is low around June to
382
+ August—similarly, energy consumption/expenditure is lower
383
+ when the share of renewable energy in the fuel mix of the
384
+ power supplied is higher. One strategy to take advantage of this
385
+ mis-match between power consumption and fuel mix, increase
386
+ energy efficiency, and reduce the environmental opportunity
387
+ cost is to purchase more power during times when sustainable
388
+ energy takes up a larger share of the fuel mix (e.g. March
389
+ to May) and either: (1) capitalize during that time period by
390
+ encouraging more cluster utilization during those months or
391
+ (2) store that energy to help offset energy consumption during
392
+ times where the fuel mix is less sustainably sourced.
393
+ Figure 3 suggests this strategy also carries financial ben-
394
+ efits. During springtime, from February to May, when the
395
+ sustainable energy share of fuel mix tends to be high (> 8%),
396
+ general energy prices tend to be extremely low ($20-$25 per
397
+ megawatt-hour) and are some of the lowest prices of the
398
+ year. However, it is important to note that renewable energies
399
+ like solar and wind may not always see stable generation;
400
+ moreover, there are additional fixed costs incurred from setting
401
+ up the relevant infrastructure that may be required in order to
402
+ pursue strategies like the ones described above. We explore
403
+ and discuss the application of A.I. to help stabilize sustainable
404
+ energy generation as well as infrastructure investments as they
405
+ relate to efficiency in the sections below.
406
+ B. Temperature-aware & Weatherized Compute Optimization
407
+ While changes in the regular, shorter-term behavior of
408
+ datacenters/HPCs can be helpful, like those described above,
409
+ longer-term structural changes and preparations are essential.
410
+ As changes in climate produce increasingly extreme weather
411
+ events and rising temperatures [17], traditional mechanisms
412
+ alone may be insufficient to brace for what is to come.
413
+ In light of these upcoming challenges, energy-aware cluster
414
+ optimization must find ways to explicitly account for factors
415
+ in ε that, though difficult to anticipate, carry significant
416
+ consequences to datacenter/HPC health and efficiency such
417
+ as weather and climate. How would existing concepts and
418
+ practices of cluster management and energy efficiency change
419
+ with more extreme climate and more frequent weather events?
420
+ What would weatherized compute optimization look like?
421
+ In Fig. 4, we see the monthly average temperature and
422
+ its trend along with those of power consumption for the
423
+ MIT Supercloud system. Throughout the year, there is a
424
+ monotonic, one-to-one relationship between average monthly
425
+ power consumption and average monthly (local) temperature.
426
+ As temperatures become warmer heading into the spring and
427
+ summer months, it takes more power to cool the facilities
428
+ and maintain a sufficiently low temperature for normal oper-
429
+ ations, resulting in increased power consumption. If average
430
+ temperatures continue to climb even in the colder months as
431
+ a consequence of climate change, cooling is likely to become
432
+ more difficult and costly as previously efficient mechanisms
433
+ for cooling facilities may suffer previously unseen stress.
434
+ Fig. 4: Power Consumption vs. Green Fuel Mix. Average monthly
435
+ power consumption of MIT Supercloud plotted against monthly aver-
436
+ age temperature (in Fahrenheit). Note the near one-to-one relationship
437
+ between temperature and power consumption.
438
+ As such, investments into infrastructure weatherization is
439
+ critical. As changes in climate induce more extreme weather
440
+ events and temperature ranges with increasing regularity, ex-
441
+ isting methods to realize energy efficiency may no longer be
442
+ as effective under more frequent or extreme weather/climate
443
+ conditions especially if mechanisms only function effectively
444
+ within a small band of temperature/climate conditions. Since
445
+ historical data points of extreme weather can be rare (for now),
446
+ a useful exercise can be a regularly conducted stress-test akin
447
+ to the Dodd-Frank stress tests [18] enacted after the 2008
448
+ financial crisis; these stress tests are conducted annually and
449
+ provide simulated stress scenarios that test the resiliency of
450
+ financial institutions in both its traditional functions/operations
451
+ as well as with less traditional risks (e.g. geopolitical, climate,
452
+ infrastructure), helping identify areas in need of remediation.
453
+ Similar stress scenarios and risk identification, conducted
454
+ and evaluated regularly, for not just regular datacenter/HPC
455
+ operations but also for climate and weather resiliency can
456
+ help anticipate what energy efficiency (and inefficiency) looks
457
+ like when considering future changes in weather and climate.
458
+ For institutions with more than one HPC/datacenter, these
459
+ exercises can provide opportunities to plan and coordinate
460
+ across geo-scattered HPCs/datacenters to improve their col-
461
+ lective resilience or develop re-routing backups in extreme
462
+ weather conditions. Most importantly, these exercises can help
463
+ anticipate and identify critical areas of infrastructure which
464
+ require both a significant time and financial investment that
465
+ may not come up otherwise.
466
+ C. Incentives, Behavior, & Mechanism Design
467
+ Hardware and system-level mechanisms can carry much of
468
+ the weight in producing energy savings under-the-hood and
469
+ abstracting away difficulties without taking away from user
470
+ experience. If these interventions run into diminishing returns,
471
+ then discovering remaining gains in efficiency will require
472
+ work not only from the “supply” side of computing but also
473
+ on the “demand” side, qd—the user. Compared to the macro-
474
+ level approach dealing with cluster/datacenter-wide hardware
475
+ and system-level interventions, this micro-level approach can
476
+
477
+ PowerConsumptionvs.MonthlyTemperature
478
+ 450
479
+ 70
480
+ 400
481
+ Avg.MonthlyTemperature (F)
482
+ Power (kW)
483
+ 350
484
+ 60
485
+ 300
486
+ 50
487
+ 250
488
+ 40
489
+ 200
490
+ 2
491
+ 4
492
+ 6
493
+ 8
494
+ 10
495
+ 12
496
+ Monthprovide additional flexibility but will require careful planning
497
+ around mechanism design, user behavior, and user incentives.
498
+ From this perspective, the optimization problem faced by the
499
+ datacenter changes from Eq. 1 to
500
+ min
501
+ i
502
+ ei(qd(i), qs, p, c, ε) s.t. ai(qd(i), qs, p, c, ε) ≥ αi ∀i
503
+ where
504
+
505
+ i
506
+ ei = E,
507
+
508
+ i
509
+ ai = A
510
+ (2)
511
+ for each individual or representative user (or workload) i.
512
+ Whereas before the datacenter/HPC in Eq. 1 had control
513
+ mainly through qs, p, and c, now the main mechanism is
514
+ through a specific user/profile/representative workload i. This
515
+ ultimately translates into the datacenter attempting to induce
516
+ changes in the quantity of resources demanded qd, as reflected
517
+ by qd(i). Instead of total across-the-board quantities like total
518
+ energy and total activity/performance, E(·) and A(·), we
519
+ now focus on individual (or representative) users, profiles, or
520
+ representative workloads and their energy usage and activity
521
+ profiles, as denoted by ei(·), ai(·), and αi. Naturally, by tailor-
522
+ ing energy minimization efforts to representative user profiles
523
+ and workloads, these mechanisms can reduce overall energy
524
+ expenditure selectively in ways that systematic hardware inter-
525
+ ventions cannot. These micro-level approaches aim to induce
526
+ behavioral changes in users through affecting incentives with
527
+ the support of predictive analytics and instrumentation.
528
+ One example is the design of queues for finer user and
529
+ workload segmentation; these queues can improve job schedul-
530
+ ing and execution using user-provided information (and other
531
+ information) like the user’s stated preferences on energy
532
+ efficiency, job urgency/patience, expected time completion,
533
+ type of workload, etc. Policies can then be tailored more
534
+ specifically with only the resources necessary, allowing for
535
+ more efficient design elements by reducing idle time, over-
536
+ allocation, and over-utilization of resources. However, if queue
537
+ selection and user intent conflict in situations where the user
538
+ has an incentive towards a specific resource configuration
539
+ different from the assigned one, this mechanism runs the risk
540
+ of adverse selection—users mis-characterize their preferences
541
+ and select themselves into queues where resources are fastest,
542
+ most plentiful, or the most available, leaving select queues
543
+ clogged and overtaxed and others largely, if not entirely, idle.
544
+ In the example above, too many self-characterizing choices
545
+ are made available for users to potentially mis-represent their
546
+ preferences and extract private benefits while imposing a social
547
+ cost on the whole system. One alternative to balance these two
548
+ factors of too much choice and too little control is to maintain
549
+ a two-part mechanism: a fixed component that guarantees a
550
+ specified minimum amount of energy efficiency and a variable
551
+ component that allows for user choice to further scale energy
552
+ efficient behavior, but only in certain respects. For instance,
553
+ it has been shown that optimal GPU power-caps provide an
554
+ effective way to control energy consumption with minimal
555
+ impact on training speed [15] and user experience. With these
556
+ optimal power caps as the fixed base component, the variable
557
+ component can be offered as a choice: if an user accepts
558
+ increasingly stringent power caps on his/her allocated GPUs
559
+ (or other restrictions), the user can then, in exchange, choose
560
+ to have more GPUs allocated to his/her tasks. These types of
561
+ choice mechanisms require a cost-benefit analyses to balance
562
+ individual net benefits/costs with system-level benefits/costs
563
+ but can help induce energy-efficient changes in user behavior
564
+ and computing demand.
565
+ Designing mechanisms can be difficult but predictive mod-
566
+ els and analytical tools can help in understanding and evaluat-
567
+ ing both utilization patterns as well as opportunities to affect
568
+ them in an energy-efficient way. Models that help forecast
569
+ and relate energy prices, fuel mix, as well as energy expen-
570
+ diture to one another can provide significant support in the
571
+ decision-making process for optimizing energy purchases and
572
+ consumption. Similarly, models leveraging data on compute
573
+ demand and usage (e.g. holidays, research deadlines) can help
574
+ with scheduling, maintenance, etc. Though these mechanisms
575
+ are not without their drawbacks, predictive analytics and in-
576
+ strumentation can help mitigate these shortfalls by anticipating
577
+ and analyzing behavior via data and inference.
578
+ III. CLIMATE-AWARE RESEARCH ECOSYSTEMS
579
+ A significant part of the A.I. research ecosystem is driven
580
+ and structured by incentives to publish in notable, high-
581
+ visibility conferences and journals. These venues serve as
582
+ important forums for the A.I. community—researchers, prac-
583
+ titioners, and the state of research as a whole—to disseminate
584
+ new and important findings, promote brands, seek/hire talent,
585
+ highlight significant contributions and problems, exchange
586
+ information, foster innovation and collaborative relationships,
587
+ and more. These contributions notwithstanding, the way the
588
+ research ecosystem is currently structured can create incen-
589
+ tives worth reconsidering when transitioning towards a more
590
+ sustainable research environment.
591
+ As both fundamental research and applications in A.I. to
592
+ various fields continue to grow, high-visibility venues will
593
+ likely receive more focus and submissions as researchers and
594
+ practitioners strive to publish in the “best” possible venue.
595
+ Many metrics of success in fundamental and applied research
596
+ are also heavily influenced, if not defined, by publishing
597
+ in these venues—preferring or requiring that researchers,
598
+ practitioners, and even job candidates to have publications
599
+ at notable venues—which continues to serve as a common
600
+ incentive and evaluative criterion. With such a significant focus
601
+ on publication in key conferences, how do these incentives
602
+ drive the pattern of research activity and what environmental
603
+ consequences do they carry, if any? Previous works have
604
+ studied the carbon footprint generated by participants traveling
605
+ to conferences [19] [20] but less attention has focused on the
606
+ effect of the distribution of deadlines themselves.
607
+ Conferences deadlines are typically scattered throughout the
608
+ year with each conference serving a specific domain or as
609
+ a general purpose venue (e.g. see Table I). Specific dates
610
+ are publicized several months ahead to give enough time for
611
+ preparation and planning. The distribution of these deadlines
612
+ may induce certain patterns in aggregate research activity,
613
+
614
+ compute demand, and therefore energy utilization, the last
615
+ of which we use as a proxy for activity/demand. As an
616
+ exploratory analysis, we compare the number of conference
617
+ deadlines per month from January 2020 to end of year 2021
618
+ with trends in monthly energy usage in the MIT Supercloud
619
+ system (Figure 5). To help account for the confounding
620
+ effects of seasonality, temperature, and other factors on energy
621
+ utilization, we include data across two years (2021 & 2022).
622
+ Given the way deadlines are structured, we might expect
623
+ a lagging relationship where activity or compute demand,
624
+ and hence energy utilization, might pick up in anticipation of
625
+ upcoming deadlines—the larger the number or concentration
626
+ of upcoming deadlines, the larger the increase in compute
627
+ demand. As deadlines approach, users are accelerating their
628
+ workloads, finishing or repeating experiments, and preparing
629
+ for conference submission. In Figure 5, we see some pick-
630
+ up in energy usage leading up to the months with a high
631
+ concentration of deadlines (i.e. July 2020)—such as the uptick
632
+ starting around March/April 2020 and leading up to July
633
+ 2020—but this may also be due to higher temperatures and
634
+ cooling costs as noted earlier. However, there is a sharper
635
+ pickup in energy usage starting around Jan/Feb 2021 in
636
+ anticipation of a notable concentration of deadlines in the
637
+ subsequent months. This sharp increase in energy usage is
638
+ significantly higher than in the same period of the previous
639
+ year despite no significant differences in average temperature
640
+ or other known factors in those time periods between the two
641
+ years—the only difference being the concentration/number of
642
+ deadlines. Overall, we also see that many deadlines tend to
643
+ concentrate in the spring/summer across both years when the
644
+ combination of higher temperatures and increased compute
645
+ demand can exacerbate existing energy trends, resulting in
646
+ significantly higher energy usage that taxes the cluster. In the
647
+ same period (i.e. the summer months), the fuel mix of the
648
+ supplied power also has the lowest ratio of sustainable energy
649
+ of the year, as seen earlier (Fig. 2), which further contributes
650
+ to an enlarged environmental footprint.
651
+ A natural question that may arise is: can we structure
652
+ deadlines to spread out energy utilization and compute demand
653
+ to benefit energy efficiency? If the same amount of compute
654
+ is to be spent throughout an representative year of research
655
+ activity regardless, then several options may help distribute
656
+ that amount in a more sustainable fashion: (1) spread deadlines
657
+ more uniformly throughout the year, (2) concentrate deadlines
658
+ in the winter/spring months when preceding months are colder
659
+ or see more sustainable fuel generation, or (3) abolish fixed
660
+ deadlines in favor of rolling submissions. Some venues (e.g.
661
+ Transactions on Machine Learning Research) have already
662
+ shifted to rolling submissions albeit for different reasons.
663
+ We note that our preliminary analysis is intentionally limited
664
+ in scope as we focus exclusively on the MIT Supercloud
665
+ system. Additionally, it neither accounts for other confounding
666
+ factors explicitly nor does it show a definitive connection be-
667
+ tween conference timings and usage/energy intensity. Rather,
668
+ it is meant to bring attention to how structural incentives
669
+ in the current A.I. research ecosystem and community may
670
+ not align optimally with desirable aspects of sustainability—
671
+ with one example being conference deadlines. More work and
672
+ data are required to tease out the full picture of the degree
673
+ to which aggregate research activity and its energy footprint
674
+ are affected by conference timings. We hope that future
675
+ work will undertake a finer analysis, accounting for details
676
+ such as workload type, type of research activity represented,
677
+ breakdown of activity and energy use by domain (e.g. NLP),
678
+ etc. beyond just data from this cluster. This requires more data,
679
+ better data, data access, as well as willingness to share these
680
+ data, which may not currently exist in sufficient amounts, a
681
+ matter we discuss further below.
682
+ TABLE I: List of notable conferences. The following con-
683
+ ferences are considered for analysis (not exhaustive).
684
+ Area/Discipline
685
+ Conferences
686
+ NLP/Speech
687
+ EACL, InterSpeech, EMNLP, AKBC, ICASSP
688
+ ISMIR, AACL-IJCNLP, COLING, CoNNL,
689
+ WMT, EACL
690
+ Computer Vision
691
+ ICME, ICIP, SIGGRAPH, MIDL, ICCV,
692
+ FG, ICMI, BMVC, WACV
693
+ Robotics
694
+ IROS, RRS, CoRL, ICRA
695
+ General ML
696
+ COLT, ICCC, ICPR, AAMAS, AISTATS, CHIL
697
+ EMCL-PKDD, NeurIPS, ACML, AAAI, ICLR
698
+ Data Mining
699
+ SDM, KDD, SIGIR, RecSys, CIKM, ICDM
700
+ WSDM, WWW
701
+ Fig. 5: Energy Usage vs. Number of Conference Deadlines
702
+ Average monthly power consumption of MIT’s E1 cluster plotted
703
+ against number of monthly conference deadlines (Table I)
704
+ IV. CLIMATE-AWARE RESEARCH PRIORITIES
705
+ A discussion on the sustainability of the current A.I. re-
706
+ search ecosystem and its incentives would be incomplete
707
+ without discussing the thematic lines of work, both old and
708
+ new, such an ecosystem should prioritize in order to improve
709
+ its sustainability and keep its environmental footprint small.
710
+ A. Novelty, Redundancies, & Efficiency
711
+ Given the complexity and variety of research and appli-
712
+ cations in A.I., there are likely significant redundancies in
713
+ A.I. workflows. Many experiments usually begin with training
714
+
715
+ Energy Usage vs.Conference Deadlines
716
+ 700
717
+ EnergyUsage
718
+ 6
719
+ 600
720
+ 5
721
+ Conference Deadlines
722
+ (Avg. Power kW)
723
+ 500
724
+ 4
725
+ 400
726
+ 3
727
+ 300
728
+ 2
729
+ 200
730
+ 1
731
+ 2020
732
+ 6-2020
733
+ 9-2020
734
+ -2020
735
+ -2020
736
+ 2021
737
+ 8-2021
738
+ 10-2021
739
+ 6known and proven models up to some pre-specified level
740
+ of performance, depending on the research direction, before
741
+ building atop these results. Doing so may require some hyper-
742
+ parameter search, if not full-blown optimization, resulting in
743
+ multiple training runs and inevitably redundant runs, wasted
744
+ compute, and additional energy costs. Some redundancies can
745
+ play a helpful role by training students and researchers when
746
+ they start working on A.I. research where experience obtained
747
+ from reproducing results can help shape best practices down
748
+ the road. However, problems with reproducability of research
749
+ only compound these redundancies as (multiple) attempts at
750
+ replication also waste resources and energy when researchers
751
+ and practitioners attempt to build off existing work or put
752
+ previous work into practice. These difficulties in replicating
753
+ published results are wide-spread and well-documented [21],
754
+ resulting from inconsistent reporting of sensitivity to hyper-
755
+ parameters and training settings (or complete lack thereof),
756
+ poor communication, missed opportunities from reviewers,
757
+ mis-representation, or some combination of the above.
758
+ In the ever-changing landscape of new research and model
759
+ frameworks, problems with redundancy and reproducibility
760
+ can carry additional implications for energy efficiency. If
761
+ incentives to develop better performing models overshadow
762
+ those for reproducibility and transparency, research efforts
763
+ devoted to producing newer, better models will outpace efforts
764
+ for clearer benchmarking and reporting, leaving transparency
765
+ and resource efficiency efforts forever playing catch-up. For
766
+ instance, when GPT-3 debuted, despite its impressive perfor-
767
+ mance on generative language tasks, its training (not including
768
+ experimentation during its development) was prohibitively
769
+ costly and estimated at around $5 million using a specially
770
+ designed supercomputer by Microsoft [22], making it very
771
+ difficult for researchers to train and test on their own—
772
+ only after its introduction, extensive usage, and popularization
773
+ did work focus addressing its efficiency and other issues
774
+ (e.g. safety, A.I. alignment, etc.). Over-parameterization and
775
+ big data may offer easy performance improvements, but an
776
+ emphasis on jointly co-optimizing efficiency and performance
777
+ in research may help avoid this efficiency-in-hindsight ap-
778
+ proach and front-loading significant energy costs in model
779
+ development. Some progress has been made in addressing
780
+ these problems as Google, Meta, and other large players have
781
+ highlighted best practices and standards that have helped to
782
+ significantly reduce their own carbon footprints [23] [8] for
783
+ state-of-the-art NLP models, such as efficient model selections
784
+ and hardware/system choices. Despite this, however, the fun-
785
+ damental problem of information reporting and data availabil-
786
+ ity still remains. To remedy this, there needs to be an active,
787
+ systematic, and consistent approach towards collecting and
788
+ reporting data/information (on energy usage, training settings,
789
+ etc.) that incentivizes voluntary contribution and surveys a
790
+ sufficiently broad swath of sources to be representative of the
791
+ diversity of workloads in research and practice.
792
+ B. Measurement, Reporting, & Transparency
793
+ Various works have produced estimates in attempts to
794
+ quantify the carbon or energy footprint of deep learning
795
+ model training with estimates ranging from as high as 5x the
796
+ average lifetime emissions of a car [24] to as low as 10−5
797
+ times that amount [23] for state-of-the-art transformers. These
798
+ estimates are inherently variable and difficult—not only due
799
+ to differences in aspects like hardware (e.g. GPU vs. TPU)—
800
+ in both the approach taken to quantify these costs and their
801
+ resulting accuracy. These difficulties in accurate estimation
802
+ highlight the importance of regularly detailing energy usage
803
+ and other information in research alongside typical items like
804
+ performance results and ablation tests. Moreover, while many
805
+ estimates have focused on training costs, even less clear are
806
+ the costs arising through a model’s entire life-cycle, which are
807
+ particularly important in industry and applied settings. Even
808
+ so, there exist even less data on the costs of inference.
809
+ The discrepancies in, and even availability of, these esti-
810
+ mates can be due to several reasons. The first is resource
811
+ asymmetry—not only do different companies, groups, and
812
+ individuals have different amounts of computational resources,
813
+ they also have different computational setups so certain met-
814
+ rics and calculations may naturally vary depending on the
815
+ underlying technological stack. This differentiation similarly
816
+ applies in academic disciplines where a base model (e.g.
817
+ graph neural networks) may branch out into highly special-
818
+ ized, differentiated variants depending on the field or task
819
+ (e.g. social networks vs. molecular predictions), resulting in
820
+ significantly different training procedures, learning dynam-
821
+ ics, energy footprints, and more. Different needs, resources,
822
+ and constraints largely determine variations across research
823
+ and development workflows; as such, when a company or
824
+ institution reports realized gains in efficiency or savings,
825
+ these gains may only be realizable on their systems, with
826
+ their resources/hardware/configuration, or limited to a specific
827
+ class of models that are reported by, or essential to, said
828
+ organization. Though a seemingly simple solution would be
829
+ to move over to services provided by organizations with the
830
+ hardware and technical capabilities to realize such efficiencies,
831
+ there are ethical concerns and market concentration issues that
832
+ require addressing. Even with similar tasks across companies
833
+ and industries, different domains are also characterized by
834
+ other considerations and constraints such as the lack of tech-
835
+ nical expertise, specific resource and regulatory constraints,
836
+ and other requirements like model privacy or interpretability
837
+ that may outweigh model performance and efficiency. At
838
+ its worst, resource asymmetries can hamper reproducibility
839
+ and verification efforts: if state-of-the-art models developed
840
+ by large, well-equipped research groups are too costly and
841
+ resource-intensive to train for others, how can their results
842
+ and estimates be reproduced or verified?
843
+ Along with the resource asymmetry, information asymmetry
844
+ can discourage and dis-incentivize researchers and practition-
845
+ ers from reporting necessary or relevant information. Some
846
+ examples of these asymmetries, besides ones mentioned earlier
847
+
848
+ like inconsistent reporting of training settings as well as poor
849
+ communication and presentation of research results, can arise
850
+ in part from incentives to preserve competitive advantages
851
+ and other sensitive information. Incentives to protect and
852
+ preserve a competitive edge from peers and competitors can
853
+ discourage full, transparent reporting of information especially
854
+ if these models and research tie into a company’s products
855
+ and services. Even when reporting, these incentives may
856
+ limit the amount of information made available to the wider
857
+ research community, leading to confusion around estimates
858
+ and methodologies. Incentives to keep information, and its
859
+ benefits, private for competitive advantage can lead to con-
860
+ tinued information asymmetries in a self-reinforcing cycle.
861
+ Voluntary reporting may then be dominated by larger, better-
862
+ equipped groups with the resources and technical ability to
863
+ optimize their operations which, though well-intentioned, will
864
+ likely not reflect the true extent of the overall, or even the
865
+ average, environmental footprint of A.I. and its applications.
866
+ Moreover, despite the focus on the footprint and costs of
867
+ training, data and estimates on inference are even scarcer
868
+ despite its significance—the few estimates, where available,
869
+ put inference at 90% of production ML infrastructure costs
870
+ [25] and 80%-90% of energy costs [26]. While training enjoys
871
+ scaling benefits that saturate GPUs, the different performance
872
+ requirements of inference can result in poor GPU utilization
873
+ since inference queries are unable to realize the parallelism
874
+ that offline mini-batch training enjoys [27]. Low resource-
875
+ efficiency and utilization is quite common: AWS reports p3
876
+ GPU instances at only 10%-30% utilization [25] and even
877
+ Google’s TPUs exhibit a utilization of 28% on average [28].
878
+ The issues outlined above all point to a common set of
879
+ problems that require (1) a better, more representative idea of
880
+ the kind of A.I. models, and the underlying resources, used
881
+ across disciplines, domains, and communities, (2) a common
882
+ set of meaningful metrics, and (3) incentives through both
883
+ existing avenues (e.g. conferences, papers) and new ones such
884
+ as forums, competitions, leaderboards, or open challenges to
885
+ encourage reporting of energy/utilization data and develop-
886
+ ment of more energy-efficient models rather than just better
887
+ performing ones. To accurately quantify the environmental
888
+ footprint, it is essential to capture costs with metrics that
889
+ realistically reflect and represent the workloads undertaken in
890
+ A.I. research and practice—as well as the burdens and en-
891
+ ergy footprint associated with state-of-the-art models on more
892
+ representative computational setups rather than in the most
893
+ efficient, advanced settings. To incentivize consistent reporting
894
+ and sharing of data, the research community needs forums
895
+ that prioritize energy-efficient models and methodologies. For
896
+ instance, a Green A.I. challenge (in development) that aims to
897
+ cast the problem explicitly by challenging participants to max-
898
+ imize performance given explicit training and energy budgets.
899
+ Lastly, facilities should also provide the central infrastructure,
900
+ user interfaces, and analytical tools/instrumentation/logging
901
+ to further encourage easy reporting and sharing of data,
902
+ especially since not all users are equipped with the expertise
903
+ to manually report relevant data and information.
904
+ C. A.I. for Energy Savings, Generation, & Discovery
905
+ Despite its potential environmental footprint, some of the
906
+ most impressive applications of A.I. algorithms have included
907
+ ones that help generate energy savings themselves. One exam-
908
+ ple has been Google and DeepMind’s use of neural networks to
909
+ monitor and optimize their datacenters, reducing the amount of
910
+ energy spent for cooling by 40% and PUE by 15% in live tests
911
+ [29]. Similar examples abound, but beyond energy savings,
912
+ continued and improved sustainability will also require work
913
+ from the other side of the equation: energy generation.
914
+ The study and application of A.I. to energy discovery and
915
+ generation should be strongly incentivized given its immediate
916
+ benefits. Current examples include the application of algo-
917
+ rithms to stabilize and boost sustainable energy generation:
918
+ wind farms provide inexpensive, carbon-free energy but can
919
+ be unpredictable, making planning and energy delivery/storage
920
+ difficult. In response, DeepMind has developed neural net-
921
+ works trained on weather forecasts and historical turbine
922
+ data to forecast energy output 36 hours ahead, making early
923
+ recommendations on optimal hourly delivery commitments
924
+ to the grid possible [30]. Beyond existing energy sources,
925
+ A.I. research can help push forward new sustainable energy
926
+ sources. Recent work has shown how deep reinforcement
927
+ learning can help control nuclear fusion [31] by learning to
928
+ control and change the shape of plasma via manipulation of
929
+ its magnetic field. Scientific collaborations, especially as they
930
+ relate to development of new energy sources or improvements
931
+ in existing energy generation, should receive equal priority
932
+ and recognition as state-of-the-art performance improvements
933
+ in areas like vision and NLP. To do so, partnerships with
934
+ scientific and energy researchers should be encouraged and
935
+ made more accessible to A.I. researchers and practitioners.
936
+ Similarly, benchmark energy datasets should be constructed
937
+ and made easily accessible just like standard data benchmarks
938
+ in NLP and vision—moreover, these energy datasets should
939
+ receive continuous updates and testing due to the inherently
940
+ variable behavior of wind, weather, etc.
941
+ V. CONCLUSION
942
+ There are many dimensions of this multi-faceted problem
943
+ that are not addressed in this paper due to space limitations
944
+ but are important for consideration nonetheless such as the
945
+ equity and accessibility aspects of energy-efficient computing.
946
+ Though daunting, we hope our discussions of these problems
947
+ and their potential solutions will provide a framework that
948
+ spurs further discussion, and most importantly action, on these
949
+ various issues.
950
+ ACKNOWLEDGMENT
951
+ The authors acknowledge the MIT SuperCloud [14] and
952
+ Lincoln Laboratory Supercomputing Center for providing HPC
953
+ and consultation resources that have contributed to the research
954
+ results reported within this paper. The authors acknowledge
955
+ the MIT SuperCloud team: William Arcand, William Berg-
956
+ eron, Chansup Byun, Michael Houle, Jeremy Kepner, Anna
957
+ Klein, Peter Michaleas, Lauren Milechin, Julie Mullen, Albert
958
+
959
+ Reuther, Antonio Rosa, and Charles Yee. The authors also
960
+ wish to acknowledge the following individuals for their con-
961
+ tributions and support: Bob Bond, Allan Vanterpool, Tucker
962
+ Hamilton, Jeff Gottschalk, Tim Kraska, Mike Kanaan, Charles
963
+ Leiserson, Dave Martinez, John Radovan, Steve Rejto, Daniela
964
+ Rus, Marc Zissman.
965
+ REFERENCES
966
+ [1] U.S. Environmental Protection Agency,
967
+ “Green
968
+ power
969
+ partnership
970
+ national top 100,” 2022. [Online]. Available: https://www.epa.gov/
971
+ greenpower/green-power-partnership-national-top-100
972
+ [2] The White House,
973
+ “Fact
974
+ sheet:
975
+ The
976
+ bipartisan
977
+ infrastructure
978
+ deal
979
+ boosts
980
+ clean
981
+ energy
982
+ jobs,
983
+ strengthens
984
+ resilience,
985
+ and
986
+ advances
987
+ environmental
988
+ justice,”
989
+ 2021.
990
+ [Online].
991
+ Available:
992
+ https://www.whitehouse.gov/briefing-room/statements-releases/2021/
993
+ 11/08/fact-sheet-the-bipartisan-infrastructure-deal-boosts-clean-ener\
994
+ gy-jobs-strengthens-resilience-and-advances-environmental-justice/
995
+ [3] J. Sevilla, L. Heim, A. Ho et al., “Compute trends across three eras of
996
+ machine learning,” arXiv preprint arXiv:2202.05924, 2022.
997
+ [4] International Energy Agency, “Data centres and data transmission
998
+ networks,”
999
+ 2021.
1000
+ [Online].
1001
+ Available:
1002
+ https://www.iea.org/reports/
1003
+ data-centres-and-data-transmission-networks
1004
+ [5] Nature News Feature, “How to stop data centres from gobbling up the
1005
+ world’s electricity,” 2020. [Online]. Available: https://www.nature.com/
1006
+ articles/d41586-018-06610-y
1007
+ [6] E.
1008
+ Masanet,
1009
+ A.
1010
+ Shehabi,
1011
+ N.
1012
+ Lei
1013
+ et
1014
+ al.,
1015
+ “Recalibrating global data center energy-use estimates,”
1016
+ Science
1017
+ Vol 367, Issue 6481, pp. 984-986, 2020.
1018
+ [7] M.
1019
+ AbuBakar
1020
+ Siddik,
1021
+ A.
1022
+ Shehabi,
1023
+ and
1024
+ L.
1025
+ Marston,
1026
+ “The environmental footprint of data centers in the United States,”
1027
+ Environmental Research Letters, vol. 16, no. 6, 2021.
1028
+ [8] C.-J. Wu, R. Raghavendra, U. Gupta et al., “Sustainable AI: Envi-
1029
+ ronmental implications, challenges and opportunities,” arXiv preprint
1030
+ arXiv:2111.00364, 2021.
1031
+ [9] M. AI, “Introducing the ai research supercluster — meta’s cutting-
1032
+ edge ai supercomputer for ai research,” 2022. [Online]. Available:
1033
+ https://ai.facebook.com/blog/ai-rsc/
1034
+ [10] Data Center Dynamics,
1035
+ “Google
1036
+ plans
1037
+ $1.2bn
1038
+ nevada
1039
+ data
1040
+ center
1041
+ expansion
1042
+ in
1043
+ henderson
1044
+ and
1045
+ tahoe
1046
+ reno,”
1047
+ 2020.
1048
+ [Online].
1049
+ Available:
1050
+ https://www.datacenterdynamics.com/en/news/
1051
+ googles-nevada-data-center-be-powered-billion-dollar-solar-farm/
1052
+ [11] Microsoft,
1053
+ “Microsoft’s
1054
+ newest
1055
+ sustainable
1056
+ datacenter
1057
+ region
1058
+ coming
1059
+ to
1060
+ arizona
1061
+ in
1062
+ 2021,”
1063
+ 2020.
1064
+ [Online].
1065
+ Available:
1066
+ https://azure.microsoft.com/en-us/blog/microsoft-s-newest-sustain\
1067
+ able-datacenter-region-coming-to-arizona-in-2021/
1068
+ [12] Google
1069
+ Cloud,
1070
+ “Cloud Tensor Processing Units (TPUs).”
1071
+ [Online].
1072
+ Available: https://cloud.google.com/tpu/docs/tpus
1073
+ [13] Uptime
1074
+ Institute,
1075
+ “Is PUE actually going up?”
1076
+ 2019.
1077
+ [Online].
1078
+ Available: https://journal.uptimeinstitute.com/is-pue-actually-going-up/
1079
+ [14] A. Reuther, J. Kepner, C. Byun et al., “Interactive supercomputing on
1080
+ 40,000 cores for machine learning and data analysis,” in 2018 IEEE High
1081
+ Performance extreme Computing Conference (HPEC). IEEE, 2018, pp.
1082
+ 1–6.
1083
+ [15] N. C. Frey, B. Li, J. McDonald et al., “Benchmarking resource usage
1084
+ for efficient distributed deep learning,” arXiv preprint arXiv:2201.12423,
1085
+ 2022.
1086
+ [16] A. Radovanovic, R. Koningstein, I. Schneider et al., “Carbon-aware
1087
+ computing for datacenters,” arXiv:2106.11750, 2021.
1088
+ [17] U.S. Environmental Protection Agency, “Climate change indicators:
1089
+ weather
1090
+ and
1091
+ climate.”
1092
+ [Online].
1093
+ Available:
1094
+ https://www.epa.gov/
1095
+ climate-indicators/weather-climate
1096
+ [18] Board of Governors of the Federal Reserve System, “Stress tests and
1097
+ capital planning.” [Online]. Available: https://www.federalreserve.gov/
1098
+ supervisionreg/dfa-stress-tests.htm
1099
+ [19] D. Spinellis and P. Louridas, “The carbon footprint of conference
1100
+ papers,” PLoS ONE, vol. 8, no. 6, pp. 414–419, 2013.
1101
+ [20] M. F. Astudillo and H. AzariJafari, “Estimating the global warming
1102
+ emissions of the lcaxvii conference: connecting flights matter,” Interna-
1103
+ tional Journal of Life Cycle Assessment, vol. 23, no. 7, pp. 1512–1516,
1104
+ 2018.
1105
+ [21] B. Haibe-Kains, G. A. Adam, A. Hosny et al., “Transparency and
1106
+ reproducibility in artificial intelligence,” Nature, vol. 586, no. 7829, pp.
1107
+ E14–E16, 2020.
1108
+ [22] Microsoft, The AI Blog, “Microsoft announces new supercomputer,
1109
+ lays out vision for future ai work,” 2020. [Online]. Available:
1110
+ https://blogs.microsoft.com/ai/openai-azure-supercomputer/
1111
+ [23] D. P. Patterson, J. Gonzalez, U. Hölzle et al., “The carbon footprint
1112
+ of machine learning training will plateau, then shrink,” in 2022
1113
+ IEEE
1114
+ Computer
1115
+ (Upcoming).
1116
+ IEEE,
1117
+ 2022.
1118
+ [Online].
1119
+ Available:
1120
+ https://www.techrxiv.org/articles/preprint/The_Carbon_Footprint_of_
1121
+ Machine_Learning_Training_Will_Plateau_Then_Shrink/19139645/1
1122
+ [24] E. Strubell, A. Ganesh, and A. McCallum, “Energy and policy con-
1123
+ siderations for deep learning in nlp,” arXiv preprint arXiv:1906.02243,
1124
+ 2019.
1125
+ [25] A. Jassy, “Amazon AWS ReInvent Keynote,” 2018. [Online]. Available:
1126
+ https://www.youtube.com/watch?v=ZOIkOnW640A
1127
+ [26] Moor Insights and Strategy,
1128
+ “Google
1129
+ cloud
1130
+ doubles
1131
+ down
1132
+ on
1133
+ NVIDIA GPUs
1134
+ for
1135
+ inference,”
1136
+ 2019.
1137
+ [Online].
1138
+ Available:
1139
+ https://www.forbes.com/sites/moorinsights/2019/05/
1140
+ 09/google-cloud-doubles-down-on-nvidia-gpus-for-inference/?sh=
1141
+ 75bd710a6792
1142
+ [27] P.
1143
+ Jain,
1144
+ X.
1145
+ Mo,
1146
+ A.
1147
+ Jain
1148
+ et
1149
+ al.,
1150
+ “The OoO VLIW JIT Compiler for GPU Inference,”
1151
+ arXiv
1152
+ preprint
1153
+ arXiv:1901.10008, 2019.
1154
+ [28] N. Jouppi, C. Young, N. Patil et al., “In-datacenter performance analysis
1155
+ of a tensor processing unit,” in 2018 IEEE High Performance extreme
1156
+ Computing Conference (HPEC).
1157
+ ISCA ’17: Proceedings of the 44th
1158
+ Annual International Symposium on Computer Architecture, 2017, pp.
1159
+ 1–12.
1160
+ [29] DeepMind,
1161
+ “DeepMind AI
1162
+ reduces
1163
+ google
1164
+ data
1165
+ center
1166
+ cooling
1167
+ bill,”
1168
+ 2016.
1169
+ [Online].
1170
+ Available:
1171
+ https://deepmind.com/blog/article/
1172
+ deepmind-ai-reduces-google-data-centre-cooling-bill-40
1173
+ [30] DeepMind,
1174
+ “Machine
1175
+ learning
1176
+ can
1177
+ boost
1178
+ the
1179
+ value
1180
+ of
1181
+ wind
1182
+ energy,” 2019. [Online]. Available: https://deepmind.com/blog/article/
1183
+ machine-learning-can-boost-value-wind-energy
1184
+ [31] J. Degrave, F. Felici, J. Buchli et al., “Magnetic control of tokamak
1185
+ plasmas through deep reinforcement learning,” Nature, vol. 602, no.
1186
+ 7897, pp. 414–419, 2022.
1187
+
5tFJT4oBgHgl3EQfkyzq/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6NE3T4oBgHgl3EQfpgqP/content/tmp_files/2301.04643v1.pdf.txt ADDED
@@ -0,0 +1,794 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ tieval: AN EVALUATION FRAMEWORK FOR
2
+ TEMPORAL INFORMATION EXTRACTION SYSTEMS
3
+ Hugo Sousa
4
+ 1,2, Alípio Jorge
5
+ 1,2, and Ricardo Campos
6
+ 1,3,4
7
+ 1INESC TEC, Portugal
8
+ 2University of Porto, Portugal
9
+ 3Polytechnic Institute of Tomar, Portugal
10
+ 4Ci2 - Smart Cities Research Center, Portugal
11
+ {hugo.o.sousa, alipio.jorge, ricardo.campos}@inesctec.pt
12
+ January 12, 2023
13
+ ABSTRACT
14
+ Temporal information extraction (TIE) has attracted a great deal of interest over the last two decades,
15
+ leading to the development of a significant number of datasets. Despite its benefits, having access to
16
+ a large volume of corpora makes it difficult when it comes to benchmark TIE systems. On the one
17
+ hand, different datasets have different annotation schemes, thus hindering the comparison between
18
+ competitors across different corpora. On the other hand, the fact that each corpus is commonly
19
+ disseminated in a different format requires a considerable engineering effort for a researcher/prac-
20
+ titioner to develop parsers for all of them. This constraint forces researchers to select a limited
21
+ amount of datasets to evaluate their systems which consequently limits the comparability of the
22
+ systems. Yet another obstacle that hinders the comparability of the TIE systems is the evaluation
23
+ metric employed. While most research works adopt traditional metrics such as precision, recall, and
24
+ F1, a few others prefer temporal awareness – a metric tailored to be more comprehensive on the
25
+ evaluation of temporal systems. Although the reason for the absence of temporal awareness in the
26
+ evaluation of most systems is not clear, one of the factors that certainly weights this decision is the
27
+ necessity to implement the temporal closure algorithm in order to compute temporal awareness, which
28
+ is not straightforward to implement neither is currently easily available. All in all, these problems
29
+ have limited the fair comparison between approaches and consequently, the development of temporal
30
+ extraction systems. To mitigate these problems, we have developed tieval, a Python library that
31
+ provides a concise interface for importing different corpora and is equipped with domain-specific
32
+ operations that facilitate system evaluation. In this paper, we present the first public release of tieval
33
+ and highlight its most relevant features. The library is available as open source, under MIT License,
34
+ at PyPI1 and GitHub2.
35
+ Figure 1: tieval logo.
36
+ 1https://pypi.org/project/tieval/
37
+ 2https://github.com/LIAAD/tieval
38
+ arXiv:2301.04643v1 [cs.CL] 11 Jan 2023
39
+
40
+ ti
41
+ Valtieval
42
+ 1
43
+ Introduction
44
+ Understanding the temporal order of events is essential to human communication. We, humans, can easily understand
45
+ the relative order of events in a conversation or when reading a news article. However, many challenges are raised when
46
+ we try to automate such tasks with a computer program. The first difficulty that emerges is how to represent temporal
47
+ information. Since in most cases we do not explicitly specify the start and end time of each event, temporal information,
48
+ such as order and time span, ends up being inferred from the events themselves. To this regard, computer algorithms
49
+ can make use of temporal clues in the text, and of external sources, such as knowledge-bases, to anchor events on a
50
+ timeline. For instance, in the sentence “We went to dinner after the game.”, two events, “dinner” and “game”, can be
51
+ automatically identified and used, despite the lack of explicit temporal information, to recreate a timeline of events
52
+ (see Figure 2) supported on the word “after”. The ordering of events and the knowledge about them, can be further
53
+ expanded if used together with appropriate external sources. For instance, the event “game” can be contextualized
54
+ and anchored on the timeline by searching for information on a knowledge-base. However, in the case of the “dinner”
55
+ event, it turns out impossible to know the exact time of occurrence unless it is specified in the text. This shows that
56
+ representing temporal information is not a trivial task, since there are several borderline cases for which no standard
57
+ approach has been established.
58
+ Figure 2: Relative timeline of events that can be inferred from the running example.
59
+ Over the years, and particularly in the last two decades, this problem has been highly studied, leading to several
60
+ proposals from the research community Campos et al. [2014], Leeuwenberg and Moens [2019]. Most of the proposals
61
+ were in the origin of the emergence of different annotation schemes and the various corpora that we have today at our
62
+ disposal Naik et al. [2019], Ning et al. [2018a], UzZaman et al. [2013]. Although these efforts have been essential
63
+ to mature temporal information extraction and its subtasks – such as temporal expression identification or temporal
64
+ relation classification – they also pose some problems upon the process of benchmarking different methods. One of the
65
+ problems has its roots in the fact that evaluating the methods, often requires reading multiple corpora, each of which has
66
+ a different perspective on temporal representation, ultimately preventing comparability among the different methods
67
+ and corpora. This is compounded by the fact that corpora are stored in a variety of formats (e.g., XML, TimeML, or
68
+ table ), which requires a considerable engineering effort to load them all.
69
+ Another issue that limits the comparison between systems is the lack of standardization in the metrics used in the
70
+ evaluation process. This is a particular problem of temporal relation extraction – a subtask of TIE, which deals with the
71
+ identification and classification of the temporal relations between entities – where different metrics are often employed
72
+ during the evaluation process. While initially systems were evaluated and compared using standard metrics, such as
73
+ recall, precision, and F-score Verhagen et al. [2007, 2010], more recently, metrics such as temporal awareness UzZaman
74
+ and Allen [2011] have proven to be more reliable in the evaluation of temporal relation extraction methods. The
75
+ reasoning behind this is that, while traditional metrics focus on the local effectiveness of the model, temporal awareness
76
+ better understands the relative order of events by considering the global temporal structure of the predictions. This is
77
+ accomplished by taking into account the temporal relations that can be inferred from the established ones (a process
78
+ typically referred to as temporal closure), making this a more comprehensive metric for evaluating temporal systems.
79
+ Despite the emergence of this temporal awareness, many studies still rely solely on traditional metrics to evaluate
80
+ their system. We speculate that this is due to the fact that temporal awareness requires domain-specific operations
81
+ such as temporal closure – which are not (yet) readily available in every framework and therefore require individual
82
+ implementation by each research group. In addition, temporal awareness requires the implementation of a strategy to
83
+ deal with inconsistent predictions of the system, which is generally not explored in recent studies.
84
+ To mitigate the above issues, we developed tieval, a Python library that enables the development and evaluation of
85
+ TIE systems. This framework provides a simple interface to download and read TIE corpora in various formats. It
86
+ currently covers well-known corpus – such as TempEval-3 UzZaman et al. [2013], TDDiscource Naik et al. [2019], and
87
+ MeanTime Minard et al. [2016] – however, it lays the foundations for others to be included by providing base classes
88
+ for the construction of the corpus. It also provides domain-specific operations – such as temporal closure and simple
89
+ translation of intervals into point relations – that can be used to develop TIE systems. In addition to this, it includes an
90
+ evaluation infrastructure for a comprehensive assessment of the effectiveness of the different models being evaluated.
91
+ Because tieval supports the entire development pipeline of TIE, it can also be used to ensure reproducibility and fair
92
+ benchmarking of future research. The main contributions of tieval are the following:
93
+ 2
94
+
95
+ tieval
96
+ 1. it gathers the multiple corpora for the development of TIE systems, making it easy to access with just a few
97
+ lines of code;
98
+ 2. it facilitates access to domain-specific operations, such as interval to point relation and temporal closure, as
99
+ well as metrics such as temporal awareness;
100
+ 3. it provides a standard framework, thus making it easy for new methods to be compared against previous ones.
101
+ The remaining of the paper is organized as follows: The next section, provides an overview of recent work in TIE and
102
+ some of its software. We then proceed to present the tieval package in section 3. We start with a general introduction
103
+ and then go into some of its most relevant features. Section 5 serves to present our thoughts on what we strive to be
104
+ next steps in the development of the framework.
105
+ 2
106
+ Related Work
107
+ Extracting temporal information from documents written in natural language in an inter-operable format has long
108
+ been an interest of the artificial intelligence community Ling and Weld [2010], Derczynski et al. [2015]. Since the
109
+ introduction of the Time Markup Language (TimeML) Pustejovsky et al. [2003a], in 2003, the temporal graph has
110
+ become the de-facto standard to represent temporal information. In this graph, the nodes are temporal entities and the
111
+ edges are the temporal relation that hold between them. The temporal entities can take two forms: event expressions,
112
+ which are defined as situations that happened (e.g., “went” or “bought”); and temporal expressions (timex), which can
113
+ convey temporal information explicitly (e.g., “October 27, 199”) or implicitly (e.g., “a few years ago”) Campos et al.
114
+ [2017]. The temporal relations are held in the form of temporal links (tlink) that contain temporal relations between
115
+ pairs of events (E-E relations), events and time expressions (E-T relations), and events and document creation time
116
+ (E-DCT relations), where DCT is a special timex that stores document creation time. Overall, these temporal relations
117
+ can take thirteen types, which is the number of relations that can exist between two time intervals Allen [1983].
118
+ The first corpus that was annotated with this scheme was TimeBank Pustejovsky et al. [2003b]. The release of this
119
+ corpus, dated from 2003, sparked a wave of research in the field later on also used on the TempEval shared tasks
120
+ UzZaman et al. [2013], Verhagen et al. [2007, 2010]. These tasks end up segmenting TIE into a set of sub-problems
121
+ that can be conceptually defined as temporal entity identification, tlink identification, and tlink classification. Although
122
+ some works developed systems for more than one of these sub-tasks, most of the systems are concerned with only one
123
+ of them. Furthermore, temporal entity identification systems are traditionally partitioned into subsystems for the several
124
+ classes of temporal entities. For example, for the TimeBank corpus, one system is usually trained to identify events and
125
+ another to identify timexs. The tieval architecture follows this natural decomposition of the TIE.
126
+ The TimeBank corpus, and more abstractly, the TimeML annotation scheme was widely studied by the community.
127
+ Such scrutiny lead to the emergence of several new corpora. Some used the TimeML annotation scheme to create
128
+ new corpora, such as AQUAINT Graff [2002] and the Platinum corpus UzZaman et al. [2013], while others were
129
+ concerned in extending the annotation scheme to other languages. The most remarkable effort on this domain was
130
+ the TempEval-2 shared task Verhagen et al. [2010] that produced corpora for Chinese Li et al. [2014], French Bittar
131
+ et al. [2011], Italian Caselli et al. [2011], and the Spanish Nieto and Saurí [2012] language. Another noteworthy effort
132
+ is the MeanTime corpus Minard et al. [2016] in which the authors annotated 120 news articles written in English
133
+ from Wikinews3, and translated the texts into Italian, Spanish, and Dutch. Costa and Branco Costa and Branco [2012]
134
+ followed a similar process to construct TimeBankPT, translating the original TimeBank to Portuguese and adapting
135
+ the annotations when needed. Apart from the extensions to other languages, the TimeML annotation scheme was also
136
+ extended to other domains. A concrete example is the case of the clinical domain for which two corpora have been
137
+ produced, the i2b2 Sun et al. [2013] and THYME Styler IV et al. [2014]4. Further significant contributions were the
138
+ proposals that explored ways to mitigate some of the issues found on the TimeBank annotation effort, such as: sparse
139
+ annotation – TimeBank-Dense Cassidy et al. [2014] and TDDiscourse Naik et al. [2019]; improve inter-annotator
140
+ agreement – MATRES Ning et al. [2018a]; and include other sources of knowledge – TCR Ning et al. [2018b] and
141
+ RED O’Gorman et al. [2016].
142
+ Aside from the TimeML, and related approaches, there have also been other proposals that were explored by the
143
+ research community. One of them is absolute timeline placement, in which the temporal entities are directly anchored
144
+ on a timeline by labeling each entity with the time (or time span) of occurrence. The most remarkable efforts in this
145
+ direction were produced by Reimers et al. Reimers et al. [2016] – which produced the EventTime corpus by annotating
146
+ the events in TimeBank with a specific day, or span of days – and Leeuwenberg and Moens Leeuwenberg and Moens
147
+ 3https://en.wikinews.org/
148
+ 4These corpora are not available for open access and, as a consequence, we were not able to include them on the framework.
149
+ 3
150
+
151
+ tieval
152
+ [2020] – which annotated 169 clinical records from the i2b2 corpus with the most likely start and end time of each
153
+ event along with a lower and upper bound.
154
+ This shows that several corpora have been introduced for the TIE task. However, the fact that they were released in
155
+ different formats makes it hard to leverage their power, which is one of the issues mitigated by tieval.
156
+ To the best of our knowledge, the only framework that made available TIE operations – including temporal closure
157
+ and temporal awareness – is the Anafora Tools project5 which was built to work with files stored in the Anafora XML
158
+ format Chen and Styler [2013], used to annotate the THYME corpus Styler IV et al. [2014]. The framework presented
159
+ in this paper aims to be a more general tool, unifying all corpora in a single format.
160
+ 3
161
+ tieval
162
+ Our vision for tieval was to build a framework that would support and facilitate the evaluation of TIE systems. With
163
+ the development of libraries such as Numpy, TensorFlow, and PyTorch, Python has established itself as the programming
164
+ language of choice within the machine learning community. For that reason, we built tieval in Python. To facilitate
165
+ the installation we made it available on Python Package Index (PyPI)6. Thus, the toolkit can be easily installed through
166
+ pip, as follows:
167
+ $ pip install tieval==0.0.6
168
+ In this paper, we will use version 0.0.6, which is the first and the most recent version of the package. However, the
169
+ reader is advised to install the newest release at the time of reading the paper and refer to the project repository for
170
+ up-to-date documentation. Furthermore, for users that might be interested in contributing to tieval, we encourage
171
+ forking the source repository and making a pull request.
172
+ tieval contains three modules that represent the three cornerstones of any machine learning project: datasets,
173
+ models, and evaluation. The datasets module is responsible for downloading and reading the corpora available for
174
+ TIE, the models module is responsible for the construction of the models, and the evaluation module has methods to
175
+ make a proper evaluation for each of the TIE tasks. In the following sections, we will present the inner workings of the
176
+ framework with scripts to exemplify the usability of the framework.
177
+ 3.1
178
+ Datasets
179
+ With tieval, we wanted to mitigate the issues referred above by making it easy for the user to work with several
180
+ corpora with a few lines of code. To that end, we developed an architecture that would unify the different annotations
181
+ and storing formats of the corpus. This architecture is composed of several objects which are depicted in Figure 3.
182
+ Figure 3: Objects used to represent a dataset on tieval. The arrow represent a relation of “Iterable”.
183
+ The Dataset object is the final representation of each corpus. It compiles the set of all the documents in the corpus on
184
+ the documents attribute which is segmented into the train and test attributes whenever provided in the original paper7.
185
+ Each document is then stored as an instance of the Document class (see the Document grey box in Figure 3), which
186
+ contains all the information necessary for TIE, more specifically:
187
+ name a string that contains the name of the document (e.g. “wsj_0026.tml”);
188
+ 5https://github.com/bethard/anaforatools
189
+ 6https://pypi.org/project/tieval/
190
+ 7When no standard train/test split is provided by the authors all the documents are placed on the train attribute.
191
+ 4
192
+
193
+ Dataset
194
+ Document
195
+ Entity
196
+ TLink
197
+ .documents
198
+ .name
199
+ .text
200
+ .source
201
+ .train
202
+ .text
203
+ .value
204
+ .target
205
+ .test
206
+ .dct
207
+ .endpoints
208
+ .relation
209
+ .entities
210
+ **kwargs
211
+ **kwargs
212
+ .tlinkstieval
213
+ text a string with the raw text of the document;
214
+ dct is a Timex that contains the document creation time (e.g. Timex("12-10-2004"));
215
+ entities is the set of Entities – either a Timex or Event – that are annotated on the corpus. Each Entity is, at is core, a
216
+ data class made to store all the info provided on the annotation. Therefore, it has to be flexible to accommodate
217
+ for the different types of information provided in different corpus. For instances, the GraphEve corpus provides
218
+ the lemma for each event while TempEval-2 does not;
219
+ tlinks a set o TLink’s that stores the temporal relations annotated on the document. Each TLink contains a source and
220
+ target entity as well as the temporal relation between them – on the relation attribute.
221
+ A special remark needs to be made about the relation attribute of the TLink object. When initiating a TLink instance
222
+ one needs to pass the temporal relation that holds between the two temporal entities (the source and the target). In
223
+ most of the corpora this is one of the thirteen temporal relations Allen [1983] that can hold between two time intervals,
224
+ however, there are corpora where the annotators were more flexible on the type of relations. Examples of this are the
225
+ TempEval-2 and the MATRES corpus. On TempEval-2 the annotators were allowed to give more ambiguous relations as
226
+ “BEFORE-OR-OVERLAP” and “OVERLAP-OR-AFTER”. In MATRES the annotators were asked to provide the temporal
227
+ relation between the start points of the temporal entities. In order to accommodate the several types of annotations, we
228
+ build TemporalRelation object, which handles the relation that was annotated. Inside this object, every relation is
229
+ represented in point relations – instead of the traditional interval relations. Figure 4 shows how to represent the interval
230
+ relation “BEFORE” into a point relation. A relative relation is also included in the figure for illustrative purposes.
231
+ Figure 4: Relative timeline of events that can be inferred from the running example.
232
+ Note that the “BEFORE-OR-OVERLAP” relation on TempEval-2 represents an uncertainty of the annotator between the
233
+ end time of the source entity and the start time of the target entity, however, the annotator is certain about the remaining
234
+ point relations. Further note that, although we explicitly state four-point relations in Figure 4, upon the adaptation of
235
+ the current datasets into tieval format, three of them are redundant, as the point relation “end A < start B” completely
236
+ defines the remaining point relations. Therefore, on tieval, whenever there is a new dataset to include, the user can
237
+ provide the relation in the way that is most appropriate, as shown in Listing 1.
238
+ Listing 1: Different ways to pass the temporal relation to the TLink object. The first argument (X) is the source entity,
239
+ the second (Y) is the target entity, and the third is the temporal relation between them. This can be passed as an interval
240
+ relation, “before”, or as a point relation, in the form of a dictionary structure. On the latter, the interpretation for the
241
+ expected keys is the following: “x” and “y” stands for the source and target entity, respectively; while the “s” and “e”
242
+ stand for “start” and “end”. As an example, “xe_ys” is the point relation between the source end and the target start.
243
+ from tieval.links import TLink
244
+ tl1 = TLink("X", "Y", "before")
245
+ tl2 = TLink("X", "Y", {"xe_ys": "<"})
246
+ tl3 = TLink("X", "Y", {"xs_ys": "<", "xs_ye": "<", "xe_ys": "<", "xe_ye": "<" ,})
247
+ In order to reach a standardized representation for the different corpora, we developed a reader for each of the
248
+ corpus. Each dataset reader has inherited from an abstract base class, named BaseDocumentReader, which requires the
249
+ implementation of five methods named after the five attributes used to create an instance of a Document: name, text, dct,
250
+ entities, and tlinks. To extract this information, the base class contains three attributes: the path for the document being
251
+ read; the content of the dictionary produced by parsing the document with the xmltodict8 library; and the xml attribute
252
+ that results from parsing the file with the xml9 library. Note that, while json is nowadays the standard format for the
253
+ 8https://pypi.org/project/xmltodict/
254
+ 9https://docs.python.org/3/library/xml.etree.elementtree.html
255
+ 5
256
+
257
+ Relative Relation
258
+ Interval Relation
259
+ Point Relationtieval
260
+ exchange of the information, we had to resort to xml as most datasets were stored in that format. The script presented in
261
+ Listing 2 illustrates how to read a document from the TempEval-3 corpus with the TempEval3DocumentReader.
262
+ Listing 2: Read a document of the TempEval-3 corpus.
263
+ from tieval import datasets
264
+ path = "tempeval -3/ wsj_0026.tml"
265
+ reader = datasets.TempEval3DocumentReader(path)
266
+ doc = reader.read()
267
+ To fully integrate a new corpus on the library – and automatically read the entire corpus – the user just needs to add
268
+ an entry on the DATASETS_METADATA dictionary with the metadata necessary to read the document. This information
269
+ will be used on the read function of the datasets module, which only requires the name of the corpus to produce
270
+ an instance of the Dataset object with all the annotations provided in there. The script in Listing 3 presents how to
271
+ perform such operation.
272
+ Listing 3: Read the TempEval-3 corpus.
273
+ from tieval import datasets
274
+ te3 = datasets.read("TempEval -3")
275
+ The current version of tieval natively supports the download and reading of an extensive list of corpora for TIE. A
276
+ complete list of the corpora considered is provided in Table 1. In order to ensure long-term support for these corpora,
277
+ we created a repository with them. Besides that, it also has the advantage that we can standardize the structure of the
278
+ folders and add useful information to the raw datasets (for instance, the spans of the temporal entities identified on the
279
+ text) and fix errors on the original annotation10. For that reason, we were careful to verify the license for each of the
280
+ corpora and publish only the ones that allowed for redistribution or did not provide any license.
281
+ Table 1: The corpora currently supported on tieval.
282
+ Language
283
+ # Docs
284
+ # Events
285
+ # Timexs
286
+ # Tlinks
287
+ AncientTimes
288
+ Arabic
289
+ 5
290
+ 0
291
+ 106
292
+ 0
293
+ Dutch
294
+ 5
295
+ 0
296
+ 130
297
+ 0
298
+ English
299
+ 5
300
+ 0
301
+ 311
302
+ 0
303
+ French
304
+ 5
305
+ 0
306
+ 290
307
+ 0
308
+ German
309
+ 5
310
+ 0
311
+ 196
312
+ 0
313
+ Italian
314
+ 5
315
+ 0
316
+ 234
317
+ 0
318
+ Spanish
319
+ 5
320
+ 0
321
+ 217
322
+ 0
323
+ Vietnamese
324
+ 4
325
+ 0
326
+ 120
327
+ 0
328
+ Aquaint
329
+ English
330
+ 72
331
+ 4,351
332
+ 639
333
+ 5,832
334
+ EventTime
335
+ English
336
+ 36
337
+ 1,498
338
+ 0
339
+ 0
340
+ GraphEVE
341
+ English
342
+ 103
343
+ 4,298
344
+ 0
345
+ 18,204
346
+ KRAUTS
347
+ German
348
+ 192
349
+ 0
350
+ 1,282
351
+ 0
352
+ MATRES
353
+ English
354
+ 274
355
+ 6,065
356
+ 0
357
+ 13,504
358
+ MeanTime
359
+ English
360
+ 120
361
+ 1,882
362
+ 349
363
+ 1,753
364
+ Spanish
365
+ 120
366
+ 2,000
367
+ 344
368
+ 1,975
369
+ Dutch
370
+ 120
371
+ 1,346
372
+ 346
373
+ 1,487
374
+ Italian
375
+ 120
376
+ 1,980
377
+ 338
378
+ 1,675
379
+ Narrative Container
380
+ English
381
+ 63
382
+ 3,559
383
+ 439
384
+ 737
385
+ Continued on next page
386
+ 10The changes made on the original corpus are detailed on the file logbook.rst in the docs folder of the project repository.
387
+ 6
388
+
389
+ tieval
390
+ Table 1: The corpora currently supported on tieval. (Continued)
391
+ Professor Heideltime
392
+ English
393
+ 24,642
394
+ 0
395
+ 254,803
396
+ 0
397
+ French
398
+ 27,154
399
+ 0
400
+ 83,431
401
+ 0
402
+ German
403
+ 19,095
404
+ 0
405
+ 194,043
406
+ 0
407
+ Italian
408
+ 9,619
409
+ 0
410
+ 58,823
411
+ 0
412
+ Portuguese
413
+ 24,293
414
+ 0
415
+ 111,810
416
+ 0
417
+ Spanish
418
+ 33,266
419
+ 0
420
+ 348,011
421
+ 0
422
+ Platinum (TempEval-3)
423
+ English
424
+ 20
425
+ 748
426
+ 158
427
+ 929
428
+ TimeBank
429
+ Spanish
430
+ 210
431
+ 12,384
432
+ 1,532
433
+ 21,107
434
+ French
435
+ 108
436
+ 2,115
437
+ 533
438
+ 2,303
439
+ Portuguese
440
+ 182
441
+ 7,887
442
+ 1,409
443
+ 6,538
444
+ English
445
+ 183
446
+ 6,681
447
+ 1,426
448
+ 5,120
449
+ TimeBank 1.2
450
+ English
451
+ 183
452
+ 7,940
453
+ 1,414
454
+ 6,413
455
+ TCR
456
+ English
457
+ 25
458
+ 1,134
459
+ 242
460
+ 3,515
461
+ TDDiscourse
462
+ English
463
+ 34
464
+ 1,101
465
+ 0
466
+ 6,150
467
+ TempEval 2
468
+ Chinese
469
+ 52
470
+ 4,783
471
+ 946
472
+ 7,802
473
+ English
474
+ 182
475
+ 6,656
476
+ 1,390
477
+ 5,945
478
+ French
479
+ 83
480
+ 1,301
481
+ 367
482
+ 372
483
+ Italian
484
+ 64
485
+ 5,377
486
+ 653
487
+ 6,884
488
+ Korean
489
+ 18
490
+ 2,583
491
+ 317
492
+ 0
493
+ Spanish
494
+ 210
495
+ 12,384
496
+ 1,502
497
+ 13,304
498
+ English
499
+ 275
500
+ 11,780
501
+ 2,223
502
+ 11,881
503
+ TimeBank Dense
504
+ English
505
+ 36
506
+ 1,712
507
+ 289
508
+ 12,715
509
+ TrainT3 (TempEval-3)
510
+ Spanish
511
+ 175
512
+ 10,686
513
+ 1,269
514
+ 17,283
515
+ Wikiwars
516
+ English
517
+ 22
518
+ 0
519
+ 2,662
520
+ 0
521
+ German
522
+ 22
523
+ 0
524
+ 2,239
525
+ 0
526
+ 3.2
527
+ Models
528
+ The current version of tieval has four built-in models, namely: a baseline for timex identification; the HeidelTime
529
+ model Strötgen et al. [2013] for timex identification and classification; a baseline for event identification; and the
530
+ CogCompTime 2.0 model Ning et al. [2019] for tlink classification. The availability of these four models is intended for
531
+ practitioners that may want to experiment using any layer of temporal information in their specific application. Apart
532
+ from that, it also provide researchers the implementation of baseline models for reference in their work.
533
+ For the baseline models, we provide pre-trained weights, however, the user can also train the model from scratch. A
534
+ description of each of the models is provided below:
535
+ TimexIdentificationBaseline For this baseline we trained – from scratch – the spaCy11 named entity recognition
536
+ model to identify the timexs on the TempEval-3 corpus.
537
+ EventIdentificationBaseline This model has the same architecture of the TimexIdentificationBaseline but was
538
+ trained to identify events rather than timexs on the TempEval-3 corpus.
539
+ HeidelTime This model is a widely recognized multilingual temporal tagger which was original written in Java12.
540
+ However there have been efforts to build python wrappers. In tieval we used the py_heideltime wrapper
541
+ which is available on GitHub13.
542
+ 11https://spacy.io/
543
+ 12https://github.com/HeidelTime/heideltime
544
+ 13https://github.com/hmosousa/py_heideltime
545
+ 7
546
+
547
+ tieval
548
+ CogCompTime2 This model leverages the ELMo Peters et al. [2018] word embeddings and the TempProb Ning et al.
549
+ [2018c] knowledge base to classify the temporal relation between a pair of temporal entities Ning et al. [2019].
550
+ Our implementation was adapted from the repository made available14 by the authors.
551
+ Listing 4 presents a script that would download the baseline model for temporal expression identification
552
+ (TimexIdentificationBaseline), train the model on the TempEval-3 train set, and produce predictions for the
553
+ TempEval-3 test set.
554
+ Listing 4: How to download, train, and predict with for the temporal identification task.
555
+ from tieval import models
556
+ model = model.TimexIdentificationBaseline ()
557
+ model.fit(te3.train)
558
+ predictions = model.predict(te3.test)
559
+ A user interested in releasing his/her model in tieval can do it by creating a subclass of one of our base classes for
560
+ models. There are two base classes: a BaseModel which just requires the implementation of the predict method
561
+ which is intended for models that are available in other repositories – for instance, the HeidelTime model – and a
562
+ BaseTrainableModel which, besides the predict, requires the implementation of the fit method, which implements
563
+ the training loop for the model.
564
+ 3.3
565
+ Evaluation
566
+ tieval provides an evaluation function for four subtasks of TIE, more specifically: timex identification, event
567
+ identification, tlink identification, and tlink classification.
568
+ Table 2: The results obtained by evaluating the four models integrated in tieval on the Platinum (TempEval-3 test set),
569
+ TCR, and MeanTime (the English version) corpus. P stands for precision, R for recall, F1 is the F1-score, and TF1 is
570
+ the temporal awareness. All the results in the table are micro metrics.
571
+ Platinum
572
+ TCR
573
+ MeanTime
574
+ P
575
+ R
576
+ F1 (TF1)
577
+ P
578
+ R
579
+ F1 (TF1)
580
+ P
581
+ R
582
+ F1 (TF1)
583
+ TimexBaseline
584
+ 88.1
585
+ 75.4
586
+ 81.2
587
+ 75.4
588
+ 82.0
589
+ 78.6
590
+ 23.7
591
+ 57.1
592
+ 33.5
593
+ HeidelTime
594
+ 84.0
595
+ 79.4
596
+ 81.8
597
+ 70.6
598
+ 80.6
599
+ 75.3
600
+ 26.5
601
+ 65.8
602
+ 37.8
603
+ EventBaseline
604
+ 74.6
605
+ 80.5
606
+ 77.5
607
+ 48.3
608
+ 92.6
609
+ 63.5
610
+ 25.8
611
+ 54.1
612
+ 34.9
613
+ CogCompTime2
614
+ 39.7
615
+ 39.7
616
+ 39.7 (39.3)
617
+ 75.4
618
+ 75.4
619
+ 75.4 (69.3)
620
+ 30.7
621
+ 28.6
622
+ 29.6 (28.9)
623
+ The input is standard for all the evaluation functions: annotations, a dictionary with the name of the documents
624
+ as keys and the annotations as values; predictions, follows the same structure of the annotations but for each
625
+ document key contains the predictions made by a model. The output of the functions is dependent on the task being
626
+ evaluated. For the identification tasks (timex, event, and tlink) the function produces the standard macro and micro
627
+ metrics for precision, recall, and f1-score. Listing 5 presents a script that evaluates the predictions made by the event
628
+ baseline model in the TempEval-3 test set.
629
+ Listing 5: Evaluate event baseline model on the TempEval-3 test set.
630
+ from tieval import evaluate
631
+ annotations = {doc.name: doc.events for doc in te3.test}
632
+ result = evaluate.event_identification(annotations , predictions)
633
+ Table 2 depicts the results obtained by the implemented on benchmark corpora. Note that TF1 is the temproal awareness
634
+ metric and is only computed for CogCompTime2 (the only tlink classification system). Another interesting remark is
635
+ the fact that the TimexBaseline achieves effectiveness comparable to HeidelTime despite its simplicity.
636
+ The tlink classification is the most elaborate evaluator as it also computes the temporal awareness metric UzZaman and
637
+ Allen [2011]. The complexity of the calculation of temporal awareness lies in the computation of temporal closure. With
638
+ temporal_closure the closure operation can be easily performed on the document level, with the closure method of
639
+ 14https://github.com/qiangning/NeuralTemporalRelation-EMNLP19
640
+ 8
641
+
642
+ tieval
643
+ the Document object, or applied to a set of tlink’s with the temporal_closure function available on the library. The
644
+ script in Listing 6 illustrates how to perform such operations.
645
+ Listing 6: How to compute the temporal closure with a Document object and with a set of TLink’s.
646
+ from tieval import temporal_closure
647
+ doc = te3["wsj_0026.tml"]
648
+ closure_tlinks = doc.closure
649
+ closure_tlinks = temporal_closure(doc.tlinks)
650
+ For the temporal closure to be efficiently performed, on the back-end, the closure operation is executed with a point-
651
+ based reasoner which was inspired by the work of Gerevini et al. Gerevini et al. [1993]. As stated above, each TLink
652
+ instance contains an attribute named relation which is an instance of the TemporalRelation object. Within the
653
+ TemporalRelation all temporal relations are represented as the point relations by the means of a PointRelation
654
+ instance. In the point representation there are only four types of temporal relations, namely before (<), after (>), equal
655
+ (=), and not defined (None). With this point relation one can build a directed graph (henceforth referred as timegraph)
656
+ where the nodes are the entities endpoints (start and end of the entity) and the edges represent the before (<) relation.
657
+ This is accomplished by reflecting the after (>) relations and aggregating the equal (=) relations in a single node.
658
+ In the timegraph, inferring temporal relations is reduced to the problem of finding if two entities endpoints are connected,
659
+ i.e., they are in the same subgraph (by subgraph we mean a fully connected graph of the timegraph). If that is the case,
660
+ one can retrieve the endpoints on the entity pair and validate if the order of the entity endpoints is a valid temporal
661
+ relation. To clarify this concept, Figure 5 presents the timegraph built for a scenario where two tlinks were provided:
662
+ X MEETS Y and Y STARTS Z. To infer the temporal relation between X and Z one must query the endpoints in the
663
+ timegraph. In this case, one would get the following sequence of endpoints: sX < ex = sZ < eZ. After retrieving the
664
+ sequence of endpoints one just needs to validate if that sequence is a valid interval relation. In this example, one can
665
+ conclude that the temporal relation between X and Z is MEETS.
666
+ Figure 5: On the top part of the image is the relative relations between entities X, Y, and Z. On the bottom is the
667
+ graphical representation of the timegraph that would be generated.
668
+ To get a practical understanding of the runtime of the temporal closure algorithm, we executed it on all documents
669
+ currently available intieval. On a computer with an Intel Core i5-8500 CPU, the algorithm took less than half a second
670
+ for 95% of the documents, while the worst-case scenario took roughly 1.6 seconds.
671
+ This finalizes the presentation of the main functionalities, and some inner workings, of the first version of tieval. The
672
+ current version already provides functionalities that (we believe) will be beneficial for the TIE community. However,
673
+ we already have some ideas to further improve this library. These ideas are discussed in section 5.
674
+ 4
675
+ Observations
676
+ While building tieval, and in particular the datasets module, we found some inconsistencies in the corpus we were
677
+ working with. For instances, we found that the articles APW20000115.0209 and APW20000107.0088 of the AQUAINT
678
+ corpus contained the same news article, differing only in the annotations and in the value of the document creation
679
+ time. This type of inconsistencies were mitigated by implementing data cleaning processes that changed the original
680
+ annotations. Consequently, the results on the tieval framework will (most frequently) not resemble the exact result
681
+ that was reported in previous works, even if the same model is employed.
682
+ 9
683
+
684
+ Relative Relation
685
+ Timegraphtieval
686
+ 5
687
+ Conclusion and Future Work
688
+ This work presented the first public release of the tieval package, an open-source Python library for the development
689
+ and evaluation of TIE systems. tieval provides several functionalities to facilitate research in this field. These include
690
+ the import of multiple benchmark corpora in different formats, domain-specific operations such as temporal closure or
691
+ transformation from interval to point relations, out-of-the-box baseline systems, and evaluation measures for TIE tasks.
692
+ Therefore, it provides the community with a standard way to benchmark TIE systems in a fair and comparable way,
693
+ while enabling the development of reproducible systems.
694
+ For future versions of the package, we aim to extend its functionalities. One idea we are keen to implement is
695
+ visualization techniques to display the relative timeline of events from the annotations. In addition, we will add methods
696
+ to include other levels of information when available such as coreference resolution in the MeanTime corpus Minard
697
+ et al. [2016] and causality relations in the TCR corpus Ning et al. [2018b]. We also intend to extend the list of supported
698
+ corpora and baseline models, in particular, to support corpora that cast the TIE task as a question-answer problem, such
699
+ as MCTaco Zhou et al. [2019] and TORQUE Ning et al. [2020]. This will allow us to produce a reproducibility study to
700
+ investigate several state-of-the-art systems and benchmark them in the different corpora.
701
+ References
702
+ Ricardo Campos, Gaël Dias, Alípio M Jorge, and Adam Jatowt. Survey of temporal information retrieval and related
703
+ applications. ACM Computing Surveys (CSUR), 47(2):1–41, 2014.
704
+ Artuur Leeuwenberg and Marie-Francine Moens. A survey on temporal reasoning for temporal information extraction
705
+ from text. Journal of Artificial Intelligence Research, 66:341–380, 2019.
706
+ Aakanksha Naik, Luke Breitfeller, and Carolyn Rose. Tddiscourse: A dataset for discourse-level temporal ordering of
707
+ events. In Proceedings of the 20th Annual SIGdial Meeting on Discourse and Dialogue, pages 239–249, 2019.
708
+ Qiang Ning, Hao Wu, and Dan Roth. A multi-axis annotation scheme for event temporal relations. arXiv preprint
709
+ arXiv:1804.07828, 2018a.
710
+ Naushad UzZaman, Hector Llorens, Leon Derczynski, James Allen, Marc Verhagen, and James Pustejovsky. Semeval-
711
+ 2013 task 1: Tempeval-3: Evaluating time expressions, events, and temporal relations. In Second Joint Conference
712
+ on Lexical and Computational Semantics (* SEM), Volume 2: Proceedings of the Seventh International Workshop on
713
+ Semantic Evaluation (SemEval 2013), pages 1–9, 2013.
714
+ Marc Verhagen, Robert Gaizauskas, Frank Schilder, Mark Hepple, Graham Katz, and James Pustejovsky. Semeval-2007
715
+ task 15: Tempeval temporal relation identification. In Proceedings of the Fourth International Workshop on Semantic
716
+ Evaluations (SemEval-2007), pages 75–80, 2007.
717
+ Marc Verhagen, Roser Sauri, Tommaso Caselli, and James Pustejovsky. Semeval-2010 task 13: Tempeval-2. In
718
+ Proceedings of the 5th International Workshop on Semantic Evaluation, pages 57–62, 2010.
719
+ Naushad UzZaman and James Allen. Temporal evaluation. In Proceedings of the 49th Annual Meeting of the Association
720
+ for Computational Linguistics: Human Language Technologies, pages 351–356, 2011.
721
+ Anne-Lyse Minard, Manuela Speranza, Ruben Urizar, Begona Altuna, Marieke Van Erp, Anneleen Schoen, and Chantal
722
+ Van Son. Meantime, the newsreader multilingual event and time corpus. In Proceedings of the Tenth International
723
+ Conference on Language Resources and Evaluation (LREC’16), pages 4417–4422, 2016.
724
+ Xiao Ling and Daniel S Weld. Temporal information extraction. In Twenty-Fourth AAAI Conference on Artificial
725
+ Intelligence, 2010.
726
+ Leon Derczynski, Jannik Strotgen, Ricardo Campos, and Omar Alonso. Time and information retrieval: Introduction to
727
+ the special issue. Inf. Process. Manag., 51:786–790, 2015.
728
+ James Pustejovsky, José M Castano, Robert Ingria, Roser Sauri, Robert J Gaizauskas, Andrea Setzer, Graham Katz,
729
+ and Dragomir R Radev. Timeml: Robust specification of event and temporal expressions in text. New Directions in
730
+ Question Answering, 3:28–34, 2003a.
731
+ Ricardo Campos, Gaël Dias, Alípio Mário Jorge, and Célia Nunes. Identifying top relevant dates for implicit time
732
+ sensitive queries. Information Retrieval Journal, 20(4):363–398, 2017.
733
+ James F Allen. Maintaining knowledge about temporal intervals. Communications of the ACM, 26(11):832–843, 1983.
734
+ James Pustejovsky, Patrick Hanks, Roser Sauri, Andrew See, Robert Gaizauskas, Andrea Setzer, Dragomir Radev,
735
+ Beth Sundheim, David Day, Lisa Ferro, et al. The timebank corpus. In Corpus Linguistics, volume 2003, page 40.
736
+ Lancaster, UK., 2003b.
737
+ 10
738
+
739
+ tieval
740
+ David Graff. The AQUAINT Corpus of English News Text LDC2002T31. Linguistic Data Consortium, 2002.
741
+ Hui Li, Jannik Strötgen, Julian Zell, and Michael Gertz. Chinese temporal tagging with heideltime. In Proceedings of
742
+ the 14th Conference of the European Chapter of the Association for Computational Linguistics, Volume 2: Short
743
+ Papers, pages 133–137, 2014.
744
+ André Bittar, Pascal Amsili, Pascal Denis, and Laurence Danlos. French timebank: an iso-timeml annotated reference
745
+ corpus. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human
746
+ Language Technologies, pages 130–134, 2011.
747
+ Tommaso Caselli, Valentina Bartalesi Lenzi, Rachele Sprugnoli, Emanuele Pianta, and Irina Prodanof. Annotating
748
+ events, temporal expressions and relations in italian: the it-timeml experience for the ita-timebank. In Proceedings of
749
+ the 5th Linguistic Annotation Workshop, pages 143–151, 2011.
750
+ Marta Guerrero Nieto and Roser Saurí. Modes timebank 1.0. Linguistic Data Consortium (LDC), Philadelphia, PA,
751
+ USA, 2012.
752
+ Francisco Costa and António Branco. TimeBankPT: A TimeML annotated corpus of Portuguese. In Proceedings
753
+ of the Eighth International Conference on Language Resources and Evaluation (LREC’12), pages 3727–3734,
754
+ Istanbul, Turkey, May 2012. European Language Resources Association (ELRA). URL http://www.lrec-conf.
755
+ org/proceedings/lrec2012/pdf/246_Paper.pdf.
756
+ Weiyi Sun, Anna Rumshisky, and Ozlem Uzuner. Evaluating temporal relations in clinical text: 2012 i2b2 challenge.
757
+ Journal of the American Medical Informatics Association, 20(5):806–813, 2013.
758
+ William F Styler IV, Steven Bethard, Sean Finan, Martha Palmer, Sameer Pradhan, Piet C De Groen, Brad Erickson,
759
+ Timothy Miller, Chen Lin, Guergana Savova, et al. Temporal annotation in the clinical domain. Transactions of the
760
+ Association for Computational Linguistics, 2:143–154, 2014.
761
+ Taylor Cassidy, Bill McDowell, Nathanel Chambers, and Steven Bethard. An annotation framework for dense event
762
+ ordering. Technical report, CARNEGIE-MELLON UNIV PITTSBURGH PA, 2014.
763
+ Qiang Ning, Zhili Feng, Hao Wu, and Dan Roth. Joint reasoning for temporal and causal relations. arXiv preprint
764
+ arXiv:1906.04941, 2018b.
765
+ Tim O’Gorman, Kristin Wright-Bettner, and Martha Palmer. Richer event description: Integrating event coreference
766
+ with temporal, causal and bridging annotation. In Proceedings of the 2nd Workshop on Computing News Storylines
767
+ (CNS 2016), pages 47–56, 2016.
768
+ Nils Reimers, Nazanin Dehghani, and Iryna Gurevych. Temporal anchoring of events for the timebank corpus. In
769
+ Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers),
770
+ pages 2195–2204, 2016.
771
+ Artuur Leeuwenberg and Marie-Francine Moens. Towards extracting absolute event timelines from english clinical
772
+ reports. IEEE/ACM Transactions on Audio, Speech, and Language Processing, 28:2710–2719, 2020.
773
+ Wei-Te Chen and Will Styler.
774
+ Anafora: A web-based general purpose annotation tool.
775
+ In Proceedings of the
776
+ 2013 NAACL HLT Demonstration Session, pages 14–19. Association for Computational Linguistics, 2013. URL
777
+ http://www.aclweb.org/anthology/N13-3004.
778
+ Jannik Strötgen, Julian Zell, and Michael Gertz. Heideltime: Tuning english and developing spanish resources for
779
+ tempeval-3. In Second Joint Conference on Lexical and Computational Semantics (* SEM), Volume 2: Proceedings
780
+ of the Seventh International Workshop on Semantic Evaluation (SemEval 2013), pages 15–19, 2013.
781
+ Qiang Ning, Sanjay Subramanian, and Dan Roth. An improved neural baseline for temporal relation extraction. arXiv
782
+ preprint arXiv:1909.00429, 2019.
783
+ Matthew E. Peters, Mark Neumann, Mohit Iyyer, Matt Gardner, Christopher Clark, Kenton Lee, and Luke Zettlemoyer.
784
+ Deep contextualized word representations. In NAACL, 2018.
785
+ Qiang Ning, Hao Wu, Haoruo Peng, and Dan Roth. Improving temporal relation extraction with a globally acquired
786
+ statistical resource. arXiv preprint arXiv:1804.06020, 2018c.
787
+ Alfonso Gerevini, Lenhart Schubert, and Stephanie Schaeffer. Temporal reasoning in timegraph i–ii. ACM SIGART
788
+ Bulletin, 4(3):21–25, 1993.
789
+ Ben Zhou, Daniel Khashabi, Qiang Ning, and Dan Roth. " going on a vacation" takes longer than" going for a walk": A
790
+ study of temporal commonsense understanding. arXiv preprint arXiv:1909.03065, 2019.
791
+ Qiang Ning, Hao Wu, Rujun Han, Nanyun Peng, Matt Gardner, and Dan Roth. Torque: A reading comprehension
792
+ dataset of temporal ordering questions. arXiv preprint arXiv:2005.00242, 2020.
793
+ 11
794
+
6NE3T4oBgHgl3EQfpgqP/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8NAzT4oBgHgl3EQfE_qO/content/tmp_files/2301.01003v1.pdf.txt ADDED
@@ -0,0 +1,867 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Astronomy & Astrophysics manuscript no. main
2
+ ©ESO 2023
3
+ January 4, 2023
4
+ Letter to the Editor
5
+ Polarised radio pulsations from a new T dwarf binary
6
+ H. K. Vedantham1, 2, Trent J. Dupuy3, E. L. Evans3, A. Sanghi4, J. R. Callingham1, 5, T. W. Shimwell1, 5, W. M. J.
7
+ Best5, M. C. Liu6 and P. Zarka7
8
+ 1 ASTRON, Netherlands Institute for Radio Astronomy, Oude Hoogeveensedijk 4, Dwingeloo, 7991 PD, The Netherlands
9
+ 2 Kapteyn Astronomical Institute, University of Groningen, PO Box 72, 97200 AB, Groningen, The Netherlands
10
+ 3 Institute for Astronomy, University of Edinburgh, Royal Observatory, Blackford Hill, Edinburgh, EH9 3HJ, UK
11
+ 4 The University of Texas at Austin, Department of Astronomy, 2515 Speedway, C1400, Austin, TX 78712, USA
12
+ 5 Leiden Observatory, Leiden University, PO Box 9513, 2300 RA, Leiden, The Netherlands
13
+ 6 Institute for Astronomy, University of Hawaii, 2680 Woodlawn Drive, Honolulu, HI 96822, USA
14
+ 7 LESIA, CNRS – Observatoire de Paris, PSL 92190, Meudon, France
15
+ Received XXX; accepted YYY
16
+ ABSTRACT
17
+ Brown dwarfs display Jupiter-like auroral phenomena such as magnetospheric Hα emission and coherent radio emission. Coherent
18
+ radio emission is a probe of magnetospheric acceleration mechanisms and provides a direct measurement of the magnetic field strength
19
+ at the emitter’s location, both of which are difficult to access by other means. Observations of the coldest brown dwarfs (spectral
20
+ types T and Y) are particularly interesting as their magnetospheric phenomena may be very similar to those in gas-giant exoplanets.
21
+ Here we present 144 MHz radio and infrared adaptive optics observations of the brown dwarf WISEP J101905.63+652954.2 made
22
+ using the LOFAR and Keck telescopes respectively. The radio data shows pulsed highly circularly polarised emission which yields a
23
+ rotation rate of 0.32 ± 0.03 hr−1. The infrared imaging reveals the source to be a binary with a projected separation of 423.0 ± 1.6 mas
24
+ between components of spectral type T5.5 ± 0.5 and T7.0 ± 0.5. With a simple “toy model” we show that the radio emission can
25
+ in principle be powered by the interaction between the two dwarfs with a mass-loss rates of at least 25 times the Jovian value.
26
+ WISEP J101905.63+652954.2 is interesting because it is the first pulsed methane dwarf detected in a low radio-frequency search.
27
+ Unlike previous gigahertz-frequency searches that were only sensitive to objects with kiloGauss fields, our low-frequency search is
28
+ sensitive to surface magnetic fields of ≈ 50 Gauss and above which might reveal the coldest radio-loud objects down to planetary
29
+ mass-scales.
30
+ 1. Introduction
31
+ High energy charges around brown dwarfs are expected to be
32
+ created by auroral (or magnetospheric) processes akin to that
33
+ seen on gas-giant planets, as opposed to coronal and chro-
34
+ mospheric acceleration expected on stars (Nichols et al. 2012;
35
+ Williams 2018; Turnpenney et al. 2017). This paradigm has
36
+ been established based on highly circularly polarised and ro-
37
+ tationally modulated radio pulses and Hα emission observed
38
+ on brown dwarfs (Hallinan et al. 2007, 2008, 2015; Route &
39
+ Wolszczan 2012, 2016a; Williams et al. 2017). The radio emis-
40
+ sion is of particular interest because it is expected to occur at
41
+ the local cyclotron frequency, which in the non-relativistic limit,
42
+ only depends on the ambient magnetic field strength (Melrose
43
+ & Dulk 1982). Because Zeeman splitting observations become
44
+ very challenging in such cold objects as brown dwarfs due to
45
+ the lack of non-broadened spectral lines, radio observations may
46
+ be the only viable technique to directly measure their magnetic
47
+ field strengths and topologies. In addition, unlike rocky plan-
48
+ ets, gas giants and brown dwarfs have predictable and relatively
49
+ simple internal structures at depths where their magnetic field
50
+ is expected to be generated (Chabrier & Baraffe 2000). This
51
+ makes them ideal targets to test dynamo scaling laws (e.g., Chris-
52
+ tensen et al. 2009) that are likely applicable even in the exoplanet
53
+ regime.
54
+ Despite concerted searches, radio detections of the cold-
55
+ est brown dwarfs are rare. The coldest, spectral type Y brown
56
+ dwarfs have not been detected in the radio (Kao et al. 2019). At
57
+ the warmer spectral type T, four brown dwarfs have been de-
58
+ tected in dedicated surveys at radio frequencies of 5 GHz and
59
+ above (Route & Wolszczan 2012; Kao et al. 2016; Route &
60
+ Wolszczan 2016b,a; Kao et al. 2016, 2018). Recently, we re-
61
+ ported the first direct discovery of a brown dwarf made by virtue
62
+ of its radio emission (Vedantham et al. 2020) using the LO-
63
+ FAR radio telescope (van Haarlem et al. 2013) at 144 MHz.
64
+ Here we report our second discovery also made with LO-
65
+ FAR. WISEP J101905.63+652954.2 was originally discovered
66
+ by Kirkpatrick et al. (2011) in Wide-field Infrared Survey Ex-
67
+ plorer (WISE) data (Wright et al. 2010) and, using spectroscopic
68
+ data, assigned optical and near-infrared spectral types of T7 and
69
+ T6, respectively.
70
+ Cold brown dwarfs share their radio phenomenology with
71
+ Jupiter. The radio emission consists of two components. A quasi-
72
+ quiescent component that is unpolarised or weakly polarised and
73
+ a highly circularly polarised pulsed component that repeats at
74
+ the rotation rate (Williams 2018; Antonova et al. 2013; Hallinan
75
+ et al. 2008; Berger 2006). However, the radio energetics of the
76
+ detected brown dwarfs is orders of magnitude larger than that
77
+ seen in Jupiter. This combined with a lack of detection of UV or
78
+ H3+ from brown dwarfs (Saur et al. 2021; Gibbs & Fitzgerald
79
+ 2022) suggest that the Jovian auroral energetics cannot be simply
80
+ scaled to brown dwarfs. In any case, magnetic field lower lim-
81
+ its derived from the pulsed component in three of the detected
82
+ T dwarfs have been over a factor of three larger than the pre-
83
+ dictions of leading dynamo scaling laws that can successfully
84
+ predict the field strength of some solar system planets and low
85
+ mass stars (Kao et al. 2018). This suggests that the model is
86
+ inadequate, or it is also possible that by virtue of observing at
87
+ Article number, page 1 of 7
88
+ arXiv:2301.01003v1 [astro-ph.SR] 3 Jan 2023
89
+
90
+ A&A proofs: manuscript no. main
91
+ high frequencies, the previous radio surveys were only sensitive
92
+ to objects with anomalously large magnetic fields. For instance,
93
+ Christensen et al. (2009) predict a field strength of 103 Gauss for
94
+ a 50 MJup brown dwarf with an age of 109 yr and a surface tem-
95
+ perature of 1500 K (late-L dwarf). The corresponding peak cy-
96
+ clotron frequency in its magnetosphere is about 2.8 GHz which
97
+ will make such an object undetectable in a 5 GHz survey even
98
+ if it were ‘typical’ of the predicted population. The 144 MHz
99
+ LOFAR data can detect objects with surface field strengths as
100
+ low as 50 G. Therefore, the LOFAR-detected objects such as
101
+ WISEP J101905.63+652954.2 are beginning to provide a more
102
+ complete sample to critically test dynamo scaling laws over a
103
+ larger range in magnetic field strengths.
104
+ This paper is organised as follows: §2 presents details of the
105
+ radio and infrared observations and the analysis of the radio light
106
+ curve. In §3 we discuss the possible mechanisms driving the ra-
107
+ dio emission, and present our conclusions and outlook in §4.
108
+ 2. Observations
109
+ 2.1. LOFAR 144 MHz observations
110
+ WISEP J101905.63+652954.2
111
+ was discovered as part of our
112
+ ongoing search (e.g. Callingham et al. 2021) for stars, brown
113
+ dwarfs, and exoplanets using data from the LOFAR Two Metre
114
+ Sky Survey (LoTSS; Shimwell et al. 2022). Our methodology
115
+ has typically involved searching for circularly polarised sources
116
+ in deep 8 hr exposure LoTSS images. This is how we found
117
+ Elegast, the first radio-selected brown dwarf (Vedantham et al.
118
+ 2020). Because brown dwarf auroral emission is typically pulsed
119
+ at the rotation period, we have since implemented a search al-
120
+ gorithm to construct Stokes-V light curves on various time-bin
121
+ widths and search for on-off and periodic pulsations from known
122
+ brown dwarfs. Although we plan to conduct an untargeted search
123
+ for such pulses over the Northern sky, we first validated our ap-
124
+ proach by a targeted search of ten known T- and Y-type brown
125
+ dwarfs which led to the discovery of Stokes-V radio pulsations
126
+ from WISEP J101905.63+652954.2.
127
+ Our current pipeline takes in the standard calibrated visi-
128
+ bilities from the LoTSS survey. We first subtract the LoTSS-
129
+ detected sources from the visibilities using their direction depen-
130
+ dent gains while retaining on-axis sources in the direction of the
131
+ target for an additional round of self-calibration as described in
132
+ van Weeren et al. (2021). We then modelled and subtracted these
133
+ sources using their clean components from wsclean. We then
134
+ imaged the target fields using wsclean (Offringa et al. 2014) at
135
+ a cadence of 4 minutes and extracted the light curves from these
136
+ images after averaging over the available bandwidth. The light
137
+ curve of WISEP J101905.63+652954.2 shows a statistically sig-
138
+ nificant burst (Fig. 1). The on and flanking off-burst snapshot im-
139
+ ages are also shown. The figure also shows the light curve binned
140
+ to a resolution of 16 min in red that reveals a hint of periodicity
141
+ at around a 3 hr period.
142
+ Polarised radio emission from planets and brown dwarfs is
143
+ expected to have a periodic signature at the rotation period of
144
+ the object due to beaming (akin to a light house). To ascertain
145
+ the period signature in the light curve, we computed the Lomb-
146
+ Scargle periodogram of the light curve using the astropy (As-
147
+ tropy Collaboration et al. 2013, 2018) implementation (See Fig.
148
+ 2). To compute the significance of the periodogram peaks we
149
+ computed the false alarm rate based on the bootstrap method de-
150
+ scribed in VanderPlas (2018). We detect a dominant peak at a
151
+ frequency of 0.324 hr−1 with a false alarm rate of under 3%. We
152
+ compute an uncertainty in the peak’s location of 0.033 hr−1 using
153
+ the method prescribed in equation 52 of VanderPlas (2018).
154
+ 2.2. Keck/NIRC2 LGS AO
155
+ We observed WISEP J101905.63+652954.2 on 2015 January
156
+ 15 UT and 2022 January 24 UT with the facility imager NIRC2
157
+ at the Keck II telescope in concert with the laser guide star (LGS)
158
+ adaptive optics (AO) system (van Dam et al. 2006; Wizinowich
159
+ et al. 2006). For tip-tilt correction, we used the star USNO-
160
+ B1.0 1554-0140735, which is 23′′ away from the target and pro-
161
+ vided flux to the tip-tilt sensor equivalent to R = 18.2 mag. The
162
+ wavefront sensor monitoring the LGS measured flux equivalent
163
+ to a V = 10.2 mag star in 2015 and V = 8.5 mag in 2022, thanks
164
+ to the intervening LGS upgrade (Chin et al. 2016). We obtained
165
+ images with standard Maunakea Observatories filters in the J
166
+ and H bands (Tokunaga et al. 2002) as well as CH4s, a medium-
167
+ bandwidth filter centred on the H-band flux peak of T dwarfs.
168
+ For each filter, we obtained between four and six dithered 180-s
169
+ images in 2015 and 60-s images in 2022 while keeping the LGS
170
+ fixed to the centre of NIRC2’s narrow camera (0′′.01 pixel−1)
171
+ field-of-view (10′′ × 10′′). In 2015, the AO correction deterio-
172
+ rated significantly as we collected data, and the quality of our
173
+ H-band data set was too poor to be included in our analysis.
174
+ We reduced our data using the same custom scripts as in
175
+ our previous work (e.g., Liu et al. 2008; Dupuy et al. 2015),
176
+ and examples of individual exposures are shown in Figure 3.
177
+ We measured the separation, position angle (PA), and magnitude
178
+ difference in individual exposures using three-component, two-
179
+ dimensional Gaussians, and computed the means and standard
180
+ deviations of measurements from individual exposures as the fi-
181
+ nal measurements and their uncertainties. For our 2015 data, we
182
+ used the astrometric calibration of Yelda et al. (2010) to correct
183
+ for nonlinear distortion, the orientation of NIRC2 (by subtracting
184
+ 0◦.252), and the pixel scale (9.952±0.002 mas pixel−1). Likewise,
185
+ for our 2022 data we used the calibration of Service et al. (2016).
186
+ The resulting binary parameters are given in Table 1. Our relative
187
+ astrometry is consistent within the errors at each epoch, and the
188
+ repeated observations in J and CH4s filters show no significant
189
+ change in flux ratio.
190
+ To compute the final relative astrometry at each epoch, we
191
+ took the weighted average of our relative astrometry measure-
192
+ ments and added a systematic error of 1.5 mas to account for the
193
+ uncertainty in the distortion corrections of NIRC2. This gives
194
+ separations of 423.0 ± 1.6 mas and 468.2 ± 1.6 mas and PAs of
195
+ 161◦.71±0◦.23 and 166◦.87±0◦.20, in 2015 and 2022, respectively.
196
+ The observed motion of ≈ 7 mas yr−1 is much lower than the
197
+ proper motion of the system (150.6 ± 1.1 mas yr−1) measured by
198
+ Kirkpatrick et al. (2019), so we conclude the companion shares
199
+ a common proper motion with the primary and is physically
200
+ bound.
201
+ Our Keck images also showed a fainter point source ≈2′′
202
+ away from WISEP J101905.63+652954.2 at a position angle of
203
+ ≈200◦. We identified this source in the Pan-STARRS1 3π Survey
204
+ catalog (Chambers et al. 2016) as PSO J154.7727+65.4978. It is
205
+ visible in stacked rizyP1 images and appears brightest in zP1. Its
206
+ (z − y)P1 = 0.41 ± 0.13 mag color (using stacked photometry) is
207
+ far too blue to be a fainter, later-T or Y dwarf (Best et al. 2018),
208
+ so we conclude this is a background star or galaxy. Although this
209
+ source is only about 2′′ from the nominal position of the radio
210
+ detection, it is almost certainly not the source of the observed
211
+ radio emission. The high circular polarisation in the radio-band
212
+ is inconsistent with an extragalactic origin, so we only need con-
213
+ sider the Galactic stellar hypothesis. The absolute radio astrom-
214
+ Article number, page 2 of 7
215
+
216
+ Vedantham et al.: Radio pulsation from new T-dwarf binary
217
+ 10h19m15s
218
+ 10s
219
+ 05s
220
+ 00s
221
+ 65±3003000
222
+ 0000
223
+ 2903000
224
+ 0000
225
+ RA (J2000)
226
+ Dec (J2000)
227
+ Stokes V
228
+ 10h19m15s
229
+ 10s
230
+ 05s
231
+ 00s
232
+ 65±3003000
233
+ 0000
234
+ 2903000
235
+ 0000
236
+ RA (J2000)
237
+ Dec (J2000)
238
+ Stokes V
239
+ 10h19m15s
240
+ 10s
241
+ 05s
242
+ 00s
243
+ 65±3003000
244
+ 0000
245
+ 2903000
246
+ 0000
247
+ RA (J2000)
248
+ Dec (J2000)
249
+ Stokes V
250
+ (a)
251
+ (b)
252
+ (c)
253
+ (d)
254
+ Fig. 1. Panel (a) shows the Stokes-V radio lightcurve of WISEP J101905.63+652954.2 with a bin width of 4 minutes (black points with ±1σ
255
+ errorbars) and 16 minutes (red curve with shaded ±1σ uncertainty). The point marked with the black square is a significant detection with a
256
+ flux-density of −4.1(7) mJy whose Stokes-V image is shown in panel (c). Panels (b) and (d) show similar 4 min exposure images bracketing the
257
+ integration show in panel (c).
258
+ Table 1. Keck LGS AO Relative Astrometry and Photometry of WISEP J101905.63+652954.2.
259
+ Epoch (MJD)
260
+ Filter
261
+ Separation (mas)
262
+ PA (deg)
263
+ ∆m (mag)
264
+ 57037.5382
265
+ J
266
+ 416 ± 7
267
+ 161.5 ± 0.6
268
+ 0.37 ± 0.06
269
+ 57037.5246
270
+ CH4s
271
+ 423.1 ± 0.6
272
+ 161.72 ± 0.12
273
+ 0.489 ± 0.019
274
+ 59603.5270
275
+ J
276
+ 467.2 ± 1.1
277
+ 166.78 ± 0.12
278
+ 0.494 ± 0.021
279
+ 59603.5218
280
+ CH4s
281
+ 467 ± 3
282
+ 166.82 ± 0.18
283
+ 0.48 ± 0.03
284
+ 59603.5174
285
+ H
286
+ 468.7 ± 0.7
287
+ 166.97 ± 0.10
288
+ 0.579 ± 0.013
289
+ Note. Error bars given here are the standard deviation of individual measurements and do not account for the 1.5 mas systematic
290
+ error on the absolute astrometric reference frame of NIRC2 due to the optical distortion correction for such a wide binary.
291
+ Relative photometry is given as the difference in magnitude ∆m ≡ mB − mA.
292
+ etry has a Gaussian-equivalent standard deviation of σ ≈ 0′′.5
293
+ (Shimwell et al. 2022) yielding a 4σ discrepancy in position.
294
+ The Pan-STARRS1 z − y colour suggests that the source is a mid
295
+ M-dwarf whose zP1 = 21.06±0.06 mag places it at a photometric
296
+ distance of over 300 pc. This is well beyond the sensitivity hori-
297
+ zon of LOFAR for M-dwarfs’ cyclotron maser emission (Call-
298
+ ingham et al. 2021). Finally, the rotation rate implied by the radio
299
+ observations of 0.32 hr−1 is unusually large for a mid M-dwarf
300
+ (Popinchalk et al. 2021). For these reasons, we reject the associ-
301
+ ation between the radio source and PSO J154.7727+65.4978.
302
+ In order to compute CH4s−H colors for the two components
303
+ of WISEP J101905.63+652954.2 from Keck LGS AO imag-
304
+ ing, we used its IRTF/SpeX spectrum from 2010 May 27 UT
305
+ (Kirkpatrick et al. 2011) to measure integrated-light colors of
306
+ CH4s−H = −0.42 mag and J −H = −0.34 mag. Combined with
307
+ the 2MASS measurement of J = 16.589 ± 0.055 mag, these col-
308
+ ors give integrated-light photometry of H = 16.93±0.06 mag and
309
+ CH4s = 16.51±0.06 mag. Combined with our measured magni-
310
+ tude differences in CH4s and H, we find colors of CH4s − H =
311
+ −0.382 ± 0.013 mag and −0.481 ± 0.020 mag for the primary
312
+ and secondary. Using the spectral type-colour relation detailed
313
+ by Liu et al. (2008), we determine methane-photometry-based
314
+ spectral types of T5.5 ± 0.5 and T7.0 ± 0.5.
315
+ Article number, page 3 of 7
316
+
317
+ A&A proofs: manuscript no. main
318
+ 0
319
+ 1
320
+ 2
321
+ 3
322
+ 4
323
+ Frequency [1/hour]
324
+ −0.025
325
+ 0.000
326
+ 0.025
327
+ 0.050
328
+ 0.075
329
+ 0.100
330
+ 0.125
331
+ 0.150
332
+ Lomb-Scargle power
333
+ FAR 0.1
334
+ FAR 0.03
335
+ FAR 0.01
336
+ Sampling window
337
+ Data
338
+ Fig. 2. Lomb Scargle periodogram of the radio light curve from Fig. 1.
339
+ The dominant peak with a false alarm rate of under 3% is at 0.324 ±
340
+ 0.033 hr−1.
341
+ 3. Discussion
342
+ 3.1. Mass and magnetic field estimates
343
+ We computed the combined-light bolometric luminosity of
344
+ WISEP J101905.63+652954.2 by direct integration of its unre-
345
+ solved optical to mid-infrared (MIR) spectral energy distribution
346
+ (SED). The assembled SED consists of available Pan-STARRS-
347
+ 1 (PS1; Chambers et al. 2016) optical photometry (z, y), the
348
+ near-infrared (NIR) IRTF/SpeX prism spectrum, NIR photom-
349
+ etry from 2MASS (Cutri et al. 2003) and MKO (Best et al.
350
+ 2021), and MIR photometry from the CatWISE catalog (W1
351
+ and W2 bands; Eisenhardt et al. 2020; Marocco et al. 2021),
352
+ AllWISE catalog (W3 and W4 bands; Cutri et al. 2013), and
353
+ Spitzer/IRAC Channels 1 and 2 (Fazio et al. 2004). First, we
354
+ flux-calibrated the SpeX spectrum using the weighted average
355
+ of scale factors derived from PS1 y, 2MASS JHKs, and MKO
356
+ JHK photometry, assuming a systematic noise floor of 0.01 mag
357
+ for all the filters. We then integrated the flux-calibrated SpeX
358
+ spectrum to determine the NIR contribution to the bolometric
359
+ flux, accounting for the uncertainties in the spectral data points
360
+ and the flux calibration procedures. We determined the opti-
361
+ cal and MIR contributions to the bolometric flux by simultane-
362
+ ously fitting ATMO model atmospheres (Phillips et al. 2020) to
363
+ the PS1 and WISE photometry (computing synthetic photom-
364
+ etry from the models) and the SpeX spectrum (with the mod-
365
+ els degraded to the non-linear spectral resolution of the 0′′.5
366
+ slit). We found the best-fitting ATMO model had Teff = 1000
367
+ K and log g = 5.5 dex. Our final bolometric flux was found
368
+ by adding the NIR contribution to the integration of the model
369
+ outside the wavelength range of the SpeX spectrum. The uncer-
370
+ tainty in the optical+MIR contribution was obtained from the
371
+ standard deviation of the corresponding measurements derived
372
+ using the three model spectra adjacent in Teff and log g to the
373
+ best-fitting model. Using WISEPA J101905.63+652954.2’s par-
374
+ allax of 42.9 ± 1.8 mas, we calculated its bolometric luminosity
375
+ log(Lbol/L⊙) = −4.994 ± 0.063 dex.
376
+ To determine the mass of each component in the binary sys-
377
+ tem, we combined their luminosities and ages with the Saumon
378
+ & Marley (2008) (SM08) hybrid evolutionary model. Each com-
379
+ ponent’s luminosity is estimated using the bolometric luminosity
380
+ vs spectral type relations from Filippazzo et al. (2015). We find
381
+ that ≈70% of the luminosity is contributed by the T5.5 dwarf
382
+ and ≈30% is contributed by the T7 dwarf. For each object, we
383
+ adopt the field-age distribution from Dupuy & Liu (DL17 2017).
384
+ For our mass calculations, we use the Bayesian rejection sam-
385
+ pling technique described in Dupuy & Liu (2017). First, we draw
386
+ 106 random (luminosity, age) samples from a uniform distribu-
387
+ tion spanning the bolometric luminosity range of the evolution-
388
+ ary model grid and the intersection of the DL17 age range and
389
+ the evolutionary model grid age range. Second, we compute the
390
+ probability of each sample based on the χ2 of the drawn lumi-
391
+ nosity with respect to the measured value and the likelihood of
392
+ drawing the sample’s age from the DL17 distribution. Third, we
393
+ randomly draw 106 uniform variates (u) distributed in the range
394
+ from 0 to 1 and reject any samples where p < u. The fourth and
395
+ final step is to linearly interpolate the evolutionary models (in
396
+ logarithmic space) at each accepted luminosity-age point to cal-
397
+ culate the corresponding mass. We find a mass of 41 ± 18 MJup
398
+ for the T5.5 component and 32 ± 16 MJup for the T7 component.
399
+ Armed with the mass and luminosity values, we can estimate
400
+ the magnetic fields of the two objects using so-called dynamo
401
+ scaling laws. We employed the ‘saturated dynamo’ scaling law
402
+ proposed by Christensen et al. (2009) that relates the magnetic
403
+ field to the heat flux and mean density of the brown dwarf. We
404
+ used the law in the form given by Reiners & Christensen (2010,
405
+ their equation 1). We also used their correction to estimate the
406
+ surface dipolar field from the field at the top of the dynamo as
407
+ predicted by the scaling law (Reiners & Christensen 2010, their
408
+ equation 2). Although the objects’ luminosities are have small
409
+ errors, the mass estimates and the normalising constant in the
410
+ scaling law have large fractional errors. To properly incorporate
411
+ these errors into the predicted magnetic field strength, we ran
412
+ a Monte-Carlo simulation where we drew the normalising con-
413
+ stant from a uniform distribution (Reiners et al. 2009, their equa-
414
+ tion 1), and the mass from a normal distribution. In each step
415
+ of the Monte Carlo run we interpolated the evolutionary mod-
416
+ els of Baraffe et al. (2003) to find the relationship between mass
417
+ and field strength for the measured luminosity (i.e. for different
418
+ ages). The resulting distribution of polar dipole field strengths
419
+ for the T5.5 and T7 objects had a mean and standard deviation
420
+ of 660 ± 300 G and 460 ± 210 G respectively.
421
+ The observed cyclotron maser emission itself places a lower
422
+ limit on the polar surface magnetic field strength of 51.4 G (cy-
423
+ clotron frequency at the mid-point of the LOFAR data’s radio
424
+ band). While this is consistent with the field estimates made
425
+ above, higher frequency observations are necessary to critically
426
+ test the dynamo scaling law. In what follows, we will leave the
427
+ polar surface field as a variable while normalising our equations
428
+ at B = 1 kG.
429
+ 3.2. Energetics
430
+ WISEP J101905.63+652954.2 has not yet been detected at the
431
+ gigahertz-frequencies where quiescent incoherent synchrotron
432
+ emission is typically observed. A non-detection in the VLA Sky
433
+ Survey (Lacy et al. 2020) quick-look images yields a 3σ up-
434
+ per limit of 0.34 mJy in the 2–4 GHz band. Although incoher-
435
+ ent radio emission has widely been used as proxy for the en-
436
+ Article number, page 4 of 7
437
+
438
+ Vedantham et al.: Radio pulsation from new T-dwarf binary
439
+
440
+
441
+
442
+
443
+
444
+
445
+
446
+
447
+
448
+
449
+
450
+
451
+
452
+
453
+
454
+
455
+ CH4s
456
+
457
+
458
+
459
+
460
+
461
+
462
+
463
+
464
+
465
+
466
+
467
+
468
+
469
+
470
+
471
+ 2015 Jan 15
472
+ 0.5"
473
+ J
474
+
475
+
476
+
477
+
478
+
479
+
480
+
481
+
482
+
483
+
484
+
485
+
486
+
487
+
488
+
489
+
490
+ H
491
+
492
+
493
+
494
+
495
+
496
+
497
+
498
+
499
+
500
+
501
+
502
+
503
+
504
+
505
+
506
+
507
+ CH4s
508
+
509
+
510
+
511
+
512
+
513
+
514
+
515
+
516
+
517
+
518
+
519
+
520
+
521
+
522
+
523
+ 2022 Jan 24
524
+ 0.5"
525
+ J
526
+ Fig. 3. Contour plots of one typical individual exposure for each filter in which we obtained data. Contours are drawn in logarithmic intervals
527
+ from the peak flux down to 10% of the peak flux in each image. The images are all 1′′.5 across with North up. In 2015, despite the AO correction
528
+ deteriorating from 0′′.09 in the CH4s band to 0′′.13 in the J-band, the binary was still well resolved. We used the more precise differential magnitudes
529
+ from the higher-quality, and fully contemporaneous 2022 images in our analysis.
530
+ ergetics of magnetospheric and coronal emitters (Pineda et al.
531
+ 2017; Leto et al. 2021; Benz & Guedel 1994), here we use the
532
+ pulsed radio emission to calculate the energetics of the auroral
533
+ electrons. We posit that the radio pulsations are due to beam-
534
+ ing combined with rotation and that the beam solid angle of the
535
+ radio emission is 1.6 sr — identical to that of Jupiter’s auroral
536
+ radio emission due to its magnetosphere–ionosphere coupling
537
+ (Zarka et al. 2004). The radio spectral luminosity for a pulse
538
+ flux density of 2 mJy (see Fig. 1) and a measured distance of
539
+ 23.3 pc (Kirkpatrick et al. 2019) is then (2 mJy) × (23.3 pc)2 ×
540
+ (1.6 sr) ≈ 1.7 × 1014 erg s−1 Hz−1. Let us further assume that the
541
+ total bandwidth of the radio emission is equal to the cyclotron
542
+ frequency at the surface of the object. Then the auroral radio
543
+ power is 4.6 × 1023 (B/kG) erg s−1. Assuming a 1% efficiency
544
+ in the conversion of the available auroral power to radio waves
545
+ (Zarka 2007; Lamy et al. 2011), we obtain an auroral power of
546
+ 4.6×1025 (B/kG) erg s−1. For comparison, the auroral power out-
547
+ put of Jupiter is ∼ 1020 erg s−1 (Bhardwaj & Gladstone 2000),
548
+ and Turnpenney et al. (2017) predict auroral powers of up to
549
+ 1026.5 erg s−1 (assuming the same 1% radio efficiency) for the Jo-
550
+ vian magnetosphere-ionosphere paradigm applied to ultra-cool
551
+ dwarfs.
552
+ 3.3. Is binary interaction powering the radio emission?
553
+ Magnetic interaction between the two objects can accelerate
554
+ charges that eventually emit cyclotron maser radio emission,
555
+ as seen in the Jupiter-Io system (Goldreich & Lynden-Bell
556
+ 1969; Neubauer 1998; Zarka 1998). The projected separation
557
+ of the two brown dwarfs in WISEP J101905.63+652954.2 is
558
+ 9.9±0.4 au, given their parallactic distance of 23.3±1.0 pc (Kirk-
559
+ patrick et al. 2019). We explored the full range of orbital parame-
560
+ ters for the binary by fitting the two epochs of relative astrometry
561
+ from Section 2.2 with the orvara orbit analysis tool (Brandt et al.
562
+ 2021). We used a prior on the total mass of 0.071 ± 0.033 M⊙
563
+ based on our mass estimates from Section 3.1. As expected, the
564
+ orbital parameters are poorly constrained, but we can place 3σ
565
+ limits on the semimajor axis (> 5.2 au), period (> 30 yr), in-
566
+ clination (< 86◦), and eccentricity (< 0.96). The posterior dis-
567
+ tributions have medians and 1σ confidence intervals of 11+4
568
+ −6 au,
569
+ 160+120
570
+ −130 yr, and 69+13
571
+ −11 deg, but we caution that these are highly
572
+ influenced by the priors. (The eccentricity posterior is almost un-
573
+ changed from the uniform prior below the upper limit we quote.)
574
+ Based on the radio rotation rate of the emitter, its light cylin-
575
+ der is at a radial distance of about 3.4 au. Therefore, even if the
576
+ magnetospheres are not loaded with plasma (i.e. under force-free
577
+ electrodynamics), direct magnetic interaction between the two
578
+ dipolar magnetospheres is not possible and we must consider in-
579
+ terception by one brown dwarf of the Poynting flux radiated by
580
+ the other. The Poynting flux radiated by an oblique rotator (akin
581
+ to a Pulsar’s dipole emission) is of the order L ∼ B2
582
+ 0R6
583
+ 0Ω4/c3
584
+ (Condon & Ransom 2016) where B0 is the surface magnetic
585
+ field, Ω is the angular rotation rate, and R0 is the object’s ra-
586
+ dius. For characteristic values of B0 = 103 G, R0 = 7 × 109 cm,
587
+ and Ω = 5.6 × 10−4 s−1, we get L ∼ 1020 erg s−1 which falls well
588
+ short of the value necessary to power the radio emission.
589
+ Next, consider a scenario where the magnetospheres are
590
+ loaded by plasma and drive a feeble wind. For simplicity, let
591
+ us assume that the two magnetospheres and their co-rotation
592
+ rates are similar. Due to the fast rotation, the balance between
593
+ the centrifugal force of the co-rotating plasma and magnetic
594
+ pressure must determine the structure of the magnetosphere in
595
+ this case (i.e. gravitational force can be safely neglected) and
596
+ the eventual Poynting flux. The centrifugal pressure felt by the
597
+ plasma is Fc = ρΩ2R2/2 where R is the radial distance, Ω is
598
+ the angular rotation rate and ρ = ρ(R) is the plasma density at
599
+ radius R. The magnetic pressure for a dipole at distance R is
600
+ FB = B2
601
+ 0R−6R6
602
+ 0/(8π) where R0 is the object’s radius and B0 is
603
+ the surface magnetic field strength. In our simple ‘toy model’,
604
+ at low radii, FB dominates enforcing co-rotation with a dipolar
605
+ field. This breaks at a critical radius when FB = FC. Beyond
606
+ this radius, we assume that the field lines open up into a Parker-
607
+ spiral type configuration. Note that FB = FC is equivalent to
608
+ saying that the co-rotation speed equals the local Alfvén speed.
609
+ The critical radius is therefore the so-called Alfvén point:
610
+ rA =
611
+ ������
612
+ B2
613
+ 0R6
614
+ 0
615
+ 4πΩ2ρ(rA)
616
+ ������
617
+ 1/8
618
+ ,
619
+ (1)
620
+ In the open field zone, the azimuthal field dominates, falling
621
+ off with distance, R as R−1. We therefore assume B(R)
622
+ =
623
+ B(rA)(R/rA)−1 where B(rA) = B0(rA/R0)−3. The brown dwarf
624
+ wind beyond rA is assumed to to have a radial flow speed, vr
625
+ equal to the co-rotation speed at rA as suggested for the Jovian
626
+ case by Hill et al. (1974). With these assumptions, the Poynting
627
+ luminosity can be readily computed as S = (B2/8π)×vr ×(4πR2)
628
+ at any closed surface of radius R > rA. The mass-loss rate is
629
+ given by ˙M = (4πr2
630
+ A) × vr × ρ(rA). For parameters applicable to
631
+ WISEP J101905.63+652954.2 of R0 = 7 × 109 cm, B0 = 103 G,
632
+ Ω = 5.6 × 10−4 s−1, we find that the necessary Poynting lumi-
633
+ nosity of ≈ 1025.5 erg s−1 can be achieved with a mass-loss rate
634
+ of ≈ 25 tonnes per second. The corresponding Alfvén point is
635
+ at rA = 188R0. If instead we assume B0 = 100 G then we get
636
+ the necessary Poynting flux for
637
+ ˙M ≈ 550 tonnes per second
638
+ and rA = 40R0. For comparison, Io’s volcanism is the princi-
639
+ pal source of Jovian magnetospheric plasma whose loss rate is
640
+ about 1 tonne per second. In any case, a significant fraction of
641
+ Article number, page 5 of 7
642
+
643
+ A&A proofs: manuscript no. main
644
+ the emitted Poynting flux must be intercepted by the magneto-
645
+ sphere of the companion for conversion of this Poynting flux
646
+ into radiation emission due to binary interaction. We therefore
647
+ conclude that while energetically feasible in principle, further
648
+ work on the precise details of the wind–wind interaction and the
649
+ source of mass-loss must be worked out to ascertain whether
650
+ this interaction could have powered the observed radio emission
651
+ from WISEP J101905.63+652954.2.
652
+ 3.4. Auroral signatures
653
+ Regardless
654
+ of
655
+ the
656
+ veracity
657
+ of
658
+ the
659
+ interaction-powered
660
+ emission scenario, let us assume that at the emitter in
661
+ WISEP J101905.63+652954.2, an auroral mechanism similar
662
+ to that seen on Jupiter is at play. Such aurorae have also
663
+ been suggested as the radio emission mechanism in other
664
+ brown dwarfs and ultracool dwarfs (e.g. Hallinan et al. 2015;
665
+ Turnpenney et al. 2017). Jupiter’s aurorae emit compara-
666
+ ble amounts of power in the radio and Hα line (Bhardwaj
667
+ & Gladstone 2000; Zarka 1998). Assuming the same for
668
+ WISEP J101905.63+652954.2, we would anticipate an Hα lu-
669
+ minosity of 4.6 × 1023 (B/kG) erg s−1. Assuming a characteristic
670
+ line width of 6Å (Pineda et al. 2016), the expected Hα flux
671
+ density is ≈ 7 × 10−18 (B/kG) erg s−1 cm−2 Å−1. Based on the
672
+ optical spectrum or WISEP J101905.63+652954.2 presented
673
+ by Kirkpatrick et al. (2011), we derive a 2σ upper limit on the
674
+ Hα luminosity of 2.8 × 10−18 erg s−1 cm−2 Å−1. This suggests
675
+ that the surface magnetic field of WISEP J101905.63+652954.2
676
+ is B ≲ 103 G which is broadly consistent with our magnetic
677
+ field estimate from §3.1. Nevertheless, we caution that it is
678
+ not possible to make definite statements on the magnetic field
679
+ strength because the radio and Hα efficiencies and the radio
680
+ beam solid angle can only be trusted to within an order of
681
+ magnitude. In conclusion, we find that the available data are
682
+ consistent with a Jupiter-like auroral process driving the radio
683
+ emission in a magnetosphere with a surface strength of order ap
684
+ kiloGauss.
685
+ 4. Conclusions & Outlook
686
+ Magnetospheric emissions from the coldest brown dwarfs pro-
687
+ vide a rare glimpse into magnetism in the planetary mass
688
+ regime outside the solar system. Here we have presented our
689
+ second detection of a methane-bearing, T-type brown dwarf—
690
+ WISEP J101905.63+652954.2—with LOFAR at 144 MHz. The
691
+ radio emission is pulsed and periodic, from which we de-
692
+ rive a rotation rate of 0.32 ± 0.03 hr−1 (1σ bounds). We
693
+ have also presented infrared adaptive optics observations of
694
+ WISEP J101905.63+652954.2 that show it to be a T-dwarf bi-
695
+ nary with a separation of 9.9±0.4 au and spectral types T5.5±0.5
696
+ and T7.0 ± 0.5, making it the first T-dwarf binary to be de-
697
+ tected in the radio band. We considered binarity as the cause
698
+ of the radio emission. We find that while energetically feasible
699
+ for mass-loss rates of ≳ 25 tonnes per second, precise details of
700
+ the interaction region must be studied before binary-interaction
701
+ can be posited as the probably cause of the emission. In this
702
+ regard, it is interesting to note that Kao & Sebastian Pineda
703
+ (2022) have suggested (based on detection rates and luminosi-
704
+ ties) that binary ultracool dwarfs may be more radio-loud than
705
+ their single counterparts. If this is true, then a radio-selection
706
+ as we have done here might reveal a population of close binary
707
+ brown dwarfs upon infrared follow-up observations, similar to
708
+ WISEP J101905.63+652954.2.
709
+ WISEP J101905.63+652954.2 is the first brown dwarf de-
710
+ tected at 144 MHz with the canonical periodic pulsed emission
711
+ profile similar to that seen in the cm-wave band and on Jupiter
712
+ at ν ≲ 40 MHz. Three previously detected T-dwarfs in the cm-
713
+ wave band have, unexpectedly, shown pulses up to 10 and/or 15
714
+ GHz with no sign of a distinct high-frequency cut off (Kao et al.
715
+ 2018). This suggests magnetic field strengths well in excess of
716
+ that anticipated by some dynamo scaling laws suggesting that the
717
+ laws need to be revised. However, it is also possible that by virtue
718
+ of a survey bias, the high frequency surveys have preferentially
719
+ detected a small population of T dwarfs that have anomalously
720
+ high field strengths possibly in smaller magnetic loops rather
721
+ than the large scale field predictions made from dynamo mod-
722
+ els. Because WISEP J101905.63+652954.2 was selected from a
723
+ 144 MHz survey that does not have this selection bias, it will be
724
+ very interesting to see if its spectral cut-of continues to unex-
725
+ pected trend discovered by Kao et al. (2018).
726
+ We end by noting that WISEP J101905.63+652954.2 is the
727
+ second detected, and first pulsed, brown dwarf system found
728
+ in the ongoing LOFAR Two Metre Sky Survey. As demon-
729
+ strated by Vedantham et al. (2020), because the radio emission
730
+ is non-thermal in origin, radio surveys may be able to discover
731
+ a population of the coldest brown dwarfs that are too faint to
732
+ be found in canonical infrared surveys. The pulsed emission
733
+ from WISEP J101905.63+652954.2 therefore motivates an all-
734
+ sky, untargeted search for pulsed, circularly-polarised emitters
735
+ in LoTTS survey data.
736
+ References
737
+ Antonova, A., Hallinan, G., Doyle, J. G., et al. 2013, A&A, 549, A131
738
+ Astropy Collaboration, Price-Whelan, A. M., Sip˝ocz, B. M., et al. 2018, AJ, 156,
739
+ 123
740
+ Astropy Collaboration, Robitaille, T. P., Tollerud, E. J., et al. 2013, A&A, 558,
741
+ A33
742
+ Baraffe, I., Chabrier, G., Barman, T. S., Allard, F., & Hauschildt, P. H. 2003,
743
+ A&A, 402, 701
744
+ Benz, A. O. & Guedel, M. 1994, A&A, 285, 621
745
+ Berger, E. 2006, ApJ, 648, 629
746
+ Best, W. M. J., Liu, M. C., Magnier, E. A., & Dupuy, T. J. 2021, AJ, 161, 42
747
+ Best, W. M. J., Magnier, E. A., Liu, M. C., et al. 2018, ApJS, 234, 1
748
+ Bhardwaj, A. & Gladstone, G. R. 2000, Reviews of Geophysics, 38, 295
749
+ Brandt, T. D., Dupuy, T. J., Li, Y., et al. 2021, AJ, 162, 186
750
+ Callingham, J. R., Vedantham, H. K., Shimwell, T. W., et al. 2021, Nature As-
751
+ tronomy, 5, 1233
752
+ Chabrier, G. & Baraffe, I. 2000, ARA&A, 38, 337
753
+ Chambers, K. C., Magnier, E. A., Metcalfe, N., et al. 2016, arXiv e-prints,
754
+ arXiv:1612.05560
755
+ Chin, J. C. Y., Wizinowich, P., Wetherell, E., et al. 2016, in Society of Photo-
756
+ Optical Instrumentation Engineers (SPIE) Conference Series, Vol. 9909,
757
+ Adaptive Optics Systems V, ed. E. Marchetti, L. M. Close, & J.-P. Véran,
758
+ 99090S
759
+ Christensen, U. R., Holzwarth, V., & Reiners, A. 2009, Nature, 457, 167
760
+ Condon, J. J. & Ransom, S. M. 2016, Essential Radio Astronomy
761
+ Cutri, R. M., Skrutskie, M. F., van Dyk, S., et al. 2003, 2MASS All Sky Catalog
762
+ of point sources.
763
+ Cutri, R. M., Wright, E. L., Conrow, T., et al. 2013, Explanatory Supplement
764
+ to the AllWISE Data Release Products, Explanatory Supplement to the All-
765
+ WISE Data Release Products, by R. M. Cutri et al.
766
+ Dupuy, T. J. & Liu, M. C. 2017, ApJS, 231, 15
767
+ Dupuy, T. J., Liu, M. C., & Leggett, S. K. 2015, ApJ, 803, 102
768
+ Eisenhardt, P. R. M., Marocco, F., Fowler, J. W., et al. 2020, ApJS, 247, 69
769
+ Fazio, G. G., Hora, J. L., Allen, L. E., et al. 2004, ApJS, 154, 10
770
+ Filippazzo, J. C., Rice, E. L., Faherty, J., et al. 2015, ApJ, 810, 158
771
+ Gibbs, A. & Fitzgerald, M. P. 2022, AJ, 164, 63
772
+ Goldreich, P. & Lynden-Bell, D. 1969, ApJ, 156, 59
773
+ Hallinan, G., Antonova, A., Doyle, J. G., et al. 2008, ApJ, 684, 644
774
+ Hallinan, G., Bourke, S., Lane, C., et al. 2007, ApJ, 663, L25
775
+ Hallinan, G., Littlefair, S. P., Cotter, G., et al. 2015, Nature, 523, 568
776
+ Hill, T. W., Dessler, A. J., & Michel, F. C. 1974, Geophys. Res. Lett., 1, 3
777
+ Kao, M. M., Hallinan, G., & Pineda, J. S. 2019, MNRAS, 487, 1994
778
+ Kao, M. M., Hallinan, G., Pineda, J. S., et al. 2016, ApJ, 818, 24
779
+ Article number, page 6 of 7
780
+
781
+ Vedantham et al.: Radio pulsation from new T-dwarf binary
782
+ Kao, M. M., Hallinan, G., Pineda, J. S., Stevenson, D., & Burgasser, A. 2018,
783
+ ApJS, 237, 25
784
+ Kao, M. M. & Sebastian Pineda, J. 2022, ApJ, 932, 21
785
+ Kirkpatrick, J. D., Cushing, M. C., Gelino, C. R., et al. 2011, ApJS, 197, 19
786
+ Kirkpatrick, J. D., Martin, E. C., Smart, R. L., et al. 2019, ApJS, 240, 19
787
+ Lacy, M., Baum, S. A., Chandler, C. J., et al. 2020, PASP, 132, 035001
788
+ Lamy, L., Cecconi, B., Zarka, P., et al. 2011, Journal of Geophysical Research
789
+ (Space Physics), 116, A04212
790
+ Leto, P., Trigilio, C., Krtiˇcka, J., et al. 2021, MNRAS, 507, 1979
791
+ Liu, M. C., Dupuy, T. J., & Ireland, M. J. 2008, ApJ, 689, 436
792
+ Marocco, F., Eisenhardt, P. R. M., Fowler, J. W., et al. 2021, ApJS, 253, 8
793
+ Melrose, D. B. & Dulk, G. A. 1982, ApJ, 259, 844
794
+ Neubauer, F. M. 1998, J. Geophys. Res., 103, 19843
795
+ Nichols, J. D., Burleigh, M. R., Casewell, S. L., et al. 2012, ApJ, 760, 59
796
+ Offringa, A. R., McKinley, B., Hurley-Walker, N., et al. 2014, MNRAS, 444,
797
+ 606
798
+ Phillips, M. W., Tremblin, P., Baraffe, I., et al. 2020, A&A, 637, A38
799
+ Pineda, J. S., Hallinan, G., & Kao, M. M. 2017, ApJ, 846, 75
800
+ Pineda, J. S., Hallinan, G., Kirkpatrick, J. D., et al. 2016, ApJ, 826, 73
801
+ Popinchalk, M., Faherty, J. K., Kiman, R., et al. 2021, ApJ, 916, 77
802
+ Reiners, A., Basri, G., & Christensen, U. R. 2009, ApJ, 697, 373
803
+ Reiners, A. & Christensen, U. R. 2010, A&A, 522, A13
804
+ Route, M. & Wolszczan, A. 2012, ApJ, 747, L22
805
+ Route, M. & Wolszczan, A. 2016a, ApJ, 821, L21
806
+ Route, M. & Wolszczan, A. 2016b, ApJ, 830, 85
807
+ Saumon, D. & Marley, M. S. 2008, ApJ, 689, 1327
808
+ Saur, J., Willmes, C., Fischer, C., et al. 2021, A&A, 655, A75
809
+ Service, M., Lu, J. R., Campbell, R., et al. 2016, PASP, 128, 095004
810
+ Shimwell, T. W., Hardcastle, M. J., Tasse, C., et al. 2022, A&A, 659, A1
811
+ Tokunaga, A. T., Simons, D. A., & Vacca, W. D. 2002, PASP, 114, 180
812
+ Turnpenney, S., Nichols, J. D., Wynn, G. A., & Casewell, S. L. 2017, MNRAS,
813
+ 470, 4274
814
+ van Dam, M. A., Bouchez, A. H., Le Mignant, D., et al. 2006, PASP, 118, 310
815
+ van Haarlem, M. P., Wise, M. W., Gunst, A. W., et al. 2013, A&A, 556, A2
816
+ van Weeren, R. J., Shimwell, T. W., Botteon, A., et al. 2021, A&A, 651, A115
817
+ VanderPlas, J. T. 2018, ApJS, 236, 16
818
+ Vedantham, H. K., Callingham, J. R., Shimwell, T. W., et al. 2020, ApJ, 903, L33
819
+ Williams, P. K. G. 2018, in Handbook of Exoplanets, ed. H. J. Deeg & J. A.
820
+ Belmonte, 171
821
+ Williams, P. K. G., Gizis, J. E., & Berger, E. 2017, ApJ, 834, 117
822
+ Wizinowich, P. L., Le Mignant, D., Bouchez, A. H., et al. 2006, PASP, 118, 297
823
+ Wright, E. L., Eisenhardt, P. R. M., Mainzer, A. K., et al. 2010, AJ, 140, 1868
824
+ Yelda, S., Lu, J. R., Ghez, A. M., et al. 2010, ApJ, 725, 331
825
+ Zarka, P. 1998, J. Geophys. Res., 103, 20159
826
+ Zarka, P. 2007, Planet. Space Sci., 55, 598
827
+ Zarka, P., Cecconi, B., & Kurth, W. S. 2004, Journal of Geophysical Research
828
+ (Space Physics), 109, A09S15
829
+ Acknowledgements. We thank Dr. Davy Kirkpatrick for making the Keck optical
830
+ spectrum of WISEP J101905.63+652954.2 available to us in machine-readable
831
+ format. HKV acknowledges funding from the Dutch Research Council (NWO)
832
+ for the project e-MAPS (project number Vi.Vidi.203.093) under the NWO tal-
833
+ ent scheme VIDI. JRC thanks NWO for support via the Talent Programme Veni
834
+ grant. LOFAR is the Low Frequency Array designed and constructed by AS-
835
+ TRON. It has observing, data processing, and data storage facilities in sev-
836
+ eral countries, that are owned by various parties (each with their own fund-
837
+ ing sources), and that are collectively operated by the ILT foundation under a
838
+ joint scientific policy. The ILT resources have benefitted from the following re-
839
+ cent major funding sources: CNRS-INSU, Observatoire de Paris and Université
840
+ d’Orléans, France; BMBF, MIWF-NRW, MPG, Germany; Science Foundation
841
+ Ireland (SFI), Department of Business, Enterprise and Innovation (DBEI), Ire-
842
+ land; NWO, The Netherlands; The Science and Technology Facilities Council,
843
+ UK. This research made use of the Dutch national e-infrastructure with the sup-
844
+ port of the SURF Cooperative (e-infra 180169) and the LOFAR e-infra group.
845
+ The Jülich LOFAR Long Term Archive and the German LOFAR network are
846
+ both coordinated and operated by the Jülich Supercomputing Centre (JSC), and
847
+ computing resources on the supercomputer JUWELS at JSC were provided by
848
+ the Gauss Centre for Supercomputing e.V. (grant CHTB00) through the John von
849
+ Neumann Institute for Computing (NIC). This research made use of the Uni-
850
+ versity of Hertfordshire high-performance computing facility and the LOFAR-
851
+ UK computing facility located at the University of Hertfordshire and supported
852
+ by STFC [ST/P000096/1], and of the Italian LOFAR IT computing infrastruc-
853
+ ture supported and operated by INAF, and by the Physics Department of Turin
854
+ University (under an agreement with Consorzio Interuniversitario per la Fisica
855
+ Spaziale) at the C3S Supercomputing Centre, Italy. Some of The data presented
856
+ herein were obtained at the W. M. Keck Observatory, which is operated as a sci-
857
+ entific partnership among the California Institute of Technology, the University
858
+ of California and the National Aeronautics and Space Administration. The Ob-
859
+ servatory was made possible by the generous financial support of the W. M. Keck
860
+ Foundation. The authors wish to recognise and acknowledge the very significant
861
+ cultural role and reverence that the summit of Maunakea has always had within
862
+ the indigenous Hawaiian community. We are most fortunate to have the opportu-
863
+ nity to conduct observations from this mountain. For the purpose of open access,
864
+ the author has applied a Creative Commons Attribution (CC BY) licence to any
865
+ Author Accepted Manuscript version arising from this submission.
866
+ Article number, page 7 of 7
867
+
8NAzT4oBgHgl3EQfE_qO/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8NAzT4oBgHgl3EQfSPtl/content/tmp_files/2301.01229v1.pdf.txt ADDED
@@ -0,0 +1,340 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01229v1 [hep-lat] 3 Jan 2023
2
+ Deconfinement in pure gauge SU(3) Yang-Mills theory: the
3
+ ghost propagator
4
+ Orlando Oliveira1,∗, Vítor Paiva1,∗∗, and Paulo Silva1,∗∗∗
5
+ 1CFisUC, Department of Physics, University of Coimbra, 3004-516 Coimbra, Portugal
6
+ Abstract. The ghost propagator in Landau gauge is studied at finite temperature
7
+ below and above Tc using lattice QCD simulations. For high temperatures, we
8
+ find that the ghost propagator is enhanced, compared to the confined phase.
9
+ The results suggest that the ghost propagator can be used to identify the phase
10
+ transition, similarly to the gluon propagator case.
11
+ 1 Introduction
12
+ The QCD phase diagram has been the subject of several recent theoretical studies, motivated
13
+ by heavy ion experimental programs. At zero density, one expects a phase transition where
14
+ quarks and gluons become deconfined at high temperatures. The Polyakov loop L is the order
15
+ parameter for this transition: for temperatures below the critical temperature Tc, L = 0 and
16
+ quarks and gluons are confined inside hadrons. For pure gauge theories Tc = 270 MeV; the
17
+ inclusion of dynamical quarks lowers this value to Tc ∼ 170 MeV.
18
+ In QCD, propagators of fundamental fields encode information about non-perturbative
19
+ phenomena, such as confinement, deconfinement and chiral symmetry breaking. Following
20
+ our previous studies of the Landau gauge gluon [1, 2] and quark [3, 4] propagators at finite
21
+ temperature, here we study the behaviour of the ghost propagator in Landau gauge at finite
22
+ temperature.
23
+ 2 Ghost Propagator
24
+ 2.1 Setup
25
+ On the lattice, the computation of the ghost propagator relies on the inversion of a discretized
26
+ version of the Faddeev-Popov matrix. For details see, for example, [5].
27
+ In order to evaluate the behaviour of the ghost propagator below and above the critical
28
+ temperature, a number of lattice ensembles were considered, covering a range of temperatures
29
+ from 121 MeV up to 486 MeV, as summarized in table 1, where Ls is the number of lattice
30
+ sites in any spatial direction, Lt is the number of lattice sites in the temporal direction and a
31
+ is the lattice spacing. The temperature is defined as T = 1/(aLt). Following previous works,
32
+ here we only consider the first Matsubara frequency.
33
+ ∗e-mail: [email protected]
34
+ ∗∗e-mail: [email protected]
35
+ ∗∗∗e-mail: [email protected]
36
+
37
+ Table 1. Lattice setup.
38
+ Temp. (MeV)
39
+ β
40
+ Ls
41
+ Lt
42
+ a [fm]
43
+ 1/a (GeV)
44
+ 121
45
+ 6.0000
46
+ 64
47
+ 16
48
+ 0.1016
49
+ 1.943
50
+ 194
51
+ 6.0000
52
+ 64
53
+ 10
54
+ 0.1016
55
+ 1.943
56
+ 243
57
+ 6.0000
58
+ 64
59
+ 8
60
+ 0.1016
61
+ 1.943
62
+ 260
63
+ 6.0347
64
+ 68
65
+ 8
66
+ 0.09502
67
+ 2.0767
68
+ 265
69
+ 5.8876
70
+ 52
71
+ 6
72
+ 0.1243
73
+ 1.5881
74
+ 275
75
+ 6.0684
76
+ 72
77
+ 8
78
+ 0.08974
79
+ 2.1989
80
+ 324
81
+ 6.0000
82
+ 64
83
+ 6
84
+ 0.1016
85
+ 1.943
86
+ 366
87
+ 6.0684
88
+ 72
89
+ 6
90
+ 0.08974
91
+ 2.1989
92
+ 486
93
+ 6.0000
94
+ 64
95
+ 4
96
+ 0.1016
97
+ 1.943
98
+ For each of the temperatures studied, we used a lattice ensemble of 100 configurations.
99
+ Since an “all-to-all” propagatorwould be computationally extremely costly, two point sources
100
+ are considered for each configuration, one at the origin of the lattice, (0, 0, 0, 0), and one at
101
+ the lattice’s spatial midpoint, (Ls/2, Ls/2, Ls/2, 0). A simple average over the two is taken in
102
+ order to mimic an “all-to-all” propagator with “point-to-all” propagators.
103
+ In order to account for lattice artefacts for large momenta, the (physical) momenta above
104
+ 1 GeV were subject to a cylindrical cut [6] where only momenta whose distance, d, from the
105
+ lattice’s diagonal was such that d a < 4 (2π/Ls) were considered in the final data – that is,
106
+ momenta less than four spatial units away from the lattice’s diagonal, (p, p, p, 0).
107
+ The propagators pertaining to different temperatures were renormalized at µ = 4 GeV, by
108
+ imposing G(µ2) = 1/µ2. In order to do so, a fit was performed to the propagators, with the
109
+ functional form
110
+ G(p2) =
111
+ b + cp2
112
+ p4 + dp2 + e
113
+ ,
114
+ (1)
115
+ where b, c, d and e are adjustable parameters.
116
+ 2.2 Temperature Dependence
117
+ The effect of temperature in the ghost propagator for all momentum range is exhibited in
118
+ figures 1 and 2. Note that our results are similar to previous results using quenched ensembles
119
+ with smaller lattice volumes [7].
120
+ The distinction between the behaviour below and above the critical temperature is only
121
+ made clear at lower values of the momenta, as was also observed for the gluon propagator.
122
+ Figure 2 zooms in on the infrared (IR) region of the ghost propagator, where the enhancement
123
+ of the propagator above Tc, relative to the confined case, is visible. Below the critical temper-
124
+ ature, the propagators for the different temperatures are compatible within statistical errors.
125
+ As Figure 3 further illustrates for the four lowest accessible momenta, the enhancement effect
126
+ rapidly decreases as the momentum increases and the two regimes become indistinguishable
127
+ for high momenta.
128
+ 2.3 Z3 Dependence
129
+ On the lattice, gauge configurations related to each other through a center (or Z3) transforma-
130
+ tion are equivalent. The Wilson gauge action is invariant under a center transformation, which
131
+ consists in the multiplication of all time links in a constant temporal hyperplane, x4 = const,
132
+
133
+ 0
134
+ 1
135
+ 2
136
+ 3
137
+ 4
138
+ 5
139
+ 6
140
+ 7
141
+ 8
142
+ p(GeV)
143
+ 0,01
144
+ 0,1
145
+ 1
146
+ 10
147
+ 100
148
+ G(p
149
+ 2)
150
+ T = 121 MeV
151
+ T = 194 MeV
152
+ T = 243 MeV
153
+ T = 260 MeV
154
+ T = 265 MeV
155
+ T = 275 MeV
156
+ T = 324 MeV
157
+ T = 366 MeV
158
+ T = 486 MeV
159
+ Ghost Propagator at finite temperature
160
+ Renormalized at 4 GeV
161
+ Figure 1. Renormalized ghost propagator at finite temperature.
162
+ 0
163
+ 0,2
164
+ 0,4
165
+ 0,6
166
+ 0,8
167
+ 1
168
+ p(GeV)
169
+ 0
170
+ 10
171
+ 20
172
+ 30
173
+ 40
174
+ 50
175
+ 60
176
+ 70
177
+ 80
178
+ 90
179
+ G(p
180
+ 2)
181
+ T = 121 MeV
182
+ T = 194 MeV
183
+ T = 243 MeV
184
+ T = 260 MeV
185
+ T = 265 MeV
186
+ T = 275 MeV
187
+ T = 324 MeV
188
+ T = 366 MeV
189
+ T = 486 MeV
190
+ Ghost Propagator at finite temperature
191
+ Renormalized at 4 GeV
192
+ Figure 2. Renormalized ghost propagator at finite temperature in the IR region.
193
+ by an element z of the center (or Z3) group,
194
+ Z3 = {e−i 2π
195
+ 3 , 1, ei 2π
196
+ 3 } .
197
+ (2)
198
+ The symmetry holds for closed loops like the Wilson loop. The Polyakov loop, L(⃗x), however,
199
+ is not invariant under such a transformation, L(⃗x) → zL(⃗x). It thus constitutes an order
200
+ parameter for the deconfinement phase transition. Below Tc, center symmetry holds and
201
+ ⟨L⟩ = 0; above Tc, center symmetry is spontaneously broken, the Z3 sectors are not equally
202
+ populated and ⟨L⟩ � 0.
203
+ Previous works have shown that the gluon [2] and quark propagators [4] are sensitive
204
+ to the Z3 sector of the gauge configurations. Our preliminary results suggest that the ghost
205
+ propagator is also sensitive to the Z3 sector above Tc. Figure 4 shows the IR region of two
206
+ lattice simulations with Ls = 72 and Lt = 8 with β = 6.058 (left-hand panel) and β = 6.066
207
+ (right-hand panel). The results show that the ghost propagator behaves differently below and
208
+
209
+ 100
210
+ 200
211
+ 300
212
+ 400
213
+ 500
214
+ T (MeV)
215
+ 75
216
+ 80
217
+ 85
218
+ 90
219
+ G(p
220
+ 2)
221
+ Ghost Propagator as a function of temperature
222
+ p = 191 MeV
223
+ 100
224
+ 200
225
+ 300
226
+ 400
227
+ 500
228
+ T (MeV)
229
+ 33
230
+ 36
231
+ 39
232
+ 42
233
+ G(p
234
+ 2)
235
+ Ghost Propagator as a function of temperature
236
+ p = 270 MeV
237
+ 100
238
+ 200
239
+ 300
240
+ 400
241
+ 500
242
+ T (MeV)
243
+ 20
244
+ 22
245
+ 24
246
+ G(p
247
+ 2)
248
+ Ghost Propagator as a function of temperature
249
+ p = 330 MeV
250
+ 100
251
+ 200
252
+ 300
253
+ 400
254
+ 500
255
+ T (MeV)
256
+ 14
257
+ 15
258
+ 16
259
+ 17
260
+ G(p
261
+ 2)
262
+ Ghost Propagator as a function of temperature
263
+ p = 381 MeV
264
+ Figure 3. Ghost propagator as a function of temperature for p = 191 MeV (top left panel), p = 270
265
+ MeV (top right panel), p = 330 MeV (left bottom panel) and p = 381 MeV (right bottom panel). The
266
+ red vertical line indicates the critical temperature Tc.
267
+ 0
268
+ 0,2
269
+ 0,4
270
+ 0,6
271
+ 0,8
272
+ 1
273
+ p (GeV)
274
+ 0
275
+ 20
276
+ 40
277
+ 60
278
+ 80
279
+ G(p
280
+ 2)
281
+ sector -1
282
+ sector 0
283
+ sector 1
284
+ 0
285
+ 0,2
286
+ 0,4
287
+ 0,6
288
+ 0,8
289
+ 1
290
+ p (GeV)
291
+ 0
292
+ 20
293
+ 40
294
+ 60
295
+ 80
296
+ G(p
297
+ 2)
298
+ sector -1
299
+ sector 0
300
+ sector 1
301
+ Figure 4. Ghost propagator’s sector dependence below Tc (left-hand panel at T = 270 MeV) and above
302
+ Tc (right-hand panel at T = 274 MeV).
303
+ above Tc, with a suppression of the ±1 sectors relative to the 0 sector for the deconfined phase.
304
+ As we found previously for the gluon propagator [2], the ±1 sectors are indistinguishable
305
+ above Tc.
306
+
307
+ 3 Conclusions and outlook
308
+ In this paper we study the Landau gauge ghost propagator at finite temperature using lattice
309
+ simulations. We found an enhancement of the ghost form factor above the critical tempera-
310
+ ture Tc, already found in previous SU(3) studies on smaller volumes [7]. Note that early
311
+ SU(2) studies concluded in favour of a nearly independent ghost propagator with the temper-
312
+ ature [8]. We also show preliminary results for the Z3 dependence of the ghost propagator.
313
+ Although the propagators in the various sectors are indistinguishable below Tc, we found a
314
+ suppression, above Tc, of the ±1 sectors in comparison with the 0 sector. However, in the
315
+ deconfined phase the ±1 sectors are still compatible within errors.
316
+ We are currently extending the study of the Z3 dependence for other temperatures. In the
317
+ near future we also plan to study the QCD propagators at finite temperature using dynamical
318
+ configurations.
319
+ Acknowledgements
320
+ This work was partly supported by the FCT – Fundação para a Ciência e a Tecnolo-
321
+ gia, I.P., under Projects Nos.
322
+ UIDB/04564/2020, UIDP/04564/2020 and CERN/FIS-
323
+ COM/0029/2017. P. J. S. acknowledges financial support from FCT (Portugal) under Con-
324
+ tract No. CEECIND/00488/2017. The authors acknowledge the Laboratory for Advanced
325
+ Computing at the University of Coimbra (http://www.uc.pt/lca) for providing access to the
326
+ HPC resource Navigator.
327
+ References
328
+ [1] P.J. Silva, O. Oliveira, P. Bicudo, N. Cardoso, Phys. Rev. D 89, 074503 (2014),
329
+ 1310.5629
330
+ [2] P.J. Silva, O. Oliveira, Phys. Rev. D 93, 114509 (2016), 1601.01594
331
+ [3] O. Oliveira, P.J. Silva, Eur. Phys. J. C 79, 793 (2019), 1903.00263
332
+ [4] P.J. Silva, O. Oliveira, PoS LATTICE2019, 047 (2020), 1912.13061
333
+ [5] A. Cucchieri, D. Dudal, T. Mendes, O. Oliveira, M. Roelfs, P.J. Silva, PoS LAT-
334
+ TICE2018, 252 (2018), 1811.11521
335
+ [6] D.B. Leinweber, J.I. Skullerud, A.G. Williams, C. Parrinello (UKQCD), Phys. Rev. D
336
+ 60, 094507 (1999), [Erratum: Phys.Rev.D 61, 079901 (2000)], hep-lat/9811027
337
+ [7] R. Aouane, V.G. Bornyakov, E.M. Ilgenfritz, V.K. Mitrjushkin, M. Müller-Preussker,
338
+ A. Sternbeck, Phys. Rev. D 85, 034501 (2012)
339
+ [8] A. Cucchieri, A. Maas, T. Mendes, Phys. Rev. D 75, 076003 (2007), hep-lat/0702022
340
+
8NAzT4oBgHgl3EQfSPtl/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,226 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf,len=225
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
3
+ page_content='01229v1 [hep-lat] 3 Jan 2023 Deconfinement in pure gauge SU(3) Yang-Mills theory: the ghost propagator Orlando Oliveira1,∗, Vítor Paiva1,∗∗, and Paulo Silva1,∗∗∗ 1CFisUC, Department of Physics, University of Coimbra, 3004-516 Coimbra, Portugal Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
4
+ page_content=' The ghost propagator in Landau gauge is studied at finite temperature below and above Tc using lattice QCD simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
5
+ page_content=' For high temperatures, we find that the ghost propagator is enhanced, compared to the confined phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
6
+ page_content=' The results suggest that the ghost propagator can be used to identify the phase transition, similarly to the gluon propagator case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
7
+ page_content=' 1 Introduction The QCD phase diagram has been the subject of several recent theoretical studies, motivated by heavy ion experimental programs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
8
+ page_content=' At zero density, one expects a phase transition where quarks and gluons become deconfined at high temperatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
9
+ page_content=' The Polyakov loop L is the order parameter for this transition: for temperatures below the critical temperature Tc, L = 0 and quarks and gluons are confined inside hadrons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
10
+ page_content=' For pure gauge theories Tc = 270 MeV;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
11
+ page_content=' the inclusion of dynamical quarks lowers this value to Tc ∼ 170 MeV.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
12
+ page_content=' In QCD, propagators of fundamental fields encode information about non-perturbative phenomena, such as confinement, deconfinement and chiral symmetry breaking.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
13
+ page_content=' Following our previous studies of the Landau gauge gluon [1, 2] and quark [3, 4] propagators at finite temperature, here we study the behaviour of the ghost propagator in Landau gauge at finite temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
14
+ page_content=' 2 Ghost Propagator 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
15
+ page_content='1 Setup On the lattice, the computation of the ghost propagator relies on the inversion of a discretized version of the Faddeev-Popov matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
16
+ page_content=' For details see, for example, [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
17
+ page_content=' In order to evaluate the behaviour of the ghost propagator below and above the critical temperature, a number of lattice ensembles were considered, covering a range of temperatures from 121 MeV up to 486 MeV, as summarized in table 1, where Ls is the number of lattice sites in any spatial direction, Lt is the number of lattice sites in the temporal direction and a is the lattice spacing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
18
+ page_content=' The temperature is defined as T = 1/(aLt).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
19
+ page_content=' Following previous works, here we only consider the first Matsubara frequency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
20
+ page_content=' ∗e-mail: orlando@uc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
21
+ page_content='pt ∗∗e-mail: vpaiva462@gmail.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
22
+ page_content='com ∗∗∗e-mail: psilva@uc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
23
+ page_content='pt Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
24
+ page_content=' Lattice setup.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
25
+ page_content=' Temp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
26
+ page_content=' (MeV) β Ls Lt a [fm] 1/a (GeV) 121 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
27
+ page_content='0000 64 16 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
28
+ page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
29
+ page_content='943 194 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
30
+ page_content='0000 64 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
31
+ page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
32
+ page_content='943 243 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
33
+ page_content='0000 64 8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
34
+ page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
35
+ page_content='943 260 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
36
+ page_content='0347 68 8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
37
+ page_content='09502 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
38
+ page_content='0767 265 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
39
+ page_content='8876 52 6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
40
+ page_content='1243 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
41
+ page_content='5881 275 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
42
+ page_content='0684 72 8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
43
+ page_content='08974 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
44
+ page_content='1989 324 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
45
+ page_content='0000 64 6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
46
+ page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
47
+ page_content='943 366 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
48
+ page_content='0684 72 6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
49
+ page_content='08974 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
50
+ page_content='1989 486 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
51
+ page_content='0000 64 4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
52
+ page_content='1016 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
53
+ page_content='943 For each of the temperatures studied, we used a lattice ensemble of 100 configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
54
+ page_content=' Since an “all-to-all” propagatorwould be computationally extremely costly, two point sources are considered for each configuration, one at the origin of the lattice, (0, 0, 0, 0), and one at the lattice’s spatial midpoint, (Ls/2, Ls/2, Ls/2, 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
55
+ page_content=' A simple average over the two is taken in order to mimic an “all-to-all” propagator with “point-to-all” propagators.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
56
+ page_content=' In order to account for lattice artefacts for large momenta, the (physical) momenta above 1 GeV were subject to a cylindrical cut [6] where only momenta whose distance, d, from the lattice’s diagonal was such that d a < 4 (2π/Ls) were considered in the final data – that is, momenta less than four spatial units away from the lattice’s diagonal, (p, p, p, 0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
57
+ page_content=' The propagators pertaining to different temperatures were renormalized at µ = 4 GeV, by imposing G(µ2) = 1/µ2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
58
+ page_content=' In order to do so, a fit was performed to the propagators, with the functional form G(p2) = b + cp2 p4 + dp2 + e , (1) where b, c, d and e are adjustable parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
59
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
60
+ page_content='2 Temperature Dependence The effect of temperature in the ghost propagator for all momentum range is exhibited in figures 1 and 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
61
+ page_content=' Note that our results are similar to previous results using quenched ensembles with smaller lattice volumes [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
62
+ page_content=' The distinction between the behaviour below and above the critical temperature is only made clear at lower values of the momenta, as was also observed for the gluon propagator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
63
+ page_content=' Figure 2 zooms in on the infrared (IR) region of the ghost propagator, where the enhancement of the propagator above Tc, relative to the confined case, is visible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
64
+ page_content=' Below the critical temper- ature, the propagators for the different temperatures are compatible within statistical errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
65
+ page_content=' As Figure 3 further illustrates for the four lowest accessible momenta, the enhancement effect rapidly decreases as the momentum increases and the two regimes become indistinguishable for high momenta.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
66
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
67
+ page_content='3 Z3 Dependence On the lattice, gauge configurations related to each other through a center (or Z3) transforma- tion are equivalent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
68
+ page_content=' The Wilson gauge action is invariant under a center transformation, which consists in the multiplication of all time links in a constant temporal hyperplane, x4 = const, 0 1 2 3 4 5 6 7 8 p(GeV) 0,01 0,1 1 10 100 G(p 2) T = 121 MeV T = 194 MeV T = 243 MeV T = 260 MeV T = 265 MeV T = 275 MeV T = 324 MeV T = 366 MeV T = 486 MeV Ghost Propagator at finite temperature Renormalized at 4 GeV Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
69
+ page_content=' Renormalized ghost propagator at finite temperature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
70
+ page_content=' 0 0,2 0,4 0,6 0,8 1 p(GeV) 0 10 20 30 40 50 60 70 80 90 G(p 2) T = 121 MeV T = 194 MeV T = 243 MeV T = 260 MeV T = 265 MeV T = 275 MeV T = 324 MeV T = 366 MeV T = 486 MeV Ghost Propagator at finite temperature Renormalized at 4 GeV Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
71
+ page_content=' Renormalized ghost propagator at finite temperature in the IR region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
72
+ page_content=' by an element z of the center (or Z3) group, Z3 = {e−i 2π 3 , 1, ei 2π 3 } .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
73
+ page_content=' (2) The symmetry holds for closed loops like the Wilson loop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
74
+ page_content=' The Polyakov loop, L(⃗x), however, is not invariant under such a transformation, L(⃗x) → zL(⃗x).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
75
+ page_content=' It thus constitutes an order parameter for the deconfinement phase transition.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
76
+ page_content=' Below Tc, center symmetry holds and ⟨L⟩ = 0;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
77
+ page_content=' above Tc, center symmetry is spontaneously broken, the Z3 sectors are not equally populated and ⟨L⟩ � 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
78
+ page_content=' Previous works have shown that the gluon [2] and quark propagators [4] are sensitive to the Z3 sector of the gauge configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
79
+ page_content=' Our preliminary results suggest that the ghost propagator is also sensitive to the Z3 sector above Tc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
80
+ page_content=' Figure 4 shows the IR region of two lattice simulations with Ls = 72 and Lt = 8 with β = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
81
+ page_content='058 (left-hand panel) and β = 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
82
+ page_content='066 (right-hand panel).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
83
+ page_content=' The results show that the ghost propagator behaves differently below and ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
84
+ page_content='100 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
85
+ page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
86
+ page_content='300 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
87
+ page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
88
+ page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
89
+ page_content='T (MeV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
90
+ page_content='75 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
91
+ page_content='80 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
92
+ page_content='85 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
93
+ page_content='90 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
94
+ page_content='G(p ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
95
+ page_content='2) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
96
+ page_content='Ghost Propagator as a function of temperature ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
97
+ page_content='p = 191 MeV ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
98
+ page_content='100 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
99
+ page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
100
+ page_content='300 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
101
+ page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
102
+ page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
103
+ page_content='T (MeV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
104
+ page_content='33 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
105
+ page_content='36 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
106
+ page_content='39 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
107
+ page_content='42 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
108
+ page_content='G(p ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
109
+ page_content='2) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
110
+ page_content='Ghost Propagator as a function of temperature ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
111
+ page_content='p = 270 MeV ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
112
+ page_content='100 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
113
+ page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
114
+ page_content='300 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
115
+ page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
116
+ page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
117
+ page_content='T (MeV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
118
+ page_content='20 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
119
+ page_content='22 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
120
+ page_content='24 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
121
+ page_content='G(p ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
122
+ page_content='2) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
123
+ page_content='Ghost Propagator as a function of temperature ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
124
+ page_content='p = 330 MeV ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
125
+ page_content='100 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
126
+ page_content='200 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
127
+ page_content='300 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
128
+ page_content='400 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
129
+ page_content='500 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
130
+ page_content='T (MeV) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
131
+ page_content='14 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
132
+ page_content='15 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
133
+ page_content='16 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
134
+ page_content='17 ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
135
+ page_content='G(p ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
136
+ page_content='2) ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
137
+ page_content='Ghost Propagator as a function of temperature ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
138
+ page_content='p = 381 MeV ' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
139
+ page_content='Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
140
+ page_content=' Ghost propagator as a function of temperature for p = 191 MeV (top left panel), p = 270 MeV (top right panel), p = 330 MeV (left bottom panel) and p = 381 MeV (right bottom panel).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
141
+ page_content=' The red vertical line indicates the critical temperature Tc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
142
+ page_content=' 0 0,2 0,4 0,6 0,8 1 p (GeV) 0 20 40 60 80 G(p 2) sector -1 sector 0 sector 1 0 0,2 0,4 0,6 0,8 1 p (GeV) 0 20 40 60 80 G(p 2) sector -1 sector 0 sector 1 Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
143
+ page_content=' Ghost propagator’s sector dependence below Tc (left-hand panel at T = 270 MeV) and above Tc (right-hand panel at T = 274 MeV).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
144
+ page_content=' above Tc, with a suppression of the ±1 sectors relative to the 0 sector for the deconfined phase.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
145
+ page_content=' As we found previously for the gluon propagator [2], the ±1 sectors are indistinguishable above Tc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
146
+ page_content=' 3 Conclusions and outlook In this paper we study the Landau gauge ghost propagator at finite temperature using lattice simulations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
147
+ page_content=' We found an enhancement of the ghost form factor above the critical tempera- ture Tc, already found in previous SU(3) studies on smaller volumes [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
148
+ page_content=' Note that early SU(2) studies concluded in favour of a nearly independent ghost propagator with the temper- ature [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
149
+ page_content=' We also show preliminary results for the Z3 dependence of the ghost propagator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
150
+ page_content=' Although the propagators in the various sectors are indistinguishable below Tc, we found a suppression, above Tc, of the ±1 sectors in comparison with the 0 sector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
151
+ page_content=' However, in the deconfined phase the ±1 sectors are still compatible within errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
152
+ page_content=' We are currently extending the study of the Z3 dependence for other temperatures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
153
+ page_content=' In the near future we also plan to study the QCD propagators at finite temperature using dynamical configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
154
+ page_content=' Acknowledgements This work was partly supported by the FCT – Fundação para a Ciência e a Tecnolo- gia, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
155
+ page_content='P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
156
+ page_content=', under Projects Nos.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
157
+ page_content=' UIDB/04564/2020, UIDP/04564/2020 and CERN/FIS- COM/0029/2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
158
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
159
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
160
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
161
+ page_content=' acknowledges financial support from FCT (Portugal) under Con- tract No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
162
+ page_content=' CEECIND/00488/2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
163
+ page_content=' The authors acknowledge the Laboratory for Advanced Computing at the University of Coimbra (http://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
164
+ page_content='uc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
165
+ page_content='pt/lca) for providing access to the HPC resource Navigator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
166
+ page_content=' References [1] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
167
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
168
+ page_content=' Silva, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
169
+ page_content=' Oliveira, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
170
+ page_content=' Bicudo, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
171
+ page_content=' Cardoso, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
172
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
173
+ page_content=' D 89, 074503 (2014), 1310.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
174
+ page_content='5629 [2] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
175
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
176
+ page_content=' Silva, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
177
+ page_content=' Oliveira, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
178
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
179
+ page_content=' D 93, 114509 (2016), 1601.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
180
+ page_content='01594 [3] O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
181
+ page_content=' Oliveira, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
182
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
183
+ page_content=' Silva, Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
184
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
185
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
186
+ page_content=' C 79, 793 (2019), 1903.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
187
+ page_content='00263 [4] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
188
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
189
+ page_content=' Silva, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
190
+ page_content=' Oliveira, PoS LATTICE2019, 047 (2020), 1912.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
191
+ page_content='13061 [5] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
192
+ page_content=' Cucchieri, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
193
+ page_content=' Dudal, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
194
+ page_content=' Mendes, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
195
+ page_content=' Oliveira, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
196
+ page_content=' Roelfs, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
197
+ page_content='J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
198
+ page_content=' Silva, PoS LAT- TICE2018, 252 (2018), 1811.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
199
+ page_content='11521 [6] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
200
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
201
+ page_content=' Leinweber, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
202
+ page_content='I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
203
+ page_content=' Skullerud, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
204
+ page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
205
+ page_content=' Williams, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
206
+ page_content=' Parrinello (UKQCD), Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
207
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
208
+ page_content=' D 60, 094507 (1999), [Erratum: Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
209
+ page_content='Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
210
+ page_content='D 61, 079901 (2000)], hep-lat/9811027 [7] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
211
+ page_content=' Aouane, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
212
+ page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
213
+ page_content=' Bornyakov, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
214
+ page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
215
+ page_content=' Ilgenfritz, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
216
+ page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
217
+ page_content=' Mitrjushkin, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
218
+ page_content=' Müller-Preussker, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
219
+ page_content=' Sternbeck, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
220
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
221
+ page_content=' D 85, 034501 (2012) [8] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
222
+ page_content=' Cucchieri, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
223
+ page_content=' Maas, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
224
+ page_content=' Mendes, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
225
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
226
+ page_content=' D 75, 076003 (2007), hep-lat/0702022' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8NAzT4oBgHgl3EQfSPtl/content/2301.01229v1.pdf'}
8dE5T4oBgHgl3EQfQg7H/content/tmp_files/2301.05514v1.pdf.txt ADDED
@@ -0,0 +1,383 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Primal-Dual Cops and Robber
2
+ Minh Tuan Ha �
3
+ Karlsruhe Institute of Technology, Germany
4
+ Paul Jungeblut �
5
+ Karlsruhe Institute of Technology, Germany
6
+ Torsten Ueckerdt �
7
+ Karlsruhe Institute of Technology, Germany
8
+ Abstract
9
+ Cops and Robber is a family of two-player games played on graphs in which one player controls a
10
+ number of cops and the other player controls a robber. In alternating turns, each player moves (all)
11
+ his/her figures. The cops try to capture the robber while the latter tries to flee indefinitely. In this
12
+ paper we consider a variant of the game played on a planar graph where the robber moves between
13
+ adjacent vertices while the cops move between adjacent faces. The cops capture the robber if they
14
+ occupy all incident faces. We prove that a constant number of cops suffices to capture the robber on
15
+ any planar graph of maximum degree ∆ if and only if ∆ ≤ 4.
16
+ 2012 ACM Subject Classification Mathematics of computing → Discrete mathematics → Combi-
17
+ natorics → Combinatoric problems
18
+ Keywords and phrases Cops and robber, planar graph, dual graph
19
+ 1
20
+ Introduction
21
+ Cops and Robber is probably the most classical combinatorial pursuit-evasion game on graphs.
22
+ The robber models an intruder in a network that the cops try to capture. Two players play
23
+ with complete information on a fixed finite graph G = (V, E). The cop player controls a set
24
+ of k cops, each occupying a vertex of G (possibly several cops on the same vertex), while
25
+ the robber player controls a single robber that also occupies a vertex of G. The players
26
+ take alternating turns, where the cop player in his turn can decide for each cop individually
27
+ whether to stay at its position or move the cop along an edge of G onto an adjacent vertex.
28
+ Similarly, the robber player on her turn can leave the robber at its position or move it along
29
+ an edge of G. The cop player starts by choosing starting positions for his k cops and wins
30
+ the game as soon as at least one cop occupies the same vertex as the robber, i.e., when
31
+ the robber is captured. The robber player, seeing the cops positions, chooses the starting
32
+ position for her robber and wins if she can avoid capture indefinitely. The least integer k for
33
+ which, assuming perfect play on either side, k cops can always capture the robber, is called
34
+ the cop number of G, usually denoted by c(G).
35
+ In this paper, we introduce Primal-Dual Cops and Robber which is played on a plane
36
+ graph G, i.e., with a fixed plane embedding. Here, the cops occupy the faces of G and can
37
+ move between adjacent faces (i.e., faces that share an edge), while the robber still moves
38
+ along edges between adjacent vertices of G. In this game, the robber is captured if every
39
+ face incident to the robber’s vertex is occupied by at least one cop. Analogously, we call the
40
+ least integer k for which k cops can always capture the robber in the Primal-Dual Cops and
41
+ Robber game the primal-dual cop number of G and denote it by c∗(G).
42
+ An obvious lower bound for c∗(G) is the maximum number of faces incident to any vertex
43
+ in G: The robber can choose such a vertex as its start position and just stay there indefinitely
44
+ (note that there is no zugzwang, i.e., no obligation to move during ones turn). In particular,
45
+ if G has maximum degree ∆(G) and there exists a vertex v with deg(v) = ∆(G), which is
46
+ not a cut-vertex, then c∗(G) ≥ ∆(G). E.g., c∗(K2,n) = ∆(K2,n) = n for any n ≥ 2.
47
+ arXiv:2301.05514v1 [math.CO] 13 Jan 2023
48
+
49
+ 2
50
+ Primal-Dual Cops and Robber
51
+ Our contribution.
52
+ We investigate, whether the primal-dual cop number c∗(G) is bounded
53
+ in terms of ∆(G) for all plane graphs G. The answer is ‘Yes’ if ∆(G) ≤ 4 and ‘No’ otherwise.
54
+ ▶ Theorem 1. Each of the following holds.
55
+ 1. For every plane graph G with ∆(G) ≤ 3 we have c∗(G) ≤ 3.
56
+ 2. For every plane graph G with ∆(G) ≤ 4 we have c∗(G) ≤ 12.
57
+ 3. For some n-vertex plane graphs G with ∆(G) = 5 we have c∗(G) = Ω
58
+ ��
59
+ log(n)
60
+
61
+ .
62
+ Related work.
63
+ Let us just briefly mention that Cops and Robber was introduced by
64
+ Nowakowski and Winkler [10] and Quillot [12] for one cop and Aigner and Fromme [1] for k
65
+ cops 40 years ago. Since then numerous results and variants were presented, see e.g., [2, 3].
66
+ Perhaps most similar to our new variant are the recent surrounding variant of Burgess et
67
+ al. [5] with vertex-cops and the containment variant of Cryster et al. [6, 11] with edge-cops.
68
+ In these variants the robber is captured if every adjacent vertex, respectively every incident
69
+ edge, is occupied by a cop. The smallest number of cops that always suffices for any planar
70
+ graph G is 3 in the classical variant [1], 7 in the surrounding variant [4], 7∆(G) in the
71
+ containment variant [6] and 3 when both, cops and robber, move on edges [7].
72
+ 2
73
+ Cops win always if the maximum degree is at most four
74
+ We start with an observation that simplifies the proofs of items 1 and 2 in Theorem 1.
75
+ ▶ Observation 2. Let the robber be on a vertex u with a neighbor v of degree 1. Then the
76
+ robber is never required to move to v to evade the cops.
77
+ This is true because the set of faces required to capture the robber at v is a subset of the
78
+ faces required to capture him at u. Further, his only possible moves at v are either staying
79
+ there or moving back to u. As there is no zugzwang, he could just stay at u all along.
80
+ In both of the following proofs we assume that the graph contains only degree-3-vertices
81
+ (respectively degree-4-vertices) and degree-1-vertices. This can always be achieved by adding
82
+ leaves to vertices not yet having the correct degree.
83
+ Proof of item 1 in Theorem 1. We give a winning strategy for three cops c1, c2, c3 in a
84
+ planar graph G with ∆(G) ≤ 3. First the cops choose arbitrary faces to start on. Then the
85
+ robber chooses its start vertex u, which we assume to be of degree 3 by Observation 2 (it
86
+ is trivial to capture him if all vertices have degree 1). Let ∠u
87
+ 1, ∠u
88
+ 2, ∠u
89
+ 3 be the three angles
90
+ incident to u. We denote the face containing an angle ∠ by f(∠) and define for each cop ci a
91
+ target face fi, i = 1, 2, 3. Initially we set fi = f(∠u
92
+ i ). The goal of each cop is to reach his
93
+ target face, thereby capturing the robber when all three cops arrive. If the robber moves,
94
+ each cop updates his target face. Our strategy guarantees that the total distance of all three
95
+ cops to their targets faces decreases over time, so it reaches zero after finitely many turns.
96
+ Clearly, in every game the robber has to move at some point to avoid being captured.
97
+ Assume that the robber moves from vertex u to vertex v (both of degree 3 by Observation 2).
98
+ Without loss of generality the angles around u and v are labeled as in Figure 1 with fi = f(∠u
99
+ i )
100
+ being the current target face of cop ci, i = 1, 2, 3.
101
+ First assume that c3 (or symmetrically c2) has not reached his target face yet. In this
102
+ case we assign the new target faces f1 = f(∠v
103
+ 1), f2 = f(∠v
104
+ 2) and f3 = f(∠v
105
+ 3). Note that
106
+ for i = 1, 2 faces f(∠u
107
+ i ) and f(∠v
108
+ i ) are adjacent, so cop ci can keep his distance to his target
109
+ face unchanged (or even decrease it) during his next turn. Further note that f(∠u
110
+ 3) = f(∠v
111
+ 3),
112
+
113
+ M. T. Ha, P. Jungeblut and T. Ueckerdt
114
+ 3
115
+ ̸
116
+ u
117
+ 1
118
+ ̸
119
+ u
120
+ 2
121
+ ̸
122
+ u
123
+ 3
124
+ ̸
125
+ v
126
+ 1
127
+ ̸
128
+ v
129
+ 2
130
+ ̸
131
+ v
132
+ 3
133
+ u
134
+ v
135
+ w
136
+ Figure 1 Labeling of the angles for a robber move from u to v (and possibly further to w).
137
+ v
138
+ u
139
+ ̸
140
+ u
141
+ 1
142
+ ̸
143
+ u
144
+ 2
145
+ ̸
146
+ u
147
+ 3
148
+ ̸
149
+ v
150
+ 1
151
+ ̸
152
+ v
153
+ 2
154
+ ̸
155
+ v
156
+ 3
157
+ ̸
158
+ u
159
+ 4
160
+ ̸
161
+ v
162
+ 4
163
+ Figure 2 A vertex cop and its four accompanying face-cops moving from u to v.
164
+ so cop c3 can even decrease his distance by one during the next turn. Thus the total distance
165
+ of the three cops to their target faces decreased by at least one.
166
+ It remains the case that c2 and c3 have already reached their target faces (but c1 did not,
167
+ as the game would be over otherwise). In this case we move c1 one step towards his target
168
+ face f1 = f(∠u
169
+ 1) and c2, c3 both to f(∠v
170
+ 2). Now its the robber’s turn again. If she does not
171
+ move, we assign target faces fi = f(∠v
172
+ i ), i = 1, 2, 3, and the total distance decreases after the
173
+ cops’ next turn. If she moves back to u, we assign target faces fi = f(∠u
174
+ i ), i = 1, 2, 3, and
175
+ the total distance decreases after the cops’ next turn. The last possibility for the robber is to
176
+ move towards another neighbor w of v, see Figure 1. Then we assign f1 = f(∠v
177
+ 1) and f2, f3
178
+ to be the faces containing the other two angles at w. In their next turn, c2 and c3 can again
179
+ reach their target faces, while c1 can decrease his distance to his target face f(∠v
180
+ 1) by one
181
+ compared to the initial situation with the robber at vertex u. Again, the total distance is
182
+ decreased, which concludes the proof.
183
+
184
+ To prove item 2 in Theorem 1, we reduce our Primal-Dual Cops and Robber to the
185
+ classical Cops and Robber with cops on vertices of G and then use a result from the literature.
186
+ ▶ Lemma 3. In a plane graph G with ∆(G) ≤ 4, four face-cops can simulate a vertex-cop.
187
+ Proof. Let c be a vertex-cop starting at a vertex u ∈ V (G) with up to four incident angles ∠u
188
+ i
189
+ (for i ∈ {1, 2, 3, 4}). We place four face-cops on the (up to) four faces f(∠u
190
+ i ). If the vertex-cop
191
+ moves to an adjacent vertex v, the four face cops around it can in one step also move to
192
+ faces containing the angles incident to v, see Figure 2 for the case that u and v both have
193
+ degree 4. For vertices of degree less then 4 it only gets easier for the face-cops.
194
+
195
+ An immediate corollary of Lemma 3 is that c∗(G) ≤ 4 · c(G) for planar graphs G
196
+ with ∆(G) ≤ 4. With c(G) ≤ 3 for all planar graphs G [1], item 2 in Theorem 1 follows.
197
+ 3
198
+ Robber wins sometimes if the maximum degree is at least five
199
+ In this section we prove item 3 in Theorem 1, i.e., that c∗(G) = Ω
200
+ ��
201
+ log(n)
202
+
203
+ for some
204
+ n-vertex plane graphs G with ∆(G) ≥ 5. We utilize a result of Nisse and Suchan [9] about
205
+ the cop number cp,q(G) for a different variant of Cops and Robber for any graph G and
206
+
207
+ 4
208
+ Primal-Dual Cops and Robber
209
+ Figure 3 G4,2,2: An n × n grid with each edge subdivided four times and two rings. Faces are
210
+ colored according to their closest grid vertex. Deep and shallow faces are light and dark, respectively.
211
+ positive integers p and q. Here (as in the classical variant) the cops and the robber are on
212
+ the vertices of G. However, in each turn the cops may traverse up to p edges of G, while the
213
+ robber may traverse up to q edges of G. We refer to p and q as the velocities of the cops and
214
+ the robber, respectively.
215
+ ▶ Theorem 4 ([8, 9]). Let Gn be the n × n grid graph, p be the velocity of the cops and q be
216
+ the velocity of the robber. If p < q, then cp,q(Gn) = Ω
217
+ ��
218
+ log(n)
219
+
220
+ .
221
+ The idea to prove item 3 in Theorem 1 is to construct a “grid-like” graph Gn,s,r for
222
+ positive integers n, s, r in which the robber in the primal-dual variant can move around faster
223
+ than the cops. Then she can simulate the evasion strategy of the robber in the variant of
224
+ Nisse and Suchan.
225
+ We start with the n × n grid graph Gn, n ≥ 3, with a planar embedding such that the
226
+ 4-faces are the inner faces. We call the vertices of Gn the grid vertices. Then, each edge
227
+ of Gn is subdivided by 2s new vertices, called subdivision vertices, to obtain Gn,s. Two grid
228
+ vertices are called neighboring if they are adjacent in Gn. Further, inside each inner face of
229
+ Gn,s we add r nested cycles, called rings, of length 12s each and call their vertices the ring
230
+ vertices. Between any two consecutive rings we add a planar matching of 12s edges. Each
231
+ inner face of Gn,s has 8s subdivision vertices on its boundary and 12s ring vertices on its
232
+ outermost ring. At last, we add (in a crossing-free way) three edges from each subdivision
233
+ vertex to the outermost ring vertices in the two incident faces of Gn,s such that two edges
234
+ go to one ring, the third edge to the other ring, and every ring vertex receives exactly one
235
+ such edge. Along the 2s vertices of each subdivision path in Gn,s the side with two edges to
236
+ the ring should always switch. Thus each inner face of Gn,s receives 12s edges which are
237
+ connected to the 12s vertices of the outermost ring such that the drawing remains planar.
238
+ Call the resulting graph Gn,s,r and note that ∆(Gn,s,r) = 5. See also Figure 3. We
239
+ shall use a robber strategy in which she only focuses on grid vertices and moves between
240
+ these through the paths of subdivision vertices, i.e., only plays on Gn,s. The purpose of the
241
+ additional rings in Gn,s,r is to slow down the cops and force them to stay close to grid and
242
+ subdivision vertices, too, thereby simulating the game of Nisse and Suchan on Gn.
243
+ Formally, we call an inner face of Gn,s,r shallow if it is incident to some subdivision
244
+ vertex, and deep otherwise. Our first lemma implies that, due to the number of rings, cops
245
+ should not use deep faces.
246
+ ▶ Lemma 5. Let a1, a2 be two shallow faces of Gn,s,r inside the same inner face A of Gn.
247
+
248
+ M. T. Ha, P. Jungeblut and T. Ueckerdt
249
+ 5
250
+ If r > 3s, then any cop moving from a1 to a2 along a shortest path without leaving A uses
251
+ only shallow faces.
252
+ Proof of Lemma 5. First observe that there are exactly 12s shallow faces inside A; one for
253
+ each edge of the outermost ring. Hence, the cop may move from a1 to a2 using only shallow
254
+ faces in no more than 6s steps. On the other hand, the deep face b inside the innermost
255
+ ring is at distance r > 3s from each of a1, a2 and hence no shortest path between a1 and a2
256
+ uses b.
257
+ Let H be the subgraph of the plane dual of Gn,s,r induced by all inner faces inside A,
258
+ except b. Then H ∼= Pr □ C12s is a square grid on a cylinder of height r and circumference 12s,
259
+ with the shallow faces forming a boundary cycle C. Since a1, a2 are on C and each shortest
260
+ path lies inside H, such path is contained in C, i.e., uses only shallow faces.
261
+
262
+ We have to hinder the cops from taking shortcuts through the outer face f0 of Gn,s,r. To
263
+ this end let G′
264
+ n,s,r be a copy of Gn,s,r with outer face f ′
265
+ 0. Change the outer face of G′
266
+ n,s,r
267
+ such that f ′
268
+ 0 is an inner face (while not changing the cyclic ordering of the edges around the
269
+ vertices) and define Gn,s,r to be the graph obtained from gluing Gn,s,r into face f ′
270
+ 0 of G′
271
+ n,s,r
272
+ and identifying corresponding vertices. The robber will always stay on vertices of Gn,s,r and
273
+ whenever a cop uses a vertex v′ of G′
274
+ n,s,r she acts as if he was on the corresponding vertex v
275
+ of Gn,s,r. Without loss of generality, we can therefore assume below that the game is played
276
+ on Gn,s,r with the cops being prohibited to enter the outer face.
277
+ For a face f ∈ F, we denote by vf be the grid vertex closest to f, breaking ties arbitrarily.
278
+ ▶ Lemma 6. Let a, b be two shallow faces whose closest grid vertices va, vb have distance d
279
+ in Gn. If r > 3s, then in Gn,s,r the robber moving from va to vb needs at most (2s + 1)d
280
+ steps, while any cop moving from a to b needs at least 3s(d − 4) steps.
281
+ Proof of Lemma 6. For the first part it is enough to observe that the robber may go along
282
+ subdivision vertices, taking exactly 2s + 1 steps for every corresponding edge in Gn.
283
+ For the second part, i.e., the lower bound on the number of moves for a cop, let A
284
+ and B be the inner faces of Gn containing the inner faces a and b of Gn,s,r, respectively.
285
+ We assume that d ≥ 5, as otherwise 3s(d − 4) ≤ 0 and there is nothing to show, and hence
286
+ we have A ̸= B. More precisely, traveling from a to b, the cop must traverse (inner faces
287
+ of Gn,s,r corresponding to) at least d − 1 different inner faces of Gn. Cutting off the initial
288
+ part inside A and final part inside B, Lemma 5 implies that the remaining shortest path for
289
+ the cop uses only shallow faces. Thus, on her way, the cop visits shallow faces incident to at
290
+ least d − 3 distinct grid vertices, i.e., d − 4 transitions from a shallow face at a grid vertex to
291
+ a shallow face at a neighboring grid vertex. As each such transition requires 3s moves, the
292
+ claim follows.
293
+
294
+ Proof of item 3 in Theorem 1. Nisse and Suchan [9] (see also [8] for the omitted proofs)
295
+ describe an evasion strategy for a robber with velocity q that requires Ω
296
+ ��
297
+ log(n)
298
+
299
+ vertex-cops
300
+ with velocity p to capture him in Gn, provided q > p; see Theorem 4. We describe how
301
+ a robber with velocity 1 in Gn,s,r (for sufficiently large n, s, r) can simulate this strategy
302
+ against face-cops with velocity 1.
303
+ We choose p = 15, q = 16 and consider the game of Nisse and Suchan for these velocities.
304
+ For their graph Gn in which the robber can win against k = Ω
305
+ ��
306
+ log(n)
307
+
308
+ vertex-cops, we
309
+ then consider Gn,s,r with s = 16 and r = 3s + 1 = 49. Now we copy the evasion strategy S
310
+ for the robber as follows: Whenever it is the robber’s turn and the face-cops occupy faces
311
+ f1, f2, . . . , fk in Gn,s,r, consider the corresponding situation in Gn where the vertex-cops
312
+ occupy vf1, vf2, . . . , vfk. Based on these positions, S tells the robber to go to a vertex v at
313
+
314
+ 6
315
+ Primal-Dual Cops and Robber
316
+ distance d ≤ q = 16 from the current position of the robber in Gn. By Lemma 5, the robber
317
+ in Gn,r,s can go to v in at most (2s + 1)d ≤ (2 · 16 + 1) · 16 = 528 turns.
318
+ In the meantime, each face-cop also makes up to 528 moves in Gn,r,s, traveling from some
319
+ face a to some face b, which is interpreted in Gn as the corresponding vertex-cop traveling
320
+ from va to vb. For va and vb to be at distance d′ ≥ 16 in Gn, by Lemma 5 the face-cop needs
321
+ at least 3s(d′ − 4) ≥ 3 · 16 · 12 = 576 turns, which is strictly more than 528. Thus, after 528
322
+ turns, each vertex-cop made at most p = 15 steps in Gn, as required for strategy S.
323
+ Hence, the robber can evade k face-cops in Gn,s,r, proving c(Gn,s,r) > k. Since Gn,s,r
324
+ for s, r ∈ O(1) has O(n2) vertices, this completes the proof.
325
+
326
+ 4
327
+ Conclusions
328
+ Let c∗
329
+ ∆ denote the largest primal-dual cop number among all plane graphs with maximum
330
+ degree ∆. We have shown that c∗
331
+ 3 = 3, c∗
332
+ 4 ≤ 12 (this bound is certainly not optimal), and
333
+ c∗
334
+ 5 = ∞, while it is easy to see that c∗
335
+ 1 = 1, c∗
336
+ 2 = 2, and c∗
337
+ ∆ = ∞ for all ∆ > 5. Let us remark
338
+ that our proof for ∆ = 5 also holds for a variant of the game where the robber is already
339
+ captured when one cop is on one incident face. On the other hand, our proof for ∆ = 3 holds
340
+ verbatim to prove that three cops also suffice in a variant of the game where the graph is
341
+ embedded without crossings in any other surface, which makes it is interesting to consider
342
+ ∆ = 4 here.
343
+ References
344
+ 1
345
+ Martin S. Aigner and M. Fromme. A Game of Cops and Robbers. Discrete Applied Mathematics,
346
+ 8(1):1–12, 1984. doi:10.1016/0166-218X(84)90073-8.
347
+ 2
348
+ Anthony Bonato. An Invitation to Pursuit-Evasion Games and Graph Theory. American
349
+ Mathematical Society, 2022.
350
+ 3
351
+ Anthony Bonato and Richard J. Nowakowski. The Game of Cops and Robbers on Graphs.
352
+ American Mathematical Society, 2011. doi:10.1090/stml/061.
353
+ 4
354
+ Peter Bradshaw and Seyyed Aliasghar Hosseini. Surrounding Cops and Robbers on Graphs of
355
+ Bounded Genus, 2019. arXiv:1909.09916.
356
+ 5
357
+ Andrea C. Burgess, Rosalind A. Cameron, Nancy E. Clarke, Peter Danziger, Stephen Finbow,
358
+ Caleb W. Jones, and David A. Pike. Cops that surround a robber. Discrete Applied Mathematics,
359
+ 285:552–566, 2020. doi:10.1016/j.dam.2020.06.019.
360
+ 6
361
+ Danny Crytser, Natasha Komarov, and John Mackey. Containment: A Variation of Cops and
362
+ Robber. Graphs and Combinatorics, 36(3):591–605, 2020. doi:10.1007/s00373-020-02140-5.
363
+ 7
364
+ Andrzej Dudek, Przemysław Gordinowicz, and Paweł Prałat. Cops and Robbers playing on
365
+ edges. Journal of Combinatorics, 5(1):131–153, 2014. doi:10.4310/JOC.2014.v5.n1.a6.
366
+ 8
367
+ Fedor V. Fomin, Petr A. Golovach, Jan Kratochvíl, Nicolas Nisse, and Karol Suchan. Pursuing
368
+ a fast robber on a graph. Theoretical Computer Science, 411(7–9):1167–1181, 2010. doi:
369
+ 10.1016/j.tcs.2009.12.010.
370
+ 9
371
+ Nicolas Nisse and Karol Suchan. Fast Robber in Planar Graphs. In Hajo Broersma, Thomas
372
+ Erlebach, Tom Friedetzky, and Daniel Paulusma, editors, Graph-Theoretic Concepts in Com-
373
+ puter Science (WG 2008), volume 5344 of Lecture Notes in Computer Science, pages 312–323,
374
+ 2008. doi:10.1007/978-3-540-92248-3_28.
375
+ 10
376
+ Richard J. Nowakowski and Peter Winkler. Vertex-to-Vertex Pursuit in a Graph. Discrete
377
+ Mathematics, 43(2–3):235–239, 1983. doi:10.1016/0012-365X(83)90160-7.
378
+ 11
379
+ Paweł Prałat. Containment Game Played on Random Graphs: Another Zig-Zag Theorem.
380
+ The Electronic Journal of Combinatorics, 22(2), 2015. doi:10.37236/4777.
381
+ 12
382
+ Alain Quilliot. Jeux et pointes fixes sur les graphes. PhD thesis, Université de Paris VI, 1978.
383
+
8dE5T4oBgHgl3EQfQg7H/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,281 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf,len=280
2
+ page_content='Primal-Dual Cops and Robber Minh Tuan Ha � Karlsruhe Institute of Technology, Germany Paul Jungeblut � Karlsruhe Institute of Technology, Germany Torsten Ueckerdt � Karlsruhe Institute of Technology, Germany Abstract Cops and Robber is a family of two-player games played on graphs in which one player controls a number of cops and the other player controls a robber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
3
+ page_content=' In alternating turns, each player moves (all) his/her figures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
4
+ page_content=' The cops try to capture the robber while the latter tries to flee indefinitely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
5
+ page_content=' In this paper we consider a variant of the game played on a planar graph where the robber moves between adjacent vertices while the cops move between adjacent faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
6
+ page_content=' The cops capture the robber if they occupy all incident faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
7
+ page_content=' We prove that a constant number of cops suffices to capture the robber on any planar graph of maximum degree ∆ if and only if ∆ ≤ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
8
+ page_content=' 2012 ACM Subject Classification Mathematics of computing → Discrete mathematics → Combi- natorics → Combinatoric problems Keywords and phrases Cops and robber, planar graph, dual graph 1 Introduction Cops and Robber is probably the most classical combinatorial pursuit-evasion game on graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
9
+ page_content=' The robber models an intruder in a network that the cops try to capture.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
10
+ page_content=' Two players play with complete information on a fixed finite graph G = (V, E).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
11
+ page_content=' The cop player controls a set of k cops, each occupying a vertex of G (possibly several cops on the same vertex), while the robber player controls a single robber that also occupies a vertex of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
12
+ page_content=' The players take alternating turns, where the cop player in his turn can decide for each cop individually whether to stay at its position or move the cop along an edge of G onto an adjacent vertex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
13
+ page_content=' Similarly, the robber player on her turn can leave the robber at its position or move it along an edge of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
14
+ page_content=' The cop player starts by choosing starting positions for his k cops and wins the game as soon as at least one cop occupies the same vertex as the robber, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
15
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
16
+ page_content=', when the robber is captured.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
17
+ page_content=' The robber player, seeing the cops positions, chooses the starting position for her robber and wins if she can avoid capture indefinitely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
18
+ page_content=' The least integer k for which, assuming perfect play on either side, k cops can always capture the robber, is called the cop number of G, usually denoted by c(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
19
+ page_content=' In this paper, we introduce Primal-Dual Cops and Robber which is played on a plane graph G, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
20
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
21
+ page_content=', with a fixed plane embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
22
+ page_content=' Here, the cops occupy the faces of G and can move between adjacent faces (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
23
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
24
+ page_content=', faces that share an edge), while the robber still moves along edges between adjacent vertices of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
25
+ page_content=' In this game, the robber is captured if every face incident to the robber’s vertex is occupied by at least one cop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
26
+ page_content=' Analogously, we call the least integer k for which k cops can always capture the robber in the Primal-Dual Cops and Robber game the primal-dual cop number of G and denote it by c∗(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
27
+ page_content=' An obvious lower bound for c∗(G) is the maximum number of faces incident to any vertex in G: The robber can choose such a vertex as its start position and just stay there indefinitely (note that there is no zugzwang, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
28
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
29
+ page_content=', no obligation to move during ones turn).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
30
+ page_content=' In particular, if G has maximum degree ∆(G) and there exists a vertex v with deg(v) = ∆(G), which is not a cut-vertex, then c∗(G) ≥ ∆(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
31
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
32
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
33
+ page_content=', c∗(K2,n) = ∆(K2,n) = n for any n ≥ 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
34
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
35
+ page_content='05514v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
36
+ page_content='CO] 13 Jan 2023 2 Primal-Dual Cops and Robber Our contribution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
37
+ page_content=' We investigate, whether the primal-dual cop number c∗(G) is bounded in terms of ∆(G) for all plane graphs G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
38
+ page_content=' The answer is ‘Yes’ if ∆(G) ≤ 4 and ‘No’ otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
39
+ page_content=' ▶ Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
40
+ page_content=' Each of the following holds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
41
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
42
+ page_content=' For every plane graph G with ∆(G) ≤ 3 we have c∗(G) ≤ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
43
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
44
+ page_content=' For every plane graph G with ∆(G) ≤ 4 we have c∗(G) ≤ 12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
45
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
46
+ page_content=' For some n-vertex plane graphs G with ∆(G) = 5 we have c∗(G) = Ω �� log(n) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
47
+ page_content=' Related work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
48
+ page_content=' Let us just briefly mention that Cops and Robber was introduced by Nowakowski and Winkler [10] and Quillot [12] for one cop and Aigner and Fromme [1] for k cops 40 years ago.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
49
+ page_content=' Since then numerous results and variants were presented, see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
50
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
51
+ page_content=', [2, 3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
52
+ page_content=' Perhaps most similar to our new variant are the recent surrounding variant of Burgess et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
53
+ page_content=' [5] with vertex-cops and the containment variant of Cryster et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
54
+ page_content=' [6, 11] with edge-cops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
55
+ page_content=' In these variants the robber is captured if every adjacent vertex, respectively every incident edge, is occupied by a cop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
56
+ page_content=' The smallest number of cops that always suffices for any planar graph G is 3 in the classical variant [1], 7 in the surrounding variant [4], 7∆(G) in the containment variant [6] and 3 when both, cops and robber, move on edges [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
57
+ page_content=' 2 Cops win always if the maximum degree is at most four We start with an observation that simplifies the proofs of items 1 and 2 in Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
58
+ page_content=' ▶ Observation 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
59
+ page_content=' Let the robber be on a vertex u with a neighbor v of degree 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
60
+ page_content=' Then the robber is never required to move to v to evade the cops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
61
+ page_content=' This is true because the set of faces required to capture the robber at v is a subset of the faces required to capture him at u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
62
+ page_content=' Further, his only possible moves at v are either staying there or moving back to u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
63
+ page_content=' As there is no zugzwang, he could just stay at u all along.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
64
+ page_content=' In both of the following proofs we assume that the graph contains only degree-3-vertices (respectively degree-4-vertices) and degree-1-vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
65
+ page_content=' This can always be achieved by adding leaves to vertices not yet having the correct degree.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
66
+ page_content=' Proof of item 1 in Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
67
+ page_content=' We give a winning strategy for three cops c1, c2, c3 in a planar graph G with ∆(G) ≤ 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
68
+ page_content=' First the cops choose arbitrary faces to start on.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
69
+ page_content=' Then the robber chooses its start vertex u, which we assume to be of degree 3 by Observation 2 (it is trivial to capture him if all vertices have degree 1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
70
+ page_content=' Let ∠u 1, ∠u 2, ∠u 3 be the three angles incident to u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
71
+ page_content=' We denote the face containing an angle ∠ by f(∠) and define for each cop ci a target face fi, i = 1, 2, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
72
+ page_content=' Initially we set fi = f(∠u i ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
73
+ page_content=' The goal of each cop is to reach his target face, thereby capturing the robber when all three cops arrive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
74
+ page_content=' If the robber moves, each cop updates his target face.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
75
+ page_content=' Our strategy guarantees that the total distance of all three cops to their targets faces decreases over time, so it reaches zero after finitely many turns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
76
+ page_content=' Clearly, in every game the robber has to move at some point to avoid being captured.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
77
+ page_content=' Assume that the robber moves from vertex u to vertex v (both of degree 3 by Observation 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
78
+ page_content=' Without loss of generality the angles around u and v are labeled as in Figure 1 with fi = f(∠u i ) being the current target face of cop ci, i = 1, 2, 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
79
+ page_content=' First assume that c3 (or symmetrically c2) has not reached his target face yet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
80
+ page_content=' In this case we assign the new target faces f1 = f(∠v 1), f2 = f(∠v 2) and f3 = f(∠v 3).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
81
+ page_content=' Note that for i = 1, 2 faces f(∠u i ) and f(∠v i ) are adjacent, so cop ci can keep his distance to his target face unchanged (or even decrease it) during his next turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
82
+ page_content=' Further note that f(∠u 3) = f(∠v 3), M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
83
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
84
+ page_content=' Ha, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
85
+ page_content=' Jungeblut and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
86
+ page_content=' Ueckerdt 3 ̸ u 1 ̸ u 2 ̸ u 3 ̸ v 1 ̸ v 2 ̸ v 3 u v w Figure 1 Labeling of the angles for a robber move from u to v (and possibly further to w).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
87
+ page_content=' v u ̸ u 1 ̸ u 2 ̸ u 3 ̸ v 1 ̸ v 2 ̸ v 3 ̸ u 4 ̸ v 4 Figure 2 A vertex cop and its four accompanying face-cops moving from u to v.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
88
+ page_content=' so cop c3 can even decrease his distance by one during the next turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
89
+ page_content=' Thus the total distance of the three cops to their target faces decreased by at least one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
90
+ page_content=' It remains the case that c2 and c3 have already reached their target faces (but c1 did not, as the game would be over otherwise).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
91
+ page_content=' In this case we move c1 one step towards his target face f1 = f(∠u 1) and c2, c3 both to f(∠v 2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
92
+ page_content=' Now its the robber’s turn again.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
93
+ page_content=' If she does not move, we assign target faces fi = f(∠v i ), i = 1, 2, 3, and the total distance decreases after the cops’ next turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
94
+ page_content=' If she moves back to u, we assign target faces fi = f(∠u i ), i = 1, 2, 3, and the total distance decreases after the cops’ next turn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
95
+ page_content=' The last possibility for the robber is to move towards another neighbor w of v, see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
96
+ page_content=' Then we assign f1 = f(∠v 1) and f2, f3 to be the faces containing the other two angles at w.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
97
+ page_content=' In their next turn, c2 and c3 can again reach their target faces, while c1 can decrease his distance to his target face f(∠v 1) by one compared to the initial situation with the robber at vertex u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
98
+ page_content=' Again, the total distance is decreased, which concludes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
99
+ page_content=' ◀ To prove item 2 in Theorem 1, we reduce our Primal-Dual Cops and Robber to the classical Cops and Robber with cops on vertices of G and then use a result from the literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
100
+ page_content=' ▶ Lemma 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
101
+ page_content=' In a plane graph G with ∆(G) ≤ 4, four face-cops can simulate a vertex-cop.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
102
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
103
+ page_content=' Let c be a vertex-cop starting at a vertex u ∈ V (G) with up to four incident angles ∠u i (for i ∈ {1, 2, 3, 4}).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
104
+ page_content=' We place four face-cops on the (up to) four faces f(∠u i ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
105
+ page_content=' If the vertex-cop moves to an adjacent vertex v, the four face cops around it can in one step also move to faces containing the angles incident to v, see Figure 2 for the case that u and v both have degree 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
106
+ page_content=' For vertices of degree less then 4 it only gets easier for the face-cops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
107
+ page_content=' ◀ An immediate corollary of Lemma 3 is that c∗(G) ≤ 4 · c(G) for planar graphs G with ∆(G) ≤ 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
108
+ page_content=' With c(G) ≤ 3 for all planar graphs G [1], item 2 in Theorem 1 follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
109
+ page_content=' 3 Robber wins sometimes if the maximum degree is at least five In this section we prove item 3 in Theorem 1, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
110
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
111
+ page_content=', that c∗(G) = Ω �� log(n) � for some n-vertex plane graphs G with ∆(G) ≥ 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
112
+ page_content=' We utilize a result of Nisse and Suchan [9] about the cop number cp,q(G) for a different variant of Cops and Robber for any graph G and 4 Primal-Dual Cops and Robber Figure 3 G4,2,2: An n × n grid with each edge subdivided four times and two rings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
113
+ page_content=' Faces are colored according to their closest grid vertex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
114
+ page_content=' Deep and shallow faces are light and dark, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
115
+ page_content=' positive integers p and q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
116
+ page_content=' Here (as in the classical variant) the cops and the robber are on the vertices of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
117
+ page_content=' However, in each turn the cops may traverse up to p edges of G, while the robber may traverse up to q edges of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
118
+ page_content=' We refer to p and q as the velocities of the cops and the robber, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
119
+ page_content=' ▶ Theorem 4 ([8, 9]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
120
+ page_content=' Let Gn be the n × n grid graph, p be the velocity of the cops and q be the velocity of the robber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
121
+ page_content=' If p < q, then cp,q(Gn) = ٠�� log(n) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
122
+ page_content=' The idea to prove item 3 in Theorem 1 is to construct a “grid-like” graph Gn,s,r for positive integers n, s, r in which the robber in the primal-dual variant can move around faster than the cops.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
123
+ page_content=' Then she can simulate the evasion strategy of the robber in the variant of Nisse and Suchan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
124
+ page_content=' We start with the n × n grid graph Gn, n ≥ 3, with a planar embedding such that the 4-faces are the inner faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
125
+ page_content=' We call the vertices of Gn the grid vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
126
+ page_content=' Then, each edge of Gn is subdivided by 2s new vertices, called subdivision vertices, to obtain Gn,s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
127
+ page_content=' Two grid vertices are called neighboring if they are adjacent in Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
128
+ page_content=' Further, inside each inner face of Gn,s we add r nested cycles, called rings, of length 12s each and call their vertices the ring vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
129
+ page_content=' Between any two consecutive rings we add a planar matching of 12s edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
130
+ page_content=' Each inner face of Gn,s has 8s subdivision vertices on its boundary and 12s ring vertices on its outermost ring.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
131
+ page_content=' At last, we add (in a crossing-free way) three edges from each subdivision vertex to the outermost ring vertices in the two incident faces of Gn,s such that two edges go to one ring, the third edge to the other ring, and every ring vertex receives exactly one such edge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
132
+ page_content=' Along the 2s vertices of each subdivision path in Gn,s the side with two edges to the ring should always switch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
133
+ page_content=' Thus each inner face of Gn,s receives 12s edges which are connected to the 12s vertices of the outermost ring such that the drawing remains planar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
134
+ page_content=' Call the resulting graph Gn,s,r and note that ∆(Gn,s,r) = 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
135
+ page_content=' See also Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
136
+ page_content=' We shall use a robber strategy in which she only focuses on grid vertices and moves between these through the paths of subdivision vertices, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
137
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
138
+ page_content=', only plays on Gn,s.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
139
+ page_content=' The purpose of the additional rings in Gn,s,r is to slow down the cops and force them to stay close to grid and subdivision vertices, too, thereby simulating the game of Nisse and Suchan on Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
140
+ page_content=' Formally, we call an inner face of Gn,s,r shallow if it is incident to some subdivision vertex, and deep otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
141
+ page_content=' Our first lemma implies that, due to the number of rings, cops should not use deep faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
142
+ page_content=' ▶ Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
143
+ page_content=' Let a1, a2 be two shallow faces of Gn,s,r inside the same inner face A of Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
144
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
145
+ page_content=' T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
146
+ page_content=' Ha, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
147
+ page_content=' Jungeblut and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
148
+ page_content=' Ueckerdt 5 If r > 3s, then any cop moving from a1 to a2 along a shortest path without leaving A uses only shallow faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
149
+ page_content=' Proof of Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
150
+ page_content=' First observe that there are exactly 12s shallow faces inside A;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
151
+ page_content=' one for each edge of the outermost ring.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
152
+ page_content=' Hence, the cop may move from a1 to a2 using only shallow faces in no more than 6s steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
153
+ page_content=' On the other hand, the deep face b inside the innermost ring is at distance r > 3s from each of a1, a2 and hence no shortest path between a1 and a2 uses b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
154
+ page_content=' Let H be the subgraph of the plane dual of Gn,s,r induced by all inner faces inside A, except b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
155
+ page_content=' Then H ∼= Pr □ C12s is a square grid on a cylinder of height r and circumference 12s, with the shallow faces forming a boundary cycle C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
156
+ page_content=' Since a1, a2 are on C and each shortest path lies inside H, such path is contained in C, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
157
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
158
+ page_content=', uses only shallow faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
159
+ page_content=' ◀ We have to hinder the cops from taking shortcuts through the outer face f0 of Gn,s,r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
160
+ page_content=' To this end let G′ n,s,r be a copy of Gn,s,r with outer face f ′ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
161
+ page_content=' Change the outer face of G′ n,s,r such that f ′ 0 is an inner face (while not changing the cyclic ordering of the edges around the vertices) and define Gn,s,r to be the graph obtained from gluing Gn,s,r into face f ′ 0 of G′ n,s,r and identifying corresponding vertices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
162
+ page_content=' The robber will always stay on vertices of Gn,s,r and whenever a cop uses a vertex v′ of G′ n,s,r she acts as if he was on the corresponding vertex v of Gn,s,r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
163
+ page_content=' Without loss of generality, we can therefore assume below that the game is played on Gn,s,r with the cops being prohibited to enter the outer face.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
164
+ page_content=' For a face f ∈ F, we denote by vf be the grid vertex closest to f, breaking ties arbitrarily.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
165
+ page_content=' ▶ Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
166
+ page_content=' Let a, b be two shallow faces whose closest grid vertices va, vb have distance d in Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
167
+ page_content=' If r > 3s, then in Gn,s,r the robber moving from va to vb needs at most (2s + 1)d steps, while any cop moving from a to b needs at least 3s(d − 4) steps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
168
+ page_content=' Proof of Lemma 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
169
+ page_content=' For the first part it is enough to observe that the robber may go along subdivision vertices, taking exactly 2s + 1 steps for every corresponding edge in Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
170
+ page_content=' For the second part, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
171
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
172
+ page_content=', the lower bound on the number of moves for a cop, let A and B be the inner faces of Gn containing the inner faces a and b of Gn,s,r, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
173
+ page_content=' We assume that d ≥ 5, as otherwise 3s(d − 4) ≤ 0 and there is nothing to show, and hence we have A ̸= B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
174
+ page_content=' More precisely, traveling from a to b, the cop must traverse (inner faces of Gn,s,r corresponding to) at least d − 1 different inner faces of Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
175
+ page_content=' Cutting off the initial part inside A and final part inside B, Lemma 5 implies that the remaining shortest path for the cop uses only shallow faces.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
176
+ page_content=' Thus, on her way, the cop visits shallow faces incident to at least d − 3 distinct grid vertices, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
177
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
178
+ page_content=', d − 4 transitions from a shallow face at a grid vertex to a shallow face at a neighboring grid vertex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
179
+ page_content=' As each such transition requires 3s moves, the claim follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
180
+ page_content=' ◀ Proof of item 3 in Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
181
+ page_content=' Nisse and Suchan [9] (see also [8] for the omitted proofs) describe an evasion strategy for a robber with velocity q that requires ٠�� log(n) � vertex-cops with velocity p to capture him in Gn, provided q > p;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
182
+ page_content=' see Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
183
+ page_content=' We describe how a robber with velocity 1 in Gn,s,r (for sufficiently large n, s, r) can simulate this strategy against face-cops with velocity 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
184
+ page_content=' We choose p = 15, q = 16 and consider the game of Nisse and Suchan for these velocities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
185
+ page_content=' For their graph Gn in which the robber can win against k = ٠�� log(n) � vertex-cops, we then consider Gn,s,r with s = 16 and r = 3s + 1 = 49.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
186
+ page_content=' Now we copy the evasion strategy S for the robber as follows: Whenever it is the robber’s turn and the face-cops occupy faces f1, f2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
187
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
188
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
189
+ page_content=' , fk in Gn,s,r, consider the corresponding situation in Gn where the vertex-cops occupy vf1, vf2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
190
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
191
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
192
+ page_content=' , vfk.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
193
+ page_content=' Based on these positions, S tells the robber to go to a vertex v at 6 Primal-Dual Cops and Robber distance d ≤ q = 16 from the current position of the robber in Gn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
194
+ page_content=' By Lemma 5, the robber in Gn,r,s can go to v in at most (2s + 1)d ≤ (2 · 16 + 1) · 16 = 528 turns.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
195
+ page_content=' In the meantime, each face-cop also makes up to 528 moves in Gn,r,s, traveling from some face a to some face b, which is interpreted in Gn as the corresponding vertex-cop traveling from va to vb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
196
+ page_content=' For va and vb to be at distance d′ ≥ 16 in Gn, by Lemma 5 the face-cop needs at least 3s(d′ − 4) ≥ 3 · 16 · 12 = 576 turns, which is strictly more than 528.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
197
+ page_content=' Thus, after 528 turns, each vertex-cop made at most p = 15 steps in Gn, as required for strategy S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
198
+ page_content=' Hence, the robber can evade k face-cops in Gn,s,r, proving c(Gn,s,r) > k.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
199
+ page_content=' Since Gn,s,r for s, r ∈ O(1) has O(n2) vertices, this completes the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
200
+ page_content=' ◀ 4 Conclusions Let c∗ ∆ denote the largest primal-dual cop number among all plane graphs with maximum degree ∆.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
201
+ page_content=' We have shown that c∗ 3 = 3, c∗ 4 ≤ 12 (this bound is certainly not optimal), and c∗ 5 = ∞, while it is easy to see that c∗ 1 = 1, c∗ 2 = 2, and c∗ ∆ = ∞ for all ∆ > 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
202
+ page_content=' Let us remark that our proof for ∆ = 5 also holds for a variant of the game where the robber is already captured when one cop is on one incident face.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
203
+ page_content=' On the other hand, our proof for ∆ = 3 holds verbatim to prove that three cops also suffice in a variant of the game where the graph is embedded without crossings in any other surface, which makes it is interesting to consider ∆ = 4 here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
204
+ page_content=' References 1 Martin S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
205
+ page_content=' Aigner and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
206
+ page_content=' Fromme.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
207
+ page_content=' A Game of Cops and Robbers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
208
+ page_content=' Discrete Applied Mathematics, 8(1):1–12, 1984.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
209
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
210
+ page_content='1016/0166-218X(84)90073-8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
211
+ page_content=' 2 Anthony Bonato.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
212
+ page_content=' An Invitation to Pursuit-Evasion Games and Graph Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
213
+ page_content=' American Mathematical Society, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
214
+ page_content=' 3 Anthony Bonato and Richard J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
215
+ page_content=' Nowakowski.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
216
+ page_content=' The Game of Cops and Robbers on Graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
217
+ page_content=' American Mathematical Society, 2011.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
218
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
219
+ page_content='1090/stml/061.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
220
+ page_content=' 4 Peter Bradshaw and Seyyed Aliasghar Hosseini.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
221
+ page_content=' Surrounding Cops and Robbers on Graphs of Bounded Genus, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
222
+ page_content=' arXiv:1909.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
223
+ page_content='09916.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
224
+ page_content=' 5 Andrea C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
225
+ page_content=' Burgess, Rosalind A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
226
+ page_content=' Cameron, Nancy E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
227
+ page_content=' Clarke, Peter Danziger, Stephen Finbow, Caleb W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
228
+ page_content=' Jones, and David A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
229
+ page_content=' Pike.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
230
+ page_content=' Cops that surround a robber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
231
+ page_content=' Discrete Applied Mathematics, 285:552–566, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
232
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
233
+ page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
234
+ page_content='dam.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
235
+ page_content='2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
236
+ page_content='06.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
237
+ page_content='019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
238
+ page_content=' 6 Danny Crytser, Natasha Komarov, and John Mackey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
239
+ page_content=' Containment: A Variation of Cops and Robber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
240
+ page_content=' Graphs and Combinatorics, 36(3):591–605, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
241
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
242
+ page_content='1007/s00373-020-02140-5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
243
+ page_content=' 7 Andrzej Dudek, Przemysław Gordinowicz, and Paweł Prałat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
244
+ page_content=' Cops and Robbers playing on edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
245
+ page_content=' Journal of Combinatorics, 5(1):131–153, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
246
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
247
+ page_content='4310/JOC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
248
+ page_content='2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
249
+ page_content='v5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
250
+ page_content='n1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
251
+ page_content='a6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
252
+ page_content=' 8 Fedor V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
253
+ page_content=' Fomin, Petr A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
254
+ page_content=' Golovach, Jan Kratochvíl, Nicolas Nisse, and Karol Suchan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
255
+ page_content=' Pursuing a fast robber on a graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
256
+ page_content=' Theoretical Computer Science, 411(7–9):1167–1181, 2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
257
+ page_content=' doi: 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
258
+ page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
259
+ page_content='tcs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
260
+ page_content='2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
261
+ page_content='12.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
262
+ page_content='010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
263
+ page_content=' 9 Nicolas Nisse and Karol Suchan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
264
+ page_content=' Fast Robber in Planar Graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
265
+ page_content=' In Hajo Broersma, Thomas Erlebach, Tom Friedetzky, and Daniel Paulusma, editors, Graph-Theoretic Concepts in Com- puter Science (WG 2008), volume 5344 of Lecture Notes in Computer Science, pages 312–323, 2008.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
266
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
267
+ page_content='1007/978-3-540-92248-3_28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
268
+ page_content=' 10 Richard J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
269
+ page_content=' Nowakowski and Peter Winkler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
270
+ page_content=' Vertex-to-Vertex Pursuit in a Graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
271
+ page_content=' Discrete Mathematics, 43(2–3):235–239, 1983.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
272
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
273
+ page_content='1016/0012-365X(83)90160-7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
274
+ page_content=' 11 Paweł Prałat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
275
+ page_content=' Containment Game Played on Random Graphs: Another Zig-Zag Theorem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
276
+ page_content=' The Electronic Journal of Combinatorics, 22(2), 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
277
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
278
+ page_content='37236/4777.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
279
+ page_content=' 12 Alain Quilliot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
280
+ page_content=' Jeux et pointes fixes sur les graphes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
281
+ page_content=' PhD thesis, Université de Paris VI, 1978.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dE5T4oBgHgl3EQfQg7H/content/2301.05514v1.pdf'}
99AyT4oBgHgl3EQfRPYW/content/2301.00060v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6230f7c04d72c3aa6e5cdad131b13461e2a2f574013259b955154e64117e8eb3
3
+ size 6124651
99AyT4oBgHgl3EQfRPYW/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d1c34d29b3877eb29b3f1d8e2d5e5faf4df3301cc1de115f8be7269bcbdfa914
3
+ size 2555949
9NAzT4oBgHgl3EQfSft5/content/2301.01233v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2ac5ba0c57f42f47a35a9a872ddf2c4fed1252fb735aa894ab923b7cb7d61553
3
+ size 1173598
9NAzT4oBgHgl3EQfSft5/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d9ed96f69b63bb2a726a618874dcaf7b1dfcc5a94d9c28f71861d491d2f8b7d8
3
+ size 132353
9NFRT4oBgHgl3EQfqTc6/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7d8449ee0e254b9bb73e8ab90077e9675ee41f906326528d633383ee2805122a
3
+ size 6553645
9tAzT4oBgHgl3EQfSvsB/content/2301.01235v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ee0f53120c70cb82188fe2e0c49835299d92385eb2435250dbea8a058a0034bd
3
+ size 2035073
9tAzT4oBgHgl3EQfSvsB/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:024f2ec98b6ccb44e9899e632b989febfb897a4f80d7f986c403d42fb0634658
3
+ size 165682
AtE0T4oBgHgl3EQfxwIb/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:78dfa4a90bfe0f98b4c053d99b774d7d7b46bdc2e8c113b4ec92ff13cf0146a7
3
+ size 163433
B9FRT4oBgHgl3EQfvjiF/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:386c5dcebb827ae6014b9c4a6822dfa8ebd4cda57da9c9eb2aad5cffd090c8f8
3
+ size 177761
C9E2T4oBgHgl3EQfSAeL/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d83d65a09a7ee4b9d83fd7daec861c1e6ba7ca43f582733e7d9084a4e5c6337c
3
+ size 122384
D9E1T4oBgHgl3EQfqQU2/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4355b339245bbd15b86c962f10f238e5c5cc444e913e778c5b2b6f4ad42d1e1d
3
+ size 72853
ENAyT4oBgHgl3EQf4vqx/content/2301.00793v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:efe9f570e95ee23bbe437084e0514518498f7a305c708c2e021d89918624ca45
3
+ size 824926
ENAyT4oBgHgl3EQf4vqx/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:13af0136ee829e5abaf4b3bbfa8ca20a743581625545aea5aab50e8fbcea54fc
3
+ size 5505069
ENAyT4oBgHgl3EQf4vqx/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3e7cea6786996746e4bae4364733ffb55068041dc60304a4813b399bdf222554
3
+ size 239041
EdE4T4oBgHgl3EQf6g7g/content/tmp_files/2301.05333v1.pdf.txt ADDED
@@ -0,0 +1,2754 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
2
+ YOSHIHIRO SHIRAI
3
+ Department of Mathematics, University of Maryland, College Park
4
+ Abstract. The purpose of this paper is to utilize statistical methodologies to infer from market
5
+ prices of assets and their derivatives the magnitude of the set of a measure M that defines acceptance
6
+ sets of risky future cash flows. We assume that M contains the collection of bilateral gamma random
7
+ variables, and estimate upper and lower boundaries of the compensation needed for a given bilateral
8
+ gamma distributed future cash flow to be acceptable. We show that prospects theory provides a
9
+ natural interpretation of the behaviors implied by such boundaries, which are not compatible with
10
+ expected utility theory. Boundaries for bilateral gamma risk neutral scale parameters for given speed
11
+ parameters are also estimated and tested against market data and, in particular, comparisons are
12
+ made with known empirical facts about the magnitude of the acceptance set of a common class of
13
+ risk measures.
14
+ 1. Introduction
15
+ The definition of acceptable risks, based on the axiomatization of the concept of coherent risk
16
+ measure given in Artzner et al. (1999) and their convex generalization (Follmer & Schied (2002)),
17
+ is a major recent advance in mathematical finance, as, among other applications, it provides an
18
+ operative framework for superhedging in incomplete markets. Starting from a monetary measure,
19
+ such as Value at Risk, that only satisfies the basic requirements of monotonicity and cash invariance,
20
+ practical considerations (e.g. that the combined exposure of two trading desks ought to be less
21
+ risky than that of the two desks taken separately, or that lack of liquidity may affect the future net
22
+ worth of a single, large, position) lead one to require that a measure of risk also satisfy subadditivity
23
+ and positive homogeneity. A measure of risk ρ then defines a set Aρ of acceptable risks as those
24
+ random variables X such that ρ(X) ≥ 0. Conversely, it is possible to show that given a cone A of
25
+ acceptable risks, the functional
26
+ ρ(X) = inf{m ∈ R : m + X ∈ A}
27
+ (1.1)
28
+ satisfies monotonicity, cash invariance, subadditivity and positive homogeneity. Based on convex
29
+ duality, a risk measure is also specified by a set of equivalent probability measures M as
30
+ ρ(X) = inf
31
+ Q∈M EQ[X].
32
+ (1.2)
33
+ The class M can be interpreted as the set of possible and credible macroeconomic/financial models,
34
+ so that 1.2 is referred to as the robust representation of ρ, and risk measures become natural tools
35
+ for the purpose of modeling uncertainty. For convex risk measures, a penalty α(Q) is added to 1.2
36
+ to take into account that some models Q ∈ M may be more or less plausible than others.
37
+ E-mail address: [email protected].
38
+ Date: January 16, 2023.
39
+ 2020 Mathematics Subject Classification. 60G18, 60G51, 91G20.
40
+ Key words and phrases. Bilateral Gamma, Prospects Theory, Knightian Uncertainty, Risk Measures, Nonlinear
41
+ Levy Processes, Diffusion Map, Quantile Regression, Distorted Regression, Gaussian Process Regression.
42
+ 1
43
+ arXiv:2301.05333v1 [q-fin.MF] 13 Jan 2023
44
+
45
+ 2
46
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
47
+ Typical examples of risk measures are those based on certainty equivalent, such as the entropic
48
+ risk measure, which are known in general as utility-based shortfall risk measures and are defined
49
+ by the acceptance set
50
+ A = {X : E[u(X)] ≥ u(c)}
51
+ for a given convex utility u and a threshold c, and those obtained by modifying the tails of the
52
+ underline statistical measure P, such as the expected shortfall, which are known in general as
53
+ spectral risk measures and are defined by the Choquet integral
54
+ ρ(X) =
55
+ � ∞
56
+ 0
57
+ Ψ(P(X+ ≥ a))da −
58
+ � ∞
59
+ 0
60
+ ˆΨ(P(X− ≥ a))da,
61
+ where Ψ : [0, 1] → [0, 1] is increasing and convex and ˆΨ(u) = 1 − Ψ(1 − u).
62
+ As the above examples confirm, relatively little is known in general about the set M. Note,
63
+ however, that a risk measure is an expected value under a worst case scenario measure, and, as
64
+ such, it defines a minimal current valuation (or maximal bid price) of the future cash flow X, while
65
+ −ρ(−X) gives a maximal valuation (or the minimal ask price). Assuming that market prices of
66
+ traded assets are random variables whose distribution belong to a specific class and is determined by
67
+ a set Θ ∈ RD of parameters, observed market prices imply specific boundaries for the set Θ and, in
68
+ turn, for M. For instance, if M is (or contains) the class of normal random variables parameterized
69
+ by pairs (µ, σ2) of mean and variance of assets returns, one can ask what are maximal and minimal
70
+ bounds for µ given σ2 that are implied by historically observed pairs (µ, σ2) of traded assets, in
71
+ turn estimated from market prices. These bounds are then naturally interpreted as structural limits
72
+ for the reward µ given the risk σ2 that the economic system can offer without compromising its
73
+ financial stability, as defined by the regulator.
74
+ To fix a reference framework, consider a market composed only of one risky asset with log return
75
+ X and a riskless one in zero net supply with zero risk free rate. Then,
76
+ 1 = EQ[eX] = E[ηeX],
77
+ (1.3)
78
+ where Q is a risk neutral measure, η the corresponding stochastic discount factor. If the distribution
79
+ of X under the statistical measure P is parameterized by θ ∈ RD, and assuming the existence of
80
+ a representative investor with utility U defined by a set of parameters ξ ∈ Rm, there is a function
81
+ V : RD × Rm → R that evaluates to 1 at (θ, ξ). Specifically (see e.g. Madan (2020a)), the risk
82
+ neutral density (with respect to the log return) is given by
83
+ h(x, θ, ξ) =
84
+ U ′
85
+ ξ(ex)fθ(x)
86
+
87
+ R U ′
88
+ ξ(es)fθ(s)ds,
89
+ (1.4)
90
+ where fθ is the statistical density of X. Based on 1.3 and 1.4, if the prospects offered by the risky
91
+ asset suddenly deteriorate, 1with θ replaced by a riskier θ′, a decrease in the equilibrium risk free
92
+ rate is needed to compensate. In extreme cases, however, investors may no longer be allowed to
93
+ hold such an asset which will be liquidated and may, ultimately, stop trading in some markets. As
94
+ an example, one may think of pension funds, which are not allowed to hold speculative grade bonds,
95
+ or to those asset classes, such as hedge funds, that are only reserved to institutional investors.
96
+ In the case of normal returns, as it is well known (Markovitz (1952), Tobin (1958), Sharpe (1964),
97
+ Lintner (1965)), the efficient frontier essentially provides the upper limit for the reward µp given
98
+ a risk defined by σ2, and also the lower one, as this is the upper limit for a short position. In
99
+ general, however, this result lies on the assumption that investors have mean-variance preferences,
100
+ and that, in particular, they are expected utility maximizers. Empirical observations, on the other
101
+ hand, have shown in many occasions that asset returns are not compatible with such axioms - a
102
+ well known example being the equity premium puzzle, according to which U.S. equity risk premia
103
+
104
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
105
+ 3
106
+ over Treasury Bills rates reflect an implausible level of aversion to risk under expected utility theory
107
+ (Mehra & Prescott (1985)).
108
+ An alternative to expected utility theory, termed “prospects theory”, is based on a series of ex-
109
+ periments conducted by psychologists D. Kahneman and A. Tverski (Kahneman & Tverski (1979)).
110
+ One of their results, in particular, is that humans tend to be risk seekers rather than risk averse in
111
+ the case of pure losses prospects. For instance, the prospect of winning 1000 dollars with probability
112
+ 1/2 and winning zero otherwise is generally dominated by the prospect of winning 500 dollars with
113
+ probability 1, but the prospect of losing 1000 dollars with probability 1/2 and losing zero otherwise
114
+ dominates the prospect of losing 500 dollars with probability 1, independently of initial wealth.
115
+ Based on such evidence, one is then led to interpret an asset’s return as the sum of two prospects,
116
+ one consisting of pure gains, and the other one of pure losses, and investors rank different assets’
117
+ returns based on the expectations and variances (µp, σ2
118
+ p, µn, σ2
119
+ n) of gains and losses. In particular,
120
+ higher variance of losses is compensated, ceteris paribus, by lower expectation µp of the gains.
121
+ The bilateral gamma distribution (Kuchler & Tappe (2008)) and its multivariate version (Madan
122
+ (2020b)) provide a natural modeling framework for such a preference specification for several rea-
123
+ sons. Firstly, it is the difference of two independent gamma variates, interpretable as gains and
124
+ losses, and it is completely specified by the vector (µp, σp, µn, σn) of their expected values and stan-
125
+ dard deviations. Secondly, even in a continuous time setting, the bilateral gamma process is the
126
+ difference of two independent gamma processes, while, for instance, path realizations of diffusion
127
+ processes have infinite variation. Thirdly, the bilateral gamma distribution provides a very good
128
+ fit to the (log) returns distribution implied by time series of returns and also by options prices
129
+ (Kuchler & Tappe (2008)), which shows that it is more suitable than, e.g., the normal distribution
130
+ for the purpose of modeling asset returns. Finally, as shown below, the expected utility of an asset
131
+ with bilateral gamma return X is a function F : (µp, σp, µn, σn) → E[u(X)], increasing in µp, and
132
+ decreasing in σp, µn and σn, so that under expected utility theory variations in (σp, µn, σn) are
133
+ compensated by variations of equal sign in µp.
134
+ Based on this considerations, we assume in this paper that the set of credible models M includes
135
+ the set of bilateral gamma random variables, and we learn bounds fM, fm : (σp, µp, σn) → µp for
136
+ µp given risks (σ2
137
+ p, µn, σ2
138
+ n) via quantile and/or distorted linear and/or Gaussian process regression.
139
+ An interesting result obtained is that both boundaries are generally increasing in (σp, µp), but
140
+ decreasing in σn, suggesting that investors, independently of their wealth, seek for lower (resp.
141
+ higher) risk when it comes to purely positive (resp. negative) processes. We test the boundaries
142
+ computed by assessing how well their implied performance measures (Sharpe ratio and acceptability
143
+ index) compare with those typically observed in the financial markets. Furthermore, we investigate
144
+ the linearity of fM and fm by comparing the results of a linear lower dimensional embedding and a
145
+ nonlinear one, and we show through a simple variation of a Lucas tree economy Lucas (1978) that
146
+ the behaviors observed are indeed consistent with prospects theory.
147
+ Finally, we move our attention to the risk neutral world, based on the suggestive interpretation
148
+ given in Madan (2020a) that, for bilateral gamma returns, the scale parameters (bp, bn) determine
149
+ the structure of limit orders, while the speed parameters (cp, cn) determine that of market orders.
150
+ It is then natural to assume that a relationship exists between the two pairs of parameters, in the
151
+ sense that for given (cp, cn), the scale parameters (bp, bn) are bounded to a specific range, as the
152
+ structure of market orders cannot be too independent from that of limit orders and viceversa. As
153
+ done for the statistical moments, the boundaries of such range are learned through quantile and
154
+ distorted regression. In this case, we determine theoretical boundaries as well based on the well
155
+ known robust representation of spectral risk measures (Madan & Schoutens (2021)), and evidence
156
+ is offered of their comparability with the empirically estimated ones.
157
+ The rest of the paper is organized as follows. First we show that for bilateral gamma returns,
158
+ risks and compensations are identified by the vector (σp, µn, σn) and µp respectively. Empirical
159
+
160
+ 4
161
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
162
+ observations are reported in section 3, and the variation on Lucas Tree model is presented in
163
+ section 4. Risk neutral parameters are analyzed in 5. Section 6 concludes.
164
+ 2. Bilateral Gamma Returns
165
+ 2.1. From Brownian Motion to Bilateral Gamma Process. Given its central role in this
166
+ paper, the construction and properties of the bilateral gamma process are reviewed in this section.
167
+ In Black & Scholes (1973), F. Black and M. Scholes proposed to model the dynamics of log-returns as
168
+ a Brownian motion (GBM), as prices exhibit exponential growth and on the assumption, rooted in
169
+ an entropy maximization argument (Madan (2020a)), that log returns are asymptotically normally
170
+ distributed.
171
+ However, returns exhibit heavier tails than those implied by the normal distribution (Fama
172
+ (1965)) and frequent discontinuities in their path trajectories. In addition, risk aversion results in
173
+ periods of intense trading, determined by widespread selling in securities, alternating with lower
174
+ activity ones, thus implying that returns’ quadratic variation is not linear in time. It also results
175
+ in higher demand for out of the money (OTM) than for the corresponding OTM calls, generating
176
+ a volatility smile.
177
+ Another entropy maximization argument then suggests modeling economic time as a gamma
178
+ process, and stock market log returns as Brownian motion evaluated at such gamma time. The
179
+ resulting process, pioneered by D. Madan and E. Seneta (Madan & Seneta (1990)) and termed the
180
+ variance gamma process, is a pure jump Levy process with infinite activity and finite variation. In
181
+ fact, such process is the difference of two i.i.d. gamma processes, which naturally correspond to
182
+ gains and losses. Finally, motivated by the fact that downward jumps in prices are generally higher
183
+ than upward ones, the bilateral gamma process is defined as the difference of two independent
184
+ gamma processes with different shape and scale parameters (Kuchler & Tappe (2008)). The gains
185
+ and losses increments have BG distribution βΓ(bp, cp, bn, cn), defined by the convolution
186
+ βΓ(bp, cp, bn, cn) = Γ(bp, cp) ∗ Γ(−bn, cn),
187
+ where bp, cp, bn, cn > 0 and, for α > 0, λ ∈ R, a Γ(λ, α)-distributed random variable has density
188
+ f(x) =
189
+ 1
190
+ Γ(α)|λ|α |x|α−1e−|x|/|λ| �
191
+ 11{λ>0}(x)11{x>0}(x) + 11{λ<0}(x)11{x<0}(x)
192
+
193
+ , x ∈ R
194
+ with Γ(α) the Gamma function at α. Then, expected value and standard deviation of gains and
195
+ losses, denoted respectively by µp, σp, µn and σn, are given by
196
+ µp = cpbp, σp = √cpbp, µn = cnbn, σn = √cnbn.
197
+ By the convolution theorem, the characteristic function of the increments in t units of time is
198
+ ϕt(u) = (1 − iubp)−tcp (1 + iubn)−tcn ,
199
+ (2.1)
200
+ and it follows easily from 2.1 that BG densities are stable under convolution and are infinitely
201
+ divisible, and so the BG process is a well defined Levy process. From formula 2.1 and the Levy-
202
+ Khintchine representation we also deduce its Levy density to be
203
+ k(x) =
204
+ �cp
205
+ x e−x/bp11{(0,∞)}(x) + cn
206
+ |x|e−|x|/bn11{(−∞,0)}(x)
207
+
208
+ , x ∈ R
209
+ which shows that a BG process enjoys the self decomposability property.1 Then (see Carr et al.
210
+ (207) and the references therein) a BG distributed random variable X is a limit law, i.e. there
211
+ are centering and scaling constants {cn}n∈N and {bn}n∈N and a sequence {Zk}k∈N of i.i.d. random
212
+ variables such that the distribution of bnSn + cn converges in distribution to X, where Sn =
213
+ 1A random variable X is self decomposable if for any 0 < c < 1 there is an independent random variable XC such
214
+ that X
215
+ d= cX + Xc. A Levy process enjoys the self decomposability property if its increments are self decomposable.
216
+
217
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
218
+ 5
219
+ �n
220
+ k=1 Zk. This is a remarkable property, since if returns consist of some average of a large number
221
+ of independent news or other type of influences, it is reasonable to expect that their distribution
222
+ should be well approximated by a limit law. In the GBM case such law is the Gaussian, but, as
223
+ noticed in Carr et al. (207), there is “no compelling economic motivation” for the scaling constants
224
+ to be √n as in the classical central limit theorem.
225
+ Evidence of the goodness of fit of the BG density to returns distributions is presented in Kuchler
226
+ & Tappe (2008), where, using data on DAX between 1996 and 1998, it is shown that the null
227
+ hypothesis that the log returns distribution is in the BG class is not rejected. Furthermore, as
228
+ proved in Kuchler & Tappe (2008), for all BG parameters there exists a measure Q equivalent
229
+ to P such that, under Q, the discounted exponential BG process is a (local) martingale and an
230
+ exponential BG process, and one typically succeed in fitting the option prices surface, at least for
231
+ a single fixed maturity, through an exponential BG process.
232
+ 2.2. Bilateral Gamma Returns under Expected Utility Theory. The notion and character-
233
+ izations of second order stochastic dominance (SSD) are recalled below (see Rothschild & Stiglitz
234
+ (1970)).
235
+ Definition 2.1. Given random variables X and Y , one says that X first (resp. second) order
236
+ stochastically dominates Y , i.e. X ⪰1 Y (resp. X ⪰2 Y ) if and only if E[u(X)] ≥ E[u(Y )] for
237
+ every increasing (resp. increasing and concave) real valued function u.
238
+ Theorem 2.2. Let X and Y be random variables with distribution functions F and G respectively.
239
+ Then, X ⪰1 Y if and only if G(t) ≥ F(t) for every t ∈ R.
240
+ Theorem 2.3. Let X and Y be random variables with distribution functions F and G respectively.
241
+ Then, the following are equivalent
242
+ (i) X ⪰2 Y ;
243
+ (ii) there are random variables Z and ε such that Y ∼ X + Z + ε, Z ≤ 0 and E[ε|X + Z] = 0;
244
+ (iii)
245
+ � t
246
+ −∞ G(s)ds ≥
247
+ � s
248
+ −∞ F(s)ds for every t ∈ R.
249
+ In addition, if E[X] = E[Y ], then the following are equivalent:
250
+ (i) X ⪰2 Y ;
251
+ (ii) there is a random variable ε such that Y ∼ X + ε and E[ε|X + Z] = 0;
252
+ (iii) E[u(X)] ≥ E[u(Y )] for every u concave.
253
+ Corollary 2.4. Suppose X ⪰2 Y . Then, E[X] ≥ E[Y ] and if E[X] = E[Y ] then V (X) ≤ V (Y ).
254
+ Proof. That E[X] ≥ E[Y ] if X ⪰2 Y follows immediately from the fact that the identity is non
255
+ decreasing and concave. If E[X] = E[Y ], then E[u(X)] ≥ E[u(Y )] for every u concave, and so,
256
+ setting u(x) = −x2 + E[X], one obtains V (X) = E[X2 − E[X]] ≤ E[Y 2 − E[X]] = V [Y ].
257
+
258
+ Thus, for bilateral gamma returns, SSD implies higher expected gains and/or lower expected
259
+ losses, and, for equal expected gains and losses, lower standard deviation of gains and/or losses. A
260
+ partial converse of this statement is shown below, and is based on the following results.
261
+ Theorem 2.5. Let X and Y be random variables with densities f and g. If the likelihood ratio f
262
+ g
263
+ is monotonically increasing, than X ⪰1 Y . If the likelihood ratio is monotonically increasing on
264
+ (−∞, x0) ∪ (x1, ∞) and decreasing on (x0, x1), with x0 < x1 ∈ R, then X ⪰2 Y .
265
+ Proof. See Ali (1975) and the references therein.
266
+
267
+ Theorem 2.6. Let X and Y be two gamma distributed random variable with scale and shape
268
+ parameters (b, c) and (b′, c′) respectively. Then,
269
+ (i) if b = b′, then c > c′ iff X ⪰2 Y ;
270
+ (ii) if c = c′, then b > b′ iff X ⪰2 Y ;
271
+
272
+ 6
273
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
274
+ (ii)
275
+ c
276
+ c′ ≤ max(1, b′
277
+ b ) with strict inequality at least when b′
278
+ b = 1 iff X ⪰2 Y .
279
+ Proof. Based on showing that the assumptions of theorem 2.5 are satisfied. See Ali (1975).
280
+
281
+ Corollary 2.7. Let X and Y be two gamma distributed random variables with scale and shape
282
+ parameters (b, c) and (b′, c′) respectively.
283
+ Then, X second order stochastically dominates Y if
284
+ E[X] ≥ E[Y ] and V [X] ≤ V [Y ] with at least one strict inequality. Similarly, −X second order
285
+ stochastically dominates −Y if E[X] ≤ E[Y ] and V [X] ≤ V [Y ] with at least one strict inequality.
286
+ Proof. Suppose E[X] ≥ E[Y ] and V [X] ≤ V [Y ] with at least one strict inequality, i.e. bc ≥ b′c′ and
287
+ b2c ≤ b′2c′ with at least one strict inequality. Then, c
288
+ c′ ≥ b′
289
+ b , and
290
+ b′
291
+ b = b′2c′
292
+ b2c
293
+ bc
294
+ b′c′ > 1
295
+ so X ⪰2 Y by Theorem 2.6. The result for −X and −Y follows from adapting Theorem 2.6 to the
296
+ case of the negative of gamma distributions.
297
+
298
+ Corollary 2.8. Let X+, X−, Y +, Y − be four gamma distributed random variable with scale and
299
+ shape parameters (bp, cp), (bn, cn), (b′
300
+ p, c′
301
+ p) and (b′
302
+ n, c′
303
+ n) respectively. Then, X := X+ − X− second
304
+ order stochastically dominates Y := Y +−Y − if E[X+] ≥ E[Y +], E[X−] ≤ E[Y −], V [X+] ≤ V [Y +],
305
+ and V [X−] ≤ V [Y −] with exactly one strict inequality.
306
+ Proof. Suppose for instance E[X+] > E[Y +]. Then, by Corollary 2.7, X+ ⪰2 Y +, and so, for all
307
+ t ∈ [0, ∞)
308
+ � t
309
+ 0
310
+ F +(s) − G+(s)ds ≤ 0,
311
+ where F + and G+ denote the cumulative distribution function of X+ and Y + respectively. Then,
312
+ using Tonelli’s theorem,
313
+ � t
314
+ 0
315
+ F(s) − G(s)ds =
316
+ � ∞
317
+ 0
318
+ � t
319
+ 0
320
+ F +(s − ξ) − G+(s − ξ)dsdF −(ξ) ≤ 0,
321
+ where F − is the (common) distribution of −X− and −Y −, and the conclusion follows from Theorem
322
+ 2.3. The other cases are similar.
323
+
324
+ Based on the last corollary and transitivity of SSD, the observation that a positive variation in
325
+ µp can compensate a positive variation in any among the upside volatility σp, the expected loss
326
+ prospect µn or the downside volatility σn is evidence of investors’ risk seeking behaviors.
327
+ Note that µp is not, in general, a “reward” accessible to an investor holding the asset. In fact,
328
+ for a given time horizon T the expected return for holding the asset is the value µ(T) that satisfies
329
+ S0eµ(T) = E[S0eXT ], and so the variation
330
+ lim
331
+ T↓0
332
+ µ(T)
333
+ T
334
+ =
335
+
336
+ R
337
+ (ex − 1)k(x)dx = (1 − bp)−cp(1 + bn)−cn
338
+ (2.2)
339
+ better serves this purpose. Thus, we refer to µp as a “compensation” for the risks (σp, µn, σn).
340
+ 2.2.1. Log-Returns and Kelly’s Criterion. In the case log returns are assumed to be bilateral gamma
341
+ variates, these results cannot hold anymore, since, for instance, an increase in σp and/or σn im-
342
+ plies higher expected value of the return, and it cannot imply second order stochastic dominance.
343
+ However, a traditional assumption in the financial and economics literature, justified by some ev-
344
+ idence (Arrow (1971)), is to assume that investors maximize log-returns. In our context, such an
345
+ assumption implies that an asset is preferred to another one if and only if the expected log-return
346
+ is higher. More generally, for asset allocation problems, logarithmic utility yields the best return
347
+ in the long run, assuming the investor faces a long sequence of investment decisions (Kelly (1956),
348
+
349
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
350
+ 7
351
+ Merton (1969), Cover (1991)), but for an investor with a short/medium term horizon, a logarithmic
352
+ utility will not capture aversion to short term high volatility (Samuelson (1979)), thus leading to
353
+ consider a utility specification with a coefficient of relative risk aversion (CRRA) bounded below by
354
+ 1.2 It then follows from the results of this section and proposition 2.2.1 below that, for a reasonable
355
+ utility specification such as u(log(·)), risks and their compensation are captured by (σp, µn, σn) and
356
+ µp respectively even when log-returns belong to the bilateral gamma class.
357
+ Proposition 2.9. A strictly increasing and concave function v ∈ C2 ((0, ∞)) has CRRA coefficient
358
+ greater than 1 if and only if there is a strictly increasing and concave function u ∈ C2(R) such that
359
+ v(x) = u(log(x)) for every x ∈ (0, ∞).
360
+ Proof. Suppose such a u exists. Then, for all x ∈ (0, ∞), u′′(log(x)) ≥ 0 and u′(log(x)) < 0
361
+ xv′′(x)
362
+ v′(x) = −x
363
+ d2
364
+ dx2 u(log(x))
365
+ d
366
+ dxu(log(x)) = 1 − u′′(log(x))
367
+ u′(log(x)) ≥ 1.
368
+ On the other hand, if v has CRRA bounded below by 1, then, setting u(y) = v(ey) for every y ∈ R,
369
+ we obtain u′(y) = v′(ey)ey > 0 and u′′(y) = v′′(ey)e2y + v′(ey)ey ≤ 0.
370
+
371
+ 3. The Acceptance Set
372
+ 3.1. Learning the Boundaries. As mentioned in the introduction, not all quadruples (µp, σp, µn, σn)
373
+ can be traded, or, in other words, there are structural limits to how high and/or low is the level
374
+ of rewards that can be offered for given risks. In order to determine such limits, moments of gains
375
+ and losses were estimated for 184 stocks (whose ticker is reported in appendix A) for the period
376
+ 01/01/2008 to 31/12/2020 using one year of data for each estimate.3 Assuming the boundaries are
377
+ defined by functions fm, fM : (σp, µn, σn) → µp, we find fM and fm by solving, respectively,
378
+ min
379
+ f∈F(1 − τM)
380
+
381
+ i
382
+ [µp(i) − fM(σp(i), µn(i), σn(i))]+ − τM
383
+
384
+ i
385
+ [µp(i) − fM(σp(i), µn(i), σn(i))]− ,
386
+ min
387
+ f∈F(1 − τm)
388
+
389
+ i
390
+ [µp(i) − fm(σp(i), µn(i), σn(i))]+ − τm
391
+
392
+ i
393
+ [µp(i) − fm(σp(i), µn(i), σn(i))]− ,
394
+ where F is a suitable class of functions which is here assumed to be the class of linear Gaussian
395
+ process (GPR) regressors, τM = 0.95 and τm = 0.05. In our implementation of quantile GPR,
396
+ the kernel hyperparameters were estimated using the standard loss function, while the regression
397
+ coefficients are chosen to maximize the quantile loss function. Specifically, recall that GPR assumes
398
+ µp = α + h(σp, µnσn)T β + f(σp, µnσn) + ε,
399
+ (3.1)
400
+ where ε is noise with variance σ2
401
+ ε, h is the map to features space (here assumed to be the identity),
402
+ and where any finite number collection {f(σp, µnσn)} is assumed to have Gaussian distribution with
403
+ mean 0 and covariance function κ((σp, µnσn), (σp, µnσn)′). The prediction µp for x = (σp, µn, σn)
404
+ given n observations (µi
405
+ p, σi
406
+ p, µi
407
+ n, σi
408
+ n) is then given by (see Rasmussen & Williams (2006))
409
+ µp =
410
+ �κ(x1, x)
411
+ ...
412
+ κ(xn, x)�
413
+
414
+
415
+
416
+
417
+ ��
418
+ (κ(x1, x1)
419
+ . . .
420
+ κ(x1, xn)
421
+ ...
422
+ (κ(xn, x1)
423
+ . . .
424
+ κ(xn, xn)
425
+
426
+ ��
427
+ i,j
428
+ + σ2
429
+ εI
430
+
431
+
432
+
433
+ −1 �
434
+ ��
435
+ µ1
436
+ p
437
+ ...
438
+ µn
439
+ p
440
+
441
+ �� ,
442
+ where we let xi = (σi
443
+ p, µi
444
+ n, σi
445
+ n). Here we take κ to be the squared exponential kernel, with parameters
446
+ estimated based on the standard loss function. The vector β and the intercept α are instead chosen
447
+ by minimization of the quantile loss function.
448
+ 2In fact, several empirical studies provide evidence for this to be the case (see e.g. Friend & Blume (1975)).
449
+ 3Observations are results of likelihood optimization, so 1% of outliers were excluded.
450
+
451
+ 8
452
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
453
+ The linear estimates obtained for fm and fM are
454
+ fm(σp, µn, σn) = 0.0017 + 0.2029σp + 0.9951µn − 0.3711σn,
455
+ fM(σp, µn, σn) = 0.0017 + 0.2710σp + 1.0102µn − 0.2311σn.
456
+ Note, in particular, the negative relationship between σn and µp.
457
+ Similarly, for quantile GPR, ∂fm
458
+ ∂σn are always negative, while ∂fM
459
+ ∂σn are positive at all but two of 16
460
+ representative points (table 1).
461
+ ∂fM
462
+ ∂σp
463
+ ∂fM
464
+ ∂µn
465
+ ∂fM
466
+ ∂σn
467
+ ∂fm
468
+ ∂σp
469
+ ∂fm
470
+ ∂µn
471
+ ∂fm
472
+ ∂σn
473
+ 0.2667
474
+ 2.4704
475
+ 0.7577
476
+ -0.0130
477
+ 2.0042
478
+ -0.2421
479
+ 0.8691
480
+ 1.9402
481
+ -1.3539
482
+ 1.1140
483
+ 1.8974
484
+ -0.8361
485
+ 1.5243
486
+ 1.9553
487
+ -1.1134
488
+ 1.4108
489
+ 1.9274
490
+ -1.2346
491
+ 1.0459
492
+ 2.0254
493
+ -0.4887
494
+ 0.5666
495
+ 1.9927
496
+ -1.2635
497
+ 1.0867
498
+ 1.9956
499
+ -1.0836
500
+ 0.8823
501
+ 2.0199
502
+ -1.2220
503
+ 0.4639
504
+ 2.0065
505
+ -1.4194
506
+ 0.6053
507
+ 2.0648
508
+ -1.1568
509
+ 1.3013
510
+ 2.0509
511
+ -1.4681
512
+ 1.2715
513
+ 2.0128
514
+ -1.4149
515
+ 0.9669
516
+ 2.0019
517
+ -0.2462
518
+ 0.4477
519
+ 1.9760
520
+ -1.0806
521
+ 1.4434
522
+ 2.2522
523
+ 0.3978
524
+ 0.5052
525
+ 2.0026
526
+ -0.5761
527
+ 0.9710
528
+ 1.9465
529
+ -0.9840
530
+ 0.9472
531
+ 1.8900
532
+ -0.8995
533
+ 1.0653
534
+ 1.9423
535
+ -1.4702
536
+ 1.3075
537
+ 1.9230
538
+ -0.9990
539
+ 0.9307
540
+ 1.9594
541
+ -0.5941
542
+ 0.6044
543
+ 1.9087
544
+ -1.0416
545
+ 1.3390
546
+ 2.0444
547
+ -1.8664
548
+ 1.4529
549
+ 2.0287
550
+ -1.5394
551
+ 0.8652
552
+ 1.9872
553
+ -1.3001
554
+ 0.9281
555
+ 2.0499
556
+ -1.0898
557
+ 1.1957
558
+ 2.0398
559
+ -0.9586
560
+ 0.9027
561
+ 1.9967
562
+ -1.3931
563
+ 0.9283
564
+ 1.9956
565
+ -0.0906
566
+ 0.3913
567
+ 1.9830
568
+ -0.9539
569
+ Table 1. Boundaries gradients (estimated via Quantile GPR), at 16 representative points.
570
+ Alternatively, fm and fM can be obtained via distorted least square (Madan & Schoutens (2021)),
571
+ i.e. solving
572
+ min
573
+ f∈F
574
+
575
+ i
576
+ r2
577
+ i
578
+
579
+ Ψ(qi) − Ψ
580
+
581
+ qi − 1
582
+ n
583
+ ��
584
+ ,
585
+ (3.2)
586
+ where, for every i,
587
+ ri := µp(i) − f(σp(i), µn(i), σn(i)
588
+ is the residual corresponding to the i-th observation, Ψ : [0, 1] → [0, 1] is a distribution function
589
+ (called a distortion) concave for fm and convex for fM, and qi is the i-th quantile of the residual’s
590
+ empirical distribution.
591
+ The idea behind 3.2 is as follows. First, Ψ defines a distorted expectation EΨ[X] of a random
592
+ variable X with distribution function F, as the Stjielties integral with respect to the distribution
593
+ function Ψ ◦ F:
594
+ EΨ[X] :=
595
+
596
+ R
597
+ xdΨ(F(x)).
598
+ If Ψ is concave, lower values of X are weighted higher, thus implying EΨ[X] ≤ E[X], while the
599
+ opposite is true if Ψ is convex. Next, given observations {xi}n
600
+ i=0 of X, EΨ[X] is estimated by
601
+ n
602
+
603
+ i=1
604
+ x(i)
605
+
606
+ Ψ(F(x(i))) − Ψ(F(x(i−1)))
607
+
608
+
609
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
610
+ 9
611
+ where {xi}i=1,...,n is the ordered sample. If F is unknown, this estimator can be replaced by
612
+ n
613
+
614
+ i=1
615
+ xi
616
+
617
+ Ψ (qi) − Ψ
618
+
619
+ qi − 1
620
+ n
621
+ ��
622
+ ,
623
+ so the loss function 3.2 corresponds to minimizing the estimated distorted expectation of the squared
624
+ residual. By the tower property of (nonlinear) conditional expectations, the solution to problem
625
+ 3.2 minimizes the distorted squared distance to the estimate of EΨ[µp|σp, µn, σn] and so, for an
626
+ appropriate distortion, it can be thought as a lower/upper bound to the range of compensation µp
627
+ given the risks (σp, µn, σn). Following Madan & Schoutens (2021), we set γ = 0.75 and define, for
628
+ u ∈ [0, 1],
629
+ Ψ(u) = 1 −
630
+
631
+ 1 − u
632
+ 1
633
+ 1+γ
634
+ �1+γ
635
+ .
636
+ (3.3)
637
+ The linear estimates obtained for fm and fM obtained via distorted least square are
638
+ fm(σp, µn, σn) = 0.0024 + 0.1118σp + 0.9276µn − 0.2596σn,
639
+ fM(σp, µn, σn) = 0.0002 + 0.3604σp + 1.0196µn − 0.1798σn,
640
+ while the gradient at 16 representative points of the GPR estimates is shown in table 2.
641
+ ∂fM
642
+ ∂σp
643
+ ∂fM
644
+ ∂µn
645
+ ∂fM
646
+ ∂σn
647
+ ∂fm
648
+ ∂σp
649
+ ∂fm
650
+ ∂µn
651
+ ∂fm
652
+ ∂σn
653
+ -0.0887
654
+ 1.9864
655
+ 0.6572
656
+ 0.0790
657
+ 2.0073
658
+ -0.1164
659
+ 1.4815
660
+ 1.9431
661
+ -0.3117
662
+ 0.5231
663
+ 1.8825
664
+ -1.8317
665
+ 1.1663
666
+ 1.9467
667
+ -1.8564
668
+ 1.6447
669
+ 1.9112
670
+ -0.6290
671
+ 0.8911
672
+ 2.0018
673
+ -0.7190
674
+ 0.6395
675
+ 1.9916
676
+ -1.1617
677
+ 1.2837
678
+ 1.9852
679
+ -0.6655
680
+ 0.6932
681
+ 2.0128
682
+ -1.5889
683
+ 0.7569
684
+ 1.9771
685
+ -0.9006
686
+ 0.3673
687
+ 2.1029
688
+ -1.5779
689
+ 1.6313
690
+ 2.0300
691
+ -0.8589
692
+ 0.9376
693
+ 2.0127
694
+ -2.0179
695
+ 0.7577
696
+ 1.9821
697
+ -0.5676
698
+ 0.5676
699
+ 1.9736
700
+ -0.8992
701
+ 0.5482
702
+ 2.0124
703
+ -0.3588
704
+ 0.7854
705
+ 2.0058
706
+ -0.0587
707
+ 1.2923
708
+ 1.9270
709
+ -0.3932
710
+ 0.6114
711
+ 1.8902
712
+ -1.5024
713
+ 1.5750
714
+ 1.9676
715
+ -0.7003
716
+ 0.8115
717
+ 1.8921
718
+ -1.7373
719
+ 0.9369
720
+ 1.9325
721
+ -0.5317
722
+ 0.5394
723
+ 1.9128
724
+ -1.1926
725
+ 1.8380
726
+ 2.0261
727
+ -0.9785
728
+ 0.9812
729
+ 2.0308
730
+ -2.3639
731
+ 1.2369
732
+ 1.9782
733
+ -0.6258
734
+ 0.6211
735
+ 2.0585
736
+ -1.6346
737
+ 1.2424
738
+ 2.0136
739
+ -0.8368
740
+ 0.8070
741
+ 1.9979
742
+ -1.5882
743
+ 0.6792
744
+ 1.9826
745
+ -0.4806
746
+ 0.5497
747
+ 1.9767
748
+ -0.7058
749
+ Table 2. Boundaries gradients via Distorted GPR at 16 representative points.
750
+ Finally, we show in table 3 the percentages of observations represented by each of the 16 quantized
751
+ points.
752
+ µp
753
+ 0.0694
754
+ 0.0208
755
+ 0.0343
756
+ 0.0167
757
+ 0.0685
758
+ 0.1428
759
+ 0.0308
760
+ 0.0119
761
+ %
762
+ 0.70
763
+ 0.76
764
+ 3.53
765
+ 10.49
766
+ 1.79
767
+ 0.72
768
+ 5.66
769
+ 14.99
770
+ µp
771
+ 0.0467
772
+ 0.0165
773
+ 0.0260
774
+ 0.0130
775
+ 0.0453
776
+ 0.1002
777
+ 0.0225
778
+ 0.0088
779
+ %
780
+ 2.11
781
+ 11.22
782
+ 5.52
783
+ 12.11
784
+ 2.87
785
+ 1.19
786
+ 8.33
787
+ 11.00
788
+ Table 3. Percentage of observations represented by quantized point µp.
789
+
790
+ 10
791
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
792
+ 3.2. Implied Boundaries for Performance Measures. Table 4-15 show boundaries for µp,
793
+ Sharpe ratio and acceptability index at the 16 quantized points. 4
794
+ As observed in Madan & Eberlein (2009), typically acceptability indexes based on the MIN-
795
+ MAXVAR distortion for returns on stocks and indexes are less than 0.15, with median values of
796
+ 0.04 and more than 5% of observations at 0. These findings are consistent with the boundaries for
797
+ the acceptability index at the 16 representative points shown in table 13 for both short and long
798
+ positions. Note also that the acceptability index tends to be higher for long positions, which is also
799
+ to be expected.
800
+ Upper
801
+ Boundary
802
+ Observation
803
+ Lower
804
+ Boundary
805
+ Upper
806
+ Boundary
807
+ Observation
808
+ Lower
809
+ Boundary
810
+ 0.0752
811
+ 0.0694
812
+ 0.0653
813
+ 0.0512
814
+ 0.0467
815
+ 0.0427
816
+ 0.0228
817
+ 0.0208
818
+ 0.0189
819
+ 0.0180
820
+ 0.0165
821
+ 0.0149
822
+ 0.0379
823
+ 0.0343
824
+ 0.0315
825
+ 0.0287
826
+ 0.0260
827
+ 0.0238
828
+ 0.0177
829
+ 0.0167
830
+ 0.0157
831
+ 0.0143
832
+ 0.0130
833
+ 0.0119
834
+ 0.0701
835
+ 0.0685
836
+ 0.0665
837
+ 0.0470
838
+ 0.0453
839
+ 0.0432
840
+ 0.1459
841
+ 0.1428
842
+ 0.1402
843
+ 0.1025
844
+ 0.1002
845
+ 0.0980
846
+ 0.0324
847
+ 0.0308
848
+ 0.0292
849
+ 0.0238
850
+ 0.0225
851
+ 0.0212
852
+ 0.0127
853
+ 0.0119
854
+ 0.0109
855
+ 0.0097
856
+ 0.0088
857
+ 0.0082
858
+ Table 4. µp boundaries estimated via Quantile Regression, at 16 representative points.
859
+ Upper
860
+ Boundary
861
+ Observation
862
+ Lower
863
+ Boundary
864
+ Upper
865
+ Boundary
866
+ Observation
867
+ Lower
868
+ Boundary
869
+ 0.0856
870
+ 0.0694
871
+ 0.0697
872
+ 0.0536
873
+ 0.0467
874
+ 0.0469
875
+ 0.0224
876
+ 0.0208
877
+ 0.0190
878
+ 0.0184
879
+ 0.0165
880
+ 0.0143
881
+ 0.0348
882
+ 0.0343
883
+ 0.0339
884
+ 0.0269
885
+ 0.0260
886
+ 0.0252
887
+ 0.0180
888
+ 0.0167
889
+ 0.0153
890
+ 0.0147
891
+ 0.0130
892
+ 0.0112
893
+ 0.0706
894
+ 0.0685
895
+ 0.0661
896
+ 0.0473
897
+ 0.0453
898
+ 0.0428
899
+ 0.1440
900
+ 0.1428
901
+ 0.1421
902
+ 0.1024
903
+ 0.1002
904
+ 0.0986
905
+ 0.0329
906
+ 0.0308
907
+ 0.0284
908
+ 0.0243
909
+ 0.0225
910
+ 0.0204
911
+ 0.0127
912
+ 0.0119
913
+ 0.0107
914
+ 0.0092
915
+ 0.0088
916
+ 0.0081
917
+ Table 5. µp boundaries estimated via Quantile GPR, at 16 representative points.
918
+ 3.3. Dimensional Analysis. As visible from tables 4-7, the different methodologies do not pro-
919
+ duce significantly different estimates for the boundaries fm and fM, and one may wonder if such
920
+ boundaries are indeed linear. As the boundaries are close to each others one way to assess if this is
921
+ the case is to compare the variance of the noise of a linear lower dimensional embedding with that
922
+ of a nonlinear one.5 Our results, summarized in table, provide evidence of the linearity of fm and
923
+ fM.
924
+ 4The definition of Sharpe ratio adopted here is simply given by
925
+ µ
926
+
927
+ t
928
+ σ , with µ = µp − µn, σ2 = σ2
929
+ p + σ2
930
+ n and
931
+ t = 250 business days. The acceptability index is defined in Madan & Eberlein (2009) as the maximal γ such that
932
+ the distorted expectation EΨγ [X] is nonnegative (or nonpositive for short position), where Ψγ is again taken as the
933
+ MINMAXVAR distortion.
934
+ 5For the nonlinear embedding we utilize the Diffusion map algorithm, recently introduced in Coifman & Lafon
935
+ (2006).
936
+
937
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
938
+ 11
939
+ Upper
940
+ Boundary
941
+ Observation
942
+ Lower
943
+ Boundary
944
+ Upper
945
+ Boundary
946
+ Observation
947
+ Lower
948
+ Boundary
949
+ 0.0756
950
+ 0.0694
951
+ 0.0644
952
+ 0.0513
953
+ 0.0467
954
+ 0.0427
955
+ 0.0223
956
+ 0.0208
957
+ 0.0193
958
+ 0.0175
959
+ 0.0165
960
+ 0.0154
961
+ 0.0377
962
+ 0.0343
963
+ 0.0317
964
+ 0.0284
965
+ 0.0260
966
+ 0.0241
967
+ 0.0172
968
+ 0.0167
969
+ 0.0161
970
+ 0.0137
971
+ 0.0130
972
+ 0.0123
973
+ 0.0699
974
+ 0.0685
975
+ 0.0676
976
+ 0.0467
977
+ 0.0453
978
+ 0.0439
979
+ 0.1461
980
+ 0.1428
981
+ 0.1416
982
+ 0.1025
983
+ 0.1002
984
+ 0.0992
985
+ 0.0320
986
+ 0.0308
987
+ 0.0297
988
+ 0.0233
989
+ 0.0225
990
+ 0.0216
991
+ 0.0121
992
+ 0.0119
993
+ 0.0114
994
+ 0.0090
995
+ 0.0088
996
+ 0.0086
997
+ Table 6. µp boundaries via Distorted LS at 16 representative points.
998
+ Upper
999
+ Boundary
1000
+ Observation
1001
+ Lower
1002
+ Boundary
1003
+ Upper
1004
+ Boundary
1005
+ Observation
1006
+ Lower
1007
+ Boundary
1008
+ 0.0751
1009
+ 0.0694
1010
+ 0.0694
1011
+ 0.0511
1012
+ 0.0467
1013
+ 0.0453
1014
+ 0.0245
1015
+ 0.0208
1016
+ 0.0167
1017
+ 0.0182
1018
+ 0.0165
1019
+ 0.0143
1020
+ 0.0409
1021
+ 0.0343
1022
+ 0.0274
1023
+ 0.0325
1024
+ 0.0260
1025
+ 0.0193
1026
+ 0.0172
1027
+ 0.0167
1028
+ 0.0161
1029
+ 0.0138
1030
+ 0.0130
1031
+ 0.0120
1032
+ 0.0694
1033
+ 0.0685
1034
+ 0.0664
1035
+ 0.0475
1036
+ 0.0453
1037
+ 0.0420
1038
+ 0.1446
1039
+ 0.1428
1040
+ 0.1410
1041
+ 0.1021
1042
+ 0.1002
1043
+ 0.0982
1044
+ 0.0324
1045
+ 0.0308
1046
+ 0.0284
1047
+ 0.0233
1048
+ 0.0225
1049
+ 0.0212
1050
+ 0.0122
1051
+ 0.0119
1052
+ 0.0114
1053
+ 0.0091
1054
+ 0.0088
1055
+ 0.0086
1056
+ Table 7. µp boundaries via Distorted GPR at 16 representative points.
1057
+ Upper
1058
+ Boundary
1059
+ Observation
1060
+ Lower
1061
+ Boundary
1062
+ Upper
1063
+ Boundary
1064
+ Observation
1065
+ Lower
1066
+ Boundary
1067
+ 1.3983
1068
+ -0.1280
1069
+ -1.2170
1070
+ 1.0860
1071
+ -0.2864
1072
+ -1.5225
1073
+ 1.6557
1074
+ 0.3176
1075
+ -0.9488
1076
+ 1.9242
1077
+ 0.6302
1078
+ -0.6800
1079
+ 1.1930
1080
+ -0.2494
1081
+ -1.4179
1082
+ 1.4190
1083
+ -0.0292
1084
+ -1.1870
1085
+ 2.9743
1086
+ 1.6717
1087
+ 0.3023
1088
+ 2.3051
1089
+ 0.9589
1090
+ -0.2970
1091
+ 2.4155
1092
+ 0.9010
1093
+ -0.9568
1094
+ 2.0173
1095
+ 0.7184
1096
+ -0.9007
1097
+ 2.5615
1098
+ 0.5177
1099
+ -1.2321
1100
+ 2.5085
1101
+ 0.6926
1102
+ -1.0699
1103
+ 2.1170
1104
+ 0.7360
1105
+ -0.6640
1106
+ 2.4731
1107
+ 1.1418
1108
+ -0.2466
1109
+ 3.1653
1110
+ 1.8893
1111
+ 0.5564
1112
+ 3.5950
1113
+ 2.2045
1114
+ 1.0172
1115
+ Table 8. Sharpe ratio boundaries via Quantile Regression at 16 representative points.
1116
+ Upper
1117
+ Boundary
1118
+ Observation
1119
+ Lower
1120
+ Boundary
1121
+ Upper
1122
+ Boundary
1123
+ Observation
1124
+ Lower
1125
+ Boundary
1126
+ 4.0960
1127
+ -0.1253
1128
+ -0.0500
1129
+ 1.7966
1130
+ -0.2803
1131
+ -0.2231
1132
+ 1.4038
1133
+ 0.3108
1134
+ -0.8727
1135
+ 2.2708
1136
+ 0.6168
1137
+ -1.1672
1138
+ -0.0615
1139
+ -0.2441
1140
+ -0.4023
1141
+ 0.4234
1142
+ -0.0286
1143
+ -0.4702
1144
+ 3.2179
1145
+ 1.6361
1146
+ -0.1370
1147
+ 2.7574
1148
+ 0.9385
1149
+ -0.9590
1150
+ 2.7685
1151
+ 0.8818
1152
+ -1.3389
1153
+ 2.1867
1154
+ 0.7031
1155
+ -1.2120
1156
+ 1.2525
1157
+ 0.5067
1158
+ 0.0483
1159
+ 2.3867
1160
+ 0.6779
1161
+ -0.5442
1162
+ 2.4903
1163
+ 0.7203
1164
+ -1.2574
1165
+ 2.9818
1166
+ 1.1174
1167
+ -0.9577
1168
+ 3.0642
1169
+ 1.8490
1170
+ 0.2862
1171
+ 2.7892
1172
+ 2.1576
1173
+ 0.9789
1174
+ Table 9. Sharpe ratio boundaries via Quantile GPR, at 16 representative points.
1175
+
1176
+ 12
1177
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
1178
+ Upper
1179
+ Boundary
1180
+ Observation
1181
+ Lower
1182
+ Boundary
1183
+ Upper
1184
+ Boundary
1185
+ Observation
1186
+ Lower
1187
+ Boundary
1188
+ 1.5043
1189
+ -0.1280
1190
+ -1.4702
1191
+ 1.1167
1192
+ -0.2864
1193
+ -1.5371
1194
+ 1.3725
1195
+ 0.3176
1196
+ -0.6988
1197
+ 1.4923
1198
+ 0.6302
1199
+ -0.3014
1200
+ 1.1352
1201
+ -0.2494
1202
+ -1.3296
1203
+ 1.2542
1204
+ -0.0292
1205
+ -1.0275
1206
+ 2.2277
1207
+ 1.6717
1208
+ 0.8526
1209
+ 1.6831
1210
+ 0.9589
1211
+ 0.2273
1212
+ 2.1671
1213
+ 0.9010
1214
+ 0.0706
1215
+ 1.7605
1216
+ 0.7184
1217
+ -0.3756
1218
+ 2.7175
1219
+ 0.5177
1220
+ -0.2952
1221
+ 2.4707
1222
+ 0.6926
1223
+ -0.1181
1224
+ 1.7489
1225
+ 0.7360
1226
+ -0.2058
1227
+ 1.9404
1228
+ 1.1418
1229
+ 0.2373
1230
+ 2.2607
1231
+ 1.8893
1232
+ 1.1881
1233
+ 2.4546
1234
+ 2.2045
1235
+ 1.8048
1236
+ Table 10. Sharpe ratio boundaries via Distorted LS at 16 representative points.
1237
+ Upper
1238
+ Boundary
1239
+ Observation
1240
+ Lower
1241
+ Boundary
1242
+ Upper
1243
+ Boundary
1244
+ Observation
1245
+ Lower
1246
+ Boundary
1247
+ 1.3460
1248
+ -0.1253
1249
+ -0.1301
1250
+ 1.0333
1251
+ -0.2803
1252
+ -0.7017
1253
+ 2.7489
1254
+ 0.3108
1255
+ -2.4183
1256
+ 2.0463
1257
+ 0.6168
1258
+ -1.2065
1259
+ 2.3787
1260
+ -0.2441
1261
+ -3.0308
1262
+ 3.3902
1263
+ -0.0286
1264
+ -3.5272
1265
+ 2.1957
1266
+ 1.6361
1267
+ 0.8460
1268
+ 1.7904
1269
+ 0.9385
1270
+ -0.1558
1271
+ 1.6968
1272
+ 0.8818
1273
+ -1.0488
1274
+ 2.3775
1275
+ 0.7031
1276
+ -1.8278
1277
+ 1.6345
1278
+ 0.5067
1279
+ -0.6340
1280
+ 2.1028
1281
+ 0.6779
1282
+ -0.9154
1283
+ 2.0997
1284
+ 0.7203
1285
+ -1.2531
1286
+ 1.9408
1287
+ 1.1174
1288
+ -0.2121
1289
+ 2.3064
1290
+ 1.8490
1291
+ 1.2318
1292
+ 2.5459
1293
+ 2.1576
1294
+ 1.7381
1295
+ Table 11. Sharpe ratio boundaries via Distorted GPR at 16 representative points.
1296
+ Upper
1297
+ Boundary
1298
+ Observation
1299
+ Lower
1300
+ Boundary
1301
+ Upper
1302
+ Boundary
1303
+ Observation
1304
+ Lower
1305
+ Boundary
1306
+ 0.0570
1307
+ 0.0036
1308
+ -0.0000
1309
+ 0.0457
1310
+ -0.0000
1311
+ 0.0000
1312
+ 0.0667
1313
+ 0.0188
1314
+ 0.0000
1315
+ 0.0750
1316
+ 0.0283
1317
+ -0.0000
1318
+ 0.0497
1319
+ -0.0000
1320
+ 0.0000
1321
+ 0.0578
1322
+ 0.0065
1323
+ 0.0000
1324
+ 0.1132
1325
+ 0.0637
1326
+ 0.0123
1327
+ 0.0877
1328
+ 0.0394
1329
+ 0.0000
1330
+ 0.0949
1331
+ 0.0378
1332
+ 0.0000
1333
+ 0.0809
1334
+ 0.0306
1335
+ 0.0000
1336
+ 0.1027
1337
+ 0.0249
1338
+ -0.0000
1339
+ 0.1002
1340
+ 0.0309
1341
+ 0.0000
1342
+ 0.0831
1343
+ 0.0303
1344
+ 0.0000
1345
+ 0.0957
1346
+ 0.0448
1347
+ -0.0000
1348
+ 0.1207
1349
+ 0.0740
1350
+ 0.0210
1351
+ 0.1367
1352
+ 0.0858
1353
+ 0.0376
1354
+ Table 12. Acceptability index boundaries via Quantile Regression at 16 representative
1355
+ points.
1356
+ Upper
1357
+ Boundary
1358
+ Observation
1359
+ Lower
1360
+ Boundary
1361
+ Upper
1362
+ Boundary
1363
+ Observation
1364
+ Lower
1365
+ Boundary
1366
+ 0.1513
1367
+ -0.0039
1368
+ -0.0030
1369
+ 0.0646
1370
+ -0.0097
1371
+ -0.0087
1372
+ 0.0506
1373
+ 0.0308
1374
+ -0.0109
1375
+ 0.0824
1376
+ 0.0413
1377
+ -0.0222
1378
+ -0.0150
1379
+ -0.0083
1380
+ -0.0017
1381
+ 0.0174
1382
+ -0.0153
1383
+ -0.0008
1384
+ 0.1171
1385
+ 0.0588
1386
+ -0.0057
1387
+ 0.1004
1388
+ 0.0338
1389
+ -0.0338
1390
+ 0.1010
1391
+ 0.0487
1392
+ -0.0322
1393
+ 0.0793
1394
+ 0.0440
1395
+ -0.0255
1396
+ 0.0454
1397
+ 0.0188
1398
+ 0.0006
1399
+ 0.0870
1400
+ 0.0248
1401
+ -0.0203
1402
+ 0.0904
1403
+ 0.0455
1404
+ -0.0261
1405
+ 0.1089
1406
+ 0.0403
1407
+ -0.0346
1408
+ 0.1120
1409
+ 0.0674
1410
+ 0.0092
1411
+ 0.1017
1412
+ 0.0781
1413
+ 0.0341
1414
+ Table 13. Acceptability index boundaries via Quantile GPR at 16 representative points.
1415
+
1416
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
1417
+ 13
1418
+ Upper
1419
+ Boundary
1420
+ Observation
1421
+ Lower
1422
+ Boundary
1423
+ Upper
1424
+ Boundary
1425
+ Observation
1426
+ Lower
1427
+ Boundary
1428
+ 0.0544
1429
+ 0.0036
1430
+ -0.0000
1431
+ 0.0408
1432
+ 0.0000
1433
+ 0.0000
1434
+ 0.0504
1435
+ 0.0189
1436
+ -0.0000
1437
+ 0.0525
1438
+ 0.0288
1439
+ -0.0000
1440
+ 0.0413
1441
+ 0.0000
1442
+ -0.0000
1443
+ 0.0456
1444
+ 0.0065
1445
+ 0.0000
1446
+ 0.0801
1447
+ 0.0637
1448
+ 0.0365
1449
+ 0.0586
1450
+ 0.0395
1451
+ 0.0135
1452
+ 0.0804
1453
+ 0.0378
1454
+ 0.0130
1455
+ 0.0650
1456
+ 0.0306
1457
+ -0.0000
1458
+ 0.1017
1459
+ 0.0249
1460
+ 0.0013
1461
+ 0.0920
1462
+ 0.0308
1463
+ 0.0070
1464
+ 0.0641
1465
+ 0.0305
1466
+ 0.0024
1467
+ 0.0702
1468
+ 0.0451
1469
+ 0.0166
1470
+ 0.0813
1471
+ 0.0734
1472
+ 0.0493
1473
+ 0.0877
1474
+ 0.0856
1475
+ 0.0695
1476
+ Table 14. Acceptability index boundaries via Distorted LS, at 16 representative points.
1477
+ Upper
1478
+ Boundary
1479
+ Observation
1480
+ Lower
1481
+ Boundary
1482
+ Upper
1483
+ Boundary
1484
+ Observation
1485
+ Lower
1486
+ Boundary
1487
+ 0.0490
1488
+ -0.0058
1489
+ -0.0036
1490
+ 0.0369
1491
+ -0.0256
1492
+ -0.0099
1493
+ 0.0995
1494
+ 0.0866
1495
+ -0.0107
1496
+ 0.0741
1497
+ 0.0427
1498
+ -0.0222
1499
+ 0.1140
1500
+ -0.0838
1501
+ -0.0102
1502
+ 0.1328
1503
+ -0.1211
1504
+ -0.0027
1505
+ 0.0796
1506
+ 0.0588
1507
+ 0.0290
1508
+ 0.0650
1509
+ 0.0337
1510
+ -0.0053
1511
+ 0.0616
1512
+ 0.0382
1513
+ -0.0322
1514
+ 0.0861
1515
+ 0.0662
1516
+ -0.0255
1517
+ 0.0593
1518
+ 0.0235
1519
+ -0.0188
1520
+ 0.0765
1521
+ 0.0335
1522
+ -0.0248
1523
+ 0.0757
1524
+ 0.0454
1525
+ -0.0262
1526
+ 0.0701
1527
+ 0.0403
1528
+ -0.0083
1529
+ 0.0835
1530
+ 0.0670
1531
+ 0.0423
1532
+ 0.0922
1533
+ 0.0777
1534
+ 0.0614
1535
+ Table 15. Acceptability index boundaries via Distorted GPR, at 16 representative points.
1536
+ PCA
1537
+ cumulative weight (in %)
1538
+ Diffusion Map
1539
+ cumulative weight (in %)
1540
+ λ1
1541
+ 2.7529
1542
+ 68.82
1543
+ 0.0113
1544
+ 70.27
1545
+ λ2
1546
+ 1.1778
1547
+ 98.27
1548
+ 0.0045
1549
+ 98.58
1550
+ λ3
1551
+ 0.0685
1552
+ 99.98
1553
+ 0.0002
1554
+ 99.64
1555
+ λ4
1556
+ 0.0009
1557
+ 100.0
1558
+ 0.0001
1559
+ 100.0
1560
+ Table 16. Eigenvalues’s weights for PCA and diffusion map on the quantized dataset.
1561
+ 4. A Simple Modification of a Lucas Tree Economy
1562
+ To formally link the risk-seeking behaviors observed above with those of prospects theory consider
1563
+ the following modification of a Lucas tree economy (Lucas (1978)). There are two periods, and each
1564
+ agent is endowed with a single risky asset with payoff Si at the end of period i, i = 0, 1. Assume
1565
+ S1 = S0eG−L, where G and L are independent gamma distributed random variables. Suppose there
1566
+ is a risk-free asset in zero net supply with risk-free rate rf, and that agents decide how mucht to
1567
+ borrow/lend at time 0. Denoting such amount by ℓ, consumption Ci at period i, i = 0, 1, is
1568
+ C0 = S0 + ℓ, C1 = S0eG−L − ℓerf .
1569
+ Finally, setting X = G−L and s0 = log(S0), suppose that, for some 0 < ρ, β < 1, agents preferences
1570
+ are described by
1571
+ U(C0, C1) = (log(C0))1−ρ
1572
+ 1 − ρ
1573
+ + e−βE
1574
+ �(log(C1))1−ρ
1575
+ 1 − ρ
1576
+ 11{s0+X≥0} − (− log(C1))1−ρ
1577
+ 1 − ρ
1578
+ 11{s0+X≤0}
1579
+
1580
+ .
1581
+ (4.1)
1582
+ This is a slight modification of the specification introduced in Kahneman & Tverski (1992) to pro-
1583
+ vide a working framework that includes prospects theory experimental observations. In particular,
1584
+ the investor is risk averse if and only if the log-return G − L is above the threshold s0, and this is
1585
+ a behavior that cannot be captured by preferences over terminal wealth.
1586
+
1587
+ 14
1588
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
1589
+ 0
1590
+ 0.005
1591
+ 0.01
1592
+ 0.015
1593
+ 0.02
1594
+ 0.025
1595
+ 0.03
1596
+ 0.035
1597
+ 3
1598
+ 4
1599
+ 5
1600
+ 6
1601
+ 7
1602
+ 8
1603
+ 9
1604
+ 10
1605
+ 10-3
1606
+ (a)
1607
+ 0
1608
+ 0.01
1609
+ 0.02
1610
+ 0.03
1611
+ 0.04
1612
+ 0.05
1613
+ 0.06
1614
+ 0.07
1615
+ -0.06
1616
+ -0.04
1617
+ -0.02
1618
+ 0
1619
+ 0.02
1620
+ 0.04
1621
+ 0.06
1622
+ 0.08
1623
+ (b)
1624
+ Figure 1. Equilibrium rate as a function of σp (a) and of µp (b).
1625
+ 0
1626
+ 0.02
1627
+ 0.04
1628
+ 0.06
1629
+ 0.08
1630
+ 0.1
1631
+ 0.12
1632
+ 0.14
1633
+ 0.16
1634
+ 0.18
1635
+ 0
1636
+ 0.05
1637
+ 0.1
1638
+ 0.15
1639
+ 0.2
1640
+ 0.25
1641
+ (a)
1642
+ 0
1643
+ 0.01
1644
+ 0.02
1645
+ 0.03
1646
+ 0.04
1647
+ 0.05
1648
+ 0.06
1649
+ 0.07
1650
+ -0.08
1651
+ -0.06
1652
+ -0.04
1653
+ -0.02
1654
+ 0
1655
+ 0.02
1656
+ 0.04
1657
+ 0.06
1658
+ 0.08
1659
+ (b)
1660
+ Figure 2. Equilibrium rate as a function of σn (a) and of µn (b).
1661
+ In equilibrium, ℓ = 0, and so
1662
+ s−ρ
1663
+ 0
1664
+ − erf e−β �
1665
+ E[(s0 + X)−ρe−X11{s0+X≥0}] − E[(−s0 − X))−ρe−X11{s0+X≤0}]
1666
+
1667
+ = 0,
1668
+ and so the equilibrium interest rate re
1669
+ f satisfies
1670
+ re
1671
+ f = β − ρ log(s0) − log
1672
+
1673
+ E[(s0 + X)−ρe−X11{s0+X≥0}] − E[(−s0 − X))−ρe−X11{s0+X≤0}]
1674
+
1675
+ .
1676
+ (4.2)
1677
+ For a risk averse individual, higher risks correspond to lower equilibrium risk free rate, as lending
1678
+ becomes more attractive. Therefore, if the sign of ∂re
1679
+ f/∂σn is negative, and that of ∂re
1680
+ f/∂σp and
1681
+ ∂re
1682
+ f/∂µn are positive, the simple setting here described provides an explanation of our empirical
1683
+ findings. In general, it is possible to find values of (µp, σp, µn, σn) and of ρ such that this is indeed
1684
+ the case. For instance, setting (µp, σp, µn, σn) = (0.03, 0.01, 0.03, 0.01), which are the average values
1685
+ observed in the dataset above described, and setting ρ = 0.1 and β = 0.01, the value of re
1686
+ f computed
1687
+ via Montecarlo simulation as any of the variables (µp, σp, µn, σn) changes is shown in figures 1 and
1688
+ 2. As σp and/or σn increases the Montecarlo inegration estimate becomes less accurate as the
1689
+ variance of X is higher, but the patterns in figures 1 and 2 confirm the behaviors above observed.
1690
+
1691
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
1692
+ 15
1693
+ 5. The Risks-Neutral Acceptance Set
1694
+ In this section we analyze the “risk-neutral” acceptance set of quadruples (bp, cp, bn, cn) of BG
1695
+ parameters estimated to option prices. The results reported are interesting on their own, but also
1696
+ test the methodology employed to analyze the acceptance set of statistical parameters.
1697
+ To better fit option prices, risk neutral log returns are modeled as ωt + Xt, where Xt is a BG
1698
+ process, ω := r + log ((1 − bp)cp(1 + bn)cn) and r is the risk free rate. We calibrated the 10 sector
1699
+ ETFs to the mid prices of options for four different maturities6, and obtained a risk neutral dataset
1700
+ of 4812 observations. Figure 3 shows pairs (bp, cp) and (bn, cn) excluding 1% of outliers. Boundaries
1701
+ for bp and bn in terms of (cp, bn, cn) and (cp, bn, cn) are estimated via quantile7 and distorted GPR.
1702
+ 8 Estimates are visualized in figure 4 and reported in table 17 and 18.
1703
+ We observe that both quantile and distorted regression tend to break down in estimating the
1704
+ boundaries of bp for large values of cp, mostly because this parameter ranges between 0 and 105,
1705
+ with approximately 60% of the observations concentrated in the range [0, 30] and the remaining
1706
+ ones being sparse (compare figure 3.A and 4.A) and corresponding to relatively small variations
1707
+ in (bp, cn, bn). To avoid this issue, which - it is worth noting - does not occur when estimating
1708
+ boundaries of bn (note that the range of observations for cn is [0, 50]), the regression algorithms for
1709
+ the boundaries of bp are only based on observations corresponding to cp < 30.
1710
+ Upper
1711
+ Boundary
1712
+ Observation
1713
+ Lower
1714
+ Boundary
1715
+ Upper
1716
+ Boundary
1717
+ Observation
1718
+ Lower
1719
+ Boundary
1720
+ 0.0603
1721
+ 0.0451
1722
+ 0.0363
1723
+ 0.0304
1724
+ 0.0220
1725
+ 0.0136
1726
+ 0.0684
1727
+ 0.0557
1728
+ 0.0370
1729
+ 0.0327
1730
+ 0.0265
1731
+ 0.0155
1732
+ 0.0466
1733
+ 0.0382
1734
+ 0.0285
1735
+ 0.0307
1736
+ 0.0216
1737
+ 0.0165
1738
+ 0.0385
1739
+ 0.0320
1740
+ 0.0248
1741
+ 0.0317
1742
+ 0.0215
1743
+ 0.0205
1744
+ 0.0362
1745
+ 0.0296
1746
+ 0.0196
1747
+ 0.0393
1748
+ 0.0313
1749
+ 0.0244
1750
+ 0.0317
1751
+ 0.0243
1752
+ 0.0189
1753
+ 0.0282
1754
+ 0.0202
1755
+ 0.0145
1756
+ 0.0356
1757
+ 0.0276
1758
+ 0.0229
1759
+ 0.0263
1760
+ 0.0192
1761
+ 0.0125
1762
+ 0.0329
1763
+ 0.0248
1764
+ 0.0180
1765
+ 0.0291
1766
+ 0.0197
1767
+ 0.0152
1768
+ Table 17. Boundaries for bp via quantile GPR at 16 representative points (with cp < 30).
1769
+ Upper
1770
+ Boundary
1771
+ Observation
1772
+ Lower
1773
+ Boundary
1774
+ Upper
1775
+ Boundary
1776
+ Observation
1777
+ Lower
1778
+ Boundary
1779
+ 0.0728
1780
+ 0.0593
1781
+ 0.0430
1782
+ 0.2394
1783
+ 0.1862
1784
+ 0.1266
1785
+ 0.0541
1786
+ 0.0346
1787
+ 0.0261
1788
+ 0.2422
1789
+ 0.1885
1790
+ 0.1284
1791
+ 0.2576
1792
+ 0.1992
1793
+ 0.1347
1794
+ 0.2378
1795
+ 0.1852
1796
+ 0.1268
1797
+ 0.2392
1798
+ 0.1857
1799
+ 0.1261
1800
+ 0.2198
1801
+ 0.1701
1802
+ 0.1193
1803
+ 0.2597
1804
+ 0.2012
1805
+ 0.1356
1806
+ 0.2175
1807
+ 0.1674
1808
+ 0.1194
1809
+ 0.2452
1810
+ 0.1906
1811
+ 0.1291
1812
+ 0.2259
1813
+ 0.1756
1814
+ 0.1215
1815
+ 0.2703
1816
+ 0.2089
1817
+ 0.1406
1818
+ 0.2113
1819
+ 0.1679
1820
+ 0.1214
1821
+ 0.2638
1822
+ 0.2041
1823
+ 0.1374
1824
+ 0.2302
1825
+ 0.1764
1826
+ 0.1280
1827
+ Table 18. Boundaries for bn via quantile GPR at 16 representative points.
1828
+ 6Of all the traded maturities, the middle four were considered. Tickers considered are SPY, XLB, XLE, XLF,
1829
+ XLI, XLK, XLP, XLU, XLV, XLY. Calibration was performed every 10 days between 1/01/2015 through 31/12/2020.
1830
+ 7For quantile GPR, the optimization was performed employing a quasi-Newton method, with the quantile loss
1831
+ function approximated by S(x) = τx + α log(1 − e−x/α) as in Zheng (2011), with α = 10−4.
1832
+ 8In both cases, the hyperparameters of the kernel matrix K are estimated using the standard MSE loss function,
1833
+ while α ∈ Rn and β ∈ R are computed so that β + Kα minimizes the quantile loss function.
1834
+
1835
+ 16
1836
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
1837
+ 0
1838
+ 0.5
1839
+ 1
1840
+ 1.5
1841
+ 2
1842
+ 2.5
1843
+ 3
1844
+ 3.5
1845
+ 4
1846
+ 105
1847
+ 0
1848
+ 0.02
1849
+ 0.04
1850
+ 0.06
1851
+ 0.08
1852
+ 0.1
1853
+ 0.12
1854
+ 0.14
1855
+ (a)
1856
+ 0
1857
+ 10
1858
+ 20
1859
+ 30
1860
+ 40
1861
+ 50
1862
+ 60
1863
+ 0
1864
+ 0.05
1865
+ 0.1
1866
+ 0.15
1867
+ 0.2
1868
+ 0.25
1869
+ 0.3
1870
+ 0.35
1871
+ 0.4
1872
+ 0.45
1873
+ 0.5
1874
+ (b)
1875
+ Figure 3. Scatter plot of observed pairs (bp, cp) and (bn, cn) of risk neutral parameters.
1876
+ 0
1877
+ 5
1878
+ 10
1879
+ 15
1880
+ 20
1881
+ 25
1882
+ 30
1883
+ 0
1884
+ 0.02
1885
+ 0.04
1886
+ 0.06
1887
+ 0.08
1888
+ 0.1
1889
+ 0.12
1890
+ 0.14
1891
+ (a)
1892
+ 0
1893
+ 5
1894
+ 10
1895
+ 15
1896
+ 20
1897
+ 25
1898
+ 30
1899
+ 0
1900
+ 0.05
1901
+ 0.1
1902
+ 0.15
1903
+ 0.2
1904
+ 0.25
1905
+ 0.3
1906
+ 0.35
1907
+ 0.4
1908
+ 0.45
1909
+ 0.5
1910
+ (b)
1911
+ Figure 4. Boundaries around randomly selected point (in red) via quantile GPR with
1912
+ (τ = 0.05).
1913
+ 0
1914
+ 5
1915
+ 10
1916
+ 15
1917
+ 20
1918
+ 25
1919
+ 30
1920
+ 35
1921
+ 0
1922
+ 0.02
1923
+ 0.04
1924
+ 0.06
1925
+ 0.08
1926
+ 0.1
1927
+ 0.12
1928
+ 0.14
1929
+ (a)
1930
+ 0
1931
+ 5
1932
+ 10
1933
+ 15
1934
+ 20
1935
+ 25
1936
+ 30
1937
+ 0
1938
+ 0.05
1939
+ 0.1
1940
+ 0.15
1941
+ 0.2
1942
+ 0.25
1943
+ 0.3
1944
+ 0.35
1945
+ 0.4
1946
+ 0.45
1947
+ 0.5
1948
+ (b)
1949
+ Figure 5. Boundaries around randomly selected point (in red) via distorted GPR (γ =
1950
+ 0.75).
1951
+
1952
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
1953
+ 17
1954
+ 5.1. Speed Uncertainty. As mentioned, scale and shape parameters represent, respectively, limit
1955
+ and market orders. Typically, professional traders place limit orders based on stable patterns and
1956
+ strategies, and so the scale parameters arguably represent the phase of the economic cycle, and so
1957
+ the speed parameters can be thought of as noisy responses to it.9 This would be, however, outside
1958
+ of the theory of risk measures, as changing measure does not change speed parameters. Thus,
1959
+ theoretical boundaries similar to those derived in the next section would require a notion of “speed
1960
+ uncertainty”, similar to that of volatility uncertainty of G-Brownian motion (Peng (2006)). Such
1961
+ notion can be implemented via nonlinear Levy processes (Neufeld & Nutz (2017)), according to
1962
+ which, e.g., the ask price of a claim C = f(XT ), where X is a bilateral gamma process, is the
1963
+ unique viscosity solutions of
1964
+
1965
+ ru(t, x) + supcp,cn∈Θ
1966
+ ��
1967
+ R\{0}[u(t, x + y) − u(t, x)]k(y)dy
1968
+
1969
+ = ut(t, x),
1970
+ u(0, x) = f(x)
1971
+ where Θ ⊂ R2 is compact. There is however a large literature on the magnitude of the spread
1972
+ between upper and lower valuations based on spectral risk measure, and since our empirical analysis
1973
+ in the next sections is based on it, this approach was not further investigated.
1974
+ 5.2. An Equation for the Boundaries of Acceptable Risk Neutral Parameters. As men-
1975
+ tioned in the introduction, the boundaries found for the risk neutral parameters are naturally linked
1976
+ to acceptance sets implied by risk measures. In particular, given a fixed probability space (Ω, F, P)
1977
+ and an asset’s bid and ask price processes {Bt}t≥0 and {At}t≥0, a version of the first fundamental
1978
+ theorem of asset pricing with transaction costs asserts the existence of a probability measure Q and
1979
+ a processes {St}t≥0 such that Q is equivalent to P, Bt ≤ St ≤ At for every t ≥ 0 and {e−rtSt}t≥0 is
1980
+ a martingale under Q.10 Note that the measure Q is, approximately, a risk neutral measure in the
1981
+ sense that the process St approximates the price at which one can buy and sell the asset. One can
1982
+ then assume that the asset’s bid and ask prices be given by
1983
+ B0 = inf
1984
+ Q∈M EQ[S0e−r+ω+X1], A0 = sup
1985
+ Q∈M
1986
+ EQ[S0e−r+ω+X1].
1987
+ where M is a collection of probability measures that are equivalent to the statistical measure P.
1988
+ Such collection is a financial primitive of the economy that, as anticipated in the introduction,
1989
+ depends on regulator’s requirements for financial stability as well as trading, costs and incentives of
1990
+ market operators, and a risk Z is deemed acceptable if EQ[Z] ≥ 0, ∀Q ∈ M. For our purposes, M
1991
+ is defined as the set of measures associated to the spectral risk measure that arise from a distortion
1992
+ Ψ ((one can employ e.g. the MINMAXVAR defined by 3.3). Bid and ask prices are then computed
1993
+ as integrals of distorted probabilities of tail events (see Madan & Schoutens (2021)), and the higher
1994
+ their distortion the higher size of the set M and the bid-ask spread.
1995
+ Next, suppose that for given risk neutral parameters (ˆcp,ˆbn, ˆcn), the corresponding bp lies in the
1996
+ interval [bp, bp]. It is natural to assume that
1997
+ {Qbp}bp∈[bp,bp] ⊂ M.
1998
+ (5.1)
1999
+ where, for every bp ∈ [bp, bp], Qbp is a measure under which {Xt}t≥0 is a BG process with parameters
2000
+ (bp, ˆcp,ˆbn, ˆcn). Note that, by proposition 6.1 in Kuchler & Tappe (2008), such a measure exists and
2001
+ is equivalent to the risk neutral measure Q (and thus also to the statistical measure P). Since
2002
+ (5.2)
2003
+ inf
2004
+ bp∈[bp,bp]
2005
+ EQbp[e−r+ω+X1] = (1 − ˆbp)ˆcp
2006
+ (1 − bp)ˆcp ,
2007
+ sup
2008
+ bp∈[bp,bp]
2009
+ EQbp[e−r+ω+X1] = (1 − ˆbp)ˆcp
2010
+ (1 − bp)ˆcp ,
2011
+ 9Diffusion map showed that more than 95% of the dataset variance is explained by two eigenvectors.
2012
+ 10For the existence of Q and the associated processes {St}t≥0 see Jouini & Kallal (1995) and Schachermeyer (2004).
2013
+
2014
+ 18
2015
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
2016
+ where ω = r + log((1 − ˆbp)ˆcp(1 + ˆbn)ˆcn), 5.1 implies
2017
+ (5.3)
2018
+ B0
2019
+ S0
2020
+ ≤ (1 − ˆbp)ˆcp
2021
+ (1 − bp)ˆcp ≤ (1 − ˆbp)ˆcp
2022
+ (1 − bp)ˆcp ≤ A0
2023
+ S0
2024
+ .
2025
+ Further pushing 5.1 to be satisfied with an equality, we obtain the following relation for the upper
2026
+ and lower boundaries bp and bp:
2027
+ (5.4)
2028
+ B0
2029
+ A0
2030
+ = (1 − bp)ˆcp
2031
+ (1 − bp)ˆcp
2032
+ Note that, in 5.4, B0 and A0 are functions of ˆcp,ˆbn, ˆcn. In other words, the parameters ˆcp,ˆbn, ˆcn
2033
+ are measures of economic activity and thus, together with the structural limits bp, bn, determine
2034
+ bid and ask prices. Similarly, if ˆcp and ˆcn determine boundaries for bp and bn,
2035
+ (5.5)
2036
+ B0(ˆcp, ˆcn)
2037
+ A0(ˆcp, ˆcn) = (1 − bp)ˆcp
2038
+ (1 − bp)ˆcp
2039
+ (1 + bn)ˆcn
2040
+ (1 + bn)ˆcn .
2041
+ 5.3. Empirical Verifications. Typically, equations 5.4 and/or 5.5 are not satisfied, at least with
2042
+ respect to daily closing bid-ask ratios. However, since large orders are executed over several days,
2043
+ one can consider other distorted valuations, such as 5-days high/low prices. In general, one can
2044
+ compare the size of M required for 5.1 to hold with typically observed acceptability indexes. To
2045
+ do so, we let νbp denote the BG Levy measure with parameters (bp, ˆcp,ˆbn, ˆcn), and replace 5.1 with
2046
+ {νbp}bp∈[bp,bp] ⊂ N,
2047
+ (5.6)
2048
+ The collection N is such that distorted rewards are defined by
2049
+ µ = ω −
2050
+ � ∞
2051
+ 0
2052
+ G+(ν(ex − 1 < −a))da +
2053
+ � ∞
2054
+ 0
2055
+ (G−(ν(ex − 1 > a))da,
2056
+ µ = ω −
2057
+ � ∞
2058
+ 0
2059
+ G−(ν(ex − 1 < −a))da +
2060
+ � ∞
2061
+ 0
2062
+ (G+(ν(ex − 1 > a))da
2063
+ where ν is the Levy measure of X under Q and G+ and G− are (see Eberlein et al. (2013))
2064
+ G+(x) = x + 1
2065
+ c(1 − e−cx)1/(1+γ), G−(x) = x − 1
2066
+ c(1 − e−cx).
2067
+ Then, as proved in Madan & Schoutens (2021), ˜ν ∈ N if and only if d˜ν
2068
+ dν satisfies
2069
+ (5.7)
2070
+ S(λ) : =
2071
+
2072
+ R
2073
+ �d˜ν
2074
+ dν − λ
2075
+ �+
2076
+ dν(x) ≤ Φ(λ), λ > 1,
2077
+ ˜S(λ) : =
2078
+
2079
+ R
2080
+
2081
+ λ − d˜ν
2082
+
2083
+ �+
2084
+ dν(x) ≤ −˜Φ(λ), 0 ≤ λ < 1,
2085
+ where Φ and ˜Φ are Fenchel conjugates of G+ and G− respectively, and are given by
2086
+ Φ(λ) := 1
2087
+ c
2088
+
2089
+ −(1 − λ) log(u(λ)) + (1 − u(λ))1/(1+γ)�
2090
+ ,
2091
+ −˜Φ(λ) := 1
2092
+ c[λ + (1 − λ) log(1 − λ)],
2093
+ with u : (1, ∞) → (0, 1) defined as the unique solution of
2094
+ u
2095
+ (1 − u)γ/(1+γ) = (λ − 1)(1 + γ).
2096
+
2097
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
2098
+ 19
2099
+ Next, we find requirements on c, γ for 5.6 to hold. Note that, for ˜ν = νbp,
2100
+ S(λ) =
2101
+ � ∞
2102
+ L(λ)
2103
+ cp
2104
+ x
2105
+
2106
+ e−x/bp − λe−x/ˆbp�
2107
+ dx = cp
2108
+
2109
+ Ei
2110
+ �L(λ)
2111
+ bp
2112
+
2113
+ − λEi
2114
+
2115
+ L(λ)
2116
+ ˆbp
2117
+ ��
2118
+ and, similarly, for ˜ν = νbp,
2119
+ ˜S(λ) =
2120
+ � ∞
2121
+ ˜L(λ)
2122
+ cp
2123
+ x
2124
+
2125
+ λe−x/ˆbp − e−x/bp
2126
+
2127
+ dx = cp
2128
+
2129
+ λEi
2130
+
2131
+ L(λ)
2132
+ ˆbp
2133
+
2134
+ − Ei
2135
+ �L(λ)
2136
+ bp
2137
+ ��
2138
+ ,
2139
+ where Ei is the exponential integral function and
2140
+ L(λ) = log(λ)bpˆbp
2141
+ bp − ˆbp
2142
+ , ˜L(λ) = −log(λ)ˆbpbp
2143
+ ˆbp − bp
2144
+ .
2145
+ Lemma 5.1. Suppose bp > 0.55ˆbp. Then, νbp ∈ N holds for every bp ∈ [bp,ˆbp] if and only if
2146
+ c ≤ lim
2147
+ λ→1−
2148
+ 1
2149
+ ˜S(λ)
2150
+ (5.8)
2151
+ Proof. Note that for every 0 < λ < 1
2152
+ −˜Φ′(λ) − ˜S′(λ) = − log(1 − λ)
2153
+ c
2154
+ − cp
2155
+
2156
+ Ei
2157
+
2158
+ L(λ)
2159
+ ˆbp
2160
+
2161
+ − λe−L(λ)/ˆbp L′(λ)
2162
+ L(λ) + e−L(λ)/bp L′(λ)
2163
+ L(λ)
2164
+
2165
+ = − log(1 − λ)
2166
+ c
2167
+ − cpEi
2168
+
2169
+ L(λ)
2170
+ ˆbp
2171
+
2172
+ ,
2173
+ so that a stationary point ℓ of −˜Φ − ˜S must satisfy ccp = − log(1 − ℓ)/Ei
2174
+
2175
+ L(ℓ)
2176
+ ˆbp
2177
+
2178
+ . Since
2179
+ d
2180
+
2181
+ − log(1 − λ)
2182
+ Ei
2183
+
2184
+ L(λ)
2185
+ ˆbp
2186
+
2187
+ =
2188
+ Ei
2189
+
2190
+ L(ℓ)
2191
+ ˆbp
2192
+
2193
+ 1−λ
2194
+ − e−L(λ)/ˆbp log(1−λ)
2195
+ λ log(λ)
2196
+ Ei
2197
+
2198
+ L(ℓ)
2199
+ ˆbp
2200
+ �2
2201
+ ≤ e−L(λ)/ˆbp
2202
+ log
2203
+
2204
+ 1−
2205
+ bp
2206
+ (ˆbp−bp) log(λ)
2207
+
2208
+ 1−λ
2209
+ − log(1−λ)
2210
+ λ log(λ)
2211
+ Ei
2212
+
2213
+ L(ℓ)
2214
+ ˆbp
2215
+ �2
2216
+ ,
2217
+ the function −˜Φ − ˜S admits at most one stationary point in (0, 1) if
2218
+ log
2219
+
2220
+ 1 −
2221
+ bp
2222
+ (ˆbp−bp) log(λ)
2223
+
2224
+ 1 − λ
2225
+ − log(1 − λ)
2226
+ λ log(λ)
2227
+ < 0, ⇔ log(λ)
2228
+
2229
+ 1 − (1 − λ)
2230
+ 1−λ
2231
+ λ log(λ)
2232
+
2233
+ <
2234
+ bp
2235
+ (ˆbp − bp)
2236
+ .
2237
+ (5.9)
2238
+ Since, for 0 < λ < 1, log(λ)
2239
+
2240
+ 1 − (1 − λ)
2241
+ 1−λ
2242
+ λ log(λ)
2243
+
2244
+ < 1.2, condition 5.9 holds if 0.55ˆbp < bp. Since
2245
+ lim
2246
+ λ→0+ −˜Φ(λ) = lim
2247
+ λ→0+ ˜S(λ) = 0,
2248
+ lim
2249
+ λ→0+
2250
+ −˜Φ(λ)
2251
+ ˜S(λ)
2252
+ = ∞
2253
+ lim
2254
+ λ→1− −˜Φ′(λ) = lim
2255
+ λ→1− ˜S′(λ) = ∞,
2256
+ lim
2257
+ λ→1−
2258
+ −˜Φ′(λ)
2259
+ ˜S′(λ)
2260
+ = 0,
2261
+
2262
+ 20
2263
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
2264
+ it must be the case that if limλ→1− −˜Φ(λ) ≥ limλ→1− ˜S(λ), which is 5.8, then −˜Φ − ˜S admits
2265
+ a positive maximum in (0, λ). Therefore, if 0.55ˆbp < bp and 5.8 are satisfied, −˜Φ − ˜S must be
2266
+ nonnegative on (0, 1), since it would otherwise admit two stationary points.
2267
+
2268
+ We note that 0.55ˆbp < bp for all the 16 representative points. The next two lemmas identify
2269
+ necessary and sufficient conditions for the case bp ≥ ˆbp.
2270
+ Lemma 5.2. Suppose bp ∈ [ˆbp, bp]. Then, it is necessary for νbp ∈ N to hold that
2271
+ γ > bp − ˆbp
2272
+ ˆbp
2273
+ := ˜γ
2274
+ (5.10)
2275
+ c ≤ 1
2276
+ cp
2277
+ .
2278
+ (5.11)
2279
+ Proof. Note that
2280
+ lim
2281
+ λ→∞ Φ(λ) = lim
2282
+ λ→∞ S(λ) = 0,
2283
+ so, by l’Hopital’s theorem, Φ(λ) ≥ S(λ) implies
2284
+ S′′(λ)
2285
+ Φ′′(λ) = O(1)
2286
+ as λ → ∞. Furthermore, using the implicit definition of u,
2287
+ Φ′(λ) = 1
2288
+ c log(u(λ)), Φ′′(λ) = u′(λ)
2289
+ cu(λ), S′(λ) = −cpEi
2290
+
2291
+ L(λ)
2292
+ ˆbp
2293
+
2294
+ , S′′(λ) = cp
2295
+ 1
2296
+ λbp/(bp−ˆbp)+1 log(λ)
2297
+ ,
2298
+ and, using implicit differentiation,
2299
+ u′(λ) =
2300
+
2301
+ u2+1/γ
2302
+ (1 − u + γ)(1 + γ)1/γ
2303
+ � �
2304
+ 1
2305
+ (λ − 1)
2306
+ �2+1/γ
2307
+
2308
+
2309
+ 1
2310
+ (γ)(1 + γ)1/γ
2311
+ � � 1
2312
+ λ
2313
+ �2+1/γ
2314
+ .
2315
+ We thus need
2316
+ 2 + 1
2317
+ γ <
2318
+ bp
2319
+ bp − ˆbp
2320
+ + 1 ⇒ γ > ˜γ.
2321
+ For 5.11 simply note that
2322
+ lim
2323
+ λ→1+
2324
+ Φ(λ)
2325
+ S(λ) = 1
2326
+ ccp
2327
+ .
2328
+
2329
+ Lemma 5.3. There is a function κp : (˜γ, ∞) → (0, ˜c], where
2330
+ ˜c := min
2331
+
2332
+ lim
2333
+ λ→1−
2334
+ 1
2335
+ ˜S(λ)
2336
+ , 1
2337
+ cp
2338
+
2339
+ ,
2340
+ such that, for every γ that satisfies 5.10, νbp ∈ N if c < κp(γ) and νbp /∈ N if c > κp(γ).
2341
+ Proof. Fix γ > ˜γ. As in the previous lemma, and since u does not depend on c, there is ℓ > 1
2342
+ independent of c such that for every λ > ℓ,
2343
+ −(1 − λ) log(u(λ)) + (1 − u(λ))1/(1+γ)
2344
+ Ei
2345
+
2346
+ L(λ)
2347
+ bp
2348
+
2349
+ − λEi
2350
+
2351
+ L(λ)
2352
+ ˆbp
2353
+
2354
+ ≥ 1.
2355
+ Hence, if c < ˜c, Φ(λ) > S(λ) for every λ > ℓ. Since Φ − S is continuous and decreasing in c for
2356
+ every λ ∈ [1, ℓ], with limc→0 Φ − S = ∞, limc→∞ Φ − S = −S < 0, there is a bounded set of values
2357
+
2358
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
2359
+ 21
2360
+ 1
2361
+ 2
2362
+ 3
2363
+ 4
2364
+ 5
2365
+ 6
2366
+ 7
2367
+ 8
2368
+ 9
2369
+ 10
2370
+ 0
2371
+ 1
2372
+ 2
2373
+ 3
2374
+ 4
2375
+ 5
2376
+ 6
2377
+ 7
2378
+ 8
2379
+ 9
2380
+ (a)
2381
+ Figure 6. The function Φ(λ)/S(λ) for the first of the 16 representative points, with c = ˜c
2382
+ and assuming γ = ˜γ + 0.005 (blue) and γ = ˜γ (red).
2383
+ c > 0 such that Φ(λ)−S(λ) ≥ 0 for every λ ∈ [1, ℓ]. Letting c denote the supremum of such values,
2384
+ one can set κ(γ) = min{c, ˜c}.
2385
+
2386
+ The function κp typically grows very fast, so that κp(γ) = ˜c for values of γ that are slightly larger
2387
+ than ˜γ. For instance, figure 6 depicts the function Φ(λ/S(λ) for γ = ˜γ and γ′ = ˜γ + 0.005, and
2388
+ for c = ˜c and the bilateral gamma parameters set as in the most representative of the quantized
2389
+ points. In fact, this is the case for each of the 16 quantized points, as shown in table 19.
2390
+ c
2391
+ γ
2392
+ ˜γ
2393
+ c
2394
+ γ
2395
+ ˜γ
2396
+ c
2397
+ γ
2398
+ ˜γ
2399
+ c
2400
+ γ
2401
+ ˜γ
2402
+ 0.462
2403
+ 0.357
2404
+ 0.347
2405
+ 0.212
2406
+ 0.259
2407
+ 0.219
2408
+ 0.075
2409
+ 0.400
2410
+ 0.380
2411
+ 0.138
2412
+ 0.288
2413
+ 0.258
2414
+ 0.666
2415
+ 0.263
2416
+ 0.233
2417
+ 0.130
2418
+ 0.336
2419
+ 0.296
2420
+ 0.169
2421
+ 0.256
2422
+ 0.216
2423
+ 0.061
2424
+ 0.397
2425
+ 0.377
2426
+ 0.262
2427
+ 0.252
2428
+ 0.232
2429
+ 0.126
2430
+ 0.327
2431
+ 0.287
2432
+ 0.069
2433
+ 0.484
2434
+ 0.424
2435
+ 0.039
2436
+ 0.387
2437
+ 0.357
2438
+ 0.219
2439
+ 0.209
2440
+ 0.199
2441
+ 0.096
2442
+ 0.358
2443
+ 0.328
2444
+ 0.056
2445
+ 0.529
2446
+ 0.469
2447
+ 0.040
2448
+ 0.527
2449
+ 0.467
2450
+ Table 19. Triples (˜c, γ, ˜γ) where γ is the minimal value ensuring 5.6 with c = ˜c.
2451
+ Remark. Recalling that γ is similar to the acceptability index for probability distortions, while 10
2452
+ c
2453
+ roughly corresponds to the maximum distorted frequencies (so higher c corresponds to smaller N),
2454
+ we note that the values reported in 19 have the same magnitude and are consistent in general with
2455
+ those typically seen in the literature (see for instance Eberlein et al. (2013), Elliot et al. (2022) and
2456
+ Madan & Schoutens (2021)).
2457
+ We observe, in particular, that
2458
+ i. the three most representative points (top left corner of table 19), are consistent with the pair
2459
+ (0.25, 0.25) used in Madan & Schoutens (2021) to estimate capital requirements (chapter
2460
+ 15.5.2), and that the relatively high values of γ is compensated by high values of c;
2461
+ ii. for each triple, ˜c is higher, and in the less frequent cases close to, the value 0.01, which, as
2462
+ shown in Elliot et al. (2022), generates higher returns compared to c = 1 and c = 0.25 for
2463
+ a portfolio constructed by maximization of the lower valuation.
2464
+ 6. Conclusions
2465
+ For an asset with (log) returns in the bilateral gamma class, a justification is provided, based on
2466
+ expected utility theory, that risks from holding the asset can be decomposed into a three dimensional
2467
+
2468
+ 22
2469
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
2470
+ vector of expected losses, variance of gains and variance of losses, while compensation for the risks
2471
+ is given by expected gains. Evidence is then provided that moments of bilateral gamma returns lie
2472
+ on a manifold with boundaries, and such boundaries are estimated via quantile and distorted linear
2473
+ and nonlinear regressions. It is observed that they imply a positive relationship between expected
2474
+ gains and variance of gains/expected losses, but a negative one between compensation and variance
2475
+ of losses thus implying market’s operators being risk seekers in pure loss prospects. The claim that
2476
+ such finding are compatible with the experimental evidence that constitute prospects theory is
2477
+ then justified through a simple modification of Lucas Tree model. The analysis is corroborated
2478
+ by performing a similar one to the case of risk neutral parameters, assuming a separate drift to
2479
+ satisfy the martingale condition. An inverse relationship between shape and scale parameters of loss
2480
+ and gain process is observed and a theoretical boundary for scale parameters, in line with certain
2481
+ empirical observations, is described based on the theory of Conic finance. Finally, we observed
2482
+ that our estimates of the boundaries are generally larger than those implied by regulatory capital
2483
+ requirements.
2484
+ 7. Acknowledgment
2485
+ This paper is a revised version of the second chapter of the author’s doctoral dissertation, which
2486
+ was conducted under the supervision of Professor Dilip B. Madan at the Department of Mathematics
2487
+ of the University of Maryland, College Park.
2488
+ 8. Appendix A: Assets Tickers
2489
+ The list of tickers of the assets considered in the empirical analyses performed in this research
2490
+ are reported in table 20 below.
2491
+ a
2492
+ aapl
2493
+ abc
2494
+ abt
2495
+ adbe
2496
+ adm
2497
+ aep
2498
+ afl
2499
+ akam
2500
+ all
2501
+ amat
2502
+ amp
2503
+ amt
2504
+ amzn
2505
+ antm
2506
+ aon
2507
+ apa
2508
+ apd
2509
+ axp
2510
+ ba
2511
+ bac
2512
+ bax
2513
+ bby
2514
+ bdx
2515
+ ben
2516
+ biib
2517
+ bk
2518
+ bmy
2519
+ c
2520
+ cah
2521
+ cat
2522
+ ccl
2523
+ cf
2524
+ chrw
2525
+ cl
2526
+ cma
2527
+ cmcsa
2528
+ cmi
2529
+ cms
2530
+ cof
2531
+ cop
2532
+ cost
2533
+ crm
2534
+ csco
2535
+ ctsh
2536
+ ctxs
2537
+ cvs
2538
+ cvx
2539
+ d
2540
+ de
2541
+ dgx
2542
+ dhr
2543
+ dis
2544
+ dov
2545
+ duk
2546
+ ebay
2547
+ ecl
2548
+ el
2549
+ eog
2550
+ eqt
2551
+ etn
2552
+ f
2553
+ fcx
2554
+ fdx
2555
+ fitb
2556
+ flr
2557
+ fls
2558
+ fslr
2559
+ gd
2560
+ ge
2561
+ gild
2562
+ gis
2563
+ glw
2564
+ gs
2565
+ hal
2566
+ hd
2567
+ hes
2568
+ hog
2569
+ hon
2570
+ hp
2571
+ hpq
2572
+ hum
2573
+ ibm
2574
+ ice
2575
+ intc
2576
+ isrg
2577
+ itw
2578
+ ivz
2579
+ jci
2580
+ jnj
2581
+ jnpr
2582
+ jpm
2583
+ jwn
2584
+ k
2585
+ kim
2586
+ klac
2587
+ kmb
2588
+ ko
2589
+ kr
2590
+ kss
2591
+ lmt
2592
+ lnc
2593
+ low
2594
+ m
2595
+ ma
2596
+ mcd
2597
+ mck
2598
+ mdt
2599
+ met
2600
+ mmc
2601
+ mmm
2602
+ mo
2603
+ mrk
2604
+ mro
2605
+ ms
2606
+ msft
2607
+ mtb
2608
+ mur
2609
+ nem
2610
+ nke
2611
+ nov
2612
+ nsc
2613
+ ntap
2614
+ nvda
2615
+ nyt
2616
+ orcl
2617
+ oxy
2618
+ payx
2619
+ pcar
2620
+ pfe
2621
+ pg
2622
+ ph
2623
+ pnc
2624
+ ppg
2625
+ pru
2626
+ pxd
2627
+ rf
2628
+ rhi
2629
+ rl
2630
+ rok
2631
+ rrc
2632
+ sbux
2633
+ schw
2634
+ slb
2635
+ so
2636
+ spg
2637
+ spx
2638
+ spy
2639
+ stt
2640
+ stz
2641
+ syk
2642
+ syy
2643
+ t
2644
+ tgt
2645
+ tjx
2646
+ tmo
2647
+ trv
2648
+ txn
2649
+ txt
2650
+ unh
2651
+ unp
2652
+ ups
2653
+ usb
2654
+ vix
2655
+ vlo
2656
+ vno
2657
+ vz
2658
+ wfc
2659
+ whr
2660
+ wmb
2661
+ wmt
2662
+ wy
2663
+ x
2664
+ xlb
2665
+ xle
2666
+ xlf
2667
+ xli
2668
+ xlk
2669
+ xlp
2670
+ xlu
2671
+ xlv
2672
+ xly
2673
+ xom
2674
+ xrx
2675
+ Table 20
2676
+ References
2677
+ Ali, M. 1975. Stochastic Dominance and Portfolio Analysis. Journal of Financial Economics, 2,
2678
+ 205–229.
2679
+ Arrow, K. 1971. Essay in the Theory of Risk-Bearing. North-Holland.
2680
+ Artzner, P., Delbaen, F., Eber, J.M., & Heath, D. 1999. Coherent Measures of Risk. Mathematical
2681
+ Finance, 9(3), 203–228.
2682
+
2683
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
2684
+ 23
2685
+ Black, F., & Scholes, M. 1973. The Pricing of Options and Corporate Liabilities. The Journal of
2686
+ Political Economy, 81(3), 637–654.
2687
+ Carr, P., Geman, H., Madan, D., & Yor, M. 207. Self-Decomposabilitt and option pricing. Mathe-
2688
+ matical Finance, 17, 31–57.
2689
+ Coifman, R., & Lafon, S. 2006. Diffusion maps. Appl. Comput. Harmon. Anal., 21, 5–30.
2690
+ Cover, T. 1991. Universal Portfolios. Mathematical Finance, 1, 1–29.
2691
+ Eberlein, E., Madan, D., Pistorius, M., & Yor, M. 2013. A Simple Stochastic Rate Model for Rate
2692
+ Equity Hybrid Products. Applied Mathematical Finance, 20(5), 461–488.
2693
+ Elliot, R., Madan, D., & Wang, K. 2022. High Dimensional Markov Trading of a Single Stock.
2694
+ SSRN Electronic Journal.
2695
+ Fama, E. 1965. The Behavior of Stock Market Prices. Journal of Business, 38, 34–105.
2696
+ Follmer, H., & Schied, A. 2002. Convex MEasures of Risk and Trading Constraints. Finance and
2697
+ Stochastics, 6(4), 429–447.
2698
+ Friend, I., & Blume, M. 1975. The Demand for Risky Assets. The American Economic Review,
2699
+ 65(2), 900–922.
2700
+ Jouini, E., & Kallal, H. 1995. Efficient Trading Strategies in the Presence of Market Frictions.
2701
+ Review of Financial Studies, 14(2), 343–369.
2702
+ Kahneman, D., & Tverski, A. 1979. Prospect Theory: an analysis of decision under risk. Econo-
2703
+ metrica, 47, 263–291.
2704
+ Kahneman, D., & Tverski, A. 1992. Advences in Prospects Theory: Cumulative Representation of
2705
+ Uncertainty. Journal of Risk and Uncertainty, 5, 297–293.
2706
+ Kelly, J. 1956.
2707
+ A New Interpretation of Information Rate.
2708
+ IRE Transactions on Information
2709
+ Theory, 2, 185–189.
2710
+ Kuchler, U., & Tappe, S. 2008. Bilateral Gamma Distributions and Processes in Financial Mathe-
2711
+ matics. Stochastic Processes and its Applications, 118, 261–283.
2712
+ Lintner, J. 1965. Security Prices, Risk, and Mximal Gains from Diversification. The Journal of
2713
+ Finance, 20(4), 587–615.
2714
+ Lucas, R. 1978. Asset Prices in an Exchange Economy. Econometrica, 46(6), 1429–1445.
2715
+ Madan, D. 2020a. Bilateral Multiple Gamma Returns: Their Risks and Rewards. International
2716
+ Journal of Financial Engineering, 7(1), 1–27.
2717
+ Madan, D. 2020b.
2718
+ Multivariate Distributions for Financial Returns.
2719
+ International Journal of
2720
+ Theoretical and Applied Finance, 23(6).
2721
+ Madan, D., & Eberlein, E. 2009. Hedge Fund Performance: Sources and Measures. International
2722
+ Journal of Theoretical and Applied Finance, 12(3), 267–282.
2723
+ Madan, D., & Schoutens, W. 2021. Measure Distorted Valuation For Financial Decision Making.
2724
+ preprint.
2725
+ Madan, D., & Seneta, E. 1990.
2726
+ The Variance Gamma Model for Share Market Returns.
2727
+ The
2728
+ Journal of Business, 63, 511–24.
2729
+ Markovitz, H. 1952. Portfolio Selection. Journal of Finance, 7(1), 77–91.
2730
+ Mehra, R., & Prescott, E. 1985. The Equity Premium: a Puzzle. Journal of Monetary Economics,
2731
+ 15, 145–161.
2732
+ Merton, R.C. 1969. Lifetime portfolio selection under uncertainty: the continuous time model.
2733
+ Review of Economic Studies, 51, 247–257.
2734
+ Neufeld, A., & Nutz, M. 2017. Nonlinear Levy Processes and their characteristics. Transwactions
2735
+ of the American Mathematical Society, 369(1), 69–95.
2736
+ Peng, S. 2006. G-Expectation, G-Brownian motion and related stochastic calculus of Ito type.
2737
+ arXiv:math/0601035v2 [math.PR].
2738
+ Rasmussen, C., & Williams, C. 2006. Gaussian Processes for Machine Learning. MIT Press.
2739
+
2740
+ 24
2741
+ ACCEPTABLE BILATERAL GAMMA PARAMETERS
2742
+ Rothschild, M., & Stiglitz, J. 1970. Increasing Risk: I. A Definition. Journal of Economic Theory,
2743
+ 2, 225–243.
2744
+ Samuelson, P. 1979. Why We Should Not Make Mean Log of Wealth Bit Though Years to Act are
2745
+ Long. Journal of Banking and Finance, 3, 305–307.
2746
+ Schachermeyer, W. 2004. The Fundamental Theorem of Asset Pricing Under Proportional Trans-
2747
+ action Costs in Finite Discrete Time. Mathematical Finance, 14(1), 19–48.
2748
+ Sharpe, W. 1964. Capital Asset Prices: a Theory of Market Equilibrium under Conditions of Risk.
2749
+ The Journal of Finance, 19(3), 425–442.
2750
+ Tobin, J. 1958. Liquidity Preference as Behavior towards Risk. The Review of Economic Studies,
2751
+ 25, 65–86.
2752
+ Zheng, S. 2011. Gradient descent algorithms for quantile regression with smooth approximation.
2753
+ International Journal of Machine Learning and Cybernetics, 191–207.
2754
+
EdE4T4oBgHgl3EQf6g7g/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9E0T4oBgHgl3EQfzQJ7/content/2301.02670v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:63c40deec531400874f9f27d20788f76d1015f8134b562df74dbca6be5dc1449
3
+ size 739963
F9E0T4oBgHgl3EQfzQJ7/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2fce90e88c70839abd750d56ed1b580b94bbece7cc436c376f8aabbb22139a6b
3
+ size 184785
GNAyT4oBgHgl3EQf5Pq2/content/tmp_files/2301.00802v1.pdf.txt ADDED
@@ -0,0 +1,1157 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ G-CEALS: Gaussian Cluster Embedding in Autoencoder
2
+ Latent Space for Tabular Data Representation
3
+ Manar D. Samad and Sakib Abrar
4
+ Department of Computer Science
5
+ Tennessee State University
6
+ Nashville, TN, USA
7
8
+ January 3, 2023
9
+ ABSTRACT
10
+ The latent space of autoencoders has been improved for clustering image data by jointly learning a
11
+ t-distributed embedding with a clustering algorithm inspired by the neighborhood embedding con-
12
+ cept proposed for data visualization. However, multivariate tabular data pose different challenges
13
+ in representation learning than image data, where traditional machine learning is often superior to
14
+ deep tabular data learning. In this paper, we address the challenge of learning tabular data in con-
15
+ trast to image data and present a novel Gaussian Cluster Embedding in Autoencoder Latent Space
16
+ (G-CEALS) algorithm by replacing t-distributions with multivariate Gaussian clusters. Unlike cur-
17
+ rent methods, the proposed method defines the Gaussian embedding and the target cluster distribu-
18
+ tion independently to accommodate any clustering algorithm in representation learning. A trained
19
+ G-CEALS model extracts a quality embedding for unseen test data. Based on the embedding clus-
20
+ tering accuracy, the average rank of the proposed G-CEALS method is 1.4 (0.7), which is superior
21
+ to all eight baseline clustering and cluster embedding methods on seven tabular data sets. This pa-
22
+ per shows one of the first algorithms to jointly learn embedding and clustering for improving the
23
+ representation of multivariate tabular data in downstream clustering.
24
+ Keywords embedding clustering, tabular data, Gaussian clusters, autoencoder, representation learning, multivariate
25
+ distribution
26
+ 1
27
+ Introduction
28
+ Deep learning has replaced traditional machine learning in many data-intensive research and applications due to its
29
+ ability to perform concurrent and efficient representation learning and classification. This concurrent learning approach
30
+ outperforms traditional machine learning that requires handcrafted features to perform supervised classification [1, 2].
31
+ However, representation learning via supervisory signals from ground truth labels may be prone to overfitting [3] and
32
+ adversarial attacks [4]. Moreover, human annotations for supervised representation learning and classification may
33
+ not be available in all data domains or for all data samples. To address these pitfalls, representation learning via
34
+ unsupervised clustering algorithms may be a strong alternative to supervised learning methods.
35
+ The limitation of supervised representation learning may be overcome using self-supervision or pseudo labels that do
36
+ not require human-annotated supervisory signals [5, 6]. In a self-supervised autoencoder, the objective is to preserve
37
+ all information of input data in a low-dimensional embedding for data reconstruction. However, embeddings for data
38
+ reconstruction do not emphasize representations essential for downstream classification or clustering tasks. Therefore,
39
+ unsupervised methods have been proposed for jointly learning embedding with clustering to yield clustering friendly
40
+ representations [7, 8, 9, 10, 11]. The existing cluster embedding literature suggests several strict assumptions about
41
+ clustering algorithms (k-means), cluster distributions (t-distribution), and data modality (image data). While deep
42
+ representation learning of image data is well studied using convolutional neural networks (CNN), deep learning has
43
+ not seen much success with structured tabular data. There is strong evidence in the literature that traditional machine
44
+ arXiv:2301.00802v1 [cs.LG] 2 Jan 2023
45
+
46
+ A PREPRINT - JANUARY 3, 2023
47
+ learning still outperforms deep models in learning tabular data [12, 13, 14, 15, 16]. In this paper, we review the
48
+ assumptions made in the cluster embedding literature and revise those assumptions for the representation learning of
49
+ tabular data. Accordingly, a novel joint learning framework is proposed considering the architectural and algorithmic
50
+ differences in learning image and tabular data.
51
+ The remainder of this manuscript is organized as follows. Section 2 provides a review of the state-of-the-art literature
52
+ on deep cluster embedding. Section 3 introduces tabular data with some theoretical underpinnings of neighborhood
53
+ embedding and cluster embedding in support of our proposed representation learning framework. Section 4 outlines
54
+ the proposed joint cluster embedding framework to obtain a quality representation of tabular data for downstream
55
+ clustering or classification. Section 5 summarizes the tabular data sets and experiments for evaluating the proposed
56
+ joint learning framework. Section 6 provides the results following the experiments and compares our proposed method
57
+ with similar methods in the literature. Section 7 summarizes the findings with additional insights into the results and
58
+ limitations. The paper concludes in Section 8.
59
+ 2
60
+ Related work
61
+ One of the earliest studies on cluster embedding, Deep Embedded Clustering (DEC) [7], is inspired by the seminal
62
+ work on t-distributed stochastic neighborhood embedding (t-SNE) [17]. The DEC approach first trains a deep autoen-
63
+ coder by minimizing the data reconstruction loss. The trained encoder part (excluding the decoder) is then fine-tuned
64
+ by minimizing the Kullback-Leibler (KL) divergence between a t-distributed cluster distribution (Q) on the embed-
65
+ ding and a target distribution (P). The target distribution is obtained via a closed-form solution by taking the first
66
+ derivative of the KL divergence loss between P and Q distributions with respect to P and equating it to zero. There-
67
+ fore, the assumption of t-distribution holds for both Q and P distributions in similar work. The k-means clustering in
68
+ the DEC approach is later replaced by spectral clustering to improve the quality of embedding in terms of clustering
69
+ performance [18]. The DEC approach is also enhanced by an improved DEC (IDEC) framework [8]. In IDEC, the
70
+ autoencoder reconstruction loss and the KL divergence loss are jointly minimized to update the weights of a deep
71
+ autoencoder and produce the embedding. Similar approaches, including t-distributions, k-means clustering, and KL
72
+ divergence loss, are adopted in joint embedding and cluster learning (JECL) for multimodal representation learning
73
+ of text-image data pairs [19]. The Deep Clustering via Joint Convolutional Autoencoder (DEPICT) approach learns
74
+ image embedding via a de-noising autoencoder [20]. The embedding is mapped to a softmax function to obtain a clus-
75
+ ter distribution or likelihood (Q) instead of assuming a distribution. Following a series of mathematical derivations
76
+ and assumptions, their final learning objective includes a cross-entropy loss involving P and Q distributions and an
77
+ embedding reconstruction loss for each layer of the convolutional autoencoder.
78
+ A general trend in the cluster embedding literature shows that K-means is the most common clustering method [7, 8,
79
+ 10, 9, 21, 19, 20]. The assumption of t-distributed cluster embedding made in the DEC method [7] continues to appear
80
+ in the literature [22, 23, 8, 18, 19, 24] without any alternatives. The assumption of t-distribution is originally made in
81
+ the t-SNE algorithm for data visualization using neighborhood embedding maps [17]. We argue that the assumptions of
82
+ neighborhood embedding for data visualization are not aligned with the requirements of cluster embedding. Moreover,
83
+ cluster embedding methods proposed in the literature are invariably evaluated on benchmark image data sets. The
84
+ methods for image learning may not be optimal or even ready to learn tabular data representations. To the best of our
85
+ knowledge, similar cluster embedding methods have not been studied on multivariate tabular data.
86
+ 2.1
87
+ Contributions
88
+ This paper is one of the first to investigate the performance of joint cluster embedding methods on tabular data. The
89
+ limitations of state-of-the-art joint cluster embedding methods are addressed to contribute a new cluster embedding
90
+ algorithm as follows. First, we replace the current assumption of t-distributed embedding with a mixture of mul-
91
+ tivariate Gaussian distributions for multivariate tabular data by providing a theoretical underpinning for this choice.
92
+ Second, a new cluster embedding algorithm is proposed using multivariate Gaussian distributions that can jointly learn
93
+ distributions with any clustering algorithm. Third, we define the target cluster distribution on the tabular data space
94
+ instead of deriving it from the embedding because traditional machine learning of tabular data is still superior to deep
95
+ learning and can add complementary benefits to the embedding learned via an autoencoder. Therefore, our embedding
96
+ and target distributions are independent of each other to flexibly learn any target cluster distribution depending on the
97
+ application domain.
98
+ 2
99
+
100
+ A PREPRINT - JANUARY 3, 2023
101
+ Factors
102
+ Image data
103
+ Tabular data
104
+ Heterogeneity
105
+ Homogeneous pixel distribution
106
+ Heterogeneous or multivariate distribution
107
+ Spatial Regularity
108
+ Yes
109
+ No
110
+ Sample size
111
+ Large, >50,000
112
+ Small, median size ∼ 660
113
+ Benchmark data set
114
+ MNIST, CIFAR
115
+ No standard benchmark
116
+ Data dimensionality
117
+ High, >1000
118
+ Low, median 18
119
+ Best method
120
+ Deep CNN
121
+ Traditional machine learning
122
+ Deep approaches
123
+ transfer learning, image augmentation
124
+ None
125
+ Table 1: Contrasts between image and tabular data that require significant rework of deep architectures proposed for
126
+ images in learning tabular data. Median sample size and data dimensionality are obtained from 100 most downloaded
127
+ tabular data sets from the UCI machine learning repository [25].
128
+ 30
129
+ 20
130
+ 10
131
+ 0
132
+ 10
133
+ 20
134
+ Projected Space 1
135
+ 20
136
+ 10
137
+ 0
138
+ 10
139
+ 20
140
+ Projected Space 2
141
+ CNV
142
+ DME
143
+ Drusen
144
+ Normal
145
+ (a) t-SNE projected
146
+ 50
147
+ 0
148
+ 50
149
+ 100
150
+ 150
151
+ Projected Space 1
152
+ 50
153
+ 0
154
+ 50
155
+ 100
156
+ 150
157
+ Projected Space 2
158
+ CNV
159
+ DME
160
+ Drusen
161
+ Normal
162
+ (b) PCA projected
163
+ Figure 1: Two-dimensional embeddings of high dimensional image features extracted from a deep convolutional neural
164
+ network obtained from [26].
165
+ 3
166
+ Theoretical background
167
+ This section provides preliminaries on tabular data in contrast to image data. We draw multiple contrasts between
168
+ neighborhood embedding proposed for data visualization and cluster embedding proposed for representation learning
169
+ to underpin our proposed approach.
170
+ 3.1
171
+ Preliminaries
172
+ A tabular data set is represented in a matrix X ∈ ℜn×d with n i.i.d samples in rows. Each sample (Xi) is represented
173
+ by a d-dimensional feature vector, Xi ∈ ℜd = {x1, x2, . . . , xd}, where i = {1, 2, . . . , n}. Compared to a pixel
174
+ distribution P(I) of an image I, tabular data contain multivariate distributions P(x1, x2, . . . , xd) of heterogeneous
175
+ variables in relatively much lower dimensions with limited samples. Table 1 shows contrasts between image and
176
+ tabular data. One may argue that some high-dimensional sequential data, such as genomics and the MNIST images
177
+ converted to pixel vectors, can be structured as tabular data. However, these tabular representations still include
178
+ regularity or homogeneity in patterns that do not pose the unique challenges of heterogeneous tabular data. Therefore,
179
+ tabular data in business, health records, and many domains fail to take advantage of deep convolutional learning
180
+ due to the absence of sequential patterns or image-like spatial regularities. The current literature selectively chooses
181
+ data sets with high dimensionality and large sample sizes to take the full benefits of deep learning. In contrast, the
182
+ most commonly studied tabular data sets are of low-dimensions and limited samples (Table 1) and are almost never
183
+ considered in deep representation learning. Therefore, tabular data sets are identified as the last ”unconquered castle”
184
+ for deep learning [15], where traditional machine learning methods are still competing strongly against advanced
185
+ neural network architectures [15, 14]. Similar to image learning, there is a need for robust tabular data learning
186
+ methods to outperform superior traditional machine learning or clustering methods.
187
+ 3.2
188
+ Neighborhood embedding
189
+ A neighborhood embedding is a low-dimensional map that preserves the similarity between data points (xi and xj)
190
+ observed in a higher dimension. Maaten and Hinton propose a Student’s t-distribution to model the similarity between
191
+ 3
192
+
193
+ A PREPRINT - JANUARY 3, 2023
194
+ t-SNE
195
+ DEC [7]/
196
+ [17]
197
+ IDEC [8]
198
+ Purpose
199
+ Neighborhood embedding
200
+ Cluster embedding
201
+ Low-dimensional
202
+ Sampled from Gaussian
203
+ Autoencoder
204
+ embedding (zi)
205
+ with low σ2
206
+ latent space
207
+ Distance or similarity
208
+ Between sample
209
+ Between point & cluster
210
+ measure
211
+ points (xi, xj)
212
+ centroid (xi, µj)
213
+ Embedding
214
+ t-distribution,
215
+ t-distribution,
216
+ distribution (qij)
217
+ α = 1
218
+ α = 1
219
+ Target
220
+ Gaussian in high-dimensional
221
+ A function of
222
+ distribution (pij)
223
+ space (x)
224
+ t-distributed qij
225
+ Learning
226
+ zi+1 = zi + d KLD(p,q)
227
+ d(zi)
228
+ wi+1 = wi + d KLD(p,q)
229
+ d(w)
230
+ Purpose
231
+ Visualization in d = 2
232
+ Clustering in d > 2
233
+ Table 2: Comparison between neighborhood embedding proposed in t-SNE for data visualization [17] and cluster
234
+ embedding proposed in DEC [7] inspired by t-SNE. α = degrees of freedom of t-distribution, d = dimension of low-
235
+ dimensional embedding. W represents the trainable parameter of an autoencoder.
236
+ samples in neighborhood embedding (zi, zj) of high-dimensional data points (xi and xj) for data visualization [17].
237
+ First, the similarity between two sample points (xi and xj) in the high dimension is modeled by a Gaussian distribution,
238
+ pij in Equation 1. Similar joint distribution can be defined for a pair of points in the low-dimensional embedding (zi,
239
+ zj) as qij below.
240
+ pij =
241
+ exp(−||xi − xj||2/2σ2)
242
+
243
+ k̸=l exp(−||xk − xl||2/2σ2),
244
+ qij =
245
+ exp(−||zi − zj||2/2σ2
246
+
247
+ k̸=l exp(−||zk − zl||2/2σ2)
248
+ (1)
249
+ The divergence between the target (pij) and embedding (qij) distributions is measured using a KL divergence loss,
250
+ which is minimized to iteratively optimize the neighborhood embedding.
251
+ KL (P||Q) =
252
+
253
+ i
254
+
255
+ j
256
+ pijlog pij
257
+ qij
258
+ (2)
259
+ To facilitate high-dimensional data visualization in two dimensions (2D), the embedding distribution (qij) is mod-
260
+ eled by a Student’s t-distribution, as shown in Equation 3. One primary justification for t-distribution is its heavier
261
+ tails compared to a Gaussian distribution. A heavier tail aids in an efficient mapping of outliers observed in high
262
+ dimensional space to the 2D space for data visualization.
263
+ qij =
264
+ (1 + ||zi − zj||)−1
265
+
266
+ k̸=l(1 + ||zk − zl||)−1
267
+ (3)
268
+ Therefore, data points placed at a moderate distance in high-dimension are pulled farther by a t-distribution to aid
269
+ visualization in 2D space. In the context of cluster embedding, we argue that the additional separation between points
270
+ in low dimensions may alter their cluster assignments. To illustrate this phenomenon, we project high-dimensional
271
+ deep convolutional image features on 2D using 1) t-SNE and 2) two principal components, as shown in Figure 1.
272
+ The scattering of data points is evident in the t-SNE mapping (Figure 1 (a)), where one blue point appears on the
273
+ left side of the figure leading to a wrong cluster assignment, unlike the PCA mapping (Figure 1 (b)). In general,
274
+ the expectations of data visualization and clustering tasks are different, as highlighted in Table 2, which should be
275
+ considered in respective representation learning.
276
+ 3.3
277
+ Cluster embedding
278
+ Cluster embedding is achieved by infusing cluster separation information into the low-dimensional latent space. While
279
+ neighborhood embedding is initialized by sampling from a Gaussian distribution, cluster embedding methods use
280
+ embedding learned from an autoencoder’s latent space. However, the current cluster embedding methods use the same
281
+ t-distribution (Equation 3) to define the embedding distribution (qij), similar to neighborhood embedding. The target
282
+ distribution (pij) is derived as a function of qij, as shown below.
283
+ sij =
284
+ q2
285
+ ij
286
+
287
+ i qij
288
+ , pij =
289
+ sij
290
+
291
+ j sij
292
+ .
293
+ (4)
294
+ 4
295
+
296
+ A PREPRINT - JANUARY 3, 2023
297
+ While pair-wise sample distances in neighborhood embedding have a complexity of O (N 2), the distances from the
298
+ centroids in embedding are O(N*K). Here, K is the number of clusters, which is much smaller than the number
299
+ of samples (N). While an outlier point results in N large distances (extremely small pij values) in neighborhood
300
+ embedding, there will be much fewer (K<<N) of those large distances in cluster embedding. Therefore, the effect
301
+ of outliers on cluster embedding can be assumed to be much lower compared to the assumption in neighborhood
302
+ embedding.
303
+ 4
304
+ Proposed Method
305
+ We propose a novel cluster embedding method, Gaussian Cluster Embedding in Autoencoder Latent Space (G-
306
+ CEALS), by replacing the t-distribution (Equation 3) with a multivariate Gaussian distribution and the target distri-
307
+ bution (Equation 4) with the Gaussian likelihood of individual tabular data samples (Xi) belonging to a given cluster
308
+ (Cj) as P (Xi | Cj) or pij. Two clustering algorithms are used separately in training and evaluating the proposed joint
309
+ cluster embedding method: 1) k-means and 2) Gaussian mixture model (GMM). The clustering on tabular data space
310
+ (Xi ∈ ℜd) yields K cluster assignments for individual samples. Each cluster j is characterized by a centroid vector
311
+ (µj ∈ ℜd) and a covariance matrix (Σj ∈ ℜdxd). Because the dimensionality of tabular data is not as large as image
312
+ data, Σ and µ parameters can be reasonably sized for computation. Therefore, the soft cluster assignment (Sx(i, j))
313
+ for individual samples can be obtained using a Gaussian kernel, which is the negative exponent of the Mahalanobis
314
+ distance (dx(i, j)) between the point (Xi) and the j-th cluster centroid vector, as shown in Equations 5 and 6.
315
+ dx(i, j)
316
+ =
317
+
318
+ (Xi − µx
319
+ j ) Σ−1
320
+ x
321
+ (Xi − µj)T
322
+ (5)
323
+ Sx(i, j)
324
+ =
325
+ exp (−d2
326
+ x(i, j))
327
+ (6)
328
+ To ensure that the sum of all soft cluster assignments equals one for a given sample, we obtain a joint cluster distribu-
329
+ tion, P (xi, µj) or pij, as shown in Equation 7. We set pij, obtained via superior traditional machine learning, as the
330
+ target distribution to improve the autoencoder embedding (zi) of tabular data. Similarly, the embedding distribution
331
+ (qij) can be obtained using soft Gaussian cluster assignments (Sz) on the low-dimensional latent space (zi), as shown
332
+ in Equation 7.
333
+ pij =
334
+ Sx(i, j)
335
+
336
+ j Sx(i, j),
337
+ qij =
338
+ Sz(i, j)
339
+
340
+ j Sz(i, j)
341
+ (7)
342
+ Therefore, our P and Q distributions are independent, unlike the current cluster embedding methods. Additionally,
343
+ the covariance of the target (Σx) and embedding (Σz) distributions can regulate the scatter or compactness of data
344
+ clusters, which is impossible with t-distributed embedding.
345
+ Algorithm 1 Proposed G-CEALS Algorithm
346
+ Input: d-dimensional tabular data, X ∈ ℜn×d, where Xi ∈ ℜd
347
+ Output: Tabular data embedding, Z ∈ ℜn×m, m<<d
348
+ j − th cluster parameters, {µx
349
+ j , Σx
350
+ j } ← K-means or GMM clustering of X
351
+ pij ← {µx
352
+ j , Σx
353
+ j }, in Equation 7
354
+ Initialize: W 0 ={Wencoder, Wdecoder}
355
+ for t = 1 → n epochs do
356
+ { ˆX, Zt} ← Encoder (X, W t
357
+ encoder)
358
+ {µz
359
+ j, qij} ← K-means or GMM clustering of Zt and using qij in Equation 7
360
+ L← Lauto + γ ∗ Lcluster, measure the loss terms in Equation 9
361
+ W t ← AutoEncoder (W t−1), update weights minimizing the joint loss in Equation 9
362
+ end for
363
+ 4.1
364
+ Low-dimensional embedding optimization
365
+ A single-layer autoencoder is trained to encode the input (X) to a latent space (Z), which is then decoded to reconstruct
366
+ the original input ( ˆ
367
+ Xi), as shown in Equation 8.
368
+ Lauto = argmin
369
+ θ,Φ
370
+ N
371
+
372
+ i=1
373
+ ||Xi − ˆ
374
+ Xi||2
375
+ 2.
376
+ (8)
377
+ 5
378
+
379
+ A PREPRINT - JANUARY 3, 2023
380
+ Data set
381
+ Sample size
382
+ Dimensions
383
+ Classes
384
+ Domain
385
+ Breast Cancer
386
+ 569
387
+ 30
388
+ 2
389
+ Diagnostic
390
+ Dermatology
391
+ 358
392
+ 34
393
+ 6
394
+ Histopathological
395
+ E. coli
396
+ 336
397
+ 7
398
+ 8
399
+ Protein cell
400
+ TUANDROMD
401
+ 4465
402
+ 241
403
+ 2
404
+ Android malware
405
+ Mice Protein
406
+ 552
407
+ 78
408
+ 8
409
+ Protein expression
410
+ Olive
411
+ 572
412
+ 10
413
+ 3
414
+ Food & beverage
415
+ Vehicle
416
+ 846
417
+ 18
418
+ 4
419
+ Silhouette features
420
+ Table 3: Summary of tabular data sets used for comparing clustering performance
421
+ Here, θ and Φ denote the trainable parameters of the encoder and decoder, respectively. The embedding obtained
422
+ following each epoch of training is clustered using a clustering algorithm to obtain the cluster parameters (µ, Σ) and
423
+ the embedding distribution (qij). Given the target distribution (pij) (Equation 7), one of the learning objectives of
424
+ G-CEALS is to minimize the KL divergence between P and Q distributions (Lcluster), as shown in Equation 9 below.
425
+ The overall learning objective of G-CEALS is to update the autoencoder’s weights by minimizing a joint cost function,
426
+ the encoder reconstruction loss and the KL divergence loss, as below.
427
+ L
428
+ =
429
+ Lauto + γ ∗ Lcluster
430
+ =
431
+ argmin
432
+ θ,Φ
433
+ N
434
+
435
+ i=1
436
+ ||Xi − ˆ
437
+ Xi||2
438
+ 2 + γ ∗
439
+ N
440
+
441
+ i=1
442
+ K
443
+
444
+ j=1
445
+ pijlog pij
446
+ qij
447
+ (9)
448
+ Here, γ is a trade-off hyperparameter to balance the contribution of cluster divergence Lcluster during representation
449
+ learning. The G-CEALS algorithm is summarized in Algorithm 1.
450
+ 5
451
+ Experiments
452
+ All experimental steps and algorithms are implemented and evaluated in Python. The neural networks are built using
453
+ the PyTorch package, and clustering modules are developed using the sci-kit-learn package1 We evaluate the proposed
454
+ and baseline methods on seven multi-domain and multivariate tabular data sets. A summary of these tabular data sets
455
+ is provided in Table 3.
456
+ 5.1
457
+ Adapting image learning architectures to tabular data
458
+ A concurrent study compares the baseline embedding clustering methods on tabular data sets [27]. The comparison
459
+ results reveal that state-of-the-art embedding clustering methods proposed for image data may not be optimal baselines
460
+ for non-image tabular data. For example, Caron et al. have learned visual features from images using AlexNet and
461
+ VGG-16 after Sobel filtering for color removal and contrast enhancement, which do not apply to tabular data [6]. Their
462
+ deepCluster architecture has five convolutional layers with up to 384 2D image filters to learn image texture. Transfer
463
+ learning of tabular data, similar to VGG-16 on images, is not intuitive because tabular datasets do not share transferable
464
+ textures. Furthermore, these deep architectures can easily overfit data with limited sample size and dimensionality,
465
+ similar to tabular data sets. The DEPICT method uses a convolutional denoising autoencoder for reconstructing
466
+ original images from corrupted images [20]. Because similar image corruption is not trivial on data tables, we use
467
+ standard CNN autoencoders with single and three layers as baseline methods. The deep clustering network (DCN)
468
+ method uses a fully-connected deep neural network (FC-DNN) with 2000, 1000, 1000, 1000, and 50 neurons for
469
+ learning high-dimensional image data [11], whereas tabular data can have as low as ten input features. They avoid
470
+ CNN architecture to focus on their DCN learning objective instead of exhaustively searching all learning architectures.
471
+ However, they leverage a stacked deep autoencoder architecture instead of using a regular autoencoder model, which
472
+ may overshadow the original contribution of the algorithm. Similarly, the deep k-means (DKM) method used FC-
473
+ DNN instead of CNN for image learning [9]. The DKM method is compared against the ones that use FC-DNN
474
+ (excluding all CNN-based methods) to avoid architectural bias. We use the original DKM method to reproduce cluster
475
+ embedding on tabular data. Recently, Mrabah et al., in their Dynamic Autoencoder (DynAE) method, have used image
476
+ augmentation (shifting and rotation), which is not intuitive with tabular data, and a 2D convolutional adversarial
477
+ autoencoder for image data, which needs substantial customization of the adversarial network for learning feature
478
+ vectors in tabular format [10]. One limitation of the DynAE and DKM methods is that the latent dimension is restricted
479
+ to the number of clusters, whereas our method is proposed for any latent dimension.
480
+ 1The source code will be shared publicly and kept private for anonymity during peer review.
481
+ 6
482
+
483
+ A PREPRINT - JANUARY 3, 2023
484
+ 1
485
+ 2
486
+ 3
487
+ 4
488
+ 5
489
+ Data
490
+ folds
491
+ Trained model
492
+ with best ?
493
+ ? = [0.1, 0.2, 0.3, .... 1.0]
494
+ Accuracy
495
+ NMI
496
+ Hyperparameter
497
+ search
498
+ (p,q)
499
+ Z
500
+ x
501
+ x?
502
+ Test fold
503
+ ....... .
504
+ .
505
+ . ... ... ..
506
+ Clustering
507
+ Z
508
+ Figure 2: Five-fold cross-validation scheme for training and tuning the model with the best γ value (Equation 9). The
509
+ clustering accuracy is reported on the embedding of the left-out test data fold.
510
+ 5.2
511
+ Baseline methods
512
+ The comparison of six state-of-the-art cluster embedding methods on tabular data sets reveals the IDEC method as the
513
+ best performing, followed by traditional clustering (k-means and GMM) as the second best competitive baseline [27].
514
+ Furthermore, we detail in the previous section why existing methods for image learning may not be appropriate
515
+ baselines for tabular data sets without some customization. The limited sample size and dimensionality of tabular
516
+ data may require a simpler learning architecture than image data. For example, the latent space size is set to 256 for
517
+ image learning, whereas the input dimension of tabular data can be as low as 10.
518
+ Considering these factors, we compare our proposed method against four competitive baseline methods. First, the
519
+ k-means and GMM clustering are performed on input tabular data (X) because traditional machine learning methods
520
+ are known to produce competitive results on tabular data, unlike image data. Second, a two-stage method is used:
521
+ 1) the embedding (Z) extraction by training a single-layer autoencoder and then 2) perform clustering on Z [28,
522
+ 29]. Third, embedding learning and clustering are performed jointly on tabular data. We compare fully-connected
523
+ autoencoder (FC-AE) and CNN autoencoder (similar to the DEPICT method [20]) in single-layer and three-layer
524
+ settings to investigate a suitable learning architecture for tabular data. Fourth, despite the challenges in adapting
525
+ image learning methods to tabular data learning as mentioned in the previous section, we use two pioneering methods
526
+ for cluster embedding, DEC [7], IDEC [8], and a more recent method (deep k-means) DKM [9] for tabular data
527
+ to compare with our proposed method. Although sophisticated autoencoder architectures proposed in the literature
528
+ (stacked, variational, adversarial, convolutional) can be compared in an exhaustive search for the best method, it will
529
+ introduce architectural bias in our claim for the best learning algorithm. Therefore, we use a single-layer autoencoder
530
+ to make a fair comparison between our and the baseline learning algorithms, especially considering the size and
531
+ dimensionality of tabular data.
532
+ 5.3
533
+ Evaluation
534
+ The proposed G-CEALS model training involves self-supervised data reconstruction and unsupervised clustering with-
535
+ out requiring any ground truth. However, existing studies show that the hyperparameter (γ in Equation 9) value is
536
+ data-dependent and is tuned based on clustering accuracy that requires ground truth labels. The quality of cluster
537
+ embedding is evaluated in downstream clustering tasks using two standard metrics: clustering accuracy (ACC) [30]
538
+ and normalized mutual information (NMI) [31]. We follow the same metrics for hyperparameter tuning and cluster
539
+ embedding evaluation. However, existing methods report the clustering accuracy on the same training data set because
540
+ of the unsupervised nature of the problem. In contrast, we use a semi-supervised five-fold cross-validation scheme to
541
+ obtain reproducible and transferable learning for downstream clustering or classification. As shown in Figure 2, four
542
+ data folds are used in unsupervised training and supervised tuning, which is then used to obtain the embedding of a
543
+ left-out test data fold. We report the average ACC and NMI scores across the five left-out data folds to compare the
544
+ proposed and baseline methods. These metrics score between 0 (failure) and 1 (perfect clusters). For all evaluation
545
+ purposes, the cluster number is set to the number of class labels for a given data set. The scores are multiplied by 100
546
+ to represent the numbers in percentage.
547
+ 7
548
+
549
+ A PREPRINT - JANUARY 3, 2023
550
+ Data set
551
+ FC-AE
552
+ FC-AE
553
+ CNN
554
+ CNN
555
+ CNN
556
+ FC-AE
557
+ GMM
558
+ K-means
559
+ GMM
560
+ K-means
561
+ GMM
562
+ GMM
563
+ NHL
564
+ 1
565
+ 1
566
+ 1
567
+ 1
568
+ 3
569
+ 3
570
+ Breast cancer
571
+ ACC
572
+ 91.2 (4.8)
573
+ 85.8 (3.3)
574
+ 92.6 (3.3)
575
+ 89.8 (4.3)
576
+ 62.7 (3.1)
577
+ 85.4 (12.0)
578
+ NMI
579
+ 59.2 (18.1)
580
+ 43.8 (10.6)
581
+ 63.8 (11.7)
582
+ 55.4 (11.2)
583
+ 0.0 (0.0)
584
+ 49.4 (24.0)
585
+ Dermatology
586
+ ACC
587
+ 77.2 (9.8)
588
+ 76.4 (10.1)
589
+ 75.7 (5.4)
590
+ 72.3 (4.9)
591
+ 31.0 (3.8)
592
+ 74.3 (6.6)
593
+ NMI
594
+ 77.6 (5.8)
595
+ 77.4 (5.4)
596
+ 77.8 (4.5)
597
+ 76.1 (4.5)
598
+ 0.0 (0.0)
599
+ 82.9 (5.0)
600
+ E. coli
601
+ ACC
602
+ 32.2 (3.7)
603
+ 31.6 (3.7)
604
+ 27.7 (2.3)
605
+ 29.2 (2.5)
606
+ 34.2 (4.6)
607
+ 32.4 (1.5)
608
+ NMI
609
+ 18.0 (6.8)
610
+ 17.4 (3.1)
611
+ 17.7 (4.2)
612
+ 17.1 (3.7)
613
+ 13.3 (3.3)
614
+ 15.6 (3.2)
615
+ TUANDROMD
616
+ ACC
617
+ 83.4 (6.6)
618
+ 40.8 (4.0)
619
+ 79.4 (1.6)
620
+ 79.6 (1.2)
621
+ 79.4 (1.6)
622
+ 80.6 (4.5)
623
+ NMI
624
+ 18.8 (23.8)
625
+ 36.0 (3.3)
626
+ 0.4 (0.2)
627
+ 2.3 (1.0)
628
+ 0.4 (0.2)
629
+ 7.9 (14.6)
630
+ Mice protein
631
+ ACC
632
+ 42.0 (1.8)
633
+ 40.6 (1.7)
634
+ 37.7 (2.2)
635
+ 36.2 (3.0)
636
+ 18.8 (2.4)
637
+ 39.9 (2.1)
638
+ NMI
639
+ 40.4 (3.0)
640
+ 38.0 (3.9)
641
+ 36.4 (1.3)
642
+ 33.3 (2.7)
643
+ 0.0 (0.0)
644
+ 40.8 (3.3)
645
+ Olive
646
+ ACC
647
+ 70.8 (7.9)
648
+ 73.6 (6.4)
649
+ 58.9 (5.5)
650
+ 71.2 (10.6)
651
+ 56.5 (6.1)
652
+ 66.8 (8.7)
653
+ NMI
654
+ 42.6 (9.0)
655
+ 47.0 (6.6)
656
+ 30.7 (6.9)
657
+ 44.4 (10.2)
658
+ 0.0 (0.0)
659
+ 39.8 (10.4)
660
+ Vehicle
661
+ ACC
662
+ 41.2 (3.3)
663
+ 44.2 (3.5)
664
+ 40.8 (2.2)
665
+ 42.4 (4.6)
666
+ 40.7 (4.3)
667
+ 42.1 (4.2)
668
+ NMI
669
+ 11.8 (2.8)
670
+ 14.6 (2.2)
671
+ 11.5 (2.3)
672
+ 13.5 (4.9)
673
+ 12.7 (1.9)
674
+ 14.8 (3.4)
675
+ Table 4: Comparing fully-connected autoencoder (FC-AE) with CNN-autoencoder for the proposed G-CEALS algo-
676
+ rithm in single or three-layer settings. NHL = Number of hidden or convolutional layers.
677
+ 6
678
+ Results
679
+ All experiments are conducted on a Dell Precision 5820 workstation running Ubuntu 20.04 with 64GB RAM and an
680
+ NVIDIA GeForce RTX 3080 GPU with 10GB memory. We standardize all tabular data using the mean and standard
681
+ deviation of individual variables before training the autoencoder or performing clustering.
682
+ 6.1
683
+ Learning architecture and model selection
684
+ We compare the performance of fully connected autoencoders (FC-AE) and convolutional autoencoders (CNN-AE)
685
+ in single- and three-layer architectures for our tabular data sets. Table 4 clearly shows the superiority of single-
686
+ layer FC-AE architecture over CNN and deeper architectures, which we select in our subsequent analysis. A single-
687
+ layer autoencoder maps a d-dimensional tabular data sample to a five-dimensional autoencoder latent space (d>5),
688
+ considering the range of dimensionality of our tabular data sets (seven to 241). For all experiments, the learning rate is
689
+ set to 0.0001 with an Adam optimizer. The best autoencoder model jointly trained clustering is selected by searching
690
+ the best epoch point and γ value while training it for a maximum of 5000 epochs. The best gamma value is searched
691
+ from a range between 0.1 and 1.0.
692
+ 6.2
693
+ Clustering of tabular data versus latent space
694
+ Tables 5 and 6 show clustering scores and rank ordering for nine methods, respectively. Traditional clustering (K-
695
+ means and GMM) on tabular data yields the top three scores for the dermatology, breast cancer, mice protein, and
696
+ olive data sets. This finding is at odds with the previous finding that direct clustering of images in pixel space yields
697
+ the worst performance. This is because tabular data sets have relatively lower dimensionality and the absence of
698
+ regularity in patterns makes such data still suitable for traditional machine learning. For example, these clustering
699
+ methods yield the worst (<1.0, max. 100) NMI scores for the highest dimensional (241) TUANDROMD data set.
700
+ Alternatively, clustering methods (GMM, K-means) can be applied to the autoencoder’s latent space (Z). A trained
701
+ autoencoder is used to obtain the embedding on test data folds. The test data embedding is then clustered using GMM
702
+ and K-means, which are presented as GMM on Z and K-means on Z in Table 5, respectively. Except for the E. coli
703
+ data set, GMM on Z performs worse than GMM clustering of other data sets. Similarly, K-means clustering of tabular
704
+ data yields substantially better accuracy than K-means clustering of Z, except for the vehicle data set.
705
+ 6.3
706
+ Clustering of joint cluster embedding
707
+ The autoencoder latent space Z is jointly learned with data cluster distributions in this method. Our results on tabular
708
+ data are reproduced using two pioneering cluster embedding methods: DEC [7] and IDEC [8]. The DEC method
709
+ appears to be among the worst of nine methods presented in Table 5, except for the vehicle data set. Therefore, a
710
+ method proposed for image learning may not perform equally well on tabular data. However, the improved DEC
711
+ 8
712
+
713
+ A PREPRINT - JANUARY 3, 2023
714
+ Data set
715
+ GMM
716
+ K-means
717
+ GMM
718
+ K-means
719
+ DEC
720
+ IDEC
721
+ DKM
722
+ G-CEALS
723
+ G-CEALS
724
+ on X
725
+ on X
726
+ on Z
727
+ on Z
728
+ GMM
729
+ K-means
730
+ Breast cancer
731
+ ACC
732
+ 89.8 (4.6)
733
+ 90.2 (4.3)
734
+ 82.2 (7.4)
735
+ 82.8 (5.7)
736
+ 68.0 (3.0)
737
+ 86.0 (3.6)
738
+ 64.2 (3.9)
739
+ 91.2 (4.8)
740
+ 85.8 (3.3)
741
+ NMI
742
+ 55.4 (17.6)
743
+ 56.2 (17.0)
744
+ 40.6 (19.6)
745
+ 39.2 (15.9)
746
+ 9.2 (6.2)
747
+ 44.4 (11.3)
748
+ 2.7 (7.2)
749
+ 59.2 (18.1)
750
+ 43.8 (10.6)
751
+ Dermatology
752
+ ACC
753
+ 76.8 (8.8)
754
+ 76.2 (9.2)
755
+ 72.2 (8.8)
756
+ 63.0 (4.7)
757
+ 50.4 (7.4)
758
+ 76.6 (12.2)
759
+ 23.2 (0.5)
760
+ 77.2 (9.8)
761
+ 76.4 (10.1)
762
+ NMI
763
+ 82.4 (4.2)
764
+ 83.4 (5.0)
765
+ 73.4 (5.0)
766
+ 70.8 (4.4)
767
+ 45.2 (6.9)
768
+ 80.6 (7.2)
769
+ 3.5 (0.3)
770
+ 77.6 (5.8)
771
+ 77.4 (5.4)
772
+ Ecoli
773
+ ACC
774
+ 29.4 (4.5)
775
+ 29.2 (3.2)
776
+ 30.6 (4.7)
777
+ 29.0 (4.0)
778
+ 26.2 (2.1)
779
+ 32.6 (3.7)
780
+ 35.4 (2.9)
781
+ 32.2 (3.7)
782
+ 31.6 (3.7)
783
+ NMI
784
+ 19.6 (6.6)
785
+ 18.4 (5.6)
786
+ 17.8 (6.5)
787
+ 18.6 (6.3)
788
+ 15.0 (5.3)
789
+ 17.4 (6.3)
790
+ 14.1 (2.7)
791
+ 18.0 (6.8)
792
+ 17.4 (3.1)
793
+ TUANDROMD
794
+ ACC
795
+ 79.1 (1.7)
796
+ 79.1 (1.7)
797
+ 77.4 (2.6)
798
+ 77.2 (3.6)
799
+ 79.2 (1.5)
800
+ 82.0 (4.1)
801
+ 48.7 (11.3)
802
+ 83.4 (6.6)
803
+ 40.8 (4.0)
804
+ NMI
805
+ 0.5 (0.2)
806
+ 0.6 (0.1)
807
+ 1.6 (2.1)
808
+ 0.5 (0.2)
809
+ 0.8 (0.7)
810
+ 13.8 (9.7)
811
+ 6.8 (5.6)
812
+ 18.8 (23.8)
813
+ 36.0 (3.3)
814
+ Mice protein
815
+ ACC
816
+ 40.8 (1.7)
817
+ 40.2 (5.7)
818
+ 36.4 (5.1)
819
+ 35.0 (2.5)
820
+ 34.8 (3.1)
821
+ 35.6 (2.3)
822
+ 17.2 (2.7)
823
+ 42.0 (1.8)
824
+ 40.6 (1.7)
825
+ NMI
826
+ 42.0 (3.2)
827
+ 40.6 (4.5)
828
+ 31.6 (3.8)
829
+ 34.2 (4.2)
830
+ 30.8 (6.2)
831
+ 35.6 (3.6)
832
+ 3.1 (9.1)
833
+ 40.4 (3.0)
834
+ 38.0 (3.9)
835
+ Olive
836
+ ACC
837
+ 67.2 (11.5)
838
+ 71.4 (10.8)
839
+ 57.6 (11.2)
840
+ 59.4 (12.7)
841
+ 55.8 (5.5)
842
+ 77.2 (4.0)
843
+ 56.5 (0.0)
844
+ 70.8 (7.9)
845
+ 73.6 (6.4)
846
+ NMI
847
+ 39.4 (12.6)
848
+ 43.2 (11.7)
849
+ 30.0 (13.2)
850
+ 32.6 (14.0)
851
+ 25.4 (5.5)
852
+ 49.4 (5.2)
853
+ 0.0 (0.0)
854
+ 42.6 (9.0)
855
+ 47.0 (6.6)
856
+ Vehicle
857
+ ACC
858
+ 39.4 (2.9)
859
+ 37.2 (1.7)
860
+ 39.0 (2.6)
861
+ 39.0 (2.8)
862
+ 41.4 (3.3)
863
+ 42.8 (3.4)
864
+ 31.1 (5.6)
865
+ 41.2 (3.3)
866
+ 44.2 (3.5)
867
+ NMI
868
+ 13.6 (1.0)
869
+ 12.4 (1.6)
870
+ 13.2 (1.5)
871
+ 13.0 (1.7)
872
+ 12.8 (1.5)
873
+ 17.6 (3.8)
874
+ 6.4 (6.3)
875
+ 11.8 (2.8)
876
+ 14.6 (2.2)
877
+ Table 5: Clustering accuracy (ACC) and normalized mutual information (NMI) scores of proposed and baseline meth-
878
+ ods. Z = autoencoder latent space without joint learning. X = tabular data space. The DKM method is used on
879
+ tabular data set without customizing this image learning method for tabular data. Otherwise, a single-layer autoen-
880
+ coder without pre-training is used for all representation learning methods to avoid architectural bias in comparing the
881
+ algorithms.
882
+ Data set
883
+ GMM
884
+ K-means
885
+ GMM
886
+ K-means
887
+ DEC
888
+ IDEC
889
+ DKM
890
+ CNN
891
+ Proposed
892
+ on X
893
+ on X
894
+ on Z
895
+ on Z
896
+ GMM
897
+ G-CEALS
898
+ Breast cancer
899
+ 4
900
+ 3
901
+ 7
902
+ 6
903
+ 8
904
+ 5
905
+ 9
906
+ 1
907
+ 2
908
+ Dermatology
909
+ 2
910
+ 4
911
+ 6
912
+ 7
913
+ 8
914
+ 3
915
+ 9
916
+ 5
917
+ 1
918
+ E. coli
919
+ 5
920
+ 6
921
+ 4
922
+ 7
923
+ 9
924
+ 2
925
+ 1
926
+ 8
927
+ 3
928
+ TUANDROMD
929
+ 5
930
+ 6
931
+ 7
932
+ 8
933
+ 4
934
+ 2
935
+ 9
936
+ 3
937
+ 1
938
+ Mice protein
939
+ 2
940
+ 3
941
+ 5
942
+ 7
943
+ 8
944
+ 6
945
+ 9
946
+ 4
947
+ 1
948
+ Olive
949
+ 4
950
+ 2
951
+ 7
952
+ 5
953
+ 9
954
+ 1
955
+ 8
956
+ 6
957
+ 3
958
+ Vehicle
959
+ 5
960
+ 8
961
+ 6
962
+ 7
963
+ 3
964
+ 2
965
+ 9
966
+ 4
967
+ 1
968
+ Average
969
+ 3.9 (1.3)
970
+ 4.6 (2.0)
971
+ 6.0 (1.1)
972
+ 6.7 (0.9)
973
+ 7.0 (2.3)
974
+ 3.0 (1.7)
975
+ 7.7 (2.8)
976
+ 4.4 (2.1)
977
+ 1.4 (0.7)
978
+ Table 6: Data set-specific and average ranks of the proposed and baseline methods based on clustering accuracy.
979
+ CNN-GMM is a single convolutional layer autoencoder trained jointly with GMM via the proposed algorithm. The
980
+ DKM method is used without any customization or pretraining.
981
+ (IDEC) method shows substantial improvement over the DEC method. The IDEC method always outperforms the
982
+ GMM on Z except for the mice protein data set. K-means clustering on Z is always inferior to the IDEC method.
983
+ The IDEC is the best of all methods for the olive data sets. Unlike DEC and IDEC methods, we do not modify the
984
+ DKM method for the tabular data sets. Using the original image learning architecture (500-500-2000 neurons) on
985
+ tabular data, the DKM method yields the worst of all clustering accuracy with a zero NMI score for the olive data set.
986
+ However, it performs the best for the Ecoli data set with the lowest dimensionality (8) of all data sets.
987
+ 6.4
988
+ Proposed G-CEALS method
989
+ Table 5 shows that our proposed G-CEALS method jointly trained with GMM clustering (ACC: 91.2) outperforms
990
+ the second-best method, K-means clustering (ACC: 90.2), for the breast cancer data set. The proposed G-CEALS
991
+ method with GMM clustering (ACC: 77.2) also outperforms the second-best method, GMM clustering (ACC: 76.8)
992
+ for the dermatology data set. For the E. coli data set, the proposed method (ACC: 32.2) is on par with the second-
993
+ best method, IDEC (ACC: 32.6). The G-CEALS method (ACC: 83.4) outperforms the second-best IDEC (ACC:82.0)
994
+ method on the TUANDROMD data set. The proposed method with GMM clustering (ACC: 42.0) again outperforms
995
+ the second-best method, GMM clustering (ACC: 40.8), on the mice protein data set. Only for the Olive data set,
996
+ the IDEC method (ACC: 77.2) outperforms the proposed G-CEALS method with K-means clustering (ACC: 73.6).
997
+ However, the G-CEALS method with K-means clustering (ACC: 44.2) outperforms the second best method, IDEC
998
+ (ACC: 42.8) on the vehicle data set. Table 6 shows that the proposed G-CEALS method ranks the best method on
999
+ four of the seven data sets. For the other three data sets, G-CEALS ranks among the top three. The average ranking
1000
+ reveals that our method (average rank: 1.4) substantially outperforms the second-best (IDEC, average rank: 3.0) and
1001
+ the third-best method: GMM clustering of tabular data (average rank: 3.9).
1002
+ 9
1003
+
1004
+ A PREPRINT - JANUARY 3, 2023
1005
+ 7
1006
+ Discussion of results
1007
+ The paper is one of the first studies to jointly learn embedding and clustering in an autoencoder latent space with
1008
+ tabular data. The findings of this article can be summarized as follows. First, traditional clustering on tabular data
1009
+ is competitive with clustering on the autoencoder latent space. Our method outperforms these superior methods for
1010
+ clustering. Second, joint embedding learning with a cluster distribution (IDEC and our method) shows improved data
1011
+ representation over all disjoint learning methods (DEC, K-means on Z, GMM on Z) and GMM/K-means clustering
1012
+ on tabular data. Including the DKM method, cluster embedding methods yield the best performance on all seven
1013
+ tabular data sets. Third, our assumption of Gaussian clusters and an independent target distribution have improved the
1014
+ clustering accuracy over the methods using t-distributed clusters and all other baselines on average. We elaborate on
1015
+ these findings in the following sections.
1016
+ 7.1
1017
+ Image versus tabular data embedding
1018
+ In computer vision, clustering images on high-dimensional image pixel space is ineffective, as reported in previous
1019
+ studies. On the other hand, deep learning methods simultaneously and efficiently achieve dimensionality reduction,
1020
+ feature learning via convolution operations, and classification in an end-to-end framework. In contrast, tabular data
1021
+ sets appear with relatively smaller sample sizes and dimensionality than image data and do not contain regularity in
1022
+ features to leverage the benefit of convolutional feature extraction. Our results confirm that deep models with three
1023
+ hidden layers or convolutional networks or clustering on autoencoder embedding are not effective for tabular data.
1024
+ This finding confirms the superiority of traditional machine learning on tabular data over deep learning. However, our
1025
+ proposed representation learning method outperforms the superior clustering method to demonstrate that tabular data
1026
+ need special algorithms to perform effectively with neural network-based learning architectures. G-CEALS performs
1027
+ good with the GMM clustering algorithm may be due to the multivariate Gaussian modeling of the embedding distri-
1028
+ butions. Clustering on autoencoder embedding (Z) is unsatisfactory because the reconstruction loss may have altered
1029
+ the cluster distribution in the latent space. Therefore, setting the superior cluster distribution on tabular data space
1030
+ as the target may have helped in improving the quality of the cluster embedding. The G-CEALS method is designed
1031
+ for tabular data and may not be appropriate for images because the target distribution would be ineffective on pixel
1032
+ space. Overall, the cluster embedding of tabular data requires a learning algorithm and architecture distinct from those
1033
+ proposed for image data.
1034
+ 7.2
1035
+ Trade-off between data reconstruction and cluster divergence loss
1036
+ We observe that one of the first successful deep cluster embedding methods proposed for image clustering (DEC [7])
1037
+ performs the worst among all approaches with tabular data sets 6. The DEC method first pretrains an autoencoder
1038
+ and then separately finetunes the KL divergence loss after modeling a t-distributed embedding for clustering. There is
1039
+ no γ parameter because the Lauto and Lcluster optimizations happen separately in DEC. Conversely, the introduction
1040
+ of γ parameter in IDEC and our method has substantially improved the quality of cluster embedding. While the
1041
+ autoencoder reconstruction loss Lauto retains all information in the latent space, Lcluster (Equation 9) disrupts the
1042
+ latent space to learn the clusters. A disproportionate contribution of these two loss terms can collapse the cluster
1043
+ distribution in the embedding leading to poor cluster performance. Therefore, tuning the γ parameter is a crucial step
1044
+ in cluster embedding methods.
1045
+ 7.3
1046
+ G-CEALS versus other methods
1047
+ Our results show that the IDEC method performs better in cases where the clustering on tabular data space is sub-
1048
+ stantially worse (E. coli and Olive data sets in Table 6). It may be because the IDEC method does not learn from
1049
+ the cluster distribution on the tabular data space, similarly to the proposed G-CEALS method. In IDEC, the target
1050
+ distribution is derived from the t-distributed embedding instead. Overall, finding an appropriate target distribution for
1051
+ optimizing the KL divergence loss remains an open problem for future work. Another common observation is that
1052
+ the Olive and E. coli data sets have the lowest dimensionality among the seven tabular data sets (Table 3) with only
1053
+ ten and seven variables, respectively. Therefore, it may be inferred that the IDEC method is superior to the proposed
1054
+ G-CEALS method when the dimensionality of tabular data is less than ten. For tabular data sets with the highest
1055
+ dimensionality ( TUANDROMD (241) and mice protein (78)), the G-CEALS method outperforms the IDEC method
1056
+ as the best-performing method. This observation suggests that Gaussian embedding may be more suitable over its
1057
+ t-distributed counterparts when a tabular data set has higher dimensionality.
1058
+ 10
1059
+
1060
+ A PREPRINT - JANUARY 3, 2023
1061
+ 7.4
1062
+ Limitations
1063
+ While tunable parameters provide sufficient flexibility to optimize the embedding, finding the best parameter setting
1064
+ can be computationally expensive and data-demanding. The quality of embedding can be sensitive to the choice of
1065
+ these hyperparameters due to the lack of large training samples. The G-CEALS method in this paper uses the clustering
1066
+ accuracy (ACC) metric to search and select the trained model for embedding generation. This may help the model
1067
+ obtain the best ACC scores on test data embedding. As mentioned earlier, the G-CEALS method is not suitable for
1068
+ image data because the target distribution is obtained in the high-dimensional input feature space.
1069
+ 8
1070
+ Conclusions
1071
+ This paper presents a novel cluster embedding method in one of the first studies on tabular data sets. The superiority
1072
+ of our G-CEALS method suggests that multivariate Gaussian distribution is superior to the widely used t-distribution
1073
+ assumption for learning tabular data embedding. Our findings show that tabular data sets require learning algorithms
1074
+ and architectures distinct from those proposed for image learning. This data-centric learning approach may improve a
1075
+ deep model’s performance on tabular data over its currently known superior machine learning counterparts. The pro-
1076
+ posed joint learning framework provides a promising representation learning of tabular data over its superior machine
1077
+ learning counterparts.
1078
+ Acknowledgements
1079
+ References
1080
+ [1] Lei Lin, Wencheng Wu, Zhongkai Shangguan, Safwan Wshah, Ramadan Elmoudi, and Beilei Xu. Hpt-rl: Cali-
1081
+ brating power system models based on hierarchical parameter tuning and reinforcement learning. In 2020 19th
1082
+ IEEE International Conference on Machine Learning and Applications (ICMLA), pages 1231–1237. IEEE, 2020.
1083
+ [2] M Alam, M D Samad, L Vidyaratne, A Glandon, and K M Iftekharuddin. Survey on Deep Neural Networks in
1084
+ Speech and Vision Systems. Neurocomputing, 417:302–321, 2020.
1085
+ [3] Xue Ying. An overview of overfitting and its solutions. In Journal of physics: Conference series, volume 1168,
1086
+ page 022022. IOP Publishing, 2019.
1087
+ [4] Sandy Huang, Nicolas Papernot, Ian Goodfellow, Yan Duan, and Pieter Abbeel. Adversarial attacks on neural
1088
+ network policies. arXiv preprint arXiv:1702.02284, 2017.
1089
+ [5] Ahc`ene Boubekki, Michael Kampffmeyer, Ulf Brefeld, and Robert Jenssen. Joint optimization of an autoencoder
1090
+ for clustering and embedding, volume 110. Springer US, 2021.
1091
+ [6] Mathilde Caron, Piotr Bojanowski, Armand Joulin, and Matthijs Douze. Deep clustering for unsupervised learn-
1092
+ ing of visual features. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial
1093
+ Intelligence and Lecture Notes in Bioinformatics), volume 11218 LNCS, pages 139–156, jul 2018.
1094
+ [7] Junyuan Xie, Ross Girshick, and Ali Farhadi. Unsupervised deep embedding for clustering analysis. In 33rd
1095
+ International Conference on Machine Learning, ICML 2016, volume 1, pages 740–749, 2016.
1096
+ [8] Xifeng Guo, Long Gao, Xinwang Liu, and Jianping Yin. Improved deep embedded clustering with local structure
1097
+ preservation. IJCAI International Joint Conference on Artificial Intelligence, 0:1753–1759, 2017.
1098
+ [9] Maziar Moradi Fard, Thibaut Thonet, and Eric Gaussier. Deep k-Means: Jointly clustering with k-Means and
1099
+ learning representations. Pattern Recognition Letters, 138:185–192, 2020.
1100
+ [10] Nairouz Mrabah, Naimul Mefraz Khan, Riadh Ksantini, and Zied Lachiri. Deep clustering with a dynamic
1101
+ autoencoder: From reconstruction towards centroids construction. Neural Networks, 130:206–228, oct 2020.
1102
+ [11] Bo Yang, Xiao Fu, Nicholas D Sidiropoulos, and Mingyi Hong. Towards K-means-friendly spaces: Simultaneous
1103
+ deep learning and clustering. In 34th International Conference on Machine Learning, ICML 2017, volume 8,
1104
+ pages 5888–5901, 2017.
1105
+ [12] Niklas Kohler, Maren Buttner, and Fabian Theis. Deep learning does not outperform classical machine learning
1106
+ for cell-type annotation. bioRxiv, page 653907, 2019.
1107
+ 11
1108
+
1109
+ A PREPRINT - JANUARY 3, 2023
1110
+ [13] Aaron M. Smith, Jonathan R. Walsh, John Long, Craig B. Davis, Peter Henstock, Martin R. Hodge, Mateusz Ma-
1111
+ ciejewski, Xinmeng Jasmine Mu, Stephen Ra, Shanrong Zhao, Daniel Ziemek, and Charles K. Fisher. Standard
1112
+ machine learning approaches outperform deep representation learning on phenotype prediction from transcrip-
1113
+ tomics data. BMC Bioinformatics, 21(1):119, dec 2020.
1114
+ [14] Vadim Borisov, Tobias Leemann, Kathrin Seßler, Johannes Haug, Martin Pawelczyk, and Gjergji Kasneci. Deep
1115
+ Neural Networks and Tabular Data: A Survey. arXiv preprint arXiv:2110.01889, oct 2021.
1116
+ [15] Arlind Kadra, Marius Lindauer, Frank Hutter, and Josif Grabocka. Well-tuned simple nets excel on tabular
1117
+ datasets. Advances in neural information processing systems, 34:23928–23941, 2021.
1118
+ [16] Ravid Shwartz-Ziv and Amitai Armon. Tabular data: Deep learning is not all you need. Information Fusion,
1119
+ 81:84–90, may 2022.
1120
+ [17] Laurens Van Der Maaten and Geoffrey Hinton. Visualizing data using t-SNE. Journal of Machine Learning
1121
+ Research, 9:2579–2625, 2008.
1122
+ [18] Liang Duan, Charu Aggarwal, Shuai Ma, and Saket Sathe. Improving spectral clustering with deep embed-
1123
+ ding and cluster estimation.
1124
+ Proceedings - IEEE International Conference on Data Mining, ICDM, 2019-
1125
+ Novem(Icdm):170–179, 2019.
1126
+ [19] Sean T. Yang, Kuan Hao Huang, and Bill Howe. JECL: Joint embedding and cluster learning for image-text
1127
+ pairs. Proceedings - International Conference on Pattern Recognition, pages 8344–8351, 2020.
1128
+ [20] Kamran Ghasedi Dizaji, Amirhossein Herandi, Cheng Deng, Weidong Cai, and Heng Huang. Deep Clustering
1129
+ via Joint Convolutional Autoencoder Embedding and Relative Entropy Minimization. In Proceedings of the
1130
+ IEEE International Conference on Computer Vision, volume 2017-Octob, pages 5747–5756, 2017.
1131
+ [21] Rui Zhang, Yinglong Xia, Hanghang Tong, and Yada Zhu. Robust embedded deep K-means clustering. Interna-
1132
+ tional Conference on Information and Knowledge Management, Proceedings, pages 1181–1190, 2019.
1133
+ [22] Yazhou Ren, Kangrong Hu, Xinyi Dai, Lili Pan, Steven C.H. Hoi, and Zenglin Xu.
1134
+ Semi-supervised deep
1135
+ embedded clustering. Neurocomputing, 325:121–130, jan 2019.
1136
+ [23] Joseph Enguehard, Peter O’Halloran, and Ali Gholipour. Semi-supervised learning with deep embedded cluster-
1137
+ ing for image classification and segmentation. IEEE Access, 7:11093–11104, 2019.
1138
+ [24] Lirong Wu, Lifan Yuan, Guojiang Zhao, Haitao Lin, and Stan Z. Li. Deep Clustering and Visualization for End-
1139
+ to-End High-Dimensional Data Analysis. IEEE Transactions on Neural Networks and Learning Systems, pages
1140
+ 1–12, 2022.
1141
+ [25] Dheeru Dua and Casey Graff. UCI machine learning repository, 2017.
1142
+ [26] Raisul Arefin, Manar D. Samad, Furkan A. Akyelken, and Arash Davanian. Non-transfer Deep Learning of
1143
+ Optical Coherence Tomography for Post-hoc Explanation of Macular Disease Classification. In 2021 IEEE 9th
1144
+ International Conference on Healthcare Informatics (ICHI), pages 48–52. IEEE, aug 2021.
1145
+ [27] Sakib Abrar and Manar D. Samad. Are deep image embedding clustering methods effective for heterogeneous
1146
+ tabular data? (arXiv:2212.14111), 2022.
1147
+ [28] Xi Peng, Shijie Xiao, Jiashi Feng, Wei-Yun Yau, and Zhang Yi. Deep subspace clustering with sparsity prior.
1148
+ In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI’16, page
1149
+ 1925–1931. AAAI Press, 2016.
1150
+ [29] Fei Tian, Bin Gao, Qing Cui, Enhong Chen, and Tie-Yan Liu. Learning deep representations for graph clustering.
1151
+ Proceedings of the AAAI Conference on Artificial Intelligence, 28(1), Jun. 2014.
1152
+ [30] H. W. Kuhn. The hungarian method for the assignment problem. Naval Research Logistics Quarterly, 2:83–97,
1153
+ 3 1955.
1154
+ [31] Pablo A. Est´evez, Michel Tesmer, Claudio A. Perez, and Jacek M. Zurada. Normalized mutual information
1155
+ feature selection. IEEE Transactions on Neural Networks, 20:189–201, 2009.
1156
+ 12
1157
+
GNAyT4oBgHgl3EQf5Pq2/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff